WO2023051252A1 - 信息传输方法及装置 - Google Patents

信息传输方法及装置 Download PDF

Info

Publication number
WO2023051252A1
WO2023051252A1 PCT/CN2022/118774 CN2022118774W WO2023051252A1 WO 2023051252 A1 WO2023051252 A1 WO 2023051252A1 CN 2022118774 W CN2022118774 W CN 2022118774W WO 2023051252 A1 WO2023051252 A1 WO 2023051252A1
Authority
WO
WIPO (PCT)
Prior art keywords
monitoring
combination
candidate
behavior
listening
Prior art date
Application number
PCT/CN2022/118774
Other languages
English (en)
French (fr)
Inventor
黄雯雯
铁晓磊
张战战
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP22874639.2A priority Critical patent/EP4401474A1/en
Priority to KR1020247013931A priority patent/KR20240071409A/ko
Publication of WO2023051252A1 publication Critical patent/WO2023051252A1/zh
Priority to US18/621,980 priority patent/US20240244639A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0212Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0001Arrangements for dividing the transmission path
    • H04L5/0003Two-dimensional division
    • H04L5/0005Time-frequency
    • H04L5/0007Time-frequency the frequencies being orthogonal, e.g. OFDM(A), DMT
    • H04L5/001Time-frequency the frequencies being orthogonal, e.g. OFDM(A), DMT the frequencies being arranged in component carriers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0091Signaling for the administration of the divided path
    • H04L5/0094Indication of how sub-channels of the path are allocated
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/10Scheduling measurement reports ; Arrangements for measurement reports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/12Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • H04W52/0235Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal where the received signal is a power saving command
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0457Variable allocation of band or rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • H04W72/232Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal the control data signalling from the physical layer, e.g. DCI signalling
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present disclosure relates to the communication field, and more specifically, to an information transmission method and device.
  • the power consumption of terminal equipment is an important aspect of user experience, and one of the factors that cause serious power consumption of terminal equipment is the downlink control channel (Physical Downlink Control Channel, PDCCH) from network equipment. monitor. Therefore, it is necessary to provide a solution to reduce unnecessary PDCCH monitoring as much as possible.
  • PDCCH Physical Downlink Control Channel
  • Embodiments of the present disclosure provide a monitoring indication solution, which can reduce terminal equipment's monitoring of the PDCCH, thereby reducing power consumption.
  • an information transmission method includes: the terminal device receives first monitoring combination indication information from the network device, the first monitoring combination indication information indicates at least two candidate monitoring behaviors; the terminal device receives downlink control information DCI from the network device, and the DCI indicates the terminal device The monitoring behavior is one of at least two candidate monitoring behaviors; and the terminal device performs the monitoring behavior of the downlink control channel PDCCH based on the first monitoring combination indication information and the DCI.
  • the terminal device can determine the monitoring behavior based on the configured monitoring combination indication and DCI, thereby effectively reducing the power consumption of the terminal device and reducing the implementation complexity of the terminal device.
  • the terminal device receiving the first interception combination indication information from the network device includes: the terminal device receiving the first interception combination indication information from the network device, the first interception combination indication information indicating one of the following: Item: the first listening combination, including the first candidate listening behavior and the second candidate listening behavior, the second listening combination, including the second candidate listening behavior, the third candidate listening behavior, and the fourth candidate listening behavior, and the third listening combination, including The second candidate listening behavior, the third candidate listening behavior, the fourth candidate listening behavior and the fifth candidate listening behavior, the fourth listening combination, including the third candidate listening behavior and the fourth candidate listening behavior, or the fifth listening combination, including the first Three candidate monitoring behaviors, the fourth candidate monitoring behavior and the fifth candidate monitoring behavior, and wherein the first candidate monitoring behavior indicates monitoring the PDCCH according to the configured search space set, and the second candidate monitoring behavior indicates stopping monitoring the PDCCH within a preset time period,
  • the third candidate monitoring behavior means monitoring the PDCCH according to the search space set in the first search space set group, the fourth candidate monitoring behavior means monitoring the PDC
  • each monitoring combination may include at least two candidate monitoring behaviors that are not mutually exclusive, so as to avoid unreasonable arbitrary indications.
  • the first monitoring combination indication information indicates the first monitoring combination, the second monitoring combination or the third monitoring combination, and further includes: the terminal device receives the indication information for a preset time period from the network device .
  • the method further includes: the terminal device determines the interception behavior from at least two candidate interception behaviors based on the DCI.
  • the first intercept combination indication information indicates the intercept combination of the first bandwidth part BWP, and further includes: the terminal device receives the second intercept combination indication information from the network device, and the second intercept combination indication information Indicates the listening combination of the second BWP.
  • monitoring combinations can be configured for different BWPs, thereby realizing flexible configuration for different BWPs.
  • the listening combination of the first BWP is the same as the listening combination of the second BWP.
  • the first intercept combination indication information indicates the intercept combination of the first cell
  • monitoring combinations can be configured for different cells respectively, thereby realizing flexible configuration for different cells.
  • the listening combination of the first cell is the same as the listening combination of the second cell.
  • the method further includes: the terminal device sends supported interception combination information to the network device, where the supported interception combination information indicates the interception combination supported by the terminal device.
  • the terminal device can inform the network device of the supported interception combination, so as to ensure that the interception combination indicated by the first interception combination indication information sent by the network device is supported by the terminal device, and ensure the accuracy of the information.
  • the listening behavior is used for the set of type 3 common search spaces and the set of terminal-device specific search spaces.
  • an information transmission method includes: the network device sends the first interception combination indication information to the terminal equipment, and the first interception combination indication information indicates at least two candidate interception behaviors; and the network equipment sends downlink control information DCI to the terminal equipment for the terminal equipment based on The first monitoring combination indication information and the DCI implement the monitoring behavior of the downlink control channel PDCCH, and the monitoring behavior is one of at least two candidate monitoring behaviors.
  • the network device sending the first interception combination indication information to the terminal device includes: the network device sending the first interception combination indication information to the terminal device, and the first interception combination indication information indicates one of the following:
  • the first listening combination includes the first candidate listening behavior and the second candidate listening behavior
  • the second listening combination includes the second candidate listening behavior, the third candidate listening behavior and the fourth candidate listening behavior
  • the third listening combination includes the second Candidate listening behavior, third candidate listening behavior, fourth candidate listening behavior and fifth candidate listening behavior, fourth listening combination including third candidate listening behavior and fourth candidate listening behavior, or fifth listening combination including third candidate monitoring behavior, the fourth candidate monitoring behavior and the fifth candidate monitoring behavior
  • the first candidate monitoring behavior means monitoring the PDCCH according to the configured search space set
  • the second candidate monitoring behavior means stopping monitoring the PDCCH within a preset time period
  • the third The candidate listening behavior means monitoring the PDCCH according to the search space set in the first search space set group
  • the fourth candidate listening behavior means monitoring the PDCCH according to the search space set in the second search space set group
  • the first interception combination indication information indicates the first interception combination, the second interception combination or the third interception combination, and further includes: the network device sends the indication information for a preset time period to the terminal device.
  • the first intercept combination indication information indicates the intercept combination of the first bandwidth part BWP
  • the listening combination of the first BWP is the same as the listening combination of the second BWP.
  • the first intercept combination indication information indicates the intercept combination of the first cell
  • the listening combination of the first cell is the same as the listening combination of the second cell.
  • the network device receives the supported interception combination information from the terminal device, the supported interception combination information indicates the interception combination supported by the terminal device, and the first interception combination indication information indicates The monitoring combination belongs to the monitoring combination supported by the terminal device.
  • the listening behavior is used for both the set of type 3 common search spaces and the set of end-device specific search spaces.
  • a communication device in a third aspect, includes: a first receiving module, configured to receive first interception combination indication information from a network device, where the first interception combination indication information indicates at least two candidate interception behaviors; a second receiving module, configured to receive information from a network device
  • the downlink control information DCI the DCI indicates the monitoring behavior of the communication device, and the monitoring behavior is one of at least two candidate monitoring behaviors; and the execution module is configured to execute the downlink based on the first monitoring combination indication information and the DCI monitoring behavior of the channel control channel PDCCH.
  • the first receiving module is configured to receive the first interception combination indication information from the network device, and the first interception combination indication information indicates one of the following: the first interception combination, including the first The candidate monitoring behavior and the second candidate monitoring behavior, the second monitoring combination, including the second candidate monitoring behavior, the third candidate monitoring behavior and the fourth candidate monitoring behavior, the third monitoring combination, including the second candidate monitoring behavior, the third candidate monitoring behavior Behavior, the fourth candidate listening behavior and the fifth candidate listening behavior, the fourth listening combination including the third candidate listening behavior and the fourth candidate listening behavior, or the fifth listening combination including the third candidate listening behavior and the fourth candidate listening behavior and the fifth candidate monitoring behavior, and the first candidate monitoring behavior means monitoring the PDCCH according to the configured search space set, the second candidate monitoring behavior means stopping monitoring the PDCCH within a preset time period, and the third candidate monitoring behavior means monitoring the PDCCH according to the first search space set The search space set in the set group monitors the PDCCH, the fourth candidate monitor behavior indicates to monitor the PDCCH according to the search space set in the second search
  • the first monitoring combination indication information indicates the first monitoring combination, the second monitoring combination or the third monitoring combination
  • the communication device further includes a third receiving module configured to: receive Instructions for the preset time period.
  • it further includes a determining module configured to: determine the listening behavior from at least two candidate listening behaviors based on the DCI.
  • the first intercept combination indication information indicates the intercept combination of the first bandwidth part BWP
  • the first receiving module is further configured to: receive the second intercept combination indication information from the network device, the second The monitoring combination indication information indicates the monitoring combination of the second BWP.
  • the listening combination of the first BWP is the same as the listening combination of the second BWP.
  • the first monitoring combination indication information indicates the monitoring combination of the first cell
  • the first receiving module is further configured to: receive the third monitoring combination indication information from the network device, the third monitoring combination The indication information indicates the monitoring combination of the second cell.
  • the listening combination of the first cell is the same as the listening combination of the second cell.
  • it further includes a sending module configured to: send supported intercept combination information to the network device, where the supported intercept combination information indicates the intercept combinations supported by the communication device.
  • the listening behavior is used for the set of type 3 public search spaces and the set of terminal-device-specific search spaces.
  • a communication device in a fourth aspect, includes: a first sending module, configured to send the first monitoring combination indication information to the terminal device, where the first monitoring combination indication information indicates at least two candidate monitoring behaviors; and a second sending module, configured to send the first monitoring combination indication information to the terminal device
  • the downlink control information DCI is used for the terminal device to perform a monitoring behavior of the downlink control channel PDCCH based on the first monitoring combination indication information and the DCI, where the monitoring behavior is one of at least two candidate monitoring behaviors.
  • the first sending module is configured to send the first interception combination indication information to the terminal device, the first interception combination indication information indicating one of the following: the first interception combination, including the first candidate Listening behavior and second candidate listening behavior, the second listening combination, including the second candidate listening behavior, the third candidate listening behavior and the fourth candidate listening behavior, the third listening combination, including the second candidate listening behavior, the third candidate listening behavior , the fourth candidate monitoring behavior and the fifth candidate monitoring behavior, the fourth monitoring combination, including the third candidate monitoring behavior and the fourth candidate monitoring behavior, or the fifth monitoring combination, including the third candidate monitoring behavior, the fourth candidate monitoring behavior and The fifth candidate monitoring behavior, and the first candidate monitoring behavior means monitoring the PDCCH according to the configured search space set, the second candidate monitoring behavior means stopping monitoring the PDCCH within a preset time period, and the third candidate monitoring behavior means monitoring the PDCCH according to the first search space set The search space set in the group monitors the PDCCH, the fourth candidate monitoring behavior indicates monitoring the PDCCH according to the search space set in the second search space
  • the first interception combination indication information indicates the first interception combination, the second interception combination or the third interception combination
  • the communication device further includes a third sending module configured to: send to the terminal device Instructions for preset time periods.
  • the first monitoring combination indication information indicates the monitoring combination of the first bandwidth part BWP
  • the first sending module is further configured to: send the second monitoring combination indication information to the terminal device, and the second monitoring The combination indication information indicates the monitoring combination of the second BWP.
  • the listening combination of the first BWP is the same as the listening combination of the second BWP.
  • the first monitoring combination indication information indicates the monitoring combination of the first cell
  • the first sending module is further configured to: send the third monitoring combination indication information to the terminal device, the third monitoring combination indication The information indicates the listening combination of the second cell.
  • the listening combination of the first cell is the same as the listening combination of the second cell.
  • a receiving module configured to: receive the supported interception combination information from the terminal device, the supported interception combination information indicates the interception combination supported by the terminal device, and the first interception combination indicates The monitoring combination indicated by the information belongs to the monitoring combination supported by the terminal device.
  • the listening behavior is used for both the set of type 3 common search spaces and the set of terminal-device specific search spaces.
  • a terminal device in a fifth aspect, includes a transceiver, a processor, and a memory, and the memory stores instructions executed by the processor, and when the instructions are executed by the processor, the terminal device realizes: receiving the first monitoring combination indication information from the network device via the transceiver , the first monitoring combination indication information indicates at least two candidate monitoring behaviors; the downlink control information DCI from the network device is received via the transceiver, and the DCI indicates the monitoring behavior of the terminal device, and the monitoring behavior is one of at least two candidate monitoring behaviors type; and based on the first monitoring combination indication information and the DCI, perform the monitoring behavior of the downlink control channel PDCCH.
  • the processor executes instructions to enable the terminal device to: receive the first interception combination indication information from the network device via the transceiver, and the first interception combination indication information indicates one of the following: first Listening combination, including the first candidate listening behavior and the second candidate listening behavior, the second listening combination, including the second candidate listening behavior, the third candidate listening behavior, and the fourth candidate listening behavior, the third listening combination, including the second candidate listening behavior Behavior, third candidate listening behavior, fourth candidate listening behavior and fifth candidate listening behavior, fourth listening combination including third candidate listening behavior and fourth candidate listening behavior, or fifth listening combination including third candidate listening behavior , the fourth candidate monitoring behavior and the fifth candidate monitoring behavior, and the first candidate monitoring behavior means monitoring the PDCCH according to the configured search space set, the second candidate monitoring behavior means stopping monitoring the PDCCH within a preset time period, and the third candidate monitoring behavior Indicates that the PDCCH is monitored according to the search space set in the first search space set group, the fourth candidate monitoring behavior indicates that the PDCCH is monitored according to the search space set in the second search
  • the first interception combination indication information indicates the first interception combination, the second interception combination, or the third interception combination
  • the processor executes instructions so that the terminal device realizes: receiving information from the network device via the transceiver Instructions for the preset time period.
  • the processor executes the instruction to enable the terminal device to: determine the interception behavior from at least two candidate interception behaviors based on the DCI.
  • the first intercept combination indication information indicates the intercept combination of the first bandwidth part BWP
  • the processor executes instructions so that the terminal device realizes: receiving the second intercept combination indication from the network device via the transceiver Information, the second monitoring combination indication information indicates the monitoring combination of the second BWP.
  • the listening combination of the first BWP is the same as the listening combination of the second BWP.
  • the first monitoring combination indication information indicates the monitoring combination of the first cell
  • the processor executes instructions to enable the terminal device to: receive the third monitoring combination indication information from the network device via a transceiver, The third monitoring combination indication information indicates the monitoring combination of the second cell.
  • the listening combination of the first cell is the same as the listening combination of the second cell.
  • the processor executes instructions so that the terminal device implements: sending supported interception combination information to the network device, where the supported interception combination information indicates the interception combinations supported by the terminal device.
  • the listening behavior is used for both the set of type 3 common search spaces and the set of terminal-device specific search spaces.
  • a network device in a sixth aspect, includes a transceiver, a processor, and a memory, the memory stores instructions executed by the processor, and when the instructions are executed by the processor, the network device realizes: sending the first monitoring combination indication information to the terminal device via the transceiver, The first monitoring combination indication information indicates at least two candidate monitoring behaviors; and the downlink control information DCI is sent to the terminal device via the transceiver, for the terminal device to perform downlink control channel PDCCH based on the first monitoring combination indication information and DCI Monitoring behavior, where the monitoring behavior is one of at least two candidate monitoring behaviors.
  • the processor executes instructions to enable the network device to: send the first interception combination indication information to the terminal device via the transceiver, and the first interception combination indication information indicates one of the following: the first interception Combination, including a candidate monitoring behavior and a second candidate monitoring behavior, the second monitoring combination, including the second candidate monitoring behavior, the third candidate monitoring behavior, and the fourth candidate monitoring behavior, the third monitoring combination, including the second candidate monitoring behavior, The third candidate monitoring behavior, the fourth candidate monitoring behavior and the fifth candidate monitoring behavior, the fourth monitoring combination, including the third candidate monitoring behavior and the fourth candidate monitoring behavior, or the fifth monitoring combination, including the third candidate monitoring behavior, the fourth candidate monitoring behavior
  • the four candidate monitoring behaviors and the fifth candidate monitoring behavior, and the first candidate monitoring behavior means monitoring the PDCCH according to the configured search space set, the second candidate monitoring behavior means stopping monitoring the PDCCH within a preset time period, and the third candidate monitoring behavior means according to The search space set in the first search space set monitors the PDCCH, the fourth candidate monitor behavior indicates that the PDCCH
  • the first interception combination indication information indicates the first interception combination, the second interception combination or the third interception combination
  • the processor executes instructions so that the network device implements: sending to the terminal device via the transceiver Instructions for preset time periods.
  • the first intercept combination indication information indicates the intercept combination of the first bandwidth part BWP
  • the processor executes instructions so that the network device implements: sending the second intercept combination indication information to the terminal device via the transceiver , the second monitoring combination indication information indicates the monitoring combination of the second BWP.
  • the listening combination of the first BWP is the same as the listening combination of the second BWP.
  • the first interception combination indication information indicates the interception combination of the first cell
  • the processor executes instructions so that the network device implements: sending the third interception combination indication information to the terminal device via a transceiver, the first The three monitoring combination indication information indicates the monitoring combination of the second cell.
  • the listening combination of the first cell is the same as the listening combination of the second cell.
  • the processor executes instructions so that the network device implements: receiving supported interception combination information from the terminal device via the transceiver, the supported interception combination information indicates the interception combination supported by the terminal device, and the second The interception combination indicated by the interception combination indication information belongs to the interception combination supported by the terminal device.
  • the listening behavior is used for both the set of type 3 common search spaces and the set of terminal-device specific search spaces.
  • a computer-readable storage medium stores computer-executable instructions, and when the computer-executable instructions are executed by a processor, the above-mentioned first aspect or any implementation thereof is implemented.
  • a chip or system-on-a-chip includes a processing circuit configured to perform the operations according to the method in the above first aspect or any embodiment thereof, or implement the operations according to the method in the above second aspect or any embodiment thereof.
  • a computer program or computer program product is provided.
  • the computer program or computer program product is tangibly stored on a computer-readable medium and comprises computer-executable instructions which, when executed, implement the operations according to the method in the above-mentioned first aspect or any of its embodiments, Or implement the operations according to the method in the above second aspect or any embodiment thereof.
  • FIG. 1 shows a schematic diagram of monitoring a PDCCH
  • FIG. 2 shows a schematic diagram of skipping PDCCH monitoring
  • Fig. 3 shows a schematic diagram of grouping four search space sets
  • FIG. 4 shows a schematic diagram of a communication system in which embodiments of the present disclosure can be implemented
  • Fig. 5 shows an interactive signaling diagram of a process between a terminal device and a network device according to some embodiments of the present disclosure
  • Fig. 6 shows a schematic block diagram of a communication device for information transmission according to some embodiments of the present disclosure
  • FIG. 7 shows another schematic block diagram of a communication device for information transmission according to some embodiments of the present disclosure.
  • Fig. 8 shows a schematic block diagram of an example device that may be used to implement embodiments of the present disclosure.
  • Embodiments of the present disclosure may be implemented according to any suitable communication protocol, including but not limited to, third generation (3rd Generation, 3G), fourth generation (4G), fifth generation (5G), sixth generation (6G) wireless LAN communication protocols such as Institute of Electrical and Electronics Engineers (Institute of Electrical and Electronics Engineers, IEEE) 802.11, etc., and/or any other protocols currently known or developed in the future.
  • 3G third generation
  • 4G fourth generation
  • 5G fifth generation
  • 6G sixth generation
  • wireless LAN communication protocols such as Institute of Electrical and Electronics Engineers (Institute of Electrical and Electronics Engineers, IEEE) 802.11, etc., and/or any other protocols currently known or developed in the future.
  • the technical solutions of the embodiments of the present disclosure are applied to communication systems that follow any appropriate communication protocols, such as: General Packet Radio Service (General Packet Radio Service, GPRS), Global System for Mobile Communications (Global System for Mobile Communications, GSM), Enhanced Data rate GSM evolution system (Enhanced Data rate for GSM Evolution, EDGE), Universal Mobile Telecommunications System (Universal Mobile Telecommunications Service, UMTS), Long Term Evolution (LTE) system, Wideband Code Division Multiple Access system (Wideband Code Division Multiple Access, WCDMA), code division multiple access 2000 system (Code Division Multiple Access, CDMA2000), time division synchronous code division multiple access system (Time Division-Synchronization Code Division Multiple Access, TD-SCDMA), frequency division duplex (Frequency Division Duplex, FDD) system, Time Division Duplex (Time Division Duplex, TDD), fifth generation (5G) system or new radio (New Radio, NR), sixth generation (6G) system, etc.
  • General Packet Radio Service General Packet Radio Service
  • GSM Global System for Mobile Communications
  • embodiments of the present disclosure are described below in the context of an NR communication system in 3GPP. However, it should be understood that the embodiments of the present disclosure are not limited to this communication system, but can be applied to any communication system with similar problems, such as wireless local area network (WLAN), wired communication system, or other communication systems developed in the future, etc. .
  • WLAN wireless local area network
  • wired communication system or other communication systems developed in the future, etc.
  • terminal device refers to any terminal device capable of wired or wireless communication with network devices or with each other.
  • the terminal equipment may sometimes be called user equipment (User Equipment, UE).
  • a terminal device may be any type of mobile terminal, stationary terminal or portable terminal.
  • terminal equipment may include a mobile handset, station, unit, device, mobile terminal (Mobile Terminal, MT), subscription station, portable subscription station, Internet node, communicator, desktop computer, laptop computer, notebook computer, tablet Computers, personal communication system devices, personal navigation devices, personal digital assistants (Personal Digital Assistant, PDA), positioning devices, radio broadcast receivers, e-book devices, game devices, Internet of Things (IoT) devices, vehicle-mounted devices , aircraft, virtual reality (Virtual Reality, VR) devices, augmented reality (Augmented Reality, AR) devices, wearable devices, terminal devices in 5G networks or evolved Public Land Mobile Networks (Public Land Mobile Network, PLMN) Any terminal device, other device that can be used for communication, or any combination of the above. Embodiments of the present disclosure do not limit this.
  • the term "network device” used in this disclosure is an entity or node that can be used to communicate with a terminal device, such as an access network device.
  • the access network device may be a device deployed in the radio access network to provide a wireless communication function for the mobile terminal, for example, it may be a radio access network (Radio Access Network, RAN) network device.
  • Access network equipment may include various types of base stations. As an example, the access network equipment may include various forms of macro base stations, micro base stations, pico base stations, femto base stations, relay stations, access points, remote radio units (Remote Radio Unit, RRU), radio heads (Radio Head, RH ), Remote Radio Head (RRH) and so on.
  • RRU Remote Radio Unit
  • RH Remote Radio Head
  • the names of access network equipment may be different, for example, in a Long Term Evolution (LTE) network, it is called an evolved NodeB (evolved NodeB, eNB or eNodeB), which is called Node B (NodeB, NB) in 3G network, can be called gNode B (gNB) or NR Node B (NR NB) in 5G network, and so on.
  • the access network device may include a central unit (Central Unit, CU) and/or a distributed unit (Distributed Unit, DU).
  • CU and DU can be placed in different places, for example: DU is remote and placed in a high-traffic area, and CU is placed in the central computer room.
  • the CU and DU can also be placed in the same equipment room.
  • the CU and DU can also be different components under one rack.
  • the above-mentioned apparatus for providing a wireless communication function for a terminal device is collectively referred to as a network device, which is not specifically limited in the embodiments of the present disclosure.
  • the downlink physical channel corresponds to a set of resource elements (Resource Element, RE) that carry information from higher layers.
  • PDCCH is one of downlink physical channels, which carries scheduling information and other control information.
  • the PDCCH can carry scheduling information about uplink data and/or downlink data, and the terminal device can monitor the PDCCH periodically to obtain the scheduling information. If the terminal device monitors the scheduling information, the terminal device can further receive downlink data through the physical downlink shared channel (Physical Downlink Shared Channel, PDSCH) based on the scheduling information, or through the physical uplink shared channel (Physical Uplink Shared Channel, PUSCH) to send uplink data.
  • the PDCCH can also carry information such as an uplink power control command word and a time slot format.
  • the PDCCH carrying different control information may use different Radio Network Temporary Identifier (RNTI) for scrambling.
  • RNTI Radio Network Temporary Identifier
  • the monitoring (monitoring) of the PDCCH by the terminal device may also be referred to as listening (listening), detecting (detecting), etc., and the embodiments of the present disclosure do not limit this term.
  • the PDCCH is transmitted on the aggregation of one or more consecutive Control Channel Elements (CCEs), where one CCE can correspond to 6 Resource Element Groups (Resource Element Groups, REGs).
  • the network device can configure at least one search space set (Search Space Set, SSS) for the terminal device, and one search space set can be used to define a group of candidate PDCCHs.
  • the terminal device can determine the PDCCH monitoring occasion (Monitoring Occasion, MO) according to the configuration information of the search space set, and then can monitor the PDCCH at the determined PDCCH monitoring occasion, as shown in Figure 1, wherein the PDCCH monitoring occasion can also be called PDCCH Candidate position.
  • MO Monitoring Occasion
  • the configuration information of the search space set may include at least one of the following:
  • Identification information of the search space set used to identify the search space set.
  • CORESET represents the time-frequency resource set used to bear PDCCH.
  • a CORESET consists of several consecutive or non-contiguous Resource Blocks (Resource Block, RB) in the frequency domain, and consists of one or more consecutive symbols in the time domain.
  • Resource Block Resource Block
  • PDCCH monitoring period for example, expressed as Ks
  • offset for example, expressed as Os
  • the dimension of Ks and Os can be a slot (slot), or alternatively, the dimension of Os can be a symbol.
  • An intra-slot PDCCH monitoring pattern (pattern), or called an intra-slot PDCCH monitoring symbol, is used to instruct the CORESET associated with the search space set to monitor the start symbol of the PDCCH in the slot.
  • Duration (for example, expressed as Ts), which is used to indicate the number of consecutive time slots in the search space set, where Ts is less than Ks, and the value of Ts can be 1 time slot.
  • Search space set type indication information used to indicate that the search space set is a common search space set (Common Search Space set, CSS set), or a user equipment dedicated search space set (UE-specific Search Space set, USS set) .
  • the common search space set may be called CSS for short
  • the user equipment specific search space set may be called USS for short.
  • the common search space set includes a type-3 common search space set (type-3 CSS), which can be mainly used for listening to bearers scrambled by any of the following radio network temporary identifiers (Radio Network Temporary Identifier, RNTI) PDCCH of DCI: Interrupt-RNTI (Interruption RNTI, INT-RNTI), slot format indication-RNTI (Slot Format Indication-RNTI, SFI-RNTI), transmission power control-physical uplink shared channel-RNTI (Transmit Power Control -Physical Uplink Shared Channel-RNTI, TPC-PUSCH-RNTI), transmission power control-physical uplink control channel-RNTI (Transmit Power Control-Physical Uplink Control Channel-RNTI, TPC-PUCCH-RNTI), transmission power control- Sounding Reference Signal-RNTI (Transmit Power Control-Sounding Reference Symbols-RNTI, TPC-SRS-RNTI), or Cancellation Indication-RNTI (Cancellation Indication-RNTI, CI-RNTI), Cell-
  • the user equipment dedicated search space set can be used to monitor the PDCCH carrying the DCI scrambled by any of the following RNTIs: C-RNTI, MCS-C-RNTI, Semi Persistent-Channel State Indication-RNTI (Semi Persistent- Channel State Indication-RNTI, SP-CSI-RNTI), CS-RNTI, Side Link-RNTI (Side Link-RNTI, SL-RNTI), SL-CS-RNTI, Side Link Semi-Persistent Scheduling Vehicle-RNTI (SL Semi-Persistent Scheduling V-RNTI) etc.
  • RNTIs C-RNTI, MCS-C-RNTI
  • Semi Persistent-Channel State Indication-RNTI Semi Persistent- Channel State Indication-RNTI, SP-CSI-RNTI
  • CS-RNTI Side Link-RNTI (Side Link-RNTI, SL-RNTI), SL-CS-RNTI, Side Link Semi-Persistent Schedu
  • the network device will also configure the downlink control information (Downlink Control Information, DCI) format (format) monitored at the PDCCH candidate position, for example, it can be DCI format 0_0, DCI format 1_0 , DCI format 2_0, DCI format 2_1, DCI format 2_2, DCI format 2_3, DCI format 2_4, DCI format 2_5 or DCI format 2_6, etc.
  • DCI Downlink Control Information
  • the network device will also configure the DCI format monitored at the PDCCH candidate position, for example, DCI format 0_0, DCI format 1_0, DCI format 0_1, DCI format 1_1, DCI format 0_2, DCI format 1_2, DCI format 3_0, or DCI format 3_1, etc.
  • Table 1 is only for illustration, and there may be more or fewer types of DCI formats in actual scenarios. In some scenarios Next, a certain DCI format may have a usage different from that in Table 1.
  • the terminal device can monitor the PDCCH according to the configuration information of the search space set. Specifically, the terminal device may perform PDCCH monitoring on the CORESET associated with the search space set based on the PDCCH monitoring period and offset included in the configuration information of the search space set, the PDCCH monitoring pattern in a time slot, and the like.
  • the terminal device can periodically monitor the PDCCH according to the PDCCH monitoring period.
  • the periodic monitoring of the terminal device will cause waste of power consumption.
  • unnecessary PDCCH monitoring can be reduced as much as possible by skipping the PDCCH monitoring mechanism or the search space group switching mechanism.
  • the network device may use the DCI to instruct the terminal device to skip monitoring the PDCCH for a period of time (or stop monitoring the PDCCH for a period of time, or not monitor the PDCCH for a period of time).
  • FIG. 2 shows a schematic diagram of skipping PDCCH monitoring 200 .
  • the terminal device obtains DCI from the network device by monitoring the PDCCH, and the DCI instructs the terminal device to skip monitoring of the PDCCH in the next period of time (denoted as Tskip). Then the terminal device does not monitor the PDCCH at 220-250 within Tskip, but continues to monitor the PDCCH at the PDCCH monitoring opportunity 260 after Tskip has passed.
  • 220-250 in FIG. 2 are PDCCH monitoring opportunities that are skipped and determined according to the configuration information of the search space set.
  • the skipped time period (skipped duration) Tskip may be indicated by DCI, and/or configured by radio resource control (Radio Resource Control, RRC) signaling or predefined by a protocol.
  • RRC Radio Resource Control
  • the RRC signaling may configure values of multiple skipped time periods, and indicate one of the multiple values through DCI as the current skipped time period.
  • skipping PDCCH monitoring includes skipping PDCCH monitoring on the type 3 common search space set and PDCCH monitoring on the user equipment specific search space set.
  • the terminal device can skip or not skip C-RNTI, MCS-C-RNTI or CS-RNTI plus The embodiment of the present disclosure does not limit the PDCCH monitoring of the interfered DCI.
  • type 0, type 0A, type 1, and type 2 public search space sets whether the terminal device listens to the PDCCH of DCI scrambled by SI-RNTI, RA-RNTI, TC-RNTI or P-RNTI is not limited by the embodiments of the present disclosure .
  • Type 0 and type 0A common search space sets can be used to monitor the PDCCH of DCI scrambled by system information-RNTI (System Information RNTI, SI-RNTI); type 1 common search space sets can be used to monitor random access-RNTI (Random Access-RNTI, RA-RNTI), message B-RNTI (MessageB-RNTI, MsgB-RNTI), or temporary cell-RNTI (Temporary Cell-RNTI, TC-RNTI) scrambled DCI PDCCH; type 2 common search space The set can be used to monitor the PDCCH of the DCI scrambled by the paging-RNTI (Paging-RNTI, P-RNTI).
  • system Information RNTI System Information RNTI
  • SI-RNTI System Information RNTI
  • type 1 common search space sets can be used to monitor random access-RNTI (Random Access-RNTI, RA-RNTI), message B-RNTI (MessageB-RNTI, MsgB-RNTI), or temporary cell-RNTI
  • type 0A, type 1, and type 2 public search space sets, on the time slot where the terminal device monitors the PDCCH of DCI scrambled by SI-RNTI, RA-RNTI, MsgB-RNTI, or P-RNTI, the terminal device
  • the PDCCH of DCI (DCI format 0_0 and DCI format 1_0) scrambled by C-RNTI, MCS-C-RNTI or CS-RNTI can be monitored.
  • the terminal device can enter a sleep state by skipping PDCCH monitoring within the time period Tskip, thereby achieving the purpose of saving power consumption.
  • skipping PDCCH monitoring by the terminal device may also be referred to as stopping (stop) PDCCH monitoring, not monitoring PDCCH, etc., and the embodiments of the present disclosure do not limit this term.
  • the network device can configure multiple search space sets (SS sets) for the terminal device. Further, multiple sets of search spaces may be grouped, for example, divided into 2 groups or 3 or more groups.
  • the configuration information of the search space set may also include indication information of which SSSG the search space set belongs to.
  • the search space set on a downlink BWP is divided into two groups, denoted as SSSG0 and SSSG1. It can then be indicated whether the set of search spaces belongs to the first group (SSSG0) or the second group (SSSG1).
  • SSSG0 first group
  • SSSG1 second group
  • SSSG2 third group
  • the terminal device only needs to monitor the PDCCH according to the indicated search space set in the SSSG, which can reduce the number of times of monitoring the PDCCH, thereby reducing power consumption.
  • a search space set may belong to two or three different SSSGs at the same time.
  • the terminal device still monitors the PDCCH according to the configuration information of the SS set, which is not limited by the embodiments of the present disclosure.
  • FIG. 3 shows a schematic diagram of grouping 300 sets of 4 search spaces in a downlink BWP.
  • the four search space sets can be divided into two groups: SSSG0 and SSSG1, where SSSG0 includes search space set 3 and search space set 4, and SSSG1 includes search space set 1 and search space Episode 2.
  • the terminal device can monitor the PDCCH according to the search space set 1 and the search space set 2 belonging to SSSG1, instead of according to the search space set 3 and the search space set 4 to monitor the PDCCH. Since the PDCCH monitoring period belonging to the search space set of SSSG1 is sparser, the number of times of monitoring can be reduced and power consumption can be reduced.
  • the network device may also instruct the terminal device to switch the set of search spaces.
  • the network device may explicitly indicate through a bit field in the DCI or implicitly indicate the SSSG switching through the DCI.
  • the set of search spaces is divided into 2 groups, SSSG0 and SSSG1.
  • the way of explicit indication can be: the specific bit field in the DCI is "0", indicating that the terminal device monitors the PDCCH according to the search space set belonging to SSSG0; the specific bit field in the DCI is "1", indicating that the terminal device monitors the PDCCH according to the search space set belonging to SSSG1 set of search spaces to monitor the PDCCH.
  • the way of explicit indication may also be: the specific bit field in the DCI is "0", indicating that the terminal device monitors the PDCCH according to the search space set belonging to the current SSSG, that is, does not switch the SSSG; the specific bit field in the DCI is "1 ", instruct the terminal device to perform SSSG switching (if it is currently SSSG0, then switch to SSSG1. Or if it is currently SSSG1, then switch to SSSG0), and monitor the PDCCH according to the search space set belonging to the switched SSSG.
  • the implicit indication method can be: the SSSG currently monitoring the PDCCH is SSSG0, and the terminal device detects a specific DCI or any DCI, then switches to SSSG1; or, the SSSG currently monitoring the PDCCH is SSSG1, and the terminal device monitors a specific DCI or DCI. Any DCI, switch to SSSG0.
  • the specific bit field in the DCI is "00", indicating that the terminal device monitors the PDCCH according to the search space set belonging to SSSG0; the specific bit field in the DCI is "01”, indicating that the terminal device monitors the PDCCH according to the search space set belonging to SSSG1; the specific bit field in the DCI is "10”, indicating that the terminal device monitors the PDCCH according to the search space set belonging to SSSG2: the specific bit field "11" in the DCI can be reserved.
  • the way of explicit indication may also be: the specific bit field in the DCI is "0", indicating that the terminal device monitors the PDCCH according to the search space set belonging to the current SSSG, that is, does not switch the SSSG; the specific bit field in the DCI is "1 ", instruct the terminal device to perform SSSG switching, and monitor the PDCCH according to the search space set belonging to the switched SSSG, where the SSSG switching can be: if it is currently SSSG0, then switch to SSSG1; if it is currently SSSG1, then switch to SSSG2; if If it is currently SSSG2, switch to SSSG0.
  • the implicit indication method can be: the SSSG currently monitoring the PDCCH is SSSGx, and the terminal device switches to SSSGy when it detects a specific DCI or any DCI.
  • the protocol can predefine SSSGx and SSSGy, for example, SSSGx is SSSG0, and SSSGy is SSSG1.
  • the terminal device may also switch the SSSG based on a timer.
  • the set of search spaces is divided into 2 groups, SSSG0 and SSSG1.
  • the terminal device monitors the PDCCH according to the search space set belonging to the current SSSG (taking SSSG1 as an example), and starts a timer. After the timer expires, switch to SSSG0, and the terminal device monitors the PDCCH according to the search space set belonging to SSSG0.
  • the search space set is divided into 3 groups, SSSG0, SSSG1 and SSSG2.
  • the terminal device monitors the PDCCH according to the search space set belonging to the current SSSG (taking SSSG1 as an example), and starts a timer. After the timer expires, switch to SSSG2, and the terminal device monitors the PDCCH according to the search space set belonging to SSSG2, and resets the timer. After the timer expires, switch to SSSG0, and the terminal device monitors the PDCCH according to the search space set belonging to SSSG0. For another example, when the terminal device monitors the PDCCH according to the search space set belonging to SSSG1, and starts a timer.
  • switch to SSSG0 and the terminal device monitors the PDCCH according to the search space set belonging to SSSG0.
  • the terminal device monitors the PDCCH according to the search space set belonging to SSSG2, and starts a timer.
  • switch to SSSG0 and the terminal device monitors the PDCCH according to the search space set belonging to SSSG0. That is, no matter the terminal device is currently monitoring the PDCCH according to the search space set of SSSG1 or the search space set of SSSG2, it will switch to SSSG0 after the timer expires.
  • monitoring the PDCCH according to the search space set belonging to a certain SSSG refers to monitoring the PDCCH according to the type 3 common search space set and the user equipment specific search space set belonging to a certain SSSG.
  • grouping multiple search space sets refers to grouping a type 3 public search space set and a user equipment specific search space set.
  • the terminal device can only perform PDCCH monitoring according to a part of the search space set in the activated downlink BWP, thereby achieving the purpose of saving power consumption.
  • multiple different monitoring behaviors for the terminal device to monitor the PDCCH can be defined, for example, the first candidate monitoring behavior to the fifth candidate monitoring behavior described below.
  • the first candidate monitoring behavior monitor the PDCCH according to the configured search space set.
  • the PDCCH may be monitored according to the configuration information of the search space set, where the configuration information of the search space set includes a PDCCH monitoring period. It can be understood that the skipping PDCCH monitoring mechanism is not activated or not applied. If the terminal device is not configured with a search space set on the activated downlink BWP, the terminal device can monitor the PDCCH according to the search space set configured on the activated downlink BWP. If the terminal device is configured with a search space set on the activated downlink BWP, the terminal device can monitor the PDCCH according to the search space set belonging to the current SSSG.
  • the second candidate monitoring behavior skip (or stop) monitoring the PDCCH within the skipped duration. That is, the PDCCH monitoring mechanism is skipped.
  • the third candidate monitoring behavior monitor the PDCCH according to the search space set belonging to SSSG0. Specifically, stop monitoring the PDCCH according to the search space set of SSSG1 and SSSG2 (if there is SSSG2).
  • the fourth candidate monitoring behavior monitor the PDCCH according to the search space set belonging to SSSG1. Specifically, stop monitoring the PDCCH according to the set of search spaces of SSSG0 and SSSG2 (if there is SSSG2).
  • the fifth candidate monitoring behavior monitor the PDCCH according to the search space set belonging to SSSG2. Specifically, stop monitoring the PDCCH according to the search space sets of SSSG0 and SSSG1.
  • the first candidate listening behavior may be represented as Behavior 1
  • the second candidate listening behavior may be represented as Behavior 1A
  • the third candidate listening behavior may be represented as Behavior 2
  • the fourth candidate listening behavior may be represented as Behavior 2A
  • the terminal device can monitor the PDCCH according to one of the first candidate monitoring behavior to the fifth candidate monitoring behavior, but currently there is no effective solution to instruct the terminal device how to determine a specific monitoring behavior. If the five candidate listening behaviors can be indicated arbitrarily, it increases the implementation complexity of the terminal device, but brings no additional benefits.
  • the embodiments of the present disclosure provide a solution in which a network device configures a monitoring combination for a terminal device, and the terminal device can determine the monitoring behavior based on the configured monitoring combination indication, thereby effectively reducing the power consumption of the terminal device and reducing the Implementation complexity of terminal equipment.
  • FIG. 4 shows a schematic diagram of a communication system 400 in which embodiments of the present disclosure may be implemented.
  • the system 400 shown in FIG. 4 includes a terminal device 410 and a network device 420 , and the terminal device 410 can communicate with the network device 420 .
  • FIG. 4 is only a schematic diagram, and the embodiment of the present disclosure does not limit the type of the terminal device 410, the type of the network device 420, the communication protocol used by the communication system 400, and the like. Some embodiments of the present disclosure will be described below in conjunction with the communication system 400 shown in FIG. 4 .
  • Fig. 5 shows an interactive signaling diagram of a process 500 between a terminal device 410 and a network device 420 according to some embodiments of the present disclosure.
  • the network device 420 sends 510 first interception combination indication information to the terminal device 410, where the first interception combination indication information indicates at least two candidate interception behaviors.
  • the candidate listening behaviors involved in the embodiments of the present disclosure include a first candidate listening behavior, a second candidate listening behavior, a third candidate listening behavior, a fourth candidate listening behavior, and a fifth candidate listening behavior.
  • the first candidate monitoring behavior means to monitor PDCCH according to the configured search space set
  • the second candidate monitoring behavior means to stop monitoring PDCCH within a preset time period
  • the third candidate monitoring behavior means to monitor according to the search space set in the first search space set group
  • the fourth candidate monitoring behavior means monitoring the PDCCH according to the search space set in the second search space set group
  • the fifth candidate monitoring behavior means monitoring the PDCCH according to the search space set in the third search space set group.
  • the monitoring combination indicated by the first monitoring combination indication information may be one of the following: the first monitoring combination, the second monitoring combination, the third monitoring combination, the fourth monitoring combination or the fifth monitoring combination.
  • the monitoring combination indicated by the first monitoring combination indication information may be one of the following: the first monitoring combination, the second monitoring combination, the fourth monitoring combination or the fifth monitoring combination.
  • the first listening combination includes a first candidate listening behavior and a second candidate listening behavior.
  • the second listening combination includes a second candidate listening behavior, a third candidate listening behavior, and a fourth candidate listening behavior.
  • the third listening combination includes a second candidate listening behavior, a third candidate listening behavior, a fourth candidate listening behavior, and a fifth candidate listening behavior.
  • the fourth listening combination includes a third candidate listening behavior and a fourth candidate listening behavior.
  • the fifth interception combination includes a third candidate interception behavior, a fourth candidate interception behavior and a fifth candidate interception behavior.
  • the network device 420 may explicitly or implicitly indicate to the terminal device 410 the first interception combination, the second interception combination, the third interception combination, the fourth interception combination or the fifth interception combination through RRC signaling. Monitor combination.
  • the network device 420 may configure the first monitoring combination indication information based on skipping the PDCCH monitoring mechanism and the switching mechanism of the search space set. For example, if the terminal device 410 is not configured with a search space group on the activated downlink BWP, the at least two candidate interception behaviors indicated by the first interception combination indication information do not include the third candidate interception behavior, the fourth candidate interception behavior and a fifth candidate listening behavior. If the search space set is divided into two groups on the activated downlink BWP, the at least two candidate interception behaviors indicated by the first interception combination indication information do not include the fifth candidate interception behavior.
  • specific parameters in the RRC signaling can be used as the first monitoring combination indication information to indicate the first monitoring combination, the second monitoring combination, the third monitoring combination, the fourth monitoring combination or the fifth monitoring combination. Any combination of monitors.
  • the specific parameter may be a PDCCH monitoring adaptation (PdcchMonitorAdaptation) parameter, and then the network device 420 may indicate a monitoring combination through the PdcchMonitorAdaptation.
  • PdcchMonitorAdaptation PDCCH monitoring adaptation
  • Beh 1and1A indicates a first listening combination including a first candidate listening behavior and a second candidate listening behavior.
  • Beh 1Aand2and2A indicates a second listening combination including a second candidate listening behavior, a third candidate listening behavior, and a fourth candidate listening behavior.
  • Beh 1Aand2and2Aand2B indicates a third listening combination including a second candidate listening behavior, a third candidate listening behavior, a fourth candidate listening behavior, and a fifth candidate listening behavior.
  • Beh 2and2A indicates a fourth listening combination including a third candidate listening behavior and a fourth candidate listening behavior.
  • Beh 2and2Aand2B indicates a fifth listening combination including a third candidate listening behavior, a fourth candidate listening behavior, and a fifth candidate listening behavior.
  • the specific parameter may be included in a certain information element (Information Element, IE) of RRC, such as included in the PDCCH configuration (PDCCH-Config), or may be included in the BWP downlink dedicated (BWP -DownlinkDedicated), or may be included in the serving cell configuration (ServingCellConfig).
  • Information Element, IE Information Element
  • BWP -DownlinkDedicated BWP downlink dedicated
  • ServingCellConfig serving cell configuration
  • the network device 420 may further configure a skipped time period (skipped duration). For example, the network device 420 may send indication information for a preset time period to the terminal device 410, so that the terminal device 410 stops monitoring the PDCCH within the preset time period. It can be understood that the indication information of the preset time period may be included in the PDCCH configuration, or may be independent of the PDCCH configuration, which is not limited in the present disclosure.
  • the time unit of the preset time period may be seconds, milliseconds, frames, subframes, time slots, the number of PDCCH monitoring opportunities, or a time slot set composed of several consecutive time slots, which is not limited in the present disclosure.
  • the RRC signaling can directly configure at least two candidate monitoring behaviors in the form of enumeration, for example, it can be configured in the form of ⁇ parameter 1, parameter 2, ..., parameter N ⁇ , each parameter corresponds to a Candidate monitoring behavior.
  • ⁇ Beh 1, Beh 1A ⁇ may represent the first listening combination including the first candidate listening behavior and the second candidate listening behavior.
  • the second listening combination comprising the second candidate listening behavior, the third candidate listening behavior and the fourth candidate listening behavior is represented by ⁇ Beh 1A, Beh 2, Beh 2A ⁇ .
  • ⁇ Beh 1A, Beh 2, Beh 2A, Beh 2B ⁇ a third listening combination including the second candidate listening behavior, the third candidate listening behavior, the fourth candidate listening behavior and the fifth candidate listening behavior is represented.
  • a fourth listening combination comprising the third candidate listening behavior and the fourth candidate listening behavior is represented by ⁇ Beh 2, Beh 2A ⁇ .
  • Beh 2A, Beh 2B ⁇ denote the fifth listening combination comprising the third candidate listening behavior, the fourth candidate listening behavior and the fifth candidate listening behavior.
  • the network device 420 may use a combination of the first specific parameter and the second specific parameter in the RRC signaling to indicate the first listening combination, the second listening combination, the third listening combination, the fourth listening combination, or the Any of the five monitor combinations.
  • the first specific parameter may be PDCCH monitoring adaptation (PdcchMonitorAdaptation)
  • the second specific parameter may be the number of search space set groups (nrofSearchSpaceSetGroup).
  • the PdcchMonitorAdaptation indication "PdcchSkipping" indicates the first monitoring combination including the first candidate monitoring behavior and the second candidate monitoring behavior.
  • PdcchMonitorAdaptation indicates "PdcchSkippingAndSearchSpaceSetGroupSwitching" and nrofSearchSpaceSetGroup indicates "2" indicating a second monitoring combination including the second candidate monitoring behavior, the third candidate monitoring behavior, and the fourth candidate monitoring behavior.
  • the PdcchMonitorAdaptation indication "PdcchSkippingAndSearchSpaceSetGroupSwitching" indicates the second monitoring combination including the second candidate monitoring behavior, the third candidate monitoring behavior and the fourth candidate monitoring behavior.
  • PdcchMonitorAdaptation indicates "PdcchSkippingAndSearchSpaceSetGroupSwitching" and nrofSearchSpaceSetGroup indicates "3" indicating a third monitoring combination including the second candidate monitoring behavior, the third candidate monitoring behavior, the fourth candidate monitoring behavior, and the fifth candidate monitoring behavior.
  • PdcchMonitorAdaptation indicates "SearchSpaceSetGroupSwitching" and nrofSearchSpaceSetGroup indicates "2" indicating the fourth monitoring combination including the third candidate monitoring behavior and the fourth candidate monitoring behavior.
  • PdcchMonitorAdaptation indicates "SearchSpaceSetGroupSwitching" and nrofSearchSpaceSetGroup indicates "3" indicating a fifth monitoring combination including a third candidate monitoring behavior, a fourth candidate monitoring behavior, and a fifth candidate monitoring behavior.
  • the network device 420 may further configure a skipped time period (skipped duration). For example, the network device 420 may send indication information for a preset time period to the terminal device 410, so that the terminal device 410 stops monitoring the PDCCH within the preset time period. It can be understood that the indication information of the preset time period may be included in the PDCCH configuration, or may be independent of the PDCCH configuration (for example, sent through another configuration information), which is not limited in the present disclosure.
  • the time unit of the preset time period may be seconds, milliseconds, frames, subframes, time slots, the number of PDCCH monitoring opportunities, or a time slot set composed of several consecutive time slots, which is not limited in the present disclosure.
  • the network device 420 may indicate the first interception combination, the second interception combination, the third interception combination, the fourth interception combination or the fourth interception combination through a combination of the third specific parameter and the fourth specific parameter in RRC signaling. Any of the five monitor combinations.
  • the third specific parameter may indicate a skipped duration for stopping PDCCH monitoring.
  • the third specific parameter may be included in the PDCCH configuration, or may be independent of the PDCCH configuration, which is not limited in the present disclosure.
  • the fourth specific parameter may indicate the index of the SSSG to which the search space set belongs, where the index may be at least one of 0, 1, and 2.
  • the fourth specific parameter may be included in configuration information of the search space set. Taking the search space set SS set 1 as an example, the configuration information of the search space set may include a fourth specific parameter, which indicates the index of the SSSG to which the search space set belongs.
  • the network device 420 is configured with the third specific parameter and not configured with the fourth specific parameter, indicating the first interception combination including the first candidate interception behavior and the second candidate interception behavior.
  • the network device 420 is configured with a third specific parameter and a fourth specific parameter.
  • the fourth specific parameter has two types of 0 and 1, indicating that the second candidate interception behavior, the third candidate interception behavior, and the fourth candidate interception behavior Monitor combination.
  • the network device 420 is configured with a third specific parameter and a fourth specific parameter.
  • the fourth specific parameter has three types: 0, 1, and 2, indicating that it includes the second candidate interception behavior, the third candidate interception behavior, the fourth candidate interception behavior, and A third listening combination of the fifth candidate listening behavior.
  • the network device 420 is configured with a fourth specific parameter and not configured with a third specific parameter.
  • the fourth specific parameter has two types, 0 and 1, indicating a fourth interception combination including the third candidate interception behavior and the fourth candidate interception behavior.
  • the network device 420 is configured with the fourth specific parameter and does not configure the third specific parameter.
  • the fourth specific parameter has three types: 0, 1, and 2, indicating that it includes the third candidate interception behavior, the fourth candidate interception behavior, and the fifth candidate interception behavior. The fifth listening combination.
  • the network device 420 may also send configuration information of the search space set to the terminal device 410, and the configuration information of the search space set may include at least one of the following: identification information of the search space set, and search space
  • identification information of the search space set may include at least one of the following: identification information of the search space set, and search space
  • the first intercept combination indication information may indicate the intercept combination of the first BWP.
  • the network device 420 may also send second interception combination indication information to the terminal device 410, where the second interception combination indication information indicates the interception combination of the second BWP.
  • the indication information of the first monitoring combination may be one of the following: the first monitoring combination, the second monitoring combination, the third monitoring combination, the fourth monitoring combination or the fifth monitoring combination.
  • the indication information of the second monitoring combination may be one of the following: the first monitoring combination, the second monitoring combination, the third monitoring combination, the fourth monitoring combination or the fifth monitoring combination.
  • each BWP may indicate the monitoring combination of its respective BWP.
  • the first candidate monitoring behavior means monitoring the PDCCH on the activated downlink BWP according to the configured search space set
  • the second candidate monitoring behavior means stopping monitoring the PDCCH within the preset time period on the activated downlink BWP
  • the third candidate monitoring The behavior indicates monitoring the PDCCH on the activated downlink BWP according to the search space set in the first search space set group
  • the fourth candidate monitoring behavior indicates monitoring the PDCCH on the activated downlink BWP according to the search space set in the second search space set group
  • the fifth candidate monitoring behavior indicates monitoring the PDCCH on the activated downlink BWP according to the search space set in the third search space set group.
  • monitoring combinations may be configured for different BWPs, and it is understood that the monitoring combinations configured for different BWPs may be the same or different.
  • the network device 420 may configure the same monitoring combination for multiple BWPs belonging to the same cell.
  • the first monitoring combination indication information may indicate the monitoring combination of the first cell.
  • the network device 420 may also send third monitoring combination indication information to the terminal device 410, where the third monitoring combination indication information indicates the monitoring combination of the second cell.
  • the terminal device 410 is configured with multiple cells
  • monitoring combinations may be configured for different cells, and it can be understood that the monitoring combinations configured for different cells may be the same or different.
  • the network device 420 may configure the same monitoring combination for multiple cells belonging to the same cell group.
  • the first monitoring combination indication information may indicate the monitoring combination of the first cell group.
  • the network device 420 may also send fourth monitoring combination indication information to the terminal device 410, where the fourth monitoring combination indication information indicates the monitoring combination of the second cell group.
  • monitoring combinations may be configured for different cell groups, and it can be understood that the monitoring combinations configured for different cell groups may be the same or different.
  • the terminal device 410 may send 502 supported listening combination information to the network device 420 .
  • the supported listening combination information may indicate the listening combination supported by the terminal device 410, where the listening combination supported by the terminal device 410 may include a first listening combination, a second listening combination, a third listening combination, and a fourth listening combination and at least one monitoring combination in the fifth monitoring combination.
  • the candidate interception behaviors in the interception combinations indicated by the first interception combination indication information sent by the network device 420 are a subset or all of the candidate interception behaviors in the interception combinations supported by the terminal device 410 .
  • the supported listening combination information may be included in UE capability information or included in UE assistance information.
  • the listening combinations supported by the terminal device 410 may include at least one listening combination of a first listening combination, a second listening combination, a fourth listening combination, and a fifth listening combination.
  • the monitoring combination supported by the terminal device 410 may be indicated through the first parameter in the UE capability information or the UE assistance information.
  • the first parameter may be supported PDCCH monitoring adaptation (supportedPdcchMonitoringAdaptation), for example,
  • Beh 1and1A indicates a first listening combination including a first candidate listening behavior and a second candidate listening behavior.
  • Beh 1Aand2and2A indicates a second listening combination including a second candidate listening behavior, a third candidate listening behavior, and a fourth candidate listening behavior.
  • Beh 1Aand2and2Aand2B indicates a third listening combination including a second candidate listening behavior, a third candidate listening behavior, a fourth candidate listening behavior, and a fifth candidate listening behavior.
  • Beh 2and2A indicates a fourth listening combination including a third candidate listening behavior and a fourth candidate listening behavior.
  • Beh 2and2Aand2B indicates a fifth listening combination including a third candidate listening behavior, a fourth candidate listening behavior, and a fifth candidate listening behavior.
  • the UE capability information or UE assistance information may directly indicate the monitoring combination supported by the terminal device 410 in the form of enumeration, for example, it may be configured in the form of ⁇ parameter 1, parameter 2, ..., parameter N ⁇ , Each parameter corresponds to a candidate monitoring behavior.
  • ⁇ Beh 1, Beh 1A ⁇ may represent the first listening combination including the first candidate listening behavior and the second candidate listening behavior.
  • Beh 1A, Beh 2, Beh 2A ⁇ denote the second listening combination comprising the second candidate listening behavior, the third candidate listening behavior and the fourth candidate listening behavior.
  • Beh 1A, Beh 2, Beh 2A, Beh 2B ⁇ a third listening combination including the second candidate listening behavior, the third candidate listening behavior, the fourth candidate listening behavior and the fifth candidate listening behavior is represented.
  • a fourth listening combination comprising the third candidate listening behavior and the fourth candidate listening behavior is represented by ⁇ Beh 2, Beh 2A ⁇ .
  • Beh 2A, Beh 2B ⁇ represent the fifth listening combination comprising the third candidate listening behavior, the fourth candidate listening behavior and the fifth candidate listening behavior.
  • the monitoring combinations supported by the terminal device 410 may be indicated by a combination of the second parameter and the third parameter in the UE capability information or UE assistance information.
  • the second parameter may be supported PDCCH monitoring adaptation (supportedPdcchMonitoringAdaptation)
  • the third parameter may be the number of supported search space set groups (supportedNrofSearchSpaceSetGroup).
  • the supportedPdcchMonitoringAdaptation indication "PdcchSkipping" indicates the first monitoring combination including the first candidate monitoring behavior and the second candidate monitoring behavior.
  • supportedPdcchMonitoringAdaptation indicates “PdcchSkippingAndSearchSpaceSetGroupSwitching” and supportedNrofSearchSpaceSetGroup indicates “2” indicating the second monitoring combination including the second candidate monitoring behavior, the third candidate monitoring behavior, and the fourth candidate monitoring behavior.
  • the supportedPdcchMonitoringAdaptation indication "PdcchSkippingAndSearchSpaceSetGroupSwitching" indicates the second monitoring combination including the second candidate monitoring behavior, the third candidate monitoring behavior and the fourth candidate monitoring behavior.
  • supportedPdcchMonitoringAdaptation indicates “PdcchSkippingAndSearchSpaceSetGroupSwitching” and supportedNrofSearchSpaceSetGroup indicates “3” indicating a third monitoring combination including the second candidate monitoring behavior, the third candidate monitoring behavior, the fourth candidate monitoring behavior, and the fifth candidate monitoring behavior.
  • supportedPdcchMonitoringAdaptation indicates “SearchSpaceSetGroupSwitching” and supportedNrofSearchSpaceSetGroup indicates “2” indicating the fourth monitoring combination including the third candidate monitoring behavior and the fourth candidate monitoring behavior.
  • supportedPdcchMonitoringAdaptation indicates “SearchSpaceSetGroupSwitching” and supportedNrofSearchSpaceSetGroup indicates “3” indicating a fifth monitoring combination including a third candidate monitoring behavior, a fourth candidate monitoring behavior, and a fifth candidate monitoring behavior.
  • the network device 420 may determine the first intercept combination indication information based on the supported intercept combination information from the terminal device 410 . And subsequently, the network device 420 may send the first monitoring combination indication information to the terminal device 410 through RRC signaling. For example, one of the listening combinations may be selected from the listening combinations indicated by the supported listening combination information, and the selected listening combination may be indicated through the first listening combination indication information.
  • network device 420 sends 520 DCI to terminal device 410 .
  • the terminal device 410 may determine a PDCCH monitoring opportunity according to the configuration information of the search space set, and then may monitor the PDCCH at the determined PDCCH monitoring opportunity. At a certain PDCCH monitoring opportunity, the terminal device 410 monitors the DCI from the network device 420, and the DCI is carried on the PDCCH.
  • the DCI may be used to indicate the interception behavior of the terminal device 410, and the indicated interception behavior belongs to one of at least two candidate interception behaviors included in the first interception combination indication information.
  • the terminal device 410 may perform 530 a PDCCH monitoring action based on the first monitoring combination indication information and the DCI.
  • the terminal device 410 may determine 522 an interception behavior from at least two candidate interception behaviors based on the first interception combination indication information and the DCI.
  • the interception combination indicated by the first interception combination indication information includes at least two candidate interception behaviors.
  • a candidate interception behavior corresponding to the value of the DCI may be selected from at least two candidate interception behaviors based on the specific value of the DCI.
  • the DCI may have a predetermined number of bits, for example, the predetermined number of bits may be 1 bit, 2 bits or more. Taking the predetermined number of bits as an example of 2 bits, the DCI may have four different values: 00, 01, 10 and 11. It can be understood that the 2 bits may be two consecutive bits in the DCI, for example, two bits in the same field, or may be two independent bits that are spaced apart, for example, there is 1 bit in two independent fields, The four different values can then be understood as values represented by two spaced apart independent bits.
  • the listening behavior can be determined through the examples shown in Table 2 below.
  • the first interception combination indication information indicates the second interception combination and the DCI is the first value
  • it is determined that the interception behavior is the second candidate interception behavior.
  • the first monitoring combination indication information indicates the fifth monitoring combination and the DCI is the second value
  • it is determined that the monitoring behavior is the fourth candidate monitoring behavior.
  • the first monitoring combination indication information indicates the first monitoring combination
  • the DCI is any value of the second value, the third value, or the fourth value
  • it is determined that the monitoring behavior is the first candidate monitoring behavior.
  • the first, second, third, and fourth values shown in Table 2 are not equal to each other.
  • the first value is 00
  • the second value is 01
  • the third value is 10
  • the fourth value is 11.
  • those skilled in the art can understand that this is only an example, and various other examples can be obtained on this basis, and still belong to the protection scope of the present disclosure.
  • the DCI when the first interception combination indication information indicates the first interception combination, the DCI may be the first value to indicate the second candidate interception behavior, and the DCI may be the second value to indicate the first candidate interception behavior.
  • the second candidate listening behavior may be indicated by using the DCI as the second value
  • the first candidate listening behavior may be indicated by using the DCI as the first value.
  • the second candidate monitoring behavior may be indicated by using the DCI as the third value
  • the first candidate monitoring behavior may be indicated by using the DCI as the fourth value. etc. No longer list them here.
  • a fixed preset time period that is, a skipped time period
  • multiple different predetermined time periods may be used. As an example, it is shown in Table 3 below.
  • Table 3 only shows the situation that the first monitoring combination indication information indicates the first monitoring combination or the second monitoring combination. For other situations, you can refer to Table 2, and it can be understood that Table 3 is only It is indicated that various modifications can be made on the basis of Table 3 to obtain other embodiments.
  • the listening behavior may be determined through a one-to-one correspondence between the DCI value and the positions or indexes of at least two candidate listening behaviors in the RRC signaling.
  • the RRC signaling may configure at least two candidate monitoring behaviors in the form of enumeration.
  • the DCI is the candidate monitoring behavior whose first value corresponds to the first index, that is, the second candidate monitoring behavior Beh 1A; DCI is the candidate monitoring behavior whose second value corresponds to the second index, that is, the third candidate monitoring behavior Beh 2; DCI is the candidate monitoring behavior whose third value corresponds to the third index, that is, the fourth candidate monitoring behavior Beh 2A.
  • the listening behavior may be determined through a one-to-many correspondence between the DCI value and the positions or indexes of at least two candidate listening behaviors in the RRC signaling.
  • the DCI is the candidate monitoring behavior whose first value corresponds to the first index, that is, the second candidate monitoring behavior Beh 1A, And use the first preset time period; DCI is the candidate monitoring behavior corresponding to the first index with the second value, that is, the second candidate monitoring behavior Beh 1A, and use the second preset time period. DCI is the candidate monitoring behavior whose third value corresponds to the second index, that is, the third candidate monitoring behavior Beh 2; DCI is the candidate monitoring behavior whose fourth value corresponds to the third index, that is, the fourth candidate monitoring behavior Beh 2A.
  • the listening behavior determined by the terminal device 410 can be used in the type 3 common search space set and the terminal device-specific search space set. For example, assuming that the monitoring behavior is the second candidate monitoring behavior, then for the type 3 common search space set and the terminal device-specific search space set, stop monitoring within a preset time period, and then monitor the PDCCH after the preset time period .
  • the terminal device 410 may or may not skip C-RNTI, MCS-C-RNTI or CS-RNTI
  • the PDCCH monitoring of the scrambled DCI is not limited in this embodiment of the present disclosure.
  • type 0A, type 1, and type 2 public search space sets whether the terminal device listens to the PDCCH of DCI scrambled by SI-RNTI, RA-RNTI, TC-RNTI or P-RNTI is not limited by the embodiments of the present disclosure .
  • the DCI may further indicate a BWP identifier (Identifier, ID), and the terminal device 410 may be based on the monitoring combination and the BWP corresponding to the BWP ID.
  • ID BWP identifier
  • the network device can configure a monitoring combination to the terminal device, and then the terminal device can determine the monitoring behavior based on the configured monitoring combination and the DCI from the network device.
  • the terminal device can reduce Unnecessary monitoring of PDCCH, thus greatly reducing power consumption.
  • the configuration manner of the monitoring combination in the embodiment of the present disclosure a reasonable combination of various monitoring behaviors is realized, and the implementation complexity of the terminal device is reduced.
  • Fig. 6 shows a schematic block diagram of a communication device 600 for information transmission according to some embodiments of the present disclosure.
  • the apparatus 600 may be implemented as the terminal device 410 or as a part of the terminal device 410 (such as a chip), etc., which is not limited in the present disclosure.
  • the apparatus 600 includes a first receiving module 610 , a second receiving module 620 and an execution module 630 .
  • the first receiving module 610 is configured to receive first interception combination indication information from a network device, where the first interception combination indication information indicates at least two candidate interception behaviors.
  • the second receiving module 620 is configured to receive downlink control information DCI from the network device, the DCI indicates the listening behavior of the communication device, and the listening behavior is one of at least two candidate listening behaviors.
  • the execution module 630 is configured to execute the monitoring behavior of the downlink control channel PDCCH based on the first monitoring combination indication information and the DCI.
  • the first receiving module 610 may be configured to receive first interception combination indication information from the network device, where the first interception combination indication information indicates one of the following: the first interception combination, including the first A candidate monitoring behavior and a second candidate monitoring behavior, the second monitoring combination, including the second candidate monitoring behavior, the third candidate monitoring behavior and the fourth candidate monitoring behavior, and the third monitoring combination, including the second candidate monitoring behavior, the third candidate The monitoring behavior, the fourth candidate monitoring behavior and the fifth candidate monitoring behavior, the fourth monitoring combination, including the third candidate monitoring behavior and the fourth candidate monitoring behavior, or the fifth monitoring combination, including the third candidate monitoring behavior, the fourth candidate monitoring behavior behavior and a fifth candidate listening behavior.
  • the fourth candidate monitoring behavior means monitoring the PDCCH according to the search space set in the second search space set group
  • the fifth candidate monitoring behavior means monitoring the PDCCH according to the search space set in the third search space set group.
  • the apparatus 600 further includes a third receiving module 640 configured to receive indication information from a network device for a preset time period.
  • the apparatus 600 may further include a determination module 650 configured to determine an interception behavior from at least two candidate interception behaviors based on the DCI.
  • the first intercept combination indication information indicates the intercept combination of the first bandwidth part BWP
  • the first receiving module 610 is further configured to receive second intercept combination indication information from the network device, the second intercept combination indication information Indicates the listening combination of the second BWP.
  • the monitoring combination of the first BWP is the same as the monitoring combination of the second BWP.
  • the first intercept combination indication information indicates the intercept combination of the first cell
  • the first receiving module 610 is further configured to receive third intercept combination indication information from the network device, the third intercept combination indication information indicating the first The monitoring combination of the second cell.
  • the monitoring combination of the first cell is the same as the monitoring combination of the second cell.
  • the apparatus 600 may further include a sending module 660 configured to send supported intercept combination information to the network device, where the supported intercept combination information indicates the intercept combinations supported by the communication apparatus.
  • a sending module 660 configured to send supported intercept combination information to the network device, where the supported intercept combination information indicates the intercept combinations supported by the communication apparatus.
  • the listening behavior performed by the execution module 630 is used for the type 3 public search space set and the terminal device-specific search space set.
  • the division of modules or units in the embodiments of the present disclosure is schematic, and is only a logical function division. In actual implementation, there may also be other division methods.
  • the functional units in the disclosed embodiments can be integrated In one unit, it may exist separately, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units can be implemented in the form of hardware or in the form of software functional units.
  • the apparatus 600 in FIG. 6 can be used to implement the various processes described above in conjunction with the terminal device 410 in FIG. 5 , and for the sake of brevity, details are not repeated here.
  • Fig. 7 shows a schematic block diagram of a communication device 700 for information transmission according to some embodiments of the present disclosure.
  • the apparatus 700 may be implemented as the network device 420 or as a part of the network device 420 (such as a chip), etc., which is not limited in the present disclosure.
  • the device 700 includes a first sending module 710 and a second sending module 720 .
  • the first sending module 710 is configured to send first interception combination indication information to the terminal device, where the first interception combination indication information indicates at least two candidate interception behaviors.
  • the second sending module 720 is configured to send downlink control information DCI to the terminal device, for the terminal device to perform the monitoring behavior of the downlink control channel PDCCH based on the first monitoring combination indication information and DCI, and the monitoring behavior is at least two candidates A type of monitoring behavior.
  • the first sending module 710 may be configured to send the first interception combination indication information to the terminal device, where the first interception combination indication information indicates one of the following: the first interception combination, including the first The candidate monitoring behavior and the second candidate monitoring behavior, the second monitoring combination, including the second candidate monitoring behavior, the third candidate monitoring behavior and the fourth candidate monitoring behavior, the third monitoring combination, including the second candidate monitoring behavior, the third candidate monitoring behavior Behavior, the fourth candidate listening behavior and the fifth candidate listening behavior, the fourth listening combination including the third candidate listening behavior and the fourth candidate listening behavior, or the fifth listening combination including the third candidate listening behavior and the fourth candidate listening behavior and a fifth candidate listening behavior.
  • the first interception combination indication information indicates one of the following: the first interception combination, including the first The candidate monitoring behavior and the second candidate monitoring behavior, the second monitoring combination, including the second candidate monitoring behavior, the third candidate monitoring behavior and the fourth candidate monitoring behavior, the third monitoring combination, including the second candidate monitoring behavior, the third candidate monitoring behavior Behavior, the fourth candidate listening behavior and the fifth candidate listening behavior, the fourth listening combination including the third candidate listening behavior
  • the fourth candidate monitoring behavior means monitoring the PDCCH according to the search space set in the second search space set group
  • the fifth candidate monitoring behavior means monitoring the PDCCH according to the search space set in the third search space set group.
  • the apparatus 700 further includes a third sending module 730 configured to send the indication information of a preset time period to the terminal device.
  • the first intercept combination indication information indicates the intercept combination of the first bandwidth part BWP
  • the first sending module 710 is further configured to send the second intercept combination indication information to the terminal device, the second intercept combination indication information indicates The monitor combination of the second BWP.
  • the monitoring combination of the first BWP is the same as the monitoring combination of the second BWP.
  • the first intercept combination indication information indicates the intercept combination of the first cell
  • the first sending module 710 is further configured to: send third intercept combination indication information to the terminal device, the third intercept combination indication information indicating the first The monitoring combination of the second cell.
  • the monitoring combination of the first cell is the same as the monitoring combination of the second cell.
  • the apparatus 700 may further include a receiving module 740 configured to receive the supported listening combination information from the terminal device, the supported listening combination information indicates the listening combination supported by the terminal device, and the first listening combination indication information The indicated listening combination belongs to the listening combination supported by the terminal device.
  • a receiving module 740 configured to receive the supported listening combination information from the terminal device, the supported listening combination information indicates the listening combination supported by the terminal device, and the first listening combination indication information The indicated listening combination belongs to the listening combination supported by the terminal device.
  • listening behavior is used for both the Type 3 public search space set and the end-device specific search space set.
  • the division of modules or units in the embodiments of the present disclosure is schematic, and is only a logical function division. In actual implementation, there may also be other division methods.
  • the functional units in the disclosed embodiments can be integrated In one unit, it may exist separately, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units can be implemented in the form of hardware or in the form of software functional units.
  • the apparatus 700 in FIG. 7 can be used to implement the various processes described above in conjunction with the network device 420 in FIG. 5 , and details are not repeated here for brevity.
  • FIG. 8 shows a schematic block diagram of an example device 800 that may be used to implement embodiments of the present disclosure.
  • the device 800 may be implemented as or included in the terminal device 410 of FIG. 4 , or may be implemented as or included in the network device 420 of FIG. 4 .
  • device 800 includes one or more processors 810 , one or more memories 820 coupled to processors 810 , and a communication module 840 coupled to processors 810 .
  • the communication module 840 can be used for two-way communication.
  • the communication module 840 may have at least one communication interface for communication.
  • Communication interfaces may include any interface necessary to communicate with other devices.
  • Processor 810 may be of any type suitable for the local technical network, and may include, but is not limited to, at least one of the following: a general purpose computer, a special purpose computer, a microcontroller, a digital signal processor (Digital Signal Processor, DSP), or a control-based One or more of the multi-core controller architectures of the processor.
  • Device 800 may have multiple processors, such as application specific integrated circuit chips, that are time slaved to a clock that is synchronized to a main processor.
  • Memory 820 may include one or more non-volatile memories and one or more volatile memories.
  • non-volatile memory include but are not limited to at least one of the following: read-only memory (Read-Only Memory, ROM) 824, erasable programmable read-only memory (Erasable Programmable Read Only Memory, EPROM), flash memory, hard disk , Compact Disc (CD), Digital Video Disk (Digital Versatile Disc, DVD) or other magnetic and/or optical storage.
  • Examples of volatile memory include, but are not limited to, at least one of: Random Access Memory (RAM) 822, or other volatile memory that does not persist for the duration of a power outage.
  • RAM Random Access Memory
  • the computer program 830 comprises computer-executable instructions executed by the associated processor 810 .
  • Program 830 may be stored in ROM 824.
  • Processor 810 may perform any suitable actions and processes by loading program 830 into RAM 822.
  • Embodiments of the present disclosure may be implemented by means of a program 830 such that the device 800 may perform any of the processes as discussed with reference to FIGS. 4 to 6 .
  • Embodiments of the present disclosure can also be realized by hardware or by a combination of software and hardware.
  • Program 830 may be tangibly embodied on a computer readable medium, which may be included in device 800 (such as in memory 820 ) or other storage device accessible by device 800 . Program 830 may be loaded from a computer readable medium into RAM 822 for execution.
  • the computer readable medium may include any type of tangible nonvolatile memory such as ROM, EPROM, flash memory, hard disk, CD, DVD, and the like.
  • the communication module 840 in the device 800 can be implemented as a transmitter and a receiver (or transceiver), which can be configured to send/receive information such as the first monitoring combination indication information, the monitoring combination supported by the terminal device information etc.
  • the device 800 may further include one or more of a scheduler, a controller, and a radio frequency/antenna, which will not be described in detail in this disclosure.
  • the device 800 in FIG. 8 may be implemented as an electronic device, or may be implemented as a chip or a chip system in the electronic device, which is not limited by the embodiments of the present disclosure.
  • Embodiments of the present disclosure also provide a chip, which may include an input interface, an output interface, and a processing circuit.
  • a chip which may include an input interface, an output interface, and a processing circuit.
  • the interaction of signaling or data may be completed by the input interface and the output interface, and the generation and processing of signaling or data information may be completed by the processing circuit.
  • Embodiments of the present disclosure also provide a chip system, including a processor, configured to support a computing device to implement the functions involved in any of the foregoing embodiments.
  • the system-on-a-chip may further include a memory for storing necessary program instructions and data, and when the processor runs the program instructions, the device installed with the system-on-a-chip can implement the program described in any of the above-mentioned embodiments.
  • the chip system may consist of one or more chips, and may also include chips and other discrete devices.
  • Embodiments of the present disclosure further provide a processor, configured to be coupled with a memory, where instructions are stored in the memory, and when the processor executes the instructions, the processor executes the methods and functions involved in any of the foregoing embodiments.
  • Embodiments of the present disclosure also provide a computer program product containing instructions, which, when run on a computer, cause the computer to execute the methods and functions involved in any of the above embodiments.
  • Embodiments of the present disclosure also provide a computer-readable storage medium, on which computer instructions are stored, and when a processor executes the instructions, the processor is made to execute the methods and functions involved in any of the above embodiments.
  • the various embodiments of the present disclosure may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. Some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software, which may be executed by a controller, microprocessor or other computing device. While various aspects of the embodiments of the present disclosure are shown and described as block diagrams, flowcharts, or using some other pictorial representation, it should be understood that the blocks, devices, systems, techniques or methods described herein can be implemented as, without limitation, Exemplary, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controllers or other computing devices, or some combination thereof.
  • the present disclosure also provides at least one computer program product tangibly stored on a non-transitory computer-readable storage medium.
  • the computer program product comprises computer-executable instructions, eg included in program modules, which are executed in a device on a real or virtual processor of a target to perform the process/method as above with reference to the accompanying drawings.
  • program modules include routines, programs, libraries, objects, classes, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • the functionality of the program modules may be combined or divided as desired among the program modules.
  • Machine-executable instructions for program modules may be executed within local or distributed devices. In a distributed device, program modules may be located in both local and remote storage media.
  • Computer program codes for implementing the methods of the present disclosure may be written in one or more programming languages. These computer program codes can be provided to processors of general-purpose computers, special-purpose computers, or other programmable data processing devices, so that when the program codes are executed by the computer or other programmable data processing devices, The functions/operations specified in are implemented.
  • the program code may execute entirely on the computer, partly on the computer, as a stand-alone software package, partly on the computer and partly on a remote computer or entirely on the remote computer or server.
  • computer program code or related data may be carried by any suitable carrier to enable a device, apparatus or processor to perform the various processes and operations described above.
  • carriers include signals, computer readable media, and the like.
  • signals may include electrical, optical, radio, sound, or other forms of propagated signals, such as carrier waves, infrared signals, and the like.
  • a computer readable medium may be any tangible medium that contains or stores a program for or related to an instruction execution system, apparatus, or device.
  • the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
  • a computer readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination thereof. More detailed examples of computer-readable storage media include electrical connections with one or more wires, portable computer diskettes, hard disks, random storage access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash), optical storage, magnetic storage, or any suitable combination thereof.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开的实施例提供了一种信息传输方法及装置,涉及通信领域。该方法包括:终端设备接收来自网络设备的第一监听组合指示信息,第一监听组合指示信息指示至少两种候选监听行为;终端设备接收来自网络设备的下行链路控制信息DCI,DCI指示终端设备的监听行为,监听行为是至少两种候选监听行为中的一种;以及终端设备基于第一监听组合指示信息和DCI,执行下行链路控制信道PDCCH的监听行为。如此,本公开的实施例中,终端设备能够基于所配置的监听组合指示以及DCI来确定监听行为,进而有效地减少终端设备的功耗并且降低终端设备的实现复杂度。

Description

信息传输方法及装置 技术领域
本公开涉及通信领域,更具体地,涉及一种信息传输方法及装置。
背景技术
在无线通信***中,终端设备的功耗是用户体验的一个重要方面,而造成终端设备功耗严重的其中一个因素是对来自网络设备的下行链路控制信道(Physical Downlink Control Channel,PDCCH)的监听。因此,有必要提供一种方案,以尽可能地减少不必要的PDCCH监听。
发明内容
本公开的实施例提供了一种监听指示方案,能够减少终端设备对PDCCH的监听,进而降低功耗。
在第一方面,提供了一种信息传输方法。该方法包括:终端设备接收来自网络设备的第一监听组合指示信息,第一监听组合指示信息指示至少两种候选监听行为;终端设备接收来自网络设备的下行链路控制信息DCI,DCI指示终端设备的监听行为,监听行为是至少两种候选监听行为中的一种;以及终端设备基于第一监听组合指示信息和DCI,执行下行链路控制信道PDCCH的监听行为。
如此,本公开的实施例中,终端设备能够基于所配置的监听组合指示以及DCI来确定监听行为,进而有效地减少终端设备的功耗并且降低终端设备的实现复杂度。
在第一方面的一些实施例中,终端设备接收来自网络设备的第一监听组合指示信息包括:终端设备接收来自网络设备的第一监听组合指示信息,第一监听组合指示信息指示以下中的一项:第一监听组合,包括第一候选监听行为和第二候选监听行为,第二监听组合,包括第二候选监听行为、第三候选监听行为和第四候选监听行为,第三监听组合,包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为,第四监听组合,包括第三候选监听行为和第四候选监听行为,或第五监听组合,包括第三候选监听行为、第四候选监听行为和第五候选监听行为,并且其中第一候选监听行为表示根据配置的搜索空间集监听PDCCH,第二候选监听行为表示在预设时间段内停止监听PDCCH,第三候选监听行为表示根据第一搜索空间集组中的搜索空间集监听PDCCH,第四候选监听行为表示根据第二搜索空间集组中的搜索空间集监听PDCCH,第五候选监听行为表示根据第三搜索空间集组中的搜索空间集监听PDCCH。
如此,每一监听组合可以包括互相不排斥的至少两种候选监听行为,避免不合理的任意指示。
在第一方面的一些实施例中,第一监听组合指示信息指示第一监听组合、第二监听组合或第三监听组合,并且还包括:终端设备接收来自网络设备的预设时间段的指示信息。
在第一方面的一些实施例中,还包括:终端设备基于DCI,从至少两种候选监听行为中确定监听行为。
在第一方面的一些实施例中,第一监听组合指示信息指示第一带宽部分BWP的监听组合,并且还包括:终端设备接收来自网络设备的第二监听组合指示信息,第二监听组合指示 信息指示第二BWP的监听组合。
如此,在终端设备被配置有多个BWP的情况下,可以为不同的BWP分别配置监听组合,实现了针对不同BWP的灵活配置。
在第一方面的一些实施例中,第一BWP的监听组合与第二BWP的监听组合相同。
尤其地,针对属于同一小区的多个不同的BWP,可以配置其监听组合相同,保证了不同BWP之间的一致性。
在第一方面的一些实施例中,第一监听组合指示信息指示第一小区的监听组合,并且还包括:终端设备接收来自网络设备的第三监听组合指示信息,第三监听组合指示信息指示第二小区的监听组合。
如此,在终端设备被配置有多个小区的情况下,可以为不同的小区分别配置监听组合,实现了针对不同小区的灵活配置。
在第一方面的一些实施例中,第一小区的监听组合与第二小区的监听组合相同。
尤其地,针对属于同一小区组的多个不同的小区,可以配置其监听组合相同,保证了不同小区之间的一致性。
在第一方面的一些实施例中,还包括:终端设备向网络设备发送支持的监听组合信息,支持的监听组合信息指示终端设备所支持的监听组合。
如此,终端设备可以将支持的监听组合告知网络设备,从而能够确保网络设备所发送的第一监听组合指示信息所指示的监听组合是终端设备所支持的,确保信息的准确性。
在第一方面的一些实施例中,监听行为用于类型3公共搜索空间集和终端设备专用搜索空间集。
在第二方面,提供了一种信息传输方法。该方法包括:网络设备向终端设备发送第一监听组合指示信息,第一监听组合指示信息指示至少两种候选监听行为;以及网络设备向终端设备发送下行链路控制信息DCI,用于终端设备基于第一监听组合指示信息和DCI执行下行链路控制信道PDCCH的监听行为,监听行为是至少两种候选监听行为中的一种。
在第二方面的一些实施例中,网络设备向终端设备发送第一监听组合指示信息包括:网络设备向终端设备发送第一监听组合指示信息,第一监听组合指示信息指示以下中的一项:第一监听组合,包括第一候选监听行为和第二候选监听行为,第二监听组合,包括第二候选监听行为、第三候选监听行为和第四候选监听行为,第三监听组合,包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为,第四监听组合,包括第三候选监听行为和第四候选监听行为,或第五监听组合,包括第三候选监听行为、第四候选监听行为和第五候选监听行为,并且其中第一候选监听行为表示根据配置的搜索空间集监听PDCCH,第二候选监听行为表示在预设时间段内停止监听PDCCH,第三候选监听行为表示根据第一搜索空间集组中的搜索空间集监听PDCCH,第四候选监听行为表示根据第二搜索空间集组中的搜索空间集监听PDCCH,第五候选监听行为表示根据第三搜索空间集组中的搜索空间集监听PDCCH。
在第二方面的一些实施例中,第一监听组合指示信息指示第一监听组合、第二监听组合或第三监听组合,并且还包括:网络设备向终端设备发送预设时间段的指示信息。
在第二方面的一些实施例中,第一监听组合指示信息指示第一带宽部分BWP的监听组合,并且还包括:网络设备向终端设备发送第二监听组合指示信息,第二监听组合指示信息指示第二BWP的监听组合。
在第二方面的一些实施例中,第一BWP的监听组合与第二BWP的监听组合相同。
在第二方面的一些实施例中,第一监听组合指示信息指示第一小区的监听组合,并且还包括:网络设备向终端设备发送第三监听组合指示信息,第三监听组合指示信息指示第二小区的监听组合。
在第二方面的一些实施例中,第一小区的监听组合与第二小区的监听组合相同。
在第二方面的一些实施例中,还包括:网络设备接收来自终端设备的支持的监听组合信息,支持的监听组合信息指示终端设备所支持的监听组合,并且第一监听组合指示信息所指示的监听组合属于终端设备所支持的监听组合。
在第二方面的一些实施例中,监听行为用于类型3公共搜索空间集和终端设备专用搜索空间集。
在第三方面,提供了一种通信装置。该装置包括:第一接收模块,被配置为接收来自网络设备的第一监听组合指示信息,第一监听组合指示信息指示至少两种候选监听行为;第二接收模块,被配置为接收来自网络设备的下行链路控制信息DCI,DCI指示通信装置的监听行为,监听行为是至少两种候选监听行为中的一种;以及执行模块,被配置为基于第一监听组合指示信息和DCI,执行下行链路控制信道PDCCH的监听行为。
在第三方面的一些实施例中,第一接收模块被配置为接收来自网络设备的第一监听组合指示信息,第一监听组合指示信息指示以下中的一项:第一监听组合,包括第一候选监听行为和第二候选监听行为,第二监听组合,包括第二候选监听行为、第三候选监听行为和第四候选监听行为,第三监听组合,包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为,第四监听组合,包括第三候选监听行为和第四候选监听行为,或第五监听组合,包括第三候选监听行为、第四候选监听行为和第五候选监听行为,并且第一候选监听行为表示根据配置的搜索空间集监听PDCCH,第二候选监听行为表示在预设时间段内停止监听PDCCH,第三候选监听行为表示根据第一搜索空间集组中的搜索空间集监听PDCCH,第四候选监听行为表示根据第二搜索空间集组中的搜索空间集监听PDCCH,第五候选监听行为表示根据第三搜索空间集组中的搜索空间集监听PDCCH。
在第三方面的一些实施例中,第一监听组合指示信息指示第一监听组合、第二监听组合或第三监听组合,并且通信装置还包括第三接收模块,被配置为:接收来自网络设备的预设时间段的指示信息。
在第三方面的一些实施例中,还包括确定模块,被配置为:基于DCI,从至少两种候选监听行为中确定监听行为。
在第三方面的一些实施例中,第一监听组合指示信息指示第一带宽部分BWP的监听组合,并且第一接收模块还被配置为:接收来自网络设备的第二监听组合指示信息,第二监听组合指示信息指示第二BWP的监听组合。
在第三方面的一些实施例中,第一BWP的监听组合与第二BWP的监听组合相同。
在第三方面的一些实施例中,第一监听组合指示信息指示第一小区的监听组合,并且第一接收模块还被配置为:接收来自网络设备的第三监听组合指示信息,第三监听组合指示信息指示第二小区的监听组合。
在第三方面的一些实施例中,第一小区的监听组合与第二小区的监听组合相同。
在第三方面的一些实施例中,还包括发送模块,被配置为:向网络设备发送支持的监听组合信息,支持的监听组合信息指示通信装置所支持的监听组合。
在第三方面的一些实施例中,监听行为用于类型3公共搜索空间集和终端设备专用搜索空间集。
在第四方面,提供了一种通信装置。该装置包括:第一发送模块,被配置为向终端设备发送第一监听组合指示信息,第一监听组合指示信息指示至少两种候选监听行为;以及第二发送模块,被配置为向终端设备发送下行链路控制信息DCI,用于终端设备基于第一监听组合指示信息和DCI执行下行链路控制信道PDCCH的监听行为,监听行为是至少两种候选监听行为中的一种。
在第四方面的一些实施例中,第一发送模块被配置为向终端设备发送第一监听组合指示信息,第一监听组合指示信息指示以下中的一项:第一监听组合,包括第一候选监听行为和第二候选监听行为,第二监听组合,包括第二候选监听行为、第三候选监听行为和第四候选监听行为,第三监听组合,包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为,第四监听组合,包括第三候选监听行为和第四候选监听行为,或第五监听组合,包括第三候选监听行为、第四候选监听行为和第五候选监听行为,并且第一候选监听行为表示根据配置的搜索空间集监听PDCCH,第二候选监听行为表示在预设时间段内停止监听PDCCH,第三候选监听行为表示根据第一搜索空间集组中的搜索空间集监听PDCCH,第四候选监听行为表示根据第二搜索空间集组中的搜索空间集监听PDCCH,第五候选监听行为表示根据第三搜索空间集组中的搜索空间集监听PDCCH。
在第四方面的一些实施例中,第一监听组合指示信息指示第一监听组合、第二监听组合或第三监听组合,并且通信装置还包括第三发送模块,被配置为:向终端设备发送预设时间段的指示信息。
在第四方面的一些实施例中,第一监听组合指示信息指示第一带宽部分BWP的监听组合,并且第一发送模块还被配置为:向终端设备发送第二监听组合指示信息,第二监听组合指示信息指示第二BWP的监听组合。
在第四方面的一些实施例中,第一BWP的监听组合与第二BWP的监听组合相同。
在第四方面的一些实施例中,第一监听组合指示信息指示第一小区的监听组合,并且第一发送模块还被配置为:向终端设备发送第三监听组合指示信息,第三监听组合指示信息指示第二小区的监听组合。
在第四方面的一些实施例中,第一小区的监听组合与第二小区的监听组合相同。
在第四方面的一些实施例中,还包括接收模块,被配置为:接收来自终端设备的支持的监听组合信息,支持的监听组合信息指示终端设备所支持的监听组合,并且第一监听组合指示信息所指示的监听组合属于终端设备所支持的监听组合。
在第四方面的一些实施例中,监听行为用于类型3公共搜索空间集和终端设备专用搜索空间集。
在第五方面,提供了一种终端设备。该终端设备包括收发器、处理器以及存储器,存储器上存储有由处理器执行的指令,当指令被处理器执行时使得该终端设备实现:经由收发器接收来自网络设备的第一监听组合指示信息,第一监听组合指示信息指示至少两种候选监听行为;经由收发器接收来自网络设备的下行链路控制信息DCI,DCI指示终端设备的监听行为,监听行为是至少两种候选监听行为中的一种;以及基于第一监听组合指示信息和DCI,执行下行链路控制信道PDCCH的监听行为。
在第五方面的一些实施例中,处理器执行指令使得该终端设备实现:经由收发器接收来 自网络设备的第一监听组合指示信息,第一监听组合指示信息指示以下中的一项:第一监听组合,包括第一候选监听行为和第二候选监听行为,第二监听组合,包括第二候选监听行为、第三候选监听行为和第四候选监听行为,第三监听组合,包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为,第四监听组合,包括第三候选监听行为和第四候选监听行为,或第五监听组合,包括第三候选监听行为、第四候选监听行为和第五候选监听行为,并且第一候选监听行为表示根据配置的搜索空间集监听PDCCH,第二候选监听行为表示在预设时间段内停止监听PDCCH,第三候选监听行为表示根据第一搜索空间集组中的搜索空间集监听PDCCH,第四候选监听行为表示根据第二搜索空间集组中的搜索空间集监听PDCCH,第五候选监听行为表示根据第三搜索空间集组中的搜索空间集监听PDCCH。
在第五方面的一些实施例中,第一监听组合指示信息指示第一监听组合、第二监听组合或第三监听组合,并且处理器执行指令使得该终端设备实现:经由收发器接收来自网络设备的预设时间段的指示信息。
在第五方面的一些实施例中,处理器执行指令使得该终端设备实现:基于DCI,从至少两种候选监听行为中确定监听行为。
在第五方面的一些实施例中,第一监听组合指示信息指示第一带宽部分BWP的监听组合,并且处理器执行指令使得该终端设备实现:经由收发器接收来自网络设备的第二监听组合指示信息,第二监听组合指示信息指示第二BWP的监听组合。
在第五方面的一些实施例中,第一BWP的监听组合与第二BWP的监听组合相同。
在第五方面的一些实施例中,第一监听组合指示信息指示第一小区的监听组合,并且处理器执行指令使得该终端设备实现:经由收发器接收来自网络设备的第三监听组合指示信息,第三监听组合指示信息指示第二小区的监听组合。
在第五方面的一些实施例中,第一小区的监听组合与第二小区的监听组合相同。
在第五方面的一些实施例中,处理器执行指令使得该终端设备实现:向网络设备发送支持的监听组合信息,支持的监听组合信息指示终端设备所支持的监听组合。
在第五方面的一些实施例中,监听行为用于类型3公共搜索空间集和终端设备专用搜索空间集。
在第六方面,提供了一种网络设备。该网络设备包括收发器、处理器以及存储器,存储器上存储有由处理器执行的指令,当指令被处理器执行时使得该网络设备实现:经由收发器向终端设备发送第一监听组合指示信息,第一监听组合指示信息指示至少两种候选监听行为;以及经由收发器向终端设备发送下行链路控制信息DCI,用于终端设备基于第一监听组合指示信息和DCI执行下行链路控制信道PDCCH的监听行为,监听行为是至少两种候选监听行为中的一种。
在第六方面的一些实施例中,处理器执行指令使得该网络设备实现:经由收发器向终端设备发送第一监听组合指示信息,第一监听组合指示信息指示以下中的一项:第一监听组合,包括一候选监听行为和第二候选监听行为,第二监听组合,包括第二候选监听行为、第三候选监听行为和第四候选监听行为,第三监听组合,包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为,第四监听组合,包括第三候选监听行为和第四候选监听行为,或第五监听组合,包括第三候选监听行为、第四候选监听行为和第五候选监听行为,并且第一候选监听行为表示根据配置的搜索空间集监听PDCCH,第二候选监听行为表示在预设时间段内停止监听PDCCH,第三候选监听行为表示根据第一搜索空间集组中的搜 索空间集监听PDCCH,第四候选监听行为表示根据第二搜索空间集组中的搜索空间集监听PDCCH,第五候选监听行为表示根据第三搜索空间集组中的搜索空间集监听PDCCH。
在第六方面的一些实施例中,第一监听组合指示信息指示第一监听组合、第二监听组合或第三监听组合,并且处理器执行指令使得该网络设备实现:经由收发器向终端设备发送预设时间段的指示信息。
在第六方面的一些实施例中,第一监听组合指示信息指示第一带宽部分BWP的监听组合,并且处理器执行指令使得该网络设备实现:经由收发器向终端设备发送第二监听组合指示信息,第二监听组合指示信息指示第二BWP的监听组合。
在第六方面的一些实施例中,第一BWP的监听组合与第二BWP的监听组合相同。
在第六方面的一些实施例中,第一监听组合指示信息指示第一小区的监听组合,并且处理器执行指令使得该网络设备实现:经由收发器向终端设备发送第三监听组合指示信息,第三监听组合指示信息指示第二小区的监听组合。
在第六方面的一些实施例中,第一小区的监听组合与第二小区的监听组合相同。
在第六方面的一些实施例中,处理器执行指令使得该网络设备实现:经由收发器接收来自终端设备的支持的监听组合信息,支持的监听组合信息指示终端设备所支持的监听组合,并且第一监听组合指示信息所指示的监听组合属于终端设备所支持的监听组合。
在第六方面的一些实施例中,监听行为用于类型3公共搜索空间集和终端设备专用搜索空间集。
在第七方面,提供了一种计算机可读存储介质,该计算机可读存储介质上存储有计算机可执行指令,该计算机可执行指令被处理器执行时实现根据上述第一方面或其任一实施例中的方法的操作,或者实现根据上述第二方面或其任一实施例中的方法的操作。
在第八方面,提供了一种芯片或芯片***。该芯片或芯片***包括处理电路,被配置为执行根据上述第一方面或其任一实施例中的方法的操作,或者实现根据上述第二方面或其任一实施例中的方法的操作。
在第九方面,提供了一种计算机程序或计算机程序产品。该计算机程序或计算机程序产品被有形地存储在计算机可读介质上并且包括计算机可执行指令,计算机可执行指令在被执行时实现根据上述第一方面或其任一实施例中的方法的操作,或者实现根据上述第二方面或其任一实施例中的方法的操作。
附图说明
结合附图并参考以下详细说明,本公开各实施例的上述和其他特征、优点及方面将变得更加明显。在附图中,相同或相似的附图标注表示相同或相似的元素,其中:
图1示出了监听PDCCH的示意图;
图2示出了跳过PDCCH监听的示意图;
图3示出了对4个搜索空间集进行分组的示意图;
图4示出了本公开实施例可实现在其中的通信***的一个示意图;
图5示出了根据本公开的一些实施例的终端设备与网络设备之间的过程的交互信令图;
图6示出了根据本公开的一些实施例的用于信息传输的通信装置的一个示意框图;
图7示出了根据本公开的一些实施例的用于信息传输的通信装置的另一示意框图;以及
图8示出了可以用来实施本公开的实施例的示例设备的示意性框图。
具体实施方式
下面将参照附图更详细地描述本公开的实施例。虽然附图中显示了本公开的某些实施例,然而应当理解的是,本公开可以通过各种形式来实现,而且不应该被解释为限于这里阐述的实施例,相反提供这些实施例是为了更加透彻和完整地理解本公开。应当理解的是,本公开的附图及实施例仅用于示例性作用,并非用于限制本公开的保护范围。
在本公开的实施例的描述中,术语“包括”及其类似用语应当理解为开放性包含,即“包括但不限于”。术语“基于”应当理解为“至少部分地基于”。术语“一个实施例”或“该实施例”应当理解为“至少一个实施例”。术语“第一”、“第二”等等可以指代不同的或相同的对象。下文还可能包括其他明确的和隐含的定义。
本公开的实施例可以根据任何适当的通信协议来实施,包括但不限于,第三代(3rd Generation,3G)、***(4G)、第五代(5G)、第六代(6G)等蜂窝通信协议、诸如电气与电子工程师协会(Institute of Electrical and Electronics Engineers,IEEE)802.11等的无线局域网通信协议、和/或目前已知或者将来开发的任何其他协议。
本公开的实施例的技术方案应用于遵循任何适当通信协议的通信***,例如:通用分组无线业务(General Packet Radio Service,GPRS)、全球移动通信***(Global System for Mobile Communications,GSM)、增强型数据速率GSM演进***(Enhanced Data rate for GSM Evolution,EDGE)、通用移动通信***(Universal Mobile Telecommunications Service,UMTS)、长期演进(Long Term Evolution,LTE)***、宽带码分多址***(Wideband Code Division Multiple Access,WCDMA)、码分多址2000***(Code Division Multiple Access,CDMA2000)、时分同步码分多址***(Time Division-Synchronization Code Division Multiple Access,TD-SCDMA)、频分双工(Frequency Division Duplex,FDD)***、时分双工(Time Division Duplex,TDD)、第五代(5G)***或新无线电(New Radio,NR)、第六代(6G)***等等。
出于说明的目的,下文中以3GPP中的NR通信***为背景来描述本公开的实施例。然而,应当理解,本公开的实施例不限于该通信***,而是可以被应用到任何存在类似问题的通信***中,例如无线局域网(WLAN)、有线通信***、或者将来开发的其他通信***等。
在本公开中使用的术语“终端设备”指能够与网络设备之间或者彼此之间进行有线或无线通信的任何终端设备。终端设备有时可以称为用户设备(User Equipment,UE)。终端设备可以是任意类型的移动终端、固定终端或便携式终端。作为示例,终端设备可以包括移动手机、站点、单元、设备、移动终端(Mobile Terminal,MT)、订阅台、便携式订阅台、互联网节点、通信器、台式计算机、膝上型计算机、笔记本计算机、平板计算机、个人通信***设备、个人导航设备、个人数字助理(Personal Digital Assistant,PDA)、定位设备、无线电广播接收器、电子书设备、游戏设备、物联网(Internet of Things,IoT)设备、车载设备、飞行器、虚拟现实(Virtual Reality,VR)设备、增强现实(Augmented Reality,AR)设备、可穿戴设备、5G网络中的终端设备或者演进的公用陆地移动网络(Public Land Mobile Network,PLMN)中的任何终端设备、可用于通信的其他设备、或者上述的任意组合。本公开的实施例对此并不做限定。
在本公开中使用的术语“网络设备”是可以用于与终端设备通信的实体或节点,例如可以是接入网设备。接入网设备可以是部署在无线接入网中为移动终端提供无线通信功能的装置,例如可以是无线接入网(Radio Access Network,RAN)网络设备。接入网设备可以包括 各种类型的基站。作为示例,接入网设备可以包括各种形式的宏基站、微基站、微微基站、毫微微基站、中继站、接入点、远程无线电单元(Remote Radio Unit,RRU)、射频头(Radio Head,RH)、远程无线电头端(Remote Radio Head,RRH)等等。在采用不同的无线接入技术的***中,接入网设备的名称可能会有所不同,例如在长期演进***(Long Term Evolution,LTE)网络中称为演进的节点B(evolved NodeB,eNB或eNodeB),在3G网络中称为节点B(NodeB,NB),在5G网络中可以称为g节点B(gNB)或NR节点B(NR NB),等等。在某些场景下,接入网设备可以包含集中单元(Central Unit,CU)和/或分布单元(Distributed Unit,DU)。CU和DU可以放置在不同的地方,例如:DU拉远,放置于高话务量的区域,CU放置于中心机房。或者,CU和DU也可以放置在同一机房。CU和DU也可以为一个机架下的不同部件。为方便描述,本公开后续的实施例中,上述为终端设备提供无线通信功能的装置统称为网络设备,本公开的实施例不再具体限定。
下行物理信道对应于承载来自高层信息的一组资源单元(Resource Element,RE)。PDCCH是下行物理信道之一,其承载调度信息和其他控制信息。PDCCH可以承载关于上行数据和/或下行数据的调度信息,终端设备可以周期性地监听PDCCH以获取调度信息。如果终端设备监听到调度信息,则进一步地终端设备可以基于调度信息通过物理下行链路共享信道(Physical Downlink Shared Channel,PDSCH)接收下行数据,或者通过物理上行链路共享信道(Physical Uplink Shared Channel,PUSCH)发送上行数据。PDCCH还可以承载上行功率控制命令字、时隙格式等信息。承载不同的控制信息的PDCCH可以采用不同的无线网络临时标识(Radio Network Temporary Identifier,RNTI)进行加扰。
应注意的是,终端设备对PDCCH的监听(monitoring)也可以被称为侦听(listening)、检测(detecting)等,本公开的实施例对该术语不限定。
PDCCH在一个或多个连续的控制信道单元(Control Channel Element,CCE)的聚合上进行传输,其中一个CCE可以对应6个资源单元组(Resource Element Group,REG)。网络设备可以为终端设备配置至少一个搜索空间集(Search Space Set,SSS),其中一个搜索空间集可以用于定义一组候选PDCCH。终端设备可以根据搜索空间集的配置信息确定PDCCH监听时机(Monitoring Occasion,MO),进而可以在所确定的PDCCH监听时机上监听PDCCH,如图1所示,其中PDCCH监听时机也可以被称为PDCCH候选位置。
搜索空间集的配置信息可以包括以下中的至少一项:
(1)搜索空间集的标识信息,用于标识搜索空间集。
(2)与搜索空间集关联的控制资源集(control resource set,CORESET)的标识信息。CORESET表示用于承载PDCCH的时频资源集,一个CORESET在频域上由若干个连续的或非连续的资源块(Resource Block,RB)组成,时域上由连续的1或多个符号组成。
(3)PDCCH监听周期(例如表示为Ks)和偏移(例如表示为Os),其中Ks和Os的量纲可以为时隙(slot),或者可选地,Os的量纲可以为符号。
(4)时隙内PDCCH监听图案(pattern),或者称为时隙内PDCCH监听符号,用于指示搜索空间集关联的CORESET在时隙内监听PDCCH的起始符号。
(5)持续时间(例如表示为Ts),用于指示搜索空间集存在的连续的时隙的个数,其中Ts小于Ks,Ts的取值可以为1个时隙。
(6)聚合等级以及各聚合等级对应的候选PDCCH(PDCCH candidate)的个数。
(7)搜索空间集类型指示信息,用于指示搜索空间集是公共搜索空间集(Common Search  Space set,CSS set),或者是用户设备专用搜索空间集(UE-specific Search Space set,USS set)。示例性地,公共搜索空间集可以简称为CSS,用户设备专用搜索空间集可以简称为USS。
示例性地,公共搜索空间集包括类型3公共搜索空间集(type-3 CSS),其可以主要用于监听承载被下列任一无线网络临时标识符(Radio Network Temporary Identifier,RNTI)所加扰的DCI的PDCCH:中断-RNTI(Interruption RNTI,INT-RNTI)、时隙格式指示-RNTI(Slot Format Indication-RNTI,SFI-RNTI)、传输功率控制-物理上行链路共享信道-RNTI(Transmit Power Control-Physical Uplink Shared Channel-RNTI,TPC-PUSCH-RNTI)、传输功率控制-物理上行链路控制信道-RNTI(Transmit Power Control-Physical Uplink Control Channel-RNTI,TPC-PUCCH-RNTI)、传输功率控制-探测参考信号-RNTI(Transmit Power Control-Sounding Reference Symbols-RNTI,TPC-SRS-RNTI)、或者取消指示-RNTI(Cancellation Indication-RNTI,CI-RNTI)、主小区上的小区-RNTI(Cell-RNTI,C-RNTI)、调制与编码策略-C-RNTI(Modulation and Coding Scheme-Cell-RNTI,MCS-C-RNTI)、配置的调度-RNTI(Configured Scheduling-RNTI,CS-RNTI)、功率节省-RNTI(Power Saving-RNTI,PS-RNTI)等。
示例性地,用户设备专用搜索空间集可以用于监听承载被下列任一RNTI所加扰的DCI的PDCCH:C-RNTI、MCS-C-RNTI、半持续-信道状态指示-RNTI(Semi Persistent-Channel State Indication-RNTI,SP-CSI-RNTI)、CS-RNTI、侧链路-RNTI(Side Link-RNTI,SL-RNTI)、SL-CS-RNTI、侧链路半持续调度车辆-RNTI(SL Semi-Persistent Scheduling V-RNTI)等。
并且,若搜索空间集的类型为CSS,网络设备还会配置在PDCCH候选位置监听的下行链路控制信息(Downlink Control Information,DCI)格式(format),例如,可以为DCI格式0_0、DCI格式1_0、DCI格式2_0、DCI格式2_1、DCI格式2_2、DCI格式2_3、DCI格式2_4、DCI格式2_5或DCI格式2_6等。若搜索空间集的类型为USS,则网络设备还会配置在PDCCH候选位置监听的DCI格式,例如,可以为DCI格式0_0、DCI格式1_0、DCI格式0_1、DCI格式1_1、DCI格式0_2、DCI格式1_2、DCI格式3_0、或DCI格式3_1等。示例性地,关于不同的DCI格式所对应的不同的使用如下面的表1所示,但是应理解,表1仅是示意,实际场景中DCI格式的种类可以更多或更少,在一些场景下,某DCI格式可以具有与表1中不同的使用。
如此,终端设备可以根据搜索空间集的配置信息来监听PDCCH。具体而言,终端设备可以基于搜索空间集的配置信息所包括的PDCCH监听周期和偏移、时隙内PDCCH监听图案等,在与搜索空间集关联的CORESET上进行PDCCH监听。
表1
Figure PCTCN2022118774-appb-000001
Figure PCTCN2022118774-appb-000002
可见,终端设备可以根据PDCCH监听周期,周期性地监听PDCCH。但是,在网络设备与终端设备之间不存在待传输业务时,终端设备的周期性监听会造成功耗浪费。为了达到节省终端功耗的目的,可以通过跳过PDCCH监听机制或者搜索空间集组切换机制来尽可能减少不必要的PDCCH监听。
跳过(skip)PDCCH监听机制
具体而言,网络设备可以通过DCI指示终端设备在接下来的一段时间内跳过PDCCH的监听(或者在一段时间内停止监听PDCCH,或者在一段时间内不监听PDCCH)。
图2示出了跳过PDCCH监听200的示意图。参见图2,假设在PDCCH监听时机210,终端设备通过监听PDCCH获取来自网络设备的DCI,且该DCI指示终端设备在接下来的一段时间(表示为Tskip)内跳过PDCCH的监听。那么在Tskip内的220-250处终端设备不监听PDCCH,而在经过Tskip之后在PDCCH监听时机260继续监听PDCCH。可理解,图2中的220-250是按照搜索空间集的配置信息确定的、被跳过监听的PDCCH监听时机。
另外,示例性地,被跳过的时间段(skipped duration)Tskip可以通过DCI指示,和/或通过无线资源控制(Radio Resource Control,RRC)信令配置或者协议预定义。例如,RRC信令可以配置多个被跳过的时间段的取值,并且通过DCI指示多个取值中的其中一个取值作为当前的被跳过的时间段。
应注意的是,跳过PDCCH监听包括跳过类型3公共搜索空间集上的PDCCH监听和用户设备专用搜索空间集上的PDCCH监听。对于其他类型的公共搜索空间集,例如,类型0、类型0A、类型1、类型2公共搜索空间集,终端设备可以跳过或不跳过C-RNTI、MCS-C-RNTI或CS-RNTI加扰的DCI的PDCCH监听,本公开的实施例不限定。对于类型0、类型0A、类型1、类型2公共搜索空间集,终端设备是否监听SI-RNTI、RA-RNTI、TC-RNTI或P-RNTI加扰的DCI的PDCCH,本公开的实施例不限定。
类型0和类型0A公共搜索空间集可以用于监听***信息-RNTI(System Information RNTI, SI-RNTI)加扰的DCI的PDCCH;类型1公共搜索空间集可以用于监听随机接入-RNTI(Random Access-RNTI,RA-RNTI)、消息B-RNTI(MessageB-RNTI,MsgB-RNTI)、或临时小区-RNTI(Temporary Cell-RNTI,TC-RNTI)加扰的DCI的PDCCH;类型2公共搜索空间集可以用于监听寻呼-RNTI(Paging-RNTI,P-RNTI)加扰的DCI的PDCCH。对于类型0、类型0A、类型1、类型2公共搜索空间集,在终端设备监听SI-RNTI、RA-RNTI、MsgB-RNTI、或P-RNTI加扰的DCI的PDCCH的时隙上,终端设备可以监听C-RNTI、MCS-C-RNTI或CS-RNTI加扰的DCI(DCI格式0_0和DCI格式1_0)的PDCCH。
如此,终端设备通过在时间段Tskip内跳过PDCCH监听,能够进入睡眠状态,而达到节省功耗的目的。
应注意的是,终端设备跳过PDCCH监听也可以被称为停止(stop)PDCCH监听、不监听PDCCH等,本公开的实施例对该术语不限定。
搜索空间集组(Search Space Set Group,SSSG)的切换机制
参照上述结合图1的部分,针对一个下行带宽部分(Band Width Part,BWP),网络设备可以为终端设备配置多个搜索空间集(SS set)。进一步地,可以将多个搜索空间集进行分组,例如分为2组或3组或更多组。
在被分组的情况下,搜索空间集的配置信息还可以包括该搜索空间集属于哪一个SSSG的指示信息。举例而言,假设一个下行BWP上的搜索空间集被分为2组,表示为SSSG0和SSSG1。那么可以指示搜索空间集是属于第一个组(SSSG0)还是属于第二个组(SSSG1)。举例而言,假设被分为3组,表示为SSSG0、SSSG1和SSSG2。那么可以指示搜索空间集是属于第一个组(SSSG0)、第二个组(SSSG1)还是第三个组(SSSG2)。这样,终端设备只需要根据所指示的SSSG中的搜索空间集来监听PDCCH,这样能够减小对PDCCH监听的次数等,从而降低功耗。可理解,某个搜索空间集可能同时属于两个或三个不同的SSSG。
可理解,对于没有被分组的SS set,终端设备仍按照SS set的配置信息监听PDCCH,本公开的实施例不限定。
图3示出了对一个下行BWP内4个搜索空间集进行分组300的示意图。参照图3,按照PDCCH监听周期的稀疏程度,可以将4个搜索空间集分为2组:SSSG0和SSSG1,其中SSSG0包括搜索空间集3和搜索空间集4,SSSG1包括搜索空间集1和搜索空间集2。
举例而言,假设终端设备被指示的搜索空间集组是SSSG1,那么终端设备可以根据属于SSSG1的搜索空间集1和搜索空间集2来监听PDCCH,而不需要根据搜索空间集3和搜索空间集4来监听PDCCH。由于属于SSSG1的搜索空间集的PDCCH监听周期更稀疏,因此能减少监听次数,降低功耗。
可选地,网络设备还可以指示终端设备切换搜索空间集组。作为示例,网络设备可以通过DCI中的比特域显式指示或者通过DCI隐式指示SSSG切换。
举例而言,假设搜索空间集被分为2组,SSSG0和SSSG1。显式指示的方式可以为:DCI中的特定比特域为“0”,指示终端设备根据属于SSSG0的搜索空间集来监听PDCCH;DCI中的特定比特域为“1”,指示终端设备根据属于SSSG1的搜索空间集来监听PDCCH。显式指示的方式或者还可以为:DCI中的特定比特域为“0”,指示终端设备根据属于当前SSSG的搜索空间集来监听PDCCH,即不切换SSSG;DCI中的特定比特域为“1”,指示终端设备进行SSSG切换(如果当前为SSSG0,则切换到SSSG1。或者如果当前为SSSG1,则切换到SSSG0),并根据属于切换后SSSG的搜索空间集来监听PDCCH。隐式指示的方式可以为: 当前监听PDCCH的SSSG为SSSG0,终端设备监听到特定的DCI或者任意DCI,则切换到SSSG1,或者,当前监听PDCCH的SSSG为SSSG1,终端设备监听到特定的DCI或者任意DCI,则切换到SSSG0。
再举例而言,假设所有的搜索空间集被分为3组,SSSG0、SSSG1和SSSG2。显式指示的方式可以为:DCI中的特定比特域为“00”,指示终端设备根据属于SSSG0的搜索空间集来监听PDCCH;DCI中的特定比特域为“01”,指示终端设备根据属于SSSG1的搜索空间集来监听PDCCH;DCI中的特定比特域为“10”,指示终端设备根据属于SSSG2的搜索空间集来监听PDCCH:DCI中的特定比特域“11”可以为预留。显式指示的方式或者还可以为:DCI中的特定比特域为“0”,指示终端设备根据属于当前SSSG的搜索空间集来监听PDCCH,即不切换SSSG;DCI中的特定比特域为“1”,指示终端设备进行SSSG切换,并根据属于切换后SSSG的搜索空间集来监听PDCCH,其中SSSG切换可以是:如果当前为SSSG0,则切换到SSSG1;如果当前为SSSG1,则切换到SSSG2;如果当前为SSSG2,则切换到SSSG0。隐式指示的方式可以为:当前监听PDCCH的SSSG为SSSGx,终端设备监听到特定的DCI或者任意DCI,则切换到SSSGy,协议可以预定义SSSGx和SSSGy,例如SSSGx为SSSG0,SSSGy为SSSG1。
可选地,终端设备也可以基于定时器来切换SSSG。
举例而言,假设搜索空间集被分为2组,SSSG0和SSSG1。终端设备根据属于当前SSSG(以SSSG1为例)的搜索空间集来监听PDCCH,并启动定时器。在该定时器到期后,切换到SSSG0,终端设备根据属于SSSG0的搜索空间集来监听PDCCH。
再举例而言,假设搜索空间集被分为3组,SSSG0、SSSG1和SSSG2。终端设备根据属于当前SSSG(以SSSG1为例)的搜索空间集来监听PDCCH,并启动定时器。在该定时器到期后,切换到SSSG2,终端设备根据属于SSSG2的搜索空间集来监听PDCCH,并重置定时器。在该定时器到期后,切换到SSSG0,终端设备根据属于SSSG0的搜索空间集来监听PDCCH。再例如,当终端设备根据属于SSSG1的搜索空间集来监听PDCCH,并启动定时器。在该定时器到期后,切换到SSSG0,终端设备根据属于SSSG0的搜索空间集来监听PDCCH。当终端设备根据属于SSSG2的搜索空间集来监听PDCCH,并启动定时器。在该定时器到期后,切换到SSSG0,终端设备根据属于SSSG0的搜索空间集来监听PDCCH。即无论终端设备当前根据SSSG1的搜索空间集还是根据SSSG2的搜索空间集来监听PDCCH,在定时器到期后,都切换到SSSG0。
应注意的是,根据属于某一个SSSG的搜索空间集来监听PDCCH是指,根据属于某一个SSSG的类型3公共搜索空间集和用户设备专用搜索空间集来监听PDCCH。相应地,可理解,对多个搜索空间集进行分组是指对类型3公共搜索空间集和用户设备专用搜索空间集进行分组。
如此,终端设备通过切换SSSG,在激活的下行BWP内能够仅根据部分搜索空间集进行PDCCH监听,而达到节省功耗的目的。
基于上述的跳过PDCCH监听机制和搜索空间集组的切换机制,可以定义终端设备监听PDCCH的多种不同的监听行为,例如可以为下述的第一候选监听行为至第五候选监听行为。
第一候选监听行为:根据配置的搜索空间集监听PDCCH。具体而言,可以根据搜索空间集的配置信息来监听PDCCH,其中搜索空间集的配置信息包括PDCCH监听周期。可以被理解为,跳过PDCCH监听机制没有被激活或者没有被应用。在激活的下行BWP上终端设备没 有被配置搜索空间集组,则终端设备可以按照激活的下行BWP上配置的搜索空间集来监听PDCCH。如果在激活的下行BWP上终端设备被配置了搜索空间集组,则终端设备可以根据属于当前SSSG的搜索空间集来监听PDCCH。
第二候选监听行为:在被跳过的时间段(skipped duration)内跳过(或停止)监听PDCCH。即跳过PDCCH监听机制。
第三候选监听行为:根据属于SSSG0的搜索空间集来监听PDCCH。具体而言,停止根据SSSG1和SSSG2(如果有SSSG2)的搜索空间集监听PDCCH。
第四候选监听行为:根据属于SSSG1的搜索空间集来监听PDCCH。具体而言,停止根据SSSG0和SSSG2(如果有SSSG2)的搜索空间集监听PDCCH。
第五候选监听行为:根据属于SSSG2的搜索空间集来监听PDCCH。具体而言,停止根据SSSG0和SSSG1的搜索空间集监听PDCCH。
在一些示例中,可以将第一候选监听行为表示为Behavior 1,将第二候选监听行为表示为Behavior 1A,将第三候选监听行为表示为Behavior 2,将第四候选监听行为表示为Behavior 2A,将第五候选监听行为表示为Behavior 2B。
终端设备可以根据第一候选监听行为至第五候选监听行为中的其中一种来监听PDCCH,但是目前缺乏一种有效地方案来指示终端设备如何确定具体的监听行为。如果5种候选监听行为可以被任意指示,则增加了终端设备的实现复杂度,却没有带来额外的好处。
有鉴于此,本公开的实施例提供了一种网络设备向终端设备配置监听组合的方案,终端设备能够基于所配置的监听组合指示来确定监听行为,进而有效地减少终端设备的功耗并且降低终端设备的实现复杂度。
图4示出了本公开实施例可实现在其中的通信***400的一个示意图。图4所示的***400包括终端设备410和网络设备420,并且终端设备410能够与网络设备420进行通信。
可理解的是,图4仅是示意,本公开的实施例对终端设备410的类型、网络设备420的类型、通信***400所使用的通信协议等不作限定。下面将结合图4所示的通信***400描述本公开的一些实施例。
图5示出了根据本公开的一些实施例的终端设备410与网络设备420之间的过程500的交互信令图。
网络设备420向终端设备410发送510第一监听组合指示信息,第一监听组合指示信息指示至少两种候选监听行为。
本公开的实施例中所涉及的候选监听行为包括第一候选监听行为、第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为。第一候选监听行为表示根据配置的搜索空间集监听PDCCH,第二候选监听行为表示在预设时间段内停止监听PDCCH,第三候选监听行为表示根据第一搜索空间集组中的搜索空间集监听PDCCH,第四候选监听行为表示根据第二搜索空间集组中的搜索空间集监听PDCCH,第五候选监听行为表示根据第三搜索空间集组中的搜索空间集监听PDCCH。
具体而言,第一监听组合指示信息所指示的监听组合可以为以下中的一项:第一监听组合、第二监听组合、第三监听组合、第四监听组合或者第五监听组合。在另一示例中,第一监听组合指示信息所指示的监听组合可以为以下中的一项:第一监听组合、第二监听组合、第四监听组合或者第五监听组合。
第一监听组合包括第一候选监听行为和第二候选监听行为。第二监听组合包括第二候选 监听行为、第三候选监听行为和第四候选监听行为。第三监听组合包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为。第四监听组合包括第三候选监听行为和第四候选监听行为。第五监听组合包括第三候选监听行为、第四候选监听行为和第五候选监听行为。
在本公开的实施例中,网络设备420可以通过RRC信令向终端设备410显式地或隐式地指示第一监听组合、第二监听组合、第三监听组合、第四监听组合或者第五监听组合。
具体地,网络设备420可以基于跳过PDCCH监听机制和搜索空间集组的切换机制来配置该第一监听组合指示信息。举例而言,如果在激活的下行BWP上终端设备410没有被配置搜索空间集组,则第一监听组合指示信息所指示的至少两种候选监听行为不包括第三候选监听行为、第四候选监听行为和第五候选监听行为。如果在激活的下行BWP上搜索空间集被分为两组,则第一监听组合指示信息所指示的至少两种候选监听行为不包括第五候选监听行为。
在一些实施例中,RRC信令中的特定参数可以作为第一监听组合指示信息,来指示第一监听组合、第二监听组合、第三监听组合、第四监听组合或者第五监听组合中的任一种监听组合。
举例而言,特定参数可以为PDCCH监听适应(PdcchMonitorAdaptation)参数,那么网络设备420可以通过该PdcchMonitorAdaptation指示监听组合。例如,
Figure PCTCN2022118774-appb-000003
“ENUMERATED”表示枚举。“Beh 1and1A”表示包括第一候选监听行为和第二候选监听行为的第一监听组合。“Beh 1Aand2and2A”表示包括第二候选监听行为、第三候选监听行为和第四候选监听行为的第二监听组合。“Beh 1Aand2and2Aand2B”表示包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为的第三监听组合。“Beh 2and2A”表示包括第三候选监听行为和第四候选监听行为的第四监听组合。“Beh 2and2Aand2B”表示包括第三候选监听行为、第四候选监听行为和第五候选监听行为的第五监听组合。
示例性地,该特定参数可以被包括在RRC的某个信元(Information Element,IE)中,例如被包括在PDCCH配置(PDCCH-Config)中,或者可以被包括在BWP下行链路专用(BWP-DownlinkDedicated)中,或者可以被包括在服务小区配置(ServingCellConfig)中。
可选地,在至少两种候选监听行为包括第二候选监听行为的情况下,网络设备420还可以进一步配置被跳过的时间段(skipped duration)。举例而言,网络设备420可以向终端设备410发送预设时间段的指示信息,从而终端设备410在预设时间段内停止监听PDCCH。可理解,预设时间段的指示信息可以被包括在PDCCH配置中,或者可以独立于PDCCH配置,本公开对此不限定。预设时间段的时间单元可以是秒、毫秒、帧、子帧、时隙、PDCCH监听时机的个数、或若干个连续时隙组成的时隙集合等,本公开对此不限定。
在一些实施例中,RRC信令可以直接通过列举的形式来配置至少两种候选监听行为,例如可以通过{参数1,参数2,…,参数N}的形式来配置,每一个参数对应一种候选监听行为。
具体而言,可以通过{Beh 1,Beh 1A}表示包括第一候选监听行为和第二候选监听行为的第一监听组合。通过{Beh 1A,Beh 2,Beh 2A}表示包括第二候选监听行为、第三候选监听行 为和第四候选监听行为的第二监听组合。通过{Beh 1A,Beh 2,Beh 2A,Beh 2B}表示包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为的第三监听组合。通过{Beh 2,Beh 2A}表示包括第三候选监听行为和第四候选监听行为的第四监听组合。通过{Beh 2,Beh 2A,Beh 2B}表示包括第三候选监听行为、第四候选监听行为和第五候选监听行为的第五监听组合。
在一些实施例中,网络设备420可以通过RRC信令中的第一特定参数和第二特定参数的结合来指示第一监听组合、第二监听组合、第三监听组合、第四监听组合或者第五监听组合中的任一种监听组合。
举例而言,第一特定参数可以为PDCCH监听适应(PdcchMonitorAdaptation),第二特定参数可以为搜索空间集组的数量(nrofSearchSpaceSetGroup)。例如,
Figure PCTCN2022118774-appb-000004
“ENUMERATED”表示枚举,“INTEGER”表示整数。
具体而言,PdcchMonitorAdaptation指示“PdcchSkipping”表示包括第一候选监听行为和第二候选监听行为的第一监听组合。
具体而言,PdcchMonitorAdaptation指示“PdcchSkippingAndSearchSpaceSetGroupSwitching”且nrofSearchSpaceSetGroup指示“2”表示包括第二候选监听行为、第三候选监听行为和第四候选监听行为的第二监听组合。或者可选地,PdcchMonitorAdaptation指示“PdcchSkippingAndSearchSpaceSetGroupSwitching”表示包括第二候选监听行为、第三候选监听行为和第四候选监听行为的第二监听组合。
具体而言,PdcchMonitorAdaptation指示“PdcchSkippingAndSearchSpaceSetGroupSwitching”且nrofSearchSpaceSetGroup指示“3”表示包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为的第三监听组合。
具体而言,PdcchMonitorAdaptation指示“SearchSpaceSetGroupSwitching”且nrofSearchSpaceSetGroup指示“2”表示包括第三候选监听行为和第四候选监听行为的第四监听组合。
具体而言,PdcchMonitorAdaptation指示“SearchSpaceSetGroupSwitching”且nrofSearchSpaceSetGroup指示“3”表示包括第三候选监听行为、第四候选监听行为和第五候选监听行为的第五监听组合。
可选地,在至少两种候选监听行为包括第二候选监听行为的情况下,网络设备420还可以进一步配置被跳过的时间段(skipped duration)。举例而言,网络设备420可以向终端设备410发送预设时间段的指示信息,从而终端设备410在预设时间段内停止监听PDCCH。可理解,预设时间段的指示信息可以被包括在PDCCH配置中,或者可以独立于PDCCH配置(如通过另一配置信息进行发送),本公开对此不限定。预设时间段的时间单元可以是秒、毫秒、帧、子帧、时隙、PDCCH监听时机的个数、或若干个连续时隙组成的时隙集合等,本公开对此不限定。
在一些实施例中,网络设备420可以通过RRC信令中的第三特定参数和第四特定参数的 结合来指示第一监听组合、第二监听组合、第三监听组合、第四监听组合或者第五监听组合中的任一种监听组合。
举例而言,第三特定参数可以指示停止PDCCH监听的被跳过的时间段(skipped duration)。第三特定参数可以被包括在PDCCH配置中,或者可以独立于PDCCH配置,本公开对此不限定。
举例而言,第四特定参数可以指示搜索空间集所属的SSSG的索引,其中,该索引可以为0、1、2中的至少一个。第四特定参数可以被包括在搜索空间集的配置信息中。以搜索空间集SS set 1为例,该搜索时空间集的配置信息可以包括第四特定参数,其指示该搜索空间集所属的SSSG的索引。
具体地,网络设备420配置了第三特定参数且没有配置第四特定参数,表示包括第一候选监听行为和第二候选监听行为的第一监听组合。网络设备420配置了第三特定参数且配置了第四特定参数,第四特定参数有0和1两种,表示包括第二候选监听行为、第三候选监听行为和第四候选监听行为的第二监听组合。网络设备420配置了第三特定参数且配置了第四特定参数,第四特定参数有0、1和2三种,表示包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为的第三监听组合。网络设备420配置了第四特定参数且没有配置第三特定参数,第四特定参数有0和1两种,表示包括第三候选监听行为和第四候选监听行为的第四监听组合。网络设备420配置了第四特定参数且没有配置第三特定参数,第四特定参数有0、1和2三种,表示包括第三候选监听行为、第四候选监听行为和第五候选监听行为的第五监听组合。
附加地或可选地,网络设备420还可以向终端设备410发送搜索空间集的配置信息,该搜索空间集的配置信息可以包括以下中的至少一项:搜索空间集的标识信息、与搜索空间集关联的控制资源集、PDCCH监听周期和偏移、时隙内PDCCH监听图案、持续时间、聚合等级以及各聚合等级对应的候选PDCCH的个数、和搜索空间集类型指示信息等。
可选地,在本公开的一些实施例中,第一监听组合指示信息可以指示第一BWP的监听组合。并且网络设备420还可以向终端设备410发送第二监听组合指示信息,该第二监听组合指示信息指示第二BWP的监听组合。第一监听组合指示信息所指示的可以为以下中的一项:第一监听组合、第二监听组合、第三监听组合、第四监听组合或者第五监听组合。第二监听组合指示信息所指示的可以为以下中的一项:第一监听组合、第二监听组合、第三监听组合、第四监听组合或者第五监听组合。可理解,尽管此处以两个BWP为例进行阐述,但是对于更多个BWP的情形也是适用的,例如可以针对每个BWP分别指示各自BWP的监听组合。相应地,第一候选监听行为表示在激活的下行BWP上根据配置的搜索空间集监听PDCCH,第二候选监听行为表示在激活的下行BWP上在预设时间段内停止监听PDCCH,第三候选监听行为表示在激活的下行BWP上根据第一搜索空间集组中的搜索空间集监听PDCCH,第四候选监听行为表示在激活的下行BWP上根据第二搜索空间集组中的搜索空间集监听PDCCH,第五候选监听行为表示在激活的下行BWP上根据第三搜索空间集组中的搜索空间集监听PDCCH。
在终端设备410被配置有多个BWP的情况下,可以为不同的BWP分别配置监听组合,并且可理解不同的BWP所配置的监听组合可以相同也可以不同。举例而言,网络设备420可以为属于同一小区的多个BWP配置相同的监听组合。
可选地,在本公开的一些实施例中,第一监听组合指示信息可以指示第一小区的监听组 合。并且网络设备420还可以向终端设备410发送第三监听组合指示信息,该第三监听组合指示信息指示第二小区的监听组合。在终端设备410被配置有多个小区的情况下,可以为不同的小区分别配置监听组合,并且可理解不同的小区所配置的监听组合可以相同也可以不同。举例而言,网络设备420可以为属于同一小区组的多个小区配置相同的监听组合。
可选地,在本公开的一些实施例中,第一监听组合指示信息可以指示第一小区组的监听组合。并且网络设备420还可以向终端设备410发送第四监听组合指示信息,该第四监听组合指示信息指示第二小区组的监听组合。在终端设备410被配置有多个小区组的情况下,可以为不同的小区组分别配置监听组合,并且可理解不同的小区组所配置的监听组合可以相同也可以不同。
如图5所示,附加地或可选地,终端设备410可以向网络设备420发送502支持的监听组合信息。
具体地,该支持的监听组合信息可以指示终端设备410所支持的监听组合,其中终端设备410所支持的监听组合可以包括第一监听组合、第二监听组合、第三监听组合、第四监听组合和第五监听组合中的至少一种监听组合。并且,相应地,网络设备420所发送的第一监听组合指示信息所指示的监听组合中的候选监听行为是终端设备410所支持的监听组合中的候选监听行为的子集或全集。支持的监听组合信息可以被包括在UE能力信息中或者被包括在UE辅助信息中。在另一示例中,终端设备410所支持的监听组合可以包括第一监听组合、第二监听组合、第四监听组合和第五监听组合中的至少一种监听组合。
在一些实施例中,可以通过UE能力信息或UE辅助信息中的第一参数来指示终端设备410所支持的监听组合。举例而言,第一参数可以为支持的PDCCH监听适应(supportedPdcchMonitoringAdaptation),例如,
Figure PCTCN2022118774-appb-000005
“ENUMERATED”表示枚举。“Beh 1and1A”表示包括第一候选监听行为和第二候选监听行为的第一监听组合。“Beh 1Aand2and2A”表示包括第二候选监听行为、第三候选监听行为和第四候选监听行为的第二监听组合。“Beh 1Aand2and2Aand2B”表示包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为的第三监听组合。“Beh 2and2A”表示包括第三候选监听行为和第四候选监听行为的第四监听组合。“Beh 2and2Aand2B”表示包括第三候选监听行为、第四候选监听行为和第五候选监听行为的第五监听组合。
在一些实施例中,UE能力信息或UE辅助信息可以直接通过列举的形式来指示终端设备410所支持的监听组合,例如可以通过{参数1,参数2,…,参数N}的形式来配置,每一个参数对应一种候选监听行为。
具体而言,可以通过{Beh 1,Beh 1A}表示包括第一候选监听行为和第二候选监听行为的第一监听组合。通过{Beh 1A,Beh 2,Beh 2A}表示包括第二候选监听行为、第三候选监听行为和第四候选监听行为的第二监听组合。通过{Beh 1A,Beh 2,Beh 2A,Beh 2B}表示包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为的第三监听组合。通过{Beh 2,Beh 2A}表示包括第三候选监听行为和第四候选监听行为的第四监听组合。通过{Beh 2,Beh 2A,Beh 2B}表示包括第三候选监听行为、第四候选监听行为和第五候选监 听行为的第五监听组合。
在一些实施例中,可以通过UE能力信息或UE辅助信息中的第二参数和第三参数的结合来指示终端设备410所支持的监听组合。举例而言,第二参数可以为支持的PDCCH监听适应(supportedPdcchMonitoringAdaptation),第三参数可以为支持的搜索空间集组的数量(supportedNrofSearchSpaceSetGroup)。例如,
Figure PCTCN2022118774-appb-000006
“ENUMERATED”表示枚举,“INTEGER”表示整数。
具体而言,supportedPdcchMonitoringAdaptation指示“PdcchSkipping”表示包括第一候选监听行为和第二候选监听行为的第一监听组合。
具体而言,supportedPdcchMonitoringAdaptation指示“PdcchSkippingAndSearchSpaceSetGroupSwitching”且supportedNrofSearchSpaceSetGroup指示“2”表示包括第二候选监听行为、第三候选监听行为和第四候选监听行为的第二监听组合。可选的,supportedPdcchMonitoringAdaptation指示“PdcchSkippingAndSearchSpaceSetGroupSwitching”表示包括第二候选监听行为、第三候选监听行为和第四候选监听行为的第二监听组合。
具体而言,supportedPdcchMonitoringAdaptation指示“PdcchSkippingAndSearchSpaceSetGroupSwitching”且supportedNrofSearchSpaceSetGroup指示“3”表示包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为的第三监听组合。
具体而言,supportedPdcchMonitoringAdaptation指示“SearchSpaceSetGroupSwitching”且supportedNrofSearchSpaceSetGroup指示“2”表示包括第三候选监听行为和第四候选监听行为的第四监听组合。
具体而言,supportedPdcchMonitoringAdaptation指示“SearchSpaceSetGroupSwitching”且supportedNrofSearchSpaceSetGroup指示“3”表示包括第三候选监听行为、第四候选监听行为和第五候选监听行为的第五监听组合。
可理解,网络设备420可以基于来自终端设备410的支持的监听组合信息,确定第一监听组合指示信息。并且随后,网络设备420可以将第一监听组合指示信息通过RRC信令发送到终端设备410。举例而言,可以从支持的监听组合信息所指示的监听组合中选择其中一种监听组合,并通过第一监听组合指示信息来指示所选择的监听组合。
在过程500中,网络设备420向终端设备410发送520DCI。
具体而言,终端设备410可以根据搜索空间集的配置信息确定PDCCH监听时机,进而可以在所确定的PDCCH监听时机上监听PDCCH。在某个PDCCH监听时机,终端设备410监听到来自网络设备420的DCI,该DCI被承载在PDCCH上。
该DCI可以用于指示终端设备410的监听行为,并且该指示的监听行为属于第一监听组 合指示信息中所包括的至少两种候选监听行为中的一种。
在过程500中,终端设备410可以基于第一监听组合指示信息和DCI,执行530PDCCH的监听行为。
附加地或可选地,终端设备410可以基于第一监听组合指示信息和DCI,从至少两个候选监听行为中确定522监听行为。
第一监听组合指示信息所指示的监听组合包括至少两个候选监听行为。可以基于DCI的具体值,从至少两个候选监听行为中选择与DCI的值对应的候选监听行为。
本公开的实施例中,DCI可以具有预定数量的比特,例如该预定数量的比特可以为1比特、2比特或更多比特。以该预定数量的比特是2比特为例,DCI可以具有四个不同的值:00、01、10和11。可理解,2比特可以是DCI中连续的两个比特,例如,同一个字段中的两个比特,或者可以是被间隔开的两个独立比特,例如,两个独立字段中分别有1比特,那么四个不同的值可以理解是由两个间隔开的独立比特所表示的值。
在一些实施例中,可以通过如下的表2所示的示例,来确定监听行为。例如,当第一监听组合指示信息指示第二监听组合且DCI为第一值时,确定监听行为为第二候选监听行为。当第一监听组合指示信息指示第五监听组合且DCI为第二值时,确定监听行为为第四候选监听行为。可选的,当第一监听组合指示信息指示第一监听组合,DCI为第二值、第三值或第四值的任一值,确定监听行为为第一候选监听行为。表2中示出的第一值、第二值、第三值和第四值互不相等。作为一例,第一值为00,第二值为01,第三值为10,第四值为11。但是本领域技术人员可理解,这仅是一个示例,其他的各种不同的示例可以在此基础上得到,依然属于本公开的保护范围。
表2
Figure PCTCN2022118774-appb-000007
应注意的是,表2示出的仅是本公开的一个示例。作为其他的示例,例如当第一监听组合指示信息指示第一监听组合时,可以通过DCI为第一值来指示第二候选监听行为,通过DCI为第二值来指示第一候选监听行为。或者,可以通过DCI为第二值来指示第二候选监听行为,通过DCI为第一值来指示第一候选监听行为。或者,可以通过DCI为第三值来指示第 二候选监听行为,通过DCI为第四值来指示第一候选监听行为。等等。这里不再一一罗列。
在另一些实施例中,在所确定的监听行为是第二候选监听行为时,可以使用固定的预设时间段(即被跳过的时间段),或者可以使用多个不同的预定时间段。作为一例,如下表3所示。
表3
Figure PCTCN2022118774-appb-000008
应注意,在表3中仅示出了第一监听组合指示信息所指示的是第一监听组合或第二监听组合的情形,对于其他的情形可以参照表2,并且可理解,表3仅是示意,可以在表3的基础上进行各种变型以得到其他的实施例。
在另一些实施例中,可以通过DCI的值与该RRC信令中的至少两种候选监听行为的位置或索引的一一对应关系来确定监听行为。在一些实施例中,RRC信令可以通过列举的形式来配置至少两种候选监听行为。例如,RRC信令配置的至少两种候选监听行为为{Beh 1A,Beh 2,Beh 2A}时,DCI为第一值对应第一个索引的候选监听行为,即第二候选监听行为Beh 1A;DCI为第二值对应第二个索引的候选监听行为,即第三候选监听行为Beh 2;DCI为第三值对应第三个索引的候选监听行为,即第四候选监听行为Beh 2A。作为一例,可以通过DCI的值与该RRC信令中至少两种候选监听行为的位置或索引的一对多的对应关系来确定监听行为。例如,RRC信令配置的至少两种候选监听行为为{Beh 1A,Beh 2,Beh 2A}时,DCI为第一值对应第一个索引的候选监听行为,即第二候选监听行为Beh 1A,且使用第一预设时间段;DCI为第二值对应第一个索引的候选监听行为,即第二候选监听行为Beh 1A,且使用第二预设时间段。DCI为第三值对应第二个索引的候选监听行为,即第三候选监听行为Beh 2;DCI为第四值对应第三个索引的候选监听行为,即第四候选监听行为Beh 2A。
可理解的是,终端设备410所确定的监听行为可以用于类型3公共搜索空间集和终端设备专用搜索空间集。举例而言,假设监听行为是第二候选监听行为,那么可以针对类型3公共搜索空间集和终端设备专用搜索空间集,在预设时间段内停止监听,在该预设时间段之后再监听PDCCH。对于其他类型的公共搜索空间集,例如,类型0、类型0A、类型1、类型2公共搜索空间集,终端设备410可以跳过或不跳过C-RNTI、MCS-C-RNTI或CS-RNTI加扰的DCI的PDCCH监听,本公开的实施例不限定。对于类型0、类型0A、类型1、类型2公共搜索空间集,终端设备是否监听SI-RNTI、RA-RNTI、TC-RNTI或P-RNTI加扰的DCI的PDCCH,本公开的实施例不限定。
在终端设备410被配置有多个BWP,为不同的BWP分别配置监听组合的情况下,DCI 还可以进一步指示BWP标识(Identifier,ID),终端设备410可以基于BWP ID对应的BWP的监听组合和上述实施例确定监听行为。
如此,本公开的实施例中,网络设备可以向终端设备配置监听组合,进而终端设备可以基于所配置的监听组合和来自网络设备的DCI来确定监听行为,终端设备通过执行该监听行为,能够减少对PDCCH的不必要监听,从而极大地降低了功耗。并且,通过本公开实施例中的监听组合的配置方式,实现了对于多种监听行为的合理组合,降低终端设备的实现复杂度。
应理解,在本公开的实施例中,“第一”,“第二”,“第三”等只是为了表示多个对象可能是不同的,但是同时不排除两个对象之间是相同的。“第一”,“第二”,“第三”等不应当解释为对本公开实施例的任何限制。
还应理解,本公开的实施例中的方式、情况、类别以及实施例的划分仅是为了描述的方便,不应构成特别的限定,各种方式、类别、情况以及实施例中的特征在符合逻辑的情况下,可以相互结合。
还应理解,上述内容只是为了帮助本领域技术人员更好地理解本公开的实施例,而不是要限制本公开的实施例的范围。本领域技术人员根据上述内容,可以进行各种修改或变化或组合等。这样的修改、变化或组合后的方案也在本公开的实施例的范围内。
还应理解,上述内容的描述着重于强调各个实施例之前的不同之处,相同或相似之处可以互相参考或借鉴,为了简洁,这里不再赘述。
图6示出了根据本公开的一些实施例的用于信息传输的通信装置600的一个示意框图。装置600可以被实现为终端设备410或者被实现为终端设备410的一部分(如芯片)等,本公开对此不限定。
如图6所述,装置600包括第一接收模块610、第二接收模块620和执行模块630。第一接收模块610被配置为接收来自网络设备的第一监听组合指示信息,第一监听组合指示信息指示至少两种候选监听行为。第二接收模块620被配置为接收来自网络设备的下行链路控制信息DCI,DCI指示通信装置的监听行为,监听行为是至少两种候选监听行为中的一种。执行模块630被配置为基于第一监听组合指示信息和DCI,执行下行链路控制信道PDCCH的监听行为。
具体地,在一些实施例中,第一接收模块610可以被配置为接收来自网络设备的第一监听组合指示信息,第一监听组合指示信息指示以下中的一项:第一监听组合,包括第一候选监听行为和第二候选监听行为,第二监听组合,包括第二候选监听行为、第三候选监听行为和第四候选监听行为,第三监听组合,包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为,第四监听组合,包括第三候选监听行为和第四候选监听行为,或第五监听组合,包括第三候选监听行为、第四候选监听行为和第五候选监听行为。第一候选监听行为表示根据配置的搜索空间集监听PDCCH,第二候选监听行为表示在预设时间段内停止监听PDCCH,第三候选监听行为表示根据第一搜索空间集组中的搜索空间集监听PDCCH,第四候选监听行为表示根据第二搜索空间集组中的搜索空间集监听PDCCH,第五候选监听行为表示根据第三搜索空间集组中的搜索空间集监听PDCCH。
在第一监听组合指示信息指示第一监听组合、第二监听组合或第三监听组合时,装置600还包括第三接收模块640,被配置为接收来自网络设备的预设时间段的指示信息。
附加地或可选地,装置600还可以包括确定模块650,被配置为基于DCI从至少两种候 选监听行为中确定监听行为。
在一些实施例中,第一监听组合指示信息指示第一带宽部分BWP的监听组合,并且第一接收模块610还被配置为接收来自网络设备的第二监听组合指示信息,第二监听组合指示信息指示第二BWP的监听组合。可选地,第一BWP的监听组合与第二BWP的监听组合相同。
在一些实施例中,第一监听组合指示信息指示第一小区的监听组合,并且第一接收模块610还被配置为接收来自网络设备的第三监听组合指示信息,第三监听组合指示信息指示第二小区的监听组合。可选地,第一小区的监听组合与第二小区的监听组合相同。
如图6所示,装置600还可以包括发送模块660,被配置为向网络设备发送支持的监听组合信息,支持的监听组合信息指示通信装置所支持的监听组合。
在一些实施例中,执行模块630所执行的监听行为用于类型3公共搜索空间集和终端设备专用搜索空间集。
本公开的实施例中对模块或单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时也可以有另外的划分方式,另外,在公开的实施例中的各功能单元可以集成在一个单元中,也可以是单独物理存在,也可以两个或两个以上单元集成为一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
图6中的装置600能够用于实现上述结合图5由终端设备410所述的各个过程,为了简洁,这里不再赘述。
图7示出了根据本公开的一些实施例的用于信息传输的通信装置700的一个示意框图。装置700可以被实现为网络设备420或者被实现为网络设备420的一部分(如芯片)等,本公开对此不限定。
如图7所示,装置700包括第一发送模块710和第二发送模块720。第一发送模块710被配置为向终端设备发送第一监听组合指示信息,第一监听组合指示信息指示至少两种候选监听行为。第二发送模块720被配置为向终端设备发送下行链路控制信息DCI,用于终端设备基于第一监听组合指示信息和DCI执行下行链路控制信道PDCCH的监听行为,监听行为是至少两种候选监听行为中的一种。
具体地,在一些实施例中,第一发送模块710可以被配置为向终端设备发送第一监听组合指示信息,第一监听组合指示信息指示以下中的一项:第一监听组合,包括第一候选监听行为和第二候选监听行为,第二监听组合,包括第二候选监听行为、第三候选监听行为和第四候选监听行为,第三监听组合,包括第二候选监听行为、第三候选监听行为、第四候选监听行为和第五候选监听行为,第四监听组合,包括第三候选监听行为和第四候选监听行为,或第五监听组合,包括第三候选监听行为、第四候选监听行为和第五候选监听行为。第一候选监听行为表示根据配置的搜索空间集监听PDCCH,第二候选监听行为表示在预设时间段内停止监听PDCCH,第三候选监听行为表示根据第一搜索空间集组中的搜索空间集监听PDCCH,第四候选监听行为表示根据第二搜索空间集组中的搜索空间集监听PDCCH,第五候选监听行为表示根据第三搜索空间集组中的搜索空间集监听PDCCH。
在第一监听组合指示信息指示第一监听组合、第二监听组合或第三监听组合时,装置700还包括第三发送模块730,被配置为向终端设备发送预设时间段的指示信息。
在一些实施例中,第一监听组合指示信息指示第一带宽部分BWP的监听组合,并且第一发送模块710还被配置为向终端设备发送第二监听组合指示信息,第二监听组合指示信息 指示第二BWP的监听组合。可选地,第一BWP的监听组合与第二BWP的监听组合相同。
在一些实施例中,第一监听组合指示信息指示第一小区的监听组合,并且第一发送模块710还被配置为:向终端设备发送第三监听组合指示信息,第三监听组合指示信息指示第二小区的监听组合。可选地,第一小区的监听组合与第二小区的监听组合相同。
如图7所示,装置700还可以包括接收模块740,被配置为接收来自终端设备的支持的监听组合信息,支持的监听组合信息指示终端设备所支持的监听组合,并且第一监听组合指示信息所指示的监听组合属于终端设备所支持的监听组合。
在一些实施例中,监听行为用于类型3公共搜索空间集和终端设备专用搜索空间集。
本公开的实施例中对模块或单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时也可以有另外的划分方式,另外,在公开的实施例中的各功能单元可以集成在一个单元中,也可以是单独物理存在,也可以两个或两个以上单元集成为一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
图7中的装置700能够用于实现上述结合图5由网络设备420所述的各个过程,为了简洁,这里不再赘述。
图8示出了可以用来实施本公开的实施例的示例设备800的示意性框图。设备800可以被实现为或者被包括在图4的终端设备410中,或者可以被实现为或者被包括在图4的网络设备420中。如图所示,设备800包括一个或多个处理器810,耦合到处理器810的一个或多个存储器820,以及耦合到处理器810的通信模块840。
通信模块840可以用于双向通信。通信模块840可以具有用于通信的至少一个通信接口。通信接口可以包括与其他设备通信所必需的任何接口。
处理器810可以是适合于本地技术网络的任何类型,并且可以包括但不限于以下至少一种:通用计算机、专用计算机、微控制器、数字信号处理器(Digital Signal Processor,DSP)、或基于控制器的多核控制器架构中的一个或多个。设备800可以具有多个处理器,例如专用集成电路芯片,其在时间上从属于与主处理器同步的时钟。
存储器820可以包括一个或多个非易失性存储器和一个或多个易失性存储器。非易失性存储器的示例包括但不限于以下至少一种:只读存储器(Read-Only Memory,ROM)824、可擦除可编程只读存储器(Erasable Programmable Read Only Memory,EPROM)、闪存、硬盘、光盘(Compact Disc,CD)、数字视频盘(Digital Versatile Disc,DVD)或其他磁存储和/或光存储。易失性存储器的示例包括但不限于以下至少一种:随机存取存储器(Random Access Memory,RAM)822、或不会在断电持续时间中持续的其他易失性存储器。
计算机程序830包括由关联处理器810执行的计算机可执行指令。程序830可以存储在ROM 824中。处理器810可以通过将程序830加载到RAM 822中来执行任何合适的动作和处理。
可以借助于程序830来实现本公开的实施例,使得设备800可以执行如参考图4至图6所讨论的任何过程。本公开的实施例还可以通过硬件或通过软件和硬件的组合来实现。
程序830可以有形地包含在计算机可读介质中,该计算机可读介质可以包括在设备800中(诸如在存储器820中)或者可以由设备800访问的其他存储设备。可以将程序830从计算机可读介质加载到RAM 822以供执行。计算机可读介质可以包括任何类型的有形非易失性存储器,例如ROM、EPROM、闪存、硬盘、CD、DVD等。
在一些实施例中,设备800中的通信模块840可以被实现为发送器和接收器(或收发器), 其可以被配置为发送/接收诸如第一监听组合指示信息、终端设备支持的监听组合信息等。另外,设备800还可以进一步包括调度器、控制器、射频/天线中的一个或多个,本公开不再详细阐述。
示例性地,图8中的设备800可以被实现为电子设备,或者可以被实现为电子设备中的芯片或芯片***,本公开的实施例对此不限定。
本公开的实施例还提供了一种芯片,该芯片可以包括输入接口、输出接口和处理电路。在本公开的实施例中,可以由输入接口和输出接口完成信令或数据的交互,由处理电路完成信令或数据信息的生成以及处理。
本公开的实施例还提供了一种芯片***,包括处理器,用于支持计算设备以实现上述任一实施例中所涉及的功能。在一种可能的设计中,芯片***还可以包括存储器,用于存储必要的程序指令和数据,当处理器运行该程序指令时,使得安装该芯片***的设备实现上述任一实施例中所涉及的方法。示例性地,该芯片***可以由一个或多个芯片构成,也可以包含芯片和其他分立器件。
本公开的实施例还提供了一种处理器,用于与存储器耦合,存储器存储有指令,当处理器运行所述指令时,使得处理器执行上述任一实施例中涉及的方法和功能。
本公开的实施例还提供了一种包含指令的计算机程序产品,其在计算机上运行时,使得计算机执行上述各实施例中任一实施例中涉及的方法和功能。
本公开的实施例还提供了一种计算机可读存储介质,其上存储有计算机指令,当处理器运行所述指令时,使得处理器执行上述任一实施例中涉及的方法和功能。
通常,本公开的各种实施例可以以硬件或专用电路、软件、逻辑或其任何组合来实现。一些方面可以用硬件实现,而其他方面可以用固件或软件实现,其可以由控制器,微处理器或其他计算设备执行。虽然本公开的实施例的各个方面被示出并描述为框图,流程图或使用一些其他图示表示,但是应当理解,本文描述的框,装置、***、技术或方法可以实现为,如非限制性示例,硬件、软件、固件、专用电路或逻辑、通用硬件或控制器或其他计算设备,或其某种组合。
本公开还提供有形地存储在非暂时性计算机可读存储介质上的至少一个计算机程序产品。该计算机程序产品包括计算机可执行指令,例如包括在程序模块中的指令,其在目标的真实或虚拟处理器上的设备中执行,以执行如上参考附图的过程/方法。通常,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、库、对象、类、组件、数据结构等。在各种实施例中,可以根据需要在程序模块之间组合或分割程序模块的功能。用于程序模块的机器可执行指令可以在本地或分布式设备内执行。在分布式设备中,程序模块可以位于本地和远程存储介质中。
用于实现本公开的方法的计算机程序代码可以用一种或多种编程语言编写。这些计算机程序代码可以提供给通用计算机、专用计算机或其他可编程的数据处理装置的处理器,使得程序代码在被计算机或其他可编程的数据处理装置执行的时候,引起在流程图和/或框图中规定的功能/操作被实施。程序代码可以完全在计算机上、部分在计算机上、作为独立的软件包、部分在计算机上且部分在远程计算机上或完全在远程计算机或服务器上执行。
在本公开的上下文中,计算机程序代码或者相关数据可以由任意适当载体承载,以使得设备、装置或者处理器能够执行上文描述的各种处理和操作。载体的示例包括信号、计算机可读介质、等等。信号的示例可以包括电、光、无线电、声音或其它形式的传播信号,诸如 载波、红外信号等。
计算机可读介质可以是包含或存储用于或有关于指令执行***、装置或设备的程序的任何有形介质。计算机可读介质可以是计算机可读信号介质或计算机可读存储介质。计算机可读介质可以包括但不限于电子的、磁的、光学的、电磁的、红外的或半导体***、装置或设备,或其任意合适的组合。计算机可读存储介质的更详细示例包括带有一根或多根导线的电气连接、便携式计算机磁盘、硬盘、随机存储存取器(RAM)、只读存储器(ROM)、可擦除可编程只读存储器(EPROM或闪存)、光存储设备、磁存储设备,或其任意合适的组合。
此外,尽管在附图中以特定顺序描述了本公开的方法的操作,但是这并非要求或者暗示必须按照该特定顺序来执行这些操作,或是必须执行全部所示的操作才能实现期望的结果。相反,流程图中描绘的步骤可以改变执行顺序。附加地或备选地,可以省略某些步骤,将多个步骤组合为一个步骤执行,和/或将一个步骤分解为多个步骤执行。还应当注意,根据本公开的两个或更多装置的特征和功能可以在一个装置中具体化。反之,上文描述的一个装置的特征和功能可以进一步划分为由多个装置来具体化。
以上已经描述了本公开的各实现,上述说明是示例性的,并非穷尽的,并且也不限于所公开的各实现。在不偏离所说明的各实现的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。本文中所用术语的选择,旨在很好地解释各实现的原理、实际应用或对市场中的技术的改进,或者使本技术领域的其他普通技术人员能理解本文公开的各个实现方式。

Claims (41)

  1. 一种信息传输方法,包括:
    终端设备接收来自网络设备的第一监听组合指示信息,所述第一监听组合指示信息指示至少两种候选监听行为;
    所述终端设备接收来自所述网络设备的下行链路控制信息DCI,所述DCI指示所述终端设备的监听行为,所述监听行为是所述至少两种候选监听行为中的一种;以及
    所述终端设备基于所述第一监听组合指示信息和所述DCI,执行下行链路控制信道PDCCH的监听行为。
  2. 根据权利要求1所述的方法,其中所述终端设备接收来自所述网络设备的第一监听组合指示信息包括:
    所述终端设备接收来自所述网络设备的第一监听组合指示信息,所述第一监听组合指示信息指示以下中的一项:
    第一监听组合,包括第一候选监听行为和第二候选监听行为,
    第二监听组合,包括所述第二候选监听行为、第三候选监听行为和第四候选监听行为,
    第三监听组合,包括所述第二候选监听行为、所述第三候选监听行为、所述第四候选监听行为和第五候选监听行为,
    第四监听组合,包括所述第三候选监听行为和所述第四候选监听行为,或
    第五监听组合,包括所述第三候选监听行为、所述第四候选监听行为和所述第五候选监听行为,并且
    其中所述第一候选监听行为表示根据配置的搜索空间集监听PDCCH,所述第二候选监听行为表示在预设时间段内停止监听PDCCH,所述第三候选监听行为表示根据第一搜索空间集组中的搜索空间集监听PDCCH,所述第四候选监听行为表示根据第二搜索空间集组中的搜索空间集监听PDCCH,所述第五候选监听行为表示根据第三搜索空间集组中的搜索空间集监听PDCCH。
  3. 根据权利要求2所述的方法,其中所述第一监听组合指示信息指示第一监听组合、第二监听组合或第三监听组合,并且其中所述方法还包括:
    所述终端设备接收来自所述网络设备的所述预设时间段的指示信息。
  4. 根据权利要求1至3中任一项所述的方法,还包括:
    所述终端设备基于所述DCI,从所述至少两种候选监听行为中确定所述监听行为。
  5. 根据权利要求1至4中任一项所述的方法,其中所述第一监听组合指示信息指示第一带宽部分BWP的监听组合,并且其中所述方法还包括:
    所述终端设备接收来自所述网络设备的第二监听组合指示信息,所述第二监听组合指示信息指示第二BWP的监听组合。
  6. 根据权利要求5所述的方法,其中所述第一BWP的监听组合与所述第二BWP的监听组合相同。
  7. 根据权利要求1至4中任一项所述的方法,其中所述第一监听组合指示信息指示第一小区的监听组合,并且其中所述方法还包括:
    所述终端设备接收来自所述网络设备的第三监听组合指示信息,所述第三监听组合指示信息指示第二小区的监听组合。
  8. 根据权利要求7所述的方法,其中所述第一小区的监听组合与所述第二小区的监听组合相同。
  9. 根据权利要求1至8中任一项所述的方法,还包括:
    所述终端设备向所述网络设备发送支持的监听组合信息,所述支持的监听组合信息指示所述终端设备所支持的监听组合。
  10. 根据权利要求1至9中任一项所述的方法,其中所述监听行为用于类型3公共搜索空间集和终端设备专用搜索空间集。
  11. 一种信息传输方法,包括:
    网络设备向终端设备发送第一监听组合指示信息,所述第一监听组合指示信息指示至少两种候选监听行为;以及
    所述网络设备向所述终端设备发送下行链路控制信息DCI,用于所述终端设备基于所述第一监听组合指示信息和所述DCI执行下行链路控制信道PDCCH的监听行为,所述监听行为是所述至少两种候选监听行为中的一种。
  12. 根据权利要求11所述的方法,其中所述网络设备向所述终端设备发送第一监听组合指示信息包括:
    所述网络设备向所述终端设备发送第一监听组合指示信息,所述第一监听组合指示信息指示以下中的一项:
    第一监听组合,包括第一候选监听行为和第二候选监听行为,
    第二监听组合,包括所述第二候选监听行为、第三候选监听行为和第四候选监听行为,
    第三监听组合,包括所述第二候选监听行为、所述第三候选监听行为、所述第四候选监听行为和第五候选监听行为,
    第四监听组合,包括所述第三候选监听行为和所述第四候选监听行为,或
    第五监听组合,包括所述第三候选监听行为、所述第四候选监听行为和所述第五候选监听行为,并且
    其中所述第一候选监听行为表示根据配置的搜索空间集监听PDCCH,所述第二候选监听行为表示在预设时间段内停止监听PDCCH,所述第三候选监听行为表示根据第一搜索空间集组中的搜索空间集监听PDCCH,所述第四候选监听行为表示根据第二搜索空间集组中的搜索空间集监听PDCCH,所述第五候选监听行为表示根据第三搜索空间集组中的搜索空间集监听PDCCH。
  13. 根据权利要求12所述的方法,其中所述第一监听组合指示信息指示第一监听组合、第二监听组合或第三监听组合,并且其中所述方法还包括:
    所述网络设备向所述终端设备发送所述预设时间段的指示信息。
  14. 根据权利要求11至13中任一项所述的方法,其中所述第一监听组合指示信息指示第一带宽部分BWP的监听组合,并且其中所述方法还包括:
    所述网络设备向所述终端设备发送第二监听组合指示信息,所述第二监听组合指示信息指示第二BWP的监听组合。
  15. 根据权利要求14所述的方法,其中所述第一BWP的监听组合与所述第二BWP的监听组合相同。
  16. 根据权利要求11至13中任一项所述的方法,其中所述第一监听组合指示信息指示第一小区的监听组合,并且其中所述方法还包括:
    所述网络设备向所述终端设备发送第三监听组合指示信息,所述第三监听组合指示信息指示第二小区的监听组合。
  17. 根据权利要求16所述的方法,其中所述第一小区的监听组合与所述第二小区的监听组合相同。
  18. 根据权利要求11至17中任一项所述的方法,还包括:
    所述网络设备接收来自所述终端设备的支持的监听组合信息,所述支持的监听组合信息指示所述终端设备所支持的监听组合,
    并且其中所述第一监听组合指示信息所指示的监听组合属于所述终端设备所支持的监听组合。
  19. 根据权利要求11至18中任一项所述的方法,其中所述监听行为用于类型3公共搜索空间集和终端设备专用搜索空间集。
  20. 一种通信装置,包括:
    第一接收模块,被配置为接收来自网络设备的第一监听组合指示信息,所述第一监听组合指示信息指示至少两种候选监听行为;
    第二接收模块,被配置为接收来自所述网络设备的下行链路控制信息DCI,所述DCI指示所述通信装置的监听行为,所述监听行为是所述至少两种候选监听行为中的一种;以及
    执行模块,被配置为基于所述第一监听组合指示信息和所述DCI,执行下行链路控制信道PDCCH的监听行为。
  21. 根据权利要求20所述的装置,其中所述第一接收模块被配置为接收来自所述网络设备的第一监听组合指示信息,所述第一监听组合指示信息指示以下中的一项:
    第一监听组合,包括第一候选监听行为和第二候选监听行为,
    第二监听组合,包括所述第二候选监听行为、第三候选监听行为和第四候选监听行为,
    第三监听组合,包括所述第二候选监听行为、所述第三候选监听行为、所述第四候选监听行为和第五候选监听行为,
    第四监听组合,包括所述第三候选监听行为和所述第四候选监听行为,或
    第五监听组合,包括所述第三候选监听行为、所述第四候选监听行为和所述第五候选监听行为,并且
    其中所述第一候选监听行为表示根据配置的搜索空间集监听PDCCH,所述第二候选监听行为表示在预设时间段内停止监听PDCCH,所述第三候选监听行为表示根据第一搜索空间集组中的搜索空间集监听PDCCH,所述第四候选监听行为表示根据第二搜索空间集组中的搜索空间集监听PDCCH,所述第五候选监听行为表示根据第三搜索空间集组中的搜索空间集监听PDCCH。
  22. 根据权利要求21所述的装置,其中所述第一监听组合指示信息指示第一监听组合、第二监听组合或第三监听组合,并且所述装置还包括第三接收模块,被配置为:
    接收来自所述网络设备的所述预设时间段的指示信息。
  23. 根据权利要求20至22中任一项所述的装置,还包括确定模块,被配置为:
    基于所述DCI,从所述至少两种候选监听行为中确定所述监听行为。
  24. 根据权利要求10至23中任一项所述的装置,其中所述第一监听组合指示信息指示第一带宽部分BWP的监听组合,并且其中所述第一接收模块还被配置为:
    接收来自所述网络设备的第二监听组合指示信息,所述第二监听组合指示信息指示第二 BWP的监听组合。
  25. 根据权利要求24所述的装置,其中所述第一BWP的监听组合与所述第二BWP的监听组合相同。
  26. 根据权利要求20至23中任一项所述的装置,其中所述第一监听组合指示信息指示第一小区的监听组合,并且其中所述第一接收模块还被配置为:
    接收来自所述网络设备的第三监听组合指示信息,所述第三监听组合指示信息指示第二小区的监听组合。
  27. 根据权利要求26所述的装置,其中所述第一小区的监听组合与所述第二小区的监听组合相同。
  28. 根据权利要求20至27中任一项所述的装置,还包括发送模块,被配置为:
    向所述网络设备发送支持的监听组合信息,所述支持的监听组合信息指示所述通信装置所支持的监听组合。
  29. 根据权利要求20至28中任一项所述的装置,其中所述监听行为用于类型3公共搜索空间集和终端设备专用搜索空间集。
  30. 一种通信装置,包括:
    第一发送模块,被配置为向终端设备发送第一监听组合指示信息,所述第一监听组合指示信息指示至少两种候选监听行为;以及
    第二发送模块,被配置为向所述终端设备发送下行链路控制信息DCI,用于所述终端设备基于所述第一监听组合指示信息和所述DCI执行下行链路控制信道PDCCH的监听行为,所述监听行为是所述至少两种候选监听行为中的一种。
  31. 根据权利要求30所述的装置,其中所述第一发送模块被配置为向所述终端设备发送第一监听组合指示信息,所述第一监听组合指示信息指示以下中的一项:
    第一监听组合,包括第一候选监听行为和第二候选监听行为,
    第二监听组合,包括所述第二候选监听行为、第三候选监听行为和第四候选监听行为,
    第三监听组合,包括所述第二候选监听行为、所述第三候选监听行为、所述第四候选监听行为和第五候选监听行为,
    第四监听组合,包括所述第三候选监听行为和所述第四候选监听行为,或
    第五监听组合,包括所述第三候选监听行为、所述第四候选监听行为和所述第五候选监听行为,并且
    其中所述第一候选监听行为表示根据配置的搜索空间集监听PDCCH,所述第二候选监听行为表示在预设时间段内停止监听PDCCH,所述第三候选监听行为表示根据第一搜索空间集组中的搜索空间集监听PDCCH,所述第四候选监听行为表示根据第二搜索空间集组中的搜索空间集监听PDCCH,所述第五候选监听行为表示根据第三搜索空间集组中的搜索空间集监听PDCCH。
  32. 根据权利要求31所述的装置,其中所述第一监听组合指示信息指示第一监听组合、第二监听组合或第三监听组合,并且其中所述装置还包括第三发送模块,被配置为:
    向所述终端设备发送所述预设时间段的指示信息。
  33. 根据权利要求30至32中任一项所述的装置,其中所述第一监听组合指示信息指示第一带宽部分BWP的监听组合,并且其中所述第一发送模块还被配置为:
    向所述终端设备发送第二监听组合指示信息,所述第二监听组合指示信息指示第二BWP 的监听组合。
  34. 根据权利要求33所述的装置,其中所述第一BWP的监听组合与所述第二BWP的监听组合相同。
  35. 根据权利要求30至32中任一项所述的装置,其中所述第一监听组合指示信息指示第一小区的监听组合,并且其中所述第一发送模块还被配置为:
    向所述终端设备发送第三监听组合指示信息,所述第三监听组合指示信息指示第二小区的监听组合。
  36. 根据权利要求35所述的装置,其中所述第一小区的监听组合与所述第二小区的监听组合相同。
  37. 根据权利要求30至36中任一项所述的装置,还包括接收模块,被配置为:
    接收来自所述终端设备的支持的监听组合信息,所述支持的监听组合信息指示所述终端设备所支持的监听组合,
    并且其中所述第一监听组合指示信息所指示的监听组合属于所述终端设备所支持的监听组合。
  38. 根据权利要求30至36中任一项所述的装置,其中所述监听行为用于类型3公共搜索空间集和终端设备专用搜索空间集。
  39. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现根据权利要求1至19中任一项所述的方法。
  40. 一种计算机程序产品,其特征在于,所述计算机程序产品上包含计算机可执行指令,所述计算机可执行指令在被执行时实现根据权利要求1至19中任一项所述的方法。
  41. 一种芯片,其特征在于,包括处理电路,被配置为执行根据权利要求1至19中任一项所述的方法。
PCT/CN2022/118774 2021-09-30 2022-09-14 信息传输方法及装置 WO2023051252A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP22874639.2A EP4401474A1 (en) 2021-09-30 2022-09-14 Information transmission method and apparatus
KR1020247013931A KR20240071409A (ko) 2021-09-30 2022-09-14 정보 전송 방법 및 장치
US18/621,980 US20240244639A1 (en) 2021-09-30 2024-03-29 Information transmission method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111159592.8 2021-09-30
CN202111159592.8A CN115915356A (zh) 2021-09-30 2021-09-30 信息传输方法及装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/621,980 Continuation US20240244639A1 (en) 2021-09-30 2024-03-29 Information transmission method and apparatus

Publications (1)

Publication Number Publication Date
WO2023051252A1 true WO2023051252A1 (zh) 2023-04-06

Family

ID=85729497

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/118774 WO2023051252A1 (zh) 2021-09-30 2022-09-14 信息传输方法及装置

Country Status (5)

Country Link
US (1) US20240244639A1 (zh)
EP (1) EP4401474A1 (zh)
KR (1) KR20240071409A (zh)
CN (1) CN115915356A (zh)
WO (1) WO2023051252A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110719645A (zh) * 2018-07-13 2020-01-21 维沃移动通信有限公司 一种信道检测指示方法、终端及网络设备
CN111757498A (zh) * 2019-03-29 2020-10-09 电信科学技术研究院有限公司 一种监听pdcch的方法及装置
CN113300789A (zh) * 2020-02-21 2021-08-24 大唐移动通信设备有限公司 信道监听及其控制方法及装置
CN113365358A (zh) * 2019-04-26 2021-09-07 维沃移动通信有限公司 一种信道监听方法、终端及网络设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110719645A (zh) * 2018-07-13 2020-01-21 维沃移动通信有限公司 一种信道检测指示方法、终端及网络设备
CN111757498A (zh) * 2019-03-29 2020-10-09 电信科学技术研究院有限公司 一种监听pdcch的方法及装置
CN113365358A (zh) * 2019-04-26 2021-09-07 维沃移动通信有限公司 一种信道监听方法、终端及网络设备
CN113300789A (zh) * 2020-02-21 2021-08-24 大唐移动通信设备有限公司 信道监听及其控制方法及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI ET AL.: "Remaining Issues on PDCCH based Power Saving", 3GPP TSG RAN WG1 MEETING #100BIS-E, R1-2001539, 11 April 2020 (2020-04-11), XP051875130 *

Also Published As

Publication number Publication date
EP4401474A1 (en) 2024-07-17
US20240244639A1 (en) 2024-07-18
KR20240071409A (ko) 2024-05-22
CN115915356A (zh) 2023-04-04

Similar Documents

Publication Publication Date Title
KR102212799B1 (ko) 제어 정보 검출 방법, 제어 정보 전송 방법 및 장치
US11997695B2 (en) Methods and apparatus for utilizing short transmission time intervals in a wireless communications network
US20230083399A1 (en) Signal communication method and device
WO2018166421A1 (zh) 传输控制信息的方法、设备和***
WO2021007759A1 (zh) 控制信道的传输方法、装置及存储介质
WO2021169979A1 (zh) 服务小区调度方法、终端设备和网络设备
US10708943B2 (en) Methods for configuring and receiving scheduling signaling and related devices
EP3972352A1 (en) Search space monitoring method and apparatus
US11190960B2 (en) Methods and apparatuses for control resource mapping
WO2018228537A1 (zh) 信息发送、接收方法及装置
EP3986055A1 (en) Communication method and apparatus
WO2018137700A1 (zh) 一种通信方法,装置及***
US10999037B2 (en) Method and device for transmitting downlink control information
WO2021097648A1 (zh) 检测物理下行控制信道pdcch的方法以及装置
WO2023051252A1 (zh) 信息传输方法及装置
EP4340277A1 (en) Method and apparatus for processing csi measurement resources, terminal and readable storage medium
WO2022111324A1 (zh) 一种数据处理方法及其设备
WO2019113946A1 (zh) 一种信道资源集的指示方法及装置、计算机存储介质
WO2022077351A1 (zh) 通信方法和通信装置
WO2022077524A1 (en) Dedicated resource configuration for transmission of demodulation reference signal
WO2022029983A1 (ja) 端末、基地局装置、及び受信方法
CN113839728A (zh) Dci检测方法、发送方法及相关设备
WO2021226938A1 (en) Downlink control monitoring operations in wireless communication
WO2022067860A1 (en) Ssb enhancement for nr cdrx and drx operation
WO2023098574A1 (zh) 一种传输指示方法及通信装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22874639

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2022874639

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2022874639

Country of ref document: EP

Effective date: 20240409

ENP Entry into the national phase

Ref document number: 20247013931

Country of ref document: KR

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE