CN109600748B - Method and apparatus for transitioning from unauthorized-based transmission to authorized-based transmission - Google Patents

Method and apparatus for transitioning from unauthorized-based transmission to authorized-based transmission Download PDF

Info

Publication number
CN109600748B
CN109600748B CN201810533171.9A CN201810533171A CN109600748B CN 109600748 B CN109600748 B CN 109600748B CN 201810533171 A CN201810533171 A CN 201810533171A CN 109600748 B CN109600748 B CN 109600748B
Authority
CN
China
Prior art keywords
message
transmission
sent
resource
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810533171.9A
Other languages
Chinese (zh)
Other versions
CN109600748A (en
Inventor
韩云博
庄宏成
丁志明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to PCT/CN2018/107788 priority Critical patent/WO2019062785A1/en
Publication of CN109600748A publication Critical patent/CN109600748A/en
Application granted granted Critical
Publication of CN109600748B publication Critical patent/CN109600748B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0278Traffic management, e.g. flow control or congestion control using buffer status reports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/21Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a method, network equipment and terminal equipment for converting unauthorized-based transmission into authorized-based transmission. The method comprises the following steps: the method comprises the steps that first equipment receives a first message sent by second equipment, the first message is used for requesting to convert unauthorized-based transmission into authorized-based transmission, and resources occupied for transmitting the first message are less than resources occupied for transmitting a Buffer Status Report (BSR); determining uplink scheduling information for grant-based transmission of the second device based at least on the first message and the non-grant-based transmission of the second device; sending the uplink scheduling information to the second device; and the first equipment receives second data sent by the second equipment according to the uplink scheduling information. The technical scheme can reduce transmission delay and improve the communication efficiency of the system.

Description

Method and apparatus for transitioning from unauthorized-based transmission to authorized-based transmission
Technical Field
The embodiments of the present application relate to the field of communications, and in particular, to a method, a network device, and a terminal device for transitioning from an unauthorized-based transmission to an authorized-based transmission.
Background
In an existing cellular communication system, such as a global system for mobile communications (GSM), a Wideband Code Division Multiple Access (WCDMA) mobile communication system, a Long Term Evolution (LTE) system, and the like, supported communication is mainly for voice and data communication. In a new radio access (NR) system, not only traditional voice and data communication but also massive internet of things communication (mtc) will be supported. For machine-to-machine (M2M) communication services, there may be ultra-reliable and low latency communications (URLLC), which require not only short transmission latency, but also reliability, such as vehicle-to-vehicle (V2V) services. If the transmission is not reliable, retransmission may result.
When User Equipment (User Equipment, UE) has uplink data to transmit, a Scheduling Request (SR) command needs to be sent to notify a base station that there is uplink data scheduled to be sent, uplink Scheduling information of a Buffer Status Report (BSR) is received, transmission resources required for reporting the BSR are sent to the base station, and finally, a second piece of uplink Scheduling information is received, so that the uplink data can be sent to the base station. Therefore, when the user equipment sends the SR application to the base station to send the uplink data to the user equipment, the user equipment can send the uplink data, and a plurality of signaling interactions are required, which may cause a large delay. Therefore, how to reduce the time delay of the uplink transmission of the ue and improve the communication efficiency of the system becomes a technical problem to be solved urgently.
Disclosure of Invention
The application provides a method for converting unauthorized transmission into authorized transmission, a network device and a terminal device, which can improve the communication efficiency of a system.
In a first aspect, a method for transitioning from an unauthorized-based transmission to an authorized-based transmission is provided, which includes:
the method comprises the steps that first equipment receives a first message sent by second equipment, the first message is used for requesting to convert unauthorized-based transmission into authorized-based transmission, and resources occupied by transmission of the first message are less than resources occupied by transmission of a Buffer Status Report (BSR);
the first device determines uplink scheduling information of the grant-based transmission of the second device at least according to the first message and the non-grant-based transmission of the second device;
the first device sends the uplink scheduling information to the second device;
and the first equipment receives second data sent by the second equipment according to the uplink scheduling information.
In the above technical solution, the uplink scheduling information of the second device based on the authorized transmission is determined at least according to the first message and the unauthorized transmission of the second device, so that the transmission delay can be reduced, and the communication efficiency of the system can be improved.
With reference to the first aspect, in a first possible implementation manner, the determining uplink scheduling information of grant-based transmission of the second device according to at least the first message and non-grant-based transmission of the second device includes: and in the case that first data based on unauthorized transmission sent by the second device is received, the first device cannot successfully demodulate the first data, but can identify a sender of the first data, determining the uplink scheduling information according to at least the first message and the first data which cannot be successfully demodulated.
In the above technical solution, the first device may directly determine the uplink scheduling information according to at least the first message and the first data that cannot be successfully demodulated, without the second device sending a BSR to the first device, which reduces the number of signaling interactions, and may effectively reduce the transmission delay and improve the communication efficiency of the system.
With reference to the first possible implementation manner of the first aspect, in a second possible implementation manner, before the first device receives the first message sent by the second device, the method further includes: in the case where first data based on an unauthorized transmission sent by the second device is received, the first device cannot successfully demodulate the first data but can identify the sender of the first data, a negative response to the first data is sent to the second device or a positive response to the first data is not sent to the second device within a certain time interval.
With reference to the first aspect, in a third possible implementation manner, the determining uplink scheduling information of grant-based transmission of the second device according to at least the first message and the non-grant-based transmission of the second device includes: and in the case that first data based on unauthorized transmission sent by the second device is received, the first device cannot successfully demodulate the first data, and cannot identify a sender of the first data, determining the uplink scheduling information according to at least the energy of the first message and the first data which cannot be successfully demodulated.
In the above technical solution, the first device may directly determine the uplink scheduling information according to at least the energy of the first message and the first data that cannot be successfully demodulated, and the second device is not required to send a BSR to the first device, so that the number of signaling interaction is reduced, the transmission delay can be effectively reduced, and the communication efficiency of the system is improved.
With reference to the first aspect or any one possible implementation manner of the first to third possible implementation manners of the first aspect, in a fourth possible implementation manner, the first message is uplink control information.
In the above technical solution, the uplink control information may be a simple signaling, which can reduce resource overhead and improve communication efficiency of the system.
With reference to the first aspect or any one possible implementation manner of the first to the third possible implementation manners of the first aspect, in a fifth possible implementation manner, the frame format of the first message is the same as that of the scheduling request SR, and a constellation diagram corresponding to the first message is different from that of the scheduling request SR.
In the above technical solution, the constellation diagrams corresponding to the first message and the scheduling request SR are different, and on the premise that no additional indication identifier is added, the first device may distinguish the first message and the scheduling request SR according to different constellation diagrams, which may improve communication efficiency of the system.
With reference to the first aspect or any one of the first to the third possible implementation manners of the first aspect, in a sixth possible implementation manner, the first message is sent through an unlicensed grant transfer scheduling request SR-like resource, where the SR-like resource is a resource separately divided by the first device, and the SR-like resource may be used to transmit the first message and/or a scheduling request SR.
In the technical scheme, the SR-like resource period can be shorter than the SR resource period, so that the transmission delay can be reduced, and the communication efficiency of the system can be improved.
In some possible implementation manners, the SR-like resource may also be used to transmit the scheduling request SR, which can improve the utilization efficiency of the system resource.
With reference to the first aspect or any one possible implementation manner of the first to third possible implementation manners of the first aspect, in a seventh possible implementation manner, the first message is energy that is transmitted by the second device and does not adopt a modulation manner.
In the above technical solution, the first message is energy transmitted by the second device without using a modulation scheme, and the second device is not required to transmit other indication information, so that system overhead can be reduced, and communication efficiency of the system can be improved.
With reference to the first aspect or any one of the first to third possible implementation manners of the first aspect, in an eighth possible implementation manner, the first message is sent together with third data transmitted by the second device to the first device in an uplink piggyback transmission manner.
In the above technical solution, the first message may be sent together with the third data transmitted by the second device to the first device in an uplink piggyback transmission manner, so that system resources may be effectively utilized, and the communication efficiency of the system may be improved.
With reference to the first aspect or any one possible implementation manner of the first to the eight possible implementation manners of the first aspect, in a ninth possible implementation manner, the receiving, by the first device, a first message sent by the second device includes: and the first equipment receives the first message sent by the second equipment on a physical uplink control channel resource.
With reference to the first aspect or any one possible implementation manner of the first to eight possible implementation manners of the first aspect, in a tenth possible implementation manner, the receiving, by the first device, a first message sent by the second device includes: the first device receives the first message sent by the second device on physical scheduling request channel resources.
With reference to the first aspect or any one possible implementation manner of the first to eight possible implementation manners of the first aspect, in an eleventh possible implementation manner, the receiving, by the first device, a first message sent by the second device includes: and the first equipment receives the first message sent by the second equipment on a physical uplink shared channel resource.
With reference to the first aspect or any one possible implementation manner of the first to the eight possible implementation manners of the first aspect, in a twelfth possible implementation manner, the receiving, by the first device, a first message sent by the second device includes: the first device receives the first message sent by the second device on resources based on an unauthorized transmission. In the above technical solution, the first device may receive the first message sent by the second device on the resource based on the unauthorized transmission, which may improve the utilization efficiency of the system resource, increase the reliability of the signaling transmission, and improve the communication efficiency of the system.
With reference to any one possible implementation manner of the ninth to twelfth possible implementation manners of the first aspect, in a thirteenth possible implementation manner, the receiving, by the first device, a first message sent by the second device includes: and the first equipment receives the first message sent by the second equipment on reserved resources, wherein the transmission period of the reserved resources is less than that of physical scheduling request channel resources. In the technical scheme, the transmission period of the reserved resource can be smaller than that of the physical scheduling request channel resource, so that the transmission delay can be reduced, and the communication efficiency of the system can be improved.
With reference to the thirteenth possible implementation manner of the first aspect, in a fourteenth possible implementation manner, the reserved resource is dedicated to one terminal device or shared by multiple terminal devices.
In the technical scheme, the reserved resources can be shared by a plurality of terminal devices, so that the use efficiency of system resources can be improved, and the communication efficiency of the system can be improved.
With reference to the first aspect or any one of the first to fourteenth possible implementation manners of the first aspect, in a fifteenth possible implementation manner, the method further includes: and before receiving the first data, the first device sends a second message to the second device, wherein the second message is used for indicating that a mechanism for converting unauthorized-based transmission into authorized-based transmission through the first message is adopted or not adopted.
With reference to the fifteenth possible implementation manner of the first aspect, in a sixteenth possible implementation manner, the sending the second message to the second device includes: sending the second message to the second device through a system message; or, the second message is sent to the second device through radio resource control signaling; or, sending the second message to the second device through a physical control message.
In a second aspect, a method for transitioning from an unauthorized-based transmission to an authorized-based transmission is provided, comprising:
the second equipment sends a first message to the first equipment, wherein the first message is used for requesting to convert the transmission based on the non-authorization into the transmission based on the authorization, and the resource occupied for transmitting the first message is less than the resource occupied for transmitting the Buffer Status Report (BSR); the second device receives uplink scheduling information of authorized-based transmission sent by the first device, wherein the uplink scheduling information is determined at least according to the first message and the unauthorized-based transmission of the second device; and the second equipment sends second data to the first equipment according to the uplink scheduling information.
In the above technical solution, the second device sends the first message to the first device, where the first message is used to request that the unauthorized transmission is converted into the authorized transmission, and the resource occupied for transmitting the first message is less than the resource occupied for transmitting the BSR, so that the resource overhead can be reduced, and the communication efficiency of the system can be improved.
With reference to the second aspect, in a first possible implementation manner of the second aspect, the sending, by the second device, the first message to the first device includes: and in the case of receiving a negative response to first data sent by the first device, the second device sends the first message to the first device, wherein the first data is data sent by the second device and based on unauthorized transmission.
In the above technical solution, when receiving a negative response of the first data sent by the first device, the second device sends the first message to the first device, where the first message is used to request that the unauthorized transmission is changed to the authorized transmission, so that the reliability of system transmission can be improved, and the communication efficiency of the system can be improved.
With reference to the second aspect, in a second possible implementation manner of the second aspect, the sending, by the second device, the first message to the first device includes: and in the case that a positive response to first data sent by the first device is not received within a specific time interval, the second device sends the first message to the first device, wherein the first data is data sent by the second device and based on unauthorized transmission.
In some possible implementations, when the second device does not receive a negative response sent by the first device after K times of repeated transmissions within a certain time interval, the second device considers that the first data transmission is successful and does not send the first message to the first device; or, the second device does not receive a negative response sent by the first device within a specific time interval (when K repeated transmissions are not used), the second device considers that the first data is successfully sent and does not send the first message to the first device, and K is a positive integer not greater than the maximum repeated transmission number.
In the above technical solution, when the positive response to the first data sent by the first device is not received within the specific time interval, the second device sends the first message to the first device, which can improve the reliability of system transmission, thereby improving the communication efficiency of the system.
With reference to the second aspect or the first or second possible implementation manner of the second aspect, in a third possible implementation manner of the second aspect, the first message is uplink control information.
In the above technical solution, the uplink control information may be a simple signaling, which can reduce resource overhead and improve communication efficiency of the system.
With reference to the second aspect or the first or second possible implementation manner of the second aspect, in a fourth possible implementation manner of the second aspect, the first message has the same frame format as that of the scheduling request SR, and a constellation diagram corresponding to the first message is different from that of the scheduling request SR.
In the above technical solution, the constellation diagrams corresponding to the first message and the scheduling request SR are different, and on the premise that no additional indication identifier is added, the first device may distinguish the first message and the scheduling request SR according to different constellation diagrams, which may improve communication efficiency of the system.
With reference to the second aspect or the first or second possible implementation manner of the second aspect, in a fifth possible implementation manner of the second aspect, the first message is sent through an unlicensed grant transfer scheduling request SR-like resource, where the SR-like resource is a resource separately divided by the first device, and the SR-like resource may be used to transmit the first message and/or the scheduling request SR.
In the technical scheme, the SR-like resource period can be shorter than the SR resource period, so that the transmission delay can be reduced, and the communication efficiency of the system can be improved.
With reference to the second aspect or the first or second possible implementation manner of the second aspect, in a sixth possible implementation manner of the second aspect, the first message is energy that is transmitted by the second device and that does not adopt a modulation scheme.
In the above technical solution, the first message is energy which is transmitted by the second device and does not adopt a modulation mode, and the second device is not required to transmit other indication information, so that the communication efficiency of the system can be improved.
With reference to the second aspect or the first or second possible implementation manner of the second aspect, in a seventh possible implementation manner of the second aspect, the first message is sent together with third data transmitted by the second device to the first device in an uplink piggyback transmission manner.
In the above technical solution, the first message may be sent together with the third data transmitted by the second device to the first device in an uplink piggyback transmission manner, so that system resources may be effectively utilized, and the communication efficiency of the system may be improved.
With reference to the second aspect or any one possible implementation manner of the first to seventh possible implementation manners of the second aspect, in an eighth possible implementation manner of the second aspect, the sending, by the second device, the first message to the first device includes: and the second equipment sends the first message to the first equipment on the physical uplink control channel resource.
With reference to the second aspect or any one possible implementation manner of the first to seventh possible implementation manners of the second aspect, in a ninth possible implementation manner of the second aspect, the sending, by the second device, the first message to the first device includes: the second device sends the first message to the first device on a physical scheduling request channel resource.
With reference to the second aspect or any one possible implementation manner of the first to seventh possible implementation manners of the second aspect, in a tenth possible implementation manner of the second aspect, the sending, by the second device, the first message to the first device includes: and the second equipment sends the first message to the first equipment on the physical uplink shared channel resource.
With reference to the second aspect or any one of the first to the seventh possible implementation manners of the second aspect, in an eleventh possible implementation manner of the second aspect, the sending, by the second device, the first message to the first device includes: the second device sends the first message to the first device on a resource based on the unauthorized transmission.
In the above technical solution, the first device may receive the first message sent by the second device on the resource based on the unauthorized transmission, which may improve the utilization efficiency of the system resource, increase the reliability of the signaling transmission, and improve the communication efficiency of the system.
With reference to any one of the eighth to eleventh possible implementation manners of the second aspect, in a twelfth possible implementation manner of the second aspect, the sending, by the second device, the first message to the first device includes: and the second equipment sends the first message to the first equipment on reserved resources, wherein the transmission period of the reserved resources is less than that of physical scheduling request channel resources.
In the technical scheme, the transmission period of the reserved resource can be smaller than that of the physical scheduling request channel resource, so that the transmission delay can be reduced, and the communication efficiency of the system can be improved.
With reference to the twelfth possible implementation manner of the second aspect, in a thirteenth possible implementation manner of the second aspect, the reserved resource is dedicated to one terminal device or shared by multiple terminal devices.
In the technical scheme, the reserved resources can be shared by a plurality of terminal devices, so that the use efficiency of system resources can be improved, and the communication efficiency of the system can be improved.
With reference to the second aspect or any possible implementation manner of the first to thirteen possible implementation manners of the second aspect, in a fourteenth possible implementation manner of the second aspect, the method further includes: and before sending the first data, the second device receives a second message sent by the first device, wherein the second message is used for indicating that a mechanism for converting unauthorized-based transmission into authorized-based transmission through the first message is adopted or not adopted.
With reference to the fourteenth possible implementation manner of the second aspect, in a fifteenth possible implementation manner of the second aspect, the receiving a second message sent by the first device includes: receiving the second message sent by the first device through a system message; or, receiving the second message sent by the first device through radio resource control signaling; or, receiving the second message sent by the first device through a physical control message.
In a third aspect, a network device is provided, which includes means for performing the method in the first aspect or any possible implementation manner of the first aspect.
In a fourth aspect, a terminal device is provided, which includes means for performing the method of the second aspect or any possible implementation manner of the second aspect.
In a fifth aspect, a network device is provided, which includes: a processor and a transceiver for performing the method of the first aspect or any possible implementation of the first aspect. In a possible implementation form, the network device further includes a memory, where a computer program operable on the processor is stored, and the processor executes the computer program to cause the network device to perform the method of the first aspect or any possible implementation form of the first aspect.
In a sixth aspect, a terminal device is provided, which includes: a processor and a transceiver for performing the method of the second aspect or any possible implementation of the second aspect. In one possible implementation form, the network device further includes a memory, where a computer program operable on the processor is stored, and the processor executes the computer program to enable the terminal device to execute the method in the second aspect or any possible implementation form of the second aspect.
In a seventh aspect, a computer storage medium is provided for storing a computer program comprising instructions for performing the method of the first aspect or any possible implementation manner of the first aspect.
In an eighth aspect, there is provided a computer storage medium for storing a computer program comprising instructions for performing the method of the second aspect or any possible implementation of the second aspect.
A ninth aspect provides a computer program product comprising instructions which, when run on a terminal device, cause the terminal device to perform the method of the first aspect or any possible implementation thereof.
A tenth aspect provides a computer program product comprising instructions which, when run on a network device, cause the network device to perform the method of the second aspect or any possible implementation thereof.
In an eleventh aspect, a communication chip is provided, in which instructions are stored, which, when run on a network device or a terminal device, cause the network device or the terminal device to perform the method of the above aspects.
A twelfth aspect provides a system, including the network device provided in the third aspect and the terminal device provided in the fourth aspect; alternatively, the network device provided by the fifth aspect and the terminal device provided by the sixth aspect are included.
The present application further provides the following embodiments, and the numbers of the embodiments provided in this section do not have explicit correspondences with the numbers of the embodiments provided in other sections of the present application, and only for convenience of description of this section:
1. a method for transitioning from an unauthorized-based transmission to an authorized-based transmission for a first device, the method comprising:
the first equipment receives uplink data which is sent by second equipment and is based on unauthorized transmission;
the first device sends a negative response of the uplink data to the second device;
the first device receives a first message sent by the second device to inform the first device that the first device wishes to convert from an unauthorized-based transmission to an authorized-based transmission;
the first equipment sends uplink scheduling information to the second equipment;
the first device receives uplink data of grant-based transmission sent to the first device by a second device.
In the embodiment provided above, after the first device sends the negative response of the uplink data to the second device in the Grant-free transmission, the second device may send the first message to the first device to notify the first device that it wants to change the Grant-free transmission into the Grant-based transmission, and perform the Grant-based transmission using the two-step short flow of uplink scheduling-uplink data, which reduces overhead compared to the conventional four-step flow (SR-first uplink scheduling-BSR-second uplink scheduling).
2. The method as described in 1:
before the first device and the second device perform unauthorized-based transmission, the first device sends a second message to the second device, where the second message is at least used to configure and/or activate the first device and the second device to employ a mechanism for converting unauthorized-based transmission into authorized-based transmission through the first message.
Before the first device and the second device perform the Grant-free transmission, the first device may configure and/or activate the aforementioned two-step mechanism for switching from the Grant-free transmission to the Grant-based transmission to the second device.
3. The method of claim 1 or 2:
the first message is uplink control information UCI.
4. The method according to any one of claims 1 to 3:
the first message has the same frame format as the scheduling request SR, and uses a different constellation diagram.
The first message is similar to the conventional scheduling request SR, but has different roles, so that the two messages may use the same frame format, such as UCIformat 1/1a/1b, but use different constellations to distinguish the two messages.
5. The method of claim 1 or 2:
the first message is energy and does not adopt a modulation mode.
That is, the first message is similar to UCI format 1 used in the conventional SR, and only energy is transmitted on a resource, and without using a modulation method, the first device can obtain that the second device transmits the first message when the first device senses energy on the resource.
6. The method according to any one of claims 1 to 5:
and the first message is sent together with uplink data sent to the first equipment by the second equipment in a piggybacking mode. That is, the second device sends the uplink data first and simultaneously sends the first message piggybacked.
7. The method according to any one of claims 1 to 6:
the first device receives the first message sent by the second device on a physical control channel (PUCCH) resource; or the like, or, alternatively,
the first device receives the first message sent by the second device on Physical Scheduling Request Channel (PSRCH) resources;
or the like, or, alternatively,
the first device receives the first message sent by the second device on a physical shared channel (PUSCH) resource; or the like, or, alternatively,
the first device receives the first message sent by the second device on resources based on an unauthorized transmission.
The first message may be sent on a legacy PUCCH resource; the same PSRCH resource as used by the SR may also be used for transmission, and strictly speaking, transmission in the PSRCH resource may be regarded as a special case of transmission in the PUCCH resource; the first message may also be sent on a PUSCH resource, for example, in a scenario where the first device transmits the first message and uplink data together in a piggybacked manner; further, the first message may also be transmitted in a Grant-free resource, where transmitting in the Grant-free resource may be regarded as a specific example of transmitting in the PUSCH resource.
8. The method according to any one of claims 1 to 7:
and the first equipment sends the second message to the second equipment through a system message.
The above embodiments may be understood as static configurations.
9. The method according to any one of claims 1 to 7:
the first device sends the second message to the second device through RRC signaling.
The above embodiments may be understood as semi-static configurations.
10. The method according to any one of claims 1 to 7:
the first device sends the second message to the second device through a physical control channel.
The above embodiments may be understood as dynamic configurations.
11. A method for transitioning from an unauthorized-based transmission to an authorized-based transmission for a second device, the method comprising:
uplink data which is sent to the first equipment by the second equipment and is based on unauthorized transmission;
the second device receives a negative response of the uplink data sent by the first device to the second device;
the second device sending a first message to the first device to inform the first device that it wishes to switch from an unauthorized-based transmission to an authorized-based transmission;
the second device receives uplink scheduling information sent by the first device to the second device;
the second device sends uplink data for grant-based transmission to the first device.
In the foregoing embodiment, after the first device sends the negative response of the uplink data to the second device in the Grant-free transmission, the second device may send the first message to the first device to notify the first device that it wants to change the Grant-free transmission into the Grant-based transmission, and perform the Grant-based transmission using the two-step short flow of uplink scheduling-uplink data, which reduces overhead compared with the conventional four-step flow (SR-first uplink scheduling-BSR-second uplink scheduling).
12. The method of claim 11:
before the first device and the second device perform unauthorized-based transmission, the second device receives a second message sent by the first device to the second device, where the second message is at least used to configure and/or activate the first device and the second device to adopt a mechanism that the first message converts unauthorized-based transmission into authorized-based transmission.
Before the first device and the second device perform the Grant-free transmission, the first device may configure and/or activate the aforementioned two-step mechanism for switching from the Grant-free transmission to the Grant-based transmission to the second device.
13. The method of claim 11 or 12:
the first message is uplink control information UCI.
14. The method of any of claims 11 to 13:
the first message has the same frame format as the scheduling request SR, and uses a different constellation diagram.
The first message is similar to the conventional scheduling request SR, but has different roles, so that the two messages may use the same frame format, such as UCIformat 1/1a/1b, but use different constellations for distinction.
15. The method of claim 11 or 12:
the first message is energy and does not adopt a modulation mode.
That is, the first message is similar to UCI format 1 used in the conventional SR, and only energy is transmitted on a resource, and without using a modulation method, the first device can obtain that the second device transmits the first message when the first device senses energy on the resource.
16. The method of any of claims 11 to 15:
and the first message is sent together with uplink data sent by the second equipment to the first equipment in a piggybacking mode.
That is, the second device may piggyback send the first message while sending uplink data to the first device.
17. The method of any of claims 11 to 16:
the second device sends the first message to the first device on a physical control channel (PUCCH) resource;
or, the second device sends the first message to the first device on a Physical Scheduling Request Channel (PSRCH) resource;
or, the second device sends the first message to the first device on a physical shared channel, PUSCH, resource;
or the first message sent by the second device to the first device on a resource based on an unauthorized transmission.
The first message may be sent on a legacy PUCCH resource; the same PSRCH resource as used by the SR may also be used for transmission, and strictly speaking, transmission in the PSRCH resource may be regarded as a special case of transmission in the PUCCH resource; the first message may also be sent on a PUSCH resource, for example, in a scenario where the first device transmits the first message and uplink data together in a piggybacked manner; further, the first message may also be transmitted in a Grant-free resource, where transmitting in the Grant-free resource may be regarded as a specific example of transmitting in the PUSCH resource.
18. The method of any of claims 11 to 17:
and the second equipment receives the second message sent by the first equipment to the second equipment through a system message.
The above embodiments may be understood as static configurations.
19. The method of any of claims 11 to 17:
and the second equipment receives the second message sent to the second equipment by the first equipment through RRC signaling.
The above embodiments may be understood as semi-static configurations.
20. The method of any of claims 11 to 17:
and the second equipment receives the second message sent to the second equipment by the first equipment through a physical control channel.
The above embodiments may be understood as dynamic configurations.
21. A first device, the first device comprising:
a processor, a memory, and a transceiver;
the transceiver is used for receiving and transmitting data;
the memory is to store instructions;
the processor is configured to execute the instructions in the memory to perform the method of any of claims 1 to 10.
22. According to 21, the transceiver comprises:
a transmitter and a receiver;
the transmitter is configured to transmit the second message as described in any one of 1 to 10, the negative response of the uplink data, and the uplink scheduling information;
the receiver is further configured to receive the first message of any of claims 1 to 10, the uplink data based on the unlicensed transmission, and the uplink data based on the licensed transmission.
23. A second device, the second device comprising:
a processor, a memory, and a transceiver;
the transceiver is used for receiving and transmitting data;
the memory is to store instructions;
the processor is configured to execute the instructions in the memory to perform the method of any of claims 11 to 20.
24. According to 23, the transceiver comprises:
a transmitter and a receiver;
the transmitter is configured to transmit the first message as described in any one of 11 to 20, the uplink data of the non-grant based transmission, and the uplink data of the grant based transmission;
the receiver is configured to receive the second message as described in any one of 11 to 20, the negative response of the uplink data, and the uplink scheduling information.
25. The method or apparatus of any one of claims 1 to 24, wherein the first device is a base station and the second device is a terminal.
26. A base station configured to perform the method of any of claims 1 to 10.
27. A terminal configured to perform the method of any of claims 11 to 20.
Drawings
Fig. 1 is a schematic diagram of a communication system to which embodiments of the present application are applied;
FIG. 2 is a schematic diagram of a network architecture for use in an embodiment of the present application;
FIG. 3 is a schematic flow chart diagram of a method for transitioning from an unauthorized based transmission to an authorized based transmission in accordance with an embodiment of the present application;
FIG. 4 is a schematic flow chart diagram of another method for transitioning from an unauthorized-based transmission to an authorized-based transmission in accordance with an embodiment of the present application;
fig. 5 is a schematic diagram of constellation mapping for one embodiment of the present application;
fig. 6 is a schematic diagram of constellation mapping according to another embodiment of the present application;
fig. 7 is a diagram illustrating an SR-like resource occupying an unlicensed transmission resource according to an embodiment of the present application;
fig. 8 is a diagram illustrating binding of an unlicensed transmission resource with parameter information according to an embodiment of the present application;
FIG. 9 is a schematic diagram of a terminal device of one embodiment of the present application;
fig. 10 is a schematic diagram of a network device according to an embodiment of the present application.
Detailed Description
The technical solution in the present application will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic diagram of a system applied to an embodiment of the present application. As shown in fig. 1, the system 100 may include a network device 20 and a terminal device 10, wherein the network device and the terminal device are connected through a wireless connection. It should be understood that fig. 1 only illustrates that the system includes one network device, but the embodiment of the present application is not limited thereto, for example, the system may also include more network devices; similarly, the system may also comprise more terminal devices. It should also be understood that the system may also be referred to as a network, and the embodiments of the present application are not limited thereto.
The communication device in the embodiment of the present application may be a terminal device. Terminal equipment may also refer to User Equipment (UE), access terminal, subscriber unit, subscriber station, mobile station, remote terminal, mobile device, user terminal, wireless communication device, user agent, or user device. An access terminal may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device with wireless communication capability, a computing device or other processing device connected to a wireless modem, a vehicle mounted device, a wearable device, a terminal device in a future 5G network or a terminal device in a future evolved Public Land Mobile Network (PLMN) network, etc.
By way of example and not limitation, in the embodiments of the present application, the terminal device may also be a wearable device. Wearable equipment can also be called wearable intelligent equipment, is the general term of applying wearable technique to carry out intelligent design, develop the equipment that can dress to daily wearing, like glasses, gloves, wrist-watch, dress and shoes etc.. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable smart device includes full functionality, large size, and can implement full or partial functionality without relying on a smart phone, such as: smart watches or smart glasses and the like, and only focus on a certain type of application functions, and need to be used in cooperation with other devices such as smart phones, such as various smart bracelets for physical sign monitoring, smart jewelry and the like.
The communication device in the embodiment of the present application may be a network device. The network device may be a device for communicating with a terminal device, and the network device may be a Base Transceiver Station (BTS) in a global system for mobile communication (GSM) or a Code Division Multiple Access (CDMA), a base station (NodeB, NB) in a Wideband Code Division Multiple Access (WCDMA) system, an evolved node B (eNB, or eNodeB) in a Long Term Evolution (LTE) system, a wireless controller in a Cloud Radio Access Network (CRAN) scenario, or a relay station, an access point, a vehicle-mounted device, a wearable device, and a network device in a future 5G network or a network device in a future evolved PLMN network.
In addition, in this embodiment of the present application, a network device provides a service for a cell, and a terminal device communicates with the network device through a transmission resource (for example, a frequency domain resource or a spectrum resource) used by the cell, where the cell may be a cell corresponding to the network device (for example, a base station), and the cell may belong to a macro base station or a base station corresponding to a small cell (small cell), and the small cell may include: urban cell (metro cell), micro cell (microcell), pico cell (pico cell), femto cell (femto cell), etc., and these small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-rate data transmission service. In addition, the cell may also be a super cell (supercell).
Fig. 2 is a schematic diagram of a network architecture to which an embodiment of the present invention may be applied, which may be a network architecture diagram of a new radio access in a next generation wireless communication system. In the network architecture diagram, a network device may be divided into a Centralized Unit (CU) and a plurality of Transmission Reception Point (TRP)/Distributed Unit (DU), that is, a bandwidth-based unit (BBU) of the network device is reconfigured into a DU and CU functional entities. The form and number of the centralized units and TRP/DUs are not limited to the embodiments of the present application. Although the forms of the respective corresponding centralized units of the network device 1 and the network device 2 shown in fig. 2 are different, the respective functions are not affected. It is understood that the TRP/DU within the scope of the centralized unit 1 and the dashed line is a constituent element of the network device 1, the TRP/DU within the scope of the centralized unit 2 and the solid line is a constituent element of the network device 2, and the network device 1 and the network device 2 are network devices (or referred to as base stations) involved in the NR system.
The CU may handle Radio Resource Control (RRC) layer, Packet Data Convergence Protocol (PDCP) layer, and even support partial core network function sinking to the access network, which is referred to as an edge computing network in the term, and may meet the higher requirement of the future communication network for emerging services such as video, network shopping, and virtual/augmented reality on network delay.
The DU can mainly handle physical layer functions and layer 2 functions with higher real-time requirements, and considering the transmission resources of a Radio Remote Unit (RRU) and the DU, part of the physical layer functions of the DU can be moved up to the RRU, and with the miniaturization of the RRU, even more aggressive DUs can be merged with the RRU.
CU can be distributed in a centralized mode, DU distribution depends on the actual network environment, a core urban area is high in telephone traffic density, small in inter-station distance, and in areas with limited machine room resources, such as universities and large-scale performance venues, DU can also be distributed in a centralized mode, telephone traffic is sparse, inter-station distance is large, and in other areas, such as suburb counties and mountain areas, DU can be distributed.
The S1-C interface illustrated in fig. 2 may be a standard interface between a network device and a core network, and specifically, the device connected to S1-C is not shown in fig. 2.
Fig. 3 shows a schematic flow chart of a method for transitioning from an unauthorized-based transmission to an authorized-based transmission according to an embodiment of the present application. The first device in fig. 3 may be a network device as described previously; the second device may be a terminal device as described above. Of course, in an actual system, the number of the first devices and the second devices may not be limited to the example of this embodiment or other embodiments, and will not be described below.
The method of transitioning from an unauthorized-based transmission to an authorized-based transmission illustrated in fig. 3 may include steps 310, 320, 330, and 340.
In step 310, a first device receives a first message sent by a second device, where the first message is used to request a transition from non-grant based transmission to grant based transmission, and the resource occupied for transmitting the first message is less than the resource occupied for transmitting a buffer status report BSR.
In this embodiment, the first device receives the first message sent by the second device, and may obtain a request sent by the second device that it wishes to convert from an unauthorized-based transmission to an authorized-based transmission.
Generally, when there is uplink data to be transmitted, the grant-based transmission means that the second device needs to first send a Scheduling Request (SR) to the first device to notify the first device that there is uplink data scheduled to be sent, then receive uplink scheduling information of a BSR (Buffer status Report), send transmission resources required by the BSR to the base station for reporting, and finally receive a second piece of uplink scheduling information to transmit the uplink data to the first device. The unauthorized transmission means that when there is uplink data to be transmitted, the second device may transmit the uplink data to the first device using the unauthorized transmission resource divided by the first device in advance, without requesting the first device. However, in the unauthorized-based transmission, since the same or partially same unauthorized transmission resource may be selected between different first devices to transmit uplink data, i.e. collision occurs, this may cause transmission failure of the uplink data transmitted by the different first devices. Thus, the first device may request a transition from an unauthorized-based transmission to an authorized-based transmission. As described below in conjunction with fig. 4.
Fig. 4 is a schematic flow chart diagram illustrating another method for transitioning from an unauthorized-based transmission to an authorized-based transmission according to an embodiment of the present application.
As shown in fig. 4, step 301, step 302 and step 303 may also be included before step 310.
In step 301, the first device may send a second message to the second device, where the second message may be used to configure and/or activate a mechanism of the second device to convert the unauthorized-free transmission into the authorized-based transmission with or without the first message, it should be understood that whether to activate includes activating (activating) or deactivating (deactivating), and for example, the second message may be used to notify the second device to convert the unauthorized-based transmission into the authorized-based transmission by sending the first message to the first device.
Here, the first device may transmit the second message to the second device through semi-static signaling or dynamic signaling, such as through a Master Information Block (MIB), a System Information Block (SIB), a Remaining Minimum System Information (RMSI), Other System Information (OSI), radio resource control signaling (RRC), MAC control element signaling (MAC ce), or physical control information (L1 signaling).
Alternatively, the first device may send the second message immediately after establishing a connection with the second device, or may send the second message at another time. That is, the first device may simply send the second message before the second device sends the first message.
The second device may send 302 the first data to the first device. The first data may be sent through the grant-free resource, i.e., the second device may send the first data to the first device based on the unauthorized transmission.
In step 303, when the first data based on the unauthorized transmission in step 302 is not successfully received by the first device, the first device may send a Negative Acknowledgement (NACK) of the first data to the second device.
Optionally, when receiving the NACK sent by the first device, the second device indicates that the first data transmission based on the unauthorized transmission in step 302 fails, and at this time, the second device may send a first message to the first device, so as to convert the unauthorized transmission into the authorized transmission.
Optionally, a timer (timer) may also be used to determine whether the first data fails to be transmitted.
For example, when the second device does not receive NACK or ACK within a specific time interval, it may be determined whether the first data based on the unauthorized transmission is failed to be transmitted in step 302 according to a timeout of a different timer (timer). For example, if the second device does not receive the ACK sent by the first device before the timer times out, it is considered to be NACK, and at this time, the first data transmission fails, and the second device may send the first message to the first device; if the second device does not receive NACK sent by the first device after K times of repeated transmission before the timer is overtime, the ACK is considered to be ACK, at the moment, the first data is successfully sent, and the second device does not need to send a first message to the first device; if the second device does not receive the NACK sent by the first device before the timer times out (when K repeated transmissions are not used), the ACK is considered, at this time, the first data is successfully sent, the second device does not need to send the first message to the first device, and K is a positive integer not greater than the maximum repeated transmission times. It should be understood that the above are only examples and should not be construed as limiting the embodiments of the present application.
In an embodiment of the present application, the first message sent by the second device to the first device may be simple signaling, that is, the first message may only carry a request (or indication) to change from an unauthorized-based transmission to an authorized-based transmission, so that resources occupied for transmitting the first message are less than resources occupied for transmitting the BSR, thereby reducing overhead of the system.
Alternatively, the first message may be energy without modulation. After receiving the energy, the first device directly converts the current transmission mode into another transmission mode. For example, the second device may send energy that is not modulated to the first device requesting that the unauthorized-based transmission be converted to an authorized-based transmission, when the second device is currently an unauthorized-based transmission; the second time the unmodulated energy is transmitted to the first device may be used to request that the grant-based transmission be converted to an unauthorized-based transmission.
Optionally, the first message may be sent using 1 bit (bit) Uplink Control Information (UCI), and the format (format) may be format 1 or format 1a, or may be another UCI format. The first message may be requested from the first device through "0" or "1". For example, when the value of the first message is "1", the first message may be used to request a transition from unauthorized transmission to authorized transmission, but the embodiment of the present application is not limited thereto.
As an embodiment of the present application, the second device may transmit the first message to the first device on a resource of a Physical Uplink Control Channel (PUCCH).
Optionally, the second device may send the first message to the first device on a resource of a Physical Scheduling Request Channel (PSRCH). The PSRCH resource may be a special case of a PUCCH resource, that is, the PSRCH resource may be a partial resource of the PUCCH used for transmitting the SR. That is, the first message may be transmitted in SR resources.
The SR resource period is a period for periodically transmitting an SR, that is, a specific time interval needs to be waited between two SR resource transmissions.
Generally, the SR resource period may be configurable. The SR resource period may be set between several milliseconds (ms) to several tens of ms, or in the range of at least one OFDM symbol (i.e., the SR resource period may be less than 1ms) to a plurality of OFDM symbols, or a plurality of slots.
Optionally, the frame format of the first message sent by the second device may be the same as that of the SR, for example, the first message and the SR may both be sent using a 1-bit message, such as UCI format 1a, or may both be sent using a message in another format, such as UCI format 1 or UCI in another format. At this time, the first device may distinguish the first message from the SR through a different constellation. For example, the first message may be transmitted using 1-bit UCI format 1a, the modulation scheme may be Binary Phase Shift Keying (BPSK) and a constellation map (constellation map) using an Acknowledgement (ACK), the SR may be transmitted using 1-bit UCI format 1a, and the modulation scheme may be Binary Phase Shift Keying (BPSK) and a constellation map (constellation map) using NACK. As shown in fig. 5, when the second device transmits, the first message may correspond to a position of 180 ° (constellation of ACK) in BPSK, and the SR may correspond to a position of 0 ° (constellation of NACK) in BPSK, and accordingly, when the first device receives, the first message and the SR may be distinguished by different constellations. It should be understood that the above are only examples and should not be construed as limiting the embodiments of the present application.
The PUCCH may also use modulation QBPSK. Compared with the BPSK modulation scheme, the quadrature phase shift keying (QBPSK) modulation scheme is a newly introduced modulation scheme, and QBPSK can indicate the first message to the first device with lower complexity without adding extra bits for indication.
As an embodiment of the present application, the second device may send a first message with a modulation scheme of QBPSK to the first device in the PUCCH. As shown in fig. 6, the first message may be transmitted using 1-bit UCI format 1a or UCI in other format, the modulation scheme may be QBPSK and use a constellation diagram at 90 ° or 270 ° in QBPSK, and the SR may be transmitted using 1-bit UCI format 1a or UCI in other format, and the modulation scheme may be BPSK. Accordingly, the first device may extract a real part (in-phase component) and/or an imaginary part (quadrature component) of the first message or the SR sent by the second device through the same demodulation algorithm (decoding algorithm), so as to determine that the modulation scheme of the message sent by the second device is BPSK or QBPSK, where the signal may be the SR if the modulation scheme is BPSK, and the signal may be the first message if the modulation scheme is QBPSK.
Optionally, the second device may send the first message by using uplink piggyback transmission (UCI piggyback), that is, send the first message (UCI) and uplink data together. For example, after receiving the NACK sent by the first device in step 303, the second device may send the first message and the uplink data to the first device through a Physical Uplink Shared Channel (PUSCH) resource in a resource based on the unlicensed transmission in a piggybacked manner. Similarly, if the second device does not receive the NACK or ACK sent by the first device before the timer expires, the first message and the uplink data may be sent to the first device through the PUSCH resource in a piggybacked manner in the resource based on the unlicensed transmission. Here, the uplink data transmitted together with the first message may be new uplink data, that is, different from the first data sent by the second device to the first device in step 302, or the same as the first data sent by the second device to the first device in step 302, which is not limited in this application.
In an embodiment of the present application, the first device may separately divide a part of resources at least for transmitting the first message, where the resource may be referred to as an unlicensed transfer grant scheduling request (SR-like) resource, and the SR-like resource may also be used for transmitting a message such as an SR.
Alternatively, the SR-like resource period may be configurable.
In particular, the SR-like resource period may be shorter than the SR resource period, and the transmission delay may be significantly reduced by using the SR-like resource to transmit the first message. For example, the resource period that the second device can use in the SR resource is 20ms, and the resource period that the second device can use in the SR-like resource is 5ms or 10 ms.
Optionally, the second device may send a first message using SR-like resources to request from the first device that it wishes to transition from grant-free transmission to grant-based transmission.
Alternatively, the SR-like resource may be dedicated to each UE or shared by multiple UEs.
Specifically, if the SR-like resource is dedicated to the second device, the first message may be energy that does not adopt a modulation scheme, or only carries 1-bit information, that is, a frame structure of UCI format 1, UCI format 1a, or other UCI formats may be used.
If the SR-like resource for sending the first message is shared by the second device and other UEs, the first message may carry UE ID information (i.e., identification information of the UE) for indicating the UE sending the first message. For example, a preamble may be used to identify the UE.
Similarly, different UEs may also be identified by the resources used by the UEs and demodulation reference signal (DMRS) parameters. For example, the second device and other UEs may transmit the first message using the same time-domain frequency-domain resource, but the DMRS parameters are different, and after receiving the first message transmitted by the multiple UEs in the same time-domain frequency-domain resource, the first device may identify that the first message is transmitted by the second device or transmitted by other UEs through the DMRS parameters.
Alternatively, the SR-like resource transmitting the first message may use a grant-free resource. As shown in FIG. 7, the SR-like resource may use all of the grant-free resources, or may use part of the grant-free resources (e.g., grant-free resource 1).
It should be understood that the SR-like resource may be other time domain and frequency domain resources that the first device can divide, and the application is not limited thereto. For example, the first device may separately divide the resources in the PUCCH, the PSRCH, or the PUSCH in the foregoing embodiment for the second device, and use the divided resources as SR-like resources for transmitting the first message.
In step 320, the first device determines uplink scheduling information for grant-based transmission of the second device at least according to the first message and the non-grant-based transmission of the second device.
In the grant-based transmission, the uplink scheduling information may indicate information such as a time domain and frequency domain resource, a Modulation and Coding Scheme (MCS), and the like used when the second device sends uplink data, and the second device may send the uplink data of the grant-based transmission to the first device after receiving the uplink scheduling information.
In the transmission based on the non-authorization, the grant-free resource is bound with part of parameters of the uplink scheduling, such as parameter information of MCS, waveform, data size, and the like, so that the second device can directly send the uplink data without receiving the uplink scheduling information of the first device.
In one embodiment of the present application, the first device receives the first data sent by the second device, as in step 302, but does not successfully demodulate the first data, and sends a negative response to the first data to the second device, as in step 303, that is, the first device receives the first data, cannot successfully demodulate the first data, but can recognize that the sender of the first data is the second device, and sends a NACK to the second device. In this case, the first device may determine partial parameter information used by the first data according to the grant-free resource used by the first data.
As shown in fig. 8, the grant-free resource may be bound with partial parameter information such as MCS, waveform, and data size, and the bound parameter information is used by the uplink data based on the unauthorized transmission sent by the second device in the grant-free resource. Therefore, the first device may determine the uplink scheduling information by determining the parameter information bound to the grant-free resource according to the grant-free resource used by the received uplink data that cannot be demodulated, and may directly send the uplink scheduling information to the second device without obtaining the BSR sent by the second device to the first device.
Optionally, the first device does not successfully receive the first data sent by the second device, and cannot determine that the second device sends the first data, that is, the first device may perceive that there is energy in the grant-free resource but cannot demodulate, and accordingly, the first device has not sent ACK or NACK to the second device. At this time, the first device may determine that the first data is sent by the second device according to the received first message, that is, the energy in the grant-free resource is sent by the second device. As shown in fig. 8, although the energy received in the grant-free resource cannot be demodulated, the first device may determine, according to the grant-free resource used by the energy, partial parameter information used when the second device transmits the first data, that is, may determine the uplink scheduling information.
In summary, in the embodiment of the present application, a first device may obtain parameter information used when transmitting first data through a grant-free resource used when transmitting the first data, and when a second device sends a first message to the first device to request a transition from non-grant based transmission to grant based transmission, the first device may determine uplink scheduling information according to the parameter information obtained from the grant-free resource, that is, the first device may directly send the uplink scheduling information to the second device without sending a BSR by the second device.
Step 330, the first device sends the uplink scheduling information to the second device.
Step 340, the second device sends second data to the first device according to the uplink scheduling information.
Optionally, the second device receives the uplink scheduling information sent by the first device, and may send the second data to the first device in an authorization-based manner according to parameter information such as MCS, waveform, and data size indicated in the uplink scheduling information.
Fig. 9 is a schematic diagram of a terminal device 10 (which may also be referred to as a user equipment, UE for short) according to an embodiment of the present application. It should be understood that fig. 9 is only an example and is not to be construed as limiting the embodiments of the present invention.
The UE10 may correspond to the second device in the method embodiments and may have any of the functionality of the second device in the method.
As shown in fig. 9, the UE10 includes a transceiver 101 and a processor 102.
Optionally, the transceiver 101 may include a control circuit and an antenna, wherein the control circuit may be used for conversion of baseband signals and radio frequency signals and processing of radio frequency signals, and the antenna may be used for transceiving radio frequency signals. The transceiver 101 may be configured to transmit a message or data to the network device 20 (e.g., execute steps 310 and 340 in fig. 3 or execute steps 302, 310, and 340 in fig. 4), and receive a message transmitted by the network device 20 (e.g., execute step 330 in fig. 3 or execute steps 303 and 330 in fig. 4), which may be described with reference to the embodiments in fig. 3 or fig. 4.
Optionally, the UE10 may also include other major components of the second device, such as memory, input-output devices, and the like. The input and output device may be a touch screen, a display screen, a keyboard, etc., and is mainly used for receiving data input by a user and outputting data to the user.
The processor 102 may be configured to process communication protocols and communication data, as well as control the entire UE10, execute software programs, and process data of the software programs, for example, to support the UE10 to perform corresponding operations in the foregoing method embodiments. The memory is used primarily for storing software programs and data. When the UE10 is powered on, the processor 102 can read the software programs stored in the memory, interpret and execute the instructions of the software programs, and process the data of the software programs. When data needs to be sent wirelessly, the processor performs baseband processing on the data to be sent and outputs baseband signals to the control circuit, and the control circuit performs radio frequency processing on the baseband signals and sends the radio frequency signals to the outside in the form of electromagnetic waves through the antenna. When data is sent to the terminal equipment, the control circuit receives radio frequency signals through the antenna, converts the radio frequency signals into baseband signals and outputs the baseband signals to the processor, and the processor converts the baseband signals into the data and processes the data.
Those skilled in the art will appreciate that fig. 9 shows only one memory and one processor for ease of illustration. In an actual terminal device, there may be multiple processors and memories. The memory may also be referred to as a storage medium or a storage device, and the like, which is not limited in this respect in the embodiment of the present invention.
As an alternative implementation manner, the processor may include a baseband processor and a central processing unit, where the baseband processor is mainly used to process a communication protocol and communication data, and the central processing unit is mainly used to control the whole terminal device, execute a software program, and process data of the software program. The processor in fig. 9 integrates the functions of the baseband processor and the central processing unit, and those skilled in the art will understand that the baseband processor and the central processing unit may also be independent processors, and are interconnected through a bus or the like. Those skilled in the art will appreciate that the user equipment may include multiple baseband processors to accommodate different network formats, multiple central processors to enhance its processing capability, and various components of the user equipment may be connected by various buses. The baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip. The central processing unit can also be expressed as a central processing circuit or a central processing chip. The function of processing the communication protocol and the communication data may be built in the processor, or may be stored in the storage unit in the form of a software program, and the processor executes the software program to realize the baseband processing function.
For example, in the embodiment of the present invention, the antenna and the control circuit with transceiving functions may be regarded as the transceiving unit 101 of the UE10, and the processor with processing functions may be regarded as the processing unit 102 of the UE 10. As shown in fig. 9, the UE10 includes a transceiving unit 101 and a processing unit 102. A transceiver unit may also be referred to as a transceiver, a transceiving device, etc. Optionally, a device for implementing a receiving function in the transceiver 101 may be regarded as a receiving unit, and a device for implementing a transmitting function in the transceiver 101 may be regarded as a transmitting unit, that is, the transceiver 101 includes a receiving unit and a transmitting unit. For example, the receiving unit may also be referred to as a receiver, a receiving circuit, etc., and the sending unit may be referred to as a transmitter, a transmitting circuit, etc.
Fig. 10 is a schematic diagram of a network device 20 (e.g., a base station) according to an embodiment of the present application. The network device 20 may correspond to the first device in each method embodiment, and may have any function of the first device in the method.
As shown in fig. 10, the network device 20 includes a transceiver 201 and a processor 2022.
The transceiver 201 may be referred to as a Remote Radio Unit (RRU) 201, a transceiver unit, a transceiver, or a transceiver circuit, etc. The transceiver 201 may include at least one antenna 2011 and a radio frequency unit 2012, and the transceiver 201 may be used for transceiving radio frequency signals and converting the radio frequency signals to baseband signals.
The network device 20 may include a baseband unit (BBU) 202. The BBU202 can be used for baseband processing, such as channel coding, multiplexing, modulation, spreading, etc., and for control of network devices. The RRU201 and the BBU202 may be physically disposed together or may be physically disposed separately, such as a distributed base station.
In an example, the BBU202 may be formed by one or more boards (also referred to as circuit boards or PCBs), where a plurality of boards may support a radio access network of a single access system together, or may support radio access networks of different access systems respectively.
In one example, the baseband unit may be reconfigured as the aforementioned DU and CU functional entities.
The BBU202 includes a processor 2022. Processor 2022 may be used to control network device 20 to perform the corresponding operations in the foregoing method embodiments. Optionally, BBU202 can also include a memory 2021 to store necessary instructions and data. The memory 2021 and the processor 2022 may serve one or more boards. That is, the memory and processor may be provided separately on each board. Multiple boards may share the same memory and processor. In addition, each single board is provided with necessary circuits.
The embodiment of the invention also provides a processing device, which comprises a processor and an interface;
the processor is configured to perform the method in any of the embodiments of the present application.
The processing device may be a chip, the processor may be implemented by hardware or may be implemented by software, and when implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like; when implemented in software, the processor may be a general-purpose processor implemented by reading software code stored in a memory, which may be integrated in the processor, or may reside separate from the processor.
For example, the processing Device may be a Field-Programmable Gate Array (FPGA), an Application-Specific Integrated Circuit (ASIC), a System on Chip (SoC), a Central Processing Unit (CPU), a Network Processor (NP), a Digital Signal processing Circuit (DSP), a Microcontroller (MCU), a Programmable Logic Device (PLD), or other Integrated chips.
The embodiment of the invention also provides communication equipment which comprises a processing unit and a transmitting-receiving unit. The processing unit and the transceiver unit may be implemented in software or hardware. In case of a hardware implementation, the transceiver unit may be the transceiver 101 in fig. 9, and the processing unit may be the processor 102 in fig. 9; alternatively, the transceiver unit may be the transceiver 201 in fig. 10, and the processing unit may be the processor 2022 in fig. 10.
The embodiment of the invention also provides a communication system which comprises the network equipment and the terminal equipment.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It should be understood that, in the embodiment of the present invention, the term "and/or" is only one kind of association relation describing an associated object, and means that three kinds of relations may exist. For example, a and/or B, may represent: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
In the present application, "and/or" describes an association relationship of associated objects, which means that there may be three relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
In the present application, "at least one" means one or more, "a plurality" means two or more. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, "at least one (a), b, or c", or "at least one (a), b, and c", may each represent: a, b, c, a-b (i.e., a and b), a-c, b-c, or a-b-c, wherein a, b, and c may be single or plural, respectively.
The device structure diagrams given in the device embodiments of the present application only show simplified designs of the corresponding devices. In practical applications, the apparatus may comprise any number of transmitters, receivers, processors, memories, etc. to implement the functions or operations performed by the apparatus in the embodiments of the apparatus of the present application, and all apparatuses that can implement the present application are within the scope of the present application.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (9)

1. A method for transitioning from an unauthorized-based transmission to an authorized-based transmission, comprising:
the method comprises the steps that first equipment receives a first message sent by second equipment, the first message is used for requesting to convert unauthorized-based transmission into authorized-based transmission, and resources occupied by transmission of the first message are less than resources occupied by transmission of a Buffer Status Report (BSR);
the first device determines uplink scheduling information of the grant-based transmission of the second device at least according to the first message and the non-grant-based transmission of the second device;
the first device sends the uplink scheduling information to the second device;
the first equipment receives second data sent by the second equipment according to the uplink scheduling information;
wherein the first message satisfies at least one of:
the first message is uplink control information;
the frame format of the first message is the same as that of a Scheduling Request (SR), and the corresponding constellation diagrams of the first message and the SR are different;
the first message is sent through an unlicensed relay grant scheduling request (SR-like) resource, the SR-like resource is a resource which is separately divided by the first device, and the SR-like resource can be used for transmitting the first message and/or a Scheduling Request (SR);
the first message is energy which is transmitted by the second equipment and does not adopt a modulation mode;
and the first message is sent together with third data transmitted to the first equipment by the second equipment in an uplink piggyback transmission mode.
2. The method of claim 1, wherein the determining uplink scheduling information for the grant-based transmission of the second device based at least on the first message and the non-grant-based transmission of the second device comprises:
and in the case that first data based on unauthorized transmission sent by the second device is received, the first device cannot successfully demodulate the first data, but can identify a sender of the first data, determining the uplink scheduling information according to at least the first message and the first data which cannot be successfully demodulated.
3. The method of claim 2, wherein prior to the first device receiving the first message sent by the second device, the method further comprises:
in the case where first data based on an unauthorized transmission sent by the second device is received, the first device cannot successfully demodulate the first data but can identify the sender of the first data, a negative response to the first data is sent to the second device or a positive response to the first data is not sent to the second device within a certain time interval.
4. The method of claim 1, wherein the determining uplink scheduling information for the grant-based transmission of the second device based at least on the first message and the non-grant-based transmission of the second device comprises:
and in the case that first data based on unauthorized transmission sent by the second device is received, the first device cannot successfully demodulate the first data, and cannot identify a sender of the first data, determining the uplink scheduling information according to at least the energy of the first message and the first data which cannot be successfully demodulated.
5. The method of any of claims 1 to 4, wherein the first device receiving a first message sent by a second device comprises:
the first device receives the first message sent by the second device on a physical uplink control channel resource; or the like, or, alternatively,
the first device receives the first message sent by the second device on a physical scheduling request channel resource; or the like, or, alternatively,
the first device receives the first message sent by the second device on a physical uplink shared channel resource; or the like, or, alternatively,
the first device receives the first message sent by the second device on resources based on an unauthorized transmission.
6. A method for transitioning from an unauthorized-based transmission to an authorized-based transmission, comprising:
the second equipment sends a first message to the first equipment, wherein the first message is used for requesting to convert the transmission based on the non-authorization into the transmission based on the authorization, and the resource occupied for transmitting the first message is less than the resource occupied for transmitting the Buffer Status Report (BSR);
the second device receives uplink scheduling information of authorized-based transmission sent by the first device, wherein the uplink scheduling information is determined at least according to the first message and the unauthorized-based transmission of the second device;
the second equipment sends second data to the first equipment according to the uplink scheduling information;
wherein the first message satisfies at least one of:
the first message is uplink control information;
the frame format of the first message is the same as that of a Scheduling Request (SR), and the corresponding constellation diagrams of the first message and the SR are different;
the first message is sent through an unlicensed relay grant scheduling request (SR-like) resource, the SR-like resource is a resource which is separately divided by the first device, and the SR-like resource can be used for transmitting the first message and/or a Scheduling Request (SR);
the first message is energy which is transmitted by the second equipment and does not adopt a modulation mode;
and the first message is sent together with third data transmitted to the first equipment by the second equipment in an uplink piggyback transmission mode.
7. The method of claim 6, wherein the second device sends a first message to the first device, comprising:
and in the case of receiving a negative response to first data sent by the first device, the second device sends the first message to the first device, wherein the first data is data sent by the second device and based on unauthorized transmission.
8. A network device comprising a transceiver and a processor; wherein the content of the first and second substances,
the transceiver is used for receiving a first message sent by a terminal device, the first message is used for requesting to convert unauthorized-based transmission into authorized-based transmission, and the resource occupied for transmitting the first message is less than the resource occupied for transmitting a Buffer Status Report (BSR);
the processor is configured to determine uplink scheduling information of grant-based transmission of the terminal device according to at least the first message and the non-grant-based transmission of the terminal device;
the transceiver is further configured to send the uplink scheduling information to the terminal device;
the transceiver is further configured to receive second data sent by the terminal device according to the uplink scheduling information;
wherein the first message satisfies at least one of:
the first message is uplink control information;
the frame format of the first message is the same as that of a Scheduling Request (SR), and the corresponding constellation diagrams of the first message and the SR are different;
the first message is sent through an unlicensed transfer grant scheduling request (SR-like) resource, the SR-like resource is a resource which is divided by first equipment independently, and the SR-like resource can be used for transmitting the first message and/or a Scheduling Request (SR);
the first message is energy which is transmitted by second equipment and does not adopt a modulation mode;
and the first message is sent together with third data transmitted to the first equipment by the second equipment in an uplink piggyback transmission mode.
9. A terminal device, comprising a transceiver and a processor: wherein the content of the first and second substances,
the transceiver is configured to send a first message to a network device, where the first message is used to request that unauthorized-based transmission is converted into authorized-based transmission, and resources occupied by transmitting the first message are less than resources occupied by transmitting a Buffer Status Report (BSR), and the transceiver is further used to receive uplink scheduling information of authorized-based transmission sent by the network device after sending the first message, where the uplink scheduling information is determined according to at least the first message and the unauthorized-based transmission of the terminal device;
the processor is configured to send second data to the network device according to the uplink scheduling information;
wherein the first message satisfies at least one of:
the first message is uplink control information;
the frame format of the first message is the same as that of a Scheduling Request (SR), and the corresponding constellation diagrams of the first message and the SR are different;
the first message is sent through an unlicensed transfer grant scheduling request (SR-like) resource, the SR-like resource is a resource which is divided by first equipment independently, and the SR-like resource can be used for transmitting the first message and/or a Scheduling Request (SR);
the first message is energy which is transmitted by second equipment and does not adopt a modulation mode;
and the first message is sent together with third data transmitted to the first equipment by the second equipment in an uplink piggyback transmission mode.
CN201810533171.9A 2017-09-30 2018-05-29 Method and apparatus for transitioning from unauthorized-based transmission to authorized-based transmission Active CN109600748B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/107788 WO2019062785A1 (en) 2017-09-30 2018-09-27 Method for converting unlicensed transmission into licensed transmission, and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710912955 2017-09-30
CN2017109129558 2017-09-30

Publications (2)

Publication Number Publication Date
CN109600748A CN109600748A (en) 2019-04-09
CN109600748B true CN109600748B (en) 2021-08-13

Family

ID=65956957

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810533171.9A Active CN109600748B (en) 2017-09-30 2018-05-29 Method and apparatus for transitioning from unauthorized-based transmission to authorized-based transmission

Country Status (1)

Country Link
CN (1) CN109600748B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101151920A (en) * 2005-03-31 2008-03-26 诺基亚公司 Authentication mechanism for unlicensed mobile access
CN105284172A (en) * 2013-03-08 2016-01-27 华为技术有限公司 System and method for uplink grant-free transmission scheme
WO2016053639A1 (en) * 2014-10-02 2016-04-07 Qualcomm Incorporated Contention based uplink transmissions for latency reduction
CN107026723A (en) * 2016-02-02 2017-08-08 电信科学技术研究院 A kind of method and apparatus of transmitting uplink control information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101151920A (en) * 2005-03-31 2008-03-26 诺基亚公司 Authentication mechanism for unlicensed mobile access
CN105284172A (en) * 2013-03-08 2016-01-27 华为技术有限公司 System and method for uplink grant-free transmission scheme
WO2016053639A1 (en) * 2014-10-02 2016-04-07 Qualcomm Incorporated Contention based uplink transmissions for latency reduction
CN107026723A (en) * 2016-02-02 2017-08-08 电信科学技术研究院 A kind of method and apparatus of transmitting uplink control information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Grant-free and grant-based UL transmissions;Samsung;《3GPP TSG RAN WG1 Meeting #89,R1-1708024》;20170519;1-4 *

Also Published As

Publication number Publication date
CN109600748A (en) 2019-04-09

Similar Documents

Publication Publication Date Title
CN109246829B (en) Communication method and communication device
CN109561506B (en) Communication method and communication device
WO2015106883A1 (en) Communications device
US20230047000A1 (en) Method and apparatus for determining transport block size
CN112332891A (en) Method and apparatus for wireless communication
CN111955040A (en) Data transmission method, terminal equipment and network equipment
US20220329293A1 (en) Wireless communication method, terminal device and network device
US20230224083A1 (en) Data transmission method and apparatus
CN110868277B (en) Signal transmission method, related device and system
CN109275190A (en) A kind of communication means and device
CN112152761A (en) Communication method, device and storage medium
CN110035548B (en) Communication method and communication device
CN109600748B (en) Method and apparatus for transitioning from unauthorized-based transmission to authorized-based transmission
WO2022141106A1 (en) Method and device for repeatedly transmitting data channel
CN111670596A (en) Channel transmission method and device and computer storage medium
WO2022077142A1 (en) Method for sending physical uplink shared channel and communication apparatus
CN111543113B (en) Method and device for data transmission
CN115804188A (en) Data transmission method and equipment
US12004095B2 (en) Communication method and communications device
WO2022267604A1 (en) Channel detection method and apparatus
CN113852577B (en) Wireless communication method and communication device
WO2019062785A1 (en) Method for converting unlicensed transmission into licensed transmission, and device
CN112423313B (en) Method and device for determining size of transmission block
WO2022155824A1 (en) Reference signal transmission method and communication apparatus
CN117651342A (en) Communication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant