WO2019062785A1 - Procédé de conversion d'une transmission sans licence en une transmission sous licence et dispositif - Google Patents

Procédé de conversion d'une transmission sans licence en une transmission sous licence et dispositif Download PDF

Info

Publication number
WO2019062785A1
WO2019062785A1 PCT/CN2018/107788 CN2018107788W WO2019062785A1 WO 2019062785 A1 WO2019062785 A1 WO 2019062785A1 CN 2018107788 W CN2018107788 W CN 2018107788W WO 2019062785 A1 WO2019062785 A1 WO 2019062785A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
data
transmission
sent
resource
Prior art date
Application number
PCT/CN2018/107788
Other languages
English (en)
Chinese (zh)
Inventor
韩云博
庄宏成
丁志明
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201810533171.9A external-priority patent/CN109600748B/zh
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2019062785A1 publication Critical patent/WO2019062785A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states

Definitions

  • the embodiments of the present application relate to the field of communications, and, more particularly, to a method, a network device, and a terminal device that are converted from an unauthorized-based transmission to an authorization-based transmission.
  • GSM global system for mobile communication
  • WCDMA wideband code division multiple access
  • LTE long term evolution
  • NR new radio access
  • M2M machine-to-machine
  • URLLC ultra-reliable and low latency communications
  • V2V vehicle to vehicle
  • a grant-based transmission method is adopted in the LTE system.
  • the user equipment User Equipment, UE
  • the SR Service Request
  • the transmission resource required for the BSR report is sent to the base station, and finally the second uplink scheduling information is received, and then the uplink can be sent to the base station.
  • the BSR Buffer Statues Report
  • the transmission resource required for the BSR report is sent to the base station, and finally the second uplink scheduling information is received, and then the uplink can be sent to the base station. data. Therefore, it can be known that sending an uplink request from the user equipment to the base station to send uplink data to the user equipment can send uplink data, and multiple signaling interactions are required, which may cause a large delay. For the future communication network system, it is obviously unable to meet the low delay. Claim. Therefore, how to reduce the delay of the uplink transmission of the user equipment and improve the communication efficiency of the system becomes a technical problem to be solved urgently.
  • the present application provides a method, a network device, and a terminal device that are converted from an unlicensed transmission to an authorization-based transmission, which can improve communication efficiency of the system.
  • a method for transitioning from an unlicensed transmission to an authorization based transmission comprising:
  • the first device receives second data that is sent by the second device according to the uplink scheduling information.
  • determining uplink scheduling information of the second device based on the authorization transmission based on the unauthorized transmission of the first message and the second device may reduce the transmission delay and improve the communication efficiency of the system.
  • the determining, according to the non-authorized transmission of the first message and the second device, determining an uplink of an authorization-based transmission of the second device includes: receiving the first data based on the unauthorized transmission sent by the second device, the first device cannot successfully demodulate the first data, but can identify the sending of the first data
  • the uplink scheduling information is determined according to at least the first message and the first data that cannot be successfully demodulated.
  • the first device may directly determine the uplink scheduling information according to the first message and the first data that cannot be successfully demodulated, without the second device sending the BSR to the first device again, which is reduced.
  • the number of signaling interactions can effectively reduce the transmission delay and improve the communication efficiency of the system.
  • the method before the first device receives the first message sent by the second device, the method further includes: receiving the Determining, by the second device, the first data based on the unauthorized transmission, where the first device cannot successfully demodulate the first data, but can identify the sender of the first data, to the second device Sending a negative response to the first data or not sending a positive response to the first data to the second device during a particular time interval.
  • the scheduling information includes: receiving the first data based on the unauthorized transmission sent by the second device, the first device cannot successfully demodulate the first data, and cannot identify the sending of the first data
  • the uplink scheduling information is determined according to at least the energy of the first message and the first data that cannot be successfully demodulated.
  • the first device may directly determine the uplink scheduling information according to at least the energy of the first message and the first data that cannot be successfully demodulated, without the second device sending the BSR to the first device again.
  • the number of signaling interactions is reduced, which can effectively reduce the transmission delay and improve the communication efficiency of the system.
  • the first message is uplink control information.
  • the uplink control information may be simple signaling, which can reduce resource overhead and improve communication efficiency of the system.
  • the frame format of the first message and the scheduling request SR Similarly, the first message is different from the constellation corresponding to the scheduling request SR.
  • the first message is different from the scheduling request SR, and the first device may distinguish the first message and the scheduling request SR according to different constellation diagrams without adding an additional indication identifier. Can improve the communication efficiency of the system.
  • the first message is configured by using an unauthorized transfer authorization request
  • the SR-like resource is sent by the SR-like resource, and the SR-like resource is used to transmit the first message and/or the scheduling request SR.
  • the SR-like resource period may be shorter than the SR resource period, which can reduce the transmission delay and improve the communication efficiency of the system.
  • the SR-like resource may also be used to send a scheduling request SR, which can improve the efficiency of using system resources.
  • the first message is transmitted by the second device The energy of the modulation method is not used.
  • the first message is the energy of the second device that does not adopt the modulation mode, and the second device does not need to transmit other indication information, which can reduce system overhead and improve communication efficiency of the system.
  • the first message is transmitted by using an uplink piggyback
  • the second device sends the third data transmitted to the first device together.
  • the first message may be sent together with the third data transmitted by the second device to the first device by means of uplink piggyback transmission, which can effectively utilize system resources and improve communication efficiency of the system.
  • the first device The message includes: the first device receiving the first message sent by the second device on a physical uplink control channel resource.
  • the first device receives the second The message includes: the first device receiving the first message sent by the second device on a physical scheduling request channel resource.
  • the first device receives the second device
  • the first message includes: the first device receiving the first message sent by the second device on a physical uplink shared channel resource.
  • the first device receives the second device
  • the first message includes: the first device receiving the first message sent by the second device on a resource based on the unlicensed transmission.
  • the first device may receive the first message sent by the second device on the resource based on the unlicensed transmission, which may improve the use efficiency of the system resource, increase the reliability of the signaling transmission, and improve the communication efficiency of the system. .
  • the first device receives the first message sent by the second device
  • the transmission period of the reserved resource may be smaller than the transmission period of the physical scheduling request channel resource, which can reduce the transmission delay and improve the communication efficiency of the system.
  • the reserved resource is shared by one terminal device or shared by multiple terminal devices.
  • the reserved resources can be shared by multiple terminal devices, which can improve the use efficiency of system resources and improve the communication efficiency of the system.
  • the method further includes: the first Before receiving the first data, the device sends a second message to the second device, where the second message is used to indicate that the unauthorized transmission by using the first message is performed or not based on the authorization.
  • the mechanism of transmission is not limited to: the first Before receiving the first data, the device sends a second message to the second device, where the second message is used to indicate that the unauthorized transmission by using the first message is performed or not based on the authorization.
  • the sending, by the second device, the second message includes: sending, by using a system message, to the second device And sending the second message to the second device by using radio resource control signaling; or sending the second message to the second device by using a physical control message.
  • a method for transitioning from an unlicensed transmission to an authorization based transmission comprising:
  • the second device sends a first message to the first device, where the first message is used to request that the resource that is occupied by the first message is transferred from the unlicensed transmission to the authorization-based transmission, and the resource buffer is compared with the transmission buffer status report BSR.
  • the second device receives the uplink scheduling information of the authorization-based transmission sent by the first device, and the uplink scheduling information is based at least on the first message and the second device based on the unauthorized And determining, by the second device, the second data is sent to the first device according to the uplink scheduling information.
  • the second device sends a first message to the first device, where the first message is used to request that the resource occupied by the first message is transferred to the transmission buffer by the unauthorized transmission to the authorization-based transmission.
  • the status report BSR occupies less resources, which can reduce resource overhead and improve system communication efficiency.
  • the sending, by the second device, the first message to the first device includes: receiving, by the first device, the first data In the case of a negative response, the second device sends the first message to the first device, where the first data is data of an unauthorized transmission based on the second device.
  • the second device in a case of receiving a negative response of the first data sent by the first device, the second device sends a first message to the first device, where the request is changed from the unauthorized-based transmission to the authorization-based Transmission can improve the reliability of system transmission, thereby improving the communication efficiency of the system.
  • the sending, by the second device, the first message to the first device includes: not receiving, by the first device, In the case of a positive response to the first data, the second device sends the first message to the first device, where the first data is data of an unauthorized transmission based on the second device.
  • the second device when the second device does not receive the negative response sent by the first device after the K times of repeated transmissions in the specific time interval, the second device considers that the first data transmission is successful, and does not The first device sends the first message; or the second device does not receive the negative response sent by the first device in a specific time interval (when no K times of repeated transmission is used), the second device considers that the first data is successfully sent, Sending a first message to the first device, where K is a positive integer not greater than the maximum number of repeated transmissions.
  • the second device in a case that the first device does not receive the positive response to the first data sent by the first device, the second device sends the first message to the first device, which can improve the reliability of the system transmission. Thereby improving the communication efficiency of the system.
  • the first message is uplink control information.
  • the uplink control information may be simple signaling, which can reduce resource overhead and improve communication efficiency of the system.
  • the first message is the same as the frame format of the scheduling request SR, where A message is different from the constellation diagram corresponding to the scheduling request SR.
  • the first message is different from the scheduling request SR, and the first device can distinguish the first message and the scheduling request SR according to different constellations without increasing the additional indication identifier, which can be improved.
  • System communication efficiency
  • the first message is sent by using an unauthorized transfer authorization request SR-like resource
  • the SR-like resource is a separately allocated resource of the first device, and the SR-like resource can be used to transmit the first message and/or the scheduling request SR.
  • the SR-like resource period may be shorter than the SR resource period, which can reduce the transmission delay and improve the communication efficiency of the system.
  • the first message is an unused modulation mode transmitted by the second device energy of.
  • the first message is the energy of the second device that does not adopt the modulation mode, and the second device does not need to transmit other indication information, so that the communication efficiency of the system can be improved.
  • the first message is transmitted by using an uplink piggybacking device and the second device
  • the third data transmitted to the first device is transmitted together.
  • the first message may be sent together with the third data transmitted by the second device to the first device by means of uplink piggyback transmission, which can effectively utilize system resources and improve communication efficiency of the system.
  • the second device is first The sending, by the device, the first message includes: sending, by the second device, the first message to the first device on a physical uplink control channel resource.
  • the second device is first The sending, by the device, the first message includes: sending, by the second device, the first message to the first device on a physical scheduling request channel resource.
  • the second device is first The sending, by the device, the first message includes: sending, by the second device, the first message to the first device on a physical uplink shared channel resource.
  • the second device Sending, by the device, the first message, the second device sends the first message to the first device on a resource based on the unlicensed transmission.
  • the first device may receive the first message sent by the second device on the resource based on the unlicensed transmission, which may improve the use efficiency of the system resource, increase the reliability of the signaling transmission, and improve the communication efficiency of the system. .
  • the second device sends the first device to the first device
  • the first message includes: the second device sends the first message to the first device on a reserved resource, where a transmission period of the reserved resource is smaller than a transmission period of a physical scheduling request channel resource.
  • the transmission period of the reserved resource may be smaller than the transmission period of the physical scheduling request channel resource, which can reduce the transmission delay and improve the communication efficiency of the system.
  • the reserved resource is shared by one terminal device or multiple terminal devices.
  • the reserved resources can be shared by multiple terminal devices, which can improve the use efficiency of system resources and improve the communication efficiency of the system.
  • the method further includes: Receiving, by the second device, the second message sent by the first device, where the second message is used to indicate that the first message is used or not based on the unauthorized The mechanism for transferring to an authorization-based transport.
  • the receiving, by the first device, the second message includes: receiving, by using a system message Receiving the second message sent by the first device; or receiving the second message sent by the first device by using radio resource control signaling; or receiving, by using a physical control message, the Second message.
  • a network device comprising means for performing the method of any of the above-described first aspect or any of the possible implementations of the first aspect.
  • a terminal device comprising means for performing the method of any of the above-described second or second aspect of the second aspect.
  • a network device comprising: a processor and a transceiver, the processor and the transceiver for performing the method of any of the first aspect or the first aspect of the first aspect.
  • the network device further includes a memory, where the computer stores a computer program executable on the processor, and when the processor executes the computer program, causing the network device to perform the first Aspect or method of any of the possible implementations of the first aspect.
  • a terminal device comprising: a processor and a transceiver, the processor and the transceiver being configured to perform the method in any of the possible implementations of the second aspect or the second aspect.
  • the network device further includes a memory, where the computer stores a computer program executable on the processor, and when the processor executes the computer program, causing the terminal device to perform the second Aspect or method of any of the possible implementations of the second aspect.
  • a computer storage medium for storing a computer program, the computer program comprising instructions for performing the method of the first aspect or any of the possible implementations of the first aspect.
  • a computer storage medium for storing a computer program, the computer program comprising instructions for performing the method of any of the second aspect or the second aspect.
  • a computer program product comprising instructions, when run on a terminal device, causes the terminal device to perform the method of the first aspect or the first aspect or any of its possible implementations.
  • a computer program product comprising instructions, when run on a network device, causes the network device to perform the method of the second or second aspect or any of its possible implementations.
  • a communication chip in which instructions are stored, which when executed on a network device or a terminal device, cause the network device or the terminal device to perform the method described in the above aspects.
  • the twelfth aspect provides a system, including the network device provided in the foregoing third aspect, and the terminal device provided in the foregoing fourth aspect; or the network device provided in the foregoing fifth aspect and the terminal device provided in the foregoing sixth aspect.
  • the present application also provides the following embodiments.
  • the numbers of the embodiments provided in this section do not have a clear correspondence with the numbers of the embodiments provided in other parts of the present application, and only the convenience of this part is expressed:
  • a method for transferring an unlicensed transmission to an authorization based transmission for a first device comprising:
  • the first device receives uplink data of the authorization-based transmission sent by the second device to the first device.
  • the second device may send the first message to the first device to notify the first device that it wants to be by Grant.
  • -free transmission is transferred to Grant-based transmission, and the two-step short process of uplink scheduling-uplink data is used for Grant-based transmission, compared with the traditional four-step process (SR--first uplink scheduling-BSR--- The second uplink scheduling) reduces overhead.
  • the first device Before the first device and the second device perform the unlicensed transmission, the first device sends a second message to the second device, where the second message is used at least for configuring and/or activating the second device.
  • the first device and the second device adopt a mechanism for performing an unauthorized-based transmission to an authorization-based transmission by using the first message.
  • the first device may configure and/or activate the aforementioned two-step mechanism of transferring from Grant-free transmission to Grant-based transmission to the second device.
  • the first message is uplink control information UCI.
  • the first message has the same frame format as the scheduling request SR, and the used constellation is different.
  • the first message is similar to the traditional scheduling request SR, but the effect is different, so the two can use the same frame format, such as UCI format 1/1a/1b, but the constellation diagrams used can be different to distinguish the two. .
  • the first message is energy, and no modulation method is adopted.
  • the first message is similar to the UCI format 1 used by the traditional SR.
  • the energy is sent only on a certain resource, and the modulation mode is not used.
  • the first device can obtain the first message by sensing the energy on the resource. .
  • the first message is sent together with the uplink data sent by the second device to the first device by means of piggybacking.
  • the second device may send the first message piggybackingly while the first device sends the uplink data.
  • the first device receives the first message sent by the second device on a resource based on unauthorized transmission.
  • the first message may be sent on a traditional PUCCH resource; or may be sent using the same PSRCH resource used by the SR.
  • transmitting in the PSRCH resource may be regarded as a special case transmitted in the PUCCH resource; Sending on the resource, for example, the scenario in which the first device uses the piggybacking method to transmit the first message and the uplink data together; further, the first message may also be sent in the Grant-free resource, where the packet may be sent in the Grant-free resource.
  • PUSCH resources a special case sent in PUSCH resources.
  • the first device sends the second message to the second device by using a system message.
  • the first device sends the second message to the second device by using RRC signaling.
  • the first device sends the second message to the second device by using a physical control channel.
  • a method for transferring an unlicensed transmission to an authorization based transmission for a second device comprising:
  • the second device sends uplink data based on the authorized transmission to the first device.
  • the second device may send the first message to the first device to notify the first device that it wants to be Grant-free.
  • the transmission is transferred to Grant-based transmission, and the two-step short process of uplink scheduling-uplink data is used for Grant-based transmission, compared with the traditional four-step process (SR--first uplink scheduling-BSR---second Secondary uplink scheduling) reduces overhead.
  • the second device receives the second message sent by the first device to the second device, where the second message is used by at least And configuring and/or activating the first device and the second device to adopt a mechanism for performing an unauthorized-based transmission to an authorization-based transmission by using the first message.
  • the first device may configure and/or activate the aforementioned two-step mechanism of transferring from Grant-free transmission to Grant-based transmission to the second device.
  • the first message is uplink control information UCI.
  • the first message has the same frame format as the scheduling request SR, and the used constellation is different.
  • the first message is similar to the traditional scheduling request SR, but the effect is different, so the two can use the same frame format, such as UCI format 1/1a/1b, etc., but the constellation diagrams used can be different to make a difference.
  • the first message is energy, and no modulation method is adopted.
  • the first message is similar to the UCI format 1 used by the traditional SR.
  • the energy is sent only on a certain resource, and the modulation mode is not used.
  • the first device can obtain the first message by sensing the energy on the resource. .
  • the first message is sent by means of piggybacking with uplink data sent by the second device to the first device.
  • the first message may be piggybacked.
  • the second device sends the first message to the first device on a physical scheduling request channel PSRCH resource;
  • the second device sends the first message to the first device on a physical shared channel PUSCH resource
  • the first message may be sent on a traditional PUCCH resource; or may be sent using the same PSRCH resource used by the SR.
  • transmitting in the PSRCH resource may be regarded as a special case transmitted in the PUCCH resource; Sending on the resource, for example, the scenario in which the first device uses the piggybacking method to transmit the first message and the uplink data together; further, the first message may also be sent in the Grant-free resource, where the packet may be sent in the Grant-free resource.
  • PUSCH resources a special case sent in PUSCH resources.
  • the second device receives the second message that is sent by the first device to the second device by using a system message.
  • the second device receives the second message that is sent by the first device to the second device by using RRC signaling.
  • the second device receives the second message that is sent by the first device to the second device by using a physical control channel.
  • a first device comprising:
  • a processor a memory, and a transceiver
  • the transceiver is configured to receive and send data
  • the memory is for storing instructions
  • the processor is configured to execute the instructions in the memory, and perform the method of any one of 1 to 10.
  • the transceiver comprises:
  • the transmitter is configured to send the second message according to any one of 1 to 10, the negative response of the uplink data, and the uplink scheduling information;
  • the receiver is further configured to receive the first message according to any one of the rights 1 to 10, the uplink data based on the unauthorized transmission, and the uplink data of the authorization-based transmission.
  • a second device comprising:
  • a processor a memory, and a transceiver
  • the transceiver is configured to receive and send data
  • the memory is for storing instructions
  • the processor is configured to execute the instructions in the memory, and perform the method of any one of 11 to 20.
  • the transceiver comprises:
  • the transmitter is configured to send the first message according to any one of 11 to 20, the uplink data based on the unauthorized transmission, and the uplink data of the authorization-based transmission;
  • the receiver is configured to receive the second message according to any one of 11 to 20, the negative response of the uplink data, and the uplink scheduling information.
  • a base station configured to perform the method of any of 1 to 10.
  • a terminal configured to perform the method of any of 11 to 20.
  • FIG. 1 is a schematic diagram of a communication system applied in an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a network architecture applied to an embodiment of the present application
  • FIG. 3 is a schematic flowchart of a method for transferring from an unlicensed transmission to an authorization based transmission according to an embodiment of the present application
  • FIG. 4 is a schematic flowchart of another method for transferring an unauthorized-based transmission to an authorization-based transmission according to an embodiment of the present application
  • FIG. 5 is a schematic diagram of a constellation map of an embodiment of the present application.
  • FIG. 6 is a schematic diagram of a constellation map of another embodiment of the present application.
  • FIG. 7 is a schematic diagram of an SR-like resource occupying an unlicensed transmission resource according to an embodiment of the present application.
  • FIG. 8 is a schematic diagram of binding of an unlicensed transmission resource and parameter information according to an embodiment of the present application.
  • FIG. 9 is a schematic diagram of a terminal device according to an embodiment of the present application.
  • FIG. 10 is a schematic diagram of a network device according to an embodiment of the present application.
  • FIG. 1 is a schematic diagram of a system to which the embodiment of the present application is applied.
  • the system 100 can include a network device 20 and a terminal device 10, wherein the network device and the terminal device are connected by wireless.
  • FIG. 1 is only an example in which the system includes a network device, but the embodiment of the present application is not limited thereto.
  • the system may further include more network devices; similarly, the system may also include more terminals. device.
  • the system may also be referred to as a network, which is not limited by the embodiment of the present application.
  • the communication device in this embodiment of the present application may be a terminal device.
  • the terminal device may also refer to user equipment (UE), access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent. Or user device.
  • the access terminal may be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), with wireless communication.
  • PLMN public land mobile network
  • the terminal device may also be a wearable device.
  • a wearable device which can also be called a wearable smart device, is a general term for applying wearable technology to intelligently design and wear wearable devices such as glasses, gloves, watches, clothing, and shoes.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable devices are more than just a hardware device, but they also implement powerful functions through software support, data interaction, and cloud interaction.
  • Generalized wearable smart devices include full-featured, large-size, non-reliable smartphones for full or partial functions, such as smart watches or smart glasses, and focus on only one type of application, and need to work with other devices such as smartphones. Use, such as various smart bracelets for smart signs monitoring, smart jewelry, etc.
  • the communication device in this embodiment of the present application may be a network device.
  • the network device may be a device for communicating with the terminal device, and the network device may be a global system of mobile communication (GSM) or a base station in code division multiple access (CDMA).
  • BTS may also be a base station (NodeB, NB) in a wideband code division multiple access (WCDMA) system, or an evolved base station in a long term evolution (LTE) system
  • An evolutionary node B, an eNB or an eNodeB may also be a wireless controller in a cloud radio access network (CRAN) scenario, or the network device may be a relay station, an access point, an in-vehicle device, or a wearable device.
  • CRAN cloud radio access network
  • the network device provides a service for the cell
  • the terminal device communicates with the network device by using a transmission resource (for example, a frequency domain resource, or a spectrum resource) used by the cell
  • the cell may be a network device.
  • a transmission resource for example, a frequency domain resource, or a spectrum resource
  • the cell may be a network device.
  • the cell may belong to a macro base station, or may belong to a base station corresponding to a small cell, where the small cell may include: a metro cell, a micro cell, and a pico cell. (pico cell), femto cell, etc.
  • These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services.
  • the cell may also be a hypercell.
  • FIG. 2 is a schematic diagram of a network architecture that may be applied to an embodiment of the present application.
  • the network architecture diagram may be a network architecture diagram of a new wireless access in a next generation wireless communication system.
  • the network device can be divided into a centralized unit (CU) and multiple transmission reception point (TRP)/distributed unit (DU), that is, network equipment.
  • TRP transmission reception point
  • DU distributed unit
  • BBU bandwidth based unit
  • the form and number of the centralized unit and the TRP/DU do not constitute a limitation on the embodiments of the present application.
  • the form of the centralized unit corresponding to each of the network device 1 and the network device 2 shown in FIG. 2 is different, but does not affect the respective functions.
  • the centralized unit 1 and the TRP/DU in the dotted line range are constituent elements of the network device 1
  • the centralized unit 2 and the TRP/DU in the solid line range are constituent elements of the network device 2
  • the network device 1 and Network device 2 is a network device (or referred to as a base station) involved in the NR system.
  • the CU can handle wireless high-level protocol stack functions, such as radio resource control (RRC) layer, packet data convergence protocol (PDCP) layer, etc., and even support partial core network functions to sink and connect.
  • RRC radio resource control
  • PDCP packet data convergence protocol
  • Edge computing network can meet the higher requirements of future communication networks for emerging services such as video, online shopping, virtual/augmented reality for network delay.
  • the DU can mainly handle the physical layer function and the layer 2 function with high real-time requirements. Considering the transmission resources of the radio remote unit (RRU) and the DU, the physical layer function of some DUs can be moved up to the RRU. The miniaturization of RRUs, even more aggressive DUs, can be combined with RRUs.
  • RRU radio remote unit
  • CU can be deployed in a centralized manner, DU deployment depends on the actual network environment, core urban area, high traffic density, small station spacing, limited space in the computer room, such as colleges and universities, large-scale performance venues, etc., DU can also be centralized DUs can be deployed in a distributed manner, such as suburban counties and mountainous areas.
  • the S1-C interface exemplified in FIG. 2 may be a standard interface between the network device and the core network, and the device connected to the specific S1-C is not shown in FIG. 2.
  • FIG. 3 shows a schematic flow chart of a method for transferring from an unlicensed transmission to an authorization based transmission according to an embodiment of the present application.
  • the first device in FIG. 3 may be the network device described above; the second device may be the terminal device described above.
  • the number of the first device and the second device may not be limited to the examples in this embodiment or other embodiments, and details are not described herein again.
  • the method of transitioning from an unauthorized-based transmission to an authorization-based transmission illustrated in FIG. 3 may include step 310, step 320, step 330, and step 340.
  • Step 310 The first device receives a first message sent by the second device, where the first message is used to request that the resource that is occupied by the first message is transferred to the state of the transmission buffer by the unauthorized transmission to the authorization-based transmission. Reporting BSRs consumes less resources.
  • the first device receives the first message sent by the second device, and may obtain a request sent by the second device, which is expected to be converted from an unauthorized transmission to an authorization based transmission.
  • the authorization-based transmission means that when there is uplink data to be transmitted, the second device needs to first send a scheduling request (SR) to the first device to notify the first device that the uplink data is scheduled to be sent, and then receives the BSR ( After the uplink scheduling information of the Buffer Statues Report, the BSR sends the uplink transmission scheduling information to the base station, and finally receives the second uplink scheduling information, so that the uplink data can be transmitted to the first device.
  • SR scheduling request
  • the non-authorized transmission means that when there is uplink data to be transmitted, the first device does not need to be requested, and the second device can use the unlicensed transmission resource that the first device divides in advance, and transmits the uplink to the first device. data.
  • the uplink data may be sent due to the fact that different first devices may select the same or partially the same unlicensed transmission resource to transmit the uplink data, which may cause the uplink data sent by the different first device.
  • the transfer failed.
  • the first device can request a transfer from an unauthorized based transfer to an authorization based transfer.
  • FIG. 4 shows another schematic flowchart of a method for transferring from unauthorized transmission to authorization based transmission according to an embodiment of the present application.
  • step 301, step 302, and step 303 may also be included before step 310.
  • Step 301 The first device may send a second message to the second device, where the second message may be used to configure and/or activate the second device with or without using the first message for granting an unauthorized (grant -free) transfer to a mechanism based on grant-based transport, it should be understood whether activation here includes activation or deactivation, for example, the second message can be used to notify the second device to adopt The first message is converted to an authorization-based transmission by sending the first message to the first device.
  • the first device may send the second message to the second device by semi-static signaling or dynamic signaling, such as by using a master information block (MIB), a system information block (SIB), and the least remaining.
  • MIB master information block
  • SIB system information block
  • RMSI Remaining minimum system information
  • OSI other system information
  • RRC radio resource control
  • MAC CE media access control control element
  • L1signaling physical control information
  • the first device may send the second message immediately after establishing the connection with the second device, or may send the second message at other times. That is, the first device only needs to send the second message before the second device sends the first message.
  • Step 302 The second device may send the first data to the first device.
  • the first data may be sent by using a grant-free resource, that is, the second device may send the first data to the first device based on the unlicensed transmission.
  • Step 303 The first device may send a negative acknowledgement (NACK) of the first data to the second device when the first device fails to receive the first data of the second device based on the unauthorized transmission in step 302.
  • NACK negative acknowledgement
  • the second device when the second device receives the NACK sent by the first device, it indicates that the first data transmission based on the unauthorized transmission in the foregoing step 302 fails, and the second device may send the first message to the first device. Used to convert unlicensed based transfers to authorization based transfers.
  • a timer may also be used to determine whether the first data is sent or not.
  • the second device may determine whether the first data based on the unauthorized transmission in step 302 fails to be sent according to different timers. For example, if the second device does not receive the ACK sent by the first device before the timer expires, it is considered to be a NACK, and the first data transmission fails, the second device may send the first message to the first device; If the NACK sent by the first device after the K times of repeated transmissions is received before the timeout expires, the device considers to be an ACK. The first data is sent successfully, and the second device does not need to send the first message to the first device.
  • the ACK is considered to be ACK.
  • the first data is sent successfully, and the second device does not need to send the first message to the first device.
  • K is a positive integer not greater than the maximum number of repeated transmissions. It should be understood that the above is only an example and should not be construed as limiting the embodiments of the present application.
  • the first message sent by the second device to the first device may be simple signaling, that is, the first message may only carry the request for the transfer from the unauthorized based transmission to the authorization based transmission. (or indicating), the resource used for transmitting the first message is less than the resource occupied by the transmitting BSR, thereby reducing the overhead of the system.
  • the first message may be energy that does not adopt a modulation mode.
  • the first device After receiving the energy, the first device directly converts the current transmission mode to another transmission mode.
  • the second device is currently based on the unlicensed transmission, and may send the energy of the unmodulated mode to the first device, requesting to convert the unlicensed transmission into the authorization-based transmission; the second time sending the untransmitted to the first device
  • the energy of the modulation mode it can be used to request that the authorization-based transmission be converted to an unauthorized transmission.
  • the first message may be sent by using 1 bit of uplink control information (UCI), and the format may be format 1 or format 1a, or may be other UCI formats.
  • UCI uplink control information
  • the first message may be requested by the first device by "0" or "1". For example, when the value of the first message is “1”, it can be used to request the transfer from the unauthorized-based transmission to the authorization-based transmission, but the embodiment of the present application does not limit this.
  • the second device may send the first message to the first device on a resource of a physical uplink control channel (PUCCH).
  • PUCCH physical uplink control channel
  • the second device may send the first message to the first device on a resource of a physical scheduling request channel (PSRCH).
  • PSRCH resource may be a special case of the PUCCH resource, that is, the PSRCH resource may be a part of the PUCCH used to send the SR. That is, the first message can be sent in the SR resource.
  • the SR resource period is a period in which the SR is periodically sent, that is, a specific time interval is required between two SR resource transmissions.
  • the SR resource period can be configured.
  • the SR resource period may be set between several milliseconds (ms) to tens of milliseconds, or may be set within a range of at least one OFDM symbol (ie, the SR resource period may be less than 1 ms) to multiple OFDM symbols, or multiple time slots. .
  • the frame format of the first message sent by the second device may be the same as that of the SR.
  • the first message and the SR may both be sent by using a 1-bit message, such as UCI format 1a, and other formats may also be used. Messages are sent, such as UCI format1 or UCI in other formats.
  • the first device can distinguish the first message from the SR by using different constellation diagrams.
  • the first message may be transmitted using a 1-bit UCI format 1a, and the modulation may be binary phase shift keying (BPSK) and a constellation map using an acknowledgement (ACK).
  • BPSK binary phase shift keying
  • ACK acknowledgement
  • the SR can transmit using the 1-bit UCI format 1a, and the modulation method can be binary phase shift keying (BPSK) and use a NACK constellation map.
  • BPSK binary phase shift keying
  • the first message may correspond to a position of 180° (the constellation of the ACK) in the BPSK
  • the SR may correspond to a position of 0° (the constellation of the NACK) in the BPSK, correspondingly,
  • the first device can distinguish the first message and the SR by different constellation diagrams. It should be understood that the above is only an example and should not be construed as limiting the embodiments of the present application.
  • the modulation method QBPSK can also be used in the PUCCH.
  • quadrature phase shift keying (QBPSK) modulation mode is a newly introduced modulation mode, and QBPSK can indicate the first message to the first device with low complexity without adding extra The bit is used to indicate.
  • the second device may send, in the PUCCH, a first message with a modulation mode of QBPSK to the first device.
  • the first message may be transmitted using a 1-bit UCI format 1a or a UCI in other formats, which may be QBPSK and use a 90° or 270° constellation in QBPSK, and the SR may use 1
  • the UCI format 1a of the bit or the UCI of other formats is transmitted, and the modulation mode may be BPSK.
  • the first device may extract the first message sent by the second device or the in-phase component and/or the quadrature component of the SR by using the same decoding algorithm to determine
  • the modulation mode of the message sent by the second device is BPSK or QBPSK. If the modulation mode is BPSK, the signal may be SR. If the modulation mode is QBPSK, the signal may be the first message.
  • the second device may send the first message by using a UCI piggyback, that is, sending the first message (UCI) together with the uplink data.
  • UCI first message
  • the second device may perform the first message and the uplink data on the physical uplink shared channel in the resource based on the unlicensed transmission in a piggyback manner (physical uplink shared).
  • the channel, PUSCH) resource is sent to the first device.
  • the second device does not receive the NACK or ACK sent by the first device before the timer expires, the first message and the uplink data may be first through the PUSCH resource in the unlicensed transmission resource in a piggyback manner. The device sends.
  • the uplink data transmitted together with the first message may be the new uplink data, that is, different from the first data sent by the second device to the first device in step 302, or may be sent to the first device with the second device in step 302.
  • the first data is the same, and the application does not limit this.
  • the first device may separately allocate a part of resources to at least send the first message, and the resource may be referred to as an unauthorized transfer authorization request (SR-like) resource, and the SR-like resource may also be Used to send messages such as SR.
  • SR-like resource may also be Used to send messages such as SR.
  • the SR-like resource period can be configured.
  • the SR-like resource period may be shorter than the SR resource period, and the use of the SR-like resource to transmit the first message may significantly reduce the transmission delay.
  • the resource period that the second device in the SR resource can use is 20 ms, and the resource period that the second device can use in the SR-like resource is 5 ms or 10 ms.
  • the second device may send the first message by using the SR-like resource to request the first device that it wishes to be transferred from the grant-free transmission to the grant-based transmission.
  • the SR-like resource may be dedicated to each UE or shared by multiple UEs.
  • the first message may be an energy that does not adopt a modulation mode, or only one bit of information, that is, a frame of UCI format 1, UCI format 1a, or other UCI format may be used. structure.
  • the first message may carry the UE ID information (ie, the identifier information of the UE), and is used to indicate the UE that sends the first message.
  • UE ID information ie, the identifier information of the UE
  • a preamble can be used to identify the UE.
  • different UEs can also be identified by resources used by the UE and demodulation reference signal (DMRS) parameters.
  • DMRS demodulation reference signal
  • the second device and the other UEs may use the same time domain frequency domain resource to send the first message, but the DMRS parameters are different, and the first device receives the first message sent by multiple UEs in the same time domain frequency domain resource.
  • the DMRS parameter may be used to identify that the first message is sent by the second device or sent by other UEs.
  • the SR-like resource that sends the first message may use a grant-free resource.
  • the SR-like resource can use all of the grant-free resources, or some of the grant-free resources (such as grant-free resource 1).
  • the SR-like resource may be other time domain frequency domain resources that can be allocated by the first device, which is not limited in this application.
  • the first device may separately allocate resources in the PUCCH, PSRCH, or PUSCH in the foregoing embodiment to the second device, and use the SR-like resource to send the first message.
  • Step 320 The first device determines, according to the first message and the unlicensed transmission of the second device, uplink scheduling information of the second device based on the authorized transmission.
  • the uplink scheduling information may indicate information such as a time domain frequency domain resource and a modulation and coding scheme (MCS) used by the second device to send the uplink data, and the second device receives the uplink scheduling information. After that, the uplink data of the authorized transmission can be sent to the first device.
  • MCS modulation and coding scheme
  • the grant-free resource is bound to some parameters of the uplink scheduling, such as the MCS, the waveform, and the data size. Therefore, the uplink scheduling information of the first device does not need to be received, and the second device can directly Send upstream data.
  • the first device receives the first data sent by the second device, but does not successfully demodulate the first data, and in step 303, sends the first data to the second device.
  • the negative response that is, the first device receives the first data, and cannot successfully demodulate the first data, but can identify that the sender of the first data is the second device, and sends a NACK to the second device.
  • the first device may determine part of the parameter information used by the first data according to the grant-free resource used by the first data.
  • the grant-free resource may be bound to some parameter information such as the MCS, the waveform, and the data size, and the uplink data of the non-authorized transmission sent by the second device in the grant-free resource will use the foregoing binding.
  • Parameter information the first device may determine the parameter information bound to the grant-free resource according to the grant-free resource used by the received uplink data that cannot be demodulated, thereby determining the uplink scheduling information without obtaining the second device to the first device.
  • the BSR sent by a device can directly send uplink scheduling information to the second device.
  • the first device does not successfully receive the first data sent by the second device, and cannot determine that the second device sends the first data, that is, the first device can detect that there is energy in the grant-free resource but cannot be solved. Accordingly, the first device also does not send an ACK or NACK to the second device. At this time, the first device may determine, according to the received first message, that the first data is sent by the second device, that is, the energy in the grant-free resource is sent by the second device. As shown in FIG.
  • the first device may determine, according to the grant-free resource used by the energy, part of the parameter information used by the second device to send the first data, and also It is possible to determine the uplink scheduling information.
  • the first device may obtain the parameter information used when transmitting the first data by using the grant-free resource used when transmitting the first data, when the second device sends the first information to the first device.
  • the first device may determine the uplink scheduling information according to the parameter information obtained from the grant-free resource when the request is changed from the unlicensed transmission to the authorization-based transmission, that is, the first device may directly
  • the second device sends the uplink scheduling information without the second device sending the BSR.
  • Step 330 The first device sends the uplink scheduling information to the second device.
  • Step 340 The second device sends the second data to the first device according to the uplink scheduling information.
  • the second device receives the uplink scheduling information sent by the first device, and may send the second data to the first device in an authorized manner according to the parameter information, such as the MCS, the waveform, and the data size, which are indicated in the uplink scheduling information.
  • the parameter information such as the MCS, the waveform, and the data size, which are indicated in the uplink scheduling information.
  • FIG. 9 is a schematic diagram of a terminal device 10 (also referred to as a user equipment, abbreviated as UE) according to an embodiment of the present application. It should be understood that FIG. 9 is only an example and does not constitute a limitation on the embodiments of the present invention.
  • UE user equipment
  • the UE 10 may correspond to the second device in each method embodiment, and may have any function of the second device in the method.
  • the UE 10 includes a transceiver 101 and a processor 102.
  • the transceiver 101 can include a control circuit and an antenna, wherein the control circuit can be used for converting baseband signals and radio frequency signals and processing the radio frequency signals, and the antenna can be used to transmit and receive radio frequency signals.
  • the transceiver 101 can be used to transmit messages or data to the network device 20 (e.g., perform steps 310 and 340 in Figure 3, or perform steps 302, 310, and 340 in Figure 4), and receive messages sent by the network device 20 (e.g., Step 330 in FIG. 3 is performed, or steps 303 and 330) in FIG. 4 are performed.
  • the network device 20 e.g., perform steps 310 and 340 in Figure 3, or perform steps 302, 310, and 340 in Figure 4
  • receive messages sent by the network device 20 e.g., Step 330 in FIG. 3 is performed, or steps 303 and 330
  • the UE 10 may also include other major components of the second device, such as memory, input and output devices, and the like.
  • the input/output device can be a touch screen, a display screen, a keyboard, etc., and is mainly used for receiving data input by the user and outputting data to the user.
  • the processor 102 can be used to process communication protocols and communication data, and to control the entire UE 10, execute software programs, and process data of the software programs, for example, to support the UE 10 in performing the corresponding operations in the foregoing method embodiments.
  • Memory is primarily used to store software programs and data.
  • the processor 102 can read the software program in the memory, interpret and execute the instructions of the software program, and process the data of the software program.
  • the processor performs baseband processing on the data to be transmitted, and then outputs the baseband signal to the control circuit.
  • the control circuit performs radio frequency processing on the baseband signal, and then transmits the radio frequency signal to the outside through the antenna in the form of electromagnetic waves.
  • the control circuit receives the RF signal through the antenna, converts the RF signal into a baseband signal, and outputs the baseband signal to the processor, which converts the baseband signal into data and processes the data.
  • FIG. 9 shows only one memory and one processor for ease of illustration. In an actual terminal device, there may be multiple processors and memories.
  • the memory may also be referred to as a storage medium or a storage device, and the like.
  • the processor may include a baseband processor and a central processing unit, and the baseband processor is mainly used to process the communication protocol and the communication data, and the central processing unit is mainly used to control and execute the entire terminal device.
  • the processor in FIG. 9 integrates the functions of the baseband processor and the central processing unit.
  • the baseband processor and the central processing unit can also be independent processors and interconnected by technologies such as a bus.
  • the user equipment may include a plurality of baseband processors to accommodate different network formats, and the user equipment may include a plurality of central processors to enhance its processing capabilities, and various components of the user equipment may be connected by various buses.
  • the baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip.
  • the central processing unit can also be expressed as a central processing circuit or a central processing chip.
  • the functions of processing the communication protocol and the communication data may be built in the processor, or may be stored in the storage unit in the form of a software program, and the processor executes the software program to implement the baseband processing function.
  • the antenna and control circuit having the transceiving function can be regarded as the transceiving unit 101 of the UE 10, and the processor having the processing function is regarded as the processing unit 102 of the UE 10.
  • the UE 10 includes a transceiver unit 101 and a processing unit 102.
  • the transceiver unit can also be referred to as a transceiver, a transceiver, a transceiver, and the like.
  • the device for implementing the receiving function in the transceiver unit 101 can be regarded as a receiving unit, and the device for implementing the sending function in the transceiver unit 101 is regarded as a sending unit, that is, the transceiver unit 101 includes a receiving unit and a sending unit.
  • the receiving unit may also be referred to as a receiver, a receiver, a receiving circuit, etc.
  • the transmitting unit may be referred to as a transmitter, a transmitter, or a transmitting circuit or the like.
  • FIG. 10 is a schematic diagram of a network device 20 (eg, a base station) according to an embodiment of the present application.
  • the network device 20 may correspond to the first device in each method embodiment, and may have any function of the first device in the method.
  • the network device 20 includes a transceiver 201 and a processor 2022.
  • the transceiver 201 may be referred to as a remote radio unit (RRU) 201, a transceiver unit, a transceiver, or a transceiver circuit, and the like.
  • the transceiver 201 can include at least one antenna 2011 and a radio frequency unit 2012.
  • the transceiver 201 can be used for transceiving radio frequency signals and converting radio frequency signals with baseband signals.
  • the network device 20 can include a baseband unit (BBU) 202.
  • the BBU 202 can be used for baseband processing such as channel coding, multiplexing, modulation, spread spectrum, etc., as well as controlling network devices.
  • the RRU 201 and the BBU 202 may be physically disposed together or physically separated, such as a distributed base station.
  • the BBU 202 may be composed of one or more single boards (also referred to as a printed circuit board or a printed circuit board), and multiple boards may jointly support a single access system wireless connection. In the network access, it is also possible to separately support wireless access networks of different access systems.
  • the baseband unit can be reconstructed into the aforementioned DU and CU functional entities.
  • the BBU 202 includes a processor 2022.
  • the processor 2022 can be used to control the network device 20 to perform corresponding operations in the foregoing method embodiments.
  • the BBU 202 can also include a memory 2021 for storing the necessary instructions and data.
  • the memory 2021 and the processor 2022 can serve one or more boards. That is, the memory and processor can be individually set on each board. It is also possible that multiple boards share the same memory and processor. In addition, the necessary circuits are also provided on each board.
  • An embodiment of the present invention further provides a processing apparatus, including a processor and an interface;
  • the processor is configured to perform the method in any of the embodiments of the present application described above.
  • the processing device may be a chip, and the processor may be implemented by hardware or by software.
  • the processor When implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like; when implemented by software, the processing may be performed.
  • the device may be a general purpose processor implemented by reading software code stored in a memory, which may be integrated in the processor or may exist independently of the processor.
  • the processing device may be a Field-Programmable Gate Array (FPGA), may be an Application Specific Integrated Circuit (ASIC), or may be a System on Chip (SoC). It can be a Central Processor Unit (CPU), a Network Processor (NP), a Digital Signal Processor (DSP), or a Micro Controller (Micro Controller). Unit, MCU), can also be a Programmable Logic Device (PLD) or other integrated chip.
  • FPGA Field-Programmable Gate Array
  • ASIC Application Specific Integrated Circuit
  • SoC System on Chip
  • CPU Central Processor Unit
  • NP Network Processor
  • DSP Digital Signal Processor
  • MCU Micro Controller
  • MCU Programmable Logic Device
  • PLD Programmable Logic Device
  • the embodiment of the invention further provides a communication device, including a processing unit and a transceiver unit.
  • the processing unit and the transceiver unit may be implemented in software or in hardware.
  • the transceiver unit may be the transceiver 101 in FIG. 9, and the processing unit may be the processor 102 in FIG. 9; or the transceiver unit may be the transceiver 201 in FIG.
  • the unit may be the processor 2022 in FIG.
  • the embodiment of the invention further provides a communication system, which comprises the above network device and terminal device.
  • the above embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a Solid State Disk (SSD)) or the like.
  • a magnetic medium eg, a floppy disk, a hard disk, a magnetic tape
  • an optical medium eg, a DVD
  • a semiconductor medium such as a Solid State Disk (SSD)
  • the term "and/or” is merely an association relationship describing an associated object, indicating that there may be three relationships.
  • a and/or B may indicate that A exists separately, and A and B exist simultaneously, and B cases exist alone.
  • the character "/" in this article generally indicates that the contextual object is an "or" relationship.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium.
  • the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .
  • At least one means one or more, and "a plurality” means two or more.
  • At least one of the following or a similar expression thereof refers to any combination of these items, including any combination of a single item or a plurality of items.
  • at least one of "a, b, or c" may mean: a, b, c, ab ( That is, a and b), ac, bc, or abc, wherein a, b, and c may be single or plural.
  • the device structure diagrams given in the various device embodiments of the present application show only a simplified design of the corresponding device.
  • the device may include any number of transmitters, receivers, processors, memories, etc., to implement the functions or operations performed by the device in the embodiments of the present application, and all devices that can implement the present application All are within the scope of this application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne un procédé de conversion d'une transmission sans licence en une transmission sous licence, un dispositif de réseau et un dispositif terminal. Le procédé comprend les étapes suivantes : un premier dispositif reçoit un premier message qui est envoyé par un second dispositif, le premier message servant à demander de convertir une transmission sans licence en une transmission sous licence et les ressources occupées pour transmettre le premier message étant inférieures aux ressources occupées pour transmettre un rapport d'état de tampon (BSR) ; détermination des informations de planification de liaison montante pour une transmission sous licence par le second dispositif au moins en fonction du premier message et pour une transmission sans licence par le second dispositif ; envoi des informations de planification de liaison montante au second dispositif ; le premier dispositif recevant des secondes données qui sont envoyées par le second dispositif selon les informations de planification de liaison montante. La solution technique peut réduire les retards de transmission et augmenter l'efficacité de communication d'un système.
PCT/CN2018/107788 2017-09-30 2018-09-27 Procédé de conversion d'une transmission sans licence en une transmission sous licence et dispositif WO2019062785A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201710912955 2017-09-30
CN201710912955.8 2017-09-30
CN201810533171.9 2018-05-29
CN201810533171.9A CN109600748B (zh) 2017-09-30 2018-05-29 由基于非授权的传输转为基于授权的传输的方法和设备

Publications (1)

Publication Number Publication Date
WO2019062785A1 true WO2019062785A1 (fr) 2019-04-04

Family

ID=65900805

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/107788 WO2019062785A1 (fr) 2017-09-30 2018-09-27 Procédé de conversion d'une transmission sans licence en une transmission sous licence et dispositif

Country Status (1)

Country Link
WO (1) WO2019062785A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105682243A (zh) * 2016-03-25 2016-06-15 宇龙计算机通信科技(深圳)有限公司 一种调度信令的配置方法、接收方法和相关设备
CN105722225A (zh) * 2016-01-15 2016-06-29 宇龙计算机通信科技(深圳)有限公司 一种非授权频谱上指示上行子帧的方法及装置
WO2016206083A1 (fr) * 2015-06-26 2016-12-29 华为技术有限公司 Procédé et appareil pour la transmission de données en liaison montante
CN106301686A (zh) * 2016-08-16 2017-01-04 宇龙计算机通信科技(深圳)有限公司 基于动态帧结构的上行调度方法及上行调度装置和基站

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016206083A1 (fr) * 2015-06-26 2016-12-29 华为技术有限公司 Procédé et appareil pour la transmission de données en liaison montante
CN105722225A (zh) * 2016-01-15 2016-06-29 宇龙计算机通信科技(深圳)有限公司 一种非授权频谱上指示上行子帧的方法及装置
CN105682243A (zh) * 2016-03-25 2016-06-15 宇龙计算机通信科技(深圳)有限公司 一种调度信令的配置方法、接收方法和相关设备
CN106301686A (zh) * 2016-08-16 2017-01-04 宇龙计算机通信科技(深圳)有限公司 基于动态帧结构的上行调度方法及上行调度装置和基站

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
CATT: "UL grant-free transmission for URLLC", 3GPP TSG RAN WG1 AH_NR MEETING R1- 1700206, 20 January 2017 (2017-01-20), XP051202710 *
HUAWEI ET AL.: "Scheduling for URLLC", 3GPP TSG-RAN WG2 MEETING #96 R2-168459, 18 November 2016 (2016-11-18), XP051178049 *
INTEL CORPORATION: "UL grant-free transmissions: Resource configuration", 3GPP TSG RAN WG1 NR AD-HOC#2 R1-1710568, 30 June 2017 (2017-06-30), XP051299775 *
ZTE: "Discussion on grant-free transmission based on sensing", 3GPP TSG RAN WG1 MEETING #86BIS R1-1609801, 14 October 2016 (2016-10-14), XP051149828 *

Similar Documents

Publication Publication Date Title
WO2019095929A1 (fr) Procédé et dispositif de communication
CN105230077B (zh) 用于pdcp操作的装置、方法以及用户设备
US9572040B2 (en) Unlicensed spectrum sharing method, base station using the same, and user equipment using the same
TWI513349B (zh) 供用於小型資料傳輸的無線電資源控制(rrc)連接建立用之增強節點b及方法
WO2020143692A1 (fr) Procédé et appareil de communication
WO2021023215A1 (fr) Procédé et appareil de communication sans fil
US10313890B2 (en) Method and device for receiving service through different wireless communication systems
CN108347778A (zh) 通信方法及装置
WO2018228511A1 (fr) Procédé de communication, dispositif réseau et terminal
WO2018230191A1 (fr) Dispositif de transmission, dispositif de réception, procédé de transmission, procédé de réception et support d'enregistrement
WO2016004828A1 (fr) Station de base, équipement utilisateur et procédé associé
WO2021036910A1 (fr) Procédé et dispositif de transmission de données
KR20200044959A (ko) 신호 송신 방법, 관련 장치 및 시스템
WO2021166440A1 (fr) Terminal et procédé de communication
WO2018202168A1 (fr) Procédé et appareil de transmission d'informations
WO2019174055A1 (fr) Procédé de communication et dispositif de communication
CA3214889A1 (fr) Procede, appareil et systeme de transmission d'informations
CN115580380A (zh) 无线通信的方法及装置
WO2022036523A1 (fr) Procédé et dispositif de transmission de données
US11108597B2 (en) Data transmission method and apparatus
US20180288791A1 (en) User equipment assisted coordination for scheduled wireless transmissions
WO2019062785A1 (fr) Procédé de conversion d'une transmission sans licence en une transmission sous licence et dispositif
CN109600748B (zh) 由基于非授权的传输转为基于授权的传输的方法和设备
WO2023039811A1 (fr) Procédé de communication et appareil de communication
WO2024032186A1 (fr) Procédé de communication et appareil de communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18860817

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18860817

Country of ref document: EP

Kind code of ref document: A1