CN111585687A - Communication method and device - Google Patents

Communication method and device Download PDF

Info

Publication number
CN111585687A
CN111585687A CN201910117929.5A CN201910117929A CN111585687A CN 111585687 A CN111585687 A CN 111585687A CN 201910117929 A CN201910117929 A CN 201910117929A CN 111585687 A CN111585687 A CN 111585687A
Authority
CN
China
Prior art keywords
user equipment
scrambling
information
interfering
downlink control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910117929.5A
Other languages
Chinese (zh)
Other versions
CN111585687B (en
Inventor
龚政委
王磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201910117929.5A priority Critical patent/CN111585687B/en
Publication of CN111585687A publication Critical patent/CN111585687A/en
Application granted granted Critical
Publication of CN111585687B publication Critical patent/CN111585687B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J11/00Orthogonal multiplex systems, e.g. using WALSH codes
    • H04J11/0023Interference mitigation or co-ordination
    • H04J11/0026Interference mitigation or co-ordination of multi-user interference
    • H04J11/0036Interference mitigation or co-ordination of multi-user interference at the receiver
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0048Allocation of pilot signals, i.e. of signals known to the receiver
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0091Signaling for the administration of the divided path
    • H04L5/0094Indication of how sub-channels of the path are allocated
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0466Wireless resource allocation based on the type of the allocated resource the resource being a scrambling code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal

Abstract

The embodiment of the application discloses a communication method and device, and relates to the technical field of communication. Bit-level interference cancellation of inter-user equipment interference can be achieved. The method can comprise the following steps: receiving downlink control information from the network equipment; obtaining a scrambling identifier of a demodulation reference signal (DMRS) of interference user equipment; obtaining a scrambling identifier of a data signal interfering with user equipment; eliminating the interference of the signal of the interference user equipment on the signal of the first user equipment according to the channel coding information of the interference user equipment, the scrambling identifier of the DMRS of the interference user equipment and the scrambling identifier of the data signal of the interference user equipment; the downlink control information comprises first code word information and one or more second code word information; the first codeword information is used for indicating channel coding information of the first user equipment, and the second codeword information is used for indicating channel coding information of interfering user equipment of the first user equipment.

Description

Communication method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a communication method and apparatus.
Background
With the coming of the 5G era, the frequency point of the wireless communication working frequency band is higher and higher; for example, 5G may support a frequency band of 100 GHz. Unlike conventional low frequency transmissions, the beams for high frequency transmissions are becoming narrower and narrower, which presents challenges for tracking the optimal serving beam during terminal mobility. For example, in multi-user paired transmission, the problem of channel measurement aging caused by the movement of the terminal is more serious. Illustratively, as shown in fig. 1 (a), two User Equipments (UEs) are transmitted in pair. At a first time, the UE1 and the UE2 implement quasi-orthogonal pairing based on measurement reporting information. Due to the movement of the UE1 and the UE2, as shown in (b) of fig. 1, by the time the base station actually transmits data to the UE1 and the UE2 at the second time, the spatial channels between the UE1 and the UE2 are completely non-orthogonal, so that strong mutual interference is formed between the UE1 and the UE 2.
In the multi-user pairing transmission, the interference between the user equipments can cause a large loss of the transmission performance of the system. How to eliminate mutual interference between user equipments is a problem to be solved.
Disclosure of Invention
The embodiment of the application provides a communication method and device, which can realize bit-level interference elimination of interference between user equipment.
In order to achieve the above purpose, the embodiment of the present application adopts the following technical solutions:
in a first aspect, the present application provides a communication method and apparatus.
In one possible design, the method may include: receiving downlink control information from the network equipment; the downlink control information comprises first code word information and one or more second code word information; the first code word information is used for indicating the channel coding information of the first user equipment, and the second code word information is used for indicating the channel coding information of the interference user equipment of the first user equipment; obtaining a scrambling identifier of a demodulation reference signal (DMRS) of interference user equipment; obtaining a scrambling identifier of a data signal interfering with user equipment; and eliminating the interference of the signal of the interference user equipment to the signal of the first user equipment according to the channel coding information of the interference user equipment, the scrambling identifier of the DMRS of the interference user equipment and the scrambling identifier of the data signal of the interference user equipment.
In the method, the first user equipment acquires the information of the data signal and the information of the reference signal of the interference user equipment through the downlink control information from the network equipment, so that the interference of the signal of the interference user equipment on the signal of the first user equipment can be eliminated. Including channel coding information of interfering user equipment, so that bit-level interference cancellation can be achieved.
In one possible design, acquiring a scrambling identity of a demodulation reference signal (DMRS) of an interfering user equipment includes: and acquiring the configured first scrambling identifier from the network equipment, wherein the first scrambling identifier is used as the scrambling identifier of the DMRS of the first user equipment and the scrambling identifier of the DMRS of the interfering user equipment. In this way, the scrambling identity of the DMRS of the interfering user equipment is the same as the scrambling identity of the DMRS of the first user equipment, and both are configured semi-statically by the network equipment.
In one possible design, acquiring a scrambling identity of a demodulation reference signal (DMRS) of an interfering user equipment includes: and acquiring a second scrambling identifier and a third scrambling identifier from the network equipment, wherein the second scrambling identifier is used as the scrambling identifier of the DMRS of the first user equipment, and the third scrambling identifier is used as the scrambling identifier of the DMRS of the interference user equipment. In this approach, the scrambling identity of the DMRS of the interfering user equipment is different from the scrambling identity of the DMRS of the first user equipment, and is configured semi-statically by the network device.
In one possible design, a first user equipment acquires a first set of scrambling identities of DMRSs from a network device; and determining the scrambling identifier of the DMRS of the first user equipment in the first set according to the first scrambling identifier indication information included in the downlink control information. In the method, the network device semi-statically configures a first set of the scrambling identifiers of the DMRS, and the first user equipment determines the scrambling identifier of the DMRS of the first user equipment in the first set according to the indication information in the downlink control information.
In one possible design, acquiring a scrambling identity of a demodulation reference signal (DMRS) of an interfering user equipment includes: and determining the scrambling identifier of the DMRS of the interference user equipment in the first set according to the second code word information in the downlink control information. In the method, the network device semi-statically configures a first set of the scrambling identifiers of the DMRS, and the first user equipment determines the scrambling identifier of the DMRS of the first user equipment in the first set according to the indication information in the second codeword information in the downlink control information.
In one possible design, acquiring a scrambling identity of a demodulation reference signal (DMRS) of an interfering user equipment includes: determining a scrambling identifier of a DMRS (demodulation reference signal) of an interfering user equipment in a first set according to a predetermined rule; wherein the predetermined rules include: the scrambling identity of the DMRS of the interfering user equipment is the same as the scrambling identity of the DMRS of the first user equipment; alternatively, the scrambling identity of the DMRS of the interfering user equipment and the scrambling identity of the DMRS of the first user equipment have different index values in the first set. In this way, the network device semi-statically configures a first set of scrambling identities of the DMRS, and the first user equipment determines the scrambling identity of the DMRS of the first user equipment in the first set according to a predetermined rule.
In one possible design, the scrambling identity of the data signal includes a sub-scrambling identity, and/or an RNTI.
In one possible design, the scrambling identity of the data signal includes a sub-scrambling identity, and acquiring the scrambling identity of the data signal of the interfering user equipment includes: and acquiring the configured first sub-scrambling identifier from the network equipment, wherein the first sub-scrambling identifier is used as a sub-scrambling identifier of the data signal of the first user equipment and a sub-scrambling identifier of the data signal of the interference user equipment. In this way, the scrambling identity of the data signal of the interfering user equipment is the same as the scrambling identity of the data signal of the first user equipment, both configured semi-statically by the network equipment.
In one possible design, the scrambling identity of the data signal includes a sub-scrambling identity, and acquiring the scrambling identity of the data signal of the interfering user equipment includes: and acquiring a second configured sub-scrambling identifier and a third configured sub-scrambling identifier from the network equipment, wherein the second sub-scrambling identifier is used as a sub-scrambling identifier of the data signal of the first user equipment, and the third sub-scrambling identifier is used as a sub-scrambling identifier of the data signal of the interference user equipment. In this approach, the scrambling identity of the data signal of the interfering user equipment is different from the scrambling identity of the data signal of the first user equipment and is semi-statically configured by the network device, respectively.
In one possible design, the scrambling identity of the data signal includes a sub-scrambling identity, and acquiring the scrambling identity of the data signal of the interfering user equipment includes: obtaining a second set of configured sub-scrambling identities from the network device; one sub-scrambling identity is determined in the second set as a sub-scrambling identity of the data signal of the interfering user equipment. In this approach, the network device semi-statically configures a second set of sub-scrambling identities in which the first user device determines sub-scrambling identities of data signals interfering with the user device.
In one possible design, determining one sub-scrambling identity in the second set as a sub-scrambling identity of a data signal of an interfering user equipment includes: the downlink control information further comprises second scrambling identity indication information, and the sub-scrambling identity of the data signal interfering the user equipment is determined in the second set according to the second scrambling identity indication information.
In one possible design, determining one sub-scrambling identity in the second set as a sub-scrambling identity of a data signal of an interfering user equipment includes: and blind detection in the second set acquires the sub-scrambling identity of the interference user equipment.
In one possible design, the scrambling identity of the data signal further includes a radio network temporary identity RNTI, and the obtaining the scrambling identity of the data signal of the interfering user equipment further includes: obtaining a third set of configurations from the network device; the third set comprises a plurality of RNTIs; and determining one RNTI in the third set as the RNTI of the interference user equipment. In this way, the network device semi-statically configures a third set of RNTIs, in which the first user equipment determines RNTIs of interfering user equipments.
In one possible design, determining one RNTI in the third set as the RNTI for the interfering user equipment includes: the downlink control information further comprises second scrambling identity indication information, and the RNTI of the interfering user equipment is determined in the third set according to the second scrambling identity indication information.
In one possible design, determining one RNTI in the third set as the RNTI for the interfering user equipment includes: and acquiring the RNTI of the interference user equipment in the third set by blind detection.
In one possible design, the downlink control information further includes first port indication information, where the first port indication information is used to indicate a number of a transmission antenna port of the DMRS of the first user equipment and a number of a transmission antenna port of the DMRS of the interfering user equipment.
In one possible design, the channel coding information includes a modulation and coding scheme MCS and a redundancy version RV.
In one possible design, a first user equipment acquires multi-user interference cancellation mode indication information from a network device; according to the channel coding information of the interfering user equipment, the scrambling identifier of the DMRS of the interfering user equipment and the scrambling identifier of the data signal of the interfering user equipment, eliminating the interference of the signal of the interfering user equipment on the signal of the first user equipment comprises the following steps: and eliminating the interference of the signal of the interference user equipment to the signal of the first user equipment according to the multi-user interference elimination mode indication information, the channel coding information of the interference user equipment, the scrambling identifier of the DMRS of the interference user equipment and the scrambling identifier of the data signal of the interference user equipment. In the method, a network device judges whether a first user device has an interference user device in advance, and if the first user device is determined to have the interference user device, the first user device is indicated to execute an interference elimination process through multi-user interference elimination mode indication information.
Correspondingly, the application also provides a communication device, and the device can realize the communication method of the first aspect. For example, the apparatus may be a user equipment or a chip applied in the user equipment, and may also be other apparatuses capable of implementing the communication method, where the method may be implemented by software, hardware, or by executing corresponding software through hardware.
In one possible design, the apparatus may include a processor and a memory. The processor is configured to enable the apparatus to perform the corresponding functions in the method of the first aspect. The memory is for coupling to the processor and holds the necessary program instructions and data for the device. In addition, the device can also comprise a communication interface for supporting the communication between the device and other devices. The communication interface may be a transceiver or a transceiver circuit.
In one possible design, the apparatus may include: the device comprises a receiving module and a processing module. The receiving module is used for receiving downlink control information from the network equipment; the downlink control information comprises first code word information and one or more second code word information; the first code word information is used for indicating the channel coding information of the first user equipment, and the second code word information is used for indicating the channel coding information of the interference user equipment of the first user equipment; the processing module is used for acquiring a scrambling identifier of a demodulation reference signal (DMRS) of the interference user equipment; the processing module is further configured to obtain a scrambling identifier of a data signal interfering with the user equipment; the processing module is further configured to eliminate interference of the signal of the interfering user equipment on the signal of the first user equipment according to the channel coding information of the interfering user equipment, the scrambling identifier of the DMRS of the interfering user equipment, and the scrambling identifier of the data signal of the interfering user equipment.
In one possible design, the receiving module is further configured to acquire, from the network device, the configured first scrambling identity, where the first scrambling identity is used as a scrambling identity of a DMRS of the first user equipment and a scrambling identity of a DMRS of an interfering user equipment.
In one possible design, the receiving module is further configured to acquire, from the network device, a second scrambling identity and a third scrambling identity, where the second scrambling identity is used as a scrambling identity of the DMRS of the first user equipment, and the third scrambling identity is used as a scrambling identity of the DMRS of the interfering user equipment.
In one possible design, the receiving module is further configured to obtain, from the network device, a first set of scrambling identities of the DMRS; the processing module is further configured to determine, in the first set, a scrambling identifier of the DMRS of the first user equipment according to the first scrambling identifier indication information included in the downlink control information.
In one possible design, the processing module is specifically configured to determine, in the first set, a scrambling identifier of a DMRS that interferes with the user equipment according to second codeword information in the downlink control information.
In one possible design, the processing module is specifically configured to determine, in the first set, a scrambling identity of a DMRS that interferes with the user equipment according to a predetermined rule; wherein the predetermined rules include: the scrambling identity of the DMRS of the interfering user equipment is the same as the scrambling identity of the DMRS of the first user equipment; alternatively, the scrambling identity of the DMRS of the interfering user equipment and the scrambling identity of the DMRS of the first user equipment have different index values in the first set.
In one possible design, the scrambling identity of the data signal includes a sub-scrambling identity, and/or an RNTI.
In one possible design, the scrambling identifier of the data signal includes a sub-scrambling identifier, and the receiving module is further configured to obtain a configured first sub-scrambling identifier from the network device, where the first sub-scrambling identifier is used as a sub-scrambling identifier of the data signal of the first user equipment and a sub-scrambling identifier of the data signal of the interfering user equipment.
In one possible design, the scrambling identifier of the data signal includes a sub-scrambling identifier, and the receiving module is further configured to obtain a second sub-scrambling identifier and a third sub-scrambling identifier configured from the network device, where the second sub-scrambling identifier is used as a sub-scrambling identifier of the data signal of the first user equipment, and the third sub-scrambling identifier is used as a sub-scrambling identifier of the data signal of the interfering user equipment.
In one possible design, the scrambling identity of the data signal includes a sub-scrambling identity, and the receiving module is further configured to obtain a second set of configured sub-scrambling identities from the network device; the processing module is further configured to determine one sub-scrambling identity in the second set as a sub-scrambling identity of a data signal of an interfering user equipment.
In a possible design, the downlink control information further includes second scrambling identity indication information, and the processing module is specifically configured to determine, in the second set, a sub-scrambling identity of the data signal interfering with the user equipment according to the second scrambling identity indication information.
In one possible design, the processing module is specifically configured to obtain the sub-scrambling identities of the interfering user equipments in the second set by blind detection.
In one possible design, the scrambling identity of the data signal further includes a radio network temporary identity RNTI, and the receiving module is further configured to obtain a third set of configurations from the network device; the third set comprises a plurality of RNTIs; the processing module is further configured to determine one RNTI in the third set as the RNTI of the interfering user equipment.
In a possible design, the downlink control information further includes second scrambling identity indication information, and the processing module is specifically configured to determine the RNTI of the interfering user equipment in the third set according to the second scrambling identity indication information.
In one possible design, the processing module is specifically configured to blindly detect and acquire the RNTI of the interfering user equipment in the third set.
In one possible design, the downlink control information further includes first port indication information, where the first port indication information is used to indicate a number of a transmission antenna port of the DMRS of the first user equipment and a number of a transmission antenna port of the DMRS of the interfering user equipment.
In one possible design, the receiving module is further configured to obtain multi-user interference cancellation mode indication information from the network device; the processing module is further configured to eliminate, according to the multi-user interference cancellation mode indication information, the channel coding information of the interfering user equipment, the scrambling identifier of the DMRS of the interfering user equipment, and the scrambling identifier of the data signal of the interfering user equipment, interference of the signal of the interfering user equipment with the signal of the first user equipment.
In a second aspect, the present application provides a communication method and apparatus.
In one possible design, the method may include: determining downlink control information of first user equipment; the downlink control information comprises first code word information and one or more second code word information; the first code word information is used for indicating the channel coding information of the first user equipment, and the second code word information is used for indicating the channel coding information of the interference user equipment of the first user equipment; and sending the downlink control information. In the method, the downlink control information of the first user equipment includes channel coding information of the interfering user equipment, and the first user equipment can eliminate interference of a signal of the interfering user equipment on the signal of the first user equipment according to the channel coding information of the interfering user equipment.
In one possible design, the network device configures a first scrambling identity as a scrambling identity of a demodulation reference signal, DMRS, of the first user device and a scrambling identity of a DMRS of an interfering user device. In this way, the scrambling identity of the DMRS of the interfering user equipment is the same as the scrambling identity of the DMRS of the first user equipment, and both are configured semi-statically by the network equipment.
In one possible design, the network device configures a second scrambling identity and a third scrambling identity, where the second scrambling identity is used as a scrambling identity of a DMRS (demodulation reference signal) of the first user equipment, and the third scrambling identity is used as a scrambling identity of a DMRS of an interfering user equipment. In this approach, the scrambling identity of the DMRS of the interfering user equipment is different from the scrambling identity of the DMRS of the first user equipment, and is configured semi-statically by the network device.
In one possible design, a network device configures a first set of scrambling identities for demodulation reference signals, DMRSs; the downlink control information further includes first scrambling identity indication information, where the first scrambling identity indication information is used to indicate an index value of a scrambling identity of the DMRS of the first user equipment in the first set. In the method, the network device semi-statically configures a first set of the scrambling identifiers of the DMRS, and the first user equipment determines the scrambling identifier of the DMRS of the first user equipment in the first set according to the indication information in the downlink control information.
In one possible design, the second codeword information in the downlink control information is further used to indicate an index value of a scrambling identifier of the DMRS of the interfering user equipment in the first set. In the method, the network device semi-statically configures a first set of the scrambling identifiers of the DMRS, and the first user equipment determines the scrambling identifier of the DMRS of the first user equipment in the first set according to the indication information in the second codeword information in the downlink control information.
In one possible design, the scrambling identity of the data signal includes a sub-scrambling identity, and/or an RNTI.
In one possible design, the network device configures a first sub-scrambling identity as a sub-scrambling identity for the data signal of the first user device and a sub-scrambling identity for the data signal of the interfering user device. In this way, the scrambling identity of the data signal of the interfering user equipment is the same as the scrambling identity of the data signal of the first user equipment, both configured semi-statically by the network equipment.
In one possible design, the network device configures a second sub-scrambling identity as a sub-scrambling identity for the data signal of the first user device and a third sub-scrambling identity as a sub-scrambling identity for the data signal of the interfering user device. In this approach, the scrambling identity of the data signal of the interfering user equipment is different from the scrambling identity of the data signal of the first user equipment and is semi-statically configured by the network device, respectively.
In one possible design, the network device configures a second set of sub-scrambling identities; the downlink control information further includes second scrambling identity indication information, which is used to indicate index values of sub-scrambling identities of data signals of the interfering user equipment in the second set. In this approach, the network device semi-statically configures a second set of sub-scrambling identities in which the first user device determines sub-scrambling identities of data signals interfering with the user device.
In one possible design, the scrambling identity of the data signal interfering with the user equipment further includes an RNTI, the network equipment configuring the third set; the third set comprises a plurality of RNTIs; the downlink control information further includes second scrambling identity indication information, and the second scrambling identity indication information is used for indicating an index value of the RNTI of the interfering user equipment in the third set. In this way, the network device semi-statically configures a third set of RNTIs, in which the first user equipment determines RNTIs of interfering user equipments.
In one possible design, the downlink control information further includes first port indication information, where the first port indication information is used to indicate a number of a transmission antenna port of a DMRS of the first user equipment and a number of a transmission antenna port of a DMRS of the interfering user equipment.
In one possible design, the channel coding information includes a modulation and coding scheme MCS and a redundancy version RV.
Correspondingly, the application also provides a communication device, and the device can realize the communication method of the second aspect. For example, the apparatus may be a network device or a chip applied in a network device, and may also be other apparatuses capable of implementing the communication method, where the method may be implemented by software, hardware, or by executing corresponding software through hardware.
In one possible design, the apparatus may include a processor and a memory. The processor is configured to enable the apparatus to perform the corresponding functions of the method of the second aspect. The memory is for coupling to the processor and holds the necessary program instructions and data for the device. In addition, the device can also comprise a communication interface for supporting the communication between the device and other devices. The communication interface may be a transceiver or a transceiver circuit.
In one possible design, the apparatus may include: the device comprises a processing module and a sending module. The processing module is used for determining downlink control information of the first user equipment; the downlink control information comprises first code word information and one or more second code word information; the first code word information is used for indicating the channel coding information of the first user equipment, and the second code word information is used for indicating the channel coding information of the interference user equipment of the first user equipment; the sending module is used for sending the downlink control information.
In one possible design, the processing module is further configured to configure a first scrambling identity as a scrambling identity of a demodulation reference signal, DMRS, of the first user equipment and a scrambling identity of a DMRS of the interfering user equipment.
In one possible design, the processing module is further configured to configure a second scrambling identity and a third scrambling identity, where the second scrambling identity is used as a scrambling identity of a DMRS for a demodulation reference signal of the first user equipment, and the third scrambling identity is used as a scrambling identity of a DMRS for an interfering user equipment.
In a possible design, the downlink control information further includes first scrambling identifier indication information, and the processing module is further configured to configure a first set of scrambling identifiers for demodulation reference signals DMRSs; the first scrambling identity indication information is used for indicating an index value of a scrambling identity of the DMRS of the first user equipment in the first set.
In one possible design, the second codeword information in the downlink control information is further used to indicate an index value of a scrambling identifier of the DMRS of the interfering user equipment in the first set.
In one possible design, the scrambling identity of the data signal includes a sub-scrambling identity, and/or an RNTI.
In one possible design, the processing module is further configured to configure a first sub-scrambling identity as a sub-scrambling identity for the data signal of the first user equipment and a sub-scrambling identity for the data signal of the interfering user equipment.
In one possible design, the processing module is further configured to configure a second sub-scrambling identity and a third sub-scrambling identity, where the second sub-scrambling identity is a sub-scrambling identity of a data signal of the first user equipment, and the third sub-scrambling identity is a sub-scrambling identity of a data signal of an interfering user equipment.
In a possible design, the downlink control information further includes second scrambling identifier indication information, and the processing module is further configured to configure a second set of sub-scrambling identifiers; the second scrambling identity indication information is used for indicating index values of sub-scrambling identities of data signals of the interfering user equipment in the second set.
In one possible design, the scrambling identifier of the data signal interfering with the ue further includes an RNTI, the downlink control information further includes second scrambling identifier indication information, and the processing module is further configured to configure a third set, where the third set includes a plurality of RNTIs; the second scrambling identity indication information is used for indicating an index value of the RNTI of the interfering user equipment in the third set.
In one possible design, the downlink control information further includes first port indication information, where the first port indication information is used to indicate a number of a transmission antenna port of a DMRS of the first user equipment and a number of a transmission antenna port of a DMRS of the interfering user equipment.
In a third aspect, the present application provides a communication method and apparatus.
In one possible design, the method may include: receiving first downlink control information of first user equipment from network equipment; receiving second downlink control information of interfering user equipment from first user equipment of the network equipment; scrambling the first downlink control information and the second downlink control information by respectively adopting a Radio Network Temporary Identifier (RNTI) of the first user equipment; and eliminating the interference of the signal of the interference user equipment to the signal of the first user equipment according to the first downlink control information and the second downlink control information.
In the method, downlink control information of a first user equipment and an interference user equipment of the first user equipment are scrambled by using RNTI of the first user equipment. The first user equipment can acquire the downlink control information of the interfering user equipment, so that the interference of the signal of the interfering user equipment on the signal of the first user equipment is eliminated.
In one possible design, the second downlink control information includes one or more codeword information, and the codeword information is used to indicate channel coding information of the interfering user equipment.
In one possible design, the second downlink control information includes port indication information, where the port indication information is used to indicate a number of a transmission antenna port of a demodulation reference signal DMRS of an interfering user equipment.
Correspondingly, the application also provides a communication device, and the device can implement the communication method of the third aspect. For example, the apparatus may be a user equipment or a chip applied in the user equipment, and may also be other apparatuses capable of implementing the communication method, where the method may be implemented by software, hardware, or by executing corresponding software through hardware.
In one possible design, the apparatus may include a processor and a memory. The processor is configured to enable the apparatus to perform the corresponding functions of the method of the third aspect. The memory is for coupling to the processor and holds the necessary program instructions and data for the device. In addition, the device can also comprise a communication interface for supporting the communication between the device and other devices. The communication interface may be a transceiver or a transceiver circuit.
In one possible design, the apparatus may include: the device comprises a receiving module and a processing module. The receiving module is used for receiving first downlink control information of first user equipment from the network equipment; the receiving module is further configured to receive second downlink control information of an interfering user equipment from a first user equipment of the network equipment; the first downlink control information and the second downlink control information are scrambled by using a Radio Network Temporary Identifier (RNTI) of the first user equipment respectively; the processing module is configured to eliminate, according to the first downlink control information and the second downlink control information, interference of a signal interfering with the user equipment on a signal of the first user equipment.
In one possible design, the second downlink control information includes one or more codeword information, where the codeword information is used to indicate channel coding information of the interfering user equipment.
In one possible design, the second downlink control information includes port indication information, where the port indication information is used to indicate a number of a transmission antenna port of a demodulation reference signal DMRS of the interfering user equipment.
In a fourth aspect, the present application provides a communication method and apparatus.
In one possible design, the method may include: determining first downlink control information of first user equipment; determining second downlink control information of the interfering user equipment of the first user equipment; sending first downlink control information and second downlink control information; the first downlink control information and the second downlink control information are scrambled by using a Radio Network Temporary Identifier (RNTI) of the first user equipment respectively.
In the method, downlink control information of a first user equipment and an interference user equipment of the first user equipment are scrambled by using RNTI of the first user equipment. The first user equipment can acquire the downlink control information of the interfering user equipment, so that the interference of the signal of the interfering user equipment on the signal of the first user equipment is eliminated.
In one possible design, the second downlink control information includes one or more codeword information, where the codeword information is used to indicate channel coding information of the interfering user equipment.
In one possible design, the second downlink control information includes port indication information, where the port indication information is used to indicate a number of a transmission antenna port of a demodulation reference signal DMRS of the interfering user equipment.
Correspondingly, the present application also provides a communication device, which can implement the communication method described in the fourth aspect. For example, the apparatus may be a network device or a chip applied in a network device, and may also be other apparatuses capable of implementing the communication method, where the method may be implemented by software, hardware, or by executing corresponding software through hardware.
In one possible design, the apparatus may include a processor and a memory. The processor is configured to enable the apparatus to perform the corresponding functions of the method of the fourth aspect. The memory is for coupling to the processor and holds the necessary program instructions and data for the device. In addition, the device can also comprise a communication interface for supporting the communication between the device and other devices. The communication interface may be a transceiver or a transceiver circuit.
In one possible design, the apparatus may include: the device comprises a processing module and a sending module. The processing module is used for determining first downlink control information of the first user equipment; the processing module is further configured to determine second downlink control information of the interfering user equipment of the first user equipment; the sending module is used for sending the first downlink control information and the second downlink control information; the first downlink control information and the second downlink control information are scrambled by using a Radio Network Temporary Identifier (RNTI) of the first user equipment respectively.
In one possible design, the second downlink control information includes one or more codeword information, where the codeword information is used to indicate channel coding information of the interfering user equipment.
In one possible design, the second downlink control information includes port indication information, where the port indication information is used to indicate a number of a transmission antenna port of a demodulation reference signal DMRS of the interfering user equipment.
The present application also provides a computer-readable storage medium having stored therein instructions, which when run on a computer, cause the computer to perform the method of any of the above aspects.
The present application also provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the above aspects.
The present application further provides a chip system, which includes a processor and a memory, and is configured to implement the method according to any one of the above aspects.
The present application provides a communication system comprising the above-mentioned means for implementing the method of the first aspect, and the above-mentioned means for implementing the method of the second aspect; alternatively, the apparatus for implementing the method of the third aspect and the apparatus for implementing the method of the fourth aspect are included.
Any one of the above-provided apparatuses, computer storage media, computer program products, chip systems, or communication systems is configured to execute the above-provided corresponding methods, and therefore, the beneficial effects that can be achieved by the apparatuses, the computer storage media, the computer program products, the chip systems, or the communication systems can refer to the beneficial effects of the corresponding schemes in the above-provided corresponding methods, and are not described herein again.
Drawings
Fig. 1 is a schematic view of a scene to which the technical solution provided by the embodiment of the present application is applied;
FIG. 2 is a schematic diagram of a data transmission process;
fig. 3 is a first schematic diagram of a system architecture to which the technical solution provided by the embodiment of the present application is applied;
fig. 4 is a second schematic diagram of a system architecture to which the technical solution provided by the embodiment of the present application is applied;
fig. 5 is a third schematic diagram of a system architecture to which the technical solution provided by the embodiment of the present application is applied;
fig. 6 is a first schematic diagram of a communication method according to an embodiment of the present application;
fig. 7 is a second schematic diagram of a communication method according to an embodiment of the present application;
fig. 8 is a first schematic structural diagram of a communication device according to an embodiment of the present disclosure;
fig. 9 is a second schematic structural diagram of a communication device according to an embodiment of the present application;
fig. 10 is a third schematic structural diagram of a communication device according to an embodiment of the present application.
Detailed Description
The term "plurality" herein means two or more. The terms "first" and "second" herein are used to distinguish between different objects, and are not used to describe a particular order of objects. For example, the first set and the second set are used to indicate different sets, rather than to describe the sequential order of the sets. The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone.
In the embodiments of the present application, words such as "exemplary" or "for example" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
In the multi-user pairing transmission, mutual interference may be formed between user equipment. For example, UE1 and UE2 in fig. 1 do not achieve orthogonality at the second time. The base station transmitting signals to UE2 constitutes interference to the UE1 received signals, and the base station transmitting signals to UE1 constitutes interference to the UE2 received signals. In order to improve the transmission performance of the system, it is necessary to eliminate mutual interference between users. For a UE, if information of its interfering UE can be acquired, the interference of the signal of the interfering UE to the signal of the UE can be eliminated.
For example, the data transmission flow between the base station and the UE is shown in fig. 2.
Data portion: and respectively carrying out channel coding, scrambling, modulation, precoding and resource mapping on source bit streams corresponding to one or more code words to form a data signal. The information of the channel coding includes Modulation and Coding Scheme (MCS) information, Redundancy Version (RV) information, and the like. Bit scrambling is to scramble a bit sequence formed by channel coding with a pseudo random sequence (pseudo random) and an initial parameter for generating the pseudo random sequence is called a scrambling flag. The generation of the pseudo-random sequence is generally determined by at least one of a cell physical identity (PCI) of a cell-specific, a Radio Network Temporary Identity (RNTI) of a user, or a configuration value of a user-specific. For example, Cinit=nRNTI*215+q*214+nID;CinitIs a scrambling mark; n isRNTIIs RNTI; n isIDFor sub-scrambling identification, exemplary, nIDMay be one of PCI or user-level configuration values.
Reference signal portion: an initialization value, which is generally defined as an initialization identifier (initialization ID), or scrambling identifier (scrambling ID), is generated based on a reference signal sequence. The scrambling flag is used to generate a demodulation reference signal (DMRS) sequence.
The signals transmitted by the base station to the UE include the data signals of the data part and the reference signals of the reference signal part.
The UE acquires the information of the data signal and the reference signal that interfere with the UE, so that the interference of the signal that interferes with the UE on the signal of the UE can be eliminated.
For example, if the UE acquires channel coding information of the interfering UE, including MCS information and RV information, the UE may obtain the translated information of the source bit stream based on decoding the data signal of the interfering UE, and then perform interference cancellation.
The UE also acquires a scrambling identifier of a data signal interfering the UE, wherein the scrambling identifier comprises the RNTI and/or the scrambling sub-identifier, so that corresponding descrambling information can be acquired, the influence of a scrambling sequence is removed, and accurate decoding is realized.
The UE further obtains a scrambling identifier, a port number, and the like of the reference signal interfering with the UE, so that a demodulation reference signal of the data signal interfering with the UE can be obtained, and a transmission channel response corresponding to the data signal interfering with the UE is further accurately estimated, thereby eliminating interference.
The embodiment of the application provides a communication method, and under the premise of not restricting the scheduling of a base station side, UE acquires the information of the interference UE, so that the bit-level interference elimination is realized.
The technical scheme provided by the application can be applied to various communication systems with multi-user pairing transmission, such as a current 3G, 4G communication system, a 5G NR (new radio) system, a future evolution system or a plurality of communication fusion systems and the like. A variety of application scenarios may be included, which may include scenarios such as machine-to-machine (M2M), D2M, macro-micro communication, enhanced mobile internet (eMBB), ultra high reliability and ultra low latency communication (urrllc), and mass internet of things communication (mtc), and these scenarios may include but are not limited to: a communication scenario between the user equipment and the user equipment, a communication scenario between the network equipment and the network equipment, a communication scenario between the network equipment and the user equipment, and the like.
The technical solution provided in the embodiment of the present application may be applied to a system architecture as shown in fig. 3, where the system architecture may include a network device 100 and a plurality of user devices connected to the network device 100, and it should be noted that in the embodiment of the present application, the plurality means two or more. Illustratively, the system architecture includes a user device 201, a user device 202, a user device 203, and a user device 204.
Network device 100 may be a device capable of communicating with a user device. The network device 100 may be a relay station or an access point, etc. The network device 100 may be a Base Transceiver Station (BTS) in a global system for mobile communications (GSM) or Code Division Multiple Access (CDMA) network, may be an nb (nodeb) in a Wideband Code Division Multiple Access (WCDMA), and may be an eNB or enodeb (evolved nodeb) in LTE. The network device 100 may also be a wireless controller in a Cloud Radio Access Network (CRAN) scenario. Network device 100 may also be a network device in a 5G network or a network device in a future evolved PLMN network; but also wearable devices or vehicle-mounted devices, etc. For example, network device 100 may be a base station of fig. 1.
The user equipment may be an access terminal, a UE (user equipment) unit, a UE station, a mobile station, a distant station, a remote terminal, a mobile device, a UE terminal, a wireless communication device, a UE agent, or a UE device, etc. An access terminal may be a cellular telephone, a cordless telephone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device with wireless communication capabilities, a computing device or other processing device connected to a wireless modem, a vehicle mounted device, a wearable device, a terminal in a 5G network or a terminal in a future evolved PLMN network, etc. For example, the user equipment may be UE1 or UE2 in fig. 1.
It should be noted that the system architecture shown in fig. 3 is only for example and is not used to limit the technical solution of the present application. It will be understood by those skilled in the art that other devices (e.g., core network) may be included in the system architecture during the implementation, and the number of the network device 100 and the user equipment may also be configured according to the specific needs.
The communication method and device provided by the embodiment of the application can be applied to user equipment, and the user equipment comprises a hardware layer, an operating system layer running on the hardware layer, and an application layer running on the operating system layer. The hardware layer includes hardware such as a Central Processing Unit (CPU), a Memory Management Unit (MMU), and a memory (also referred to as a main memory). The operating system may be any one or more computer operating systems that implement business processing through processes (processes), such as a Linux operating system, a Unix operating system, an Android operating system, an iOS operating system, or a windows operating system. The application layer comprises applications such as a browser, an address list, word processing software, instant messaging software and the like. In the embodiment of the present application, a specific structure of an execution main body of a communication method is not particularly limited in the embodiment of the present application, as long as the communication method according to the embodiment of the present application can perform communication by running a program recorded with a code of the communication method according to the embodiment of the present application, for example, the execution main body of the communication method provided in the embodiment of the present application may be a user equipment, or a functional module capable of calling a program and executing the program in the user equipment, or a device applied to the user equipment, such as a chip, and the present application is not limited thereto.
Moreover, various aspects or features of embodiments of the application may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques. The term "article of manufacture" as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. For example, computer-readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips, etc.), optical disks (e.g., Compact Disk (CD), Digital Versatile Disk (DVD), etc.), smart cards, and flash memory devices (e.g., erasable programmable read-only memory (EPROM), card, stick, or key drive, etc.). In addition, various storage media described herein can represent one or more devices and/or other machine-readable media for storing information. The term "machine-readable medium" can include, without being limited to, wireless channels and various other media capable of storing, containing, and/or carrying instruction(s) and/or data.
Since the future access network may be implemented by using a cloud radio access network (C-RAN) architecture, a possible way is to divide the protocol stack architecture and functions of the conventional base station into two parts, one part is called a Central Unit (CU) and the other part is called a Distributed Unit (DU), and the actual deployment ways of the CUs and the DU are flexible, for example, CU parts of a plurality of base stations are integrated together to form a functional entity with a large scale. Fig. 4 is a schematic diagram of a network architecture according to an embodiment of the present application. As shown in fig. 4, the network architecture includes an access network (RAN, for example) device and a user equipment. The RAN device includes a baseband device and a radio frequency device, where the baseband device may be implemented by one node or by multiple nodes, and the radio frequency device may be implemented independently by being pulled away from the baseband device, may also be integrated in the baseband device, or may be partially pulled away and partially integrated in the baseband device. For example, in an LTE communication system, a RAN device (eNB) includes a baseband device and a radio frequency device, where the radio frequency device may be arranged in a remote manner with respect to the baseband device (e.g., a Radio Remote Unit (RRU) is arranged with respect to a baseband processing unit (BBU)), and the RAN device is implemented by a node, and the node is configured to implement functions of protocol layers such as Radio Resource Control (RRC), packet data convergence layer protocol (PDCP), Radio Link Control (RLC), and Media Access Control (MAC). As another example, in an evolution structure, a baseband device may include a Centralized Unit (CU) and a Distributed Unit (DU), and a plurality of DUs may be centrally controlled by one CU. As shown in fig. 4, the CU and the DU may be divided according to protocol layers of the wireless network, for example, functions of a packet data convergence layer protocol layer and protocol layers above the packet data convergence layer are disposed in the CU, and functions of protocol layers below the PDCP, for example, functions of a Radio Link Control (RLC) layer and a medium access control (mac) layer, are disposed in the DU.
This division of the protocol layers is only an example, and it is also possible to divide the protocol layers at other protocol layers, for example, at the RLC layer, and the functions of the RLC layer and the protocol layers above are set in the CU, and the functions of the protocol layers below the RLC layer are set in the DU; alternatively, the functions are divided into some protocol layers, for example, a part of the functions of the RLC layer and the functions of the protocol layers above the RLC layer are provided in the CU, and the remaining functions of the RLC layer and the functions of the protocol layers below the RLC layer are provided in the DU. In addition, the processing time may be divided in other manners, for example, by time delay, a function that needs to satisfy the time delay requirement for processing is provided in the DU, and a function that does not need to satisfy the time delay requirement is provided in the CU.
In addition, the radio frequency device may be pulled away, not placed in the DU, or integrated in the DU, or partially pulled away and partially integrated in the DU, which is not limited herein.
In addition, with continuing reference to fig. 5, with respect to the architecture shown in fig. 4, the Control Plane (CP) and the User Plane (UP) of the CU may be separated and implemented by being divided into different entities, i.e., a control plane CU entity (CU-CP entity) and a user plane CU entity (CU-UP entity), respectively.
In the above network architecture, the signaling/data generated by the CU may be transmitted to the user equipment through the DU, or the signaling/data generated by the user equipment may be transmitted to the CU through the DU. The DU may pass through the user equipment or CU directly through protocol layer encapsulation without parsing the signaling/data. In the following embodiments, if transmission of such signaling/data between the DU and the user equipment is involved, the transmission or reception of the signaling/data by the DU includes such a scenario. For example, the signaling of the RRC or PDCP layer is finally processed as the signaling/data of the physical layer (PHY) to be transmitted to the user equipment, or converted from the received signaling/data of the PHY layer. Under this architecture, the signaling/data of the RRC or PDCP layer can also be considered to be transmitted by the DU, or by the DU and the radio frequency.
In the above embodiment, the CU is divided into network devices in the RAN, and furthermore, the CU may also be divided into network devices in the core network, which is not limited herein.
The apparatus in the following embodiments of the present application may be located in a user equipment or a network device according to the functions implemented by the apparatus. When the above structure of CU-DU is adopted, the network device may be a CU node, or a DU node, or a RAN device including the functions of the CU node and the DU node.
In this application, the communication method may be executed by a network device and a user equipment, or may be an apparatus, such as a chip, applied to the network device and the user equipment, or another apparatus for implementing the communication method. The network device and the user equipment are used to perform the above communication method.
The following describes in detail a communication method and apparatus provided in an embodiment of the present application.
The embodiment of the present application provides a communication method, which can be applied to the communication systems shown in fig. 3 to 5. As shown in fig. 6, the method may include:
s101, the network equipment determines multi-user interference elimination mode indication information.
The network device determines whether an interfering user equipment is present at the first user equipment. Wherein the first user equipment is a user equipment connected with the network equipment. Illustratively, the first user equipment is the UE1 in fig. 1 (a) or fig. 1 (b). As shown in fig. 1 (a), at a first time instant, UE1 and UE2 are orthogonal, the network device determines that UE1 is absent of interfering user equipment; as shown in fig. 1 (b), at the second time instant, UE1 and UE2 are not orthogonal, the network device determines that UE1 has interfering user equipment, UE 2.
The network equipment determines whether to instruct the first user equipment to carry out interference elimination or not according to whether the first user equipment has interference user equipment or not. In one implementation, the multiuser interference cancellation mode indication information is used for indicating a multiuser interference cancellation mode, where the multiuser interference cancellation mode includes an interference cancellation mode and an interference non-cancellation mode. If the network equipment determines that the first user equipment has interference user equipment, the multi-user interference elimination mode is an interference elimination mode; the multi-user interference cancellation mode is a non-interference cancellation mode if the network device determines that the first user device does not have an interfering user device.
In one implementation, the network device sends the indication information of the multi-user interference cancellation mode to the first user equipment through an RRC message.
S102, the first user equipment acquires indication information of a multi-user interference elimination mode.
In one implementation, the first ue receives an RRC message from the network device, so as to obtain the indication information of the multi-user interference cancellation mode.
For example, the value of the multiuser interference cancellation mode indication information indicates the multiuser interference cancellation mode. Illustratively, if the first user equipment has interfering user equipment, the value of the multi-user interference cancellation mode indication information is 1, which indicates that the multi-user interference cancellation mode is an interference cancellation mode; and if the first user equipment has no interference user equipment, the value of the multi-user interference elimination mode indication information is 0, which indicates that the multi-user interference elimination mode is a non-interference elimination mode. For example, as shown in fig. 1 (a), at the first time, UE1 and UE2 are orthogonal, and the network device determines that UE1 does not have an interfering user equipment, and determines that the value of the multi-user interference cancellation mode indication information is 0. As shown in fig. 1 (b), at the second time, UE1 and UE2 are not orthogonal, and the network device determines that UE1 has interfering UE2, and then determines that the value of the multiuser interference cancellation mode indication information is 1.
For example, if the first user equipment determines that the RRC message includes the indication information of the multi-user interference cancellation mode, it determines that the multi-user interference cancellation mode is the interference cancellation mode; and if the first user equipment determines that the RRC message does not comprise the indication information of the multi-user interference elimination mode, determining that the multi-user interference elimination mode is a non-interference elimination mode. For example, as shown in fig. 1 (a), at the first time, UE1 and UE2 are orthogonal, and the network device determines that UE1 does not have an interfering user equipment, the RRC message does not include the indication information of the multi-user interference cancellation mode, and the first user equipment determines that the multi-user interference cancellation mode is the non-interference cancellation mode. As shown in fig. 1 (b), at the second time, UE1 and UE2 are not orthogonal, and the network device determines that UE1 has interfering UE2, and then the RRC message includes indication information of the multi-user interference cancellation mode, and the first user equipment determines that the multi-user interference cancellation mode is the interference cancellation mode.
S103, the network equipment schedules the data reception of the first user equipment.
And the network equipment schedules the data reception of the first user equipment through the downlink control information. The network device determines and transmits downlink control information of the first user device, and the first user device may receive data at a time-frequency position indicated by the downlink control information. For example, the downlink control information may be dci (downlink control information).
The downlink control information includes a plurality of Codeword (CW) information.
The plurality of code word information includes a first code word information, and the first code word information is used for indicating the channel coding information of the first user equipment. The channel coding information includes MCS information and RV information.
When the network equipment schedules the first user equipment, whether the first user equipment has interference user equipment is determined. If the first user equipment is determined to have the interfering user equipment, the plurality of code word information further comprises one or more second code word information, and the second code word information is used for indicating the channel coding information of the interfering user equipment of the first user equipment. Illustratively, the codeword information of the downlink control information is shown in table 1.
TABLE 1
Figure BDA0001970844980000131
For example, the first user equipment is the user equipment 201 in fig. 3, and the network device determines that the user equipment 201 has an interfering user equipment when scheduling the user equipment 201. In one case, the first user equipment has one interfering user equipment. For example, if the user equipment 202 is an interfering user equipment of the user equipment 201, the CW1 is the codeword information of the user equipment 202. In one case, the first user equipment has a plurality of interfering user equipments. For example, if the ue 202 and the ue 203 are interfering ues of the ue 201, the downlink control information may further include CW2, and the CW2 is codeword information of the ue 203.
It should be noted that one ue may employ one or more codeword schedules. For example, in a multi-antenna scenario, the number of spatial multiplexing layers supported by one ue may affect the number of scheduling codewords. The number of space division multiplexing layers exceeds 4, and single user equipment adopts double-code scheduling; the number of spatial multiplexing layers is less than or equal to 4, and a single user equipment adopts a code word for scheduling. In the embodiment of the present application, a single user equipment employs single codeword scheduling as an example for explanation. In practical use, a single user equipment may also employ multiple codeword scheduling. For example, a single user equipment employs 2 codeword scheduling. Illustratively, CW0 and CW1 are codeword information for user equipment 201, and CW2 and CW3 are codeword information for user equipment 202. And the user equipment determines the code word information corresponding to each user equipment according to the number of the code words used by scheduling single user equipment. For example, the network device and the user device respectively determine the number of code words used by scheduling a single user device according to the configuration parameters; for another example, the network device notifies the user equipment through the semi-static configuration information, and schedules the number of codewords used by a single user equipment.
S104, the first user equipment receives the downlink control information.
The first user equipment receives downlink control information from the network equipment.
S105, the first user equipment acquires the channel coding information of the first user equipment and the channel coding information of the interference user equipment of the first user equipment.
The first user equipment determines the channel coding information of the first user equipment and the channel coding information of the interference user equipment of the first user equipment according to the received downlink control information.
In one implementation, the first ue determines channel coding information in the downlink control information according to the multi-user interference cancellation mode indication information.
If the indication information of the multi-user interference elimination mode indicates that the multi-user interference elimination mode is the interference non-elimination mode, the first user equipment determines that the code word information in the downlink control information is the code word information of the first user equipment, namely the downlink control information comprises the first code word information and does not comprise the second code word information. Illustratively, the codeword information is shown in table 2.
TABLE 2
Figure BDA0001970844980000141
And if the multi-user interference elimination mode indication information indicates that the multi-user interference elimination mode is the interference elimination mode, the first user equipment determines the code word information of the first user equipment and the code word information of the interference user equipment according to the effective code word information in the downlink control information.
In one case, if the number of valid codeword information is 1, the codeword information is codeword information of the first user equipment, and the downlink control information includes the first codeword information and does not include the second codeword information.
In one case, the number of valid codeword information is 2, the first valid codeword information is codeword information of the first user equipment, and the second valid codeword information is codeword information of the interfering user equipment; the downlink control information comprises first code word information and second code word information. Illustratively, in table 1, CW0 is codeword information of the first user equipment, and CW1 is codeword information of the interfering user equipment.
In one case, if the number of valid codeword information is greater than 2, the first valid codeword information is codeword information of the first user equipment, and other valid codeword information is codeword information of the interfering user equipment; the downlink control information comprises first code word information and a plurality of second code word information.
For example, the first user equipment may determine whether the codeword information is valid according to the MCS information in the codeword information. Illustratively, when the MCS is a preset value, the corresponding codeword information is invalid.
Further, the first user equipment determines the channel coding information of the first user equipment according to the first code word information in the downlink control information. And if the downlink control information comprises second code word information, the first user equipment determines the channel coding information of the interference user equipment according to the second code word information. Illustratively, the user equipment 201 determines CW0 in table 1 as the channel coding information of the user equipment 201; CW1 in table 1 is determined to be the channel coding information of interfering user equipment 0 (user equipment 202).
S106, the first user equipment acquires the scrambling identifier of the DMRS of the first user equipment and the scrambling identifier of the DMRS of the interference user equipment of the first user equipment.
If the multi-user interference elimination mode is determined to be the interference elimination mode according to the multi-user interference elimination mode indication information, and the downlink control information comprises second code word information, the first user equipment determines to eliminate the interference; the first user equipment acquires the scrambling identifier of the DMRS of the first user equipment and the scrambling identifier of the DMRS of the interference user equipment of the first user equipment.
In one implementation, the network device configures a first scrambling identity as a scrambling identity of a DMRS of the first user equipment and a scrambling identity of a DMRS of an interfering user equipment. For example, the network device may send the first scrambling identity to the first user equipment through an RRC message. And if the first user equipment acquires the first scrambling identifier from the network equipment, acquiring the scrambling identifier of the DMRS of the first user equipment and the scrambling identifier of the DMRS of the interference user equipment of the first user equipment.
In one implementation, the network device configures a second scrambling identity and a third scrambling identity, where the second scrambling identity is used as a scrambling identity of the DMRS of the first user equipment, and the third scrambling identity is used as a scrambling identity of the DMRS of the interfering user equipment. For example, the network device may send the second scrambling identity and the third scrambling identity to the first user equipment through an RRC message. And the first user equipment acquires the second scrambling identifier and the third scrambling identifier from the network equipment, and then acquires the scrambling identifier of the DMRS of the first user equipment and the scrambling identifier of the DMRS of the interference user equipment of the first user equipment.
In one implementation, a network device configures a first set of scrambling identities for a DMRS. For example, the network device sends the first set to the first user equipment via an RRC message.
And the first user equipment determines the scrambling identifier of the DMRS of the first user equipment in the first set according to the downlink control information. In some embodiments, the downlink control information includes first scrambling identity indicator information, where the first scrambling identity indicator information is used to indicate a scrambling label of a DMRS of the first user equipmentIndex values in the first set are identified. And the first user equipment determines the scrambling identifier of the DMRS of the first user equipment in the first set according to the first scrambling identifier indication information. Illustratively, the first set is shown in Table 3, where Table 3 includes 2 scrambling identifiers, RS _ SID1And RS _ SID2. The first scrambling identity indication information indicates that the index value of the scrambling identity of the DMRS of the first user equipment in the first set is 0, and the first user equipment determines that the scrambling identity of the DMRS of the first user equipment is RS _ SID1
TABLE 3
Index value Scrambling identification
0 RS_SID1
1 RS_SID2
It should be noted that table 3 is only an exemplary illustration. In practical applications, the first set may be in other forms. For example, table 3 may not include index values.
The first user equipment also determines the scrambling identifier of the DMRS of the interference user equipment in the first set according to the downlink control information.
In some embodiments, the second codeword information in the downlink control information is further used to indicate an index value of the scrambling identity of the DMRS of the interfering user equipment in the first set. And the first user equipment determines the scrambling identifier of the DMRS of the interference user equipment in the first set according to the second code word information. For example, the second codeword information includes a New Data Indicator (NDI),the value of NDI represents an index value in the first set of scrambling identities of DMRSs that interfere with the user equipment. Illustratively, the value of NDI of CW1 in table 1 represents the index value in the first set of scrambling identities of DMRSs that interfere with the user equipment. For example, if the NDI of CW1 in table 1 is 0, the first user equipment determines that the scrambling identity of the DMRS of the interfering user equipment is RS _ SID1(ii) a For another example, if the NDI of CW1 in table 1 is 1, the first user equipment determines that the scrambling identity of the DMRS of the interfering user equipment is RS _ SID2
In still further embodiments, the first user equipment determines the scrambling identity of the DMRS of the interfering user equipment in the first set according to a predetermined rule. For example, the predetermined rule is that the scrambling identity of the DMRS of the interfering user equipment is the same as the scrambling identity of the DMRS of the first user equipment. Illustratively, the first user equipment determines the scrambling identifier of the DMRS of the first user equipment in the first set according to the first scrambling identifier indication information, and then obtains the scrambling identifier of the DMRS of the interfering user equipment. For example, the predetermined rule is that the scrambling identity of the DMRS of the interfering user equipment and the scrambling identity of the DMRS of the first user equipment have different index values in the first set. For example, if the first user equipment determines that the scrambling identifier of the DMRS of the first user equipment is the scrambling identifier with an index value of 0 in table 3, the scrambling identifier of the DMRS of the interfering user equipment is determined to be the scrambling identifier with an index value of 1 in table 3.
In some embodiments, the network device configures a fourth set of scrambling identities that interfere with the DMRS of the user equipment. For example, the network device sends the fourth set to the first user equipment through an RRC message. Illustratively, the fourth set is shown in Table 3-1, where the fourth set in Table 3-1 includes 2 scrambling identifiers, RS _ SID3And RS _ SID4
It should be noted that table 3-1 is only an exemplary illustration. In practical applications, the fourth set may be in other forms. For example, table 3-1 may not include an index value.
TABLE 3-1
Index value Scrambling identification
0 RS_SID3
1 RS_SID4
The first user equipment also determines the scrambling identifier of the DMRS of the interference user equipment in the fourth set according to the downlink control information.
And the second code word information in the downlink control information is also used for indicating the index value of the scrambling identifier of the DMRS of the interfering user equipment in the fourth set. And the first user equipment determines the scrambling identifier of the DMRS of the interference user equipment in the fourth set according to the second code word information. For example, the second codeword information includes NDI, and a value of NDI represents an index value of the scrambling identity of the DMRS interfering with the user equipment in the fourth set. Illustratively, the value of NDI of CW1 in table 1 represents the index value in the fourth set of scrambling identities of DMRSs that interfere with the user equipment. For example, if the NDI of CW1 in table 1 is 0, the first user equipment determines that the scrambling identity of the DMRS of the interfering user equipment is RS _ SID3(ii) a For another example, if the NDI of CW1 in table 1 is 1, the first user equipment determines that the scrambling identity of the DMRS of the interfering user equipment is RS _ SID4
S107, the first user equipment acquires the scrambling identity of the data signal of the first user equipment and the scrambling identity of the data signal of the interference user equipment of the first user equipment.
If the multi-user interference elimination mode is determined to be the interference elimination mode according to the multi-user interference elimination mode indication information, and the downlink control information comprises second code word information, the first user equipment determines to eliminate the interference; the first user equipment acquires a scrambling identity of a data signal of the first user equipment and a scrambling identity of a data signal of an interfering user equipment of the first user equipment.
The scrambling identity of the data signal includes the RNTI and/or the sub-scrambling identity.
If the scrambling identity of the data signal comprises a sub-scrambling identity, the first user equipment acquires the sub-scrambling identity of the data signal of the first user equipment and the sub-scrambling identity of the data signal of the interference user equipment of the first user equipment.
In one implementation, the network device configures a first sub-scrambling identity as a sub-scrambling identity of a data signal of the first user device and a sub-scrambling identity of a data signal of an interfering user device. For example, the network device may send the first scrambling identity to the first user equipment through an RRC message. The first user equipment acquires the configured first sub-scrambling identity from the network equipment, so that the sub-scrambling identity of the data signal of the first user equipment and the sub-scrambling identity of the data signal of the interfering user equipment can be acquired.
In one implementation, the network device configures a second sub-scrambling identity and a third sub-scrambling identity, where the second sub-scrambling identity is a sub-scrambling identity of a data signal of the first user device, and the third sub-scrambling identity is a sub-scrambling identity of a data signal of an interfering user device. For example, the network device may send the second sub-scrambling identity and the third sub-scrambling identity to the first user equipment through an RRC message. The first user equipment acquires the configured second sub-scrambling identifier and the third sub-scrambling identifier from the network equipment, so that the sub-scrambling identifier of the data signal of the first user equipment and the sub-scrambling identifier of the data signal of the interfering user equipment can be acquired.
In one implementation, the network device configures a fourth sub-scrambling identifier as a sub-scrambling identifier of the data signal of the first user equipment; the sub-scrambling identity of the data signal of the interfering user equipment is a predefined value, for example, the identity of the cell in which the interfering user equipment is located, which may be, for example, the PCI of the cell in which the interfering user equipment is located.
In one implementation, the network device configures the first through an RRC messageA sub-scrambling identity of a data signal of a user equipment. The network device also configures a second set of sub-scrambling identities; the first user equipment determines one sub-scrambling identity in the second set as a sub-scrambling identity of the data signal of the interfering user equipment. For example, the network device sends the second set to the first user equipment via an RRC message. Illustratively, the second set is shown in Table 4, where the second set in Table 4 includes N sub-scrambling identities, NID1…nIDN. It should be noted that table 4 is only an exemplary illustration. In practical applications, the second set may be in other forms. For example, table 4 may not include index values.
TABLE 4
Index value Scrambling identification
0 nID1
1 nID2
N-1 nIDN
In some embodiments, the downlink control information includes second scrambling identity indication information indicating index values of sub-scrambling identities of data signals of the interfering user equipment in the second set. The first user equipment is in the second set according to the second scrambling identity indication informationA sub-scrambling identity of a data signal interfering with a user equipment is determined. The second scrambling identity indication information indicates that the index value of the sub-scrambling identity of the data signal of the interfering user equipment in the second set is 0, and the first user equipment determines that the sub-scrambling identity of the data signal of the interfering user equipment is nID1
Illustratively, the downlink control information includes the contents shown in table 5-1.
TABLE 5-1
Figure BDA0001970844980000171
Alternatively, the downlink control information may include the contents shown in table 5-2, for example.
TABLE 5-2
Figure BDA0001970844980000172
In some embodiments, the first user equipment traverses through the second set by blind detection to obtain the sub-scrambling identity of the data signal of the interfering user equipment.
If the scrambling identity of the data signal includes the RNTI, the first user equipment acquires the RNTI of the first user equipment and the RNTI of the interfering user equipment of the first user equipment.
In one implementation, the first user equipment acquires the RNTI of the first user equipment from the network equipment through a random access procedure.
In one implementation, the network device configures the third set; wherein the third set comprises a plurality of RNTIs. For example, the network device sends the third set to the first user equipment through an RRC message. The first user equipment acquires a third set from the network equipment, and determines an RNTI in the third set as an RNTI of the interfering user equipment. Illustratively, the third set is shown in table 6, where the third set in table 6 includes N RNTIs, RNTIs1…RNTIN
TABLE 6
Index value Scrambling identification
0 RNTI1
1 RNTI2
N-1 RNTIN
It should be noted that table 6 is only an exemplary illustration. In practical applications, the third set may be in other forms. For example,
table 6 may not include an index value.
In some embodiments, the downlink control information includes second scrambling identity indication information, and the second scrambling identity indication information is further used for indicating an index value of the RNTI of the interfering user equipment in the third set. And the first user equipment determines the RNTI of the interference user equipment in the third set according to the second scrambling identity indication information. For example, if the second scrambling identity indication information indicates that the index value of the RNTI of the interfering user equipment in the third set is 0, the first user equipment determines that the RNTI of the interfering user equipment is the RNTI1
In some embodiments, the first user equipment traverses through the third set in a blind detection manner to obtain the RNTI of the interfering user equipment.
The second set and the third set may be configured separately, or the second set and the third set may be combined into one set. Illustratively, the merged set is shown in Table 7.
TABLE 7
Index value Scrambling identification Scrambling identification
0 Data_SID1 {RNTI1,nID1}
1 Data_SID2 {RNTI2,nID2}
N-1 Data_SIDN {RNTIN,nIDN}
S108, the first user equipment acquires the number of the transmitting antenna port of the DMRS of the first user equipment and the number of the transmitting antenna port of the DMRS of the interference user equipment.
In one implementation manner, the downlink control information further includes first port indication information, where the first port indication information is used to indicate a number of a transmission antenna port of the DMRS of the first user equipment and a number of a transmission antenna port of the DMRS of the interfering user equipment. And the first user equipment acquires the number of the transmitting antenna port of the DMRS of the first user equipment and the number of the transmitting antenna port of the DMRS of the interfering user equipment according to the first port indication information.
S109, the first user equipment eliminates the interference of the signal of the interference user equipment to the signal of the first user equipment.
The first user equipment acquires the channel coding information of the interfering user equipment, the scrambling identifier of the DMRS of the interfering user equipment, the scrambling identifier of the data signal of the interfering user equipment and the number of the transmitting antenna port of the DMRS of the interfering user equipment, so that the interference of the signal of the interfering user equipment on the signal of the first user equipment can be eliminated according to the information of the interfering user equipment.
In one implementation, the first ue further determines whether to cancel interference according to the multi-user interference cancellation mode indication information. And if the multi-user interference elimination mode is determined to be the interference elimination mode according to the multi-user interference elimination mode indication information, the first user equipment eliminates the interference of the signal of the interference user equipment on the signal of the first user equipment according to the channel coding information of the interference user equipment, the scrambling identifier of the DMRS of the interference user equipment, the scrambling identifier of the data signal of the interference user equipment and the number of the transmitting antenna port of the DMRS of the interference user equipment.
According to the method provided by the embodiment of the application, the information of the interfering user equipment is indicated through the downlink control information, and by combining the semi-static configuration and the predefined rule, the first user equipment can acquire the channel coding information of the interfering user equipment, the scrambling identifier of the DMRS of the interfering user equipment, the scrambling identifier of the data signal of the interfering user equipment and the number of the transmitting antenna port of the DMRS of the interfering user equipment, so that the related information of the channel coding, the scrambling, the modulation, the precoding and the resource mapping of the interfering user equipment can be acquired, and the bit-level interference elimination of the signal of the interfering user equipment is realized. Under the condition of not restricting the scheduling mode of the network side, the interference elimination performance in the multi-user pairing transmission is improved.
The embodiment of the present application provides a communication method, which can be applied to the communication systems shown in fig. 3 to 5. As shown in fig. 6, the method may include:
s201, the network equipment determines multi-user interference elimination mode indication information.
The specific implementation of S201 may refer to the description of S101. Unlike S101, further, the mu-sir cancellation mode indication information may also be used to indicate that one ue is supported to receive multiple downlink control information.
For example, the value of the multi-user interference cancellation mode indication information is 0, which indicates that the multi-user interference cancellation mode is the non-interference cancellation mode; the value of the multi-user interference elimination mode indication information is 1, which indicates that the multi-user interference elimination mode is the interference elimination mode, and a user equipment receives downlink control information; the value of the multi-user interference cancellation mode indication information is 2, which indicates that the multi-user interference cancellation mode is an interference cancellation mode and supports one user equipment to receive a plurality of downlink control information.
Of course, it is also possible to support that one ue receives multiple pieces of downlink control information without using the indication information of the multi-user interference cancellation mode, but using a single indication information for indication, which is not limited in this embodiment of the present invention.
S202, the first user equipment acquires indication information of a multi-user interference elimination mode.
In one implementation, the first ue receives an RRC message from the network device, so as to obtain the indication information of the multi-user interference cancellation mode.
S203, the network equipment schedules the data reception of the first user equipment.
And the network equipment schedules the first user equipment through the first downlink control information. The network device determines and transmits first downlink control information of the first user equipment, and the first user equipment can receive data at a time-frequency position indicated by the first downlink control information. For example, the first downlink control information may be dci (downlink control information).
The specific content of the first downlink control information is the same as that of the downlink control information in S103, and reference may be made to the specific description of S103.
Further, if one ue is supported to receive multiple pieces of downlink control information, the network device may also indicate information of the interfering ue of the first ue by sending the second downlink control information when scheduling the first ue. The first user equipment may obtain information of the interfering user equipment of the first user equipment according to the second downlink control information.
The second downlink control information includes one or more second codeword information, and the second codeword information is used to indicate channel coding information of an interfering user equipment of the first user equipment. Illustratively, the codeword information of the second downlink control information is shown in table 8.
TABLE 8
Figure BDA0001970844980000201
For example, the first user equipment is the user equipment 201 in fig. 3, and the network device determines that the user equipment 201 has an interfering user equipment when scheduling the user equipment 201. In one case, the first user equipment has 3 interfering user equipments. For example, the user equipment 202, the user equipment 203, and the user equipment 204 are interfering user equipments of the user equipment 201; the first downlink control information includes CW0 and CW1, CW0 is codeword information of the user equipment 201, and CW1 is codeword information of the user equipment 202; the second downlink control information includes CW0 and CW1, CW0 is codeword information of the user equipment 203, and CW1 is codeword information of the user equipment 204.
It should be noted that, in the embodiment of the present application, a piece of second downlink control information is taken as an example for description, and in practical applications, there may be one or more pieces of second downlink control information, which is not limited in the embodiment of the present application.
And S204, the first user equipment receives the downlink control information.
The first user equipment receives first downlink control information. In one implementation, if the first ue determines, according to the indication information of the multi-user interference cancellation mode, that one ue is supported to receive multiple pieces of downlink control information, the second downlink control information may also be obtained.
In one implementation, the first user equipment obtains the first downlink control information and the second downlink control information according to configuration information of the network device. For example, the first user equipment performs blind detection in a first search space according to the configuration information of the network equipment to obtain first downlink control information; and the first user equipment performs blind detection in a second search space according to the configuration information of the network equipment to acquire second downlink control information.
If the first user equipment only acquires the first downlink control information, the embodiment is the same as the previous embodiment, and the specific implementation method may refer to the description of the previous embodiment.
And if the first user equipment acquires the first downlink control information and the second downlink control information, judging the number of effective code word information in the first downlink control information and the second downlink control information. In one case, the number of valid codeword information in the first downlink control information is 1, and the first downlink control information indicates information of the first user equipment. The second downlink control information indicates information of interfering user equipment of the first user equipment, and the number of effective codeword information in the second downlink control information is the indicated number of interfering user equipment. In one case, the number of valid codeword information in the first downlink control information is greater than 1, a first valid codeword information in the first downlink control information is used to indicate information of the first user equipment, and valid codeword information of the first downlink control information other than the first codeword information is used to indicate information of the interfering user equipment. The second downlink control information indicates information of interfering user equipment of the first user equipment, and the number of effective code word information in the second downlink control information is the number of the interfering user equipment indicated by the second downlink control information. In one case, the first ue does not receive the first downlink control information, and then the first ue determines that there is no scheduling and does not perform interference cancellation.
In one implementation, the first downlink control information and the second downlink control information are scrambled by using an RNTI of the first user equipment, respectively.
S205, the first user equipment obtains channel coding information of the first user equipment and channel coding information of an interfering user equipment of the first user equipment.
If the multi-user interference elimination mode is the interference elimination-free mode; or, the multi-user interference elimination mode is an interference elimination mode, and one user equipment receives one downlink control information; the first downlink control information is the downlink control information in S105, and the first user equipment acquires the channel coding information of the first user equipment and the channel coding information of the interfering user equipment of the first user equipment according to the step described in S105; and will not be described in detail herein.
If the multi-user interference elimination mode is the interference elimination mode, one user equipment is supported to receive a plurality of downlink control information; the first user equipment may further obtain second downlink control information. For example, the first user equipment performs blind detection in the second search space to obtain the second downlink control information. If the first user equipment acquires the second downlink control information, the channel coding information of the interfering user equipment can be determined according to the effective code word information in the second downlink control information. The effective code word information in the second downlink control information is the second code word information. For example, the first user equipment may determine whether the codeword information is valid according to the MCS information in the codeword information. Illustratively, when the MCS is a preset value, the corresponding codeword information is invalid.
Illustratively, the first user equipment is the user equipment 201 in fig. 3, and the user equipment 201 determines CW0 in table 8 as codeword information of interfering user equipment 1 (user equipment 203), where MCS and RV of CW0 are channel coding information of the interfering user equipment 1; the CW1 in table 8 is determined to be the codeword information of the interfering user equipment 2 (user equipment 204), where the MCS and RV of the CW1 are the channel coding information of the interfering user equipment 2.
S206, the first user equipment acquires the scrambling identifier of the DMRS of the first user equipment and the scrambling identifier of the DMRS of the interference user equipment of the first user equipment.
The method for the first user equipment to obtain the scrambling identity of the DMRS of the first user equipment and the scrambling identity of the DMRS of the interfering user equipment of the first user equipment may refer to S106.
The difference from S106 is that the first downlink control information in this embodiment is the downlink control information in S106. And, if the second downlink control information includes valid codeword information, the codeword information may also be used to indicate an index value of a scrambling identifier of a corresponding DMRS of the interfering user equipment in the first set or the fourth set. For example, the CW0 in table 8 is codeword information of the interfering user equipment 1, and the NDI of the CW0 is used to indicate an index value of the scrambling identifier of the DMRS of the interfering user equipment 1 in the first set (such as table 3). The CW1 in table 8 is codeword information of the interfering user equipment 2, and the NDI of the CW1 is used to indicate an index value of the scrambling identifier of the DMRS of the interfering user equipment 2 in the first set (such as table 3) or the fourth set (such as table 3-1).
Optionally, the second downlink control information includes first scrambling identifier indication information, where the first scrambling identifier indication information is used to indicate an index value of a corresponding scrambling identifier of the DMRS of the interfering user equipment in the first set or the fourth set. Illustratively, the first set is shown in Table 3, where Table 3 includes 2 scrambling identifiers, RS _ SID1And RS _ SID2. The first scrambling identity indication information indicates that the index value of the scrambling identity of the DMRS of the first user equipment in the first set is 0, and the first user equipment determines that the scrambling identity of the DMRS of the first user equipment is RS _ SID1
Of course, the scrambling identifier of the DMRS interfering with the user equipment indicated by the second downlink control information may also be the same as the scrambling identifier of the DMRS interfering with the user equipment indicated by the first downlink control information, without being determined by the second downlink control information, and this is not limited in this embodiment of the application.
S207, the first user equipment acquires the scrambling identity of the data signal of the first user equipment and the scrambling identity of the data signal of the interference user equipment of the first user equipment.
The method for the first user equipment to obtain the scrambling identity of the data signal of the first user equipment and the scrambling identity of the data signal of the interfering user equipment of the first user equipment may refer to S107.
The difference from S107 is that the first downlink control information in this embodiment is the downlink control information in S107. And, if the second downlink control information includes valid codeword information, the second downlink control information may further include second scrambling identity indication information. The second scrambling identity indication information of the second downlink control information is used for indicating the index value of the sub-scrambling identity of the data signal of the interfering user equipment indicated by the second downlink control information in the second set; and/or an index value of the RNTI of the interfering user equipment indicated by the second downlink control information in the third set. For a detailed description of the second scrambling identity indication information, reference may be made to the second scrambling identity indication information of the first downlink control information in S107, which is not described herein again. For example, the second scrambling identity indication information of the first downlink control information is used to indicate the index values of the scrambling identities of the data signals of the interfering ue 0 in table 7, and the second scrambling identity indication information of the second downlink control information is used to indicate the index values of the scrambling identities of the data signals of the interfering ues 1 and 2 in table 7.
Of course, the scrambling flag of the data signal of the interfering ue indicated by the second downlink control information may not be determined by the second downlink control information, but may be the same as the scrambling flag of the data signal of the interfering ue indicated by the first downlink control information, which is not limited in this embodiment of the application.
S208, the first user equipment acquires the number of the transmitting antenna port of the DMRS of the first user equipment and the number of the transmitting antenna port of the DMRS of the interference user equipment.
In one implementation, the first downlink control information further includes first port indication information, where the first port indication information is used to indicate a number of a transmission antenna port of the DMRS of the first user equipment and a number of a transmission antenna port of the DMRS of the interfering user equipment. And the first user equipment acquires the number of the transmitting antenna port of the DMRS of the first user equipment and the number of the transmitting antenna port of the DMRS of the interfering user equipment according to the first port indication information of the first downlink control information.
In another implementation, the first downlink control information further includes first port indication information, where the first port indication information is used to indicate a number of a transmission antenna port of the DMRS of the first user equipment and a number of a transmission antenna port of the DMRS of the interfering user equipment, which is indicated by the first downlink control information. The second downlink control information further includes first port indication information, and the first port indication information of the second downlink control information is used for indicating the number of the transmitting antenna port of the DMRS of the interfering user equipment indicated by the second downlink control information. The first user equipment acquires the number of a transmitting antenna port of the DMRS of the first user equipment and the number of a transmitting antenna port of the DMRS of the interference user equipment, which is indicated by the first downlink control information, according to the first port indication information of the first downlink control information; and acquiring the number of the transmitting antenna port of the DMRS of the interfering user equipment indicated by the second downlink control information according to the first port indication information of the second downlink control information.
S209, the first user equipment eliminates the interference of the signal of the interference user equipment to the signal of the first user equipment.
For a detailed description, reference may be made to S109, which is not described herein again. It should be noted that, in this embodiment, the interfering ue may include an interfering ue indicated by the first downlink control information, and/or an interfering ue indicated by the second downlink control information.
According to the method provided by the embodiment of the application, the user equipment can receive the plurality of downlink control information, the information of the interference user equipment is obtained through the plurality of downlink control information, and by combining the semi-static configuration and the predefined rule, the first user equipment can obtain the channel coding information of the interference user equipment, the scrambling identifier of the DMRS of the interference user equipment, the scrambling identifier of the data signal of the interference user equipment and the number of the transmitting antenna port of the DMRS of the interference user equipment, so that the related information of the channel coding, scrambling, modulation, precoding and resource mapping of the interference user equipment can be obtained, and the bit-level interference elimination of the signal of the interference user equipment is realized. Under the condition of not restricting the scheduling mode of the network side, the interference elimination performance in the multi-user pairing transmission is improved.
The embodiment of the present application provides a communication method, which can be applied to the communication systems shown in fig. 3 to 5. As shown in fig. 7, the method may include:
s301, the network equipment determines multi-user interference elimination mode indication information.
For specific implementation of S301, reference may be made to the description of S201, which is not described herein again.
S302, the first user equipment acquires indication information of a multi-user interference elimination mode.
For specific implementation of S302, reference may be made to the description of S202, which is not described herein again.
S303, the network equipment schedules the data reception of the first user equipment.
And the network equipment schedules the first user equipment through the first downlink control information. The network device determines and transmits first downlink control information of the first user equipment, and the first user equipment can receive data at a time-frequency position indicated by the first downlink control information. For example, the first downlink control information may be dci (downlink control information).
The first downlink control information includes scheduling information of the first user equipment, for example, includes codeword information of the first user equipment, and also includes a number of a transmission antenna port of the DMRS of the first user equipment.
In one implementation, the first downlink control information is scrambled with an RNTI of the first user equipment.
The network device determines second downlink control information of the interfering user equipment of the first user equipment, and also sends the second downlink control information of the interfering user equipment of the scheduling first user equipment to the first user equipment. The second downlink control information includes scheduling information of the interfering user equipment of the first user equipment, for example, includes codeword information of the interfering user equipment of the first user equipment, and also includes a number of a transmitting antenna port of the DMRS of the interfering user equipment of the first user equipment.
In one implementation, the second downlink control information is scrambled by using an RNTI of the first user equipment.
It should be noted that, in the embodiment of the present application, a piece of second downlink control information is taken as an example for description, and in practical applications, there may be one or more pieces of second downlink control information, which is not limited in the embodiment of the present application.
S304, the first user equipment receives the first downlink control information and the second downlink control information.
In one implementation, if the first ue determines that one ue is supported to receive multiple pieces of downlink control information according to the multi-user interference cancellation mode indication information, the first ue and the second ue are obtained according to configuration information of the network device. For example, the first user equipment performs blind detection in a first search space according to the configuration information of the network equipment to obtain first downlink control information; and the first user equipment performs blind detection in a second search space according to the configuration information of the network equipment to acquire second downlink control information.
In an implementation manner, the first user equipment descrambles the received first downlink control information and the second downlink control information by using the RNTI of the first user equipment, so that the scheduling information of the first user equipment and the scheduling information of the interfering user equipment of the first user equipment can be obtained.
In one implementation, the second downlink control information may include one or more codeword information indicating channel coding information of the interfering user equipment. For example, taking an example that the first downlink control information and the second downlink control information respectively include one valid codeword information, the codeword information of the first downlink control information and the second downlink control information is shown in table 9.
TABLE 9
Figure BDA0001970844980000231
S305, the first user equipment eliminates the interference of the signal of the interference user equipment to the signal of the first user equipment.
The first user equipment acquires the scheduling information of the interfering user equipment, and then can eliminate the interference of the signal of the interfering user equipment on the signal of the first user equipment according to the scheduling information of the interfering user equipment.
According to the method provided by the embodiment of the application, the first user equipment can acquire the scheduling information of the first user equipment and the scheduling information of the interference user equipment of the first user equipment, so that the bit-level interference elimination of the signal of the interference user equipment is realized, and the interference elimination performance in multi-user pairing transmission is improved.
The above-mentioned scheme provided by the embodiments of the present application is mainly introduced from the perspective of interaction between a network device and a user equipment. It is understood that the network device and the user equipment, in order to implement the above functions, include corresponding hardware structures and/or software modules for performing the respective functions. Those of skill in the art would readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the network device and the user equipment may be divided into functional modules according to the above method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation. The following description will be given taking the example of dividing each functional module corresponding to each function.
Fig. 8 is a schematic logical structure diagram of an apparatus 800 according to an embodiment of the present application, where the apparatus 800 may be a user equipment and is capable of implementing a function of a first user equipment in a method according to the embodiment of the present application; the apparatus 800 may also be an apparatus capable of supporting the user equipment to implement the function of the first user equipment in the method provided in the embodiment of the present application. The apparatus 800 may be a hardware structure, a software module, or a hardware structure plus a software module. As shown in fig. 8, the apparatus 800 includes a receiving module 801 and a processing module 802. The receiving module 801 may be configured to perform S102(S202) and/or S104(S204) in fig. 6, or perform S302 and/or S304 in fig. 7, and/or perform other steps described in this application. The processing module 802 may be configured to perform S103(S203), S105(S205), S106(S206), S107(S207), S108(S208), and/or S109(S209) in fig. 6, or perform S303 and/or S305 in fig. 7, and/or perform other steps described herein.
Fig. 9 is a schematic logical structure diagram of an apparatus 900 provided in this embodiment of the present application, where the apparatus 900 may be a network device and can implement the functions of the network device in the method provided in this embodiment of the present application; the apparatus 900 may also be an apparatus capable of supporting a network device to implement the functions of the network device in the method provided in the embodiment of the present application. The apparatus 900 may be a hardware structure, a software module, or a hardware structure plus a software module. As shown in fig. 9, the apparatus 900 includes a processing module 901 and a transmitting module 902. The processing module 901 may be configured to perform S101(S201) and/or S103(S203) in fig. 6, or perform S301 and/or S303 in fig. 7, and/or perform other steps described in this application. The sending module 902 may be configured to perform S103(S203) in fig. 6, or perform S303 in fig. 7, and/or perform other steps described in this application.
All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
In the present embodiment, the apparatus 800 or the apparatus 900 may be presented in a form of dividing each functional module in an integrated manner. A "module" herein may refer to a particular ASIC, a circuit, a processor and a memory device executing one or more software or firmware programs, an integrated logic circuit, and/or other components that can provide the described functionality.
In one example, the apparatus 800 or the apparatus 900 may take the form shown in fig. 10.
As shown in fig. 10, the apparatus 1000 may include: memory 1001, processor 1002, and communication interface 1003. The memory 1001 is used for storing instructions, and when the apparatus 1000 runs, the processor 1002 executes the instructions stored in the memory 1001, so that the apparatus 1000 executes the communication method provided by the embodiment of the present application. The memory 1001, processor 1002, and communication interface 1003 are communicatively coupled via a bus 1004. For a specific communication method, reference may be made to the above description and the related description in the drawings, and details are not repeated here. It should be noted that, in a specific implementation process, the apparatus 1000 may also include other hardware devices, which are not listed herein. In one possible implementation, the memory 1001 may also be included in the processor 1002.
In an example of the present application, the processing module 802 in fig. 8 or the processing module 901 in fig. 9 may be implemented by the processor 1002, and the receiving module 801 in fig. 8 or the sending module 902 in fig. 9 may be implemented by the communication interface 1003.
The communication interface 1003 may be a circuit, a device, an interface, a bus, a software module, a transceiver, or any other device capable of implementing communication. The processor 1002 may be a field-programmable gate array (FPGA), an application-specific integrated circuit (ASIC), a system on chip (SoC), a Central Processing Unit (CPU), a Network Processor (NP), a digital signal processing circuit (DSP), a Micro Controller Unit (MCU), or a Programmable Logic Device (PLD) or other integrated chips. The memory 1001 includes a volatile memory (volatile memory), such as a random-access memory (RAM); the memory may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a Hard Disk Drive (HDD) or a solid-state drive (SSD); the memory may also comprise a combination of memories of the above kind; the memory may also include any other means having a memory function such as a circuit, device, or software module.
Since the apparatus provided in the embodiment of the present application can be used to execute the above communication method, the technical effects obtained by the apparatus can refer to the above method embodiment, and are not described herein again.
It will be apparent to those skilled in the art that all or part of the steps of the above method may be performed by hardware associated with program instructions, and the program may be stored in a computer readable storage medium such as ROM, RAM, optical disk, etc.
The embodiment of the present application also provides a storage medium, which may include a memory 1001.
For the explanation and beneficial effects of the related content in any one of the above-mentioned apparatuses, reference may be made to the corresponding method embodiments provided above, and details are not repeated here.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented using a software program, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the present application are all or partially generated upon loading and execution of computer program instructions on a computer. The computer may be a general purpose computer, a special purpose computer, a computer network, a network appliance, a user device, or other programmable apparatus. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or can comprise one or more data storage devices, such as a server, a data center, etc., that can be integrated with the medium. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., Digital Video Disk (DVD)), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
While the present application has been described in connection with various embodiments, other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed application, from a review of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the word "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Although the present application has been described in conjunction with specific features and embodiments thereof, it will be evident that various modifications and combinations can be made thereto without departing from the spirit and scope of the application. Accordingly, the specification and figures are merely exemplary of the present application as defined in the appended claims and are intended to cover any and all modifications, variations, combinations, or equivalents within the scope of the present application. It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (30)

1. A method of communication, the method comprising:
receiving downlink control information from the network equipment;
the downlink control information comprises first code word information and one or more second code word information; the first codeword information is used for indicating channel coding information of first user equipment, and the second codeword information is used for indicating channel coding information of interfering user equipment of the first user equipment;
obtaining a scrambling identifier of a demodulation reference signal (DMRS) of the interference user equipment;
obtaining a scrambling identifier of the data signal of the interference user equipment;
and eliminating the interference of the signal of the interfering user equipment on the signal of the first user equipment according to the channel coding information of the interfering user equipment, the scrambling identifier of the DMRS of the interfering user equipment and the scrambling identifier of the data signal of the interfering user equipment.
2. The method of claim 1, wherein the obtaining of the scrambling identity of the DMRS of the interfering UE comprises:
acquiring a configured first scrambling identifier from a network device, wherein the first scrambling identifier is used as a scrambling identifier of a DMRS (demodulation reference signal) of the first user equipment and a scrambling identifier of a DMRS of the interfering user equipment; alternatively, the first and second electrodes may be,
and acquiring a second scrambling identifier and a third scrambling identifier from network equipment, wherein the second scrambling identifier is used as the scrambling identifier of the DMRS of the first user equipment, and the third scrambling identifier is used as the scrambling identifier of the DMRS of the interfering user equipment.
3. The method of claim 1, further comprising:
obtaining, from a network device, a first set of scrambling identities of a DMRS;
and determining the scrambling identifier of the DMRS of the first user equipment in the first set according to the first scrambling identifier indication information included in the downlink control information.
4. The method of claim 3, wherein the obtaining of the scrambling identity of the DMRS of the interfering UE comprises:
and determining the scrambling identifier of the DMRS of the interfering user equipment in the first set according to the second code word information in the downlink control information.
5. The method of claim 3, wherein the obtaining of the scrambling identity of the DMRS of the interfering UE comprises:
determining a scrambling identity of the DMRS of the interfering user equipment in the first set according to a predetermined rule;
wherein the predetermined rule comprises:
the scrambling identity of the DMRS of the interfering user equipment is the same as the scrambling identity of the DMRS of the first user equipment; alternatively, the first and second electrodes may be,
the scrambling identity of the DMRS of the interfering user equipment is different from the index value of the scrambling identity of the DMRS of the first user equipment in the first set.
6. The method of claim 1, wherein the scrambling identity of the data signal comprises a sub-scrambling identity, and wherein the obtaining the scrambling identity of the data signal of the interfering UE comprises:
acquiring a configured first sub-scrambling identifier from a network device, wherein the first sub-scrambling identifier is used as a sub-scrambling identifier of a data signal of the first user equipment and a sub-scrambling identifier of a data signal of the interfering user equipment; alternatively, the first and second electrodes may be,
and acquiring a second configured sub-scrambling identifier and a third configured sub-scrambling identifier from a network device, wherein the second sub-scrambling identifier is used as a sub-scrambling identifier of the data signal of the first user equipment, and the third sub-scrambling identifier is used as a sub-scrambling identifier of the data signal of the interfering user equipment.
7. The method of claim 1, wherein the scrambling identity of the data signal comprises a sub-scrambling identity, and wherein the obtaining the scrambling identity of the data signal of the interfering UE comprises:
obtaining a second set of configured sub-scrambling identities from the network device;
determining one sub-scrambling identity in the second set as a sub-scrambling identity of a data signal of the interfering user equipment.
8. The method according to claim 6 or 7, wherein the scrambling identity of the data signal further comprises a Radio Network Temporary Identity (RNTI), and the obtaining the scrambling identity of the data signal of the interfering UE further comprises:
obtaining a third set of configurations from the network device; the third set comprises a plurality of RNTIs;
and determining an RNTI in the third set as the RNTI of the interfering user equipment.
9. The method of claim 7, wherein determining a sub-scrambling identity as a sub-scrambling identity for the data signal of the interfering user equipment in the second set comprises:
the downlink control information further includes second scrambling identity indication information, and the sub-scrambling identity of the data signal of the interfering user equipment is determined in the second set according to the second scrambling identity indication information.
10. The method of claim 8, wherein the determining one RNTI in the third set as the RNTI of the interfering user equipment comprises:
the downlink control information further includes second scrambling identity indication information, and the RNTI of the interfering user equipment is determined in the third set according to the second scrambling identity indication information.
11. The method according to any one of claims 1 to 10,
the downlink control information further includes first port indication information, where the first port indication information is used to indicate the number of the transmitting antenna port of the DMRS of the first user equipment and the number of the transmitting antenna port of the DMRS of the interfering user equipment.
12. The method according to any one of claims 1-11, further comprising:
acquiring multi-user interference elimination mode indication information from network equipment;
according to the channel coding information of the interfering user equipment, the scrambling identifier of the DMRS of the interfering user equipment and the scrambling identifier of the data signal of the interfering user equipment, the eliminating of the interference of the signal of the interfering user equipment on the signal of the first user equipment comprises:
and eliminating the interference of the signal of the interference user equipment to the signal of the first user equipment according to the multi-user interference elimination mode indication information, the channel coding information of the interference user equipment, the scrambling identifier of the DMRS of the interference user equipment and the scrambling identifier of the data signal of the interference user equipment.
13. A method of communication, the method comprising:
determining downlink control information of first user equipment; the downlink control information comprises first code word information and one or more second code word information; the first codeword information is used for indicating channel coding information of the first user equipment, and the second codeword information is used for indicating channel coding information of interfering user equipment of the first user equipment;
and sending the downlink control information.
14. The method of claim 13, further comprising:
configuring a first scrambling identifier which is used as a scrambling identifier of a demodulation reference signal (DMRS) of the first user equipment and a scrambling identifier of a DMRS of the interference user equipment; alternatively, the first and second electrodes may be,
and configuring a second scrambling identifier and a third scrambling identifier, wherein the second scrambling identifier is used as a scrambling identifier of a demodulation reference signal (DMRS) of the first user equipment, and the third scrambling identifier is used as a scrambling identifier of the DMRS of the interfering user equipment.
15. The method of claim 13, further comprising:
configuring a first set of scrambling identities of demodulation reference signals (DMRS);
the downlink control information further includes first scrambling identifier indication information, where the first scrambling identifier indication information is used to indicate an index value of a scrambling identifier of the DMRS of the first user equipment in the first set.
16. The method of claim 15,
and the second codeword information in the downlink control information is further used for indicating an index value of the scrambling identifier of the DMRS of the interfering user equipment in the first set.
17. The method of claim 13, further comprising:
configuring a first sub-scrambling identity as a sub-scrambling identity of a data signal of the first user equipment and a sub-scrambling identity of a data signal of the interfering user equipment; alternatively, the first and second electrodes may be,
configuring a second sub-scrambling identifier and a third sub-scrambling identifier, wherein the second sub-scrambling identifier is used as a sub-scrambling identifier of the data signal of the first user equipment, and the third sub-scrambling identifier is used as a sub-scrambling identifier of the data signal of the interfering user equipment.
18. The method of claim 13, further comprising:
configuring a second set of sub-scrambling identities;
the downlink control information further includes second scrambling identity indication information, where the second scrambling identity indication information is used to indicate an index value of a sub-scrambling identity of the data signal of the interfering ue in the second set.
19. The method according to claim 17 or 18, wherein the scrambling identity of the data signal of the interfering user equipment further comprises a radio network temporary identity, RNTI, and wherein the method further comprises:
configuring a third set; the third set comprises a plurality of RNTIs;
the downlink control information further includes second scrambling identity indication information, where the second scrambling identity indication information is used to indicate an index value of the RNTI of the interfering user equipment in the third set.
20. The method according to any one of claims 13 to 19,
the downlink control information further includes first port indication information, where the first port indication information is used to indicate the number of the transmitting antenna port of the DMRS of the first user equipment and the number of the transmitting antenna port of the DMRS of the interfering user equipment.
21. A method of communication, the method comprising:
receiving first downlink control information of first user equipment from network equipment;
receiving second downlink control information of interfering user equipment of the first user equipment from network equipment;
the first downlink control information and the second downlink control information are scrambled by using a Radio Network Temporary Identifier (RNTI) of the first user equipment respectively;
and eliminating the interference of the signal of the interfering user equipment to the signal of the first user equipment according to the first downlink control information and the second downlink control information.
22. The method of claim 21,
the second downlink control information includes one or more codeword information, and the codeword information is used to indicate channel coding information of the interfering user equipment.
23. The method of claim 22,
the second downlink control information comprises port indication information, and the port indication information is used for indicating the number of a transmitting antenna port of a demodulation reference signal (DMRS) of the interfering user equipment.
24. A method of communication, the method comprising:
determining first downlink control information of first user equipment;
determining second downlink control information of the interfering user equipment of the first user equipment;
sending the first downlink control information and the second downlink control information; and scrambling the first downlink control information and the second downlink control information by respectively adopting a Radio Network Temporary Identifier (RNTI) of the first user equipment.
25. The method of claim 24,
the second downlink control information includes one or more codeword information, and the codeword information is used to indicate channel coding information of the interfering user equipment.
26. The method of claim 25,
the second downlink control information comprises port indication information, and the port indication information is used for indicating the number of a transmitting antenna port of a demodulation reference signal (DMRS) of the interfering user equipment.
27. A user device, wherein the user device comprises a processor and a memory;
the memory is configured to store computer-executable instructions that, when executed by the user equipment, are executed by the processor to cause the user equipment to perform the method of any one of claims 1-12.
28. A network device, comprising a processor and a memory;
the memory is configured to store computer-executable instructions that, when executed by the network device, are executed by the processor to cause the network device to perform the method of any of claims 13-20.
29. A user device, wherein the user device comprises a processor and a memory;
the memory is configured to store computer-executable instructions that, when executed by the user equipment, are executed by the processor to cause the user equipment to perform the method of any one of claims 21-23.
30. A network device, comprising a processor and a memory;
the memory is configured to store computer-executable instructions that, when executed by the network device, are executed by the processor to cause the network device to perform the method of any of claims 24-26.
CN201910117929.5A 2019-02-15 2019-02-15 Communication method and device Active CN111585687B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910117929.5A CN111585687B (en) 2019-02-15 2019-02-15 Communication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910117929.5A CN111585687B (en) 2019-02-15 2019-02-15 Communication method and device

Publications (2)

Publication Number Publication Date
CN111585687A true CN111585687A (en) 2020-08-25
CN111585687B CN111585687B (en) 2021-12-24

Family

ID=72110731

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910117929.5A Active CN111585687B (en) 2019-02-15 2019-02-15 Communication method and device

Country Status (1)

Country Link
CN (1) CN111585687B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102379151A (en) * 2009-03-20 2012-03-14 高通股份有限公司 Apparatus and methods for intercell interference cancellation via rnti
CN102640555A (en) * 2009-11-30 2012-08-15 瑞典爱立信有限公司 Interference mitigation in downlink signal communication to a mobile terminal
US20150230259A1 (en) * 2014-02-07 2015-08-13 Lg Electronics Inc. Method and apparatus for interference cancellation
CN105144816A (en) * 2013-11-27 2015-12-09 联发科技股份有限公司 Methods for codeword level interference cancellation with network assistance
WO2018038416A1 (en) * 2016-08-25 2018-03-01 Samsung Electronics Co., Ltd. Data transmitting method and apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102379151A (en) * 2009-03-20 2012-03-14 高通股份有限公司 Apparatus and methods for intercell interference cancellation via rnti
CN102640555A (en) * 2009-11-30 2012-08-15 瑞典爱立信有限公司 Interference mitigation in downlink signal communication to a mobile terminal
CN105144816A (en) * 2013-11-27 2015-12-09 联发科技股份有限公司 Methods for codeword level interference cancellation with network assistance
US20150230259A1 (en) * 2014-02-07 2015-08-13 Lg Electronics Inc. Method and apparatus for interference cancellation
WO2018038416A1 (en) * 2016-08-25 2018-03-01 Samsung Electronics Co., Ltd. Data transmitting method and apparatus

Also Published As

Publication number Publication date
CN111585687B (en) 2021-12-24

Similar Documents

Publication Publication Date Title
US11665697B2 (en) Method for transmitting downlink control information, terminal device and network device
KR101506560B1 (en) Change of rate matching modes in presence of channel state information reference signal transmission
US9668254B2 (en) Method and device for scrambling sequence configuration, user equipment, and base station
US20190253217A1 (en) Reference signal configuration method and apparatus
CN110351848B (en) Time domain resource allocation method and device
US11121846B2 (en) Method and apparatus for transmitting data or control information in wireless communication system
EP3817266A1 (en) Data scrambling method and relevant device
CN109152069B (en) Method and device for transmitting control information
US11038612B2 (en) Terminal device, base station apparatus, and integrated circuit
KR20160118992A (en) Method and apparatus for transmitting downlink information in a wireless communication system
US20240089747A1 (en) Base station, terminal apparatus, method, program, and recording medium
US11252722B2 (en) Method and device in UE and base station for wireless communication
CN110831020A (en) Method for detecting DCI (Downlink control information), method for configuring PDCCH (physical Downlink control channel) and communication device
WO2019029346A1 (en) Method used for transmitting reference signal and communication device
CN112218375A (en) Method and device for determining resource allocation
EP3122125B1 (en) Terminal apparatus, base station apparatus, and integrated circuit
JP2020532148A (en) Data transmission method, terminal equipment and network equipment
WO2018196657A1 (en) Interference cancellation method, user equipment, and network device
CN111585687B (en) Communication method and device
US20230261830A1 (en) Terminal, base station, and communication method
WO2016074897A1 (en) A method and apparatus for interference cancellation
CN111193581B (en) Method for transmitting and receiving physical downlink control channel and communication device
KR102437621B1 (en) Method and apparatus for transmitting data or control information in wireless communication system
CN114071748A (en) Signal transmission method, terminal and network equipment
CN114391231B (en) Communication method and communication device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant