CN111107638A - Resource allocation method, terminal equipment and network equipment - Google Patents
Resource allocation method, terminal equipment and network equipment Download PDFInfo
- Publication number
- CN111107638A CN111107638A CN201910345610.8A CN201910345610A CN111107638A CN 111107638 A CN111107638 A CN 111107638A CN 201910345610 A CN201910345610 A CN 201910345610A CN 111107638 A CN111107638 A CN 111107638A
- Authority
- CN
- China
- Prior art keywords
- configuration
- pusch
- authorization
- configuration authorization
- configurations
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 104
- 238000013468 resource allocation Methods 0.000 title claims abstract description 26
- 238000013475 authorization Methods 0.000 claims abstract description 241
- 230000005540 biological transmission Effects 0.000 claims description 99
- 238000004590 computer program Methods 0.000 claims description 30
- 238000001514 detection method Methods 0.000 claims description 26
- 235000019580 granularity Nutrition 0.000 description 43
- 230000008569 process Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 10
- 238000004891 communication Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 230000011664 signaling Effects 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 239000002699 waste material Substances 0.000 description 2
- 101150116295 CAT2 gene Proteins 0.000 description 1
- 101100392078 Caenorhabditis elegans cat-4 gene Proteins 0.000 description 1
- 101100326920 Caenorhabditis elegans ctl-1 gene Proteins 0.000 description 1
- 101100494773 Caenorhabditis elegans ctl-2 gene Proteins 0.000 description 1
- 101100112369 Fasciola hepatica Cat-1 gene Proteins 0.000 description 1
- 101100005271 Neurospora crassa (strain ATCC 24698 / 74-OR23-1A / CBS 708.71 / DSM 1257 / FGSC 987) cat-1 gene Proteins 0.000 description 1
- 101100126846 Neurospora crassa (strain ATCC 24698 / 74-OR23-1A / CBS 708.71 / DSM 1257 / FGSC 987) katG gene Proteins 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012805 post-processing Methods 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
- H04W72/23—Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0446—Resources in time domain, e.g. slots or frames
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/12—Wireless traffic scheduling
- H04W72/1263—Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
- H04W72/1268—Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows of uplink data flows
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0808—Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a resource allocation method, which is applied to terminal equipment and comprises the following steps: receiving a plurality of configuration authorization configurations; and under the condition that Listen Before Talk (LBT) succeeds in the first slot, transmitting a first Physical Uplink Shared Channel (PUSCH) according to a first configuration authorization configuration in the plurality of configuration authorization configurations. According to the embodiment of the invention, the aim of increasing the flexibility and efficiency of resource utilization is fulfilled by realizing the consistent understanding of the configuration mode between the terminal equipment and the network equipment.
Description
Technical Field
The present invention relates to the field of communications, and in particular, to a resource allocation method, a terminal device, and a network device.
Background
At present, Before a New Radio (NR) mobile communication system (NR system for short) transmits information in an unlicensed frequency band, a terminal device or a network device needs to perform a Channel Clear Assessment (CCA) or an extended Channel Clear assessment (eCCA) to monitor a Channel, that is, perform Energy Detection (ED), if detected Energy is lower than a certain threshold, the Channel is determined to be empty, and when the Channel is idle, transmission may be started, that is, a Listen-Before-Talk (LBT) avoidance monitoring mechanism is performed. Because the unlicensed frequency band is shared by multiple technologies or multiple transmission points, the channel available time has uncertainty due to a contention-based channel access mode, the channel access opportunity is small, and the problems of low resource utilization flexibility and efficiency exist at the same time.
Disclosure of Invention
One of the technical problems solved by the embodiments of the present invention is that the inconsistency of the configuration between the terminal device and the network device is realized, which results in inflexible resource utilization and low efficiency.
In a first aspect, an embodiment of the present invention provides a resource allocation method, which is applied to a terminal device, and the method includes:
receiving a plurality of configuration authorization configurations;
and under the condition that Listen Before Talk (LBT) succeeds in the first slot, transmitting a first Physical Uplink Shared Channel (PUSCH) according to a first configuration authorization configuration in the plurality of configuration authorization configurations.
In a second aspect, an embodiment of the present invention provides a resource allocation method, which is applied to a network device, and the method includes:
sending a plurality of configuration authorization configurations to the terminal device;
and determining a first configuration authorization configuration adopted by the terminal equipment for transmitting a first Physical Uplink Shared Channel (PUSCH) from the plurality of configuration authorization configurations through a blind detection reference signal, wherein the first PUSCH is transmitted after the successful Listen Before Talk (LBT) in a first time slot.
In a third aspect, an embodiment of the present invention provides a terminal device, where the terminal device includes:
a receiving module for receiving a plurality of configuration authorization configurations;
and a transmission module, configured to transmit a first physical uplink shared channel PUSCH according to a first configuration grant configuration of the multiple configuration grant configurations when listen before talk, LBT, is successful in a first slot.
In a fourth aspect, an embodiment of the present invention provides a terminal device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method according to the first aspect.
In a fifth aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps of the method according to the first aspect.
In a sixth aspect, an embodiment of the present invention provides a network device, where the network device includes:
a sending module, configured to send a plurality of configuration authorization configurations to a terminal device;
a determining module, configured to determine, from the multiple configuration grant configurations, a first configuration grant configuration that the terminal device uses for transmitting a first physical uplink shared channel, PUSCH, through blind detection of a reference signal, where the first PUSCH is transmitted after listening before speaking, LBT, succeeds in a first slot.
In a seventh aspect, an embodiment of the present invention provides a network device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method according to the second aspect.
In an eighth aspect, the embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the steps of the method according to the second aspect.
In the embodiment of the present invention, when information transmission is performed in an unlicensed frequency band, a terminal device receives multiple configuration grant configurations configured for the terminal device by a network device, and selects one configuration grant configuration from the multiple configuration grant configurations to transmit a PUSCH to complete information transmission when LBT succeeds, i.e., contends for a channel. Therefore, the aim of improving the flexibility and the efficiency of resource utilization can be achieved by realizing the consistency understanding of the configuration modes between the terminal equipment and the network equipment, namely when the terminal equipment works in an unauthorized frequency band, the network equipment transmits information based on a plurality of configuration authorization configurations configured for the terminal equipment.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
FIG. 1 is a flowchart illustrating a first resource allocation method according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a second resource allocation method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a first plurality of configuration authorization configurations in an embodiment of the present invention;
FIG. 4 is a diagram of a second plurality of configuration authorization configurations in an embodiment of the present invention;
FIG. 5 is a diagram of a third plurality of configuration authorization configurations in an embodiment of the present invention;
FIG. 6 is a schematic diagram of a fourth plurality of configuration authorization configurations in an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a terminal device in an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a network device in an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a second terminal device in the embodiment of the present invention;
fig. 10 is a schematic structural diagram of a second network device in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
With respect to the LBT mechanism set forth in the background section, the types of LBT that are currently explicitly available for use in unlicensed bands in the fifth Generation mobile communication technology (5-Generation, 5G) communication system may include the following three:
(1) LBT Cat 1: before sending information, the information is sent without any CAA, and the type is required to be used under the condition that a channel is obtained and the interval of transmission conversion is less than 16 mu s;
(2) LBT Cat 2: before sending information, channel interception of 25 μ s or 16 μ s is carried out, a specific signal acquisition channel can be used, and the maximum continuous transmission length should be smaller than a certain value, such as 1 ms;
(3) LBT Cat 4: before sending information, channel interception of fusion random backspacing is carried out, parameters with different priorities are set differently, and the maximum length which can be transmitted after obtaining the channel is also different.
In addition, in the standard discussion of time domain configuration of unlicensed frequency band in 5G communication system, there are two options for time domain resources based on configuration grant (configured grant) transmission:
(1) enhancement of the periodic configuration of the configured grant based on the NR in the protocol version R15.
(2) Enhancement of bitmap file (bitmap) configuration based on Automatic UpLink (AUL) in Further enhanced authorization assisted Access (FeLAA).
In the related art, in order to enhance flexibility of time domain resource allocation and increase opportunities of channel access, and solve the problems of small opportunities of channel access and inflexible resource allocation, resource allocation with smaller granularity (mini-slot) and allocation of multiple resources within a period may be considered. A User Equipment (UE), also called a terminal device, may transmit in a corresponding resource block according to LBT results at a position where transmission starts according to configured time domain resources.
Further, in the standard discussion of enhanced Ultra-high-reliability and low-latency Communications (eURLLC), in order to increase the reliability of data transmission and reduce latency, a configuration of multiple configuration grant may be supported by one BWP (Bandwidth Part) on one carrier, where a UE may select a certain configuration to transmit data according to the time of service arrival and the type of service.
In addition, it may also be considered whether to start transmitting data after the start position of the resource block according to the LBT result, which may specifically include the following several cases:
(1) if the LBT result can be used and the resource block is transmitted based on the slot in the time domain, the UE needs to transmit after puncturing (starting) the data after the LBT is successful, and if the successful position of the LBT is close to the position where the slot is ended, the data needs to be transmitted by a large part of the starting, which has the problem of low actual transmission efficiency.
(2) If the LBT result can be used and the resource block is transmitted based on the micro slot mini-slot in the time domain, the UE also needs to perform post-processing transmission on the data after the LBT is successful, and the number of HARQ (hybrid automatic repeat request) processes is increased. Since each Physical Uplink Shared Channel (PUSCH) carries Uplink Control Information (UCI), this situation has a problem of increasing overhead of Control signaling.
(3) If the result according to the LBT is not possible and the resource block is transmitted based on the slot in the time domain, the UE can only transmit data at the beginning of each slot, and if the LBT fails in the current slot, the LBT can be performed again only in the next slot, which can reduce the resource utilization rate and the chance of channel access.
(4) This situation increases the chance of channel access but at the same time also increases the number of HARQ processes if the result according to LBT is not possible and the resource blocks are transmitted in the time domain on a micro-slot basis mini-slot basis. And each PUSCH carries the UCI, so that the overhead of control signaling is increased.
Therefore, how to reduce the number of HARQ processes, reduce the overhead of control signaling, and increase the flexibility and efficiency of resource utilization on the premise of increasing the channel access opportunity needs to be considered.
The technical solutions provided by the embodiments of the present invention are described in detail below with reference to the accompanying drawings.
Referring to fig. 1, an embodiment of the present invention provides a resource allocation method, which is applied to a terminal device. The method comprises the following steps:
step 103: a plurality of configuration authorization configurations are received.
Optionally, the time granularities of the plurality of configuration authorization configurations are different. That is, the network device may match a unique corresponding time granularity for each configuration grant configuration, wherein the time granularity includes, but is not limited to, 1 slot (slot), 2 symbols (symbol), 7 symbols (symbol), and 4 symbols (symbol).
Further optionally, the indexes of the plurality of configuration authorization configurations are different. That is, the network device may match a unique corresponding index for each configuration authorization configuration.
Further optionally, the reference signal parameters of the plurality of configuration authorization configurations are different. The network device may match a unique reference signal parameter for each configuration authorization configuration, where the reference signal parameter includes, but is not limited to, a Position, a Port, and a scrambling code scrimblingid.
Step 105: and under the condition that Listen Before Talk (LBT) succeeds in the first slot, transmitting a first Physical Uplink Shared Channel (PUSCH) according to a first configuration authorization configuration in the plurality of configuration authorization configurations.
In the embodiment of the present invention, when information transmission is performed in an unlicensed frequency band, a terminal device receives multiple configuration grant configurations configured for the terminal device by a network device, and selects one configuration grant configuration from the multiple configuration grant configurations to transmit a PUSCH to complete information transmission when LBT succeeds, i.e., contends for a channel. Therefore, the aim of improving the flexibility and the efficiency of resource utilization can be achieved by realizing the consistency understanding of the configuration modes between the terminal equipment and the network equipment, namely when the terminal equipment works in an unauthorized frequency band, the network equipment transmits information based on a plurality of configuration authorization configurations configured for the terminal equipment.
Optionally, in the resource configuration method according to the embodiment of the present invention, in order to achieve the purpose of reducing the number of blind tests of the network device, the terminal device may enable the network device to know, in different manners, a second configuration authorization configuration of the multiple configuration authorization configurations that the terminal device transmits the second PUSCH after the terminal device transmits the first PUSCH.
Optionally, the second PUSCH is a first PUSCH transmitted by the terminal device after the first PUSCH; or the second PUSCH is a PUSCH transmitted in a second slot, and the second slot is a first slot after the first slot.
Optionally, in a specific embodiment of indicating the second configuration authorization configuration, the uplink control information UCI carried on the first PUSCH includes first indication information, where the first indication information is used to indicate the second configuration authorization configuration adopted by the terminal device for transmitting the second PUSCH.
It can be understood that the second configuration grant configuration used by the PUSCH (i.e., the second PUSCH) for the next transmission is indicated by including, i.e., the first indication information in the UCI.
Optionally, in the resource configuration method according to the embodiment of the present invention, the first indication information for indicating the second configuration authorization configuration adopted by the terminal device to transmit the second PUSCH may implement explicit indication of the second configuration authorization configuration in different manners, so as to implement diversity of the configuration authorization configuration indication.
Optionally, in a specific embodiment of the first indication information, the first indication information is used to indicate whether the second configuration authorization configuration is the same as the first configuration authorization configuration.
It is understood that whether the second configuration authorization configuration is the same as the first configuration authorization configuration is indicated by the first indication information included in the UCI.
For example, if the configuredgonfig field (i.e. the first indication information) included in the UCI is "0", the configured grant configuration (the configuration grant configuration) that can be used for the PUSCH for the next transmission is not changed, i.e. the second configuration grant configuration is the same as the first configuration grant configuration; if the configured grant configuration field included in the UCI is "1", the configured grant configuration that can be used on behalf of the PUSCH of the next transmission may be changed, i.e. the second configuration grant configuration is different from the first configuration grant configuration.
Further, when the configured grant configuration used by the terminal device on the PUSCH of the next transmission is not changed, the network device may demodulate the data of the next PUSCH transmission according to the first configuration grant configuration without blind detection; when the configured grant configuration used by the terminal device on the PUSCH for the next transmission is changed, the network device may determine, through the blind detection reference signal, the second configuration grant configuration in the other configuration grant configurations except the first configuration grant configuration among the multiple configuration grant configurations, that is, by reducing the range of the blind detection, the network device may save the number of blind detections.
Optionally, in another specific embodiment of the first indication information, the first indication information is used to indicate an index of the second configuration authorization configuration, where a bit number of the first indication information is related to a total number of the plurality of configuration authorization configurations.
It can be understood that the index of the second configuration authorization configuration is directly indicated by the first indication information included in the UCI, so that the network device determines the configuration authorization configuration indicated by the index as the second configuration authorization configuration, directly and explicitly, and thus, the network device can demodulate data transmitted by the next PUSCH according to the configuration indicated by the terminal device without blind detection. The bit number of the first indication information is related to the total number of the plurality of configuration authorization configurations, so that the bit number can be fully utilized, and waste is avoided.
For example, the index of the configured grant configuration used by the PUSCH of the next transmission is indicated by the configgradtconfigundidex field (i.e., the first indication information) included in the UCI.
Optionally, in another specific embodiment that indicates the second configuration authorization configuration, the resource configuration method according to the embodiment of the present invention further includes:
and determining a second configuration authorization configuration adopted for transmitting a second PUSCH according to the target time information, wherein the target time information comprises the preparation duration of the PUSCH.
The preparation time length of the PUSCH can be determined according to the PUSCH preparation capability of the terminal equipment; specifically, the terminal device reports the PUSCH preparation capability, and the network device may determine the preparation duration of the PUSCH according to the PUSCH preparation capability of the terminal device.
Optionally, in the resource configuration method according to the embodiment of the present invention, the target time information of the second configuration authorization configuration used by the network device to determine that the terminal device transmits the second PUSCH may be configured with different content combinations to realize an unspecified indication of the second configuration authorization configuration, so as to realize diversity of the configuration authorization configuration indications.
Optionally, in a specific embodiment of the target time information, the target time information further includes an interval duration between a transmission start time of the first PUSCH and an end time of the first slot;
the determining, according to the target time information, a second configuration authorization configuration used for transmitting a second PUSCH may specifically include the following steps:
determining one of the target configuration authorization configurations as a second configuration authorization configuration under the condition that the interval duration is greater than the preparation duration, wherein the time granularity of the target configuration authorization configuration is greater than that of the first configuration authorization configuration; or
And determining the first configuration authorization configuration as the second configuration authorization configuration under the condition that the interval duration is less than the preparation duration.
It can be understood that if the interval duration is greater than the preparation duration, the terminal device may be considered to be ready for data transmitted by the next PUSCH (i.e. the second PUSCH) in the interval duration, and thus, the configuration authorization configuration with a larger time granularity may be used when transmitting the next PUSCH; if the interval duration is less than the preparation duration, the terminal device is considered to be unable to prepare data for transmission of a next PUSCH (i.e. a second PUSCH) within the interval duration, so that the first configuration grant configuration may be continuously used when the next PUSCH is transmitted, and further, the configuration grant configuration with larger time granularity may be used when the next PUSCH after the PUSCH is transmitted.
Optionally, in another specific embodiment of the target time information, the target time information further includes a transmission start time of the first PUSCH;
determining a second configuration authorization configuration adopted for transmitting a second PUSCH according to the target time information, wherein the determining comprises:
determining one of the target configuration grant configurations as a second configuration grant configuration if the transmission start time of the second PUSCH is located after the target time;
the time granularity of the target configuration authorization configuration is larger than that of the first configuration authorization configuration, and the target time is an end time after a preparation time length by taking the transmission starting time of the first PUSCH as a starting point.
It can be understood that, when the network device learns the PUSCH preparation time of the terminal device, it may be considered that the terminal device may prepare data for next PUSCH transmission within the PUSCH preparation time, and after the time point when the terminal device starts to send data after robbing the channel and the PUSCH preparation time, that is, after transmitting the first PUSCH, the terminal device may continue to transmit the PUSCH by using the configuration authorization configuration with the larger time granularity.
Optionally, in any of the foregoing specific embodiments, the UCI in the first PUSCH includes second indication information, where the second indication information is used to indicate whether the terminal device transmits the PUSCH on the time domain resource corresponding to the second PUSCH in the second slot or the first slot.
It can be understood that when the UCI in the first PUSCH includes the second indication information to indicate that the end device transmits the PUSCH in the second slot or on the time domain resource corresponding to the second PUSCH in the first slot, the network device may further determine the second configuration authorization configuration based on this to decode the uplink data, and if the second indication information indicates that the end device does not transmit the PUSCH in the second slot or the time domain resource corresponding to the second PUSCH in the first slot, the network device does not determine that the second configuration authorization configuration is necessary; that is to say, the network device is instructed by the second indication information to perform the operation of determining the second configuration authorization configuration when necessary, so that the power consumption is reduced, and the resources are saved.
Optionally, in the resource allocation method according to the embodiment of the present invention, the method may further include the following steps:
transmitting a second PUSCH according to a second configuration grant configuration.
It is to be understood that, after the second configuration grant configuration is determined, the second PUSCH can be transmitted based on the second configuration grant configuration, and the complete information transmission process is implemented.
Corresponding to the resource allocation method executed by the terminal device in fig. 1, an embodiment of the present invention further provides a resource allocation method, which is applied to a network device. Referring to fig. 2, the method includes:
step 201: and sending a plurality of configuration authorization configurations to the terminal equipment.
Optionally, the time granularities of the plurality of configuration authorization configurations are different. That is, the network device may match a unique corresponding time granularity for each configuration grant configuration, wherein the time granularity includes, but is not limited to, one slot (slot), 2 symbols (symbol), 7 symbols (symbol), and 4 symbols (symbol).
Further optionally, the indexes of the plurality of configuration authorization configurations are different. That is, the network device may match a unique corresponding index for each configuration authorization configuration.
Further optionally, the reference signal parameters of the plurality of configuration authorization configurations are different. The network device may match a unique reference signal parameter for each configuration authorization configuration, where the reference signal parameter includes, but is not limited to, a Position, a Port, and a scrambling code scrimblingid.
Step 203: and determining a first configuration authorization configuration adopted by the terminal equipment for transmitting a first Physical Uplink Shared Channel (PUSCH) from a plurality of configuration authorization configurations through a blind detection reference signal, wherein the first PUSCH is transmitted after the successful Listen Before Talk (LBT) in a first time slot.
In the embodiment of the present invention, when information transmission is performed in an unlicensed frequency band, a network device generates a plurality of configuration grant configurations in advance, configures the plurality of configuration grant configurations for a terminal device, and further determines, after a terminal device LBT succeeds in contending for a channel and transmits a PUSCH using one of the plurality of configuration grant configurations, a configuration grant configuration used when the terminal device transmits information in a manner of blind detection of a reference signal, so as to perform decoding of uplink data according to the configuration. Therefore, the aim of improving the flexibility and the efficiency of resource utilization can be achieved by realizing the consistent understanding of the configuration modes between the terminal equipment and the network equipment, namely when the terminal equipment works in an unauthorized frequency band, configuring a plurality of configuration authorization configurations for the terminal equipment to realize information transmission.
Optionally, for a second PUSCH transmitted by the terminal device after the first PUSCH, the second configuration authorization configuration adopted when the second PUSCH is transmitted may be determined in different manners.
The second PUSCH is a first PUSCH transmitted by the terminal device after the first PUSCH; or the second PUSCH is a PUSCH transmitted in a second slot, and the second slot is a first slot after the first slot.
In a specific embodiment of determining the second configuration authorization configuration, the resource configuration method according to the embodiment of the present invention may further include:
and determining a second configuration authorization configuration adopted by the terminal equipment for transmitting a second PUSCH from the plurality of configuration authorization configurations through blind detection of the reference signal.
It can be understood that the network device continues to determine, by means of blind detection of the reference signal, the second configuration grant configuration adopted by the terminal device for transmitting the second PUSCH.
Optionally, in the resource configuration method according to the embodiment of the present invention, in order to achieve the purpose of reducing the number of blind tests of the network device, the network device may learn, in different manners, a second configuration authorization configuration that is used for transmitting a second PUSCH after the terminal device finishes transmitting the first PUSCH, based on corresponding information from the terminal device.
In another specific embodiment of determining the second configuration authorization configuration, the uplink control information carried on the first PUSCH includes first indication information; the resource allocation method of the embodiment of the invention may further include:
and determining a second configuration authorization configuration adopted by the terminal equipment for transmitting a second PUSCH according to the first indication information.
It can be understood that the second configuration grant configuration used for the PUSCH (i.e. the second PUSCH) for the next transmission is determined by including, i.e. the first indication information in the UCI.
Optionally, in the resource configuration method according to the embodiment of the present invention, the first indication information for indicating the second configuration authorization configuration adopted by the terminal device to transmit the second PUSCH may implement explicit indication of the second configuration authorization configuration in different manners, so as to implement diversity of the configuration authorization configuration indication.
Optionally, in a specific embodiment of the first indication information, the first indication information is used to indicate whether the second configuration authorization configuration is the same as the first configuration authorization configuration;
determining, according to the first indication information, a second configuration authorization configuration adopted by the terminal device for transmitting a second PUSCH, including:
and if the first indication information indicates the same, determining a second configuration authorization configuration from other configuration authorization configurations except the first configuration authorization configuration in the plurality of configuration authorization configurations by blindly detecting the reference signal.
Further, the determining, according to the first indication information, a second configuration authorization configuration adopted by the terminal device for transmitting a second PUSCH further includes:
and if the first indication information indicates different, determining the first configuration authorization configuration as a second configuration authorization configuration.
It is to be understood that it may be determined whether the second configuration authorization configuration is the same as the first configuration authorization configuration according to the first indication information included in the UCI.
For example, if the configuredgonfig field (i.e. the first indication information) included in the UCI is "0", the configured grant configuration (the configuration grant configuration) that can be used for the PUSCH for the next transmission is not changed, i.e. the second configuration grant configuration is the same as the first configuration grant configuration; if the configured grant configuration field included in the UCI is "1", the configured grant configuration that can be used on behalf of the PUSCH of the next transmission may be changed, i.e. the second configuration grant configuration is different from the first configuration grant configuration.
Further, when the configured grant configuration used by the terminal device on the PUSCH of the next transmission is not changed, the network device may demodulate the data of the next PUSCH transmission according to the first configuration grant configuration without blind detection; when the configured grant configuration used by the terminal device on the PUSCH for the next transmission is changed, the network device may determine, through the blind detection reference signal, the second configuration grant configuration in the other configuration grant configurations except the first configuration grant configuration among the multiple configuration grant configurations, that is, by reducing the range of the blind detection, the network device may save the number of blind detections.
Optionally, in another specific embodiment of the first indication information, the first indication information is used to indicate an index of the second configuration authorization configuration, where a bit number of the first indication information is related to a total number of the plurality of configuration authorization configurations;
determining, according to the first indication information, a second configuration authorization configuration adopted by the terminal device for transmitting a second PUSCH, including:
and determining the configuration authorization configuration indicated by the index as a second configuration authorization configuration.
It can be understood that the index of the second configuration authorization configuration is directly determined according to the first indication information included in the UCI, and then the configuration authorization configuration indicated by the index is determined as the second configuration authorization configuration, which is direct and explicit, so that the network device can demodulate data transmitted by the next PUSCH according to the configuration indicated by the terminal device without blind detection. The bit number of the first indication information is related to the total number of the plurality of configuration authorization configurations, so that the bit number can be fully utilized, and waste is avoided.
For example, the index of the configured grant configuration used by the PUSCH of the next transmission is determined according to the configured grant configindex field (i.e., the first indication information) included in the UCI.
In another specific embodiment of determining the second configuration authorization configuration, the resource configuration method according to the embodiment of the present invention may further include:
and determining a second configuration authorization configuration adopted by the terminal equipment for transmitting a second PUSCH according to the target time information, wherein the target time information comprises the preparation duration of the PUSCH.
The preparation time length of the PUSCH can be determined according to the PUSCH preparation capability of the terminal equipment; specifically, the terminal device reports the PUSCH preparation capability, and the network device may determine the preparation duration of the PUSCH according to the PUSCH preparation capability of the terminal device.
Optionally, in the resource configuration method according to the embodiment of the present invention, the target time information of the second configuration authorization configuration used by the network device to determine that the terminal device transmits the second PUSCH may implement, through different content combinations, an unspecified indication on the second configuration authorization configuration, so as to implement diversity of the configuration authorization configuration indications.
Optionally, in a specific embodiment of the target time information, the target time information further includes an interval duration between a transmission start time of the first PUSCH and an end time of the first slot;
determining a second configuration authorization configuration adopted by the terminal device for transmitting a second PUSCH according to the target time information, including:
determining one of the target configuration authorization configurations as a second configuration authorization configuration when the interval duration is greater than the preparation duration, wherein the time granularity of the target configuration authorization configuration is greater than that of the first configuration authorization configuration; or
And determining the first configuration authorization configuration as the second configuration authorization configuration under the condition that the interval duration is less than the preparation duration.
It can be understood that if the interval duration is greater than the preparation duration, the terminal device may be considered to be ready for data transmitted by the next PUSCH (i.e. the second PUSCH) in the interval duration, and thus, the configuration authorization configuration with a larger time granularity may be used when transmitting the next PUSCH; if the interval duration is less than the preparation duration, the terminal device is considered to be unable to prepare data for transmission of a next PUSCH (i.e. a second PUSCH) within the interval duration, so that the first configuration grant configuration may be continuously used when the next PUSCH is transmitted, and further, the configuration grant configuration with larger time granularity may be used when the next PUSCH after the PUSCH is transmitted.
Optionally, in another specific embodiment of the target time information, the target time information further includes a transmission start time of the first PUSCH;
determining a second configuration authorization configuration adopted by the terminal device for transmitting a second PUSCH according to the target time information, including:
determining one of the target configuration grant configurations as a second configuration grant configuration if the transmission start time of the second PUSCH is located after the target time;
the time granularity of the target configuration authorization configuration is larger than that of the first configuration authorization configuration, and the target time is an end time after a preparation time length by taking the transmission starting time of the first PUSCH as a starting point.
It can be understood that, when the network device learns the PUSCH preparation time of the terminal device, it may be considered that the terminal device may prepare data for next PUSCH transmission within the PUSCH preparation time, and after the time point when the terminal device starts to send data after robbing the channel and the PUSCH preparation time, that is, after transmitting the first PUSCH, the terminal device may continue to transmit the PUSCH by using the configuration authorization configuration with the larger time granularity.
Optionally, in the resource configuration method according to the embodiment of the present invention, the UCI in the first PUSCH includes second indication information, where the second indication information is used to indicate whether the terminal device transmits the PUSCH in the second slot or on the time domain resource corresponding to the second PUSCH in the first slot;
determining a second configuration authorization configuration adopted by the terminal device for transmitting a second PUSCH includes:
in case the second indication information indicates transmission of PUSCH, a second configuration grant configuration is determined.
It can be understood that when the UCI in the first PUSCH includes the second indication information to indicate that the end device transmits the PUSCH in the second slot or on the time domain resource corresponding to the second PUSCH in the first slot, the network device may further determine the second configuration authorization configuration based on this to decode the uplink data, and if the second indication information indicates that the end device does not transmit the PUSCH in the second slot or the time domain resource corresponding to the second PUSCH in the first slot, the network device does not determine that the second configuration authorization configuration is necessary; that is to say, the network device is instructed by the second indication information to perform the operation of determining the second configuration authorization configuration when necessary, so that the power consumption is reduced, and the resources are saved.
The following describes a specific scheme of the resource allocation method according to the embodiment of the present invention with reference to fig. 3 to 6.
As shown in fig. 3, the network device configures 2 configuration authorization configurations, where configuration 1 is transmission based on 2 symbol time granularities, configuration 2 is transmission based on 1 slot time granularities, and the two configurations correspond to different Demodulation Reference Signal (DMRS) positions.
When the UE prepares a data buffer with 2 symbol time granularities, as shown in fig. 3, the UE succeeds in the 6 th symbol lbt of slot, where 1 slot consists of 0-13 th symbols. The PUSCH transmission starts at the 8 th symbol. The UE carries UCI containing field ConfiguredGrantConfig indicating '0', which represents whether the configuration of the next PUSCH is unchanged or is transmitted based on 2 symbol time granularities, as shown in the actual transmission process in the figure.
Then, the UE prepares 1 slot data buffer, as shown in fig. 3, the UE carries UCI containing field ConfiguredGrantConfig indication '1' on the last PUSCH transmitted in slot, which represents the configuration change of the next PUSCH, and based on 1 slot time granularity transmission, the UE continues to transmit PUSCH on slot +1 based on 1 slot, as shown in the actual transmission process in the figure.
Further, if the UCI carried by the PUSCH transmitted by the UE in slot +1 includes a field burstlnnextslot (i.e., the second indication information) indicating '1', the representation indicates that there is no data transmission in the next slot.
As shown in fig. 4, the network device configures 3 configuration authorization configurations, where the ConfiguredGrantConfigIndex field of the UCI is 2 bits, indicating 3 configurations: '01' indicates configuration 1, corresponding to uplink transmission based on 2 symbol time granularities; '10' indicates configuration 2, corresponding to uplink transmission based on 1-slot time granularity; '11' indicates configuration 3, corresponding to upstream transmission based on 7-symbol time granularity.
The UE then prepares a data buffer of 2 symbols, as in fig. 4, the UE succeeds in the 6 th symbol lbt of slot, where 1 slot consists of 0-13 symbols. The PUSCH transmission starts at the 8 th symbol. The UE indicates '01' in the field configuredgrantefindex of UCI, representing the next PUSCH transmission based on configuration 1, i.e. based on 2-symbol transmission, as shown in the actual transmission procedure in the figure.
Then the UE prepares a data buffer of 7 symbols, as shown in fig. 4, the UE carries UCI containing field config grant configindex indication '11' on the last PUSCH transmitted in slot i, which represents that the next PUSCH is transmitted based on configuration 3, i.e. based on 7 symbols time granularity, and the UE continues to transmit PUSCH on slot i +1 based on 7 symbols, as shown in the actual transmission process in the figure.
Further, if the UE carries UCI containing field burstinnnextslot indication '1' on the PUSCH transmitted in slot +1, symbol7-symbol13 indicating slot +1 has no data transmission.
As shown in fig. 5, the network device configures 3 configuration grant configurations, which are respectively transmitted based on 2 symbol time granularities, 1 slot time granularities and 7symbol time granularities.
When the UE prepares a data buffer of 2 symbols, as shown in fig. 5, the UE succeeds in the 6 th symbol lbt of slot, where 1 slot consists of 0 to 13 th symbols. The PUSCH transmission starts at the 8 th symbol. The network device compares the time length T (i.e. the interval duration) from the time when the UE starts to transmit data in the current slot to the end boundary of the slot with the data preparation duration M (i.e. the preparation duration of the PUSCH), and obtains that T is greater than M. The UE prepares a data buffer of 7 symbols. At slot i +1, the UE transmits PUSCH on a basis of 7symbol time granularities, as shown by the actual transmission procedure in the figure.
Further, if the UE carries UCI containing field burstinnnextslot indication '1' on the PUSCH transmitted in slot +1, symbol7-symbol13 representing slot +1 has no data transmission.
As shown in fig. 6, the network device configures 4 configuration grant configurations, which are transmitted based on 2 symbol time granularities, 1 slot time granularities, 7symbol time granularities, and 4 symbol time granularities, respectively.
When the UE prepares a data buffer of 2 symbols, as shown in fig. 6, the UE succeeds in the 8 th symbol lbt of slot, where 1 slot consists of 0 to 13 th symbols. The PUSCH transmission starts at the 10 th symbol. After the network device starts to send data at the current slot plus the data preparation time M reported by the UE, the UE switches to transmission based on 4 symbol time granularities, as shown in the actual transmission process in the figure.
When the UE prepares a data buffer of 4 symbols, as shown in fig. 6, starting at the 3 rd symbol of slot i +1, the UE transmits PUSCH based on 4 symbol time granularities, as shown in the actual transmission process in the figure.
Further, if the UE carries UCI containing field burstlnnextslot indication '1' on the last PUSCH transmitted in slot +1, it represents that slot +2 has no data transmission, as shown in the actual transmission process in the figure.
As can be seen from the above, in the embodiment of the present invention, the network device generates multiple configuredprint configurations based on different time granularities, and the UE prepares data of different transport blocks tb (ttransport block) sizes, and specifically, when performing actual transmission, the UE selects a certain configuredprint configuration according to an LBT result to transmit corresponding data, and notifies the network device of a configuration situation for transmitting a next PUSCH use in a manner of explicit indication or non-explicit indication. Therefore, on the premise of increasing the channel access opportunity, the number of HARQ processes can be effectively reduced, the overhead of control signaling can be reduced, and the flexibility and the efficiency of resource utilization can be increased.
Referring to fig. 7, an embodiment of the present invention provides a terminal device 300, where the terminal device 300 includes:
a receiving module 301, configured to receive a plurality of configuration authorization configurations;
a transmitting module 303, configured to transmit a first physical uplink shared channel PUSCH according to a first configuration grant configuration in the multiple configuration grant configurations, when listen before talk, LBT, is successful in the first slot.
Optionally, in the terminal device 300 in the embodiment of the present invention, the uplink control information UCI carried on the first PUSCH includes first indication information, where the first indication information is used to indicate a second configuration authorization configuration adopted by the terminal device 300 to transmit the second PUSCH.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the first indication information is used to indicate whether the second configuration authorization configuration is the same as the first configuration authorization configuration.
Optionally, in the terminal device 300 of the embodiment of the present invention, the first indication information is used to indicate an index of the second configuration authorization configuration, where a bit number of the first indication information is related to a total number of the plurality of configuration authorization configurations.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the terminal device 300 further includes:
and a determining module, configured to determine, according to target time information, a second configuration authorization configuration adopted for transmitting a second PUSCH, where the target time information includes a preparation duration of the PUSCH.
Optionally, in the terminal device 300 in the embodiment of the present invention, the target time information further includes an interval duration between a transmission start time of the first PUSCH and an end time of the first slot;
the determining module may be specifically configured to:
determining one of the target configuration authorization configurations as a second configuration authorization configuration when the interval duration is greater than the preparation duration, wherein the time granularity of the target configuration authorization configuration is greater than that of the first configuration authorization configuration; or
And determining the first configuration authorization configuration as the second configuration authorization configuration under the condition that the interval duration is less than the preparation duration.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the target time information further includes a transmission start time of a first PUSCH;
the determining module may be specifically configured to: determining one of the target configuration grant configurations as a second configuration grant configuration if the transmission start time of the second PUSCH is located after the target time;
the time granularity of the target configuration authorization configuration is larger than that of the first configuration authorization configuration, and the target time is an end time after a preparation time length by taking the transmission starting time of the first PUSCH as a starting point.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the second PUSCH is a first PUSCH transmitted by the terminal device 300 after the first PUSCH; or
The second PUSCH is a PUSCH transmitted in a second slot, and the second slot is a first slot after the first slot.
Optionally, in the terminal device 300 of the embodiment of the present invention, the UCI in the first PUSCH includes second indication information, where the second indication information is used to indicate whether the terminal device 300 transmits a PUSCH on a time domain resource corresponding to the second PUSCH in the second slot or the first slot.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the transmission module 303 may be further configured to:
transmitting a second PUSCH according to a second configuration grant configuration.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the time granularities of the multiple configuration authorization configurations are different.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the indexes of the plurality of configuration authorization configurations are different.
Optionally, in the terminal device 300 according to the embodiment of the present invention, the reference signal parameters of the multiple configuration authorization configurations are different.
It can be understood that, the terminal device 300 provided in the embodiment of the present invention can implement the resource allocation method executed by the terminal device 300, and the related descriptions about the resource allocation method are all applicable to the terminal device 300, and are not described herein again.
In the embodiment of the present invention, when information transmission is performed in an unlicensed frequency band, a terminal device receives multiple configuration grant configurations configured for the terminal device by a network device, and selects one configuration grant configuration from the multiple configuration grant configurations to transmit a PUSCH to complete information transmission when LBT succeeds, i.e., contends for a channel. Therefore, the aim of improving the flexibility and the efficiency of resource utilization can be achieved by realizing the consistency understanding of the configuration modes between the terminal equipment and the network equipment, namely when the terminal equipment works in an unauthorized frequency band, the network equipment transmits information based on a plurality of configuration authorization configurations configured for the terminal equipment.
Referring to fig. 8, an embodiment of the present invention provides a network device 400, where the network device 400 includes:
a sending module 401, configured to send a plurality of configuration authorization configurations to a terminal device;
a determining module 403, configured to determine, through a blind detection reference signal, a first configuration grant configuration that is used by a terminal device for transmitting a first physical uplink shared channel, PUSCH, from multiple configuration grant configurations, where the first PUSCH is transmitted after listening before speaking, LBT, succeeds in a first slot.
Optionally, in the network device 400 according to the embodiment of the present invention, the determining module 403 may be further configured to:
and determining a second configuration authorization configuration adopted by the terminal equipment for transmitting a second PUSCH from the plurality of configuration authorization configurations through blind detection of the reference signal.
Optionally, in the network device 400 in the embodiment of the present invention, the uplink control information carried on the first PUSCH includes first indication information;
the determining module 403 may be specifically configured to:
and determining a second configuration authorization configuration adopted by the terminal equipment for transmitting a second PUSCH according to the first indication information.
Optionally, in the network device 400 according to the embodiment of the present invention, the first indication information is used to indicate whether the second configuration authorization configuration is the same as the first configuration authorization configuration;
the determining module 403 may be specifically configured to:
and if the first indication information indicates the same, determining a second configuration authorization configuration from other configuration authorization configurations except the first configuration authorization configuration in the plurality of configuration authorization configurations by blindly detecting the reference signal.
Optionally, in the network device 400 according to the embodiment of the present invention, the determining module 403 may be further configured to:
and if the first indication information indicates different, determining the first configuration authorization configuration as a second configuration authorization configuration.
Optionally, in the network device 400 in the embodiment of the present invention, the first indication information is used to indicate an index of the second configuration authorization configuration, and a bit number of the first indication information is related to a total number of the plurality of configuration authorization configurations;
the determining module 403 may be specifically configured to:
and determining the configuration authorization configuration indicated by the index as a second configuration authorization configuration.
Optionally, in the network device 400 according to the embodiment of the present invention, the determining module 403 may be further configured to:
and determining a second configuration authorization configuration adopted by the terminal equipment for transmitting a second PUSCH according to the target time information, wherein the target time information comprises the preparation duration of the PUSCH.
Optionally, in the network device 400 in the embodiment of the present invention, the target time information further includes an interval duration between a transmission start time of the first PUSCH and an end time of the first slot;
the determining module 403 may be specifically configured to:
determining one of the target configuration authorization configurations as a second configuration authorization configuration when the interval duration is greater than the preparation duration, wherein the time granularity of the target configuration authorization configuration is greater than that of the first configuration authorization configuration; or
And determining the first configuration authorization configuration as the second configuration authorization configuration under the condition that the interval duration is less than the preparation duration.
Optionally, in the network device 400 according to the embodiment of the present invention, the target time information further includes a transmission start time of the first PUSCH;
the determining module 403 may be specifically configured to:
determining one of the target configuration grant configurations as a second configuration grant configuration if the transmission start time of the second PUSCH is located after the target time;
the time granularity of the target configuration authorization configuration is larger than that of the first configuration authorization configuration, and the target time is an end time after a preparation time length by taking the transmission starting time of the first PUSCH as a starting point.
Optionally, in the network device 400 according to the embodiment of the present invention, the second PUSCH is a first PUSCH transmitted by the terminal device after the first PUSCH; or
The second PUSCH is a PUSCH transmitted in a second slot, and the second slot is a first slot after the first slot.
Optionally, in the network device 400 in the embodiment of the present invention, the UCI in the first PUSCH includes second indication information, where the second indication information is used to indicate whether the terminal device transmits the PUSCH on the time domain resource corresponding to the second PUSCH in the second slot or the first slot;
the determining module 403 is specifically configured to:
in case the second indication information indicates transmission of PUSCH, a second configuration grant configuration is determined.
Optionally, in the network device 400 according to the embodiment of the present invention, the time granularities of the multiple configuration authorization configurations are different.
Optionally, in the network device 400 according to the embodiment of the present invention, the indexes of the plurality of configuration authorization configurations are different.
Optionally, in the network device 400 according to the embodiment of the present invention, the reference signal parameters of the multiple configuration authorization configurations are different.
It can be understood that the network device provided in the embodiment of the present invention can implement the resource allocation method executed by the network device, and the related descriptions about the resource allocation method are applicable to the network device, and are not described herein again.
In the embodiment of the present invention, when information transmission is performed in an unlicensed frequency band, a network device generates a plurality of configuration grant configurations in advance, configures the plurality of configuration grant configurations for a terminal device, and further determines, after a terminal device LBT succeeds in contending for a channel and transmits a PUSCH using one of the plurality of configuration grant configurations, a configuration grant configuration used when the terminal device transmits information in a manner of blind detection of a reference signal, so as to perform decoding of uplink data according to the configuration. Therefore, the aim of improving the flexibility and the efficiency of resource utilization can be achieved by realizing the consistent understanding of the configuration modes between the terminal equipment and the network equipment, namely when the terminal equipment works in an unauthorized frequency band, configuring a plurality of configuration authorization configurations for the terminal equipment to realize information transmission.
Fig. 9 is a block diagram of a terminal device of another embodiment of the present invention. The terminal device 500 shown in fig. 9 includes: at least one processor 501, memory 502, at least one network interface 504, and a user interface 503. The various components in the terminal device 500 are coupled together by a bus system 505. It is understood that the bus system 505 is used to enable connection communications between these components. The bus system 505 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 505 in FIG. 9.
The user interface 503 may include, among other things, a display, a keyboard, or a pointing device (e.g., a mouse, trackball, touch pad, or touch screen, among others.
It is to be understood that the memory 502 in embodiments of the present invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, but not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data rate Synchronous Dynamic random access memory (ddr SDRAM ), Enhanced Synchronous SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct memory bus RAM (DRRAM). The memory 502 of the subject systems and methods described in connection with the embodiments of the invention is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 502 stores elements, executable modules or data structures, or a subset thereof, or an expanded set thereof as follows: an operating system 5021 and application programs 5022.
The operating system 5021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application 5022 includes various applications, such as a Media Player (Media Player), a Browser (Browser), and the like, for implementing various application services. The program for implementing the method according to the embodiment of the present invention may be included in the application program 5022.
In this embodiment of the present invention, the terminal device 500 further includes: a computer program stored on a memory 502 and executable on a processor 501, the computer program when executed by the processor 501 implementing the steps of:
receiving a plurality of configuration authorization configurations;
and under the condition that Listen Before Talk (LBT) succeeds in the first slot, transmitting a first Physical Uplink Shared Channel (PUSCH) according to a first configuration authorization configuration in the plurality of configuration authorization configurations.
The method disclosed by the above-mentioned embodiments of the present invention may be applied to the processor 501, or implemented by the processor 501. The processor 501 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 501. The Processor 501 may be a general-purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable Gate Array (FPGA) or other programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may reside in ram, flash memory, rom, prom, or eprom, registers, among other computer-readable storage media known in the art. The computer readable storage medium is located in the memory 502, and the processor 501 reads the information in the memory 502 and performs the steps of the above method in combination with the hardware thereof. In particular, the computer readable storage medium has stored thereon a computer program, which when executed by the processor 501 implements the steps of the resource allocation method embodiments as described above.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described in this disclosure may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described in this disclosure. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
The terminal device 500 can implement the processes implemented by the terminal device in the foregoing embodiments, and in order to avoid repetition, the descriptions are omitted here.
In the embodiment of the present invention, when information transmission is performed in an unlicensed frequency band, a terminal device receives multiple configuration grant configurations configured for the terminal device by a network device, and selects one configuration grant configuration from the multiple configuration grant configurations to transmit a PUSCH to complete information transmission when LBT succeeds, i.e., contends for a channel. Therefore, the aim of improving the flexibility and the efficiency of resource utilization can be achieved by realizing the consistency understanding of the configuration modes between the terminal equipment and the network equipment, namely when the terminal equipment works in an unauthorized frequency band, the network equipment transmits information based on a plurality of configuration authorization configurations configured for the terminal equipment.
Referring to fig. 10, fig. 10 is a structural diagram of a network device applied in the embodiment of the present invention, which can implement the details of the foregoing resource allocation method and achieve the same effect. As shown in fig. 10, the network device 600 includes: a processor 601, a transceiver 602, a memory 603, a user interface 604, and a bus interface 605, wherein:
in this embodiment of the present invention, the network device 600 further includes: a computer program stored in the memory 603 and executable on the processor 601, the computer program when executed by the processor 601 performing the steps of:
sending a plurality of configuration authorization configurations to the terminal device;
determining a first configuration authorization configuration adopted by a terminal device for transmitting a first Physical Uplink Shared Channel (PUSCH) from a plurality of configuration authorization configurations through a blind detection reference signal, wherein the first PUSCH is transmitted after the successful listening and speaking of an LBT in a first time slot.
In fig. 10, the bus architecture may include any number of interconnected buses and bridges, with one or more processors represented by processor 601 and various circuits of memory represented by memory 603 being linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. Bus interface 605 provides an interface. The transceiver 602 may be a number of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium. The user interface 604 may also be an interface capable of interfacing with a desired device for different user devices, including but not limited to a keypad, display, speaker, microphone, joystick, etc.
The processor 601 is responsible for managing the bus architecture and general processing, and the memory 603 may store data used by the processor 601 in performing operations.
In the embodiment of the present invention, when information transmission is performed in an unlicensed frequency band, a network device generates a plurality of configuration grant configurations in advance, configures the plurality of configuration grant configurations for a terminal device, and further determines, after a terminal device LBT succeeds in contending for a channel and transmits a PUSCH using one of the plurality of configuration grant configurations, a configuration grant configuration used when the terminal device transmits information in a manner of blind detection of a reference signal, so as to perform decoding of uplink data according to the configuration. Therefore, the aim of improving the flexibility and the efficiency of resource utilization can be achieved by realizing the consistent understanding of the configuration modes between the terminal equipment and the network equipment, namely when the terminal equipment works in an unauthorized frequency band, configuring a plurality of configuration authorization configurations for the terminal equipment to realize information transmission.
Preferably, an embodiment of the present invention further provides a terminal device, which includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program, when executed by the processor, implements each process of the foregoing resource allocation method embodiment, and can achieve the same technical effect, and details are not repeated here to avoid repetition.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the processes of the above-mentioned resource configuration method embodiment applied to the terminal device, and can achieve the same technical effects, and in order to avoid repetition, the details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
Preferably, an embodiment of the present invention further provides a network device, which includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program, when executed by the processor, implements each process of the foregoing resource allocation method embodiment, and can achieve the same technical effect, and details are not repeated here to avoid repetition.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the processes of the resource configuration method embodiment applied to the network device, and can achieve the same technical effects, and in order to avoid repetition, the details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.
Claims (32)
1. A resource allocation method is applied to terminal equipment, and is characterized in that the method comprises the following steps:
receiving a plurality of configuration authorization configurations;
and under the condition that Listen Before Talk (LBT) succeeds in the first slot, transmitting a first Physical Uplink Shared Channel (PUSCH) according to a first configuration authorization configuration in the plurality of configuration authorization configurations.
2. The method of claim 1, wherein Uplink Control Information (UCI) carried on the first Physical Uplink Shared Channel (PUSCH) comprises first indication information, wherein the first indication information is used for indicating a second configuration authorization configuration adopted by the terminal device for transmitting a second PUSCH.
3. The method of claim 2, wherein the first indication information is used to indicate whether the second configuration authorization configuration is the same as the first configuration authorization configuration.
4. The method of claim 2, wherein the first indication information is used to indicate an index of the second configuration authorization configuration, and wherein a bit number of the first indication information is related to a total number of the plurality of configuration authorization configurations.
5. The method of claim 1, further comprising:
and determining a second configuration authorization configuration adopted for transmitting a second PUSCH according to target time information, wherein the target time information comprises the preparation duration of the PUSCH.
6. The method of claim 5, wherein the target time information further comprises a gap duration between a transmission start time of the first PUSCH and an end time of the first slot;
wherein, the determining, according to the target time information, a second configuration authorization configuration adopted for transmitting a second PUSCH includes:
determining one of the target configuration authorization configurations as the second configuration authorization configuration if the interval duration is greater than the preparation duration, wherein the time granularity of the target configuration authorization configuration is greater than the time granularity of the first configuration authorization configuration; or
Determining the first configuration authorization configuration as the second configuration authorization configuration if the interval duration is less than the preparation duration.
7. The method of claim 5, wherein the target time information further comprises a transmission start time of the first PUSCH;
wherein, the determining, according to the target time information, a second configuration authorization configuration adopted for transmitting a second PUSCH includes:
determining one of target configuration grant configurations as the second configuration grant configuration if the transmission start time of the second PUSCH is located after a target time;
the time granularity of the target configuration authorization configuration is greater than that of the first configuration authorization configuration, and the target time is an end time after the preparation time length with the transmission start time of the first PUSCH as a starting point.
8. The method according to any of claims 2-7, wherein the second PUSCH is a first PUSCH transmitted by the terminal device after the first PUSCH; or
The second PUSCH is a PUSCH transmitted in a second slot, and the second slot is a first slot after the first slot.
9. The method of claim 8, wherein the UCI in the first PUSCH comprises second indication information, wherein the second indication information is used for indicating whether the terminal device transmits a PUSCH on a time domain resource corresponding to the second PUSCH in the second slot or in the first slot.
10. The method according to any one of claims 2 to 7, further comprising:
transmitting the second PUSCH according to the second configuration grant configuration.
11. The method according to any one of claims 1 to 7,
the multiple configuration authorization configurations differ in time granularity.
12. The method of claim 11,
the plurality of configuration authorization configurations differ in index.
13. The method of claim 11,
the reference signal parameters of the plurality of configuration grant configurations are different.
14. A resource configuration method is applied to network equipment, and is characterized in that the method comprises the following steps:
sending a plurality of configuration authorization configurations to the terminal device;
and determining a first configuration authorization configuration adopted by the terminal equipment for transmitting a first Physical Uplink Shared Channel (PUSCH) from the plurality of configuration authorization configurations through a blind detection reference signal, wherein the first PUSCH is transmitted after the successful Listen Before Talk (LBT) in a first slot.
15. The method of claim 14, further comprising:
and determining a second configuration authorization configuration adopted by the terminal equipment for transmitting a second PUSCH from the plurality of configuration authorization configurations through blind detection of a reference signal.
16. The method of claim 14, wherein the uplink control information carried on the first PUSCH includes first indication information;
wherein the method further comprises:
and determining a second configuration authorization configuration adopted by the terminal equipment for transmitting a second PUSCH according to the first indication information.
17. The method of claim 16, wherein the first indication information is used to indicate whether the second configuration authorization configuration is the same as the first configuration authorization configuration;
wherein, the determining, according to the first indication information, a second configuration authorization configuration adopted by the terminal device for transmitting a second PUSCH includes:
if the first indication information indicates the same, determining a second configuration authorization configuration from other configuration authorization configurations except the first configuration authorization configuration in the plurality of configuration authorization configurations through blind detection of a reference signal.
18. The method of claim 17, wherein the determining, according to the first indication information, a second configuration authorization configuration adopted by the terminal device for transmitting a second PUSCH further comprises:
and if the first indication information indicates different, determining the first configuration authorization configuration as the second configuration authorization configuration.
19. The method of claim 16, wherein the first indication information is used to indicate an index of the second configuration authorization configuration, and wherein a bit number of the first indication information is related to a total number of the plurality of configuration authorization configurations;
wherein, the determining, according to the first indication information, a second configuration authorization configuration adopted by the terminal device for transmitting a second PUSCH includes:
determining the configuration authorization configuration indicated by the index as the second configuration authorization configuration.
20. The method of claim 14, further comprising:
and determining a second configuration authorization configuration adopted by the terminal equipment for transmitting a second PUSCH according to target time information, wherein the target time information comprises the preparation duration of the PUSCH.
21. The method of claim 20, wherein the target time information further comprises a gap duration between a transmission start time of the first PUSCH and an end time of the first slot;
wherein, the determining, according to the target time information, a second configuration authorization configuration adopted by the terminal device for transmitting a second PUSCH includes:
determining one of the target configuration authorization configurations as the second configuration authorization configuration if the interval duration is greater than the preparation duration, wherein the time granularity of the target configuration authorization configuration is greater than the time granularity of the first configuration authorization configuration; or
Determining the first configuration authorization configuration as the second configuration authorization configuration if the interval duration is less than the preparation duration.
22. The method of claim 20, wherein the target time information further comprises a transmission start time of the first PUSCH;
wherein, the determining, according to the target time information, a second configuration authorization configuration adopted by the terminal device for transmitting a second PUSCH includes:
determining one of target configuration grant configurations as the second configuration grant configuration if the transmission start time of the second PUSCH is located after a target time;
the time granularity of the target configuration authorization configuration is greater than that of the first configuration authorization configuration, and the target time is an end time after the preparation time length with the transmission start time of the first PUSCH as a starting point.
23. The method according to any of claims 15-22, wherein the second PUSCH is a first PUSCH transmitted by the terminal device after the first PUSCH; or
The second PUSCH is a PUSCH transmitted in a second slot, and the second slot is a first slot after the first slot.
24. The method of claim 23, wherein the UCI in the first PUSCH comprises second indication information indicating whether the terminal device transmits a PUSCH on the time domain resources corresponding to the second PUSCH in the second slot or in the first slot;
wherein the determining of the second configuration authorization configuration adopted by the terminal device for transmitting the second PUSCH includes:
determining the second configuration authorization configuration in case the second indication information indicates transmission of PUSCH.
25. The method according to any one of claims 14 to 22,
the multiple configuration authorization configurations differ in time granularity.
26. The method of claim 25,
the plurality of configuration authorization configurations differ in index.
27. The method of claim 25,
the reference signal parameters of the plurality of configuration grant configurations are different.
28. A terminal device, comprising:
a receiving module for receiving a plurality of configuration authorization configurations;
and a transmission module, configured to transmit a first physical uplink shared channel PUSCH according to a first configuration grant configuration of the multiple configuration grant configurations when listen before talk, LBT, is successful in a first slot.
29. A network device, comprising:
a sending module, configured to send a plurality of configuration authorization configurations to a terminal device;
a determining module, configured to determine, from the multiple configuration grant configurations, a first configuration grant configuration that the terminal device uses for transmitting a first physical uplink shared channel, PUSCH, through blind detection of a reference signal, where the first PUSCH is transmitted after listening before speaking, LBT, succeeds in a first slot.
30. A terminal device, comprising: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method according to any one of claims 1 to 13.
31. A network device, comprising: memory, processor and computer program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the method according to any of claims 14 to 27.
32. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 27.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910345610.8A CN111107638B (en) | 2019-04-26 | 2019-04-26 | Resource allocation method, terminal equipment and network equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910345610.8A CN111107638B (en) | 2019-04-26 | 2019-04-26 | Resource allocation method, terminal equipment and network equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111107638A true CN111107638A (en) | 2020-05-05 |
CN111107638B CN111107638B (en) | 2023-04-28 |
Family
ID=70420483
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910345610.8A Active CN111107638B (en) | 2019-04-26 | 2019-04-26 | Resource allocation method, terminal equipment and network equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111107638B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022198532A1 (en) * | 2021-03-24 | 2022-09-29 | Oppo广东移动通信有限公司 | Wireless communication method and device, and storage medium |
CN115553003A (en) * | 2020-05-21 | 2022-12-30 | 中兴通讯股份有限公司 | Configuration of data transmission for resource saving in shared spectrum channel access |
WO2023029003A1 (en) * | 2021-09-03 | 2023-03-09 | Apple Inc. | Configured grant enhancement |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109156035A (en) * | 2016-05-23 | 2019-01-04 | 华为技术有限公司 | Transmit method, the network equipment and the terminal device of data |
-
2019
- 2019-04-26 CN CN201910345610.8A patent/CN111107638B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109156035A (en) * | 2016-05-23 | 2019-01-04 | 华为技术有限公司 | Transmit method, the network equipment and the terminal device of data |
Non-Patent Citations (1)
Title |
---|
""draft_R5-171957_meeting_report_RAN5#74_0103"", 《3GPP TSG_RAN\WG5_TEST_EX-T1》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115553003A (en) * | 2020-05-21 | 2022-12-30 | 中兴通讯股份有限公司 | Configuration of data transmission for resource saving in shared spectrum channel access |
WO2022198532A1 (en) * | 2021-03-24 | 2022-09-29 | Oppo广东移动通信有限公司 | Wireless communication method and device, and storage medium |
WO2023029003A1 (en) * | 2021-09-03 | 2023-03-09 | Apple Inc. | Configured grant enhancement |
Also Published As
Publication number | Publication date |
---|---|
CN111107638B (en) | 2023-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP4236534A1 (en) | Resource selection method and apparatus, and terminal device | |
US11641666B2 (en) | Uplink transmission method and device | |
US20220015144A1 (en) | Method for sharing channel occupancy time and device | |
CN108347307B (en) | Data transmission method, terminal equipment and network equipment | |
JP7270110B2 (en) | Method and User Equipment for Uplink Cancellation Indication | |
US11388702B2 (en) | Resource determining method, apparatus, network element, and system | |
CN116321513A (en) | Method for performing random access channel procedure and user equipment therefor | |
CN109391388B (en) | Data transmission method, terminal and base station | |
CN110635877B (en) | Transmission method of system message, terminal equipment and network equipment | |
CN109413754B (en) | Information receiving and sending method, terminal and base station | |
CN111107638A (en) | Resource allocation method, terminal equipment and network equipment | |
CN109548147B (en) | Resource allocation method, base station and terminal | |
WO2022135415A1 (en) | Channel access method, user equipment, and base station | |
BR112021003006A2 (en) | harq and apparatus feedback method | |
CN111436118A (en) | Transmission resource detection method, transmission resource determination method and communication equipment | |
CN109392060A (en) | A kind of monitor method of RAR, sending method, relevant device and system | |
CN111800883B (en) | Channel access method, terminal equipment and network equipment | |
CN110636630B (en) | Transmission method of system message, terminal equipment and network equipment | |
CN113890701A (en) | Side link transmission method, transmission device and terminal | |
US11832090B2 (en) | Data transmission method, device, and storage medium | |
CN111800237A (en) | Data sending method, data receiving method and equipment | |
CN111132379B (en) | Data transmission method and device | |
CN115189838B (en) | Physical downlink control channel repeated transmission method, device and user equipment | |
CN113784439B (en) | Control information transmission method, terminal and network equipment | |
CN113905434A (en) | Transmission method of downlink control information, terminal equipment and network equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |