CN111148230B - Method and device for transmitting downlink control information - Google Patents

Method and device for transmitting downlink control information Download PDF

Info

Publication number
CN111148230B
CN111148230B CN201811302594.6A CN201811302594A CN111148230B CN 111148230 B CN111148230 B CN 111148230B CN 201811302594 A CN201811302594 A CN 201811302594A CN 111148230 B CN111148230 B CN 111148230B
Authority
CN
China
Prior art keywords
dci
bit length
length
monitoring
transmitted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811302594.6A
Other languages
Chinese (zh)
Other versions
CN111148230A (en
Inventor
高飞
张旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201811302594.6A priority Critical patent/CN111148230B/en
Publication of CN111148230A publication Critical patent/CN111148230A/en
Application granted granted Critical
Publication of CN111148230B publication Critical patent/CN111148230B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0036Systems modifying transmission characteristics according to link quality, e.g. power backoff arrangements specific to the receiver
    • H04L1/0038Blind format detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Quality & Reliability (AREA)
  • Communication Control (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a method and a device for transmitting downlink control information, which can reduce the complexity of blind detection of downlink control information DCI by terminal side equipment. The method comprises the following steps: the terminal side equipment receives first configuration information from the network side equipment, wherein the first configuration information is used for configuring first DCI, second DCI, third DCI, fourth DCI, fifth DCI and sixth DCI; and the terminal side equipment determines the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the third DCI, the monitoring bit length of the fourth DCI, the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI according to the first configuration information.

Description

Method and device for transmitting downlink control information
Technical Field
The present application relates to the field of communications, and in particular, to a method and an apparatus for transmitting downlink control information in the field of communications.
Background
The fifth generation mobile communication system defines Downlink Control Information (DCI) of various formats for scheduling different data transmissions. DCI scheduling different data transmissions may be scrambled with different Radio Network Temporary Identifiers (RNTIs). For example, the RNTI may include a cell-RNTI (cell-RNTI, C-RNTI), an access identity (random access-RNTI, RA-RNTI), a paging identity (P-RNTI), and the like, where the C-RNTI may be used to scramble DCI that schedules user data, the RA-RNTI may be used to scramble a random access response message sent by a scheduling network device to a terminal device, and the P-RNTI may be used to scramble a paging message.
The DCI with different formats may have different lengths, and for DCI with multiple different lengths, in the process of transmitting DCI by the network side device and the terminal device, the terminal device needs to perform blind detection on DCI with different lengths sent by the network side device, which is higher in complexity.
Disclosure of Invention
The application provides a method and a device for transmitting downlink control information, which can reduce the complexity of blind detection of DCI by terminal side equipment.
In a first aspect, a method for transmitting downlink control information is provided, including: the method comprises the steps that terminal side equipment receives first configuration information from network side equipment, wherein the first configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI and sixth DCI; the terminal side device determines, according to the first configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, and a monitoring bit length of the sixth DCI; the first DCI has the same monitoring bit length as the second DCI through zero padding operation or puncturing operation, the monitoring bit length of the third DCI is the same as that of the fourth DCI, the monitoring bit length of the third DCI is different from that of the second DCI, the monitoring bit length of the fifth DCI is different from that of the sixth DCI, and the monitoring bit length of the fifth DCI and that of the sixth DCI are both different from that of the second DCI.
According to the method for transmitting the downlink control information, the zero padding operation or the truncation operation is performed on the DCI with different lengths, so that the DCI transmitted by the network side equipment and the terminal side equipment can meet the DCI length budget, the blind detection complexity of the terminal side equipment on the DCI can be reduced, and the transmission performance of the system is improved.
In this embodiment, the "original bit length" refers to an information bit length of DCI configured by a network device for a terminal device through configuration information. The "bit length to be transmitted" refers to a length obtained after the network side device performs a zero padding operation or a puncturing operation on the DCI according to the DCI length budget. The "listening bit length" refers to a length corresponding to a terminal side device listening (blind detection) to DCI, and may also be referred to as a blind detection bit length.
With reference to the first aspect, in some implementation manners of the first aspect, through configuration of the first configuration information, an original bit length of the third DCI is the same as an original bit length of the fourth DCI, an original bit length of the fifth DCI is different from an original bit length of the sixth DCI, and both the original bit length of the fifth DCI and the original bit length of the sixth DCI are different from the original bit length of the second DCI; the determining, by the terminal side device according to the first configuration information, the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the third DCI, the monitoring bit length of the fourth DCI, the monitoring bit length of the fifth DCI, and the monitoring bit length of the sixth DCI includes: the terminal side device determines the original bit length of the second DCI, the original bit length of the fifth DCI and the original bit length of the sixth DCI as the monitoring bit length of the second DCI, the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI respectively; if the original bit length of the third DCI is different from the monitoring bit length of the second DCI, the terminal-side device determines the original bit length of the third DCI and the original bit length of the fourth DCI as the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI; if the original bit length of the third DCI is the same as the monitoring bit length of the second DCI, the terminal-side device performs an operation of supplementing 1 zero bit on the original bit length of the third DCI and the original bit length of the fourth DCI, respectively, to obtain the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI.
According to the method and the device, the original bit number of the third DCI and the original bit number of the fourth DCI are naturally configured by the network side equipment to be different, so that different DCI lengths sent by the network side equipment can be guaranteed not to exceed the DCI length budget under a certain condition, and the terminal side equipment can perform DCI blind detection conveniently.
With reference to the first aspect, in certain implementations of the first aspect, the first DCI is DCI format0 \u0 in a common search space CSS; the second DCI is DCI format1 \u0 in the CSS; the third DCI is DCI format0 _1in a user-specific search space USS; the fourth DCI is DCI format1 \u1 in the USS; the fifth DCI is DCI format 2_0 in the CSS; the sixth DCI is DCI format 2 \u1 in the CSS.
In a second aspect, another method for transmitting downlink control information is provided, including: the method comprises the steps that terminal side equipment receives first configuration information from network side equipment, wherein the first configuration information is used for configuring first Downlink Control Information (DCI), second DCI, third DCI, fourth DCI, fifth DCI and sixth DCI; the terminal side device determines, according to the first configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, and a monitoring bit length of the sixth DCI; the first DCI has a same monitoring bit length as the second DCI through a zero padding operation or a puncturing operation, the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI are both different from the monitoring bit length of the second DCI, and at least one of the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI is the same as the monitoring bit length of the second DCI.
According to the method for transmitting the downlink control information, the zero padding operation or the truncation operation is performed on the DCI with different lengths, so that the DCI transmitted by the network side equipment and the terminal side equipment can meet the DCI length budget, the blind detection complexity of the terminal side equipment on the DCI can be reduced, and the transmission performance of the system is improved.
With reference to the second aspect, in some implementations of the second aspect, at least one of an original bit length of the fifth DCI and an original bit length of the sixth DCI is the same as an original bit length of the second DCI through configuration of the first configuration information; the determining, by the terminal side device according to the first configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, and a monitoring bit length of the sixth DCI includes: and the terminal side equipment determines the original bit length of the fifth DCI and the original bit length of the sixth DCI as the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI respectively.
According to the method and the device, the original bit number of the fifth DCI and the original bit number of the sixth DCI are naturally configured by the network side equipment to only occupy 1DCI size, so that different DCI lengths sent by the network side equipment can be guaranteed not to exceed the DCI length budget under certain conditions, and the terminal side equipment can perform DCI blind detection conveniently.
With reference to the second aspect, in certain implementations of the second aspect, the first DCI is DCI format0 \u0 in a common search space CSS; the second DCI is DCI format1 \u0 in the CSS; the third DCI is DCI format0 _1in a user-specific search space USS; the fourth DCI is DCI format1 _1in the USS; the fifth DCI is DCI format 2_0 in the CSS; the sixth DCI is DCI format 2 \u1 in the CSS.
In a third aspect, another method for transmitting downlink control information is provided, including: the terminal side equipment receives second configuration information from the network side equipment, wherein the second configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, sixth DCI, seventh DCI and eighth DCI; the terminal side device determines, according to the second configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, a monitoring bit length of the sixth DCI, a monitoring bit length of the seventh DCI, and a monitoring bit length of the eighth DCI; wherein, under the condition that any one of the following conditions is satisfied, through zero padding operation, the monitoring bit length of the fifth DCI is different from the monitoring bit length of the sixth DCI, and both the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI are different from the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, and the monitoring bit length of the eighth DCI: by the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is greater than or equal to 2; or through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is different from the monitoring bit length of the second DCI.
According to the method for transmitting the downlink control information, the zero padding operation or the truncation operation is performed on the DCI with different lengths, so that the DCI transmitted by the network side equipment and the terminal side equipment can meet the DCI length budget, the blind detection complexity of the terminal side equipment on the DCI can be reduced, and the transmission performance of the system is improved.
With reference to the third aspect, in certain implementation manners of the third aspect, the determining, by the terminal side device according to the second configuration information, a listening bit length of the first DCI, a listening bit length of the second DCI, a listening bit length of the third DCI, a listening bit length of the fourth DCI, a listening bit length of the fifth DCI, a listening bit length of the sixth DCI, a listening bit length of the seventh DCI, and a listening bit length of the eighth DCI includes: the terminal side equipment determines the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI; the terminal side device determines the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI according to the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI; and the terminal side equipment determines the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI according to the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the fifth DCI, the monitoring bit length of the sixth DCI, the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI.
In the embodiment of the present application, by defining the determination sequence of the monitoring bit lengths of the eight types of DCI, the network side device and the terminal side device keep consistent DCI alignment operations, and a situation that a sending bit length of DCI generated by the network side device is different from a monitoring bit length of DCI generated by the terminal side device does not occur, so that the accuracy of DCI blind detection by the terminal side device is improved, and the transmission performance of the system is improved.
With reference to the third aspect, in certain implementations of the third aspect, the first DCI is DCI format0 \u0 in a common search space CSS; the second DCI is DCI format1 \u0 in the CSS; the third DCI is DCI format0 _0in a user-specific search space (USS); the fourth DCI is DCI format1 _0in the USS; the fifth DCI is DCI format0_1 in the USS; the sixth DCI is DCI format1 _1in the USS; the seventh DCI is DCI format 2_0 in the CSS; the eighth DCI is DCI format 2 \u1 in the CSS.
In a fourth aspect, another method for transmitting downlink control information is provided, including: the terminal side equipment receives second configuration information from the network side equipment, wherein the second configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, sixth DCI, seventh DCI and eighth DCI; the terminal side device determines, according to the second configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, a monitoring bit length of the sixth DCI, a monitoring bit length of the seventh DCI, and a monitoring bit length of the eighth DCI; wherein, under the condition that any one of the following conditions is met, through zero padding operation, the monitoring bit length of the fifth DCI is the same as that of the sixth DCI, and is different from the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, and the monitoring bit length of the eighth DCI; or the monitoring bit length of the fifth DCI is different from the monitoring bit length of the sixth DCI, and the monitoring bit length of the fifth DCI or the monitoring bit length of the sixth DCI is the same as the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, or the monitoring bit length of the eighth DCI: through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is the same as the listening bit length of the second DCI; or through the configuration of the second configuration information, the original bit length of the fifth DCI is the same as the original bit length of the sixth DCI.
With reference to the fourth aspect, in some implementation manners of the fourth aspect, the determining, by the terminal side device according to the second configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, a monitoring bit length of the sixth DCI, a monitoring bit length of the seventh DCI, and a monitoring bit length of the eighth DCI includes: the terminal side equipment determines the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI; the terminal side device determines the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI according to the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI; and the terminal side equipment determines the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI according to the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the fifth DCI, the monitoring bit length of the sixth DCI, the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI.
With reference to the fourth aspect, in certain implementations of the fourth aspect, the first DCI is DCI format0 \u0 in a common search space CSS; the second DCI is DCI format1 \u0 in the CSS; the third DCI is DCI format0 _0in a user-specific search space (USS); the fourth DCI is DCI format1 \u0 in the USS; the fifth DCI is DCI format0 _1in the USS; the sixth DCI is DCI format1 _1in the USS; the seventh DCI is DCI format 2_0 in the CSS; the eighth DCI is DCI format 2_1 in the CSS.
In a fifth aspect, an apparatus for transmitting downlink control information is provided, configured to perform the method in any possible implementation manner in any aspect. In particular, the apparatus comprises means for performing the method of any of the possible implementations of any of the aspects described above.
In a sixth aspect, another apparatus for transmitting downlink control information is provided, the apparatus including: a transceiver, a memory, and a processor. Wherein the transceiver, the memory, and the processor communicate with each other through an internal connection path, the memory is configured to store instructions, the processor is configured to execute the instructions stored by the memory to control the receiver to receive signals and control the transmitter to transmit signals, and the processor is configured to execute the instructions stored by the memory to cause the processor to perform the method of any one of the possible implementations of any one of the aspects.
In a seventh aspect, a computer program product is provided, the computer program product comprising: computer program code which, when run by a computer, causes the computer to perform the method of the above aspects.
In an eighth aspect, there is provided a computer readable medium for storing a computer program comprising instructions for performing the method in the above aspects.
In a ninth aspect, there is provided a chip comprising a processor for calling up and executing instructions stored in a memory from the memory, so that a communication device in which the chip is installed performs the method in the above aspects.
In a tenth aspect, another chip is provided, including: the system comprises an input interface, an output interface, a processor and a memory, wherein the input interface, the output interface, the processor and the memory are connected through an internal connection path, the processor is used for executing codes in the memory, and when the codes are executed, the processor is used for executing the method in the aspects.
Drawings
Fig. 1 shows a schematic diagram of a communication system of an embodiment of the present application.
Fig. 2 shows a schematic flowchart of a method for transmitting downlink control information according to an embodiment of the present application.
Fig. 3 shows a schematic flowchart of another method for transmitting downlink control information according to an embodiment of the present application.
Fig. 4 shows a schematic block diagram of an apparatus for transmitting downlink control information according to an embodiment of the present application.
Fig. 5 is a schematic block diagram of another apparatus for transmitting downlink control information according to an embodiment of the present application.
Detailed Description
The technical solution in the present application will be described below with reference to the accompanying drawings.
It should be understood that the technical solution of the embodiment of the present application may be applied to various communication systems, such as a Long Term Evolution (LTE) system, an LTE Frequency Division Duplex (FDD) system, an LTE Time Division Duplex (TDD), a fifth generation (5 g) system (also called New Radio (NR)), and the like.
It should also be understood that the technical solution of the embodiment of the present application may also be applied to various communication systems based on non-orthogonal multiple access technologies, for example, sparse Code Multiple Access (SCMA) systems, and certainly the SCMA may also be referred to as other names in the communication field; further, the technical solution of the embodiment of the present application may be applied to a multi-carrier transmission system that adopts a non-orthogonal multiple access technology, for example, an Orthogonal Frequency Division Multiplexing (OFDM) system that adopts a non-orthogonal multiple access technology, a filter bank multi-carrier (FBMC), a General Frequency Division Multiplexing (GFDM) system, a filtered orthogonal frequency division multiplexing (F-OFDM) system, and the like.
It should also be understood that in this embodiment of the present application, a terminal device, which may be referred to as an access terminal, a User Equipment (UE), a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a user terminal, a wireless communication device, a user agent, or a user equipment, may communicate with one or more core networks via a Radio Access Network (RAN). An access terminal may be a cellular telephone, a cordless telephone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device with wireless communication capability, a computing device or other processing device connected to a wireless modem, a vehicle mounted device, a wearable device, a terminal device in a future 5G network or a terminal device in a future evolved Public Land Mobile Network (PLMN), etc.
It should also be understood that in the embodiment of the present application, the network device may be used to communicate with a terminal device, an evolved node B (eNB) or eNode B in an LTE system, or the network device may be a relay station, an access point, a vehicle-mounted device, a wearable device, a network side device in a future 5G network or a network device in a future evolved PLMN network, or the like.
The embodiment of the application can be applied to an LTE system, a subsequent evolution system such as 5G and the like, or other wireless communication systems adopting various wireless access technologies such as systems adopting access technologies of code division multiple access, frequency division multiple access, time division multiple access, orthogonal frequency division multiple access, single carrier frequency division multiple access and the like, and is particularly suitable for scenes needing channel information feedback and/or applying a two-stage precoding technology, such as a wireless network applying a Massive MIMO technology, a wireless network applying a distributed antenna technology and the like.
It should be understood that a multiple-input-multiple-output (MIMO) technique refers to using a plurality of transmitting antennas and receiving antennas at a transmitting end device and a receiving end device, respectively, so that signals are transmitted and received through the plurality of antennas of the transmitting end device and the receiving end device, thereby improving communication quality. The multi-antenna multi-transmission multi-receiving system can fully utilize space resources, realize multi-transmission and multi-reception through a plurality of antennas, and improve the system channel capacity by times under the condition of not increasing frequency spectrum resources and antenna transmitting power.
MIMO can be classified into single-user multiple-input multiple-output (SU-MIMO) and multi-user multiple-input multiple-output (MU-MIMO). Massive MIMO is based on the principle of multi-user beam forming, hundreds of antennas are arranged on transmitting end equipment, respective beams are modulated for dozens of target receivers, and dozens of signals are transmitted on the same frequency resource simultaneously through space signal isolation. Therefore, the Massive MIMO technology can fully utilize the spatial freedom degree brought by large-scale antenna configuration, and the frequency spectrum efficiency is improved.
Fig. 1 is a schematic diagram of a communication system used in an embodiment of the present application. As shown in fig. 1, the communication system 100 includes a network device 102, and the network device 102 may include multiple antenna groups. Each antenna group can include one or more antennas, e.g., one antenna group can include antennas 104 and 106, another antenna group can include antennas 108 and 110, and an additional group can include antennas 112 and 114. 2 antennas are shown in fig. 1 for each antenna group, however, more or fewer antennas may be utilized for each group. Network device 102 can additionally include a transmitter chain and a receiver chain, each of which can in turn comprise a plurality of components associated with signal transmission and reception such as processors, modulators, multiplexers, demodulators, demultiplexers, antennas, and so forth, as will be appreciated by one skilled in the art.
Network device 102 may communicate with multiple terminal devices, for example, network device 102 may communicate with terminal device 116 and terminal device 122. However, it is understood that network device 102 may communicate with any number of terminal devices similar to terminal devices 116 or 122. End devices 116 and 122 may be, for example, cellular phones, smart phones, laptops, handheld communication devices, handheld computing devices, satellite radios, global positioning systems, PDAs, and/or any other suitable device for communicating over wireless communication system 100.
As shown in fig. 1, terminal device 116 is in communication with antennas 112 and 114, where antennas 112 and 114 transmit information to terminal device 116 over a forward link 118 and receive information from terminal device 116 over a reverse link 120. In addition, terminal device 122 is in communication with antennas 104 and 106, where antennas 104 and 106 transmit information to terminal device 122 over forward link 124 and receive information from terminal device 122 over reverse link 126.
In a frequency division duplex, FDD, system, forward link 118 can utilize a different frequency band than that used by reverse link 120, and forward link 124 can employ a different frequency band than that employed by reverse link 126, for example.
As another example, in Time Division Duplex (TDD) systems and full duplex (full duplex) systems, forward link 118 and reverse link 120 can utilize a common frequency band and forward link 124 and reverse link 126 can utilize a common frequency band.
Each group of antennas and/or an area designated for communication is referred to as a sector of network device 102. For example, antenna groups may be designed to communicate to terminal devices in a sector of the areas covered by network device 102. During communication by network device 102 with terminal devices 116 and 122 over forward links 118 and 124, respectively, the transmitting antennas of network device 102 can utilize beamforming to improve signal-to-noise ratio of forward links 118 and 124. Moreover, mobile devices in neighboring cells can be subject to less interference when network device 102 utilizes beamforming to transmit to terminal devices 116 and 122 scattered randomly through an associated coverage than if the network device were transmitting through a single antenna to all its terminal devices.
At a given time, network device 102, terminal device 116, or terminal device 122 may be a wireless communication transmitting apparatus and/or a wireless communication receiving apparatus. When sending data, the wireless communication sending device may encode the data for transmission. Specifically, the wireless communication transmission apparatus may acquire a certain number of data bits to be transmitted to the wireless communication reception apparatus through the channel, for example, the wireless communication transmission apparatus may generate, receive from another communication apparatus, or save in a memory or the like a certain number of data bits to be transmitted to the wireless communication reception apparatus through the channel. Such data bits may be contained in a transport block or transport blocks of data, which may be segmented to produce multiple code blocks.
Furthermore, the communication system 100 may be a public land mobile network PLMN (public land mobile network) network or a device-to-device (D2D) network or a machine-to-machine (M2M) network or other networks, and fig. 1 is a simplified schematic diagram for easy understanding only, and other network devices may be included in the network, which is not shown in fig. 1.
For ease of understanding, the relevant terms referred to herein will be described first.
1. Bandwidth part (BWP)
The third generation partnership project (3 rd generation partnership project,3 gpp) standards organization is currently setting up a protocol standard for the 5th generation cellular mobile communication system (5g), also known as New Radio (NR). Compared with the Long Term Evolution (LTE) system, the NR system has a characteristic that a network side and a terminal side can be configured with different bandwidths. The terminal device may configure its maximum operating bandwidth according to its service requirement and manufacturing cost, for example, the operating bandwidth of a low-cost low-rate terminal device may be only 5MHz, while the operating bandwidth of a high-rate high-performance terminal device may reach 100MHz. If a carrier bandwidth of a cell is set according to the working bandwidth of a terminal device with low cost and background rate (for example, set to 5 MHz-10 MHz), a high-performance terminal device can obtain a higher rate by adopting a carrier aggregation (carrier aggregation), which inevitably increases control signaling overhead and processing complexity; if the carrier bandwidth of a cell is set according to the operating bandwidth of a high-rate high-performance terminal device (e.g., 100 MHz), a low-cost terminal device must be equipped with radio frequency and baseband devices suitable for a large bandwidth to be able to access the cell, which undoubtedly increases the cost. Therefore, NR introduces the concept of BWP.
A BWP is a segment of continuous frequency resource on a cell carrier, and the network can configure BWPs with different bandwidth sizes for different terminal devices. When a BWP is configured and activated, the BWP is called active BWP (active BWP), and data and control information sent upstream or data and control information received downstream by the terminal device will be limited to the active BWP. The current protocol supports data transmission on 1 active BWP only for 1 end device. The BWP to which the terminal device is allocated at initial access is referred to as initial BWP (initial BWP). The identification of the initial BWP is, for example, 0.
2. Blind inspection
The DCI scheduling different data transmissions may be scrambled with different Radio Network Temporary Identifiers (RNTIs), for example, the RNTIs may include a cell-RNTI (C-RNTI), an access identifier (random access-RNTI, RA-RNTI), a paging identifier (paging-RNTI, P-RNTI), and the like, where the C-RNTI may be used to scramble the DCI scheduling user data, the RA-RNTI may be used to scramble a random access response message sent by a scheduling network device to a terminal device, and the P-RNTI may be used to scramble the paging message.
Taking C-RNTI as an example, physical Downlink Control Channels (PDCCHs) of different users may be distinguished by their corresponding C-RNTIs, that is, cyclic Redundancy Check (CRC) of DCI is masked by C-RNTI. The user generally does not know the format of the currently transmitted DCI and does not know which alternative PDCCH the user needs, but knows what information the user currently expects, and for different expected information, the user adopts the corresponding RNTI and the information on the configured alternative PDCCH to perform CRC check, if the CRC check is successful, the user knows that the DCI information is needed by the user and also knows the corresponding DCI format, thereby further analyzing the content of the DCI.
In one possible implementation, the blind detection number calculation rule is as follows:
(1) When the DCI lengths on the alternative PDCCH are different, 1 blind test is calculated separately;
(2) Calculating 1 blind detection separately for DCI on an alternative PDCCH composed of different Control Channel Elements (CCEs);
(3) The candidate PDCCH is from DCI of control resource sets (CORESET) of different control resource sets, and 1 blind test is calculated separately; wherein, CORESET represents a time-frequency resource set for carrying control information.
(4) And (4) calculating 1 blind detection when the DCI lengths on the alternative PDCCHs composed of the same CCE set in the same CORESET are the same.
3. DCI format (DCI format)
For data transmission, NR currently supports 8 formats of DCI format0 _u0, DCI format0 _u1 DCI format1 _u0, DCI format1 _u1, DCI format 2 _u0, DCI format 2 _u1, DCI format 2 _u2, and DCI format 2 _u3, respectively. The DCI format0 _u0, DCI format0 _u1dci format1 _u0, and DCI format1 _u1 will be mainly described below.
According to the uplink and downlink, the DCI with the 4 formats may be divided into two types: the DCI for scheduling a Physical Uplink Shared Channel (PUSCH) and the DCI for scheduling a Physical Downlink Shared Channel (PDSCH), where DCI format0 \u0 and DCI format0 \u1 are DCIs for scheduling a PUSCH, and DCI format1 \u0 and DCI format1 \u1 are DCIs for scheduling a PDSCH.
According to specific functions, the DCI with the 4 formats may be divided into two categories: a fallback DCI (fallback DCI) and a non-fallback DCI (non-fallback DCI), wherein DCI format0 \u0 and DCI format1 \u0 are fallback DCIs, and DCI format0 \u1 and DCI format1 \u1 are non-fallback DCIs. It should be understood that different formats of DCI contain different field contents and corresponding DCI bit widths.
During Radio Resource Control (RRC) reconfiguration, there may be a period of time during which the network device and the terminal device understand inconsistency with respect to the effective time of the new configuration, and during the period of time, the network device may send fallback DCI to the terminal device for data scheduling, so as to avoid inconsistency between the network device and the terminal device with respect to RRC configuration understanding. In other words, if the network device does not configure the transmission mode for the terminal device through the higher layer signaling, it is mainly the time period after the initial access until the RRC configuration is completed and valid. Since the terminal device cannot receive any configuration information indicated by the RRC signaling in this period of time, the protocol needs to predefine a transmission mechanism, that is, single port transmission based on fallback DCI scheduling, mainly because the transmission mechanism does not depend on the RRC signaling, and the parameters required for transmission are indicated by the DCI signaling to complete data transmission.
It should be understood that the aforementioned fallback DCI and non-fallback DCI are only names used for distinguishing two types of DCI with different functions, and may also be described by using other names, which are not limited in this embodiment of the present application.
In a possible implementation manner, the formats of the 4 DCI formats may be respectively shown in the following table:
table one DCI format0 \u0
Figure BDA0001852774870000091
In the DCI format0 \u0, the lengths of the remaining fields are fixed except for the FDRA field, and it is not necessary to configure the fields by RRC signaling, and thus the information bit size of the DCI format0 _u0 is related only to the FDRA field, and the FDRA field of the DCI format0 _u0 is related only to the FDRA field
Figure BDA0001852774870000093
Is related to the value of (A).
Table two DCI format 01
Figure BDA0001852774870000092
Figure BDA0001852774870000101
In the DCI format0 \u1, the lengths of many fields other than the FDRA field are not fixed, and thus, the fields need to be configured through RRC signaling, for example, a carrier indication bit, a bandwidth part indication, a time domain resource allocation bit, and the like. Therefore, the information bit size of DCI format0 \/1 is not only the same as that of DCI format0 \/1
Figure BDA0001852774870000102
Is flexibly variable.
Table III DCI format1 \u0
Figure BDA0001852774870000111
The DCI format1 \u0 is a DCI format in a case where scrambling is performed using C-RNTI and FDRA fields are not all 1. In the DCI format1 _u0, the lengths of the remaining fields are fixed except for the FDRA field, and it is not necessary to configure the fields by RRC signaling, and therefore, the information bit size of the DCI format0 _u1 is related only to the FDRA field, and the FDRA field of the DCI format0 _u1 is related only to the FDRA field
Figure BDA0001852774870000113
Is related to the value of (a).
TABLE FOUR DCI Format 11
Figure BDA0001852774870000112
Figure BDA0001852774870000121
In the DCI format1 \u1, the lengths of many fields other than the FDRA field are not fixed, and thus, the fields need to be configured through RRC signaling, for example, a carrier indication bit, a bandwidth part indication, a time domain resource allocation bit, and the like. Therefore, the information bit size of DCI format _1 is not only the same as that of DCI format _1
Figure BDA0001852774870000122
Is flexibly variable.
In summary, in the fallback DCI, except for the FDRA field, the bit length and the content of each field are not affected by the RRC configuration, and are determined. Thus, the length of only the FDRA domain affecting the fallback DCI bit length, specifically, the parameter affecting the length of DCI format0 \u0 is
Figure BDA0001852774870000123
The parameter affecting the length of DCI format1 \0 is
Figure BDA0001852774870000124
While
Figure BDA0001852774870000125
CORESET 0 may be used, initial UL BWP (initial UL BWP) may be used, and active UL BWP (active UL BWP) may be used. In the same way as above, the first and second,
Figure BDA0001852774870000126
CORESET 0 may be used, or an initial downstream BWP may be used, or an active downstream BWP may be used. CORESET 0 represents a time-frequency resource set 0 for carrying control information. Depending on the scene to which the DCI corresponds, e.g. Common Search Space (CSS) or user-specific search space (USS), this will result in DCI format0 \u0 and DCI format1 \u0 having two lengths, respectively.
4. DCI Length budget (DCI size budget)
The DCI length budget needs to satisfy the following two criteria at the same time, namely:
(1) Different DCI lengths (DCI sizes) in 1 time slot in 1 cell are not more than 4;
(2) The length of the different DCI scrambled by the C-RNTI monitored in 1 time slot in 1 cell is not more than 3.
Different DCI lengths are understood to mean that the DCI length of the natural configuration is different from other DCI lengths, or the DCI length determined by performing the zero padding operation and the truncation operation on the DCI length of the natural configuration is still different from other DCI lengths.
In this context, "natural configuration" is understood to mean that the network side device issues a higher layer signaling to the terminal side device, so as to explicitly or implicitly indicate the bit length size occupied by the field in the DCI format. The terminal side device may determine a bit length (i.e., an original bit length herein) of the DCI format according to the indication of the higher layer signaling, where the bit length is determined and obtained only according to configuration information carried by the higher layer signaling, and does not include a processed bit length obtained through other operations (e.g., performing a zero padding operation or a puncturing operation on the obtained original bit length).
Table five and table six show different scenes
Figure BDA0001852774870000138
And
Figure BDA0001852774870000139
the value of (a).
TABLE V DCI format0 \0
Figure BDA0001852774870000131
TABLE six DCI format1 \u0
Figure BDA0001852774870000132
Specifically, for DCI format 0_0, in CSS, in FDRA domain
Figure BDA0001852774870000133
Adopting initial UL BWP calculation, in USS, if DCI length budget is satisfied, FDRA domain
Figure BDA0001852774870000134
Adopting active UL BWP calculation, if not satisfying DCI length budget, if the current service cell is configured with CORESET 0, then FDRA domain
Figure BDA0001852774870000135
Using CORESET 0 calculations, if CORESET 0 is not configured for the current serving cell, then the FDRA domain
Figure BDA0001852774870000136
Initial UL BWP calculation is used. For DCI format0 \u1, in CSS, in FDRA domain
Figure BDA0001852774870000137
Adopting initial DL BWP calculation, in USS, if DCI length budget is satisfied, in FDRA domain
Figure BDA0001852774870000141
Active DL BWP calculation is adopted, if the DCI length budget is not met, in FDRA domain
Figure BDA0001852774870000142
Initial DL BWP computation is used.
The network device may also send DCI of other formats to the terminal device within 1 slot, for example, DCI format0 _1of C-RNTI scrambled CRC, DCI format1 _1of C-RNTI scrambled CRC, DCI format 2 _0of SFI-RNTI scrambled CRC, DCI format 2 _1of INT-RNTI scrambled CRC, and the like. In order to avoid the high blind detection complexity of the terminal device in 1 timeslot, the network device and the terminal device need to align the lengths of DCI format0 \u0 and DCI format1 \u0 in the CSS and the USS according to the DCI length budget.
In a possible implementation manner, in 1 timeslot, the network device is to send 2 DCIs with different lengths to the terminal device, which are DCI format0 \u1 of C-RNTI scrambled CRC and DCI format1 \u1 of C-RNTI scrambled CRC, respectively. At this time, since the DCI of other formats occupies a part of the DCI length budget, the length budget for transmitting DCI of different lengths scrambled by C-RNTI remains 2, and the length budget for transmitting DCI of different lengths remains 1, because two conditions are satisfied simultaneously, the DCI length budget remains 1. If DCI format0 _0and DCI format1 _0are to be transmitted in CSS and USS, it is necessary to align the two different length DCIs into one length DCI by an alignment rule.
Because there are a plurality of DCI with different lengths, in the process of transmitting DCI by a network device and a terminal device, it may be necessary to perform an alignment operation on DCI with different lengths, so as to reduce the number of DCI lengths, thereby reducing the complexity of blind detection on DCI by the terminal device. In view of this, the present application provides a new method for transmitting downlink control information, which can reduce the complexity of blind detection on DCI by a terminal device.
Fig. 2 shows a schematic flowchart of a method 200 for transmitting downlink control information according to an embodiment of the present application. The method 200 may be applied to the communication system 100 shown in fig. 1, but the embodiment of the present application is not limited thereto.
S210, the network side equipment sends first configuration information to the terminal side equipment, wherein the first configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI and sixth DCI; correspondingly, the terminal side device receives the first configuration information.
S220, the network side device determines, through a zero padding operation or a truncation operation, a bit length to be transmitted of the first DCI, a bit length to be transmitted of the second DCI, a bit length to be transmitted of the third DCI, a bit length to be transmitted of the fourth DCI, a bit length to be transmitted of the fifth DCI, and a bit length to be transmitted of the sixth DCI.
S230, the terminal side device determines, according to the first configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, and a monitoring bit length of the sixth DCI.
Specifically, the network-side device may configure, based on the first configuration information, six types of DCI for the terminal-side device, where the six types of DCI each have a respective original bit length, and thus, the terminal-side device may determine, according to the first configuration information, that the network-side device configures six types of DCI for the terminal-side device, and determine the original bit lengths of the six types of DCI. Considering that the DCI length budget (DCI size budget), that is, different DCI lengths (DCI sizes) do not exceed 4, and different DCI lengths scrambled by the C-RNTI do not exceed 3, the network side device may determine the bit length of the six types of DCI to be transmitted according to the original bit length of the six types of DCI, so that the six types of DCI meet the DCI length budget when being transmitted. Correspondingly, the terminal side device may also determine the monitoring bit length of the six types of DCI according to the original bit length of the six types of DCI, so as to monitor the DCI according to the monitoring bit length and obtain the DCI sent by the network side device.
According to the method for transmitting the downlink control information, the zero padding operation or the truncation operation is performed on the DCI with different lengths, so that the DCI transmitted by the network side equipment and the terminal side equipment can meet the DCI length budget, the blind detection complexity of the terminal side equipment on the DCI can be reduced, and the transmission performance of the system is improved.
In this embodiment, the "original bit length" refers to an information bit length of DCI configured by a network side device for a terminal side device through configuration information. The "bit length to be transmitted" refers to a length obtained after the network side device performs a zero padding operation or a puncturing operation on the DCI according to the DCI length budget. The "listening bit length" refers to a length corresponding to a terminal side device listening (blind detection) to DCI, and may also be referred to as a blind detection bit length. It should be understood that the above names are used herein for convenience of description only, and the names of the lengths before and after the DCI is operated are not limited in the present application.
It should be understood that the monitored bit length is equal to the bit length to be sent, and since the terminal side device needs to perform blind detection on the DCI sent by the network side device, the same zero padding operation or truncation operation is adopted, so that the terminal side device and the network side device understand consistently, and thus it can be ensured that the terminal side device correctly receives the DCI sent by the network side device. The bit length to be transmitted may be the same as or different from the original bit length, depending on whether the network side device performs zero padding or puncturing on the DCI.
As an optional embodiment, the first configuration information is further configured to configure a search space of the first DCI, a search space of the second DCI, a search space of the third DCI, a search space of the fourth DCI, a search space of the fifth DCI, and a search space of the sixth DCI.
It should be understood that all or part of the six types of DCI may correspond to the same search space or different search spaces, which is not limited in this embodiment of the present application. For example, the first DCI and the second DCI correspond to one search space, the third DCI and the fourth DCI correspond to another different search space, and the fifth DCI and the sixth DCI correspond to another different search space. For another example, the first DCI, the second DCI, the third DCI, the fourth DCI, the fifth DCI, and the sixth DCI have respective search spaces and are different from each other.
As an optional embodiment, the network side device may send, to the terminal side device, at least one of the following information according to the determined bit length to be sent: the first DCI, the second DCI, the third DCI, the fourth DCI, the fifth DCI, and the sixth DCI. Correspondingly, the terminal-side device may perform blind detection on the DCI according to the determined monitoring bit length, that is, monitor at least one of the DCIs in the corresponding search space according to the determined four monitoring bit lengths.
As an optional embodiment, before the network side device sends the DCI, the network side device may further perform coding and rate matching on the DCI according to the bit length to be sent of the DCI, to obtain the actual transmission bit length of the DCI. The terminal side device may obtain the DCI according to the monitored bit length of the DCI on the corresponding resource.
Since the monitoring bit length of the DCI by the terminal side device is the bit length of the DCI to be transmitted by the network side device, for convenience of description, the determination of the monitoring bit length of the DCI by the terminal side device is taken as an example for explanation. It should be understood that the network side device operates on the DCI by the same method to obtain the bit length of the DCI to be transmitted.
In the above six types of DCI, the original bit length of the second DCI is the monitoring bit length of the second DCI. If the original bit length of the first DCI is the same as the monitoring bit length of the second DCI, the original bit length of the first DCI is the monitoring bit length of the first DCI, and the terminal side device may not perform any puncturing or zero padding operation on the original bit length of the first DCI. If the original bit length of the first DCI is different from the monitoring bit length of the second DCI, the terminal side device may perform zero padding operation or puncturing operation on the original bit length of the first DCI according to the monitoring bit length of the second DCI, so that the monitoring bit length of the first DCI is the same as the monitoring bit length of the second DCI. In addition, the original bit length of the fifth DCI is the monitoring bit length of the fifth DCI, and the original bit length of the sixth DCI is the monitoring bit length of the sixth DCI.
In this embodiment, the length of the monitoring bit after the zero padding operation or the puncturing operation is performed on the third DCI and the fourth DCI may be as follows:
in case one, the first DCI has the same monitoring bit length as the second DCI through a zero padding operation or a puncturing operation, the monitoring bit length of the third DCI is the same as the monitoring bit length of the fourth DCI, the monitoring bit length of the third DCI is different from the monitoring bit length of the second DCI, the monitoring bit length of the fifth DCI is different from the monitoring bit length of the sixth DCI, and the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI are both different from the monitoring bit length of the second DCI.
In case one, the first DCI and the second DCI occupy 1DCI size, the fifth DCI and the sixth DCI occupy 2 DCI sizes, and the third DCI and the fourth DCI occupy 1DCI size, which satisfies the above DCI length budget, that is, the different DCI sizes are not more than 4.
As an optional embodiment, by configuring the first configuration information, an original bit length of the third DCI is the same as an original bit length of the fourth DCI, an original bit length of the fifth DCI is different from an original bit length of the sixth DCI, and both the original bit length of the fifth DCI and the original bit length of the sixth DCI are different from an original bit length of the second DCI;
the terminal side device may determine, as a monitored bit length of the second DCI, a monitored bit length of the fifth DCI, and a monitored bit length of the sixth DCI, an original bit length of the second DCI, an original bit length of the fifth DCI, and an original bit length of the sixth DCI, respectively;
if the original bit length of the third DCI is different from the monitoring bit length of the second DCI, the terminal-side device determines the original bit length of the third DCI and the original bit length of the fourth DCI as the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI;
if the original bit length of the third DCI is the same as the monitoring bit length of the second DCI, the terminal-side device performs an operation of supplementing 1 zero bit on the original bit length of the third DCI and the original bit length of the fourth DCI, respectively, to obtain the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI.
Specifically, by aligning the first DCI to the second DCI, the first DCI and the second DCI occupy 1DCI size. The original bit length of the fifth DCI is different from the original bit length of the sixth DCI, and the original bit lengths of the fifth DCI and the sixth DCI are different from the original bit length of the second DCI, which results in that the fifth DCI and the sixth DCI occupy 2 DCI sizes in the case of natural configuration. Because only 1DCI size remains in the DCI length budget, it needs to be guaranteed that the natural configuration of the third DCI and the fourth DCI occupies 1DCI size. That is, the original bit length of the third DCI configured by the first configuration information is equal to the original bit length of the fourth DCI.
According to the method and the device, the original bit number of the third DCI and the original bit number of the fourth DCI are naturally configured by the network side equipment to be different, so that different DCI lengths sent by the network side equipment can be guaranteed not to exceed the DCI length budget under a certain condition, and the terminal side equipment can perform DCI blind detection conveniently.
In case two, the first DCI has the same monitoring bit length as the second DCI through a zero padding operation or a puncturing operation, the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI are both different from the monitoring bit length of the second DCI, and at least one of the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI is the same as the monitoring bit length of the second DCI.
In case two, the first DCI and the second DCI occupy 1DCI size, the fifth DCI and the sixth DCI occupy 1DCI size, and the third DCI and the fourth DCI occupy 0 DCI size, 1DCI size, or 2 DCI sizes, which satisfy the above DCI length budget, that is, different DCI sizes are not more than 4.
As an optional embodiment, by configuration of the first configuration information, at least one of an original bit length of the fifth DCI and an original bit length of the sixth DCI is the same as an original bit length of the second DCI;
the network side device may determine, as a bit length to be transmitted of the fifth DCI and a bit length to be transmitted of the sixth DCI, an original bit length of the fifth DCI and an original bit length of the sixth DCI, respectively;
correspondingly, the terminal-side device may determine the original bit length of the fifth DCI and the original bit length of the sixth DCI as the listening bit length of the fifth DCI and the listening bit length of the sixth DCI, respectively.
Specifically, by aligning the first DCI to the second DCI, the first DCI and the second DCI occupy 1DCI size. At least one of the original bit length of the fifth DCI and the original bit length of the sixth DCI is the same as the original bit length of the second DCI, which results in the fifth DCI and the sixth DCI occupying 1DCI size in case of natural configuration. Because the DCI length budget still has 2 DCI sizes remaining, the network side device may not perform any additional operation on the third DCI and the fourth DCI, and the third DCI and the fourth DCI may occupy 0 DCI sizes, or occupy 1DCI size, or occupy 2 DCI sizes, which is not limited in this embodiment of the present application.
According to the method and the device, the original bit number of the fifth DCI and the original bit number of the sixth DCI are naturally configured by the network side equipment to only occupy 1DCI size, so that different DCI lengths sent by the network side equipment can be guaranteed not to exceed the DCI length budget under certain conditions, and the terminal side equipment can perform DCI blind detection conveniently.
As an alternative embodiment, the first DCI is DCI format0 \u0 in the common search space CSS; the second DCI is DCI format1 \u0 in the CSS; the third DCI is DCI format0 _1in a user-specific search space USS; the fourth DCI is DCI format1 _1in the USS; the fifth DCI is DCI format 2_0 in the CSS; the sixth DCI is DCI format 2 \u1 in the CSS.
Specifically, the search space corresponding to the first DCI and the second DCI may be a CSS, the search space corresponding to the third DCI and the fourth DCI may be a USS, and the search space corresponding to the fifth DCI and the sixth DCI may be a CSS. Optionally, the search space corresponding to the first DCI and the second DCI may be a first CSS, the search space corresponding to the fifth DCI and the sixth DCI may be a second CSS, and the first CSS and the second CSS are different. In a possible implementation manner, the first CSS and the second CSS have different identifications, but this is not limited by the embodiment of the present application.
Fig. 3 shows a schematic flow chart of a method 300 for transmitting downlink control information according to an embodiment of the present application. The method 300 may be applied to the communication system 100 shown in fig. 1, but the embodiment of the present application is not limited thereto.
S310, a network side device sends second configuration information to a terminal side device, where the second configuration information is used to configure first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, sixth DCI, seventh DCI, and eighth DCI; correspondingly, the terminal side device receives the second configuration information.
S320, the network side device determines, through zero padding or truncation operation, a bit length to be transmitted of the first DCI, a bit length to be transmitted of the second DCI, a bit length to be transmitted of the third DCI, a bit length to be transmitted of the fourth DCI, a bit length to be transmitted of the fifth DCI, a bit length to be transmitted of the sixth DCI, a bit length to be transmitted of the seventh DCI, and a bit length to be transmitted of the eighth DCI.
S330, the terminal side device determines, according to the second configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, a monitoring bit length of the sixth DCI, a monitoring bit length of the seventh DCI, and a monitoring bit length of the eighth DCI.
Specifically, the network-side device may configure, based on the second configuration information, eight types of DCI for the terminal-side device, where the eight types of DCI respectively have respective original bit lengths, so that the terminal-side device may determine, according to the second configuration information, that the network side configures the eight types of DCI for the terminal-side device, and determine the original bit lengths of the eight types of DCI. Considering that the DCI length budget (DCI size budget), that is, different DCI lengths (DCI sizes) do not exceed 4, and different DCI lengths scrambled by the C-RNTI do not exceed 3, the network side device may determine the bit length of the eight types of DCI to be transmitted according to the original bit length of the eight types of DCI, so that the eight types of DCI meet the DCI length budget when being transmitted. Correspondingly, the terminal side device may also determine the monitoring bit length of the eight types of DCI according to the original bit length of the eight types of DCI, so as to monitor the DCI according to the monitoring bit length and obtain the DCI sent by the network side device.
According to the method for transmitting the downlink control information, the zero padding operation or the truncation operation is performed on the DCI with different lengths, so that the DCI transmitted by the network side equipment and the terminal side equipment can meet the DCI length budget, the blind detection complexity of the terminal side equipment on the DCI can be reduced, and the transmission performance of the system is improved.
In this embodiment, the "original bit length" refers to an information bit length of DCI configured by a network device for a terminal device through configuration information. The "bit length to be transmitted" refers to a length obtained after the network side device performs a zero padding operation or a puncturing operation on the DCI according to the DCI length budget. The "listening bit length" refers to a length corresponding to a terminal side device listening (blind detection) to DCI, and may also be referred to as a blind detection bit length. It should be understood that the above names are used herein for convenience of description only, and the names of the lengths before and after the DCI is operated are not limited in the present application.
It should be understood that the monitored bit length is equal to the bit length to be sent, and since the terminal side device needs to perform blind detection on the DCI sent by the network side device, the same zero padding operation or truncation operation is adopted, so that the terminal side device and the network side device understand consistently, and thus it can be ensured that the terminal side device correctly receives the DCI sent by the network side device. The bit length to be transmitted may be the same as or different from the original bit length, depending on whether the network side device performs zero padding or puncturing on the DCI.
As an alternative embodiment, the first configuration information is further configured to configure a search space of the first DCI, a search space of the second DCI, a search space of the third DCI, a search space of the fourth DCI, a search space of the fifth DCI, a search space of the sixth DCI, a search space of the seventh DCI, and a search space of the eighth DCI.
It should be understood that all or part of the eight DCI types may correspond to the same search space or may correspond to different search spaces, which is not limited in the embodiment of the present invention. For example, the first DCI and the second DCI correspond to one search space, the third DCI and the fourth DCI correspond to another different search space, the fifth DCI and the sixth DCI correspond to another different search space, and the seventh DCI and the eighth DCI correspond to another different search space. For another example, the first DCI, the second DCI, the third DCI, the fourth DCI, the fifth DCI, the sixth DCI, the seventh DCI, and the eighth DCI have respective search spaces and are different from each other.
As an optional embodiment, the network side device may send, to the terminal side device, at least one of the following information according to the determined bit length to be sent: the first DCI, the second DCI, the third DCI, the fourth DCI, the fifth DCI, the sixth DCI, the seventh DCI, and the eighth DCI. Correspondingly, the terminal side device may perform blind detection on the DCI according to the determined monitoring bit length, that is, monitor at least one of the DCIs in the corresponding search space according to the determined four monitoring bit lengths.
As an optional embodiment, before the network side device sends the DCI, the network side device may further perform coding and rate matching on the DCI according to the bit length to be sent of the DCI, so as to obtain the actual sending bit length of the DCI. The terminal side device may obtain the DCI according to the monitored bit length of the DCI on the corresponding resource.
Since the monitoring bit length of the DCI by the terminal side device is the bit length of the DCI to be transmitted by the network side device, for convenience of description, the determination of the monitoring bit length of the DCI by the terminal side device is taken as an example for explanation. It should be understood that the network side device operates on the DCI by the same method to obtain the bit length of the DCI to be transmitted.
In the eight types of DCI, the original bit length of the second DCI is the monitoring bit length of the second DCI. If the original bit length of the first DCI is the same as the monitoring bit length of the second DCI, the original bit length of the first DCI is the monitoring bit length of the first DCI, and the terminal side device may not perform any puncturing or zero padding operation on the original bit length of the first DCI. If the original bit length of the first DCI is different from the monitoring bit length of the second DCI, the terminal side device may perform zero padding operation or puncturing operation on the original bit length of the first DCI according to the monitoring bit length of the second DCI, so that the monitoring bit length of the first DCI is the same as the monitoring bit length of the second DCI. In addition, the original bit length of the seventh DCI is the monitoring bit length of the seventh DCI, and the original bit length of the eighth DCI is the monitoring bit length of the eighth DCI.
In this embodiment of the application, the length of the monitoring bit after the zero padding operation or the puncturing operation is performed on the third DCI, the fourth DCI, the fifth DCI, and the sixth DCI may be divided into the following two cases:
in case one, under the condition that any one of the following conditions is satisfied, through zero padding operation, the monitoring bit length of the fifth DCI is different from the monitoring bit length of the sixth DCI, and both the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI are different from the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, and the monitoring bit length of the eighth DCI:
by the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is greater than or equal to 2; or
Through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is different from the listening bit length of the second DCI.
In case two, when any one of the following conditions is met, through zero padding operation, the monitoring bit length of the fifth DCI is the same as the monitoring bit length of the sixth DCI, and is different from the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, and the monitoring bit length of the eighth DCI; or the monitoring bit length of the fifth DCI is different from the monitoring bit length of the sixth DCI, and the monitoring bit length of the fifth DCI or the monitoring bit length of the sixth DCI is the same as the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, or the monitoring bit length of the eighth DCI:
through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is the same as the listening bit length of the second DCI; or
By the configuration of the second configuration information, the original bit length of the fifth DCI is the same as the original bit length of the sixth DCI.
As an optional embodiment, the determining, by the terminal side device according to the second configuration information, a monitored bit length of the first DCI, a monitored bit length of the second DCI, a monitored bit length of the third DCI, a monitored bit length of the fourth DCI, a monitored bit length of the fifth DCI, a monitored bit length of the sixth DCI, a monitored bit length of the seventh DCI, and a monitored bit length of the eighth DCI by the terminal side device includes:
the terminal side equipment determines the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI;
the terminal side device determines the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI according to the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI;
and the terminal side equipment determines the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI according to the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the fifth DCI, the monitoring bit length of the sixth DCI, the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI.
In the embodiment of the present application, by defining the determination sequence of the monitoring bit lengths of the above eight types of DCI, the network side device and the terminal side device keep consistent with each other in the pulling and aligning operations on the DCI, and a situation that the sending bit length of the DCI generated by the network side device is different from the monitoring bit length of the DCI generated by the terminal side device does not occur, which is beneficial to improving the accuracy of the terminal side device in blind detection on the DCI, and thus improves the transmission performance of the system.
Specifically, the terminal side device may determine the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, and the monitoring bit length of the eighth DCI. At this time, the first DCI and the second DCI may occupy 1DCI size, the seventh DCI and the eighth DCI may occupy 0 DCI size (both the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI are the same as the monitoring bit length of the second DCI), or 1DCI size (the monitoring bit length of the seventh DCI is the same as the monitoring bit length of the eighth DCI, and the monitoring bit length of the seventh DCI is different from the monitoring bit length of the second DCI), or the monitoring bit length of the seventh DCI is different from the monitoring bit length of the eighth DCI, and the monitoring bit length of the seventh DCI or the monitoring bit length of the eighth DCI is the same as the monitoring bit length of the second DCI), or 2 DCI sizes (the monitoring bit length of the seventh DCI, the monitoring bit length of the eighth DCI, and the monitoring bit length of the second DCI are different in pairs). At this time, the DCI length budget may also leave 1DCI size, or 2 DCI sizes, or 3 DCI sizes.
And the terminal side equipment determines the lengths of the fifth DCI and the sixth DCI again.
(1) If 2 DCI sizes or 3 DCI sizes remain in the DCI length budget, and the original bit length of the fifth DCI and the original bit length of the sixth DCI satisfy the condition in case one, a zero padding operation is required to make the monitoring bit length of the fifth DCI different from the monitoring bit length of the sixth DCI, and the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI are all different from the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, and the monitoring bit length of the eighth DCI. In this case, the fifth DCI and the sixth DCI occupy 2 DCI sizes. At this time, the DCI length budget may also have 0 DCI size remaining, or 1DCI size.
(2) If 1DCI size, or 2 DCI sizes, or 3 DCI sizes remain in the DCI length budget and the original bit length of the fifth DCI and the original bit length of the sixth DCI meet the condition in the second case, the monitoring bit length of the fifth DCI is the same as that of the sixth DCI and is different from that of the second DCI, that of the seventh DCI and that of the eighth DCI through zero padding; or the monitoring bit length of the fifth DCI is different from the monitoring bit length of the sixth DCI, but the monitoring bit length of the fifth DCI or the monitoring bit length of the sixth DCI is the same as the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, or the monitoring bit length of the eighth DCI. In this case, the fifth DCI and the sixth DCI only need to occupy 1DCI size. At this time, the DCI length budget may also have 0 DCI size, or 1DCI size, or 2 DCI sizes remaining. If the terminal side equipment.
And the terminal side equipment determines the lengths of the third DCI and the fourth DCI again.
(1) If 0 DCI size remains in the DCI length budget, the terminal side device may generate a third DCI according to the initial uplink bandwidth part and perform zero padding operation or puncturing operation, so that the third DCI has the same monitoring bit length as the second DCI, and generate a fourth DCI according to the initial downlink bandwidth part, so that the fourth DCI has the same monitoring bit length as the second DCI.
(2) If 1DCI size or 2 DCI sizes remain in the DCI length budget, the terminal side device may generate both the third DCI and the fourth DCI according to the activated uplink bandwidth part, and perform zero padding on a shorter one of the third DCI and the fourth DCI, so that the monitoring bit length of the third DCI is the same as the monitoring bit length of the fourth DCI.
It should be understood that, in (2), if the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI are the same as the monitoring bit length of the second DCI, an operation of complementing 1 bit of 0bit needs to be performed on the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI, so that the third DCI and the fourth DCI occupy 1DCI size.
As an alternative embodiment, the first DCI is DCI format0 \u0 in the common search space CSS; the second DCI is DCI format1 \u0 in the CSS; the third DCI is DCI format0 _0in a user-specific search space, USS; the fourth DCI is DCI format1 \u0 in the USS; the fifth DCI is DCI format0_1 in the USS; the sixth DCI is DCI format1 _1in the USS; the seventh DCI is DCI format 2_0 in the CSS; the eighth DCI is DCI format 2_1 in the CSS.
Specifically, the search space corresponding to the first DCI and the second DCI may be a CSS, the search space corresponding to the third DCI and the fourth DCI may be a USS, the search space corresponding to the fifth DCI and the sixth DCI may be a USS, and the search space corresponding to the seventh DCI and the eighth DCI may be a USS. Optionally, the search space corresponding to the first DCI and the second DCI may be a first CSS, the search space corresponding to the seventh DCI and the eighth DCI may be a second CSS, and the first CSS and the second CSS are different. Optionally, the search space corresponding to the third DCI and the fourth DCI may be a first USS, the search space corresponding to the fifth DCI and the sixth DCI may be a second USS, and the first USS and the second USS are different. In a possible implementation manner, the first CSS and the second CSS have different identifications, and/or the first USS and the second USS have different identifications, which is not limited in this embodiment.
The following describes a method for transmitting downlink control information according to the present application in detail by using a specific embodiment.
The network side equipment sends configuration information of the downlink control information to the terminal side equipment, wherein the configuration information comprises a search space, a resource control set and the like. After receiving the configuration information, the terminal side device may determine which specific RNTI scrambled DCI formats and DCI lengths are monitored in which time slots according to the configuration information.
Optionally, the terminal side device may further determine the aggregation level of the DCI according to the configuration information. The aggregation level may be understood as an actual transmission bit length of 1DCI to be transmitted by the bearer network side device after encoding and rate matching. That is, after determining the bit length of the DCI to be transmitted, the network side device needs to perform coding and rate matching on the DCI based on the bit length of the DCI to be transmitted, so as to obtain the actual transmission bit length.
In a given transmission time unit (for example, a time slot in NR), the terminal side device determines the number of the remaining DCI length budgets according to the specific DCI format and DCI length scrambled by all the specific RNTIs to be monitored by the DCI length budget rule, and then determines the DCI blind detection mode.
Assuming that the network side device configures the terminal side device to monitor the corresponding DCI in at least one of the following CSS and USS, the DCI length configured by the network side device is the original bit length before the DCI has not undergone any flushing operation. It should be noted here that the original bit lengths of the DCI format0 _0and the DCI format1 _0in the USS a described below are lengths calculated from active UL BWP and active DL BWP, respectively.
In CSS A, DCI format0 \u0, DCI format1 _u0,
the USS A has DCI format0 \u0, DCI format1 _u0,
the USS B is configured with DCI format0_1, DCI format 1_1,
in CSS B, DCI format 2 \u0 and DCI format 2 \u1 are arranged.
According to the original bit length of the DCI, the network side device and the terminal side device perform zero padding operation or puncturing operation on the DCI to be transmitted to obtain the monitored bit length of each DCI.
It should be understood that, in the following embodiments, the length of the DCI configured by the network side device through the configuration information is the original bit length of the DCI. If the terminal side device (or the network side device) does not perform any operation on the original bit length of the DCI, the original bit length of the DCI is the monitoring bit length (or the bit length to be transmitted) of the DCI. If the terminal side device (or the network side device) performs the zero padding operation or the puncturing operation on the original bit length of the DCI, the monitoring bit length (or the bit length to be transmitted) of the DCI is the length after the zero padding operation or the puncturing operation is performed. In other words, the listening bit length (or bit length to be transmitted) of the DCI is determined by whether a zero padding operation or a puncturing operation is performed on the DCI.
Example one
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 \u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
It should be understood that the length of the DCI determined above is the blind detection bit length (or the bit length to be transmitted), and the length of the DCI before performing the alignment is the original bit length, which should be understood based on the actual operation of the DCI, and will not be described in detail in the subsequent embodiments.
The result of this is that the length of the two DCIs in CSS a is the same, accounting for 1DCI length budget. In this embodiment of the present application, occupying 1DCI length budget may be understood as that this DCI length occupies 1DCI length of 4 different DCI lengths of the DCI length budget, and may also occupy 1DCI length of 3 different DCI lengths occupied by DCI scrambled by the C-RNTI.
At this time, 3 DCI length budgets remain. It is to be understood that all the remaining DCI lengths can only be 3 different sizes at most, where the C-RNTI scrambled DCI lengths can only be 2 or 3 at most, depending on whether the first DCI occupying a different DCI length is scrambled by the C-RNTI, if the first DCI occupying a different DCI length is scrambled by the C-RNTI, the C-RNTI scrambled DCI lengths occupy 2, otherwise the C-RNTI scrambled DCI lengths occupy 3.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Alternatively, the length of the DCI format 2 \u0 and DCI format 2 \u1 in CSS B is compared with the length of DCI format1 \u0 in CSS a.
1) If the lengths of the DCI format 2 _0and the DCI format 2 _1are not naturally configured to be equal to each other, and both are not equal to the DCI format1 _0in the CSS a, specifically, for example, the length of the DCI format 2 _0is 65bits, the length of the DCI format1 _0is 70bits, and the length of the DCI format 2 _1is 65bits, the length of the DCI format1 _0is 70bits, and the DCI format 2 _1is 65bits, the length of the DCI format1 _0is 70bits, respectively, and then the DCI format 2 _0and the DCI format 2 _1occupy 2 DCI length budgets.
At this time, 1DCI length budget remains.
2) If the natural configurations of the lengths of DCI format 2 \u0 and DCI format 2 \u1 are not equal to each other, and either one of them is equal to DCI format1 _u0 in CSS a, or the natural configurations of the lengths of DCI format 2 _u0 and DCI format 2 _u1 are equal and are not equal to DCI format1 _u0 length, DCI format 2 _u0 and DCI format 2 _u1 occupy 1DCI length budget.
At this time, 2 DCI length budgets remain.
3) If the lengths of the DCI format 2 \u0 and the DCI format 2 \u1 are naturally configured to be equal and both are equal to the DCI format1 _u0 in cssa, the DCI format 2 _u0 and the DCI format 2 _u1 occupy 0 DCI length budget, in other words, the DCI format 2 _u0 and the DCI format 2 _u1 do not occupy the DCI length budget.
At this point, 3 more DCI length budgets remain.
It should be understood that the execution sequence between the first step and the second step is not required in the embodiment of the present application, but the first step and the second step are necessarily executed before the third step.
Step three: the following analysis was based on the configuration of USS a and USS B, respectively.
1) When USS a and USS B are configured simultaneously, DCI format0 _1and DCI format1 _1in USS B force a pull-up to a larger length, so that the DCI in USS B occupies 1DCI length budget. At this time, the DCI format 2 \u0 and DCI format 2 \u1 in the above CSS B may be left, depending on the possible remaining DCI length budget of 0 or 1 or 2.
When 0 DCI length budget remains, DCI format0 _0in USS a calculates the length using initial UL BWP, and then aligns to the length of DCI format1 _0in CSS a. DCI format1 _0in USS A calculates the length using CORESET 0 or initial DL BWP. In this way, the lengths of the DCI format0 _0and DCI format1_0 in USS a are both equal to the DCI format1 _0in CSS a, thereby ensuring that the DCI in USS a does not occupy the DCI length budget.
When 1 or 2 DCI length budgets remain, the DCI format0 _0and the DCI format1 _0in the USS A respectively adopt active UL BWP and active DL BWP to calculate the length, and then the longer length of the two is pulled up. Thus, DCI format0 and DCI format1_0 in USS a only occupy 1DCI length budget.
2) When USS A is not configured, but USS B is configured, the following three cases are distinguished:
if the DCI format 2 _0and DCI format 2 _1in CSS B occupy 0 DCI length budget (i.e., case 3 in step two above), since 3 DCI length budgets remain, no additional operation may be performed on the DCI format0 _1and DCI format1 _1in USS B, and at this time, the DCI in USS B may occupy 0 or 1 or 2 DCI length budgets.
If the DCI format 2 \u0 and DCI format 2 \u1 in CSS B occupy 1DCI length budget (i.e. case 2 in step two above), since 2 DCI length budgets remain, no additional operation may be performed on DCI format0 _u1 and DCI format1 _u1 in USS B, and at this time, DCI in USS B may occupy 0 or 1 or 2 DCI length budgets.
If the DCI format 2 _0and DCI format 2 _1in CSS B occupy 2 DCI length budgets (i.e. case 1 in step two above), since 1DCI length budget remains, the network side device may ensure that the DCI format0 _1and DCI format1 _1in USS B are configured to be one length naturally, or ensure that the DCI format 2 _0and DCI format 2 _1in CSS B occupy only 0 or 1DCI length budget naturally, or ensure that the DCI format0 _1and DCI format1 _1in USS B are aligned, and ensure that the DCI format0 _1and DCI format1 _1in USS B occupy only 1DCI budget length.
3) When USS a is configured but USS B is not configured, the DCI length budget may be left as 1 or 2 or 3, depending on DCI format 2 \u0 and DCI format 2 \u1 in CSS B described above.
When 1 or 2 DCI length budgets remain, the DCI format0 _0and the DCI format1 _0in the USS A respectively adopt active UL BWP and active DL BWP to calculate the length, and then the longer length of the two is aligned. Thus, DCI format0 and DCI format1_0 in USS a only occupy 1DCI length budget.
4) When USS A and USS B are not configured, no operation is performed.
Optionally, in the above step one to step three, the calculation of the DCI length budget may not be performed, that is, the terminal side device or the network side device may not count the number of different DCI lengths, and count after the step one to step three are performed.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. Specifically, in step one, DCI format0 _0of CSS a is aligned to DCI format1_0, thus occupying only 1 different DCI length and occupying 1 different length of C-RNTI scrambled DCI. The length of DCI format 2 _0and DCI format 2 _1of CSS B accounts for 0 or 1 or 2 DCI length budgets. Then, the remaining DCI length budget may be determined according to the configuration of USS a and USS B.
Step five: in case 1-case 3 in the above-mentioned step three, the network side device is configured with USS B. If the length of DCI format0 _1and DCI format1 _1in USS B is equal to the length of any one of DCI format0 _1in CSS a, DCI format 1_1, and DCI format0 _0and DCI format1 _0in USS a, 1 bit needs to be supplemented to each of DCI format0 u 1 and DCI format1 _1in USS B.
It should be understood that the precondition for implementing the embodiment of the present application is: the protocol restricts the natural configuration length of DCI format 2 \u2 and DCI format 2 \u3 in CSS to be no longer than the length of DCI format1 \u0 in CSS a. That is, the network side device may naturally configure the length of the DCI format 2 \u2 and the DCI format 2 \u3 to be equal to the length of the DCI format1_0, or, when the length of the DCI format 2 _2and the DCI format 2 _3is smaller than the length of the DCI format1_0, perform zero padding operation to pull up the DCI format 2 _2and the DCI format 2 _3to the DCI format1 _0in the CSS a.
In the following embodiment, the network side device configures four search spaces of CSS a, USS B, and CSS B for the terminal side device. Therefore, DCI that the terminal-side device may blindly detect may have 8 types of DCI in common.
Example two
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the length of DCI format 2 \u0 and DCI format 2 \u1 in CSS B is determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \u0 and the DCI format 2 \u1 in the CSS B are naturally configured to be different from each other and are not equal to the DCI format1 \u0 in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are naturally configured to be not equal to each other, and the bit length difference between the DCI format0 _1and the DCI format1 _1is equal to 2, and the smaller one of the bit lengths of the DCI format0 _1and the DCI format1 _1is equal to the bit length of the DCI format1 u 0 in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B is equal to any one of the bit lengths of the format 2 _0and the DCI format 2 _1in the CSS B, the DCI format0 and the DCI format1 _1occupy different DCI length in the DCI format 2-C scrambling.
It should be noted that, in the above step one to step three, the calculation of DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, the length of DCI format 2 \u0 in CSS B is 64bits, which is not equal to DCI format1 \u0 length 62bits, and the length of DCI format 2 \u1 is 65bits, which is not equal to DCI format1 _u0 length 62bits, then DCI format 2 _u0 and DCI format 2 _u1 occupy 2 DCI length budgets. Secondly, the length of DCI format0 _1in USS A is 62bits, the length of DCI format1 _1is 64bits, and as the length of DCI format0 _1is equal to that of DCI format1 _0in CSS A and is 62bits, the length of DCI format0 _1needs to be distinguished by complementing 1 bit 0, so that the length of DCI format0 _1after zero padding operation is 63bits, which is still not equal to that of DCI format 1. Finally, the length of the DCI format 1-1 in the USS B is 64bits, which is equal to the length of the DCI format 2 \u0 in the CSS B, and the length of the DCI format0 \u1 is 63bits, which is different from the DCI format 2 \u0 and the DCI format 2 \u1 in the CSS B.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 _0of the CSS a is aligned to the DCI format1_0, and thus only occupies 1 different DCI lengths and occupies 1 different length of C-RNTI scrambled DCI, the lengths of the DCI format 2 _0and the DCI format 2 _1of the CSS B occupy 2 DCI length budgets, the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 0 DCI length budget and 0C-scrambled DCI length budget remain.
Step five: and analyzing the situation of the USS A according to the results of the first step to the fourth step. At this time, in the above example, a total of 4 different DCI lengths, i.e., 62,63,64, 65, occur, and the different bit numbers of the C-RNTI scrambled DCI are 3, i.e., 62,63,64, so that DCI format0 \u0 and DCI format1 \u0 in USS a can no longer occur with different DCI lengths, and thus DCI format0 \u0 and DCI format1 \u0 in USS a can only be pulled to the length of DCI format1 \u0 in CSS a, i.e., 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
EXAMPLE III
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \u0 and the DCI format 2 \u1 in the CSS B are naturally configured to be different from each other and are not equal to the DCI format1 \u0 in the CSS a, and the bit lengths of the DCI format0 \u1 and the DCI format1 \u1 in the USS B are naturally configured to be different, and the bit length difference between the DCI format0 \u1 and the DCI format1 \u1 is equal to 2, and the smaller one of the bit lengths of the DCI format0 \u1 and the DCI format1 \u1 is equal to the bit length of the DCI format1 u 0 in the CSS a, and the bit lengths of the DCI format0 \u1 and the DCI format1 \u1 in the USS B are equal to the bit lengths of the DCI format 2 u 0 and the DCI format 2 \u1 in the CSS B, the bit lengths of the DCI format0 \u1 and the DCI format1 \u1 in the DCI format1 in the USS B occupy different DCI lengths of the DCI format 2-C-RNTI.
It should be noted that, in the above step one to step three, the calculation of DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is performed, and the DCI length in CSS B is analyzed. For example, if DCI format 2 \u0 length is 63bits in CSS B, which is not equal to DCI format1 \u0 length 62bits, and DCI format 2 \u1 length is 64bits, which is not equal to DCI format1 \u0 length 62bits, DCI format 2 \u0 and DCI format 2 \u1 occupy 2 DCI length budgets. Secondly, the length of DCI format0 \u1 in USS B is 62bits, the length of DCI format1 \u1 is 64bits, and since the length of DCI format0 \u1 is equal to that of DCI format1 \u0 in CSS A and is 62bits, the length of DCI format0 \u1 needs to be distinguished by complementing 1 bit 0, therefore, the length of DCI format0 \u1 after zero padding operation is 63bits, which is still not equal to the length of DCI format1 u 1. Finally, the length of the DCI format 1-1 in the USS B is 64bits, which is equal to the length of the DCI format 2 _1in the CSS B, and the length of the DCI format0 _1is 63bits, which is equal to the length of the DCI format 2 _0in the CSS B. At this time, the bit lengths of DCI format0 _1and DCI format1 _1in USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 \/0 of the CSS A is aligned to the DCI format1 \/0, so that only 1 different DCI length is occupied, and 1 different length of C-RNTI scrambled DCI is occupied, the length of the DCI format 2 \/0 and the DCI format 2 \/1 of the CSS B occupies 2 DCI length budgets, the bit length of the DCI format0 \/1 and the DCI format1 \/1 in the USS B occupies 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 1DCI length budget and 0C-scrambled DCI length budget are remained.
Step five: and analyzing the USS A condition according to the results of the first step to the fourth step. At this time, in the above example, there are 3 different DCI lengths, i.e. 62,63,64, and 1DCI length budget is still left, but the different bit number of the C-RNTI scrambled DCI is 3, i.e. 62,63,64, so that DCI format0 _0and DCI format1 _0in USS a can no longer have different DCI lengths, and thus DCI format0 _0and DCI format1 _0in USS a can only be pulled to the length of DCI format1 _0in CSS a, i.e. 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
Example four
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the length of DCI format 2 \u0 and DCI format 2 \u1 in CSS B is determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \ "0 and the DCI format 2 \" 1 in the CSS B are naturally configured to be different from each other and either one of the lengths is equal to the DCI format1 \ "0 in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are naturally configured to be different, and the bit length difference between the DCI format0 _1and the DCI format1 _1is equal to 2, and the smaller one of the bit lengths of the DCI format0 _1and the DCI format1 _1is equal to the bit length of the DCI format1 _0in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are not equal to the bit lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B, the DCI format0 _1and the DCI format1 in the USS B occupy different scrambling bit lengths of the DCI format 2-C in the CSS B.
It should be noted that, in the above step one to step three, the calculation of the DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, the length of DCI format 2 \u0 in CSS B is 62bits, which is equal to the length of DCI format1 \u0 62bits, and the length of DCI format 2 \u1 is 64bits, which is not equal to the length of DCI format1 _u0 62bits, then DCI format 2 _u0 and DCI format 2 _u1 occupy 1DCI length budget. Secondly, the length of DCI format0 _1in USS B is 62bits, the length of DCI format1 _1is 64bits, and as the length of DCI format0 _1is equal to that of DCI format1 _0in CSS A and is 62bits, the length of DCI format0 _1needs to be distinguished by complementing 1 bit 0, so that the length of DCI format0 _1after zero padding operation is 63bits, which is still not equal to that of DCI format 1. Finally, the length of the DCI format 1-1 in the USS B is 64bits, the length of the DCI format 2 _0and the length of the DCI format 2 _1in the CSS B are not equal, the length of the DCI format0 _1is 63bits, and the length of the DCI format 2 _0and the length of the DCI format 2 _1in the CSS B are not equal. At this time, the bit lengths of DCI format0 _1and DCI format1 _1in USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 _0of the CSS a is aligned to the DCI format1_0, and thus only occupies 1 different DCI lengths and occupies 1 different length of C-RNTI scrambled DCI, the lengths of the DCI format 2 _0and the DCI format 2 _1of the CSS B occupy 1DCI length budget, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 0 DCI length budget and 0C-scrambled DCI length budget are left.
Step five: and analyzing the situation of the USS A according to the results of the first step to the fourth step. At this time, in the above example, 4 different DCI lengths, i.e., 62,63,64, 65, occur in total, and the different bit numbers of the C-RNTI scrambled DCI are 3, i.e., 62,63,64, so that the DCI format0 _0and the DCI format1 _0in the USS a can no longer occur different DCI lengths, and thus the DCI format0 _0and the DCI format1 _0in the USS a can only be pulled up to the length of the DCI format1 _0in the CSS a, i.e., 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
EXAMPLE five
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the length of DCI format 2 \u0 and DCI format 2 \u1 in CSS B is determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \u0 and the DCI format 2 \u1 in the CSS B are naturally configured to be different from each other and either one of the lengths is equal to the DCI format1 \u0 in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _u1 in the USS B are naturally configured to be unequal, and the bit length difference between the DCI format0 _1and the DCI format1 _1is equal to 2, and the smaller one of the bit lengths of the DCI format0 u 1 and the DCI format1 _1is equal to the bit length of the DCI format1_0 _0in the CSS a, and the bit lengths of the DCI format0 u 1 and the DCI format 1_1 _1in the USS B are equal to either one of the bit lengths of the format 2 u 0 and the DCI format 2 _1in the CSS B, the DCI format0 and the DCI format1 in the USS B occupy different bit lengths of the DCI format 2-C of the DCI format 2 RNTI.
It should be noted that, in the above step one to step three, the calculation of the DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, the length of DCI format 2 \u0 in CSS B is 62bits, which is equal to the length of DCI format1 \u0 62bits, and the length of DCI format 2 \u1 is 65bits, which is not equal to the length of DCI format1 _u0 _62bits, then DCI format 2 _u0 and DCI format 2 _u1 occupy 1DCI length budget. Secondly, the length of DCI format0 _1in USS B is 62bits, the length of DCI format1 _1is 64bits, and as the length of DCI format0 _1is equal to that of DCI format1 _0in CSS A and is 62bits, the length of DCI format0 _1needs to be distinguished by complementing 1 bit 0, so that the length of DCI format0 _1after zero padding operation is 63bits, which is still not equal to that of DCI format 1. Finally, the length of the DCI format 1-1 in the USS B is 64bits, which is equal to the length of the DCI format 2 \u1 in the CSS B, and the length of the DCI format0 \u1 is 63bits, which is different from the DCI format 2 \u0 and the DCI format 2 \u1 in the CSS B. At this time, the bit lengths of DCI format0 _1and DCI format1 _1in USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 _0of the CSS a is aligned to the DCI format1_0, and thus only occupies 1 different DCI lengths and occupies 1 different length of C-RNTI scrambled DCI, the lengths of the DCI format 2 _0and the DCI format 2 _1of the CSS B occupy 1DCI length budget, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 1DCI length budget and 0C-scrambled DCI length budget are left.
Step five: and analyzing the situation of the USS A according to the results of the first step to the fourth step. At this time, in the above example, 3 different DCI lengths, i.e., 62,63,64, occur altogether, and the different bit numbers of the C-RNTI scrambled DCI are 3, i.e., 62,63,64, so that the DCI format0 _0and DCI format1 _0in the USS a can no longer occur different DCI lengths, and thus the DCI format0 _0and DCI format1 _0in the USS a can only be pulled up to the length of DCI format1 _0in the CSS a, i.e., 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
EXAMPLE six
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B are naturally configured to be equal and not equal to the DCI format1 _0in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are naturally configured to be not equal, and the bit length difference of the DCI format0 _1and the DCI format1 _1is equal to 2, and the smaller one of the bit lengths of the DCI format0 _1and the DCI format1 _1is equal to the bit length of the DCI format1 _0in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are not equal to the bit lengths of the DCI format 2 u 0 and the DCI format 2 _1in the CSS B, the bit lengths of the DCI format0 _1and the DCI format1 in the CSS B occupy different DCI format 2C-RNTI.
It should be noted that, in the above step one to step three, the calculation of the DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, the length of DCI format 2 \u0 and the length of DCI format 2 \u1 in CSS B are equal to each other and are 65bits, and are not equal to DCI format1 \u0 and length 62bits, then DCI format 2 \u0 and DCI format 2 \u1 occupy 1DCI length budget. Secondly, the length of DCI format0 _1in USS B is 62bits, the length of DCI format1 _1is 64bits, and as the length of DCI format0 _1is equal to that of DCI format1 _0in CSS A and is 62bits, the length of DCI format0 _1needs to be distinguished by complementing 1 bit 0, so that the length of DCI format0 _1after zero padding operation is 63bits, which is still not equal to that of DCI format 1. Finally, the length of the DCI format 1-1 in the USS B is 64bits, the length is not equal to the length of the DCI format 2 _0and the DCI format 2 _1in the CSS B, the length of the DCI format0 _1is 63bits, and the length is not equal to the length of the DCI format 2 _0and the DCI format 2 _1in the CSS B. At this time, the bit lengths of DCI format0 \u1 and DCI format1 \u1 in USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 \/0 of the CSS A is aligned to the DCI format1 \/0, so that only 1 different DCI length is occupied, and 1 different length of C-RNTI scrambled DCI is occupied, the length of the DCI format 2 \/0 and the DCI format 2 \/1 of the CSS B occupies 1DCI length budget, the bit length of the DCI format0 \/1 and the DCI format1 \/1 in the USS B occupies 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 0 DCI length budget and 0C-scrambled DCI length budget are remained.
Step five: and analyzing the situation of the USS A according to the results of the first step to the fourth step. At this time, in the above example, 4 different DCI lengths, i.e., 62,63,64, 65, occur in total, and the different bit numbers of the C-RNTI scrambled DCI are 3, i.e., 62,63,64, so that the DCI format0 _0and the DCI format1 _0in the USS a can no longer occur different DCI lengths, and thus the DCI format0 _0and the DCI format1 _0in the USS a can only be pulled up to the length of the DCI format1 _0in the CSS a, i.e., 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
EXAMPLE seven
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the length of DCI format 2 \u0 and DCI format 2 \u1 in CSS B is determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When bit lengths of the DCI format 2 \u0 and the DCI format 2 \u1 in the CSS B are naturally configured to be equal and are not equal to the DCI format1 \u0 in the CSS a, and bit lengths of the DCI format0 _u1 and the DCI format1 _u1 in the USS B are naturally configured to be not equal, and a bit length difference value of the DCI format0 _u1 and the DCI format1 _u1 is equal to 2, and a smaller one of the bit lengths of the DCI format0 _u1 and the DCI format1 _u1 is equal to a bit length of the DCI format1 u 0 in the CSS a, and a bit length of the DCI format0 _1and the DCI format1 _u1 in the USS B is equal to any one of the bit lengths of the DCI format 2 u 0 and the DCI format 2 u 1 in the CSS B, the DCI format0 u 1 and the DCI format1 bit length of the DCI format1 in the DCI format 2-DCI format 2 u 1 in the CSS B occupy different DCI length among the DCI format 2-DCI formats C-DCI lengths.
It should be noted that, in the above step one to step three, the calculation of DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, the length of DCI format 2 \u0 and the length of DCI format 2 \u1 in CSS B are equal to 63bits, and are not equal to DCI format1 \u0 length 62bits, so that DCI format 2 _u0 and DCI format 2 _u1 occupy 1DCI length budget. Secondly, the length of DCI format0 _1in USS B is 62bits, the length of DCI format1 _1is 64bits, and as the length of DCI format0 _1is equal to that of DCI format1 _0in CSS A and is 62bits, the length of DCI format0 _1needs to be distinguished by complementing 1 bit 0, so that the length of DCI format0 _1after zero padding operation is 63bits, which is still not equal to that of DCI format 1. Finally, the length of the DCI format 1-1 in the USS B is 64bits, which is different from the lengths of the DCI format 2 _1and the DCI format 2 _2in the CSS B, and the length of the DCI format0 _1is 63bits, which is equal to both the DCI format 2 _0and the DCI format 2 _1in the CSS B. At this time, the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B occupy 2 different DCI lengths. At this time, the bit lengths of DCI format0 \u1 and DCI format1 \u1 in USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the present embodiment does not require the execution sequence between the first step to the third step, but the first step to the third step must be executed before the fourth step.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 _0of the CSS a is aligned to the DCI format1_0, and thus only occupies 1 different DCI lengths and occupies 1 different length of C-RNTI scrambled DCI, the lengths of the DCI format 2 _0and the DCI format 2 _1of the CSS B occupy 1DCI length budget, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 1DCI length budget and 0C-scrambled DCI length budget are left.
Step five: and analyzing the USS A condition according to the results of the first step to the fourth step. At this time, in the above example, 3 different DCI lengths, i.e., 62,63,64, occur altogether, and the different bit numbers of the C-RNTI scrambled DCI are 3, i.e., 62,63,64, so that the DCI format0 _0and DCI format1 _0in the USS a can no longer occur different DCI lengths, and thus the DCI format0 _0and DCI format1 _0in the USS a can only be pulled up to the length of DCI format1 _0in the CSS a, i.e., 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
Example eight
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 \u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \u0 and the DCI format 2 \u1 in the CSS B are naturally configured to be equal and equal to the DCI format1 \u0 in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are naturally configured to be unequal, and the bit length difference of the DCI format0 _1and the DCI format1 _1is equal to 2, and the smaller one of the bit lengths of the DCI format0 _1and the DCI format1 _1is equal to the bit length of the DCI format1 in the CSS a, and the bit lengths of the DCI format0 _1and the format1 _1in the USS B are not equal to the bit lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B, the bit lengths of the DCI format0 _1and the DCI format1 in the CSS B occupy different DCI formats 2-RNTI in the DCI format C-RNTI.
It should be noted that, in the above step one to step three, the calculation of DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is performed, and the DCI length in CSS B is analyzed. For example, the length of DCI format 2 _0and the length of DCI format 2 _1in CSS B are equal to each other and are 62bits, and are equal to DCI format1 _0length 62bits, so that DCI format 2 _0and DCI format 2 _1occupy 0 DCI length budget. Secondly, the length of DCI format0 _1in USS B is 62bits, the length of DCI format1 _1is 64bits, and as the length of DCI format0 _1is equal to that of DCI format1 _0in CSS A and is 62bits, the length of DCI format0 _1needs to be distinguished by complementing 1 bit 0, so that the length of DCI format0 _1after zero padding operation is 63bits, which is still not equal to that of DCI format 1. Finally, the length of the DCI format 1-1 in the USS B is 64bits, the length of the DCI format 2 _0and the length of the DCI format 2 _1in the CSS B are not equal, the length of the DCI format0 _1is 63bits, and the length of the DCI format 2 _0and the length of the DCI format 2 _1in the CSS B are not equal. At this time, the bit lengths of DCI format0 \u1 and DCI format1 \u1 in USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the present embodiment does not require the execution sequence between the first step to the third step, but the first step to the third step must be executed before the fourth step.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 \/0 of the CSS A is aligned to the DCI format1 \/0, so that only 1 different DCI length is occupied, and 1 different length of C-RNTI scrambled DCI is occupied, the length of the DCI format 2 \/0 and the DCI format 2 \/1 of the CSS B occupies 0 DCI length budget, the bit length of the DCI format0 \/1 and the DCI format1 \/1 in the USS B occupies 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 1DCI length budget and 0C-scrambled DCI length budget are remained.
Step five: and analyzing the USS A condition according to the results of the first step to the fourth step. At this time, in the above example, 4 different DCI lengths, i.e., 62,63,64, occur in total, and the different bit numbers of the C-RNTI scrambled DCI are 3, i.e., 62,63,64, so that the DCI format0 _0and DCI format1 _0in the USS a can no longer occur different DCI lengths, and thus the DCI format0 _0and DCI format1 _0in the USS a can only be aligned to the length of the DCI format1 _0in the CSS a, i.e., 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
Example nine
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \u0 and the DCI format 2 \u1 in the CSS B are naturally configured to be different from each other and are not equal to the DCI format1 \u0 in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are naturally configured to be not equal, and the bit length difference between the DCI format0 _1and the DCI format1 _1is equal to 1, and a smaller one of the bit lengths of the DCI format0 _1and the DCI format1 _1is not equal to the bit length of the DCI format1 u 0 in the CSS a, and the bit lengths of the DCI format0 _1and the format1 _1in the USS B are equal to any one of the bit lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B, the DCI format0 and the DCI format1 _1in the USS B occupy different DCI format 2-C lengths in the DCI scrambling RNTI.
It should be noted that, in the above step one to step three, the calculation of the DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, if the DCI format 2 \u0 length in CSS B is 65bits, which is not equal to DCI format1 \u0 length 62bits, and the DCI format 2 \u1 length is 66bits, which is not equal to DCI format1 \u0 length 62bits, DCI format 2 _u0 and DCI format 2 _u1 occupy 2 DCI length budgets. Secondly, the length of DCI format0 _u1 in USS B is 66bits, which is not equal to the length of DCI format1 _u0 in CSS A, 62bits, and the length of DCI format1 _u1 is 67bits, which is not equal to the length of DCI format1 _u0 in CSS A, 62bits. Finally, the length of the DCI format 1-1 in the USS B is 67bits, which is different from the lengths of the DCI format 2 _1and the DCI format 2 _2in the CSS B, and the length of the DCI format0 _1is 66bits, which is equal to the length of the DCI format 2 _1in the CSS B. At this time, the bit lengths of DCI format0 _1and DCI format1 _1in USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 \/0 of the CSS A is aligned to the DCI format1 \/0, so that only 1 different DCI length is occupied, and 1 different length of C-RNTI scrambled DCI is occupied, the length of the DCI format 2 \/0 and the DCI format 2 \/1 of the CSS B occupies 2 DCI length budgets, the bit length of the DCI format0 \/1 and the DCI format1 \/1 in the USS B occupies 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 0 DCI length budget and 0C-scrambled DCI length budget are remained.
Step five: and analyzing the situation of the USS A according to the results of the first step to the fourth step. At this time, in the above example, 4 different DCI lengths, i.e., 62, 65, 66, 67, occur in total, and the different bit numbers of the C-RNTI scrambled DCI are 3, i.e., 62, 66, 67, so that the DCI format0 _0and the DCI format1 _0in the USS a can no longer occur different DCI lengths, and thus the DCI format0 _0and the DCI format1 _0in the USS a can only be pulled up to the length of the DCI format1 _0in the CSS a, i.e., 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
Example ten
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \u0 and the DCI format 2 \u1 in CSS B are naturally configured not to be equal to each other and are not equal to the DCI format1 \u0 in CSS a, and the bit lengths of the DCI format0 \u1 and the DCI format1 \u1 in USS B are naturally configured not to be equal, and the bit length difference between the DCI format0 \u1 and the DCI format1 \u1 is equal to 1, and the smaller one of the bit lengths of the DCI format0 _1and the DCI format1 _1is not equal to the bit length of the DCI format1 u 0 in CSS a, and the bit lengths of the DCI format0_1 and the DCI format 1_1 _1in USS B and the bit lengths of the DCI format 2 u 0 and the DCI format 2 _1in CSS B are both equal to the bit lengths of the DCI format 2 u 0 and the DCI format 2_1 _1in CSS B, the DCI format0 and the DCI format1 in USS B occupy the DCI format 2 length of DCI C-RNTI.
It should be noted that, in the above step one to step three, the calculation of the DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, if the DCI format 2 \u0 length in CSS B is 65bits, which is not equal to DCI format1 \u0 length 62bits, and the DCI format 2 \u1 length is 66bits, which is not equal to DCI format1 \u0 length 62bits, DCI format 2 _u0 and DCI format 2 _u1 occupy 2 DCI length budgets. Secondly, the length of DCI format0 _u1 in USS B is 65bits, which is not equal to the length of DCI format1 _u0 in CSS A, 62bits, and the length of DCI format1 _u1 is 66bits, which is not equal to the length of DCI format1 _u0 in CSS A, 62bits. Finally, the length of the DCI format 1-1 in the USS B is 66bits, which is equal to the length of the DCI format 2 \u1 in the CSS B, and the length of the DCI format0 \u1 is 65bits, which is equal to the length of the DCI format 2 \u0 in the CSS B. At this time, the bit lengths of DCI format0 _1and DCI format1 _1in USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 \/0 of the CSS A is aligned to the DCI format1 \/0, so that only 1 different DCI length is occupied, and 1 different length of C-RNTI scrambled DCI is occupied, the length of the DCI format 2 \/0 and the DCI format 2 \/1 of the CSS B occupies 2 DCI length budgets, the bit length of the DCI format0 \/1 and the DCI format1 \/1 in the USS B occupies 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 1DCI length budget and 0C-scrambled DCI length budget are remained.
Step five: and analyzing the USS A condition according to the results of the first step to the fourth step. At this time, in the above example, 3 different DCI lengths, i.e. 62, 65, 66, appear together, and the different bit numbers of the C-RNTI scrambled DCI are 3, i.e. 62, 65, 66, so that DCI format0 _0and DCI format1 _0in USS a can no longer appear with different DCI lengths, and thus DCI format0 _0and DCI format1 _0in USS a can only be pulled to the length of DCI format1 _0in CSS a, i.e. 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
EXAMPLE eleven
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the length of DCI format 2 \u0 and DCI format 2 \u1 in CSS B is determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \ "0 and the DCI format 2 \" 1 in the CSS B are naturally configured to be different from each other and either one of the lengths is equal to the DCI format1 \ "0 in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are naturally configured to be different, and the bit length difference between the DCI format0 _1and the DCI format1 _1is equal to 1, and the smaller one of the bit lengths of the DCI format0 _1and the DCI format1 _1is not equal to the bit length of the DCI format1 _0in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are not equal to the bit lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B, the DCI format0 _1and the DCI format1 in the USS B occupy different bit lengths of the DCI format 2-C scrambling.
It should be noted that, in the above step one to step three, the calculation of DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, the length of DCI format 2 \u0 in CSS B is 62bits, which is equal to the length of DCI format1 \u0 62bits, and the length of DCI format 2 \u1 is 63bits, which is not equal to the length of DCI format1 _u0 62bits, then DCI format 2 _u0 and DCI format 2 _u1 occupy 1DCI length budget. Secondly, the length of DCI format0 \u1 in USS B is 65bits, which is not equal to the length of DCI format1 \u0 in CSS A, and the length of DCI format1 \u1 is 66bits, which is not equal to the length of DCI format1 \u0 in CSS A, 62bits. Finally, the length of the DCI format 1-1 in the USS B is 66bits, the length is not equal to the length of the DCI format 2 _0and the DCI format 2 _1in the CSS B, the length of the DCI format0 _1is 65bits, and the length is not equal to the length of the DCI format 2 _0and the DCI format 2 _1in the CSS B. At this time, the bit lengths of DCI format0 _1and DCI format1 _1in USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 _0of the CSS a is aligned to the DCI format1_0, and thus only occupies 1 different DCI lengths and occupies 1 different length of C-RNTI scrambled DCI, the lengths of the DCI format 2 _0and the DCI format 2 _1of the CSS B occupy 1DCI length budget, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 0 DCI length budget and 0C-scrambled DCI length budget are left.
Step five: and analyzing the USS A condition according to the results of the first step to the fourth step. At this time, in the above example, 4 different DCI lengths, i.e., 62,63, 65, 66, occur in total, and the different bit numbers of the C-RNTI scrambled DCI are 3, i.e., 62, 65, 66, so that the DCI format0 _0and the DCI format1 _0in the USS a can no longer occur different DCI lengths, and thus the DCI format0 _0and the DCI format1 _0in the USS a can only be pulled up to the length of the DCI format1 _0in the CSS a, i.e., 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
EXAMPLE twelve
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the length of DCI format 2 \u0 and DCI format 2 \u1 in CSS B is determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \ "and the DCI format 2 \" 1 in the CSS B are naturally configured to be different from each other and either one of the lengths is equal to the DCI format1 \ "0 in the CSS a, and the bit lengths of the DCI format0 \" 1 and the DCI format1 \ "1 in the USS B are naturally configured to be different from each other, and the bit length difference between the DCI format0 \" 1 and the DCI format1 \ "1 is equal to 1, and the smaller one of the bit lengths of the DCI format0 \" 1 and the DCI format1 \ "1 is not equal to the bit length of the DCI format1 \" 0 in the CSS a, and the bit lengths of the DCI format0 \ "1 and the DCI format1 \" 1 in the USS B are equal to either one of the bit lengths of the DCI format 2 \ "0 and the DCI format 2 \" 1 \ "in the CSS B, the DCI format0 \" 1 and the DCI format1 \ "occupy different bit lengths of the DCI format 2-C in the DCI format C.
It should be noted that, in the above step one to step three, the calculation of DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, if the DCI format 2 \u0 length in CSS B is 62bits, which is equal to DCI format1 \u0 length 62bits, and the DCI format 2 \u1 length is 63bits, which is not equal to DCI format1 \u0 length 62bits, DCI format 2 _u0 and DCI format 2 _u1 occupy 1DCI length budget. Secondly, the length of DCI format0 \u1 in USS B is 63bits, which is not equal to the length of DCI format1 \u0 in CSS A, and the length of DCI format1 \u1 is 64bits, which is not equal to the length of DCI format1 \u0 in CSS A, 62bits. Finally, the length of the DCI format 1-1 in the USS B is 64bits, which is different from the lengths of the DCI format 2 _1and the DCI format 2 _2in the CSS B, and the length of the DCI format0 _1is 63bits, which is equal to the length of the DCI format 2 _1in the CSS B. At this time, the bit lengths of DCI format0 _1and DCI format1 _1in USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 _0of the CSS a is aligned to the DCI format1_0, and thus only occupies 1 different DCI lengths and occupies 1 different length of C-RNTI scrambled DCI, the lengths of the DCI format 2 _0and the DCI format 2 _1of the CSS B occupy 1DCI length budget, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 1DCI length budget and 0C-scrambled DCI length budget are left.
Step five: and analyzing the situation of the USS A according to the results of the first step to the fourth step. At this time, in the above example, 3 different DCI lengths, i.e. 62,63,64, occur altogether, and the different bit numbers of the C-RNTI scrambled DCI are 3, i.e. 62,63,64, so that DCI format0 _0and DCI format1 _0in USS a can no longer occur different DCI lengths, and thus DCI format0 _0and DCI format1 _0in USS a can only be pulled to the length of DCI format1 _0in CSS a, i.e. 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
EXAMPLE thirteen
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \u0 and the DCI format 2 \u1 in CSS B are naturally configured to be equal and not equal to the DCI format1 \u0 in CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _u1 in USS B are naturally configured to be not equal, and the bit length difference of the DCI format0 _1and the DCI format1 _1is equal to 1, and the smaller of the bit lengths of the DCI format0 _1and the DCI format1 _1is not equal to the bit length of the DCI format1 _0in a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in USS B are not equal to the bit lengths of the DCI format 2 u 0 and the DCI format 2 _1in CSS B, the bit lengths of the DCI format0 _1and the DCI format1 in USS B occupy different scrambling lengths of the DCI format 2 in CSS C-RNTI.
It should be noted that, in the above step one to step three, the calculation of the DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is performed, and the DCI length in CSS B is analyzed. For example, the length of DCI format 2 \u0 and the length of DCI format 2 \u1 in CSS B are equal to 63bits, and are not equal to DCI format1 \u0 length 62bits, so that DCI format 2 _u0 and DCI format 2 _u1 occupy 1DCI length budget. Secondly, the length of DCI format0 _u1 in USS B is 64bits, which is not equal to the length of DCI format1 _u0 in CSS A, 62bits, and the length of DCI format1 _u1 is 65bits, which is not equal to the length of DCI format1 _u0 in CSS A, 62bits. Finally, the length of the DCI format 1-1 in the USS B is 65bits, the length of the DCI format 2 _0and the length of the DCI format 2 _1in the CSS B are not equal, the length of the DCI format0 _1is 64bits, and the length of the DCI format 2 _0and the length of the DCI format 2 _1in the CSS B are not equal. At this time, the bit lengths of DCI format0 \u1 and DCI format1 \u1 in USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 \/0 of the CSS A is aligned to the DCI format1 \/0, so that only 1 different DCI length is occupied, and 1 different length of C-RNTI scrambled DCI is occupied, the length of the DCI format 2 \/0 and the DCI format 2 \/1 of the CSS B occupies 1DCI length budget, the bit length of the DCI format0 \/1 and the DCI format1 \/1 in the USS B occupies 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 0 DCI length budget and 0C-scrambled DCI length budget are remained.
Step five: and analyzing the USS A condition according to the results of the first step to the fourth step. At this time, in the above example, 4 different DCI lengths, i.e., 62,63,64, 65, occur in total, and the different bit numbers of the C-RNTI scrambled DCI are 3, i.e., 62, 64, 65, so that the DCI format0 _0and the DCI format1 _0in the USS a can no longer occur different DCI lengths, and thus the DCI format0 _0and the DCI format1 _0in the USS a can only be pulled up to the length of the DCI format1 _0in the CSS a, i.e., 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
Example fourteen
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \u0 and the DCI format 2 \u1 in the CSS B are naturally configured to be equal and not equal to the DCI format1 \u0 in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are naturally configured to be not equal, and the bit length difference of the DCI format0 _1and the DCI format1 _1is equal to 1, and a smaller one of the bit lengths of the DCI format0 _1and the DCI format1 _1is not equal to the bit length of the DCI format1 _0in the a, and the bit lengths of the DCI format0 _1and the format1 _1in the USS B are equal to any one of the bit lengths of the DCI format 2 u 0 and the DCI format 2 _1in the CSS B, the bit lengths of the DCI format0 _1and the DCI format1 in the CSS B occupy different DCI format 2-RNTI lengths in the CSS C scrambling.
It should be noted that, in the above step one to step three, the calculation of the DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, the length of DCI format 2 \u0 and the length of DCI format 2 \u1 in CSS B are equal to each other and are 64bits, and are not equal to DCI format1 \u0 and 62bits, so that DCI format 2 _u0 and DCI format 2 _u1 occupy 1DCI length budget. Secondly, the length of DCI format0 _u1 in USS B is 63bits, which is not equal to the length of DCI format1 _u0 in CSS A, 62bits, and the length of DCI format1 _u1 is 64bits, which is not equal to the length of DCI format1 _u0 in CSS A, 62bits. Finally, the length of the DCI format 0-1 in the USS B is 63bits, which is different from the lengths of the DCI format 2 _1and the DCI format 2 _2in the CSS B, and the length of the DCI format1 _1is 64bits, which is equal to the lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B. At this time, the bit lengths of DCI format0 _1and DCI format1 _1in USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the present embodiment does not require the execution sequence between the first step to the third step, but the first step to the third step must be executed before the fourth step.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 \u0 of the CSS a is aligned to the DCI format1 \u0, and thus occupies only 1 different DCI length and occupies 1 different length of the C-RNTI scrambled DCI, the lengths of the DCI format 2 _u0 and the DCI format 2 _u1 of the CSS B occupy 1DCI length budget, the bit lengths of the DCI format0 _u1 and the DCI format1 _u1 of the USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 1DCI length budget and 0C-scrambled DCI length budget remain.
Step five: and analyzing the situation of the USS A according to the results of the first step to the fourth step. At this time, in the above example, a total of 4 different DCI lengths, i.e., 62,63,64, occur, and the different bit numbers of the C-RNTI scrambled DCI are 3, i.e., 62,63,64, so that DCI format0 _0and DCI format1 _0in USS a can no longer occur with different DCI lengths, and thus DCI format0 _0and DCI format1 _0in USS a can only be pulled to the length of DCI format1 _0in CSS a, i.e., 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
Example fifteen
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \u0 and the DCI format 2 \u1 in the CSS B are naturally configured to be equal and equal to the DCI format1 \u0 in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are naturally configured to be unequal, and the bit length difference of the DCI format0 _1and the DCI format1 _1is not equal to 1, and the smaller of the bit lengths of the DCI format0 _1and the DCI format1 _1is not equal to the bit length of the DCI format1 _0in the a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are not equal to the bit lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B, the bit lengths of the DCI format0 _1and the DCI format1 in the CSS B occupy different DCI format 2-RNTI in the scrambling C-RNTI.
It should be noted that, in the above step one to step three, the calculation of DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, the length of DCI format 2 _0and the length of DCI format 2 _1in CSS B are equal to each other and are 62bits, and are equal to DCI format1 _0length 62bits, so that DCI format 2 _0and DCI format 2 _1occupy 0 DCI length budget. Secondly, the length of DCI format0 _u1 in USS B is 63bits, which is not equal to the length of DCI format1 _u0 in CSS A, 62bits, and the length of DCI format1 _u1 is 64bits, which is not equal to the length of DCI format1 _u0 in CSS A, 62bits. Finally, the length of the DCI format 1-1 in the USS B is 64bits, the length of the DCI format 2 _0and the length of the DCI format 2 _1in the CSS B are not equal, the length of the DCI format0 _1is 63bits, and the length of the DCI format 2 _0and the length of the DCI format 2 _1in the CSS B are not equal. At this time, the bit lengths of DCI format0 _1and DCI format1 _1in USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the present embodiment does not require the execution sequence between the first step to the third step, but the first step to the third step must be executed before the fourth step.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 _0of the CSS a is aligned to the DCI format1_0, and thus only occupies 1 different DCI lengths and occupies 1 different length of C-RNTI scrambled DCI, the lengths of the DCI format 2 _0and the DCI format 2 _1of the CSS B occupy 0 DCI length budget, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 1DCI length budget and 0C-scrambled DCI length budget are left.
Step five: and analyzing the USS A condition according to the results of the first step to the fourth step. At this time, in the above example, 3 different DCI lengths, i.e., 62,63,64, occur altogether, and the different bit numbers of the C-RNTI scrambled DCI are 3, i.e., 62,63,64, so that the DCI format0 _0and DCI format1 _0in the USS a can no longer occur different DCI lengths, and thus the DCI format0 _0and DCI format1 _0in the USS a can only be pulled up to the length of DCI format1 _0in the CSS a, i.e., 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
Example sixteen
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 \u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \u0 and the DCI format 2 \u1 in the CSS B are naturally configured to be different from each other and are not equal to the DCI format1 \u0 in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are naturally configured to be not equal, and the bit length difference between the DCI format0 _1and the DCI format1 _1is equal to 1, and a smaller one of the bit lengths of the DCI format0 _1and the DCI format1 _1is equal to the bit length of the DCI format1 _0in the CSS a, and the bit lengths of the DCI format0 _1and the format1 _1in the USS B are not equal to the bit lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B, the bit lengths of the DCI format0 _1and the DCI format1 in the CSS B occupy different DCI RNTI lengths in the scrambling C-RNTI.
It should be noted that, in the above step one to step three, the calculation of the DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, the length of DCI format 2 \u0 in CSS B is 65bits, which is not equal to DCI format1 _u0 length 62bits, and the length of DCI format 2 _u1 is 66bits, which is not equal to DCI format1 _u0 length 62bits, then DCI format 2 _u0 and DCI format 2 _u1 occupy 2 DCI length budgets. Secondly, the length of DCI format0 \u1 in USS B is 62bits, which is equal to the length of DCI format1 \u0 in CSS A, and the length of DCI format1 \u1 is 63bits, which is not equal to the length of DCI format1 \u0 in CSS A, which is 62bits. Finally, the length of the DCI format 1-1 in the USS B is 63bits, which is not equal to the lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B, and the length of the DCI format0 _1is 63bits, which is not equal to the lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B. At this time, the bit lengths of DCI format0 _1and DCI format1 _1in USS B occupy 1 different DCI lengths in the DCI scrambled by C-RNTI.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 _0of the CSS a is aligned to the DCI format1_0, and thus only occupies 1 different DCI lengths and occupies 1 different length of C-RNTI scrambled DCI, the lengths of the DCI format 2 _0and the DCI format 2 _1of the CSS B occupy 2 DCI length budgets, the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B occupy 1 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 0 DCI length budget and 1C-scrambled DCI length budget remain.
Step five: and analyzing the situation of the USS A according to the results of the first step to the fourth step. At this time, in the above example, a total of 4 different DCI lengths, i.e., 62,63, 65, 66, occur, and the different bit numbers of the C-RNTI scrambled DCI are 2, i.e., 62,63, so that DCI format0 _0and DCI format1 _0in USS a can no longer occur with different DCI lengths, and thus DCI format0 _0and DCI format1 _0in USS a can only be pulled to the length of DCI format1 _0in CSS a, i.e., 62bits. At this time, the aligned DCI length satisfies the DCI length budget.
Example seventeen
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the length of DCI format 2 \u0 and DCI format 2 \u1 in CSS B is determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \u0 and the DCI format 2 \u1 in the CSS B are naturally configured to be different from each other and are not equal to the DCI format1 \u0 in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are naturally configured to be not equal to each other, and the bit length difference of the DCI format0 _1and the DCI format1 _1is equal to 1, and a smaller one of the bit lengths of the DCI format0 _1and the DCI format1 _1is equal to the bit length of the DCI format 10 in the CSS a, and the bit lengths of the DCI format0 _1and the format1 _1in the USS B are equal to any one of the bit lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B, the DCI format0 _1and the DCI format1 _1in the CSS B occupy different DCI length in the DCI format C-RNTI.
It should be noted that, in the above step one to step three, the calculation of the DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is performed, and the DCI length in CSS B is analyzed. For example, if DCI format 2 \u0 length is 63bits in CSS B, which is not equal to DCI format1 \u0 length 62bits, and DCI format 2 \u1 length is 66bits, which is not equal to DCI format1 \u0 length 62bits, DCI format 2 \u0 and DCI format 2 \u1 occupy 2 DCI length budgets. Secondly, the length of DCI format0 _u1 in USS B is 62bits, which is equal to the length of DCI format1 _u0 in CSS A, 62bits, and the length of DCI format1 _u1 is 63bits, which is not equal to the length of DCI format1 _u0 in CSS A, 62bits. Finally, the length of the DCI format 0-1 in the USS B is 62bits, the length is different from the length of the DCI format 2 _u0 and the DCI format 2 _u1 in the CSS B, the length of the DCI format1 _u1 is 63bits, the length is equal to the length of the DCI format 2 _u0 in the CSS B, but is different from the DCI format 2 _u1. At this time, the bit lengths of DCI format0 _1and DCI format1 _1in USS B occupy 1 different DCI lengths in the DCI scrambled by C-RNTI.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 _0of the CSS a is aligned to the DCI format1_0, and thus only occupies 1 different DCI lengths and occupies 1 different length of C-RNTI scrambled DCI, the lengths of the DCI format 2 _0and the DCI format 2 _1of the CSS B occupy 2 DCI length budgets, the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B occupy 1 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 1DCI length budget and 1C-scrambled DCI length budget remain.
Step five: and analyzing the USS A condition according to the results of the first step to the fourth step. At this time, in the above example, 3 different DCI lengths, i.e., 62,63, 66, and the different number of bits of the C-RNTI-scrambled DCI is 3, i.e., 62,63,64, a total of 3 different DCI formats, i.e., 62,63,64, may occur, and thus DCI format0 _0and DCI format1 _0may also occur at most 1 different DCI lengths in USS a, and are C-RNTI-scrambled DCIs, and thus DCI format0 _0and DCI format1 _0are aligned to the longer length of the two in USS a. At this time, the aligned DCI length satisfies the DCI length budget.
EXAMPLE eighteen
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 \u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \ "0 and the DCI format 2 \" 1 in the CSS B are naturally configured to be different from each other and either one of the lengths is equal to the DCI format1 \ "0 in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are naturally configured to be different, and the bit length difference between the DCI format0 _1and the DCI format1 _1is equal to 1, and the smaller one of the bit lengths of the DCI format0 _1and the DCI format1 _1is equal to the bit length of the DCI format1 _0in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format 1_1 _1in the USS B are not equal to the bit lengths of the DCI format 2 _0and the DCI format 2_ _1in the CSS B, the DCI format0 _1and the DCI format1 in the USS B occupy different scrambling bit lengths of the DCI format C-1 in the CSS B.
It should be noted that, in the above step one to step three, the calculation of DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is performed, and the DCI length in CSS B is analyzed. For example, the length of DCI format 2 \u0 in CSS B is 62bits, which is equal to the length of DCI format1 \u0 62bits, and the length of DCI format 2 \u1 is 64bits, which is not equal to the length of DCI format1 _u0 62bits, then DCI format 2 _u0 and DCI format 2 _u1 occupy 1DCI length budget. Secondly, the length of DCI format0 \u1 in USS B is 62bits, which is equal to the length of DCI format1 \u0 in CSS A, and the length of DCI format1 \u1 is 63bits, which is not equal to the length of DCI format1 \u0 in CSS A, which is 62bits. Finally, the length of the DCI format 1-1 in the USS B is 63bits, which is not equal to the lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B, and the length of the DCI format0 _1is 63bits, which is not equal to the lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B. At this time, the bit lengths of DCI format0 _1and DCI format1 _1in USS B occupy 1 different DCI lengths in the DCI scrambled by C-RNTI.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 _0of the CSS a is aligned to the DCI format1_0, and thus only occupies 1 different DCI lengths and occupies 1 different length of C-RNTI scrambled DCI, the lengths of the DCI format 2 _0and the DCI format 2 _1of the CSS B occupy 1DCI length budget, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B occupy 1 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 1DCI length budget and 1C-scrambled DCI length budget are left.
Step five: and analyzing the situation of the USS A according to the results of the first step to the fourth step. At this time, in the above example, 3 different DCI lengths, i.e., 62,63,64, occur in total, and the different number of bits of the C-RNTI-scrambled DCI is 2, i.e., 62,63, so that 1 different DCI lengths may occur at most in DCI format0 and DCI format1 \u0 in USS a, and is a DCI scrambled by C-RNTI, and thus DCI format0 and DCI format1 \u0 in USS a are aligned to the longer length of the two. At this time, the aligned DCI length satisfies the DCI length budget.
Example nineteen
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \ "and the DCI format 2 \" 1 in the CSS B are naturally configured to be different from each other and either one of the lengths is equal to the DCI format1 \ "0 in the CSS a, and the bit lengths of the DCI format0 \" 1 and the DCI format1 \ "1 in the USS B are naturally configured to be different from each other and the difference in the bit lengths of the DCI format0 \" 1 and the DCI format1 \ "1 is equal to 1, and the smaller one of the bit lengths of the DCI format0 \" 1 and the DCI format1 \ "1 is equal to the bit length of the DCI format1 \" 0 in the CSS a, and the bit lengths of the DCI format0 \ "1 and the DCI format1 \" 1 in the USS B are equal to either one of the bit lengths of the DCI format 2 \ "0 and the DCI format 2 \" 1 \ "in the CSS B, the DCI format0 \" 1 and the DCI format1 \ "occupy different bit lengths of the DCI format C-RNTI.
It should be noted that, in the above step one to step three, the calculation of DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, if the DCI format 2 \u0 length in CSS B is 62bits, which is equal to DCI format1 \u0 length 62bits, and the DCI format 2 \u1 length is 63bits, which is not equal to DCI format1 \u0 length 62bits, DCI format 2 _u0 and DCI format 2 _u1 occupy 1DCI length budget. Secondly, the length of DCI format0 \u1 in USS B is 62bits, which is equal to the length of DCI format1 \u0 in CSS A, and the length of DCI format1 \u1 is 63bits, which is not equal to the length of DCI format1 \u0 in CSS A, which is 62bits. Finally, the length of the DCI format 0-1 in the USS B is 63bits, which is equal to the length of the DCI format 2 \u1 in the CSS B, and the length of the DCI format1 \u1 is 63bits, which is equal to the length of the DCI format 2 \u1 in the CSS B but not equal to the DCI format 2 \u0. At this time, the bit lengths of DCI format0 \u1 and DCI format1 \u1 in USS B occupy 1 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 _0of the CSS a is aligned to the DCI format1_0, and thus only occupies 1 different DCI lengths and occupies 1 different length of C-RNTI scrambled DCI, the lengths of the DCI format 2 _0and the DCI format 2 _1of the CSS B occupy 1DCI length budget, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B occupy 2 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 2 DCI length budgets and 1C-scrambled DCI length budget remain.
Step five: and analyzing the USS A condition according to the results of the first step to the fourth step. At this time, in the above example, 2 different DCI lengths, i.e., 62,63, are present in total, and the different number of bits of the C-RNTI scrambled DCI is 3, i.e., 62,63, so that DCI format0 \u0 and DCI format1 \u0 in USS a can also present at most 1 different DCI lengths, and are C-RNTI scrambled DCIs, and thus DCI format0 \u0 and DCI format1 \u0 in USS a are aligned to the longer length of the two. At this time, the aligned DCI length satisfies the DCI length budget.
Example twenty
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B are naturally configured to be equal and not equal to the DCI format1 _0in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are naturally configured to be not equal, and the bit length difference of the DCI format0 _1and the DCI format1 _1is equal to 1, and the smaller one of the bit lengths of the DCI format0 _1and the DCI format1 _1is equal to the bit length of the DCI format1 _0in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are not equal to the bit lengths of the DCI format 2 u 0 and the DCI format 2 _1in the CSS B, the bit lengths of the DCI format0 _1and the DCI format1 in the CSS B occupy different DCI format C-1 scrambling lengths in the CSS RNTI.
It should be noted that, in the above step one to step three, the calculation of DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is performed, and the DCI length in CSS B is analyzed. For example, the length of DCI format 2 \u0 and the length of DCI format 2 \u1 in CSS B are equal to each other and are 64bits, and are not equal to DCI format1 \u0 and 62bits, so that DCI format 2 _u0 and DCI format 2 _u1 occupy 1DCI length budget. Secondly, the length of DCI format0 \u1 in USS B is 62bits, which is equal to the length of DCI format1 \u0 in CSS A, and the length of DCI format1 \u1 is 63bits, which is not equal to the length of DCI format1 \u0 in CSS A, which is 62bits. Finally, the length of the DCI format 1-1 in the USS B is 63bits, the length is not equal to the length of the DCI format 2 _0and the DCI format 2 _1in the CSS B, the length of the DCI format0 _1is 63bits, and the length is not equal to the length of the DCI format 2 _0and the DCI format 2 _1in the CSS B. At this time, the bit lengths of DCI format0 _1and DCI format1 _1in USS B occupy 1 different DCI lengths in the DCI scrambled by C-RNTI.
It should be understood that the execution sequence of the above steps one to three is not required in the embodiments of the present application, but the steps one to three must be executed before the following step four.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 _0of the CSS a is aligned to the DCI format1_0, and thus only occupies 1 different DCI lengths and occupies 1 different length of C-RNTI scrambled DCI, the lengths of the DCI format 2 _0and the DCI format 2 _1of the CSS B occupy 1DCI length budget, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B occupy 1 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 1DCI length budget and 1C-scrambled DCI length budget are left.
Step five: and analyzing the USS A condition according to the results of the first step to the fourth step. At this time, in the above example, 3 different DCI lengths, i.e., 62,63,64, and the different number of bits of the C-RNTI-scrambled DCI is 2, i.e., 62,63, occur in total, and thus DCI format0 \u0 and DCI format1 \u0 may also occur in at most 1 different DCI lengths in USS a, and are C-RNTI-scrambled DCIs, and thus DCI format0 u 0 and DCI format1 \u0 in USS a are aligned to the longer length of the two. At this time, the aligned DCI length satisfies the DCI length budget.
Example twenty one
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \u0 and the DCI format 2 \u1 in the CSS B are naturally configured to be equal and not equal to the DCI format1 \u0 in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B are naturally configured to be not equal, and the bit length difference of the DCI format0 _1and the DCI format1 _1is equal to 1, and the smaller one of the bit lengths of the DCI format0 _1and the DCI format1 _1is equal to the bit length of the DCI format1 _0in the CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B and the bit lengths of the DCI format 2 _0and the DCI format1 _1in the CSS B are both equal to the bit lengths of the DCI format 2 u 0 and the DCI format 2 _1in the CSS B, the DCI format0 _1occupies different DCI lengths in the CSS C-RNTI.
It should be noted that, in the above step one to step three, the calculation of DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, the length of DCI format 2 \u0 and the length of DCI format 2 \u1 in CSS B are equal to 63bits, and are not equal to DCI format1 \u0 length 62bits, so that DCI format 2 _u0 and DCI format 2 _u1 occupy 1DCI length budget. Secondly, the length of DCI format0 _u1 in USS B is 62bits, which is equal to the length of DCI format1 _u0 in CSS A, 62bits, and the length of DCI format1 _u1 is 63bits, which is not equal to the length of DCI format1 _u0 in CSS A, 62bits. Finally, the length of the DCI format 1-1 in the USS B is 63bits, which is equal to the length of the DCI format 2 _1in the CSS B, and the length of the DCI format0 _1is 63bits, which is equal to the length of the DCI format 2 _0in the CSS B. At this time, the bit lengths of DCI format0 \u1 and DCI format1 \u1 in USS B occupy 1 different DCI lengths in the C-RNTI scrambled DCI.
It should be understood that the present embodiment does not require the execution sequence between the first step to the third step, but the first step to the third step must be executed before the fourth step.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 \u0 of the CSS a is aligned to the DCI format1 \u0, and thus occupies only 1 different DCI length and occupies 1 different length of C-RNTI scrambled DCI, the lengths of the DCI format 2 _u0 and DCI format 2 _u1 of the CSS B occupy 1DCI length budget, the bit lengths of the DCI format0 _1and DCI format1 _u1 in the USS B occupy 1 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 2 DCI length budgets and 1C-scrambled DCI length budget remain.
Step five: and analyzing the situation of the USS A according to the results of the first step to the fourth step. At this time, in the above example, 2 different DCI lengths, i.e., 62,63, occur altogether, and the different number of bits of the C-RNTI-scrambled DCI is 2, i.e., 62,63, so that DCI format0 _0and DCI format1 _0may occur at most 1 different DCI lengths in USS a, and are C-RNTI-scrambled DCIs possible, and thus DCI format0 u 0 and DCI format1 _0are aligned to be longer in both lengths in USS a. At this time, the aligned DCI length satisfies the DCI length budget.
Example twenty two
The method comprises the following steps: the length of DCI format0 \u0 and the length of DCI format1 _u0 in CSS a are determined. Specifically, the length of DCI format0 \u0 in CSS a is pulled up to the length of DCI format1 \u0.
Step two: the lengths of DCI format 2 _0and DCI format 2 _1in CSS B are determined.
Step three: the following analysis is based on the configuration of CSS B and USS B, respectively. When the bit lengths of the DCI format 2 \u0 and the DCI format 2 \u1 in CSS B are naturally configured to be equal and to the DCI format1 \u0 in CSS a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in USS B are naturally configured to be unequal, and the bit length difference of the DCI format0 _1and the DCI format1 _1is equal to 1, and the smaller of the bit lengths of the DCI format0 _1and the DCI format1 _1is equal to the bit length of the DCI format1 _0in DCI a, and the bit lengths of the DCI format0 _1and the DCI format1 _1in USS B are both different from the bit lengths of the DCI format 2 u 0 and the DCI format 2 _1in CSS B, the bit lengths of the DCI format0 _1and the DCI format1 in usb occupy different DCI format1 lengths in the DCI format C-DCI RNTI.
It should be noted that, in the above step one to step three, the calculation of DCI length budget is not performed, that is, the terminal side device or the network side device does not count the number of different DCI lengths.
In the following, a specific example is used to analyze the DCI length in CSS B. For example, if the length of DCI format 2 \u0 and the length of DCI format 2 \u1 in CSS B are equal to each other, both are 62bits, and if the length is equal to DCI format1 \u0 and 62bits, DCI format 2 _0and DCI format 2 _1occupy 0 DCI length budget. Secondly, the length of DCI format0 _u1 in USS B is 62bits, which is equal to the length of DCI format1 _u0 in CSS A, 62bits, and the length of DCI format1 _u1 is 63bits, which is not equal to the length of DCI format1 _u0 in CSS A, 62bits. Finally, the length of the DCI format 1-1 in the USS B is 63bits, which is not equal to the lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B, and the length of the DCI format0 _1is 63bits, which is not equal to the lengths of the DCI format 2 _0and the DCI format 2 _1in the CSS B. At this time, the bit lengths of DCI format0 _1and DCI format1 _1in USS B occupy 1 different DCI lengths in the DCI scrambled by C-RNTI.
It should be understood that the present embodiment does not require the execution sequence between the first step to the third step, but the first step to the third step must be executed before the fourth step.
Step four: and calculating DCI length budget, namely calculating the number of different DCI lengths. In the first step, the DCI format0 _0of the CSS a is aligned to the DCI format1_0, and thus only occupies 1 different DCI lengths and occupies 1 different length of C-RNTI scrambled DCI, the lengths of the DCI format 2 _0and the DCI format 2 _1of the CSS B occupy 0 DCI length budget, and the bit lengths of the DCI format0 _1and the DCI format1 _1in the USS B occupy 1 different DCI lengths in the C-RNTI scrambled DCI, and at this time, 2 DCI length budgets and 1C-scrambled DCI length budget remain.
Step five: and analyzing the USS A condition according to the results of the first step to the fourth step. At this time, in the above example, 2 different DCI lengths, i.e., 62,63, occur altogether, and the different number of bits of the C-RNTI-scrambled DCI is 2, i.e., 62,63, so that DCI format0 _0and DCI format1 _0may occur at most 1 different DCI lengths in USS a, and are C-RNTI-scrambled DCIs possible, and thus DCI format0 u 0 and DCI format1 _0are aligned to be longer in both lengths in USS a. At this time, the aligned DCI satisfies the DCI length budget.
It should be understood that the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
The method for transmitting downlink control information according to the embodiment of the present application is described in detail above with reference to fig. 1 to 3, and the apparatus for transmitting downlink control information according to the embodiment of the present application is described in detail below with reference to fig. 4 to 5.
Fig. 4 shows an apparatus 400 for transmitting downlink control information according to an embodiment of the present application, where the apparatus 400 may be a terminal side device or a chip in the terminal side device, and the apparatus may be a network side device or a chip in the network side device. The apparatus 400 comprises: a transceiving unit 410 and a processing unit 420.
In one possible implementation manner, the apparatus 400 is configured to execute the respective flows and steps corresponding to the terminal-side device in the method 200.
The transceiving unit 410 is configured to: receiving first configuration information from a network side device, wherein the first configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI and sixth DCI;
the processing unit 420 is configured to: according to the first configuration information, determining a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI and a monitoring bit length of the sixth DCI.
Optionally, the first DCI has a same monitoring bit length as the second DCI through a zero padding operation or a puncturing operation, the monitoring bit length of the third DCI is the same as the monitoring bit length of the fourth DCI, the monitoring bit length of the third DCI is different from the monitoring bit length of the second DCI, the monitoring bit length of the fifth DCI is different from the monitoring bit length of the sixth DCI, and the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI are both different from the monitoring bit length of the second DCI.
Optionally, the first DCI has a same monitoring bit length as the second DCI through a zero padding operation or a puncturing operation, the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI are both different from the monitoring bit length of the second DCI, and at least one of the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI is the same as the monitoring bit length of the second DCI.
In another possible implementation manner, the apparatus 400 is configured to execute the respective procedures and steps corresponding to the network-side device in the method 200.
The transceiver unit 410 is configured to: sending first configuration information to terminal side equipment, wherein the first configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI and sixth DCI;
the processing unit 420 is configured to: determining, by a zero padding operation or a puncturing operation, a bit length to be transmitted of the first DCI, a bit length to be transmitted of the second DCI, a bit length to be transmitted of the third DCI, a bit length to be transmitted of the fourth DCI, a bit length to be transmitted of the fifth DCI, and a bit length to be transmitted of the sixth DCI.
Optionally, the first DCI has a same bit length to be transmitted as the second DCI through a zero padding operation or a puncturing operation, the bit length to be transmitted of the third DCI is the same as the bit length to be transmitted of the fourth DCI, the bit length to be transmitted of the third DCI is different from the bit length to be transmitted of the second DCI, the bit length to be transmitted of the fifth DCI is different from the bit length to be transmitted of the sixth DCI, and both the bit length to be transmitted of the fifth DCI and the bit length to be transmitted of the sixth DCI are different from the bit length to be transmitted of the second DCI.
Optionally, the first DCI has a same bit length to be transmitted as the second DCI through a zero padding operation or a puncturing operation, the bit length to be transmitted of the third DCI and the bit length to be transmitted of the fourth DCI are both different from the bit length to be transmitted of the second DCI, and at least one of the bit length to be transmitted of the fifth DCI and the bit length to be transmitted of the sixth DCI is the same as the bit length to be transmitted of the second DCI.
In another possible implementation manner, the apparatus 400 is configured to execute the respective flows and steps corresponding to the terminal-side device in the method 300.
The transceiver unit 410 is configured to: the second configuration information is used for receiving second configuration information from a network side device, and the second configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, sixth DCI, seventh DCI and eighth DCI;
the processing unit 420 is configured to: determining, according to the second configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, a monitoring bit length of the sixth DCI, a monitoring bit length of the seventh DCI, and a monitoring bit length of the eighth DCI.
Optionally, when any of the following conditions is satisfied, by zero padding, the monitoring bit length of the fifth DCI is different from the monitoring bit length of the sixth DCI, and both the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI are different from the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, and the monitoring bit length of the eighth DCI:
by the configuration of the second configuration information, a difference between an original bit length of the fifth DCI and an original bit length of the sixth DCI is greater than or equal to 2; or
Through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is different from the monitoring bit length of the second DCI.
Optionally, when any of the following conditions is met, through a zero padding operation, the monitoring bit length of the fifth DCI is the same as the monitoring bit length of the sixth DCI, and is different from the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, and the monitoring bit length of the eighth DCI; or the monitoring bit length of the fifth DCI is different from the monitoring bit length of the sixth DCI, and the monitoring bit length of the fifth DCI or the monitoring bit length of the sixth DCI is the same as the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, or the monitoring bit length of the eighth DCI:
through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is the same as the monitored bit length of the second DCI; or
By the configuration of the second configuration information, the original bit length of the fifth DCI is the same as the original bit length of the sixth DCI.
In another possible implementation manner, the apparatus 400 is configured to execute the respective procedures and steps corresponding to the network-side device in the method 300.
The transceiver unit 410 is configured to: sending second configuration information to terminal side equipment, wherein the second configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, sixth DCI, seventh DCI and eighth DCI;
the processing unit 420 is configured to: determining, through zero padding or truncation operation, a bit length to be transmitted of the first DCI, a bit length to be transmitted of the second DCI, a bit length to be transmitted of the third DCI, a bit length to be transmitted of the fourth DCI, a bit length to be transmitted of the fifth DCI, a bit length to be transmitted of the sixth DCI, a bit length to be transmitted of the seventh DCI, and a bit length to be transmitted of the eighth DCI.
Optionally, when any of the following conditions is met, through a zero padding operation, the to-be-transmitted bit length of the fifth DCI is different from the to-be-transmitted bit length of the sixth DCI, and both the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI are different from the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, and the monitoring bit length of the eighth DCI:
by the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is greater than or equal to 2; or
Through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is different from the bit length of the second DCI to be transmitted.
Optionally, when any one of the following conditions is met, through zero padding, the bit length to be sent of the fifth DCI is the same as the bit length to be sent of the sixth DCI and is different from the bit length to be sent of the second DCI, the bit length to be sent of the seventh DCI, and the bit length to be sent of the eighth DCI; or the bit length to be transmitted of the fifth DCI is different from the bit length to be transmitted of the sixth DCI, and the bit length to be transmitted of the fifth DCI or the bit length to be transmitted of the sixth DCI is the same as the bit length to be transmitted of the second DCI, the bit length to be transmitted of the seventh DCI, or the bit length to be transmitted of the eighth DCI:
through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is the same as the bit length of the second DCI to be transmitted; or
By the configuration of the second configuration information, the original bit length of the fifth DCI is the same as the original bit length of the sixth DCI.
It should be appreciated that the apparatus 400 herein is embodied in the form of a functional unit. The term "unit" herein may refer to an Application Specific Integrated Circuit (ASIC), an electronic circuit, a processor (e.g., a shared, dedicated, or group processor) and memory that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that support the described functionality. In an optional example, it may be understood by those skilled in the art that the apparatus 400 may be specifically a terminal side device or a network side device in the foregoing embodiment, and the apparatus 400 may be configured to perform each procedure and/or step corresponding to the terminal side device or the network side device in the foregoing method embodiment, and is not described herein again to avoid repetition.
The apparatus 400 of each of the above schemes has a function of implementing corresponding steps executed by the terminal side device or the network side device in the above method; the functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software comprises one or more modules corresponding to the functions; for example, the transmitting unit may be replaced by a transmitter, the receiving unit may be replaced by a receiver, other units, such as the determining unit, may be replaced by a processor, and the transceiving operation and the related processing operation in the respective method embodiments are respectively performed.
In the embodiment of the present application, the apparatus in fig. 4 may also be a chip or a chip system, for example: system on chip (SoC). Correspondingly, the receiving unit and the transmitting unit may be a transceiver circuit of the chip, and are not limited herein.
Fig. 5 illustrates another apparatus 500 for transmitting downlink control information according to an embodiment of the present application. The apparatus 500 includes a processor 510, a transceiver 520, and a memory 530. Wherein the processor 510, the transceiver 520 and the memory 530 are in communication with each other via an internal connection path, the memory 530 is configured to store instructions, and the processor 510 is configured to execute the instructions stored in the memory 530 to control the transceiver 520 to transmit and/or receive signals.
In one possible implementation manner, the apparatus 400 is configured to execute the respective flows and steps corresponding to the terminal-side device in the method 200.
The transceiving unit 410 is configured to: receiving first configuration information from a network side device, wherein the first configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI and sixth DCI;
the processing unit 420 is configured to: according to the first configuration information, determining a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI and a monitoring bit length of the sixth DCI.
In another possible implementation manner, the apparatus 400 is configured to execute the respective procedures and steps corresponding to the network-side device in the method 200.
The transceiver unit 410 is configured to: sending first configuration information to terminal side equipment, wherein the first configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI and sixth DCI;
the processing unit 420 is configured to: determining, by a zero padding operation or a puncturing operation, a bit length to be transmitted of the first DCI, a bit length to be transmitted of the second DCI, a bit length to be transmitted of the third DCI, a bit length to be transmitted of the fourth DCI, a bit length to be transmitted of the fifth DCI, and a bit length to be transmitted of the sixth DCI.
In another possible implementation manner, the apparatus 400 is configured to execute the respective flows and steps corresponding to the terminal-side device in the method 300.
The transceiver unit 410 is configured to: the second configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, sixth DCI, seventh DCI and eighth DCI;
the processing unit 420 is configured to: determining, according to the second configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, a monitoring bit length of the sixth DCI, a monitoring bit length of the seventh DCI, and a monitoring bit length of the eighth DCI.
In another possible implementation manner, the apparatus 400 is configured to execute the respective procedures and steps corresponding to the network-side device in the method 300.
The transceiving unit 410 is configured to: sending second configuration information to terminal side equipment, wherein the second configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, sixth DCI, seventh DCI and eighth DCI;
the processing unit 420 is configured to: determining, through zero padding or puncturing, a bit length to be transmitted of the first DCI, a bit length to be transmitted of the second DCI, a bit length to be transmitted of the third DCI, a bit length to be transmitted of the fourth DCI, a bit length to be transmitted of the fifth DCI, a bit length to be transmitted of the sixth DCI, a bit length to be transmitted of the seventh DCI, and a bit length to be transmitted of the eighth DCI.
It should be understood that the apparatus 500 may be embodied as a terminal side device or a network side device in the foregoing embodiments, and may be configured to perform each step and/or flow corresponding to the terminal side device or the network side device in the foregoing method embodiments. Alternatively, the memory 530 may include a read-only memory and a random access memory, and provide instructions and data to the processor. The portion of memory may also include non-volatile random access memory. For example, the memory may also store device type information. The processor 510 may be configured to execute instructions stored in the memory, and when the processor 510 executes the instructions stored in the memory, the processor 510 is configured to execute the steps and/or processes of the method embodiments corresponding to the terminal-side device or the network-side device.
It should be understood that in the embodiment of the present application, the processor of the above apparatus may be a Central Processing Unit (CPU), and the processor may also be other general processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or by instructions in the form of software. The steps of a method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software elements in a processor. The software elements may be located in ram, flash, rom, prom, or eprom, registers, among other storage media that are well known in the art. The storage medium is located in a memory, and a processor executes instructions in the memory, in combination with hardware thereof, to perform the steps of the above-described method. To avoid repetition, it is not described in detail here.
In the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated object, indicating that there may be three relationships, for example, a and/or B, which may indicate: a exists singly, A and B exist simultaneously, and B exists singly, wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c or a-b-c, wherein a, b and c can be single or multiple.
Those of ordinary skill in the art will appreciate that the various method steps and elements described in connection with the embodiments disclosed herein can be implemented as electronic hardware, computer software, or combinations of both, and that the steps and elements of the embodiments are generally described in the foregoing description as functional or software interchange, for the purpose of clearly illustrating the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the elements may be selected according to actual needs to achieve the purpose of the solution of the embodiments of the present application.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially or partially contributed by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (28)

1. A method for transmitting downlink control information, comprising:
the method comprises the steps that terminal side equipment receives first configuration information from network side equipment, wherein the first configuration information is used for configuring first Downlink Control Information (DCI), second DCI, third DCI, fourth DCI, fifth DCI and sixth DCI;
the terminal side device determines, according to the first configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, and a monitoring bit length of the sixth DCI;
wherein the first DCI is a DCI format0 _0in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _1in a user-specific search space USS;
the fourth DCI is DCI format1 _1in the USS;
the fifth DCI is DCI format 2_0 in the CSS;
the sixth DCI is DCI format 2 \u1 in the CSS;
and performing zero padding operation or truncation operation on the first DCI to obtain the same monitoring bit length as the second DCI, wherein the monitoring bit length of the third DCI is the same as that of the fourth DCI, the monitoring bit length of the third DCI is different from that of the second DCI, the monitoring bit length of the fifth DCI is different from that of the sixth DCI, and the monitoring bit length of the fifth DCI and that of the sixth DCI are both different from that of the second DCI.
2. The method of claim 1, wherein by configuring the first configuration information, an original bit length of the third DCI is the same as an original bit length of the fourth DCI, an original bit length of the fifth DCI is different from an original bit length of the sixth DCI, and both the original bit length of the fifth DCI and the original bit length of the sixth DCI are different from the original bit length of the second DCI;
the determining, by the terminal side device according to the first configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, and a monitoring bit length of the sixth DCI includes:
the terminal side device determines the original bit length of the second DCI, the original bit length of the fifth DCI and the original bit length of the sixth DCI as the monitoring bit length of the second DCI, the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI respectively;
if the original bit length of the third DCI is different from the monitoring bit length of the second DCI, the terminal-side device determines the original bit length of the third DCI and the original bit length of the fourth DCI as the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI;
if the original bit length of the third DCI is the same as the monitoring bit length of the second DCI, the terminal-side device performs an operation of complementing 1 zero bit on the original bit length of the third DCI and the original bit length of the fourth DCI, respectively, to obtain the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI.
3. A method for transmitting downlink control information, comprising:
the method comprises the steps that terminal side equipment receives first configuration information from network side equipment, wherein the first configuration information is used for configuring first Downlink Control Information (DCI), second DCI, third DCI, fourth DCI, fifth DCI and sixth DCI;
the terminal side device determines, according to the first configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, and a monitoring bit length of the sixth DCI;
wherein the first DCI is a DCI format0 _0in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _1in a user-specific search space USS;
the fourth DCI is DCI format1 \u1 in the USS;
the fifth DCI is DCI format 2_0 in the CSS;
the sixth DCI is DCI format 2 \u1 in the CSS;
and performing zero padding operation or puncturing operation on the first DCI to obtain a monitoring bit length which is the same as that of the second DCI, wherein the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI are both different from that of the second DCI, and at least one of the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI is the same as that of the second DCI.
4. The method according to claim 3, wherein at least one of an original bit length of the fifth DCI and an original bit length of the sixth DCI is the same as an original bit length of the second DCI through configuration of the first configuration information;
the determining, by the terminal side device according to the first configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, and a monitoring bit length of the sixth DCI includes:
and the terminal side equipment determines the original bit length of the fifth DCI and the original bit length of the sixth DCI as the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI respectively.
5. A method for transmitting downlink control information, comprising:
the method comprises the steps that network side equipment sends first configuration information to terminal side equipment, wherein the first configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI and sixth DCI;
the network side device determines, through a zero padding operation or a truncation operation, a bit length to be transmitted of the first DCI, a bit length to be transmitted of the second DCI, a bit length to be transmitted of the third DCI, a bit length to be transmitted of the fourth DCI, a bit length to be transmitted of the fifth DCI, and a bit length to be transmitted of the sixth DCI;
wherein the first DCI is a DCI format0 \/0 in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _1in a user-specific search space USS;
the fourth DCI is DCI format1 \u1 in the USS;
the fifth DCI is DCI format 2_0 in the CSS;
the sixth DCI is DCI format 2 \u1 in the CSS;
and performing zero padding operation or truncation operation on the first DCI to obtain a bit length to be transmitted which is the same as that of the second DCI, wherein the bit length to be transmitted of the third DCI is the same as that of the fourth DCI, the bit length to be transmitted of the third DCI is different from that of the second DCI, the bit length to be transmitted of the fifth DCI is different from that of the sixth DCI, and the bit length to be transmitted of the fifth DCI and the bit length to be transmitted of the sixth DCI are both different from that of the second DCI.
6. The method of claim 5, wherein by configuring the first configuration information, an original bit length of the third DCI is the same as an original bit length of the fourth DCI, an original bit length of the fifth DCI is different from an original bit length of the sixth DCI, and both the original bit length of the fifth DCI and the original bit length of the sixth DCI are different from an original bit length of the second DCI;
the determining, by the network side device through a zero padding operation or a truncating operation, a bit length to be sent of the first DCI, a bit length to be sent of the second DCI, a bit length to be sent of the third DCI, a bit length to be sent of the fourth DCI, a bit length to be sent of the fifth DCI, and a bit length to be sent of the sixth DCI includes:
the network side device determines an original bit length of the second DCI, an original bit length of the fifth DCI, and an original bit length of the sixth DCI as a bit length of the second DCI to be transmitted, a bit length of the fifth DCI to be transmitted, and a bit length of the sixth DCI to be transmitted, respectively;
if the original bit length of the third DCI is different from the bit length to be transmitted of the second DCI, the network side device determines the original bit length of the third DCI and the original bit length of the fourth DCI as the bit length to be transmitted of the third DCI and the bit length to be transmitted of the fourth DCI;
if the original bit length of the third DCI is the same as the bit length to be transmitted of the second DCI, the network side device performs an operation of supplementing 1 zero bit to the original bit length of the third DCI and the original bit length of the fourth DCI, so as to obtain the bit length to be transmitted of the third DCI and the bit length to be transmitted of the fourth DCI.
7. A method for transmitting downlink control information, comprising:
the method comprises the steps that network side equipment sends first configuration information to terminal side equipment, wherein the first configuration information is used for configuring first Downlink Control Information (DCI), second DCI, third DCI, fourth DCI, fifth DCI and sixth DCI;
the network side device determines, through a zero padding operation or a truncation operation, a bit length to be transmitted of the first DCI, a bit length to be transmitted of the second DCI, a bit length to be transmitted of the third DCI, a bit length to be transmitted of the fourth DCI, a bit length to be transmitted of the fifth DCI, and a bit length to be transmitted of the sixth DCI;
wherein the first DCI is a DCI format0 _0in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _1in a user-specific search space USS;
the fourth DCI is DCI format1 _1in the USS;
the fifth DCI is DCI format 2_0 in the CSS;
the sixth DCI is DCI format 2_1 in the CSS;
the first DCI has a bit length to be transmitted which is the same as that of the second DCI through zero padding operation or truncation operation, the bit length to be transmitted of the third DCI and the bit length to be transmitted of the fourth DCI are both different from that of the second DCI, and at least one of the bit length to be transmitted of the fifth DCI and the bit length to be transmitted of the sixth DCI is the same as that of the second DCI.
8. The method according to claim 7, wherein at least one of an original bit length of the fifth DCI and an original bit length of the sixth DCI is the same as an original bit length of the second DCI by the configuration of the first configuration information;
the determining, by the network side device through a zero padding operation or a truncating operation, a bit length to be sent of the first DCI, a bit length to be sent of the second DCI, a bit length to be sent of the third DCI, a bit length to be sent of the fourth DCI, a bit length to be sent of the fifth DCI, and a bit length to be sent of the sixth DCI includes:
and the network side equipment determines the original bit length of the fifth DCI and the original bit length of the sixth DCI as the bit length to be sent of the fifth DCI and the bit length to be sent of the sixth DCI respectively.
9. A method for transmitting downlink control information, comprising:
the terminal side equipment receives second configuration information from the network side equipment, wherein the second configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, sixth DCI, seventh DCI and eighth DCI;
the terminal side device determines, according to the second configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, a monitoring bit length of the sixth DCI, a monitoring bit length of the seventh DCI, and a monitoring bit length of the eighth DCI;
wherein the first DCI is a DCI format0 _0in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _0in a user-specific search space, USS;
the fourth DCI is DCI format1 _0in the USS;
the fifth DCI is DCI format0_1 in the USS;
the sixth DCI is DCI format1 _1in the USS;
the seventh DCI is DCI format 2_0 in the CSS;
the eighth DCI is DCI format 2 \u1 in the CSS;
under the condition that any one of the following conditions is met, through zero padding, the monitoring bit length of the fifth DCI is different from the monitoring bit length of the sixth DCI, and both the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI are different from the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, and the monitoring bit length of the eighth DCI:
by the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is greater than or equal to 2; or
Through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is different from the listening bit length of the second DCI.
10. A method for transmitting downlink control information, comprising:
the terminal side equipment receives second configuration information from the network side equipment, wherein the second configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, sixth DCI, seventh DCI and eighth DCI;
the terminal side device determines, according to the second configuration information, a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the third DCI, a monitoring bit length of the fourth DCI, a monitoring bit length of the fifth DCI, a monitoring bit length of the sixth DCI, a monitoring bit length of the seventh DCI, and a monitoring bit length of the eighth DCI;
wherein the first DCI is a DCI format0 \/0 in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _0in a user-specific search space (USS);
the fourth DCI is DCI format1 _0in the USS;
the fifth DCI is DCI format0_1 in the USS;
the sixth DCI is DCI format1 _1in the USS;
the seventh DCI is DCI format 2_0 in the CSS;
the eighth DCI is DCI format 2 \u1 in the CSS;
under the condition that any one of the following conditions is met, through zero padding operation, the monitoring bit length of the fifth DCI is the same as that of the sixth DCI and is different from that of the second DCI, that of the seventh DCI and that of the eighth DCI; or the monitoring bit length of the fifth DCI is different from the monitoring bit length of the sixth DCI, and the monitoring bit length of the fifth DCI or the monitoring bit length of the sixth DCI is the same as the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, or the monitoring bit length of the eighth DCI:
through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is the same as the monitored bit length of the second DCI; or
By the configuration of the second configuration information, the original bit length of the fifth DCI is the same as the original bit length of the sixth DCI.
11. The method according to claim 9 or 10, wherein the determining, by the terminal side device according to the second configuration information, the listening bit length of the first DCI, the listening bit length of the second DCI, the listening bit length of the third DCI, the listening bit length of the fourth DCI, the listening bit length of the fifth DCI, the listening bit length of the sixth DCI, the listening bit length of the seventh DCI, and the listening bit length of the eighth DCI includes:
the terminal side equipment determines the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI;
the terminal side device determines the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI according to the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI;
and the terminal side equipment determines the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI according to the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the fifth DCI, the monitoring bit length of the sixth DCI, the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI.
12. A method for transmitting downlink control information, comprising:
the network side equipment sends second configuration information to the terminal side equipment, wherein the second configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, sixth DCI, seventh DCI and eighth DCI;
the network side device determines, through zero padding or truncation operation, a bit length to be transmitted of the first DCI, a bit length to be transmitted of the second DCI, a bit length to be transmitted of the third DCI, a bit length to be transmitted of the fourth DCI, a bit length to be transmitted of the fifth DCI, a bit length to be transmitted of the sixth DCI, a bit length to be transmitted of the seventh DCI, and a bit length to be transmitted of the eighth DCI;
wherein the first DCI is a DCI format0 _0in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _0in a user-specific search space, USS;
the fourth DCI is DCI format1 _0in the USS;
the fifth DCI is DCI format0 _1in the USS;
the sixth DCI is DCI format1 _1in the USS;
the seventh DCI is DCI format 2_0 in the CSS;
the eighth DCI is DCI format 2 \u1 in the CSS;
under the condition that any one of the following conditions is met, through zero padding operation, the bit length to be transmitted of the fifth DCI is different from the bit length to be transmitted of the sixth DCI, and the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI are different from the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, and the monitoring bit length of the eighth DCI:
by the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is greater than or equal to 2; or
Through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is different from the bit length of the second DCI to be transmitted.
13. A method for transmitting downlink control information, comprising:
the network side equipment sends second configuration information to the terminal side equipment, wherein the second configuration information is used for configuring first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, sixth DCI, seventh DCI and eighth DCI;
the network side device determines, through zero padding or truncation operation, a bit length to be sent of the first DCI, a bit length to be sent of the second DCI, a bit length to be sent of the third DCI, a bit length to be sent of the fourth DCI, a bit length to be sent of the fifth DCI, a bit length to be sent of the sixth DCI, a bit length to be sent of the seventh DCI, and a bit length to be sent of the eighth DCI;
wherein the first DCI is a DCI format0 \/0 in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _0in a user-specific search space (USS);
the fourth DCI is DCI format1 _0in the USS;
the fifth DCI is DCI format0_1 in the USS;
the sixth DCI is DCI format1 _1in the USS;
the seventh DCI is DCI format 2_0 in the CSS;
the eighth DCI is DCI format 2 \u1 in the CSS;
under the condition that any one of the following conditions is met, through zero padding operation, the bit length to be sent of the fifth DCI is the same as the bit length to be sent of the sixth DCI and is different from the bit length to be sent of the second DCI, the bit length to be sent of the seventh DCI and the bit length to be sent of the eighth DCI; or the bit length to be transmitted of the fifth DCI is different from the bit length to be transmitted of the sixth DCI, and the bit length to be transmitted of the fifth DCI or the bit length to be transmitted of the sixth DCI is the same as the bit length to be transmitted of the second DCI, the bit length to be transmitted of the seventh DCI, or the bit length to be transmitted of the eighth DCI:
through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is the same as the bit length of the second DCI to be transmitted; or
By the configuration of the second configuration information, the original bit length of the fifth DCI is the same as the original bit length of the sixth DCI.
14. The method according to claim 12 or 13, wherein the determining, by the network-side device through zero padding or puncturing, a bit length to be transmitted of the first DCI, a bit length to be transmitted of the second DCI, a bit length to be transmitted of the third DCI, a bit length to be transmitted of the fourth DCI, a bit length to be transmitted of the fifth DCI, a bit length to be transmitted of the sixth DCI, a bit length to be transmitted of the seventh DCI, and a bit length to be transmitted of the eighth DCI includes:
the network side equipment determines the bit length to be sent of the first DCI, the bit length to be sent of the second DCI, the bit length to be sent of the seventh DCI and the bit length to be sent of the eighth DCI;
the network side device determines a bit length to be sent of the fifth DCI and a bit length to be sent of the sixth DCI according to a bit length to be sent of the first DCI, a bit length to be sent of the second DCI, a bit length to be sent of the seventh DCI and a bit length to be sent of the eighth DCI;
the network side device determines the bit length to be sent of the third DCI and the bit length to be sent of the fourth DCI according to the bit length to be sent of the first DCI, the bit length to be sent of the second DCI, the bit length to be sent of the fifth DCI, the bit length to be sent of the sixth DCI, the bit length to be sent of the seventh DCI, and the bit length to be sent of the eighth DCI.
15. An apparatus for transmitting downlink control information, comprising:
a transceiving unit, configured to receive first configuration information from a network side device, where the first configuration information is used to configure first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, and sixth DCI;
a processing unit, configured to determine, according to the first configuration information, a monitored bit length of the first DCI, a monitored bit length of the second DCI, a monitored bit length of the third DCI, a monitored bit length of the fourth DCI, a monitored bit length of the fifth DCI, and a monitored bit length of the sixth DCI;
wherein the first DCI is a DCI format0 _0in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _1in a user-specific search space USS;
the fourth DCI is DCI format1 _1in the USS;
the fifth DCI is DCI format 2_0 in the CSS;
the sixth DCI is DCI format 2 \u1 in the CSS;
and performing zero padding operation or truncation operation on the first DCI to obtain the same monitoring bit length as the second DCI, wherein the monitoring bit length of the third DCI is the same as that of the fourth DCI, the monitoring bit length of the third DCI is different from that of the second DCI, the monitoring bit length of the fifth DCI is different from that of the sixth DCI, and the monitoring bit length of the fifth DCI and that of the sixth DCI are both different from that of the second DCI.
16. The apparatus of claim 15, wherein by configuration of the first configuration information, an original bit length of the third DCI is the same as an original bit length of the fourth DCI, an original bit length of the fifth DCI is different from an original bit length of the sixth DCI, and both the original bit length of the fifth DCI and the original bit length of the sixth DCI are different from an original bit length of the second DCI;
the processing unit is specifically configured to:
determining the original bit length of the second DCI, the original bit length of the fifth DCI and the original bit length of the sixth DCI as the monitored bit length of the second DCI, the monitored bit length of the fifth DCI and the monitored bit length of the sixth DCI, respectively;
if the original bit length of the third DCI is different from the monitoring bit length of the second DCI, determining the original bit length of the third DCI and the original bit length of the fourth DCI as the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI;
if the original bit length of the third DCI is the same as the monitoring bit length of the second DCI, performing an operation of supplementing 1 zero bit on the original bit length of the third DCI and the original bit length of the fourth DCI respectively to obtain the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI.
17. An apparatus for transmitting downlink control information, comprising:
a transceiving unit, configured to receive first configuration information from a network side device, where the first configuration information is used to configure first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, and sixth DCI;
a processing unit, configured to determine, according to the first configuration information, a monitored bit length of the first DCI, a monitored bit length of the second DCI, a monitored bit length of the third DCI, a monitored bit length of the fourth DCI, a monitored bit length of the fifth DCI, and a monitored bit length of the sixth DCI;
wherein the first DCI is a DCI format0 \/0 in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _1in a user-specific search space USS;
the fourth DCI is DCI format1 _1in the USS;
the fifth DCI is DCI format 2_0 in the CSS;
the sixth DCI is DCI format 2 \u1 in the CSS;
and performing zero padding operation or puncturing operation on the first DCI to obtain a monitoring bit length which is the same as that of the second DCI, wherein the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI are both different from that of the second DCI, and at least one of the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI is the same as that of the second DCI.
18. The apparatus of claim 17, wherein at least one of an original bit length of the fifth DCI and an original bit length of the sixth DCI is the same as an original bit length of the second DCI by the configuration of the first configuration information;
the transceiver unit is specifically configured to:
determining the original bit length of the fifth DCI and the original bit length of the sixth DCI as the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI, respectively.
19. An apparatus for transmitting downlink control information, comprising:
a transceiving unit, configured to send first configuration information to a terminal side device, where the first configuration information is used to configure first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, and sixth DCI;
a processing unit, configured to determine, through a zero padding operation or a truncation operation, a to-be-transmitted bit length of the first DCI, a to-be-transmitted bit length of the second DCI, a to-be-transmitted bit length of the third DCI, a to-be-transmitted bit length of the fourth DCI, a to-be-transmitted bit length of the fifth DCI, and a to-be-transmitted bit length of the sixth DCI;
wherein the first DCI is a DCI format0 _0in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _1in a user-specific search space USS;
the fourth DCI is DCI format1 _1in the USS;
the fifth DCI is DCI format 2_0 in the CSS;
the sixth DCI is DCI format 2 \u1 in the CSS;
and performing zero padding operation or truncation operation on the first DCI to obtain a bit length to be transmitted which is the same as that of the second DCI, wherein the bit length to be transmitted of the third DCI is the same as that of the fourth DCI, the bit length to be transmitted of the third DCI is different from that of the second DCI, the bit length to be transmitted of the fifth DCI is different from that of the sixth DCI, and the bit length to be transmitted of the fifth DCI and the bit length to be transmitted of the sixth DCI are both different from that of the second DCI.
20. The apparatus of claim 19, wherein by configuration of the first configuration information, an original bit length of the third DCI is the same as an original bit length of the fourth DCI, an original bit length of the fifth DCI is different from an original bit length of the sixth DCI, and both the original bit length of the fifth DCI and the original bit length of the sixth DCI are different from an original bit length of the second DCI;
the processing unit is specifically configured to:
determining the original bit length of the second DCI, the original bit length of the fifth DCI and the original bit length of the sixth DCI as the bit length to be transmitted of the second DCI, the bit length to be transmitted of the fifth DCI and the bit length to be transmitted of the sixth DCI, respectively;
if the original bit length of the third DCI is different from the bit length of the second DCI to be transmitted, determining the original bit length of the third DCI and the original bit length of the fourth DCI as the bit length of the third DCI to be transmitted and the bit length of the fourth DCI to be transmitted;
and if the original bit length of the third DCI is the same as the bit length to be transmitted of the second DCI, performing operation of supplementing 1 zero bit on the original bit length of the third DCI and the original bit length of the fourth DCI respectively to obtain the bit length to be transmitted of the third DCI and the bit length to be transmitted of the fourth DCI.
21. An apparatus for transmitting downlink control information, comprising:
a transceiving unit, configured to send first configuration information to a terminal side device, where the first configuration information is used to configure first downlink control information DCI, a second DCI, a third DCI, a fourth DCI, a fifth DCI, and a sixth DCI;
a processing unit, configured to determine, through a zero padding operation or a truncation operation, a to-be-transmitted bit length of the first DCI, a to-be-transmitted bit length of the second DCI, a to-be-transmitted bit length of the third DCI, a to-be-transmitted bit length of the fourth DCI, a to-be-transmitted bit length of the fifth DCI, and a to-be-transmitted bit length of the sixth DCI;
wherein the first DCI is a DCI format0 _0in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _1in a user-specific search space USS;
the fourth DCI is DCI format1 _1in the USS;
the fifth DCI is DCI format 2_0 in the CSS;
the sixth DCI is DCI format 2_1 in the CSS;
and performing zero padding operation or truncation operation on the first DCI to obtain a bit length to be transmitted which is the same as that of the second DCI, wherein the bit length to be transmitted of the third DCI and the bit length to be transmitted of the fourth DCI are both different from that of the second DCI, and at least one of the bit length to be transmitted of the fifth DCI and the bit length to be transmitted of the sixth DCI is the same as that of the second DCI.
22. The apparatus of claim 21, wherein at least one of an original bit length of the fifth DCI and an original bit length of the sixth DCI is the same as an original bit length of the second DCI through the configuration of the first configuration information;
the processing unit is specifically configured to:
and determining the original bit length of the fifth DCI and the original bit length of the sixth DCI as the bit length of the fifth DCI to be transmitted and the bit length of the sixth DCI to be transmitted, respectively.
23. An apparatus for transmitting downlink control information, comprising:
a transceiving unit, configured to receive second configuration information from a network side device, where the second configuration information is used to configure first downlink control information DCI, second DCI, third DCI, fourth DCI, fifth DCI, sixth DCI, seventh DCI, and eighth DCI;
a processing unit, configured to determine, according to the second configuration information, a monitored bit length of the first DCI, a monitored bit length of the second DCI, a monitored bit length of the third DCI, a monitored bit length of the fourth DCI, a monitored bit length of the fifth DCI, a monitored bit length of the sixth DCI, a monitored bit length of the seventh DCI, and a monitored bit length of the eighth DCI;
wherein the first DCI is a DCI format0 _0in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _0in a user-specific search space (USS);
the fourth DCI is DCI format1 _0in the USS;
the fifth DCI is DCI format0 _1in the USS;
the sixth DCI is DCI format1 _1in the USS;
the seventh DCI is DCI format 2_0 in the CSS;
the eighth DCI is DCI format 2 \u1 in the CSS;
under the condition that any one of the following conditions is met, through zero padding operation, the monitoring bit length of the fifth DCI is different from the monitoring bit length of the sixth DCI, and the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI are different from the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, and the monitoring bit length of the eighth DCI:
by the configuration of the second configuration information, a difference between an original bit length of the fifth DCI and an original bit length of the sixth DCI is greater than or equal to 2; or
Through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is different from the monitoring bit length of the second DCI.
24. An apparatus for transmitting downlink control information, comprising:
a transceiving unit, configured to receive second configuration information from a network side device, where the second configuration information is used to configure first downlink control information DCI, a second DCI, a third DCI, a fourth DCI, a fifth DCI, a sixth DCI, a seventh DCI, and an eighth DCI;
a processing unit, configured to determine, according to the second configuration information, a monitored bit length of the first DCI, a monitored bit length of the second DCI, a monitored bit length of the third DCI, a monitored bit length of the fourth DCI, a monitored bit length of the fifth DCI, a monitored bit length of the sixth DCI, a monitored bit length of the seventh DCI, and a monitored bit length of the eighth DCI;
wherein the first DCI is a DCI format0 \/0 in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _0in a user-specific search space (USS);
the fourth DCI is DCI format1 _0in the USS;
the fifth DCI is DCI format0_1 in the USS;
the sixth DCI is DCI format1 _1in the USS;
the seventh DCI is DCI format 2_0 in the CSS;
the eighth DCI is DCI format 2_1 in the CSS;
under the condition that any one of the following conditions is met, through zero padding operation, the monitoring bit length of the fifth DCI is the same as that of the sixth DCI, and is different from that of the second DCI, that of the seventh DCI and that of the eighth DCI; or the monitoring bit length of the fifth DCI is different from the monitoring bit length of the sixth DCI, and the monitoring bit length of the fifth DCI or the monitoring bit length of the sixth DCI is the same as the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, or the monitoring bit length of the eighth DCI:
through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is the same as the monitored bit length of the second DCI; or
By the configuration of the second configuration information, the original bit length of the fifth DCI is the same as the original bit length of the sixth DCI.
25. The apparatus according to claim 23 or 24, wherein the processing unit is specifically configured to:
determining a monitoring bit length of the first DCI, a monitoring bit length of the second DCI, a monitoring bit length of the seventh DCI, and a monitoring bit length of the eighth DCI;
determining a monitoring bit length of the fifth DCI and a monitoring bit length of the sixth DCI according to the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI;
and determining the monitoring bit length of the third DCI and the monitoring bit length of the fourth DCI according to the monitoring bit length of the first DCI, the monitoring bit length of the second DCI, the monitoring bit length of the fifth DCI, the monitoring bit length of the sixth DCI, the monitoring bit length of the seventh DCI and the monitoring bit length of the eighth DCI.
26. An apparatus for transmitting downlink control information, comprising:
a transceiving unit, configured to send second configuration information to a terminal side device, where the second configuration information is used to configure first downlink control information DCI, a second DCI, a third DCI, a fourth DCI, a fifth DCI, a sixth DCI, a seventh DCI, and an eighth DCI;
a processing unit, configured to determine, through zero padding or truncation operation, a bit length to be transmitted of the first DCI, a bit length to be transmitted of the second DCI, a bit length to be transmitted of the third DCI, a bit length to be transmitted of the fourth DCI, a bit length to be transmitted of the fifth DCI, a bit length to be transmitted of the sixth DCI, a bit length to be transmitted of the seventh DCI, and a bit length to be transmitted of the eighth DCI;
wherein the first DCI is a DCI format0 \/0 in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _0in a user-specific search space, USS;
the fourth DCI is DCI format1 \u0 in the USS;
the fifth DCI is DCI format0_1 in the USS;
the sixth DCI is DCI format1 _1in the USS;
the seventh DCI is DCI format 2_0 in the CSS;
the eighth DCI is DCI format 2_1 in the CSS;
under the condition that any one of the following conditions is met, through zero padding operation, the bit length to be transmitted of the fifth DCI is different from the bit length to be transmitted of the sixth DCI, and the monitoring bit length of the fifth DCI and the monitoring bit length of the sixth DCI are different from the monitoring bit length of the second DCI, the monitoring bit length of the seventh DCI, and the monitoring bit length of the eighth DCI:
by the configuration of the second configuration information, a difference between an original bit length of the fifth DCI and an original bit length of the sixth DCI is greater than or equal to 2; or
Through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is different from the bit length of the second DCI to be transmitted.
27. An apparatus for transmitting downlink control information, comprising:
a transceiving unit, configured to send second configuration information to a terminal side device, where the second configuration information is used to configure first downlink control information DCI, a second DCI, a third DCI, a fourth DCI, a fifth DCI, a sixth DCI, a seventh DCI, and an eighth DCI;
a processing unit, configured to determine, through zero padding or truncation operation, a bit length to be transmitted of the first DCI, a bit length to be transmitted of the second DCI, a bit length to be transmitted of the third DCI, a bit length to be transmitted of the fourth DCI, a bit length to be transmitted of the fifth DCI, a bit length to be transmitted of the sixth DCI, a bit length to be transmitted of the seventh DCI, and a bit length to be transmitted of the eighth DCI;
wherein the first DCI is a DCI format0 _0in a Common Search Space (CSS);
the second DCI is DCI format1 \u0 in the CSS;
the third DCI is DCI format0 _0in a user-specific search space (USS);
the fourth DCI is DCI format1 _0in the USS;
the fifth DCI is DCI format0_1 in the USS;
the sixth DCI is DCI format1 _1in the USS;
the seventh DCI is DCI format 2_0 in the CSS;
the eighth DCI is DCI format 2 \u1 in the CSS;
under the condition that any one of the following conditions is met, through zero padding operation, the bit length to be sent of the fifth DCI is the same as the bit length to be sent of the sixth DCI, and is different from the bit length to be sent of the second DCI, the bit length to be sent of the seventh DCI and the bit length to be sent of the eighth DCI; or the bit length to be transmitted of the fifth DCI is different from the bit length to be transmitted of the sixth DCI, and the bit length to be transmitted of the fifth DCI or the bit length to be transmitted of the sixth DCI is the same as the bit length to be transmitted of the second DCI, the bit length to be transmitted of the seventh DCI, or the bit length to be transmitted of the eighth DCI:
through the configuration of the second configuration information, the difference between the original bit length of the fifth DCI and the original bit length of the sixth DCI is equal to 1, and the smaller value of the original bit length of the fifth DCI and the original bit length of the sixth DCI is the same as the bit length of the second DCI to be transmitted; or
By the configuration of the second configuration information, the original bit length of the fifth DCI is the same as the original bit length of the sixth DCI.
28. The apparatus according to claim 26 or 27, wherein the processing unit is specifically configured to:
determining a bit length to be transmitted of the first DCI, a bit length to be transmitted of the second DCI, a bit length to be transmitted of the seventh DCI, and a bit length to be transmitted of the eighth DCI;
determining the bit length to be sent of the fifth DCI and the bit length to be sent of the sixth DCI according to the bit length to be sent of the first DCI, the bit length to be sent of the second DCI, the bit length to be sent of the seventh DCI and the bit length to be sent of the eighth DCI;
determining the bit length to be sent of the third DCI and the bit length to be sent of the fourth DCI according to the bit length to be sent of the first DCI, the bit length to be sent of the second DCI, the bit length to be sent of the fifth DCI, the bit length to be sent of the sixth DCI, the bit length to be sent of the seventh DCI and the bit length to be sent of the eighth DCI.
CN201811302594.6A 2018-11-02 2018-11-02 Method and device for transmitting downlink control information Active CN111148230B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811302594.6A CN111148230B (en) 2018-11-02 2018-11-02 Method and device for transmitting downlink control information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811302594.6A CN111148230B (en) 2018-11-02 2018-11-02 Method and device for transmitting downlink control information

Publications (2)

Publication Number Publication Date
CN111148230A CN111148230A (en) 2020-05-12
CN111148230B true CN111148230B (en) 2022-11-08

Family

ID=70516297

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811302594.6A Active CN111148230B (en) 2018-11-02 2018-11-02 Method and device for transmitting downlink control information

Country Status (1)

Country Link
CN (1) CN111148230B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113766639A (en) * 2020-06-02 2021-12-07 维沃移动通信有限公司 Resource allocation method, terminal and network side equipment
CN115734360A (en) * 2021-08-31 2023-03-03 华为技术有限公司 Method and device for multi-carrier scheduling
CN116266782A (en) * 2021-12-17 2023-06-20 华为技术有限公司 Communication method and device
WO2023206313A1 (en) * 2022-04-29 2023-11-02 Qualcomm Incorporated Mmw standalone cell detection and selection

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013044480A1 (en) * 2011-09-29 2013-04-04 富士通株式会社 Downlink control information sending method, blind detection method, base station and terminal equipment
WO2013127453A1 (en) * 2012-02-29 2013-09-06 Fujitsu Limited Control channels for wireless communication

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651995A (en) * 2009-09-21 2010-02-17 中兴通讯股份有限公司 Transmission method and system of downlink control information
JP2013509832A (en) * 2009-10-30 2013-03-14 リサーチ イン モーション リミテッド Reducing the number of blind decoding for communication using carrier aggregation
KR101769371B1 (en) * 2010-01-11 2017-08-30 엘지전자 주식회사 A method and an apparatus of transmitting and receiving PDCCH using size adapted DCI
CN102291843B (en) * 2010-06-18 2016-03-16 上海贝尔股份有限公司 For the method and apparatus that search volume is shared
US9253770B2 (en) * 2011-08-18 2016-02-02 Lg Electronics Inc. Method for allocating a control channel and apparatus therefor
US9826514B2 (en) * 2011-11-16 2017-11-21 Qualcomm Incorporated Downlink control information (DCI) design for low cost devices
US10517083B2 (en) * 2015-09-25 2019-12-24 Lg Electronics Inc. Method and user equipment for receiving downlink control information, and method and base station for transmitting downlink control information
EP3412091A1 (en) * 2016-02-02 2018-12-12 Intel IP Corporation Resource allocation in low-latency wireless systems
US20170373793A1 (en) * 2016-06-24 2017-12-28 Qualcomm Incorporated Techniques for managing blind decoding reduction for control channel search spaces
CN108702281B (en) * 2018-04-04 2021-11-09 北京小米移动软件有限公司 Method and device for determining size of downlink control information format

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013044480A1 (en) * 2011-09-29 2013-04-04 富士通株式会社 Downlink control information sending method, blind detection method, base station and terminal equipment
CN103650596A (en) * 2011-09-29 2014-03-19 富士通株式会社 Downlink control information sending method, blind detection method, base station and terminal equipment
WO2013127453A1 (en) * 2012-02-29 2013-09-06 Fujitsu Limited Control channels for wireless communication

Also Published As

Publication number Publication date
CN111148230A (en) 2020-05-12

Similar Documents

Publication Publication Date Title
CN110839291B (en) Method and device for transmitting downlink control information
CN110336653B (en) Resource indication method, terminal equipment and network equipment
CN111148230B (en) Method and device for transmitting downlink control information
US11464003B2 (en) Control information transmission method, user equipment, and base station
CN110351851B (en) Data transmission method, terminal equipment and network equipment
CN112514517B (en) Method and apparatus for uplink control channel in NOMA asynchronous transmission
US11871386B2 (en) Base station, terminal, and communication method
CN110247749B (en) Resource indication method, network device, apparatus and storage medium
CN109863707B (en) Data transmission method, terminal equipment and network equipment
CN106559203B (en) Method and device for transmitting control signaling
CN111357361B (en) Information transmission method and communication equipment
EP4017175A1 (en) Frequency domain resource allocation method and apparatus
EP3852463A1 (en) Method and apparatus for transmitting data
CN110115076B (en) Method for transmitting information, network device, terminal device and computer readable medium
CN112399436A (en) Method and device for receiving and sending downlink control information
CN107078783B (en) Method for transmitting information, access point and user equipment
CN111193581B (en) Method for transmitting and receiving physical downlink control channel and communication device
CN110999243B (en) Method for transmitting and receiving scheduling information in communication system
CN111049635B (en) Control information transmission method, user equipment and base station
CN118042614A (en) Spectrum bandwidth adjusting method, apparatus, communication device and storage medium
KR20120080509A (en) Methods for transmitting or processing control information in telecommunication system and apparatus using the methods

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant