WO2023159519A1 - 码本传输、接收确定方法和装置、通信装置和存储介质 - Google Patents

码本传输、接收确定方法和装置、通信装置和存储介质 Download PDF

Info

Publication number
WO2023159519A1
WO2023159519A1 PCT/CN2022/078085 CN2022078085W WO2023159519A1 WO 2023159519 A1 WO2023159519 A1 WO 2023159519A1 CN 2022078085 W CN2022078085 W CN 2022078085W WO 2023159519 A1 WO2023159519 A1 WO 2023159519A1
Authority
WO
WIPO (PCT)
Prior art keywords
codebook
bits
target
terminal
bit
Prior art date
Application number
PCT/CN2022/078085
Other languages
English (en)
French (fr)
Inventor
赵群
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN202280000478.7A priority Critical patent/CN114731506B/zh
Priority to PCT/CN2022/078085 priority patent/WO2023159519A1/zh
Publication of WO2023159519A1 publication Critical patent/WO2023159519A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information

Definitions

  • the present disclosure relates to the field of communication technologies, and in particular, to a codebook transmission method, a reception determination method, a codebook transmission device, and a reception determination device.
  • a communication device and a computer readable storage medium are examples of communication devices.
  • the current codebook is generated according to the Radio Network Temporary Identity (RTNI). For some terminals, if multiple RNTIs are supported, multiple codebooks will be generated and reported to the base station, which will cause excessive uplink overhead.
  • RTNI Radio Network Temporary Identity
  • the embodiments of the present disclosure propose a codebook transmission method, a reception determination method, a codebook transmission device, and a reception determination device.
  • a communication device and a computer-readable storage medium to solve technical problems in related technologies.
  • a codebook transmission method which is applicable to a terminal, and the method includes: determining a configured group wireless network temporary identifier G-RNTI; generating a code corresponding to the G-RNTI performing a bundling operation on the bits in the codebook to obtain a target codebook; and sending the target codebook to the network side device.
  • a reception determination method is proposed, which is applicable to network-side equipment, and the method includes: receiving the target codebook sent by the terminal, wherein the target codebook is for at least one G-RNTI It is obtained by bundling the bits in the corresponding codebook; according to the bits in the target codebook, it is determined whether the terminal corresponds to the PDSCH candidate for each bit in the codebook corresponding to the at least one G-RNTI Successfully decoded.
  • a codebook transmission device which is suitable for a terminal, and the device includes: a processing module configured to determine the configured group wireless network temporary identifier G-RNTI; generate the A codebook corresponding to the G-RNTI; performing a bundling operation on bits in the codebook to obtain a target codebook; a sending module configured to send the target codebook to a network side device.
  • a device for receiving and determining which is suitable for network-side equipment, and the device includes: a receiving module configured to receive a target codebook sent by a terminal, where the target codebook is Obtained by bundling the bits in the codebook corresponding to at least one G-RNTI; the processing module is configured to determine the terminal's corresponding to the at least one G-RNTI according to the bits in the target codebook Whether the PDSCH candidate corresponding to each bit in the codebook is successfully decoded.
  • a communication device including: a processor; a memory for storing a computer program; wherein, when the computer program is executed by the processor, the above codebook transmission method is implemented.
  • a communication device including: a processor; a memory for storing a computer program; wherein, when the computer program is executed by the processor, the above reception determination method is realized.
  • a computer-readable storage medium for storing a computer program, and when the computer program is executed by a processor, the steps in the above codebook transmission method are realized.
  • a computer-readable storage medium for storing a computer program, and when the computer program is executed by a processor, the steps in the above reception determination method are implemented.
  • the terminal after the terminal determines the configured G-RNTI and generates a codebook corresponding to each G-RNTI, it can perform a bundling operation on the bits in the codebook to obtain the target codebook (or called the final codebook), and then the terminal can send the obtained target codebook to the network side device.
  • the obtained target codebook can contain relatively fewer bits than the codebook before the bundling operation, and then the target codebook is transmitted to the network side device, relatively In order to transmit multiple codebooks corresponding to multiple G-RNTIs to the network side equipment, it is beneficial to save uplink resources.
  • Fig. 1 is a schematic flowchart of a codebook transmission method according to an embodiment of the present disclosure.
  • Fig. 2A is a schematic flowchart of another codebook transmission method according to an embodiment of the present disclosure.
  • Fig. 2B is a schematic diagram showing a bundling operation according to an embodiment of the present disclosure.
  • Fig. 3 is a schematic flowchart of another codebook transmission method according to an embodiment of the present disclosure.
  • Fig. 4 is a schematic flow chart showing another codebook transmission method according to an embodiment of the present disclosure.
  • Fig. 5A is a schematic flow chart showing another codebook transmission method according to an embodiment of the present disclosure.
  • Fig. 5B is a schematic diagram showing another binding operation according to an embodiment of the present disclosure.
  • Fig. 6 is a schematic flow chart showing another codebook transmission method according to an embodiment of the present disclosure.
  • Fig. 7 is a schematic flowchart of another codebook transmission method according to an embodiment of the present disclosure.
  • Fig. 8 is a schematic diagram showing another binding operation according to an embodiment of the present disclosure.
  • Fig. 9 is a schematic flow chart showing another codebook transmission method according to an embodiment of the present disclosure.
  • Fig. 10 is a schematic flow chart showing another codebook transmission method according to an embodiment of the present disclosure.
  • Fig. 11 is a schematic flowchart of a method for determining reception according to an embodiment of the present disclosure.
  • Fig. 12 is a schematic flowchart of another reception determination method according to an embodiment of the present disclosure.
  • Fig. 13 is a schematic flow chart showing another reception determination method according to an embodiment of the present disclosure.
  • Fig. 14 is a schematic flow chart showing another reception determination method according to an embodiment of the present disclosure.
  • Fig. 15 is a schematic flow chart showing another reception determination method according to an embodiment of the present disclosure.
  • Fig. 16 is a schematic flow chart showing another reception determination method according to an embodiment of the present disclosure.
  • Fig. 17 is a schematic flow chart showing another reception determination method according to an embodiment of the present disclosure.
  • Fig. 18 is a schematic block diagram of a codebook transmission device according to an embodiment of the present disclosure.
  • Fig. 19 is a schematic block diagram of an apparatus for determining reception according to an embodiment of the present disclosure.
  • Fig. 20 is a schematic block diagram of an apparatus for receiving determination according to an embodiment of the present disclosure.
  • Fig. 21 is a schematic block diagram of an apparatus for codebook transmission according to an embodiment of the present disclosure.
  • first, second, third, etc. may use the terms first, second, third, etc. to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another.
  • a first indication may also be called a second indication, and similarly, a second indication may also be called a first indication.
  • the word "if” as used herein may be interpreted as “at” or “when” or "in response to a determination.”
  • the terms used herein are “greater than” or “less than”, “higher than” or “lower than” when representing a size relationship. But for those skilled in the art, it can be understood that the term “greater than” also covers the meaning of “greater than or equal to”, and “less than” also covers the meaning of “less than or equal to”; the term “higher than” covers the meaning of “higher than or equal to”. “The meaning of "below” also covers the meaning of "less than or equal to”.
  • Fig. 1 is a schematic flowchart of a codebook transmission method according to an embodiment of the present disclosure.
  • the codebook transmission method shown in this embodiment can be applied to terminals, and the terminals include but are not limited to mobile phones, tablet computers, wearable devices, sensors, Internet of Things devices (such as NB-IoT (Narrow Band Internet of Things, Narrow Band Internet of Things), MTC (Machine Type Communication, machine type communication), eMTC (EnhanceMachine Type Communication, enhanced machine type communication)) and other communication devices.
  • the terminal can communicate with network-side equipment, and the network-side equipment includes but is not limited to network-side equipment in communication systems such as 4G, 5G, and 6G, such as base stations and core networks.
  • the codebook transmission method may include the following steps:
  • step S101 determine the configured group wireless network temporary identifier G-RNTI
  • step S102 generate a codebook corresponding to the G-RNTI
  • step S103 a bundling operation is performed on bits in the codebook to obtain a target codebook
  • step S104 the target codebook is sent to the network side device.
  • the network side device can configure one or more G-RNTIs for the terminal, and the terminal can generate a corresponding codebook according to each G-RNTI, and the codebook can include Type 1 (Type-1) code Book.
  • a codebook can include one or more bits, and 1 bit corresponds to a M_ac, wherein, M_ac can represent a physical downlink shared channel PDSCH (Physical Downlink Shared CHannel) candidate (candidate), and the bit corresponding to the PDSCH candidate , which can be used as Hybrid Automatic Repeat reQuest (HARQ) information to indicate whether the PDSCH candidate is successfully received (received and successfully decoded).
  • PDSCH Physical Downlink Shared CHannel
  • HARQ Hybrid Automatic Repeat reQuest
  • the value of the bit when the value of the bit is 1, it is used to indicate that the HARQ-ACK is confirmed by the HARQ, and when the value of the bit is 0, it is used to indicate that the HARQ-NACK is not confirmed by the HARQ.
  • the relationship between the value of the bit and the indicated content can be adjusted as needed, and is not limited to the above situation.
  • the value of the bit when the value of the bit is 0, it can indicate HARQ-ACK.
  • 1, HARQ-NACK can be indicated.
  • the following embodiments are mainly described as examples in the case that a bit value of 1 indicates HARQ-ACK, and a bit value of 0 indicates HARQ-NACK.
  • the terminal after the terminal determines the configured G-RNTI and generates a codebook corresponding to each G-RNTI, it can perform a bundling operation on the bits in the codebook to obtain the target codebook (or called the final codebook), and then the terminal can send the obtained target codebook to the network side device.
  • the obtained target codebook can contain relatively fewer bits than the codebook before the bundling operation, and then the target codebook is transmitted to the network side device, relatively In order to transmit multiple codebooks corresponding to multiple G-RNTIs to the network side equipment, it is beneficial to save uplink resources.
  • the bundling operation includes a logical AND operation.
  • the bundling operation can be performed for bits in different codebooks, or for different bits in the same codebook. For example, logical AND operations can be performed on multiple bits for bundling operations, that is, when the values of these bits are all 1, the result is 1, as long as the value of any one of these bits is is 0, then the result is 0.
  • the following two examples are mainly illustrated for performing bundling operations on bits in different codebooks and performing bundling operations on different bits in the same codebook.
  • Fig. 2A is a schematic flowchart of another codebook transmission method according to an embodiment of the present disclosure. As shown in FIG. 2A, the bundling operation of the bits in the codebook to obtain the target codebook includes:
  • step S201 corresponding bits in at least two codebooks are bundled to obtain a target codebook.
  • the bundling operation may be performed on corresponding bits in at least two codebooks, where the corresponding bits refer to bits with the same sequence position in different codebooks.
  • the terminal For example, taking three codebooks as an example, the terminal generates codebook 1 according to G-RNTI1, generates codebook 2 according to G-RNTI2, and generates codebook 3 according to G-RNTI3.
  • Fig. 2B is a schematic diagram showing a bundling operation according to an embodiment of the present disclosure.
  • codebook 1 is ⁇ 1110110111 ⁇
  • codebook 2 is ⁇ 01111111111 ⁇
  • codebook 3 is ⁇ 1111111110 ⁇ , which can be used for the i-th bit in codebook 1 and the i-th bit in codebook 2 bit and the i-th bit in the codebook 3 are bundled, and the obtained value is 0, which is used as the value of the i-th bit in the target codebook, and i is an integer greater than or equal to 1 and less than or equal to n.
  • the target codebook obtained through the bundling operation is ⁇ 0110110110 ⁇ .
  • a target codebook can be obtained by performing a bundling operation on at least two codebooks, and the number of bits contained in the target codebook is less than the number of bits contained in the at least two codebooks. and. Therefore, when the terminal sends the target codebook to the network side device, compared with sending at least two codebooks before the bundling operation, the occupation of uplink resources can be effectively reduced.
  • Fig. 3 is a schematic flowchart of another codebook transmission method according to an embodiment of the present disclosure. As shown in Figure 3, the method also includes:
  • step S301 in response to the number of bits contained in at least two codebooks is different, determine the first codebook that contains the largest number of bits;
  • step S302 the bits included in the other codebooks are supplemented according to the number of bits in the first codebook, wherein the supplemented bits are used to indicate HARQ-ACK confirmation by HARQ.
  • the three codebooks shown in Figure 2B contain the same number of bits, so all the bits contained in each codebook have corresponding bits relative to the bits in other codebooks, then it can be Perform bundling operations on the corresponding bits.
  • At least two codebooks that need to be bundled contain different numbers of bits.
  • the first codebook that contains the largest number of bits among at least two codebooks can be determined first, and then the second codebook that contains the number of bits different from the first codebook can be determined. book, then the second number of bits included in the second codebook is less than the first number of bits included in the first codebook.
  • Bits can be supplemented for the second codebook, for example, according to the number of bits in the first codebook, the bits contained in other codebooks are supplemented, so that the second number is added to the first number, for example, the first number is 10, the second number is 8, then 2 bits can be supplemented for the second codebook. Accordingly, it can be ensured that the number of bits contained in the second codebook and the first codebook after supplementing the bits is the same, so that the bits in the second codebook have the same number of bits as the bits in the first codebook. Corresponding bits, then the binding operation can be performed on the corresponding bits.
  • the supplementary bits may be set before, after, or between the bits originally contained in the second codebook as required, and specifically may be set as required.
  • the supplementary bit may be set to indicate HARQ-ACK. Since the second codebook originally does not include supplementary bits, for the second codebook, the supplementary bits do not correspond to PDSCH candidates. If this bit is set to indicate HARQ-NACK, then the bundling The results obtained by the operation have adverse effects.
  • codebook 1 is ⁇ 1110110111 ⁇ and codebook 4 is ⁇ 01101101 ⁇ .
  • codebook 4 if two bits are added after codebook 4, and these two bits are used to indicate HARQ -NACK, then codebook 4 is ⁇ 0110110100 ⁇ , after bundling the bits in codebook 1 and codebook 4, the target codebook is ⁇ 0110110100 ⁇ , which is the last two bits bit is 0.
  • the last two bits of codebook 1 are 1, indicating HARQ-ACK, that is, the terminal successfully decodes the PDSCH corresponding to the two bits of the PDSCH candidate, but because the last two bits of the target codebook are 0, It will cause the network side device to mistakenly think that the terminal has not successfully decoded the PDSCH candidates corresponding to these two bits to obtain the PDSCH, thus causing erroneous retransmission (retransmission).
  • the supplemented codebook 4 is ⁇ 0110110111 ⁇ .
  • the obtained target codebook is ⁇ 0110110111 ⁇ , that is The last two bits are 1. Accordingly, it can be ensured that the network-side device can accurately determine the PDSCH corresponding to the PDSCH candidate in the last two bits of the terminal to obtain the PDSCH through successful decoding according to the target codebook, so as to avoid erroneous retransmission.
  • Fig. 4 is a schematic flow chart showing another codebook transmission method according to an embodiment of the present disclosure. As shown in Figure 4, the method also includes:
  • step S401 receiving a first indication sent by the network side device
  • step S402 a codebook for performing a bundling operation is determined according to the first indication.
  • the network side device may send the first indication to the terminal, which is used to indicate the codebook for performing the bundling operation.
  • the first indication sent to the terminal includes the G-RNTI corresponding to the codebook for the bundling operation, so that the terminal determines that the codebook corresponding to the G-RNTI indicated by the first indication needs to be bundled.
  • the corresponding codebook is not bundled. Accordingly, it is beneficial for the network side device to flexibly control the bundling operation so as to meet real-time needs.
  • the network side device can instruct the terminal to perform a bundling operation on codebook 1 and codebook 2 through the first indication, then the terminal can use the bit in codebook 1 Bits and bits in codebook 2 are bundled to obtain a target codebook, and then the target codebook and codebook 3 are sent to the network side device.
  • Fig. 5A is a schematic flow chart showing another codebook transmission method according to an embodiment of the present disclosure. As shown in FIG. 5A, the bundling operation of the bits in the codebook to obtain the target codebook includes:
  • step S501 at least two bits in the same codebook are bundled to obtain the target codebook.
  • At least two bits located in the same codebook can be bundled to obtain the target codebook, wherein the at least two bits can include adjacent bits in the codebook , may also include non-adjacent bits in the codebook.
  • the following embodiments mainly illustrate that at least two bits include adjacent bits in the codebook.
  • Fig. 5B is a schematic diagram showing another binding operation according to an embodiment of the present disclosure.
  • codebook 1 is ⁇ 1110110111 ⁇
  • codebook 2 is ⁇ 01111111111 ⁇
  • codebook 3 is ⁇ 1111111110 ⁇ .
  • step S501 can be respectively performed for the three codebooks, and then three target codebooks can be obtained.
  • the bits in a codebook every N bits can be bundled, and N can be understood as the granularity of the bundling operation.
  • the first bit and the second bit can be bundled, and the obtained value is 1; the third bit and the fourth bit Bits are bundled, and the obtained value is 0; the 5th bit and the 6th bit are bundled, and the obtained value is 1; the 7th bit and the 8th bit are bundled, and the obtained value is The value of is 0; the value of 1 is obtained by bundling the 9th bit with the 10th bit.
  • the target codebook ⁇ 10101 ⁇ corresponding to codebook 1 is obtained.
  • the target codebook ⁇ 01111 ⁇ corresponding to codebook 2 and the target codebook ⁇ 11110 ⁇ corresponding to codebook 3 can be obtained.
  • the obtained three target codebooks may be sent to the network side device.
  • the target codebook obtained by bundling at least two bits in the same codebook contains fewer bits than the codebook before the bundling operation. Therefore, compared with sending the codebook before the bundling operation, the terminal sends the target codebook to the network side device, which can effectively reduce the occupation of uplink resources.
  • Fig. 6 is a schematic flow chart showing another codebook transmission method according to an embodiment of the present disclosure. As shown in Figure 6, the method also includes:
  • step S601 receiving a second indication sent by the network side device
  • step S602 the number of bits to be bundled is determined according to the second indication.
  • the network side device may send a second indication to the terminal, which is used to indicate the number of bits for bundling operations, which may also be described as granularity. Therefore, the terminal can determine how many bits to perform the bundling operation according to the instruction of the network side device, and accordingly, it is beneficial for the network side device to flexibly control the bundling operation so as to meet real-time needs.
  • the second instruction sent to the terminal includes that the number of bits for the bundling operation is 5, then for the above codebook 1, the first bit to the fifth bit can be bundled, and the obtained value is 0; The 6th bit to the 10th bit are bundled to obtain a value of 0.
  • the target codebook ⁇ 00 ⁇ corresponding to codebook 1 is obtained.
  • Fig. 7 is a schematic flowchart of another codebook transmission method according to an embodiment of the present disclosure. As shown in Figure 7, the method also includes:
  • step S701 receiving a third indication sent by the network side device
  • step S702 it is determined whether to perform a bundling operation on the bits in the codebook according to the third indication to obtain the target codebook.
  • the network side device may send a third indication to the terminal, for controlling the terminal to enable or disable the function of bundling bits in the codebook.
  • the third indication may be shown in Table 1 below:
  • the third indication can include 1 bit. When the value of this bit is 0, it can instruct the terminal to disable the function of bundling the bits in the codebook; when the value of this bit is 1, it can instruct the terminal Enables the function of bundling bits in the codebook.
  • the network side device instructs the terminal to enable the function of bundling the bits in the codebook through the third indication information, then the terminal can perform the bundling operation on the bits in the codebook according to the above embodiment, and send the bundling operation to the network side device The target codebook obtained after;
  • the network side device instructs the terminal to disable the function of bundling the bits in the codebook through the third indication information, then the terminal does not perform the bundling operation on the bits in the codebook, but directly sends the codebook corresponding to each G-RNTI to the network side device.
  • the network side device to flexibly control whether the terminal performs a binding operation, so as to meet real-time needs.
  • the third indication information may be carried in the same information as the first indication information in the foregoing embodiment, or may be carried in the same information as the second indication information in the foregoing embodiment, or may be carried independently in a piece of information. information; similarly, the first indication information and the second indication information may also be carried in the same information, or carried in different information.
  • the information used to carry the first indication information, the second indication information, and the third indication information includes but not limited to RRC (Radio Resource Control, radio resource control) signaling.
  • the RRC signaling may include 2 bits, then 4 situations may be indicated.
  • 00 indicates case 1: perform bundling operations on codebooks corresponding to G-RNTI1, G-RNTI2, and G-RNTI3;
  • 01 indicates case 2: perform bundling operations on codebooks corresponding to G-RNTI1 and G-RNTI2;
  • 10 indicates case 3: performing bundling operations on codebooks corresponding to G-RNTI1 and G-RNTI3;
  • 11 indicates case 4: the codebooks corresponding to different G-RNTIs are not bundled; in this case, the terminal can use the method shown in the above-mentioned embodiment 5A to combine at least Two bits are bundled to obtain the target codebook, or not bundled.
  • the specific operation to be performed can be agreed upon as required.
  • the bundling the bits in the codebook to obtain the target codebook includes:
  • a bundling operation is performed on the bits in the codebook to obtain the target codebook.
  • the target bit used to indicate the HARQ-NACK in the codebook may indicate that the terminal has not successfully received the PDSCH in the PDSCH candidate corresponding to the target bit.
  • the target bit in the codebook is not set to indicate HARQ-NACK because the PDSCH candidate corresponding to the target bit does not receive the PDSCH successfully, then the base station uses the target bit and It cannot be accurately determined whether the PDSCH candidate corresponding to the target bit of the terminal successfully receives the PDSCH.
  • the terminal can regard it as indicating HARQ-ACK, and then perform the above bundling operation, so that the base station can Relatively accurately determine whether the terminal successfully receives the PDSCH in the PDSCH candidate corresponding to the target bit.
  • the target reason includes at least one of the following:
  • the target downlink control information DCI (Downlink Control Information) is not detected, wherein the target DCI is used to schedule the target physical downlink shared channel PDSCH corresponding to the target bit; or
  • the time slot indicated by the K1 value in the target DCI is not a time slot used for HARQ-ACK transmission.
  • the terminal expects to receive the PDSCH on the PDSCH candidate corresponding to the target bit, and in order to receive the PDSCH, it needs to receive the target DCI for scheduling the PDSCH. But when the terminal does not receive the target DCI, the terminal will set the target bit to indicate HARQ-NACK, but this is not because the PDSCH candidate corresponding to the target bit has not successfully received the PDSCH. This will result in that the base station cannot accurately determine whether the PDSCH candidate corresponding to the target bit of the terminal successfully receives the PDSCH according to the target bit.
  • this embodiment regards the target bit as indicating the HARQ-ACK and then performs the bundling operation, so that the base station can relatively accurately determine whether the terminal's PDSCH candidate corresponding to the target bit is successful or not based on the result of bundling the target bit.
  • Receive PDSCH Receive PDSCH.
  • Fig. 8 is a schematic diagram showing another binding operation according to an embodiment of the present disclosure.
  • codebook 1, codebook 2, and codebook 3 in the above embodiment are still taken as examples, where the value of the fourth bit in codebook 1 is 0, which is used to indicate HARQ-NACK,
  • the reason why the terminal sets the value of this bit to 0 is that the terminal has not detected the target DCI used to schedule the PDSCH corresponding to the bit (for example, the network side device has not sent the PDSCH corresponding to the bit). DCI).
  • the target codebook is ⁇ 0110110110 ⁇ , where the fourth bit is 0.
  • the network-side device will consider the PDSCH corresponding to the 4th bit of the terminal for G-RNTI1, G-RNTI2, and G-RNTI3 according to the value of the 4th bit. The candidate fails to receive the PDSCH.
  • the terminal successfully receives the PDSCH for the PDSCH candidates corresponding to the 4th bit of G-RNTI2 and G-RNTI3, and does not fail to receive the PDSCH for the PDSCH candidate corresponding to the 4th bit of G-RNTI1. It is just that the DCI for scheduling the PDSCH corresponding to the fourth bit is not detected. It can be seen that this will cause the network side device to wrongly determine the success or failure of the terminal receiving the PDSCH at the PDSCH candidate corresponding to the target bit according to the target codebook, and then cause the network side device to wrongly retransmit the PDSCH.
  • the value of the fourth bit can be regarded as 1, that is, as indicating HARQ-ACK, and then bundled with the bits in codebook 2 and codebook 3, then the obtained target code This is ⁇ 0111110110 ⁇ , it can be seen that the fourth bit is 1.
  • the network-side device After sending the target codebook to the network-side device, the network-side device will consider that the PDSCH candidates corresponding to the 4th bit of G-RNTI1, G-RNTI2, and G-RNTI3 receive PDSCH according to the value of the 4th bit. Success means that the base station can relatively accurately determine whether the terminal's PDSCH candidate corresponding to the target bit successfully receives the PDSCH according to the result of bundling the target bit, so as to avoid erroneous retransmission of the PDSCH.
  • the DCI (such as the target DCI in the above embodiment) may carry a K1 value (value), which is used to indicate the time slot for transmitting the HARQ-ACK.
  • K1 value value
  • the terminal will send the HARQ The message is set to HARQ-NACK, which will cause the terminal to set the target bit corresponding to the HARQ message in the codebook to indicate HARQ-NACK, which will cause the base station to accurately determine the target bit of the terminal according to the target bit. Whether the PDSCH candidate successfully receives the PDSCH.
  • the K1 value indicates the HARQ-ACK transmission
  • the time slot is the kth time slot, but the terminal transmits the HARQ information corresponding to the 4th bit on the k'th (not equal to k) time slot, thus setting the 4th bit as NACK.
  • the target codebook is ⁇ 0110110110 ⁇ , where the fourth bit is 0.
  • the network-side device will consider the PDSCH corresponding to the 4th bit of the terminal for G-RNTI1, G-RNTI2, and G-RNTI3 according to the value of the 4th bit. The candidate fails to receive the PDSCH.
  • the terminal successfully receives the PDSCH for the PDSCH candidates corresponding to the 4th bit of G-RNTI2 and G-RNTI3, and does not fail to receive the PDSCH for the PDSCH candidate corresponding to the 4th bit of G-RNTI1. It is only because the time slot for transmitting HARQ information is not the time slot for transmitting HARQ-ACK indicated by the K1 value in the DCI. It can be seen that this will cause the network side device to wrongly determine the success or failure of the terminal receiving the PDSCH at the PDSCH candidate corresponding to the target bit according to the target codebook, and then cause the network side device to wrongly retransmit the PDSCH.
  • the value of the fourth bit can be regarded as 1, that is, as the case indicating HARQ-ACK, and then bundled with the bits in codebook 2 and codebook 3, then the obtained
  • the target codebook is ⁇ 0111110110 ⁇ , it can be seen that the fourth bit is 1.
  • the network-side device After sending the target codebook to the network-side device, the network-side device will consider that the PDSCH candidates corresponding to the 4th bit of G-RNTI1, G-RNTI2, and G-RNTI3 receive PDSCH according to the value of the 4th bit. Success means that the base station can relatively accurately determine whether the terminal's PDSCH candidate corresponding to the target bit successfully receives the PDSCH according to the result of bundling the target bit, so as to avoid erroneous retransmission of the PDSCH.
  • Fig. 9 is a schematic flow chart showing another codebook transmission method according to an embodiment of the present disclosure. As shown in Figure 9, the method also includes:
  • step S901 determine the codebook corresponding to the unicast PDSCH
  • the bundling operation of the bits in the codebook to obtain the target codebook includes:
  • step S902 a bundling operation is performed on the bits in the codebook corresponding to the G-RNTI and the bits in the codebook corresponding to the unicast PDSCH to obtain the target codebook.
  • the G-RNTI can be indicated to a terminal performing a multicast (also called multicast) service (MBS, Multicast Broadcast Service), and the bits in the Type-1 codebook corresponding to the G-RNTI can be It is used to indicate the success or failure of MBS PDSCH reception.
  • MBS multicast
  • Multicast Broadcast Service Multicast Broadcast Service
  • the object of the bundling operation in this embodiment may not be limited to the codebook corresponding to the G-RNTI, and may also be applicable to the codebook corresponding to the unicast PDSCH (such as a Type-1 codebook), that is, the codebook corresponding to the unicast PDSCH may be
  • the codebook corresponding to the unicast PDSCH may be
  • the bits in the book are bundled with the bits in the codebook corresponding to the G-RNTI to obtain the target codebook. Accordingly, the total number of bits in the codebook to be transmitted can be further reduced, which is beneficial to further reduce the uplink overhead.
  • Fig. 10 is a schematic flow chart showing another codebook transmission method according to an embodiment of the present disclosure. As shown in Figure 10, the method also includes:
  • step S1001 receiving retransmission scheduling information sent by the network side device
  • step S1002 in response to determining that the PDSCH scheduled by the retransmission scheduling information has been successfully decoded, the retransmission scheduling information is ignored.
  • the network side device can determine the success or failure of the terminal to receive the PDSCH according to the bits in the codebook. Retransmission can be performed, but in order for the terminal to receive the retransmitted PDSCH, retransmission scheduling information needs to be sent first, so that the terminal can determine resources for receiving the retransmitted PDSCH.
  • the target codebook reported by the terminal is obtained by bundling codebooks corresponding to the G-RNTI, although the total number of bits in the codebook is reduced, the accuracy of the indication will also be reduced.
  • the first bit in codebook 1 and codebook 3 is 1, that is, the terminal corresponds to G-RNTI1 and G-RNTI3 in the first bit of PDSCH candidates have successfully received PDSCH.
  • the first bit in the target codebook after bundling is also 0, and the network side device will consider that the terminal targets G-RNTI1 and G-RNTI3, the PDSCH candidate corresponding to the first bit fails to receive the PDSCH, resulting in retransmission of the PDSCH, and sends scheduling information to the terminal, indicating resources for retransmission of the PDSCH.
  • the terminal itself can determine that for G-RNTI1 and G-RNTI3, the PDSCH candidate corresponding to the first bit has successfully received the PDSCH, so after receiving the PDSCH corresponding to the first bit of G-RNTI1 and G-RNTI3
  • the retransmission scheduling information can be ignored to avoid repeatedly receiving the successfully received PDSCH, and the terminal will not combine the transmission block (Transmission Block, TB) in the PDSCH retransmitted by the network side device with the Transport blocks in the PDSCH that have been successfully received are combined for decoding.
  • the retransmission scheduling information of the PDSCH on the PDSCH candidate corresponding to the first bit in the G-RNTI2 it can be parsed normally, and the corresponding retransmission PDSCH can be received.
  • Fig. 11 is a schematic flowchart of a method for determining reception according to an embodiment of the present disclosure.
  • the reception determination method shown in this embodiment can be applied to network-side devices, which can communicate with terminals, and the network-side devices include but are not limited to base stations in communication systems such as 4G base stations, 5G base stations, and 6G base stations.
  • the terminals include but are not limited to mobile phones, tablet computers, wearable devices, sensors, Internet of Things devices (such as NB-IoT, MTC, eMTC) and other communication devices.
  • the reception determination method may include the following steps:
  • step S1101 the target codebook sent by the terminal is received, wherein the target codebook is obtained by bundling bits in the codebook corresponding to at least one G-RNTI;
  • step S1102 determine whether the terminal successfully decodes the PDSCH candidate corresponding to each bit in the codebook corresponding to the at least one G-RNTI according to the bits in the target codebook.
  • the network side device can configure one or more G-RNTIs for the terminal, and the terminal can generate a corresponding codebook according to each G-RNTI, and the codebook can include Type 1 (Type-1) code Book.
  • a codebook may include one or more bits, and 1 bit corresponds to a M_ac, wherein, M_ac may represent a physical downlink shared channel PDSCH (Physical Downlink Shared CHannel) candidate (candidate), and the bit corresponding to the PDSCH candidate , which can be used as Hybrid Automatic Repeat reQuest (HARQ) information to indicate whether the PDSCH candidate is successfully received (received and successfully decoded).
  • PDSCH Physical Downlink Shared CHannel
  • HARQ Hybrid Automatic Repeat reQuest
  • the value of the bit when the value of the bit is 1, it is used to indicate that the HARQ-ACK is confirmed by the HARQ, and when the value of the bit is 0, it is used to indicate that the HARQ-NACK is not confirmed by the HARQ.
  • the relationship between the value of the bit and the indicated content can be adjusted as needed, and is not limited to the above situation.
  • the value of the bit when the value of the bit is 0, it can indicate HARQ-ACK.
  • 1, HARQ-NACK can be indicated.
  • the following embodiments are mainly described as examples in the case that a bit value of 1 indicates HARQ-ACK, and a bit value of 0 indicates HARQ-NACK.
  • the terminal after the terminal determines the configured G-RNTI and generates a codebook corresponding to each G-RNTI, it can perform a bundling operation on the bits in the codebook to obtain the target codebook (or called the final codebook), and then the terminal can send the obtained target codebook to the network side device.
  • the obtained target codebook can contain relatively fewer bits than the codebook before the bundling operation, and then the target codebook is transmitted to the network side device, relatively In order to transmit multiple codebooks corresponding to multiple G-RNTIs to the network side equipment, it is beneficial to save uplink resources.
  • the bundling operation includes a logical AND operation.
  • the bundling operation can be performed for bits in different codebooks, or for different bits in the same codebook. For example, logical AND operations can be performed on multiple bits for bundling operations, that is, when the values of these bits are all 1, the result is 1, as long as the value of any one of these bits is is 0, then the result is 0.
  • the network side device may instruct the terminal to upload the codebook corresponding to each G-RNTI, or upload the target codebook obtained after the bundling operation.
  • the network side device instructs the terminal to upload the target codebook obtained after the bundling operation, after receiving the target codebook, it can determine that the target codebook is obtained by bundling each G-RNTI, so that the target codebook can be obtained according to the target codebook
  • the bits in the book determine whether the terminal successfully decodes the PDSCH candidate corresponding to each bit in the codebook corresponding to at least one G-RNTI (that is, the codebook used to generate the target codebook corresponds to the G-RNTI).
  • Fig. 12 is a schematic flowchart of another reception determination method according to an embodiment of the present disclosure.
  • the target codebook is obtained by bundling corresponding bits in at least two codebooks;
  • the determining whether the terminal successfully decodes the PDSCH candidate corresponding to each bit in the codebook corresponding to the at least one G-RNTI according to the bits in the target codebook includes:
  • step S1201 determine whether the terminal successfully decodes the PDSCH candidates corresponding to the corresponding bits in the at least two codebooks according to the bits in the target codebook.
  • the network side device may instruct the terminal to perform the binding operation, for example, the binding operation may be performed in the manner shown in FIG. 2B , or the binding operation may be performed in the manner shown in FIG. 5B .
  • Fig. 13 is a schematic flow chart showing another reception determination method according to an embodiment of the present disclosure. As shown in Figure 13, the method also includes:
  • step S1301 a first indication is sent to the terminal, which is used to indicate a codebook for a bundling operation.
  • the network side device may send the first indication to the terminal, which is used to indicate the codebook for performing the bundling operation.
  • the first indication sent to the terminal includes the G-RNTI corresponding to the codebook for the bundling operation, so that the terminal determines that the codebook corresponding to the G-RNTI indicated by the first indication needs to be bundled.
  • the corresponding codebook is not bundled. Accordingly, it is beneficial for the network side device to flexibly control the bundling operation so as to meet real-time needs.
  • the network side device can instruct the terminal to perform a bundling operation on codebook 1 and codebook 2 through the first indication, then the terminal can use the bit in codebook 1 Bits and bits in codebook 2 are bundled to obtain a target codebook, and then the target codebook and codebook 3 are sent to the network side device.
  • Fig. 14 is a schematic flow chart showing another reception determination method according to an embodiment of the present disclosure.
  • the target codebook is obtained by bundling at least two bits in the same codebook, and the bundling operation is performed on the bits in the codebook to obtain the target Codebooks include:
  • the determining whether the terminal successfully decodes the PDSCH candidate corresponding to each bit in the codebook corresponding to the at least one G-RNTI according to the bits in the target codebook includes:
  • step S1401 determine whether the terminal successfully decodes the PDSCH candidate corresponding to at least two bits in the at least one codebook according to the bits in the target codebook.
  • the network side device may instruct the terminal to perform the binding operation, for example, the binding operation may be performed in the manner shown in FIG. 2B , or the binding operation may be performed in the manner shown in FIG. 5B .
  • the network side device determines the Whether the terminal successfully decodes the PDSCH candidate corresponding to the at least two bits in the at least one codebook.
  • Fig. 15 is a schematic flow chart showing another reception determination method according to an embodiment of the present disclosure. As shown in Figure 15, the method also includes:
  • step S1501 a second indication is sent to the terminal, which is used to indicate the number of bits for bundling operations.
  • the network side device may send a second indication to the terminal, which is used to indicate the number of bits for bundling operations, which may also be described as granularity. Therefore, the terminal can determine how many bits to perform the bundling operation according to the instruction of the network side device, and accordingly, it is beneficial for the network side device to flexibly control the bundling operation so as to meet real-time needs.
  • the second instruction sent to the terminal includes that the number of bits for the bundling operation is 5, then for the above codebook 1, the first bit to the fifth bit can be bundled, and the obtained value is 0; The 6th bit to the 10th bit are bundled to obtain a value of 0.
  • the target codebook ⁇ 00 ⁇ corresponding to codebook 1 is obtained.
  • Fig. 16 is a schematic flow chart showing another reception determination method according to an embodiment of the present disclosure. As shown in Figure 16, the method also includes:
  • step S1601 a third indication is sent to the terminal, which is used to indicate whether to perform a bundling operation on bits in the codebook to obtain the target codebook.
  • the network side device may send a third indication to the terminal, for controlling the terminal to enable or disable the function of bundling bits in the codebook.
  • the third indication may be as shown in Table 1 above.
  • the third indication can include 1 bit. When the value of this bit is 0, it can instruct the terminal to disable the function of bundling the bits in the codebook; when the value of this bit is 1, it can instruct the terminal Enables the function of bundling bits in the codebook.
  • the network side device instructs the terminal to enable the function of bundling the bits in the codebook through the third indication information, then the terminal can perform the bundling operation on the bits in the codebook according to the above embodiment, and send the bundling operation to the network side device The target codebook obtained after;
  • the network side device instructs the terminal to disable the function of bundling the bits in the codebook through the third indication information, then the terminal does not perform the bundling operation on the bits in the codebook, but directly sends the codebook corresponding to each G-RNTI to the network side device.
  • the network side device to flexibly control whether the terminal performs a binding operation, so as to meet real-time needs.
  • the third indication information may be carried in the same information as the first indication information in the foregoing embodiment, or may be carried in the same information as the second indication information in the foregoing embodiment, or may be carried independently in a piece of information. information; similarly, the first indication information and the second indication information may also be carried in the same information, or carried in different information.
  • the information used to carry the first indication information, the second indication information, and the third indication information includes but not limited to RRC (Radio Resource Control, radio resource control) signaling.
  • the RRC signaling may include 2 bits, then 4 situations may be indicated.
  • 00 indicates case 1: perform bundling operations on codebooks corresponding to G-RNTI1, G-RNTI2, and G-RNTI3;
  • 01 indicates case 2: perform bundling operations on codebooks corresponding to G-RNTI1 and G-RNTI2;
  • 10 indicates case 3: performing bundling operations on codebooks corresponding to G-RNTI1 and G-RNTI3;
  • 11 indicates case 4: the codebooks corresponding to different G-RNTIs are not bundled; in this case, the terminal can use the method shown in the above-mentioned embodiment 5A to combine at least Two bits are bundled to obtain the target codebook, or not bundled.
  • the specific operation to be performed can be agreed upon as required.
  • the target codebook is obtained by bundling the bits in the codebook corresponding to the G-RNTI and the bits in the codebook corresponding to the C-RNTI;
  • the determining whether the terminal successfully decodes the PDSCH candidate corresponding to each bit in the codebook corresponding to the at least one G-RNTI according to the bits in the target codebook includes:
  • the G-RNTI can be indicated to a terminal performing a multicast (also called multicast) service (MBS, Multicast Broadcast Service), and the bits in the Type-1 codebook corresponding to the G-RNTI can be It is used to indicate the success or failure of MBS PDSCH reception.
  • MBS multicast
  • Multicast Broadcast Service Multicast Broadcast Service
  • the object of the bundling operation in this embodiment may not be limited to the codebook corresponding to the G-RNTI, and may also be applicable to the codebook corresponding to the unicast PDSCH (such as a Type-1 codebook), that is, the codebook corresponding to the unicast PDSCH may be
  • the codebook corresponding to the unicast PDSCH may be
  • the bits in the book are bundled with the bits in the codebook corresponding to the G-RNTI to obtain the target codebook. Accordingly, the total number of bits in the codebook to be transmitted can be further reduced, which is beneficial to further reduce the uplink overhead.
  • the network side device can determine the bits in the codebook corresponding to the G-RNTI and the bits in the codebook corresponding to the unicast PDSCH for the terminal according to the bits in the target codebook Whether the corresponding PDSCH candidate is successfully decoded.
  • Fig. 17 is a schematic flow chart showing another reception determination method according to an embodiment of the present disclosure. As shown in Figure 17, the method also includes:
  • step S1701 in response to determining that the terminal has not successfully decoded the PDSCH candidate corresponding to the first bit in the codebook corresponding to the at least one G-RNTI, send retransmission scheduling information to the terminal, for scheduling The PDSCH retransmission is performed on the PDSCH candidate corresponding to the first bit.
  • the network side device can determine the success or failure of the terminal to receive the PDSCH according to the bits in the codebook. Retransmission can be performed, but in order for the terminal to receive the retransmitted PDSCH, retransmission scheduling information needs to be sent first, so that the terminal can determine resources for receiving the retransmitted PDSCH.
  • the terminal after determining that the terminal has not successfully decoded the PDSCH candidate corresponding to the first bit in the codebook corresponding to the at least one G-RNTI, send retransmission scheduling information to the terminal, which is used to schedule the PDSCH candidate corresponding to the first bit PDSCH retransmission is performed on the PDSCH candidates.
  • the present disclosure also provides embodiments of the codebook transmission device and the reception determination device.
  • Fig. 18 is a schematic block diagram of a codebook transmission device according to an embodiment of the present disclosure.
  • the codebook transmission device shown in this embodiment can be applied to terminals, including but not limited to mobile phones, tablet computers, wearable devices, sensors, Internet of Things devices (such as NB-IoT, MTC, eMTC) and other communication devices.
  • the terminal can communicate with network-side equipment, and the network-side equipment includes but is not limited to network-side equipment in communication systems such as 4G, 5G, and 6G, such as base stations and core networks.
  • the codebook transmission device may include
  • the processing module 1801 is configured to determine the configured group wireless network temporary identifier G-RNTI; generate a codebook corresponding to the G-RNTI; perform a bundling operation on bits in the codebook to obtain a target codebook;
  • the sending module 1802 is configured to send the target codebook to the network side device.
  • the bundling operation includes a logical AND operation.
  • the processing module is configured to perform a bundling operation on corresponding bits in at least two codebooks to obtain a target codebook.
  • the processing module is further configured to determine the first codebook containing the largest number of bits among the at least two codebooks;
  • the second number of bits included in the first codebook is adjusted according to the first number
  • the bits contained in the two codebooks are supplemented, wherein the supplemented bits are used to indicate the hybrid automatic repeat request confirmation HARQ-ACK.
  • the device also includes:
  • the first receiving module is configured to receive the first indication sent by the network side device
  • the processing module is further configured to determine a codebook for bundling according to the first indication.
  • the processing module is configured to perform a bundling operation on at least two bits located in the same codebook to obtain the target codebook.
  • the device also includes:
  • the second receiving module is configured to receive the second indication sent by the network side device
  • processing module is further configured to determine the number of bits for bundling according to the second indication.
  • the device also includes:
  • a third receiving module configured to receive a third indication sent by the network side device
  • the processing module is further configured to determine whether to perform a bundling operation on the bits in the codebook to obtain the target codebook according to the third indication.
  • the processing module is further configured to determine a codebook corresponding to the unicast PDSCH;
  • the processing module is configured to perform a bundling operation on the bits in the codebook corresponding to the G-RNTI and the bits in the codebook corresponding to the unicast PDSCH to obtain the target codebook.
  • the device also includes:
  • the fourth receiving module is configured to receive retransmission scheduling information sent by the network side device
  • the processing module is further configured to ignore the retransmission scheduling information in response to determining that the PDSCH scheduled by the retransmission scheduling information has been successfully decoded.
  • Fig. 19 is a schematic block diagram of an apparatus for determining reception according to an embodiment of the present disclosure.
  • the device for determining reception shown in this embodiment can be applied to network-side equipment that can communicate with terminals, and the network-side equipment includes but is not limited to base stations in communication systems such as 4G base stations, 5G base stations, and 6G base stations.
  • the terminals include but are not limited to communication devices such as mobile phones, tablet computers, wearable devices, sensors, and Internet of Things devices (such as NB-IoT, MTC, and eMTC).
  • the receiving determining means may include:
  • the receiving module 1901 is configured to receive the target codebook sent by the terminal, where the target codebook is obtained by bundling bits in the codebook corresponding to at least one G-RNTI;
  • the processing module 1902 is configured to determine, according to the bits in the target codebook, whether the terminal successfully decodes the PDSCH candidate corresponding to each bit in the codebook corresponding to the at least one G-RNTI.
  • the bundling operation includes a logical AND operation.
  • the target codebook is obtained by bundling corresponding bits in at least two codebooks
  • the processing module is configured to determine, according to the bits in the target codebook, whether the terminal successfully decodes the PDSCH candidates corresponding to the corresponding bits in the at least two codebooks.
  • the device also includes:
  • the first sending module is configured to send a first indication to the terminal, which is used to indicate a codebook for performing a bundling operation.
  • the target codebook is obtained by bundling at least two bits in the same codebook, and the bundling operation is performed on the bits in the codebook to obtain the target Codebooks include:
  • the processing module is configured to determine whether the terminal successfully decodes the PDSCH candidate corresponding to at least two bits in the at least one codebook according to the bits in the target codebook.
  • the device also includes:
  • the second sending module is configured to send a second indication to the terminal, which is used to indicate the number of bits for bundling operations.
  • the device also includes:
  • a third sending module configured to send a third indication to the terminal, for indicating whether to perform a bundling operation on bits in the codebook to obtain the target codebook.
  • the target codebook is obtained by bundling the bits in the codebook corresponding to the G-RNTI and the bits in the codebook corresponding to the C-RNTI;
  • the processing module is configured to determine, according to the bits in the target codebook, that the terminal corresponds to the bits in the codebook corresponding to the G-RNTI and the bits in the codebook corresponding to the unicast PDSCH Whether the PDSCH candidate was successfully decoded.
  • the device also includes:
  • the fourth sending module is configured to send retransmission scheduling information to the terminal in response to determining that the terminal has not successfully decoded the PDSCH candidate corresponding to the first bit in the codebook corresponding to the at least one G-RNTI, using The PDSCH retransmission is scheduled on the PDSCH candidate corresponding to the first bit.
  • the device embodiment since it basically corresponds to the method embodiment, for the related parts, please refer to the part of the description of the method embodiment.
  • the device embodiments described above are only illustrative, and the modules described as separate components may or may not be physically separated, and the components shown as modules may or may not be physical modules, that is, they may be located in One place, or it can be distributed to multiple network modules. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment. It can be understood and implemented by those skilled in the art without creative effort.
  • An embodiment of the present disclosure also proposes a communication device, including: a processor; a memory for storing a computer program; wherein, when the computer program is executed by the processor, the codebook transmission described in any of the above-mentioned embodiments is realized method.
  • An embodiment of the present disclosure also proposes a communication device, including: a processor; a memory for storing a computer program; wherein, when the computer program is executed by the processor, the reception determination method described in any of the above-mentioned embodiments is implemented .
  • Embodiments of the present disclosure also provide a computer-readable storage medium for storing a computer program, and when the computer program is executed by a processor, the steps in the codebook transmission method described in any of the foregoing embodiments are implemented.
  • Embodiments of the present disclosure also provide a computer-readable storage medium for storing a computer program, and when the computer program is executed by a processor, the steps in the reception determination method described in any of the above embodiments are implemented.
  • FIG. 20 is a schematic block diagram of an apparatus 2000 for receiving determination according to an embodiment of the present disclosure.
  • Apparatus 2000 may be provided as a base station.
  • the device 2000 includes a processing component 2022, a wireless transmitting/receiving component 2024, an antenna component 2026, and a signal processing part specific to the wireless interface.
  • the processing component 2022 may further include one or more processors. One of the processors in the processing component 2022 may be configured to implement the reception determining method described in any of the foregoing embodiments.
  • Fig. 21 is a schematic block diagram of an apparatus 2100 for codebook transmission according to an embodiment of the present disclosure.
  • the apparatus 2100 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
  • the device 2100 may include one or more of the following components: a processing component 2102, a memory 2104, a power supply component 2106, a multimedia component 2108, an audio component 2110, an input/output (I/O) interface 2112, a sensor component 2114, and Communication component 2116.
  • the processing component 2102 generally controls the overall operations of the device 2100, such as those associated with display, telephone calls, data communications, camera operations, and recording operations.
  • the processing component 2102 may include one or more processors 2120 to execute instructions to complete all or part of the steps of the above codebook transmission method.
  • processing component 2102 may include one or more modules that facilitate interaction between processing component 2102 and other components.
  • processing component 2102 may include a multimedia module to facilitate interaction between multimedia component 2108 and processing component 2102 .
  • the memory 2104 is configured to store various types of data to support operations at the device 2100 . Examples of such data include instructions for any application or method operating on the device 2100, contact data, phonebook data, messages, pictures, videos, and the like.
  • the memory 2104 may be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Magnetic or Optical Disk Magnetic Disk
  • the power supply component 2106 provides power to various components of the device 2100 .
  • Power components 2106 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for device 2100.
  • the multimedia component 2108 includes a screen that provides an output interface between the device 2100 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user.
  • the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may not only sense a boundary of a touch or swipe action, but also detect duration and pressure associated with the touch or swipe action.
  • the multimedia component 2108 includes a front camera and/or a rear camera. When the device 2100 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom capability.
  • the audio component 2110 is configured to output and/or input audio signals.
  • the audio component 2110 includes a microphone (MIC), which is configured to receive external audio signals when the device 2100 is in operation modes, such as call mode, recording mode and voice recognition mode. Received audio signals may be further stored in memory 2104 or sent via communication component 2116 .
  • the audio component 2110 also includes a speaker for outputting audio signals.
  • the I/O interface 2112 provides an interface between the processing component 2102 and a peripheral interface module, and the above peripheral interface module may be a keyboard, a click wheel, a button, and the like. These buttons may include, but are not limited to: a home button, volume buttons, start button, and lock button.
  • Sensor assembly 2114 includes one or more sensors for providing status assessments of various aspects of device 2100 .
  • the sensor component 2114 can detect the open/closed state of the device 2100, the relative positioning of components, such as the display and keypad of the device 2100, and the sensor component 2114 can also detect a change in the position of the device 2100 or a component of the device 2100 , the presence or absence of user contact with the device 2100 , the device 2100 orientation or acceleration/deceleration and the temperature change of the device 2100 .
  • Sensor assembly 2114 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact.
  • the sensor assembly 2114 may also include optical sensors, such as CMOS or CCD image sensors, for use in imaging applications.
  • the sensor component 2114 may also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor or a temperature sensor.
  • the communication component 2116 is configured to facilitate wired or wireless communication between the apparatus 2100 and other devices.
  • the device 2100 can access wireless networks based on communication standards, such as WiFi, 2G, 3G, 4G LTE, 5G NR or combinations thereof.
  • the communication component 2116 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communication component 2116 also includes a near field communication (NFC) module to facilitate short-range communication.
  • the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, Infrared Data Association (IrDA) technology, Ultra Wide Band (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID Radio Frequency Identification
  • IrDA Infrared Data Association
  • UWB Ultra Wide Band
  • Bluetooth Bluetooth
  • apparatus 2100 may be programmed by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable Realized by gate array (FPGA), controller, microcontroller, microprocessor or other electronic components, used to execute the above codebook transmission method.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable Realized by gate array
  • controller microcontroller, microprocessor or other electronic components, used to execute the above codebook transmission method.
  • non-transitory computer-readable storage medium including instructions, such as the memory 2104 including instructions, which can be executed by the processor 2120 of the device 2100 to complete the above codebook transmission method.
  • the non-transitory computer readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开涉及码本传输方法,包括:确定被配置的群组无线网络临时标识G-RNTI;生成所述G-RNTI对应的码本;对所述码本中的比特位进行捆绑操作以得到目标码本;将所述目标码本发送至网络侧设备。根据本公开,终端在确定被配置的G-RNTI,并生成每个G-RNTI分别对应的码本后,可以对码本中的比特位进行捆绑操作以得到目标码本,进而终端可以将得到的目标码本发送至网络侧设备。其中,通过对码本中的比特位进行捆绑操作,可以使得得到的目标码本相对于捆绑操作前的码本包含相对较少的比特位,进而在将目标码本传输至网络侧设备,相对于将多个G-RNTI对应的多个码本传输至网络侧设备,有利于节约上行资源。

Description

码本传输、接收确定方法和装置、通信装置和存储介质 技术领域
本公开涉及通信技术领域,具体而言,涉及码本传输方法、接收确定方法、码本传输装置、接收确定装置。通信装置和计算机可读存储介质。
背景技术
目前的码本codebook是按照无线网络临时标识(RTNI,Radio Network Temporary Identity)生成的。对于某些终端而言,支持多个RNTI,那么将会生成多个码本,并将多个码本上报给基站,这会导致上行开销过大。
发明内容
有鉴于此,本公开的实施例提出了码本传输方法、接收确定方法、码本传输装置、接收确定装置。通信装置和计算机可读存储介质,以解决相关技术中的技术问题。
根据本公开实施例的第一方面,提出一种码本传输方法,适用于终端,所述方法包括:确定被配置的群组无线网络临时标识G-RNTI;生成所述G-RNTI对应的码本;对所述码本中的比特位进行捆绑操作以得到目标码本;将所述目标码本发送至网络侧设备。
根据本公开实施例的第二方面,提出一种接收确定方法,适用于网络侧设备,所述方法包括:接收终端发送的目标码本,其中,所述目标码本为对至少一个G-RNTI对应的码本中的比特位进行捆绑操作得到的;根据所述目标码本中的比特位确定所述终端对于所述至少一个G-RNTI对应的码本中每个比特位对应的PDSCH候选是否成功解码。
根据本公开实施例的第三方面,提出一种码本传输装置,适用于终端,所述装置包括:处理模块,被配置为确定被配置的群组无线网络临时标识G-RNTI;生成所述G-RNTI对应的码本;对所述码本中的比特位进行捆绑操作以得到目标码本;发送模块,被配置为将所述目标码本发送至网络侧设备。
根据本公开实施例的第四方面,提出一种接收确定装置,适用于网络侧设备,所述装置包括:接收模块,被配置为接收终端发送的目标码本,其中,所述目标码本 为对至少一个G-RNTI对应的码本中的比特位进行捆绑操作得到的;处理模块,被配置为根据所述目标码本中的比特位确定所述终端对于所述至少一个G-RNTI对应的码本中每个比特位对应的PDSCH候选是否成功解码。
根据本公开的实施例,提出一种通信装置,包括:处理器;用于存储计算机程序的存储器;其中,当所述计算机程序被处理器执行时,实现上述码本传输方法。
根据本公开的实施例,提出一种通信装置,包括:处理器;用于存储计算机程序的存储器;其中,当所述计算机程序被处理器执行时,实现上述接收确定方法。
根据本公开的实施例,提出一种计算机可读存储介质,用于存储计算机程序,当所述计算机程序被处理器执行时,实现上述码本传输方法中的步骤。
根据本公开的实施例,提出一种计算机可读存储介质,用于存储计算机程序,当所述计算机程序被处理器执行时,实现上述接收确定方法中的步骤。
根据本公开的实施例,终端在确定被配置的G-RNTI,并生成每个G-RNTI分别对应的码本后,可以对码本中的比特位进行捆绑(bundling)操作以得到目标码本(或者称作最终码本),进而终端可以将得到的目标码本发送至网络侧设备。
其中,通过对码本中的比特位进行捆绑操作,可以使得得到的目标码本相对于捆绑操作前的码本包含相对较少的比特位,进而在将目标码本传输至网络侧设备,相对于将多个G-RNTI对应的多个码本传输至网络侧设备,有利于节约上行资源。
附图说明
为了更清楚地说明本公开实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本公开的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是根据本公开的实施例示出的一种码本传输方法的示意流程图。
图2A是根据本公开的实施例示出的另一种码本传输方法的示意流程图。
图2B是根据本公开的实施例示出的一种捆绑操作的示意图。
图3是根据本公开的实施例示出的又一种码本传输方法的示意流程图。
图4是根据本公开的实施例示出的又一种码本传输方法的示意流程图。
图5A是根据本公开的实施例示出的又一种码本传输方法的示意流程图。
图5B是根据本公开的实施例示出的另一种捆绑操作的示意图。
图6是根据本公开的实施例示出的又一种码本传输方法的示意流程图。
图7是根据本公开的实施例示出的又一种码本传输方法的示意流程图。
图8是根据本公开的实施例示出的又一种捆绑操作的示意图。
图9是根据本公开的实施例示出的又一种码本传输方法的示意流程图。
图10是根据本公开的实施例示出的又一种码本传输方法的示意流程图。
图11是根据本公开的实施例示出的一种接收确定方法的示意流程图。
图12是根据本公开的实施例示出的另一种接收确定方法的示意流程图。
图13是根据本公开的实施例示出的又一种接收确定方法的示意流程图。
图14是根据本公开的实施例示出的又一种接收确定方法的示意流程图。
图15是根据本公开的实施例示出的又一种接收确定方法的示意流程图。
图16是根据本公开的实施例示出的又一种接收确定方法的示意流程图。
图17是根据本公开的实施例示出的又一种接收确定方法的示意流程图。
图18是根据本公开的实施例示出的一种码本传输装置的示意框图。
图19是根据本公开的实施例示出的一种接收确定装置的示意框图。
图20是根据本公开的实施例示出的一种用于接收确定的装置的示意框图。
图21是根据本公开的实施例示出的一种用于码本传输的装置的示意框图。
具体实施方式
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开实施例和所附权利要求书中所使用的单数形式的“一种”和 “该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一指示也可以被称为第二指示,类似地,第二指示也可以被称为第一指示。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
出于简洁和便于理解的目的,本文在表征大小关系时,所使用的术语为“大于”或“小于”、“高于”或“低于”。但对于本领域技术人员来说,可以理解:术语“大于”也涵盖了“大于等于”的含义,“小于”也涵盖了“小于等于”的含义;术语“高于”涵盖了“高于等于”的含义,“低于”也涵盖了“低于等于”的含义。
图1是根据本公开的实施例示出的一种码本传输方法的示意流程图。本实施例所示的码本传输方法可以适用于终端,所述终端包括但不限于手机、平板电脑、可穿戴设备、传感器、物联网设备(例如NB-IoT(窄带宽物联网,Narrow Band Internet of Things)、MTC(Machine Type Communication,机器类型通信)、eMTC(EnhanceMachine Type Communication,增强的机器类型通信))等通信装置。所述终端可以与网络侧设备通信,所述网络侧设备包括但不限于4G、5G、6G等通信***中的网络侧设备,例如基站、核心网等。
如图1所示,所述码本传输方法可以包括以下步骤:
在步骤S101中,确定被配置的群组无线网络临时标识G-RNTI;
在步骤S102中,生成所述G-RNTI对应的码本;
在步骤S103中,对所述码本中的比特位进行捆绑(bundling)操作以得到目标码本;
在步骤S104中,将所述目标码本发送至网络侧设备。
在一个实施例中,网络侧设备针对终端可以配置一个或多个G-RNTI,终端可以根据每个G-RNTI分别生成对应的码本,所述码本可以包括类型1(Type-1)码本。
例如终端在被配置了多个G-RNTI的情况下,终端根据每个G-RNTI分别生成对应的Type-1码本,可以得到多个码本。其中,一个码本可以包括一个或多个比特位, 1个比特位对应一个M_ac,其中,M_ac可以表示物理下行共享信道PDSCH(Physical Downlink Shared CHannel)候选(candidate),与PDSCH候选对应的比特位,可以作为混合自动重传请求(Hybrid Automatic Repeat reQuest,HARQ)信息,用于指示在这个PDSCH候选是否成功接收(接收到并成功解码)。
例如比特位的值为1时,用于指示混合自动重传请求确认HARQ-ACK,比特位的值为0时,用于指示混合自动重传请求未确认HARQ-NACK。
需要说明的是,比特位的值与所指示的内容之间的关系可以根据需要进行调整,并不限于上述情况,例如在比特位的值为0时,可以指示HARQ-ACK,在比特位为1时,可以指示HARQ-NACK。以下实施例主要在比特位的值为1指示HARQ-ACK,比特位为0指示HARQ-NACK的情况下进行示例性说明。
在终端被配置了多个G-RNTI的情况下,由于需要生成多个码本并上行发送至网络侧设备,这对上行资源造成了较大的占用,上行开销过大容易造成物理上行控制信道PUCCH(Physical Uplink Control Channel)性能的恶化。
根据本公开的实施例,终端在确定被配置的G-RNTI,并生成每个G-RNTI分别对应的码本后,可以对码本中的比特位进行捆绑(bundling)操作以得到目标码本(或者称作最终码本),进而终端可以将得到的目标码本发送至网络侧设备。
其中,通过对码本中的比特位进行捆绑操作,可以使得得到的目标码本相对于捆绑操作前的码本包含相对较少的比特位,进而在将目标码本传输至网络侧设备,相对于将多个G-RNTI对应的多个码本传输至网络侧设备,有利于节约上行资源。
在一个实施例中,所述捆绑操作包括逻辑与运算。
所述捆绑操作可以针对不同码本中的比特位进行,也可以针对同一个码本中的不同比特位进行。例如对于进行捆绑操作的多个比特位,可以进行逻辑与运算,也即在这些比特位的值都为1的情况下,得到的结果才为1,只要这些比特位中任一个比特位的值为0,那么得到的结果就是0。
通过逻辑与运算,可以根据多个比特位的值得到一个值,从而有效地减少最终得到的目标码本中比特位的数量。
以下主要针对对不同码本中的比特位进行捆绑操作,和针对同一个码本中的不同比特位进行捆绑操作两种实施例进行示例性说明。
图2A是根据本公开的实施例示出的另一种码本传输方法的示意流程图。如图2A所示,所述对所述码本中的比特位进行捆绑操作以得到目标码本包括:
在步骤S201中,将至少两个所述码本中相对应的比特位进行捆绑操作以得到目标码本。
在一个实施例中,可以针对至少两个码本中相对应的比特位进行捆绑操作,其中,相对应的比特位,是指不同码本中次序位置相同的比特位。
例如以三个码本为例,终端根据G-RNTI1生成码本1,根据G-RNTI2生成码本2,根据G-RNTI3生成码本3,三个码本包含比特位的数量n相同,n=10。
图2B是根据本公开的实施例示出的一种捆绑操作的示意图。
如图2B所示,码本1为{1110110111},码本2为{01111111111},码本3为{1111111110},可以针对码本1中第i个比特位、码本2中第i个比特位和码本3中第i个比特位进行捆绑操作,得到的值为0,作为目标码本第i个比特位的值,i为大于或等于1,小于或等于n的整数。那么进行捆绑操作得到的目标码本为{0110110110}。
可见,根据本实施例,针对至少两个码本进行捆绑操作,可以得到一个目标码本,并且目标码本中包含的比特位的数量,少于至少两个码本包含的比特位的数量之和。因此,终端向网络侧设备发送目标码本,相对于发送捆绑操作之前的至少两个码本,可以有效地降低对于上行资源的占用。
图3是根据本公开的实施例示出的又一种码本传输方法的示意流程图。如图3所示,所述方法还包括:
在步骤S301中,响应于至少两个所述码本中包含的比特位数量不同,确定其中包含比特位的数量最多的第一码本;
在步骤S302中,根据所述第一码本中比特位的数量对其它码本包含的比特位进行补充,其中,补充的比特位用于指示混合自动重传请求确认HARQ-ACK。
图2B所示的三个码本包含比特位的数量是相同的,那么每个码本包含的全部比特位,相对于其他码本中的比特位,都存在相对应的比特位,那么就可以对相对应的比特位进行捆绑操作。
但是在某些情况下,需要进行捆绑操作的至少两个码本包含比特位的数量不同。针对这种情况,在一个实施例中,可以先确定至少两个码本中包含比特位的数量 最多的第一码本,进而确定与第一码本包含的比特位的数量不同的第二码本,那么第二码本包含的比特位的第二数量,就少于第一码本包含的比特位的第一数量。
针对第二码本可以补充比特位,例如根据所述第一码本中比特位的数量对其它码本包含的比特位进行补充,从而将第二数量补充到第一数量,例如第一数量为10,第二数量为8,那么针对第二码本可以补充2个比特位。据此,可以确保补充后比特位之后的第二码本与第一码本包含的比特位的数量相同,从而第二码本中的比特位相对于第一码本中的比特位,都存在相对应的比特位,那么就可以对相对应的比特位进行捆绑操作。
其中,补充的比特位可以根据需要设置在第二码本原来包含的比特位之前、或之后、或之间,具体可以根据需要进行设置。
在一个实施例中,对于补充的比特位,可以设置为指示HARQ-ACK。由于第二码本原本并不包括补充的比特位,所以对于第二码本而言,补充的比特位并不对应PDSCH候选,如果将这个比特位设置为指示HARQ-NACK,那么将会对捆绑操作得到的结果产生不良影响。
例如码本1为{1110110111}、码本4为{01101101},对于码本1和码本4而言,如果在码本4后补充两个比特位,并且这两个比特位用于指示HARQ-NACK,那么码本4为{0110110100},在将码本1中的比特位与码本4中的比特位进行捆绑操作后,得到的目标码本就是{0110110100},也即最后两个比特位为0。
但是实际上码本1最后两个比特位为1,指示HARQ-ACK,也即终端在这两个比特位对应PDSCH候选成功解码得到了PDSCH,但是由于目标码本最后两个比特位为0,会导致网络侧设备误以为终端在这两个比特位对应PDSCH候选未成功解码得到PDSCH,从而导致误重传(retransmission)。
根据本实施例,补充后的码本4为{0110110111},在将码本1中的比特位与码本4中的比特位进行捆绑操作后,得到的目标码本就是{0110110111},也即最后两个比特位为1。据此,可以确保网络侧设备根据目标码本能够准确确定终端在最后两个比特位对应PDSCH候选成功解码得到PDSCH,避免误重传。
图4是根据本公开的实施例示出的又一种码本传输方法的示意流程图。如图4所示,所述方法还包括:
在步骤S401中,接收所述网络侧设备发送的第一指示;
在步骤S402中,根据所述第一指示确定进行捆绑操作的码本。
在一个实施例中,网络侧设备可以向终端发送第一指示,用于指示进行捆绑操作的码本。例如向终端发送的第一指示包括进行捆绑操作的码本对应的G-RNTI,从而使得终端确定需要对第一指示所指示的G-RNTI对应的码本进行捆绑操作,而对于其他G-RNTI对应的码本则不进行捆绑操作。据此,有利于网络侧设备对捆绑操作进行灵活的控制,以便满足实时需要。
例如对于上述码本1、码本2和码本3而言,网络侧设备可以通过第一指示来指示终端对码本1和码本2进行捆绑操作,那么终端可以将码本1中的比特位和码本2中的比特位进行捆绑操作得到目标码本,进而将目标码本和码本3发送至网络侧设备。
图5A是根据本公开的实施例示出的又一种码本传输方法的示意流程图。如图5A所示,所述对所述码本中的比特位进行捆绑操作以得到目标码本包括:
在步骤S501中,将位于同一个所述码本内的至少两个比特位进行捆绑操作以得到所述目标码本。
在一个实施例中,可以将位于同一个所述码本内的至少两个比特位进行捆绑操作以得到所述目标码本,其中,至少两个比特位可以包括码本中相邻的比特位,也可以包括码本中不相邻的比特位,以下实施例主要针对至少两个比特位包括码本中相邻的比特位进行示例性说明。
图5B是根据本公开的实施例示出的另一种捆绑操作的示意图。
如图5B所示,仍以上述实施例中的码本1、码本2和码本3为例,码本1为{1110110111},码本2为{01111111111},码本3为{1111111110}。
例如针对这3个码本可以分别执行步骤S501,那么可以得到3个目标码本。对于一个码本中的比特位,可以将每N个比特位进行捆绑,N可以理解为捆绑操作的粒度。
例如在N=2的情况下,对于码本1而言,可以将第1个比特位和第2个比特位进行捆绑操作,得到的值为1;将第3个比特位和第4个比特位进行捆绑操作,得到的值为0;将第5个比特位和第6个比特位进行捆绑操作,得到的值为1;将第7个比特位和第8个比特位进行捆绑操作,得到的值为0;将第9个比特位和第10个比特位进行捆绑操作,得到的值为1。
从而得到码本1对应的目标码本{10101}。以此类推,可以得到码本2对应的目标码本{01111}和码本3对应的目标码本{11110}。进而可以将得到的3个目标码本发送至网络侧设备。
可见,根据本实施例,将位于同一个所述码本内的至少两个比特位进行捆绑操作以得到的目标码本,相对于进行捆绑操作前的码本,包含的比特位更少。因此,终端向网络侧设备发送目标码本,相对于发送捆绑操作之前的码本,可以有效地降低对于上行资源的占用。
图6是根据本公开的实施例示出的又一种码本传输方法的示意流程图。如图6所示,所述方法还包括:
在步骤S601中,接收所述网络侧设备发送的第二指示;
在步骤S602中,根据所述第二指示确定进行捆绑操作的比特位的数量。
在一个实施例中,网络侧设备可以向终端发送第二指示,用于指示进行捆绑操作的比特位的数量,也可以描述为粒度。从而使得终端可以根据网络侧设备的指示确定将多少个比特位进行捆绑操作,据此,有利于网络侧设备对捆绑操作进行灵活的控制,以便满足实时需要。
例如向终端发送的第二指示包括进行捆绑操作的比特位的数量为2,那么终端可以根据图5B所示实施例,按照N=2对于码本中的比特位进行捆绑操作;
例如向终端发送的第二指示包括进行捆绑操作的比特位的数量为5,那么对于上述码本1,可以将第1个比特位至第5个比特位进行捆绑操作,得到的值为0;将第6个比特位至第10个比特位进行捆绑操作,得到的值为0。从而得到码本1对应的目标码本{00}。
图7是根据本公开的实施例示出的又一种码本传输方法的示意流程图。如图7所示,所述方法还包括:
在步骤S701中,接收所述网络侧设备发送的第三指示;
在步骤S702中,根据所述第三指示确定是否对所述码本中的比特位进行捆绑操作以得到所述目标码本。
在一个实施例中,网络侧设备可以向终端发送第三指示,用于控制终端开启或关闭对码本中比特位进行捆绑操作的功能。例如第三指示可以如下表1所示:
Figure PCTCN2022078085-appb-000001
表1
如表1所示,第三指示可以包含1个比特,该比特的值为0时,可以指示终端关闭对码本中比特位进行捆绑操作的功能;该比特的值为1时,可以指示终端开启对码本中比特位进行捆绑操作的功能。
例如网络侧设备通过第三指示信息指示终端开启对码本中比特位进行捆绑操作的功能,那么终端可以根据上述实施例,对码本中比特位进行捆绑操作,并向网络侧设备发送捆绑操作后得到的目标码本;
例如网络侧设备通过第三指示信息指示终端关闭对码本中比特位进行捆绑操作的功能,那么终端不对码本中比特位进行捆绑操作,而是将每个G-RNTI对应的码本直接发送至网络侧设备。
据此,有利于网络侧设备对终端是否进行捆绑操作进行灵活的控制,以便满足实时需要。
需要说明的是,第三指示信息可以与上述实施例中的第一指示信息携带在相同信息中,或者与上述实施例中的第二指示信息携带在相同的信息中,也可以独立携带在一条信息中;类似地,第一指示信息和第二指示信息也可以携带在相同信息中,或者携带在不同信息中。用于携带所述第一指示信息、第二指示信息、第三指示信息的信息,包括但不限于RRC(Radio Resource Control,无线资源控制)信令。
例如以第一指示携带在RRC信令中为例,RRC信令可以包括2个比特位,那么可以指示4种情况。
例如00指示情况1:对G-RNTI1、G-RNTI2、G-RNTI3对应的码本进行捆绑操作;
例如01指示情况2:对G-RNTI1、G-RNTI2对应的码本进行捆绑操作;
例如10指示情况3:对G-RNTI1、G-RNTI3对应的码本进行捆绑操作;
例如11指示情况4:不执行对不同G-RNTI对应的码本进行捆绑操作;对于这种情况下,终端可以采用上述实施例5A所示的方式,将位于同一个所述码本内的至少两个比特位进行捆绑操作以得到所述目标码本,或者不进行捆绑操作。具体执行哪种操作,可以根据需要进行约定。
在一个实施例中,所述对所述码本中的比特位进行捆绑操作以得到目标码本包括:
在所述码本的比特位中确定指示混合自动重传请求未确认HARQ-NACK的目标比特位;
响应于所述目标比特位出于目标原因而设置,将所述目标比特位当作指示混合自动重传请求确认HARQ-ACK后,对所述码本中的比特位进行捆绑操作以得到所述目标码本。
在一个实施例中,码本中用于指示HARQ-NACK的目标比特位,可以表示终端并未在目标比特位对应的PDSCH候选成功接收PDSCH。但是处于某些原因(以下称作目标原因),码本中的目标比特位并非由于在目标比特位对应的PDSCH候选未成功接收PDSCH而被设置为指示HARQ-NACK,那么基站根据目标比特位并不能准确地确定终端在目标比特位对应的PDSCH候选是否成功接收PDSCH。
因此,对于出于目标原因而被设置为指示HARQ-NACK的目标比特位,终端可以将其当作指示HARQ-ACK,然后在进行上述捆绑操作,以便基站根据对目标比特位捆绑后的结果能够相对准确地确定终端在目标比特位对应的PDSCH候选是否成功接收PDSCH。
在一个实施例中,所述目标原因包括以下至少之一:
未检测到目标下行控制信息DCI(Downlink Control Information),其中,所述目标DCI用于调度所述目标比特位对应的目标物理下行共享信道PDSCH;或者
所述目标DCI中的K1值所指示的时隙,并不是用于传输HARQ-ACK的时隙。
在一个实施例中,终端期望在目标比特位对应的PDSCH candidate上接收到PDSCH,而为了接收到PDSCH,就需要接收到用于调度PDSCH的目标DCI。但是当终端并未接收到目标DCI,终端会将目标比特位设置为指示HARQ-NACK,然而这并 不是由于在目标比特位对应的PDSCH候选未成功接收PDSCH。这会导致基站根据目标比特位并不能准确地确定终端在目标比特位对应的PDSCH候选是否成功接收PDSCH。
针对这种情况,本实施例将目标比特位当作指示HARQ-ACK后进行捆绑操作,以便基站根据对目标比特位捆绑后的结果能够相对准确地确定终端在目标比特位对应的PDSCH候选是否成功接收PDSCH。
图8是根据本公开的实施例示出的又一种捆绑操作的示意图。
如图8所示,仍以上述实施例中的码本1、码本2和码本3为例,其中码本1中的第4个比特位的值为0,用于指示HARQ-NACK,而终端之所以将该比特位的值设置为0,是由于终端并未检测到用于调度该比特位对应的PDSCH的目标DCI(例如网络侧设备并未发送用于调度该比特位对应的PDSCH的DCI)。
如果直接与码本2和码本3中的比特位进行捆绑操作,那么到的目标码本就是{0110110110},其中第4个比特位为0。在将目标码本发送至网络侧设备后,网络侧设备根据其中第4个比特位的值,会认为终端针对G-RNTI1、G-RNTI2、G-RNTI3,在第4个比特位对应的PDSCH候选接收PDSCH失败。
但是实际上终端针对G-RNTI2、G-RNTI3在第4个比特位对应的PDSCH候选接收PDSCH是成功的,而针对G-RNTI1在第4个比特位对应的PDSCH候选也不是未成功接收PDSCH,只是未检测到用于调度第4个比特位对应的PDSCH的DCI。可见,这会导致网络侧设备根据目标码本错误地判定终端在目标比特位对应的PDSCH候选接收PDSCH的成败情况,进而会导致网络侧设备对PDSCH进行误重传。
根据本实施例,可以将第4个比特位的值当作1,也即当作指示HARQ-ACK,然后再与码本2和码本3中的比特位进行捆绑操作,那么得到的目标码本就是{0111110110},可见,其中第4个比特位为1。在将目标码本发送至网络侧设备后,网络侧设备根据其中第4个比特位的值,会认为G-RNTI1、G-RNTI2、G-RNTI3在第4个比特位对应的PDSCH候选接收PDSCH成功,也即基站根据对目标比特位捆绑后的结果能够相对准确地确定终端在目标比特位对应的PDSCH候选是否成功接收PDSCH,进而避免误重传PDSCH。
在一个实施例中,DCI(例如上述实施例中的目标DCI)中可以携带有K1值(value),用于指示传输HARQ-ACK的时隙。无论终端需要发送的HARQ消息是 HARQ-ACK还是HARQ-NACK,当终端发送目标比特位对应的HARQ消息所在的时隙并不是K1值所指示的传输HARQ-ACK的时隙,那么终端会将HARQ消息设置为HARQ-NACK,因此会导致终端将码本中对应该HARQ消息的目标比特位设置为指示HARQ-NACK,这会导致基站根据目标比特位并不能准确地确定终端在目标比特位对应的PDSCH候选是否成功接收PDSCH。
例如仍以码本1、码本2和码本3为例,终端针对码本1中第4个比特位对应的PDSCH候选接收到的目标DCI中,K1值指示的用于传输HARQ-ACK的时隙为第k个时隙,但是终端在第k’(不等于k)个时隙上传输第4个比特位对应的HARQ信息,从而将第4个比特位设置为NACK。
如果直接与码本2和码本3中的比特位进行捆绑操作,那么到的目标码本就是{0110110110},其中第4个比特位为0。在将目标码本发送至网络侧设备后,网络侧设备根据其中第4个比特位的值,会认为终端针对G-RNTI1、G-RNTI2、G-RNTI3,在第4个比特位对应的PDSCH候选接收PDSCH失败。
但是实际上终端针对G-RNTI2、G-RNTI3在第4个比特位对应的PDSCH候选接收PDSCH是成功的,而针对G-RNTI1在第4个比特位对应的PDSCH候选也不是未成功接收PDSCH,只是由于传输HARQ信息的时隙并不是DCI中K1值指示的用于传输HARQ-ACK的时隙。可见,这会导致网络侧设备根据目标码本错误地判定终端在目标比特位对应的PDSCH候选接收PDSCH的成败情况,进而会导致网络侧设备对PDSCH进行误重传。
根据本实施例,可以将第4个比特位的值当作1,也即当作指示HARQ-ACK的情况,然后再与码本2和码本3中的比特位进行捆绑操作,那么得到的目标码本就是{0111110110},可见,其中第4个比特位为1。在将目标码本发送至网络侧设备后,网络侧设备根据其中第4个比特位的值,会认为G-RNTI1、G-RNTI2、G-RNTI3在第4个比特位对应的PDSCH候选接收PDSCH成功,也即基站根据对目标比特位捆绑后的结果能够相对准确地确定终端在目标比特位对应的PDSCH候选是否成功接收PDSCH,进而避免误重传PDSCH。
图9是根据本公开的实施例示出的又一种码本传输方法的示意流程图。如图9所示,所述方法还包括:
在步骤S901中,确定单播unicast PDSCH对应的码本;
其中,所述对所述码本中的比特位进行捆绑操作以得到目标码本包括:
在步骤S902中,对所述G-RNTI对应的码本中的比特位和所述unicast PDSCH对应的码本中的比特位进行捆绑操作以得到所述目标码本。
在一个实施例中,G-RNTI可以指示给进行多播(也可以称作组播)业务(MBS,Multicast Broadcast Service)的终端,G-RNTI对应的Type-1码本中的比特位,可以用于指示MBS PDSCH的接收成败情况。
本实施例进行捆绑操作的对象,可以不限于G-RNTI对应的码本,还可以适用于单播PDSCH对应的码本(例如Type-1码本),也即可以将单播PDSCH对应的码本中的比特位与G-RNTI对应的码本中的比特位进行捆绑操作以得到所述目标码本。据此,可以进一步降低需要传输的码本中比特位的总量,有利于进一步降低上行开销。
图10是根据本公开的实施例示出的又一种码本传输方法的示意流程图。如图10所示,所述方法还包括:
在步骤S1001中,接收所述网络侧设备发送的重传调度信息;
在步骤S1002中,响应于确定所述重传调度信息所调度的PDSCH已成功解码,忽略所述重传调度信息。
在一个实施例中,网络侧设备在接收到终端上报的目标码本后,可以根据码本中的比特位确定终端对于PDSCH的接收成败情况,对于接收失败(例如解码失败)的PDSCH,网络侧可以进行重传,而为了使得终端能够接收到重传的PDSCH,需要先发送重传调度信息,以供终端确定接收重传的PDSCH的资源。
但是由于终端上报的目标码本,是对G-RNTI对应的码本进行捆绑操作后得到的,虽然降低了码本中比特位的总量,但是也会导致指示的精度降。
例如对于上述码本1、码本2和码本3,码本1和码本3中第一个比特位为1,也即终端针对G-RNTI1和G-RNTI3,在第一个比特位对应的PDSCH候选已成功接收PDSCH。
但是由于码本2的第二个比特位为0,捆绑后目标码本中第一个比特位也是0,网络侧设备根据目标码本中的第一个比特位会认为终端针对G-RNTI1和G-RNTI3,在第一个比特位对应的PDSCH候选未成功接收PDSCH,从而导致重传PDSCH,并向终端发送用于调度信息,指示重传PDSCH的资源。
然而终端自身是能够确定针对G-RNTI1和G-RNTI3,在第一个比特位对应的PDSCH候选已成功接收PDSCH,所以在接收到针对G-RNTI1和G-RNTI3中第一个比特位对应PDSCH候选上PDSCH的重传调度信息时,可以忽略该重传调度信息,避免重复接收已成功接收的PDSCH,终端也不会将网络侧设备重传的PDSCH中的传输块(Transmission Block,TB)与已经成功接收到的PDSCH中的传输块合并进行解码。
而对于G-RNTI2中第一个比特位对应PDSCH候选上PDSCH的重传调度信息,则可以正常解析,并接收对应的重传PDSCH。
图11是根据本公开的实施例示出的一种接收确定方法的示意流程图。本实施例所示的接收确定方法可以适用于网络侧设备,所述网络侧设备可以与终端通信,所述网络侧设备包括但不限于4G基站、5G基站、6G基站等通信***中的基站,所述终端包括但不限于手机、平板电脑、可穿戴设备、传感器、物联网设备(例如NB-IoT、MTC、eMTC)等通信装置。
如图11所示,所述接收确定方法可以包括以下步骤:
在步骤S1101中,接收终端发送的目标码本,其中,所述目标码本为对至少一个G-RNTI对应的码本中的比特位进行捆绑操作得到的;
在步骤S1102中,根据所述目标码本中的比特位确定所述终端对于所述至少一个G-RNTI对应的码本中每个比特位对应的PDSCH候选是否成功解码。
在一个实施例中,网络侧设备针对终端可以配置一个或多个G-RNTI,终端可以根据每个G-RNTI分别生成对应的码本,所述码本可以包括类型1(Type-1)码本。
例如终端在被配置了多个G-RNTI的情况下,终端根据每个G-RNTI分别生成对应的Type-1码本,可以得到多个码本。其中,一个码本可以包括一个或多个比特位,1个比特位对应一个M_ac,其中,M_ac可以表示物理下行共享信道PDSCH(Physical Downlink Shared CHannel)候选(candidate),与PDSCH候选对应的比特位,可以作为混合自动重传请求(Hybrid Automatic Repeat reQuest,HARQ)信息,用于指示在这个PDSCH候选是否成功接收(接收到并成功解码)。
例如比特位的值为1时,用于指示混合自动重传请求确认HARQ-ACK,比特位的值为0时,用于指示混合自动重传请求未确认HARQ-NACK。
需要说明的是,比特位的值与所指示的内容之间的关系可以根据需要进行调整,并不限于上述情况,例如在比特位的值为0时,可以指示HARQ-ACK,在比特位 为1时,可以指示HARQ-NACK。以下实施例主要在比特位的值为1指示HARQ-ACK,比特位为0指示HARQ-NACK的情况下进行示例性说明。
在终端被配置了多个G-RNTI的情况下,由于需要生成多个码本并上行发送至网络侧设备,这对上行资源造成了较大的占用,上行开销过大容易造成物理上行控制信道PUCCH(Physical Uplink Control Channel)性能的恶化。
根据本公开的实施例,终端在确定被配置的G-RNTI,并生成每个G-RNTI分别对应的码本后,可以对码本中的比特位进行捆绑(bundling)操作以得到目标码本(或者称作最终码本),进而终端可以将得到的目标码本发送至网络侧设备。
其中,通过对码本中的比特位进行捆绑操作,可以使得得到的目标码本相对于捆绑操作前的码本包含相对较少的比特位,进而在将目标码本传输至网络侧设备,相对于将多个G-RNTI对应的多个码本传输至网络侧设备,有利于节约上行资源。
在一个实施例中,所述捆绑操作包括逻辑与运算。
所述捆绑操作可以针对不同码本中的比特位进行,也可以针对同一个码本中的不同比特位进行。例如对于进行捆绑操作的多个比特位,可以进行逻辑与运算,也即在这些比特位的值都为1的情况下,得到的结果才为1,只要这些比特位中任一个比特位的值为0,那么得到的结果就是0。
通过逻辑与运算,可以根据多个比特位的值得到一个值,从而有效地减少最终得到的目标码本中比特位的数量。
网络侧设备可以指示终端上传每个G-RNTI分别对应的码本,或者上传捆绑操作后得到的目标码本。
网络侧设备在指示终端上传捆绑操作后得到的目标码本的情况下,在接收到目标码本后,可以确定目标码本是针对每个G-RNTI进行捆绑操作得到的,从而可以根据目标码本中的比特位确定终端对于至少一个G-RNTI(也即用于生成目标码本的码本对应G-RNTI)对应的码本中每个比特位对应的PDSCH候选是否成功解码。
图12是根据本公开的实施例示出的另一种接收确定方法的示意流程图。如图12所示,所述目标码本为将至少两个码本中相对应的比特位进行捆绑操作以得到的;
所述根据所述目标码本中的比特位确定所述终端对于所述至少一个G-RNTI对应的码本中每个比特位对应的PDSCH候选是否成功解码包括:
在步骤S1201中,根据所述目标码本中的比特位确定所述终端对于所述至少两个码本中相对应的比特位所对应的PDSCH候选是否成功解码。
在一个实施例中,网络侧设备可以指示终端进行捆绑操作的方式,例如可以按照图2B所示的方式进行捆绑操作,或者按照图5B方式进行捆绑操作。
例如在指示终端按照图2B所示方式将至少两个码本中相对应的比特位进行捆绑操作得到目标码本时,网络侧设备根据所述目标码本中的比特位确定所述终端对于所述至少两个码本中相对应的比特位所对应的PDSCH候选是否成功解码。
图13是根据本公开的实施例示出的又一种接收确定方法的示意流程图。如图13所示,所述方法还包括:
在步骤S1301中,向所述终端发送第一指示,用于指示进行捆绑操作的码本。
在一个实施例中,网络侧设备可以向终端发送第一指示,用于指示进行捆绑操作的码本。例如向终端发送的第一指示包括进行捆绑操作的码本对应的G-RNTI,从而使得终端确定需要对第一指示所指示的G-RNTI对应的码本进行捆绑操作,而对于其他G-RNTI对应的码本则不进行捆绑操作。据此,有利于网络侧设备对捆绑操作进行灵活的控制,以便满足实时需要。
例如对于上述码本1、码本2和码本3而言,网络侧设备可以通过第一指示来指示终端对码本1和码本2进行捆绑操作,那么终端可以将码本1中的比特位和码本2中的比特位进行捆绑操作得到目标码本,进而将目标码本和码本3发送至网络侧设备。
图14是根据本公开的实施例示出的又一种接收确定方法的示意流程图。如图14所示,所述目标码本为将位于同一个所述码本内的至少两个比特位进行捆绑操作得到的,所述对所述码本中的比特位进行捆绑操作以得到目标码本包括:
所述根据所述目标码本中的比特位确定所述终端对于所述至少一个G-RNTI对应的码本中每个比特位对应的PDSCH候选是否成功解码包括:
在步骤S1401中,根据所述目标码本中的比特位确定所述终端对于所述至少一个码本中的至少两个比特位所对应的PDSCH候选是否成功解码。
在一个实施例中,网络侧设备可以指示终端进行捆绑操作的方式,例如可以按照图2B所示的方式进行捆绑操作,或者按照图5B方式进行捆绑操作。
例如在指示终端按照图5B所示方式将位于同一个所述码本内的至少两个比特位进行捆绑操作得到目标码本时,网络侧设备根据所述目标码本中的比特位确定所述终端对于所述至少一个码本中的至少两个比特位所对应的PDSCH候选是否成功解码。
图15是根据本公开的实施例示出的又一种接收确定方法的示意流程图。如图15所示,所述方法还包括:
在步骤S1501中,向所述终端发送第二指示,用于指示进行捆绑操作的比特位的数量。
在一个实施例中,网络侧设备可以向终端发送第二指示,用于指示进行捆绑操作的比特位的数量,也可以描述为粒度。从而使得终端可以根据网络侧设备的指示确定将多少个比特位进行捆绑操作,据此,有利于网络侧设备对捆绑操作进行灵活的控制,以便满足实时需要。
例如向终端发送的第二指示包括进行捆绑操作的比特位的数量为2,那么终端可以根据图5B所示实施例,按照N=2对于码本中的比特位进行捆绑操作;
例如向终端发送的第二指示包括进行捆绑操作的比特位的数量为5,那么对于上述码本1,可以将第1个比特位至第5个比特位进行捆绑操作,得到的值为0;将第6个比特位至第10个比特位进行捆绑操作,得到的值为0。从而得到码本1对应的目标码本{00}。
图16是根据本公开的实施例示出的又一种接收确定方法的示意流程图。如图16所示,所述方法还包括:
在步骤S1601中,向所述终端发送第三指示,用于指示是否对所述码本中的比特位进行捆绑操作以得到所述目标码本。
在一个实施例中,网络侧设备可以向终端发送第三指示,用于控制终端开启或关闭对码本中比特位进行捆绑操作的功能。例如第三指示可以如上述表1所示。
如表1所示,第三指示可以包含1个比特,该比特的值为0时,可以指示终端关闭对码本中比特位进行捆绑操作的功能;该比特的值为1时,可以指示终端开启对码本中比特位进行捆绑操作的功能。
例如网络侧设备通过第三指示信息指示终端开启对码本中比特位进行捆绑操作的功能,那么终端可以根据上述实施例,对码本中比特位进行捆绑操作,并向网络 侧设备发送捆绑操作后得到的目标码本;
例如网络侧设备通过第三指示信息指示终端关闭对码本中比特位进行捆绑操作的功能,那么终端不对码本中比特位进行捆绑操作,而是将每个G-RNTI对应的码本直接发送至网络侧设备。
据此,有利于网络侧设备对终端是否进行捆绑操作进行灵活的控制,以便满足实时需要。
需要说明的是,第三指示信息可以与上述实施例中的第一指示信息携带在相同信息中,或者与上述实施例中的第二指示信息携带在相同的信息中,也可以独立携带在一条信息中;类似地,第一指示信息和第二指示信息也可以携带在相同信息中,或者携带在不同信息中。用于携带所述第一指示信息、第二指示信息、第三指示信息的信息,包括但不限于RRC(Radio Resource Control,无线资源控制)信令。
例如以第一指示携带在RRC信令中为例,RRC信令可以包括2个比特位,那么可以指示4种情况。
例如00指示情况1:对G-RNTI1、G-RNTI2、G-RNTI3对应的码本进行捆绑操作;
例如01指示情况2:对G-RNTI1、G-RNTI2对应的码本进行捆绑操作;
例如10指示情况3:对G-RNTI1、G-RNTI3对应的码本进行捆绑操作;
例如11指示情况4:不执行对不同G-RNTI对应的码本进行捆绑操作;对于这种情况下,终端可以采用上述实施例5A所示的方式,将位于同一个所述码本内的至少两个比特位进行捆绑操作以得到所述目标码本,或者不进行捆绑操作。具体执行哪种操作,可以根据需要进行约定。
在一个实施例中,所述目标码本为对所述G-RNTI对应的码本中的比特位和C-RNTI对应的码本中的比特位进行捆绑操作得到的;
所述根据所述目标码本中的比特位确定所述终端对于所述至少一个G-RNTI对应的码本中每个比特位对应的PDSCH候选是否成功解码包括:
根据所述目标码本中的比特位确定所述终端对于所述G-RNTI对应的码本中的比特位和单播PDSCH对应的码本中的比特位所对应的PDSCH候选是否成功解码。
在一个实施例中,G-RNTI可以指示给进行多播(也可以称作组播)业务(MBS, Multicast Broadcast Service)的终端,G-RNTI对应的Type-1码本中的比特位,可以用于指示MBS PDSCH的接收成败情况。
本实施例进行捆绑操作的对象,可以不限于G-RNTI对应的码本,还可以适用于单播PDSCH对应的码本(例如Type-1码本),也即可以将单播PDSCH对应的码本中的比特位与G-RNTI对应的码本中的比特位进行捆绑操作以得到所述目标码本。据此,可以进一步降低需要传输的码本中比特位的总量,有利于进一步降低上行开销。
在这种情况下,网络侧设备根据所述目标码本中的比特位可以确定所述终端对于所述G-RNTI对应的码本中的比特位和单播PDSCH对应的码本中的比特位所对应的PDSCH候选是否成功解码。
图17是根据本公开的实施例示出的又一种接收确定方法的示意流程图。如图17所示,所述方法还包括:
在步骤S1701中,响应于确定所述终端对于所述至少一个G-RNTI对应的码本中第一比特位对应的PDSCH候选未成功解码,向所述终端发送重传调度信息,用于调度在所述第一比特位对应的PDSCH候选上进行PDSCH重传。
在一个实施例中,网络侧设备在接收到终端上报的目标码本后,可以根据码本中的比特位确定终端对于PDSCH的接收成败情况,对于接收失败(例如解码失败)的PDSCH,网络侧可以进行重传,而为了使得终端能够接收到重传的PDSCH,需要先发送重传调度信息,以供终端确定接收重传的PDSCH的资源。
例如在确定终端对于所述至少一个G-RNTI对应的码本中第一比特位对应的PDSCH候选未成功解码,向所述终端发送重传调度信息,用于调度在所述第一比特位对应的PDSCH候选上进行PDSCH重传。
与前述的码本传输方法和接收确定方法的实施例相对应,本公开还提供了码本传输装置和接收确定装置的实施例。
图18是根据本公开的实施例示出的一种码本传输装置的示意框图。本实施例所示的码本传输装置可以适用于终端,所述终端包括但不限于手机、平板电脑、可穿戴设备、传感器、物联网设备(例如NB-IoT、MTC、eMTC)等通信装置。所述终端可以与网络侧设备通信,所述网络侧设备包括但不限于4G、5G、6G等通信***中的网络侧设备,例如基站、核心网等。
如图18所示,所述码本传输装置可以包括
处理模块1801,被配置为确定被配置的群组无线网络临时标识G-RNTI;生成所述G-RNTI对应的码本;对所述码本中的比特位进行捆绑操作以得到目标码本;
发送模块1802,被配置为将所述目标码本发送至网络侧设备。
在一个实施例中,所述捆绑操作包括逻辑与运算。
在一个实施例中,所述处理模块,被配置为将至少两个所述码本中相对应的比特位进行捆绑操作以得到目标码本。
在一个实施例中,所述处理模块,还被配置为确定至少两个所述码本中包含比特位的数量最多的第一码本;
响应于至少两个所述码本中的第二码本包含的比特位的第二数量与所述第一码本包含的比特位的第一数量不同,根据所述第一数量对所述第二码本包含的比特位进行补充,其中,补充的比特位用于指示混合自动重传请求确认HARQ-ACK。
在一个实施例中,所述装置还包括:
第一接收模块,被配置为接收所述网络侧设备发送的第一指示;
其中,所述处理模块,还被配置为根据所述第一指示确定进行捆绑操作的码本。
在一个实施例中,所述处理模块,被配置为将位于同一个所述码本内的至少两个比特位进行捆绑操作以得到所述目标码本。
在一个实施例中,所述装置还包括:
第二接收模块,被配置为接收所述网络侧设备发送的第二指示;
其中,所述处理模块,还被配置为根据所述第二指示确定进行捆绑操作的比特位的数量。
在一个实施例中,所述装置还包括:
第三接收模块,被配置为接收所述网络侧设备发送的第三指示;
其中,所述处理模块,还被配置为根据所述第三指示确定是否对所述码本中的比特位进行捆绑操作以得到所述目标码本。
在一个实施例中,所述处理模块,还被配置为确定单播unicast PDSCH对应的码本;
其中,所述处理模块被配置为对所述G-RNTI对应的码本中的比特位和所述 unicast PDSCH对应的码本中的比特位进行捆绑操作以得到所述目标码本。
在一个实施例中,所述装置还包括:
第四接收模块,被配置为接收所述网络侧设备发送的重传调度信息;
其中,所述处理模块,还被配置为响应于确定所述重传调度信息所调度的PDSCH已成功解码,忽略所述重传调度信息。
图19是根据本公开的实施例示出的一种接收确定装置的示意框图。本实施例所示的接收确定装置可以适用于网络侧设备,所述网络侧设备可以与终端通信,所述网络侧设备包括但不限于4G基站、5G基站、6G基站等通信***中的基站,所述终端包括但不限于手机、平板电脑、可穿戴设备、传感器、物联网设备(例如NB-IoT、MTC、eMTC)等通信装置。
如图19所示,所述接收确定装置可以包括:
接收模块1901,被配置为接收终端发送的目标码本,其中,所述目标码本为对至少一个G-RNTI对应的码本中的比特位进行捆绑操作得到的;
处理模块1902,被配置为根据所述目标码本中的比特位确定所述终端对于所述至少一个G-RNTI对应的码本中每个比特位对应的PDSCH候选是否成功解码。
在一个实施例中,所述捆绑操作包括逻辑与运算。
在一个实施例中,所述目标码本为将至少两个码本中相对应的比特位进行捆绑操作以得到的;
所述处理模块,被配置为根据所述目标码本中的比特位确定所述终端对于所述至少两个码本中相对应的比特位所对应的PDSCH候选是否成功解码。
在一个实施例中,所述装置还包括:
第一发送模块,被配置为向所述终端发送第一指示,用于指示进行捆绑操作的码本。
在一个实施例中,所述目标码本为将位于同一个所述码本内的至少两个比特位进行捆绑操作得到的,所述对所述码本中的比特位进行捆绑操作以得到目标码本包括:
所述处理模块,被配置为根据所述目标码本中的比特位确定所述终端对于所述至少一个码本中的至少两个比特位所对应的PDSCH候选是否成功解码。
在一个实施例中,所述装置还包括:
第二发送模块,被配置为向所述终端发送第二指示,用于指示进行捆绑操作的比特位的数量。
在一个实施例中,所述装置还包括:
第三发送模块,被配置为向所述终端发送第三指示,用于指示是否对所述码本中的比特位进行捆绑操作以得到所述目标码本。
在一个实施例中,所述目标码本为对所述G-RNTI对应的码本中的比特位和C-RNTI对应的码本中的比特位进行捆绑操作得到的;
所述处理模块,被配置为根据所述目标码本中的比特位确定所述终端对于所述G-RNTI对应的码本中的比特位和单播PDSCH对应的码本中的比特位所对应的PDSCH候选是否成功解码。
在一个实施例中,所述装置还包括:
第四发送模块,被配置为响应于确定所述终端对于所述至少一个G-RNTI对应的码本中第一比特位对应的PDSCH候选未成功解码,向所述终端发送重传调度信息,用于调度在所述第一比特位对应的PDSCH候选上进行PDSCH重传。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在相关方法的实施例中进行了详细描述,此处将不做详细阐述说明。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理模块,即可以位于一个地方,或者也可以分布到多个网络模块上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
本公开的实施例还提出一种通信装置,包括:处理器;用于存储计算机程序的存储器;其中,当所述计算机程序被处理器执行时,实现上述任一实施例所述的码本传输方法。
本公开的实施例还提出一种通信装置,包括:处理器;用于存储计算机程序的存储器;其中,当所述计算机程序被处理器执行时,实现上述任一实施例所述的接收 确定方法。
本公开的实施例还提出一种计算机可读存储介质,用于存储计算机程序,当所述计算机程序被处理器执行时,实现上述任一实施例所述的码本传输方法中的步骤。
本公开的实施例还提出一种计算机可读存储介质,用于存储计算机程序,当所述计算机程序被处理器执行时,实现上述任一实施例所述的接收确定方法中的步骤。
如图20所示,图20是根据本公开的实施例示出的一种用于接收确定的装置2000的示意框图。装置2000可以被提供为一基站。参照图20,装置2000包括处理组件2022、无线发射/接收组件2024、天线组件2026、以及无线接口特有的信号处理部分,处理组件2022可进一步包括一个或多个处理器。处理组件2022中的其中一个处理器可以被配置为实现上述任一实施例所述的接收确定方法。
图21是根据本公开的实施例示出的一种用于码本传输的装置2100的示意框图。例如,装置2100可以是移动电话、计算机、数字广播终端、消息收发设备、游戏控制台、平板设备、医疗设备、健身设备、个人数字助理等。
参照图21,装置2100可以包括以下一个或多个组件:处理组件2102、存储器2104、电源组件2106、多媒体组件2108、音频组件2110、输入/输出(I/O)的接口2112、传感器组件2114以及通信组件2116。
处理组件2102通常控制装置2100的整体操作,诸如与显示、电话呼叫、数据通信、相机操作和记录操作相关联的操作。处理组件2102可以包括一个或多个处理器2120来执行指令,以完成上述的码本传输方法的全部或部分步骤。此外,处理组件2102可以包括一个或多个模块,便于处理组件2102和其他组件之间的交互。例如,处理组件2102可以包括多媒体模块,以方便多媒体组件2108和处理组件2102之间的交互。
存储器2104被配置为存储各种类型的数据以支持在装置2100的操作。这些数据的示例包括用于在装置2100上操作的任何应用程序或方法的指令、联系人数据、电话簿数据、消息、图片、视频等。存储器2104可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM)、电可擦除可编程只读存储器(EEPROM)、可擦除可编程只读存储器(EPROM)、可编程只读存储器(PROM),只读存储器(ROM)、磁存储器、快闪存储器、磁盘或光盘。
电源组件2106为装置2100的各种组件提供电力。电源组件2106可以包括电源管理***,一个或多个电源,及其他与为装置2100生成、管理和分配电力相关联的 组件。
多媒体组件2108包括在所述装置2100和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件2108包括一个前置摄像头和/或后置摄像头。当装置2100处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜***或具有焦距和光学变焦能力。
音频组件2110被配置为输出和/或输入音频信号。例如,音频组件2110包括一个麦克风(MIC),当装置2100处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器2104或经由通信组件2116发送。在一些实施例中,音频组件2110还包括一个扬声器,用于输出音频信号。
I/O接口2112为处理组件2102和***接口模块之间提供接口,上述***接口模块可以是键盘、点击轮、按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件2114包括一个或多个传感器,用于为装置2100提供各个方面的状态评估。例如,传感器组件2114可以检测到装置2100的打开/关闭状态,组件的相对定位,例如所述组件为装置2100的显示器和小键盘,传感器组件2114还可以检测装置2100或装置2100一个组件的位置改变,用户与装置2100接触的存在或不存在,装置2100方位或加速/减速和装置2100的温度变化。传感器组件2114可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件2114还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件2114还可以包括加速度传感器、陀螺仪传感器、磁传感器、压力传感器或温度传感器。
通信组件2116被配置为便于装置2100和其他设备之间有线或无线方式的通信。装置2100可以接入基于通信标准的无线网络,如WiFi、2G、3G、4G LTE、5G NR或它们的组合。在一个示例性实施例中,通信组件2116经由广播信道接收来自外部广 播管理***的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件2116还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术、红外数据协会(IrDA)技术、超宽带(UWB)技术、蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,装置2100可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述码本传输方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器2104,上述指令可由装置2100的处理器2120执行以完成上述码本传输方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
本领域技术人员在考虑说明书及实践这里公开的公开后,将容易想到本公开的其它实施方案。本公开旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
以上对本公开实施例所提供的方法和装置进行了详细介绍,本文中应用了具体 个例对本公开的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本公开的方法及其核心思想;同时,对于本领域的一般技术人员,依据本公开的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本公开的限制。

Claims (25)

  1. 一种码本传输方法,其特征在于,适用于终端,所述方法包括:
    确定被配置的群组无线网络临时标识G-RNTI;
    生成所述G-RNTI对应的码本;
    对所述码本中的比特位进行捆绑操作以得到目标码本;
    将所述目标码本发送至网络侧设备。
  2. 根据权利要求1所述的方法,其特征在于,所述捆绑操作包括逻辑与运算。
  3. 根据权利要求1所述的方法,其特征在于,所述对所述码本中的比特位进行捆绑操作以得到目标码本包括:
    将至少两个所述码本中相对应的比特位进行捆绑操作以得到目标码本。
  4. 根据权利要求3所述的方法,其特征在于,所述方法还包括:
    响应于至少两个所述码本中包含的比特位数量不同,确定其中包含比特位的数量最多的第一码本;
    根据所述第一码本中比特位的数量对其它码本包含的比特位进行补充,其中,补充的比特位用于指示混合自动重传请求确认HARQ-ACK。
  5. 根据权利要求3所述的方法,其特征在于,所述方法还包括:
    接收所述网络侧设备发送的第一指示;
    根据所述第一指示确定进行捆绑操作的码本。
  6. 根据权利要求1所述的方法,其特征在于,所述对所述码本中的比特位进行捆绑操作以得到目标码本包括:
    将位于同一个所述码本内的至少两个比特位进行捆绑操作以得到所述目标码本。
  7. 根据权利要求6所述的方法,其特征在于,所述方法还包括:
    接收所述网络侧设备发送的第二指示;
    根据所述第二指示确定进行捆绑操作的比特位的数量。
  8. 根据权利要求1至7中任一项所述的方法,其特征在于,所述方法还包括:
    接收所述网络侧设备发送的第三指示;
    根据所述第三指示确定是否对所述码本中的比特位进行捆绑操作以得到所述目标码本。
  9. 根据权利要求1至7中任一项所述的方法,其特征在于,所述方法还包括:
    确定单播unicast PDSCH对应的码本;
    其中,所述对所述码本中的比特位进行捆绑操作以得到目标码本包括:
    对所述G-RNTI对应的码本中的比特位和所述unicast PDSCH对应的码本中的比特位进行捆绑操作以得到所述目标码本。
  10. 根据权利要求1至7中任一项所述的方法,其特征在于,所述方法还包括:
    接收所述网络侧设备发送的重传调度信息;
    响应于确定所述重传调度信息所调度的PDSCH已成功解码,忽略所述重传调度信息。
  11. 一种接收确定方法,其特征在于,适用于网络侧设备,所述方法包括:
    接收终端发送的目标码本,其中,所述目标码本为对至少一个G-RNTI对应的码本中的比特位进行捆绑操作得到的;
    根据所述目标码本中的比特位确定所述终端对于所述至少一个G-RNTI对应的码本中每个比特位对应的PDSCH候选是否成功解码。
  12. 根据权利要求11所述的方法,其特征在于,所述捆绑操作包括逻辑与运算。
  13. 根据权利要求12所述的方法,其特征在于,所述目标码本为将至少两个码本中相对应的比特位进行捆绑操作以得到的;
    所述根据所述目标码本中的比特位确定所述终端对于所述至少一个G-RNTI对应的码本中每个比特位对应的PDSCH候选是否成功解码包括:
    根据所述目标码本中的比特位确定所述终端对于所述至少两个码本中相对应的比特位所对应的PDSCH候选是否成功解码。
  14. 根据权利要求13所述的方法,其特征在于,所述方法还包括:
    向所述终端发送第一指示,用于指示进行捆绑操作的码本。
  15. 根据权利要求12所述的方法,其特征在于,所述目标码本为将位于同一个所述码本内的至少两个比特位进行捆绑操作得到的,所述对所述码本中的比特位进行捆绑操作以得到目标码本包括:
    所述根据所述目标码本中的比特位确定所述终端对于所述至少一个G-RNTI对应的码本中每个比特位对应的PDSCH候选是否成功解码包括:
    根据所述目标码本中的比特位确定所述终端对于所述至少一个码本中的至少两个比特位所对应的PDSCH候选是否成功解码。
  16. 根据权利要求15所述的方法,其特征在于,所述方法还包括:
    向所述终端发送第二指示,用于指示进行捆绑操作的比特位的数量。
  17. 根据权利要求11至16中任一项所述的方法,其特征在于,所述方法还包括:
    向所述终端发送第三指示,用于指示是否对所述码本中的比特位进行捆绑操作以 得到所述目标码本。
  18. 根据权利要求11至16中任一项所述的方法,其特征在于,所述目标码本为对所述G-RNTI对应的码本中的比特位和C-RNTI对应的码本中的比特位进行捆绑操作得到的;
    所述根据所述目标码本中的比特位确定所述终端对于所述至少一个G-RNTI对应的码本中每个比特位对应的PDSCH候选是否成功解码包括:
    根据所述目标码本中的比特位确定所述终端对于所述G-RNTI对应的码本中的比特位和单播PDSCH对应的码本中的比特位所对应的PDSCH候选是否成功解码。
  19. 根据权利要求11至16中任一项所述的方法,其特征在于,所述方法还包括:
    响应于确定所述终端对于所述至少一个G-RNTI对应的码本中第一比特位对应的PDSCH候选未成功解码,向所述终端发送重传调度信息,用于调度在所述第一比特位对应的PDSCH候选上进行PDSCH重传。
  20. 一种码本传输装置,其特征在于,适用于终端,所述装置包括:
    处理模块,被配置为确定被配置的群组无线网络临时标识G-RNTI;生成所述G-RNTI对应的码本;对所述码本中的比特位进行捆绑操作以得到目标码本;
    发送模块,被配置为将所述目标码本发送至网络侧设备。
  21. 一种接收确定装置,其特征在于,适用于网络侧设备,所述装置包括:
    接收模块,被配置为接收终端发送的目标码本,其中,所述目标码本为对至少一个G-RNTI对应的码本中的比特位进行捆绑操作得到的;
    处理模块,被配置为根据所述目标码本中的比特位确定所述终端对于所述至少一个G-RNTI对应的码本中每个比特位对应的PDSCH候选是否成功解码。
  22. 一种通信装置,其特征在于,包括:
    处理器;
    用于存储计算机程序的存储器;
    其中,当所述计算机程序被处理器执行时,实现权利要求1至10中任一项所述的码本传输方法。
  23. 一种通信装置,其特征在于,包括:
    处理器;
    用于存储计算机程序的存储器;
    其中,当所述计算机程序被处理器执行时,实现权利要求11至19中任一项所述的接收确定方法。
  24. 一种计算机可读存储介质,用于存储计算机程序,其特征在于,当所述计算机程序被处理器执行时,实现权利要求1至10中任一项所述的码本传输方法中的步骤。
  25. 一种计算机可读存储介质,用于存储计算机程序,其特征在于,当所述计算机程序被处理器执行时,实现权利要求11至19中任一项所述的接收确定方法中的步骤。
PCT/CN2022/078085 2022-02-25 2022-02-25 码本传输、接收确定方法和装置、通信装置和存储介质 WO2023159519A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202280000478.7A CN114731506B (zh) 2022-02-25 2022-02-25 码本传输、接收确定方法和装置、通信装置和存储介质
PCT/CN2022/078085 WO2023159519A1 (zh) 2022-02-25 2022-02-25 码本传输、接收确定方法和装置、通信装置和存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/078085 WO2023159519A1 (zh) 2022-02-25 2022-02-25 码本传输、接收确定方法和装置、通信装置和存储介质

Publications (1)

Publication Number Publication Date
WO2023159519A1 true WO2023159519A1 (zh) 2023-08-31

Family

ID=82232337

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/078085 WO2023159519A1 (zh) 2022-02-25 2022-02-25 码本传输、接收确定方法和装置、通信装置和存储介质

Country Status (2)

Country Link
CN (1) CN114731506B (zh)
WO (1) WO2023159519A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018021819A1 (en) * 2016-07-27 2018-02-01 Samsung Electronics Co., Ltd. Apparatus and method for retransmission in wireless communication system
CN109314881A (zh) * 2016-06-30 2019-02-05 夏普株式会社 终端装置、基站装置、通信方法以及集成电路
US20200389912A1 (en) * 2017-11-24 2020-12-10 Telefonaktiebolaget Lm Ericsson (Publ) Control Signaling for Radio Access Networks
WO2021197122A1 (zh) * 2020-03-30 2021-10-07 维沃移动通信有限公司 Harq-ack的反馈模式确定方法、配置方法及设备

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5785605B2 (ja) * 2010-04-08 2015-09-30 エルジー エレクトロニクス インコーポレイティド 多重アンテナ支援無線通信システムにおいてコードブックを用いた信号伝送方法及び装置
WO2013166723A1 (en) * 2012-05-11 2013-11-14 Nokia Siemens Networks Oy Ack/nak bit bundling in carrier aggregation scenarios
CN109802902B (zh) * 2017-11-16 2021-09-28 维沃移动通信有限公司 一种物理资源块捆绑大小确定方法、终端设备及网络设备
US10873936B2 (en) * 2018-03-28 2020-12-22 Asustek Computer Inc. Method and apparatus for determining codebook size in a wireless communication system
WO2019216729A1 (ko) * 2018-05-11 2019-11-14 주식회사 윌러스표준기술연구소 무선 통신 시스템의 상향 링크 제어 정보 멀티플렉싱 방법 및 이를 이용하는 장치
CN111147208B (zh) * 2018-11-02 2023-09-26 中兴通讯股份有限公司 信息传输方法及装置
CN115842607B (zh) * 2018-11-02 2024-06-11 中兴通讯股份有限公司 Harq-ack码本确定方法及装置、终端、存储介质
WO2021018051A1 (en) * 2019-07-26 2021-02-04 FG Innovation Company Limited Method of performing hybrid automatic repeat request codebook generation and related device
WO2021063405A1 (en) * 2019-10-03 2021-04-08 FG Innovation Company Limited Methods and apparatuses for harq codebook construction
CN113573256B (zh) * 2020-04-28 2022-08-19 维沃移动通信有限公司 信息反馈、资源调度方法、终端及网络设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109314881A (zh) * 2016-06-30 2019-02-05 夏普株式会社 终端装置、基站装置、通信方法以及集成电路
WO2018021819A1 (en) * 2016-07-27 2018-02-01 Samsung Electronics Co., Ltd. Apparatus and method for retransmission in wireless communication system
US20200389912A1 (en) * 2017-11-24 2020-12-10 Telefonaktiebolaget Lm Ericsson (Publ) Control Signaling for Radio Access Networks
WO2021197122A1 (zh) * 2020-03-30 2021-10-07 维沃移动通信有限公司 Harq-ack的反馈模式确定方法、配置方法及设备

Also Published As

Publication number Publication date
CN114731506B (zh) 2024-07-09
CN114731506A (zh) 2022-07-08

Similar Documents

Publication Publication Date Title
EP3739790B1 (en) Information feedback method and apparatus
US12035312B2 (en) Communication feedback method, user device, and storage medium
US11943057B2 (en) Method and apparatus for indicating sidelink hybrid automatic repeat request (HARQ) feedback
WO2023240646A1 (zh) 小区确定、下行控制信息发送方法和装置
JP7337201B2 (ja) データ伝送方法、装置、システム及び記憶媒体
WO2019237360A1 (zh) 确定上下行切换点的方法及装置
EP3621231A1 (en) Harq feedback method and apparatus, device, and computer readable storage medium
WO2023240647A1 (zh) 调度确定、下行控制信息发送方法和装置
WO2023097875A1 (zh) 下行控制信息检测、发送方法及装置、存储介质
WO2020019258A1 (zh) 下行控制信息发送方法、接收方法、装置及存储介质
US20220279524A1 (en) Pusch receiving method and device, pusch sending method and device
WO2023130466A1 (zh) 传输控制方法、装置、通信装置和存储介质
CN113994615B (zh) Harq码本处理方法及装置、通信设备及存储介质
WO2023159519A1 (zh) 码本传输、接收确定方法和装置、通信装置和存储介质
WO2023151094A1 (zh) 指示确定、信息设置方法和装置、通信装置和存储介质
WO2023010578A1 (zh) 传输控制方法和装置、pdsch接收方法和装置
US20240178941A1 (en) Method and apparatus for sending harq-ack, method and apparatus for receiving harq-ack, device, and storage medium
US20240080137A1 (en) Communication method, communication apparatus, and storage medium
WO2024060235A1 (zh) 资源配置方法及装置
WO2022056745A1 (zh) 信息传输方法及装置、存储介质
WO2024124498A1 (zh) 下行控制信息解码、生成方法和装置
WO2022267061A1 (zh) 极化指示、极化确定方法和装置、通信装置和存储介质
WO2023082109A1 (zh) 半静态调度的重新激活、确定方法和装置
WO2023077422A1 (zh) Harq-ack信息反馈方法及装置、存储介质
WO2022233056A1 (zh) 反馈方法、反馈装置及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22927802

Country of ref document: EP

Kind code of ref document: A1