CN115190643A - Uplink repeat transmission method, device, equipment and storage medium - Google Patents

Uplink repeat transmission method, device, equipment and storage medium Download PDF

Info

Publication number
CN115190643A
CN115190643A CN202110363919.7A CN202110363919A CN115190643A CN 115190643 A CN115190643 A CN 115190643A CN 202110363919 A CN202110363919 A CN 202110363919A CN 115190643 A CN115190643 A CN 115190643A
Authority
CN
China
Prior art keywords
time
lbt
uplink
frequency domain
domain resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110363919.7A
Other languages
Chinese (zh)
Inventor
周雷
高雪娟
邢艳萍
王磊
费永强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datang Mobile Communications Equipment Co Ltd
Original Assignee
Datang Mobile Communications Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datang Mobile Communications Equipment Co Ltd filed Critical Datang Mobile Communications Equipment Co Ltd
Priority to CN202110363919.7A priority Critical patent/CN115190643A/en
Publication of CN115190643A publication Critical patent/CN115190643A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0808Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using carrier sensing, e.g. as in CSMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/04Error control

Abstract

The embodiment of the invention provides an uplink repeated transmission method, device, equipment and storage medium. The method comprises the following steps: performing inner-bound listen-before-talk (LBT) monitoring on a target frequency domain resource configured for user equipment by network equipment, wherein the inner-bound listen-before-talk (LBT) monitoring is LBT monitoring performed in first preset time in target time, and the target time is uplink transmission time configured for primary uplink repeated transmission of the user equipment in advance; under the condition that the result of inner-periphery listen-before-talk LBT interception indicates that the target frequency domain resource is in an idle state, the uplink repeated transmission is carried out through the target frequency domain resource; and giving up the uplink repeated transmission under the condition that the result of the inner-periphery listen-before-talk LBT interception indicates that the target frequency domain resource is in a non-idle state. Therefore, in the embodiment of the invention, through the increased inner network LBT interception, the successful probability of LBT interception is increased, so that the probability of the repeated transmission is increased, and the time delay of the uplink repeated transmission can be further reduced to a certain extent.

Description

Uplink repeat transmission method, device, equipment and storage medium
Technical Field
The present invention relates to the field of mobile communications technologies, and in particular, to an uplink repeat transmission method, apparatus, device, and storage medium.
Background
Currently, an air interface (NR-U) system operating in an Unlicensed frequency band supports only a PUSCH retransmission type a (PUSCH retransmission type a) mechanism. Before the transmission of the PUSCH retransmission type A, the User Equipment (UE) executes the Listen Before Talk (LBT) interception of the periphery, and abandons the transmission if the interception fails. The peripheral LBT listening refers to LBT listening before uplink repeat (UL PUSCH repetition) transmission of a physical uplink shared channel.
Under the NR-U scenario, the type B physical uplink shared channel repeat transmission (PUSCH repetition type B) mechanism is not supported at present. However, if the PUSCH retransmission type B transmission mechanism is supported, there is also a problem that transmission is not continuous due to an invalid symbol (invalid symbol), and then peripheral LBT listening is performed, and the transmission is abandoned if listening fails.
As can be seen from the above, in the NR-U scenario, for UL PUSCH repeated transmission, after a peripheral LBT listening fails, the transmission is given up, and the next LBT listening is waited, so that the data transmission delay is long.
Disclosure of Invention
The embodiment of the invention provides an uplink repeat transmission method, device and equipment and a storage medium, and aims to solve the problem of long uplink repeat transmission delay in an NR-U scene.
In a first aspect, an embodiment of the present invention provides an uplink repeat transmission method, which is applied to a user equipment, and the method includes:
performing inner periphery Listen Before Talk (LBT) interception on a target frequency domain resource configured for the user equipment by a network device, wherein the inner periphery Listen Before Talk (LBT) interception is performed in a first preset time in a target time, and the target time is an uplink transmission time configured for one-time uplink repeated transmission of the user equipment in advance;
under the condition that the inner periphery listen-before-talk LBT monitoring result indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission through the target frequency domain resource;
and giving up the uplink repeated transmission under the condition that the inner-periphery listen-before-talk (LBT) listening result indicates that the target frequency domain resource is in a non-idle state.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, the first preset time includes first N symbols in the uplink symbol, and N is a positive integer.
Optionally, before performing inner-bound listen-before-talk LBT listening on the target frequency domain resource configured by the network device for the user equipment, the method further includes:
performing peripheral LBT interception on the target frequency domain resource, wherein the peripheral LBT interception is performed in a second preset time before the target time;
when the result of the peripheral LBT interception indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission through the target frequency domain resource;
performing inner circumference Listen Before Talk (LBT) interception on the PUSCH comprises the following steps:
and under the condition that the result of the peripheral LBT interception indicates that the target frequency domain resource is in a non-idle state, carrying out inner listen-before-talk LBT interception on the target frequency domain resource.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, the second preset time includes N consecutive symbols before the uplink symbol, and N is a positive integer.
Optionally, when the result of the inner-periphery listen-before-talk LBT listening indicates that the target frequency domain resource is in an idle state, performing the uplink retransmission through the target frequency domain resource, including:
under the condition that the inner periphery listen-before-talk LBT monitoring result indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission in the residual time through the target frequency domain resource;
wherein the remaining time includes a time of the target time excluding the first preset time.
Optionally, when the result of the peripheral LBT listening indicates that the target frequency domain resource is in an idle state, performing the uplink retransmission through the target frequency domain resource includes:
when the result of the peripheral LBT interception indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission at the target time or the residual time through the target frequency domain resource;
wherein the remaining time includes a time of the target time excluding the first preset time.
Optionally, when the result of the peripheral LBT sensing indicates that the target frequency domain resource is in an idle state and the uplink retransmission is performed in the remaining time, the method further includes:
sending at least one demodulation reference signal at the first preset time through the target frequency domain resource, wherein when at least two demodulation reference signals are sent at the first preset time, the time length of the interval between every two adjacent demodulation reference signals is less than the preset time length;
alternatively, the first and second liquid crystal display panels may be,
and transmitting first data in the first preset time through the target frequency domain resource, wherein the first data comprises at least part of data in the data subjected to the uplink repeated transmission in the remaining time.
Optionally, performing the uplink repeat transmission on the remaining time through the target frequency domain resource, includes:
acquiring second data which can be borne by the remaining time when a predetermined coding and rate matching method is adopted from the uplink data to be repeatedly transmitted, and discarding the data except the second data in the uplink data;
coding and rate matching are carried out on the second data by adopting the coding and rate matching method to obtain a first coded modulation symbol;
transmitting the first code modulation symbol over the remaining time through the target frequency domain resource;
or
Coding and rate matching are carried out on the uplink data to be transmitted repeatedly, and a second coded modulation symbol is obtained;
obtaining a third coded modulation symbol which can be carried by the residual time from the second coded modulation time, and discarding coded modulation symbols except the third coded modulation symbol in the second coded modulation symbol;
and transmitting the third code modulation symbol in the residual time through the target frequency domain resource.
Optionally, when the uplink retransmission is the retransmission of the physical uplink shared channel, the performing, by using the target frequency domain resource, the uplink retransmission includes:
and performing the uplink repeated transmission through the target frequency domain resource according to an A-type physical uplink shared channel repeated transmission mechanism or a B-type physical uplink shared channel repeated transmission mechanism.
Optionally, the target time is configured by using a configuration grant scheduling transmission mechanism, or is configured by using a dynamic scheduling mechanism.
Optionally, the performing inner-bound listen-before-talk LBT listening on the target frequency domain resource configured by the network device for the user equipment includes:
under the condition that the repeated transmission is the first repeated transmission, performing inner-periphery listen-before-talk (LBT) interception on the target frequency domain resource;
alternatively, the first and second electrodes may be,
performing inner-bound listen-before-talk (LBT) listening on the target frequency domain resource under the condition that invalid time exists before the target time, wherein the invalid time is time for not allowing the user equipment to transmit data;
alternatively, the first and second electrodes may be,
and the receiver of the data transmitted at a third preset time before the target time does not comprise the user equipment, and the target frequency domain resource is subjected to inner-bound listen-before-talk (LBT) listening under the condition that the repeated transmission is the first repeated transmission.
Optionally, the performing peripheral LBT listening on the target frequency domain resource includes:
performing the peripheral LBT interception on the target frequency domain resource under the condition that the repeated transmission is the first repeated transmission;
alternatively, the first and second electrodes may be,
performing the peripheral LBT interception on the target frequency domain resource under the condition that invalid time exists before the target time, wherein the invalid time is time for not allowing the user equipment to send data;
alternatively, the first and second electrodes may be,
and performing the peripheral LBT interception on the target frequency domain resource under the condition that a receiver of the data transmitted at a third preset time before the target time does not comprise the user equipment and the repeated transmission is the first repeated transmission.
Optionally, before performing inner-bound listen before talk LBT listening on the target frequency domain resource configured by the network device for the user equipment, the method further includes:
receiving first configuration information sent by the network device, where the first configuration information is used to indicate whether the ue needs to perform the inner listen before talk LBT listening when there is an invalid time before the target time, where the invalid time is a time when the ue is not allowed to send data;
the performing inner-bound listen-before-talk LBT listening on the target frequency domain resource configured by the network device for the user equipment includes:
and under the condition that the value of the first configuration information is a first preset value and invalid time exists before the target time, performing inner periphery Listen Before Talk (LBT) interception on the target frequency domain resource.
Optionally, before performing peripheral LBT listening on the target frequency domain resource, the method further includes:
receiving second configuration information sent by the network device, where the second configuration information includes downlink transmission time and first indication information, and the first indication information is used to indicate the downlink transmission time to perform the peripheral LBT listening;
the performing peripheral LBT listening on the target frequency domain resource includes:
and performing the peripheral LBT interception on the target frequency domain resource at the downlink transmission time.
In a second aspect, an embodiment of the present invention further provides an uplink repeat transmission method, which is applied to a network device, and the method includes:
sending first configuration information to user equipment;
the first configuration information is used to indicate whether or not the ue needs to perform inner listen before talk LBT listening when there is an invalid time before a target time, where the invalid time is a time when the ue is not allowed to send data, the target time is an uplink transmission time configured in advance for one uplink repeat transmission of the ue, and the inner listen before talk LBT listening is performed in a first preset time in the target time.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, where the first preset time includes first N symbols in the uplink symbol, and N is a positive integer.
Optionally, the method further includes:
sending second configuration information to the user equipment;
the second configuration information includes downlink transmission time and first indication information, where the first indication information is used to indicate that the downlink transmission time is used for performing peripheral LBT listening, and the peripheral LBT listening is performed on a second preset time before the target time.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, the second preset time includes N consecutive symbols before the uplink symbol, and N is a positive integer.
Optionally, the method further includes:
receiving a demodulation reference signal and third data sent by the user equipment;
determining a starting position of time for bearing the third data in the target time according to the sending position of the demodulation reference signal in the target time;
and analyzing the third data according to the starting position.
Optionally, the method further includes:
receiving fourth data sent by the user equipment;
and analyzing the fourth data according to the starting position of the remaining time, wherein the remaining time comprises the time except the first preset time in the target time.
Optionally, the network device does not send data within a time when the user equipment performs peripheral LBT listening, where the peripheral LBT listening is performed on LBT listening at a second preset time before the target time.
In a third aspect, an embodiment of the present invention provides a user equipment, including a first memory, a first transceiver, a first processor:
a first memory for storing a computer program; a first transceiver for transceiving data under control of the first processor; a first processor for reading the computer program in the first memory and performing the following operations:
performing inner periphery Listen Before Talk (LBT) interception on a target frequency domain resource configured for the user equipment by a network device, wherein the inner periphery Listen Before Talk (LBT) interception is performed in a first preset time in a target time, and the target time is an uplink transmission time configured for one-time uplink repeated transmission of the user equipment in advance;
controlling the first transceiver to perform the uplink repeated transmission through the target frequency domain resource under the condition that the inner-periphery listen-before-talk (LBT) listening result indicates that the target frequency domain resource is in an idle state;
and giving up the uplink repeated transmission under the condition that the inner-periphery listen-before-talk (LBT) listening result indicates that the target frequency domain resource is in a non-idle state.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, where the first preset time includes first N symbols in the uplink symbol, and N is a positive integer.
Optionally, the first processor is further configured to:
performing peripheral LBT interception on the target frequency domain resource, wherein the peripheral LBT interception is performed in a second preset time before the target time;
when the result of the peripheral LBT interception indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission through the target frequency domain resource;
when performing inner-bound listen-before-talk, LBT, listening on a PUSCH, the first processor is specifically configured to:
and performing inner-periphery listen-before-talk (LBT) monitoring on the target frequency domain resource under the condition that the result of the peripheral LBT monitoring indicates that the target frequency domain resource is in a non-idle state.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, the second preset time includes N consecutive symbols before the uplink symbol, and N is a positive integer.
Optionally, when the result of inner-periphery listen-before-talk LBT listening indicates that the target frequency domain resource is in an idle state, the first processor is specifically configured to, when performing the uplink retransmission via the target frequency domain resource, perform:
under the condition that the inner periphery listen-before-talk LBT monitoring result indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission in the residual time through the target frequency domain resource;
wherein the remaining time includes a time of the target time excluding the first preset time.
Optionally, when the result of the peripheral LBT listening indicates that the target frequency domain resource is in an idle state, the first processor is configured to, when performing the uplink retransmission via the target frequency domain resource, specifically:
when the result of the peripheral LBT interception indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission at the target time or the residual time through the target frequency domain resource;
wherein the remaining time includes a time of the target time excluding the first preset time.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the user equipment, where the first preset time includes first N symbols in the uplink symbol, and N is a positive integer;
the first processor, when the result of the peripheral LBT listening indicates that the target frequency domain resource is in an idle state and the uplink retransmission is performed in the remaining time, is further configured to:
sending at least one demodulation reference signal at the first preset time through the target frequency domain resource, wherein when at least two demodulation reference signals are sent at the first preset time, the time length of the interval between every two adjacent demodulation reference signals is less than the preset time length;
alternatively, the first and second electrodes may be,
and transmitting first data in the first preset time through the target frequency domain resource, wherein the first data comprises at least part of data in the data subjected to the uplink repeated transmission in the remaining time.
Optionally, when performing the uplink repeated transmission at the remaining time through the target frequency domain resource, the first transceiver is specifically configured to:
acquiring second data which can be borne by the remaining time when a predetermined coding and rate matching method is adopted from the uplink data to be repeatedly transmitted, and discarding the data except the second data in the uplink data;
coding and rate matching are carried out on the second data by adopting the coding and rate matching method to obtain a first coded modulation symbol;
transmitting the first code modulation symbol over the remaining time through the target frequency domain resource; or
Coding and rate matching are carried out on the uplink data to be transmitted repeatedly, and a second coded modulation symbol is obtained;
obtaining a third coded modulation symbol which can be carried by the residual time from the second coded modulation time, and discarding coded modulation symbols except the third coded modulation symbol in the second coded modulation symbol;
and transmitting the third code modulation symbol in the residual time through the target frequency domain resource.
Optionally, when the uplink retransmission is the retransmission of the physical uplink shared channel, the first transceiver is specifically configured to:
and performing the uplink repeated transmission according to the target frequency domain resource according to an A-type physical uplink shared channel repeated transmission mechanism or a B-type physical uplink shared channel repeated transmission mechanism.
Optionally, the target time is configured by using a configuration grant scheduling transmission mechanism, or is configured by using a dynamic scheduling mechanism.
Optionally, when performing inner-bound listen before talk LBT listening on the target frequency domain resource configured for the user equipment by the network equipment, the first processor is specifically configured to:
under the condition that the repeated transmission is the first repeated transmission, performing inner-periphery listen-before-talk (LBT) interception on the target frequency domain resource;
alternatively, the first and second electrodes may be,
performing inner-bound listen-before-talk (LBT) listening on the target frequency domain resource under the condition that invalid time exists before the target time, wherein the invalid time is time for not allowing the user equipment to transmit data;
alternatively, the first and second electrodes may be,
and under the condition that a receiver of the data transmitted at a third preset time before the target time does not comprise the user equipment and the repeated transmission is the first repeated transmission, performing inner-periphery listen-before-talk (LBT) interception on the target frequency domain resource.
Optionally, when performing peripheral LBT listening on the target frequency domain resource, the first processor is specifically configured to:
performing the peripheral LBT interception on the target frequency domain resource under the condition that the repeated transmission is the first repeated transmission;
alternatively, the first and second electrodes may be,
performing the peripheral LBT listening on the target frequency domain resource under the condition that an invalid time exists before the target time, wherein the invalid time is the time for not allowing the user equipment to send data;
alternatively, the first and second electrodes may be,
and the receiving party of the data transmitted at a third preset time before the target time does not comprise the user equipment, and the peripheral LBT interception is carried out on the target frequency domain resource under the condition that the repeated transmission is the first repeated transmission.
Optionally, the first transceiver is further configured to:
receiving first configuration information sent by the network device, where the first configuration information is used to indicate whether the ue needs to perform the listen-before-talk (LBT) listening if there is an invalid time before the target time, where the invalid time is a time when the ue is not allowed to send data;
when performing inner-bound listen-before-talk, LBT, listening on a target frequency domain resource configured for the user equipment by the network equipment, the first processor is specifically configured to:
and under the condition that the value of the first configuration information is a first preset value and invalid time exists before the target time, performing inner periphery Listen Before Talk (LBT) interception on the target frequency domain resource.
Optionally, the first transceiver is further configured to:
receiving second configuration information sent by the network device, where the second configuration information includes downlink transmission time and first indication information, and the first indication information is used to indicate the downlink transmission time to perform the peripheral LBT listening;
when performing peripheral LBT listening on the target frequency domain resource, the first processor is specifically configured to:
and performing the peripheral LBT monitoring on the target frequency domain resource in the downlink transmission time.
In a fourth aspect, an embodiment of the present invention provides a network device, including a second memory, a second transceiver, a second processor:
a second memory for storing a computer program; a second transceiver for transceiving data under the control of the second processor; a second processor for reading the computer program in the second memory and performing the following operations:
controlling the second transceiver to transmit first configuration information to user equipment;
the first configuration information is used to indicate whether or not the ue needs to perform inner listen before talk LBT listening when there is an invalid time before a target time, where the invalid time is a time when the ue is not allowed to send data, the target time is an uplink transmission time configured in advance for one uplink repeat transmission of the ue, and the inner listen before talk LBT listening is performed in a first preset time in the target time.
Optionally, the second processor is further configured to:
controlling the second transceiver to transmit second configuration information to the user equipment;
the second configuration information includes downlink transmission time and first indication information, where the first indication information is used to indicate that the downlink transmission time is used for performing peripheral LBT listening, and the peripheral LBT listening is performed on a second preset time before the target time.
In a fifth aspect, an embodiment of the present invention provides an uplink repeat transmission apparatus, which is applied to a user equipment, and the apparatus includes:
an inner periphery interception module, configured to perform inner periphery listen-before-talk LBT interception on a target frequency domain resource configured by a network device for the user equipment, where the inner periphery listen-before-talk LBT interception is to perform LBT interception within a first preset time in a target time, and the target time is uplink transmission time configured in advance for primary uplink repeated transmission of the user equipment;
a first processing module, configured to perform the uplink retransmission this time through the target frequency domain resource when the result of the listen-before-talk LBT listening indicates that the target frequency domain resource is in an idle state;
and the second processing module is used for giving up the uplink repeated transmission under the condition that the inner-periphery listen-before-talk (LBT) listening result indicates that the target frequency domain resource is in a non-idle state.
In a sixth aspect, an embodiment of the present invention provides an uplink repeat transmission apparatus, which is applied to a network device, and the apparatus includes:
a first configuration sending module, configured to send first configuration information to a user equipment;
the first configuration information is used to indicate whether the ue needs to perform inner-bound listen-before-talk LBT listening when an invalid time exists before a target time, where the invalid time is a time when the ue is not allowed to send data, the target time is an uplink transmission time configured for one-time uplink repeat transmission of the ue in advance, and the inner-bound listen-before-talk LBT listening is performed within a first preset time in the target time.
In a seventh aspect, an embodiment of the present invention further provides a processor-readable storage medium, where the processor-readable storage medium stores a computer program, and the computer program is configured to enable the processor to execute the uplink repeat transmission method according to the first aspect or the second aspect.
In the embodiment of the present invention, an inner LBT listening can be performed on a target frequency domain resource configured for a user equipment by a network device, where the inner LBT listening is performed within a first preset time in a target time, and the target time is an uplink transmission time configured for one uplink repeat transmission of the user equipment in advance. Under the condition that the inner LBT monitoring result indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission through the target frequency domain resource; and giving up the uplink repeated transmission under the condition that the inner LBT interception result indicates that the target frequency domain resource is in a non-idle state.
Therefore, the embodiment of the invention can reserve the LBT interception window for the user equipment within one uplink repeated transmission time in advance, so that the repeated transmission can be carried out when the interception is successful.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
Fig. 1 is a schematic diagram of UL PUSCH repeated transmission in an NR-U scenario in the prior art;
fig. 2 is a flowchart of an uplink retransmission method according to an embodiment of the present invention;
fig. 3 is a flowchart of another uplink repeat transmission method according to an embodiment of the present invention;
fig. 4 is a schematic diagram of PUSCH retransmission based on inner LBT listening in an embodiment of the present invention;
fig. 5 is a second schematic diagram of PUSCH retransmission based on inner LBT listening in an embodiment of the present invention;
fig. 6 is a third schematic diagram of PUSCH retransmission based on inner LBT listening in the embodiment of the present invention;
FIG. 7 is a diagram illustrating one of encoding and rate matching according to an embodiment of the present invention;
FIG. 8 is a second schematic diagram illustrating encoding and rate matching according to an embodiment of the present invention;
fig. 9 is a schematic diagram of PUSCH retransmission based on peripheral + inner LBT listening in an embodiment of the present invention;
fig. 10 is a second schematic diagram of PUSCH retransmission based on peripheral + inner LBT listening in an embodiment of the present invention;
fig. 11 is a third schematic diagram of PUSCH retransmission based on peripheral + inner LBT listening in the embodiment of the present invention;
fig. 12 is a fourth schematic diagram of PUSCH retransmission based on peripheral + inner LBT listening in the embodiment of the present invention;
fig. 13 is a diagram illustrating DMRS insertion on symbols for inner LBT in an embodiment of the present invention;
FIG. 14 is a diagram illustrating insertion of data symbols on symbols for inner LBT in accordance with an embodiment of the present invention;
fig. 15 is a schematic diagram of PUSCH retransmission based on peripheral LBT listening in an embodiment of the present invention;
fig. 16 is a second schematic diagram of PUSCH retransmission based on peripheral LBT listening in an embodiment of the present invention;
fig. 17 is a third schematic diagram of PUSCH retransmission based on peripheral LBT listening in an embodiment of the present invention;
fig. 18 is a block diagram of an uplink retransmission apparatus according to an embodiment of the present invention;
fig. 19 is a block diagram of another uplink repeat transmission apparatus according to an embodiment of the present invention;
fig. 20 is a block diagram of a user equipment according to an embodiment of the present invention;
fig. 21 is a block diagram of a network device according to an embodiment of the present invention.
Detailed Description
The term "and/or" in the embodiments of the present invention describes an association relationship of associated objects, and indicates that three relationships may exist, for example, a and/or B may indicate: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
In the embodiments of the present application, the term "plurality" means two or more, and other terms are similar thereto.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
The embodiment of the application provides an uplink repeat transmission method, device, equipment and storage medium, which are used for reducing the time delay of uplink repeat transmission to a certain extent.
The method and the device are based on the same application concept, and because the principles of solving the problems of the method and the device are similar, the implementation of the device and the method can be mutually referred, and repeated parts are not described again.
In addition, the technical scheme provided by the embodiment of the application can be applied to various systems, especially 5G systems. For example, the applicable system may be a global system for mobile communication (GSM) system, a Code Division Multiple Access (CDMA) system, a Wideband Code Division Multiple Access (WCDMA) General Packet Radio Service (GPRS) system, a long term evolution (long term evolution, LTE) system, an LTE Frequency Division Duplex (FDD) system, an LTE Time Division Duplex (TDD) system, an LTE-a (long term evolution) system, a universal mobile system (universal mobile telecommunications system, UMTS), a universal internet Access (WiMAX) system, a New Radio Network (NR) system, etc. These various systems include terminal devices and network devices. The System may further include a core network portion, such as an Evolved Packet System (EPS), a 5G System (5 GS), and the like.
A User Equipment (UE) according to an embodiment of the present application may be a device providing voice and/or data connectivity to a User, a handheld device having a wireless connection function, or other processing devices connected to a wireless modem. In different systems, the names of the terminal devices may also differ, for example a user device may be referred to as a terminal device. A wireless terminal device, which may be a mobile terminal device such as a mobile phone (or called a "cellular" phone) and a computer having a mobile terminal device, for example, a portable, pocket, hand-held, computer-included or vehicle-mounted mobile device, may communicate with one or more Core Networks (CNs) via a Radio Access Network (RAN), and may exchange languages and/or data with the RAN. Examples of such devices include Personal Communication Service (PCS) phones, cordless phones, session Initiation Protocol (SIP) phones, wireless Local Loop (WLL) stations, and Personal Digital Assistants (PDAs). The wireless terminal device may also be referred to as a system, a subscriber unit (subscriber unit), a subscriber station (subscriber station), a mobile station (mobile), a remote station (remote station), an access point (access point), a remote terminal device (remote terminal), an access terminal device (access terminal), a user terminal device (user terminal), a user agent (user agent), and a user device (user device), which are not limited in this embodiment of the present application.
The network device according to the embodiment of the present application may be a base station, and the base station may include a plurality of cells for providing services to a terminal. A base station may also be called an access point, or may be a device in an access network that communicates over the air-interface, through one or more sectors, with wireless terminal devices, or by other names, depending on the particular application. The network device may be configured to exchange received air frames with Internet Protocol (IP) packets as a router between the wireless terminal device and the rest of the access network, which may include an Internet Protocol (IP) communication network. The network device may also coordinate attribute management for the air interface. For example, the network device according to the embodiment of the present application may be a Base Transceiver Station (BTS) in a Global System for Mobile communications (GSM) or a Code Division Multiple Access (CDMA), a network device (NodeB) in a Wideband Code Division Multiple Access (WCDMA), an evolved Node B (eNB) or an e-NodeB) in a Long Term Evolution (LTE) System, a 5G Base Station (gNB) in a 5G network architecture (next generation System), a Home evolved Node B (HeNB), a relay Node (relay Node), a Home Base Station (femto), a pico Base Station (pico), and the like, which are not limited in the embodiments of the present application. In some network configurations, a network device may include Centralized Unit (CU) nodes and Distributed Unit (DU) nodes, which may also be geographically separated.
Multiple Input Multiple Output (MIMO) transmission may be performed between the network device and the terminal device by using one or more antennas, where the MIMO transmission may be Single User MIMO (SU-MIMO) or Multi-User MIMO (MU-MIMO). According to the form and the number of the root antenna combination, the MIMO transmission can be 2D-MIMO, 3D-MIMO, FD-MIMO or massive-MIMO, and can also be diversity transmission, precoding transmission, beamforming transmission, etc.
For convenience of understanding the uplink retransmission method provided in the embodiment of the present invention, the following description is first provided.
And the UE carries out peripheral LBT interception, and if the interception is successful, the UL PUSCH repeated transmission is carried out. However, in the prior art, the network device may normally transmit data during the peripheral LBT listening by the UE, so that when the UE performs the peripheral LBT listening, there may be a failure of the peripheral LBT listening caused by the transmission of the network device. One reason why the UE fails to perform the peripheral LBT listening is that a listening window is not reserved for the peripheral LBT listening by the current NR-U system (i.e., the network device side), so that the internal transmission of the NR-U system may cause the peripheral LBT listening to fail and further cause the repeated transmission of the current UL PUSCH to fail.
Furthermore, as shown in fig. 1, in the prior art, if an invalid symbol (for example, two Downlink (DL) symbols shown in fig. 1) occurs within the time of repeated UL PUSCH transmission, during the peripheral LBT listening performed by the UE, the network may normally transmit data, which may also result in failure of this peripheral LBT listening, and thus cause failure of Nominal transmission 3 (Nominal rep # 3) shown in fig. 1.
For the PUSCH repetition type a transmission mechanism in the NR-U scenario, if the problem of giving up the transmission due to the failure of the peripheral LBT listening is to be avoided, the LBT listening failure probability of the UE can only be reduced by using a network device scheduling method at present, but the scheduling limitation of the network device is increased.
The embodiment of the invention can reserve the LBT interception window for one-time uplink repeated transmission time of the user equipment in advance, so that the repeated transmission can be carried out when the interception is successful.
Fig. 2 is a flowchart illustrating an uplink repeat transmission method according to an embodiment of the present invention, where the method is applied to a user equipment. The uplink retransmission method may be applied to PUSCH retransmission or PUCCH retransmission, and the following description takes PUSCH retransmission as an example, and in the case of PUCCH retransmission, see the following example of PUSCH retransmission.
As shown in fig. 2, the method may include the steps of:
step 201: and carrying out inner periphery listen-before-talk (LBT) listening on the target frequency domain resource configured for the user equipment by the network equipment.
The LBT sensing refers to that the UE does not perform any uplink transmission, and only performs Energy Detection (ED) detection on a channel.
In addition, the inner periphery listen before talk LBT listening is LBT listening within a first preset time in a target time, where the target time is an uplink transmission time configured in advance for one uplink repeated transmission of the ue.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, where the first preset time includes first N symbols in the uplink symbol, and N is a positive integer. That is, in the embodiment of the present invention, the UE may perform LBT sensing on the first N symbols in the primary uplink retransmission symbol configured for the UE by the network device.
For example, in PUSCH repetition transmission, inner LBT sensing refers to LBT sensing performed using the first N symbols of Uplink (UL) PUSCH repetition (retransmission) transmission. The definition of N is: the number of LBT sensing symbols, which is specific to the subcarrier spacing parameter configuration (SCS number), mainly takes 25us of sensing duration into consideration.
Further, the target frequency domain resource may be at least one of a carrier bandwidth, a set of frequency domain resources, and frequency domain resources used by a user.
Step 202: and under the condition that the result of the inner periphery listen-before-talk LBT interception indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission through the target frequency domain resource.
Step 203: and giving up the repeated uplink transmission under the condition that the inner periphery listen-before-talk (LBT) listening result indicates that the target frequency domain resource is in a non-idle state.
The result of inner LBT monitoring indicates that the target frequency domain resource is in an idle state, namely, the inner LBT monitoring is successful; and indicating that the target frequency domain resource is in a non-idle state by the result of inner LBT monitoring, and indicating that the inner LBT monitoring fails at this time.
Therefore, in the embodiment of the present invention, under the condition that the inner LBT listening is successful, the current uplink retransmission may be executed, and under the condition that the inner LBT listening is failed, the current uplink retransmission may be abandoned.
As can be seen from the above, in the embodiment of the present invention, the inner LBT listening can be performed on the target frequency domain resource configured for the ue by the network device, where the inner LBT listening is performed within the first preset time in the target time, and the target time is the uplink transmission time configured for the primary uplink repeated transmission of the ue in advance. Under the condition that the inner LBT monitoring result indicates that the target frequency domain resource is in an idle state, the uplink repeated transmission is carried out through the target frequency domain resource; and giving up the uplink repeated transmission under the condition that the inner LBT interception result indicates that the target frequency domain resource is in a non-idle state.
Therefore, the embodiment of the invention can reserve the LBT interception window for the user equipment within one uplink repeated transmission time in advance, so that the repeated transmission can be carried out when the interception is successful.
Optionally, before performing inner-bound listen-before-talk LBT listening on the target frequency domain resource configured by the network device for the user equipment, the method further includes:
performing peripheral LBT interception on the target frequency domain resource, wherein the peripheral LBT interception is performed in a second preset time before the target time;
when the result of the peripheral LBT interception indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission through the target frequency domain resource;
the performing inner periphery listen before talk LBT listening on the PUSCH comprises:
and under the condition that the result of the peripheral LBT interception indicates that the target frequency domain resource is in a non-idle state, carrying out inner listen-before-talk LBT interception on the target frequency domain resource.
The result of the peripheral LBT interception indicates that the target frequency domain resource is in an idle state, namely, the peripheral LBT interception is successful; and the result of the peripheral LBT interception indicates that the target frequency domain resource is in a non-idle state, and indicates that the peripheral LBT interception fails.
Therefore, in the embodiment of the present invention, LBT listening may be performed on the target frequency domain resource before the primary uplink transmission time configured for the user equipment by the network equipment, that is, peripheral LBT listening is performed on the target frequency domain resource, so that this uplink retransmission is performed when the peripheral LBT listening is successful, inner LBT listening is performed when the peripheral LBT listening is failed, this uplink retransmission is performed when the inner LBT listening is successful, and this uplink retransmission is abandoned when the inner LBT listening is failed.
The peripheral and inner periphery LBT interception mechanism further increases the successful LBT interception probability, thereby increasing the probability of the repeated transmission and further reducing the time delay of the uplink repeated transmission.
In addition, it should be noted that, in the embodiment of the present invention, when the UE performs peripheral LBT listening, the network device may reserve an LBT listening slot for the UE to perform peripheral LBT listening before the UE sends data, so as to avoid affecting an LBT listening result.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, the second preset time includes N consecutive symbols before the uplink symbol, and N is a positive integer.
For example, in PUSCH repeated transmission, peripheral LBT sensing refers to LBT sensing using N symbols before the UL PUSCH repetition transmission symbol. The definition of N is: the number of LBT sensing symbols, which is specific to the subcarrier spacing parameter configuration (SCS numerology), mainly takes into consideration that sensing duration needs 25us.
Optionally, when the result of the inner-periphery listen-before-talk LBT listening indicates that the target frequency domain resource is in an idle state, performing the uplink retransmission through the target frequency domain resource, including:
under the condition that the inner periphery listen-before-talk LBT monitoring result indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission in the residual time through the target frequency domain resource;
wherein the remaining time includes a time of the target time excluding the first preset time.
Therefore, in the embodiment of the present invention, when the inner LBT listening is successful, the UE may perform the current uplink retransmission in a time (i.e., a target time) of the current uplink retransmission time configured for the UE by the network device, except for the time for performing the inner LBT listening.
For example, in PUSCH repeated transmission, if the inner LBT listening is successful, the UE may transmit data on the remaining symbols (remaining symbols); if inner LBT interception fails, the UE gives up the UL PUSCH repetition. And the rest symbols are symbols excluding the symbols for carrying out inner-bound LBT interception in the uplink symbols which are configured for the UL PUSCH retransmission of the UE in advance. In addition, if the remaining symbol is only one symbol, transmission is still performed to achieve the purpose of occupying the channel.
Specifically, for example, in the first Nominal repeat transmission (that is, nominal rep # 0) shown in fig. 4, the network device configures four symbols for this UL PUSCH retransmission, where a first symbol of the four symbols is used for performing intra-LBT listening, and when this intra-LBT listening is successful, the UE may perform this UL PUSCH retransmission on the remaining three symbols.
Optionally, when the result of the peripheral LBT listening indicates that the target frequency domain resource is in an idle state, performing the uplink retransmission through the target frequency domain resource includes:
when the result of the peripheral LBT interception indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission at the target time or the residual time through the target frequency domain resource;
wherein the remaining time includes a time of the target time excluding the first preset time.
It can be seen that, in the embodiment of the present invention, when the peripheral LBT listening is successful, the UE may perform the current uplink retransmission at the current uplink retransmission time configured for the UE by the network device, or perform the current uplink retransmission at a time (that is, a target time) other than the time for performing the internal LBT listening in the current uplink retransmission time configured for the UE by the network device.
For example, in PUSCH repeated transmission, if the inner LBT listening is successful, the UE may transmit data on a symbol configured for this UL PUSCH retransmission by the network device, or may transmit data on remaining symbols (remaining symbols); if the inner LBT interception fails, the UE gives up the UL PUSCH retransmission. And the rest symbols are symbols excluding the symbols for carrying out inner-bound LBT interception in the uplink symbols which are configured for the UL PUSCH retransmission of the UE in advance. In addition, if the remaining symbol is only one symbol, transmission is still performed to achieve the purpose of occupying the channel.
Specifically, for example, in the first Nominal retransmission (that is, nominal rep # 0) shown in fig. 9, the network device configures four symbols for the current UL PUSCH reptition, where one symbol before the four symbols is used for performing peripheral LBT sensing, and when the current peripheral LBT sensing is successful, the UE may perform the current UL PUSCH reptition on the four symbols, and may also perform the current UL PUSCH reptition a symbol (that is, the remaining three symbols) except for one symbol reserved for performing inner LBT sensing in the four symbols.
When the peripheral LBT listening is successful, if the UE performs UL transmission on a symbol occupied by the UL PUSCH repetition (i.e., a symbol configured by the network device for the current UL PUSCH repetition), the position of a Demodulation Reference Signal (DMRS) in a symbol set corresponding to the UL PUSCH repetition may be determined according to the prior art. For example, it is pre-agreed that the UE transmits the DMRS on the first symbol of symbols occupied by one UL PUSCH retransmission, for the first nominally repeated transmission (i.e., nominal rep # 0) as shown in fig. 9, when the peripheral LBT listening is successful, if the UE performs UL transmission on four symbols configured for this UL PUSCH retransmission by the network device, the UE may transmit the MDRS on the first symbol of the four symbols.
In addition, when the peripheral LBT listening is successful, if the UE performs UL transmission on the remaining symbols, the remaining symbols may be regarded as the actually transmitted UL PUSCH repetition, and the position of the DMRS transmission symbol on the UL PUSCH repetition may be determined according to the prior art. For example, it is pre-agreed that the UE transmits the DMRS on the first symbol of the symbols occupied by one UL PUSCH retransmission, for the first nominally repeated transmission (i.e., nominal rep # 0) as shown in fig. 9, when the peripheral LBT listening is successful, if the UE performs UL transmission on the remaining three symbols of the network device, the UE may transmit the MDRS on the first symbol of the three symbols.
Optionally, when the result of the peripheral LBT sensing indicates that the target frequency domain resource is in an idle state and the uplink retransmission is performed in the remaining time, the method further includes:
sending at least one demodulation reference signal at the first preset time through the target frequency domain resource, wherein when at least two demodulation reference signals are sent at the first preset time, the time length of the interval between every two adjacent demodulation reference signals is less than the preset time length;
alternatively, the first and second electrodes may be,
and transmitting first data in the first preset time through the target frequency domain resource, wherein the first data comprises at least part of data in the data subjected to the uplink repeated transmission in the remaining time.
Therefore, in the embodiment of the present invention, when the peripheral LBT sensing is successful and the UE performs the uplink repeated transmission in the remaining time, the UE may send at least one demodulation reference signal (DMRS) in the first preset time reserved for performing the peripheral LBT sensing, and when sending at least two DMRSs in the first preset time, a time interval between every two adjacent DMRSs is required to be less than a preset time duration, so as to achieve the purpose of occupying a channel. The DMRS sent at the first preset time may be used as an additional DMRS for the uplink repeated transmission, and participate in demodulation of the uplink repeated transmission.
Or, when the peripheral LBT listening is successful and the UE performs the uplink retransmission in the remaining time, the UE may also send part of the data in the data sent in the remaining time in the first preset time, that is, the UE may send part of the repeated data in the data sent in the remaining time in the first preset time, so as to achieve the purpose of occupying the channel.
For example, the network device configures 6 symbols for one UL PUSCH retransmission of the UE, where the first two symbols are used for performing inner LBT listening, and if the UE successfully performs the peripheral LBT listening this time, transmits data on four symbols of the remaining symbols, and agrees in advance that the DMRS is transmitted on the first symbol during one UL PUSCH retransmission, as shown in fig. 13, during the current UL PUSCH retransmission, the DMRS is transmitted on the third symbol of the 6 symbols, and the data is transmitted on the fourth to six symbols, so that the first to two symbols are not used. Wherein, in order to achieve the purpose of occupying the channel, one DMRS may be transmitted on each of the first to second symbols; alternatively, one DMRS is inserted on the first to second symbols, but the time interval between the inserted DMR and the DMRS transmitted on the third symbol is required to be less than 16us; alternatively, as shown in fig. 14, the partial repeated data on the fourth to fifth symbols may be transmitted on the first to second symbols.
Optionally, performing the uplink repeat transmission on the remaining time through the target frequency domain resource, includes:
acquiring second data which can be borne by the remaining time when a predetermined coding and rate matching method is adopted from the uplink data to be repeatedly transmitted, and discarding the data except the second data in the uplink data;
coding and rate matching are carried out on the second data by adopting the coding and rate matching method to obtain a first coded modulation symbol;
transmitting the first code modulation symbol over the remaining time through the target frequency domain resource; or
Coding and rate matching are carried out on the uplink data to be transmitted repeatedly, and a second coded modulation symbol is obtained;
obtaining a third coded modulation symbol which can be carried by the residual time from the second coded modulation time, and discarding coded modulation symbols except the third coded modulation symbol in the second coded modulation symbol;
and transmitting the third code modulation symbol in the residual time through the target frequency domain resource.
For example, for PUSCH uplink repeat transmission, when the UE performs this uplink repeat transmission in the remaining time, the specific coding and rate matching method may adopt the following first or second mode;
in the first mode, the data that can be carried by the remaining symbols is determined according to the coding and rate matching based on the remaining symbols, that is, based on the predetermined coding and rate matching method, and then only this part of data is coded and rate matched.
And in the second mode, coding and rate matching are carried out according to the number of original symbols (except the DMRS), and mapping is carried out on the rest symbols (except the DMRS) after rate matching is carried out according to all the symbols, so that the rest symbols can be filled, and the redundant coded modulation symbols can be discarded. Namely, the data to be retransmitted is coded and rate-matched, and then the coded modulation symbols which can be carried by the remaining symbols are determined, so that only the part of the coded modulation symbols is transmitted.
The second method has the advantages that when the peripheral + inner periphery LBT mechanism is implemented, the second rate matching is not needed to be executed, only the first rate matching is needed, and then the packing and the sending are carried out according to the actual number of the symbols.
Optionally, when the uplink retransmission is retransmission of a physical uplink shared channel, the performing, by using the target frequency domain resource, the current uplink retransmission includes:
and performing the uplink repeated transmission according to the target frequency domain resource according to an A-type physical uplink shared channel repeated transmission mechanism or a B-type physical uplink shared channel repeated transmission mechanism.
Therefore, the uplink repeat transmission method in the embodiment of the present invention is applicable to both the PUSCH Repetition Type a and the PUSCH Repetition Type B. Namely, for the uplink repeat transmission of the PUSCH, if the network device configures the PUSCH Repetition Type a, the uplink repeat transmission is a repeat transmission of the PUSCH Repetition Type a; if the network device configures the PUSCH Repetition Type B, the uplink repeat transmission is a repeat transmission of the PUSCH Repetition Type B.
The PUSCH Repetition Type a is that a user sends the same Transport Block (TB) to a network device on K consecutive slots (slots), and symbol positions occupied in the K slots are completely the same. The PUSCH Repetition Type B is transmitted by taking smaller time resources (less than 1 slot) as a unit, and each Nominal Repetition transmission (Nominal Repetition) is continuously transmitted, so that the purpose of reducing time delay is achieved through more flexible configuration, the utilization rate of uplink resources can be improved, the maximum Repetition times of the PUSCH is increased, and the performance of the system is further improved.
Optionally, the target time is configured by using a configuration grant scheduling transmission mechanism, or is configured by using a dynamic scheduling mechanism.
Therefore, the uplink repeat transmission method in the embodiment of the present invention is applicable to both a Configuration Grant (CG) scheduling transmission mechanism and a dynamic scheduling (DG) mechanism.
The CG scheduling transmission mechanism is mainly used for uplink transmission, the network device configures the USCH resource in advance, and if there is uplink data to be sent, the UE does not need to send a Scheduling Request (SR) to the network device, and can directly send the uplink data on the CG resource.
In addition, under the 5G NR-U unlicensed frequency band system, aiming at the Ultra-reliable and Low Latency Communication (URLLC) service, there are two uplink CG mechanisms, one is a configuration-authorized scheduling transmission mechanism (R16 URLLC CG) under the licensed frequency band, and the other is a configuration-authorized scheduling transmission mechanism (5G NR-U) th generation new radio unlicensed) under the unlicensed frequency band, a licensed scheduling transmission mechanism (namely NR-U CG) is configured.
Optionally, the performing peripheral LBT listening on the target frequency domain resource includes:
performing the peripheral LBT interception on the target frequency domain resource under the condition that the repeated transmission is the first repeated transmission;
alternatively, the first and second liquid crystal display panels may be,
performing the peripheral LBT listening on the target frequency domain resource under the condition that an invalid time exists before the target time, wherein the invalid time is the time for not allowing the user equipment to send data;
alternatively, the first and second electrodes may be,
and the receiving party of the data transmitted at a third preset time before the target time does not comprise the user equipment, and the peripheral LBT interception is carried out on the target frequency domain resource under the condition that the repeated transmission is the first repeated transmission.
It can be seen that the trigger condition for performing peripheral LBT sensing may be any one of the following conditions one to three:
the first condition is as follows: a first repeat transmission;
and (2) carrying out a second condition: invalid time exists in the time of the repeated transmission;
and (2) carrying out a second condition: and the network equipment does not send data to the network equipment within a third preset time before the first repeated transmission.
For example, for PUSCH uplink repeat transmission, the UE may need to determine whether peripheral + inner LBT listening needs to be performed before each UL PUSCH retransmission transmission, for example, the peripheral + inner LBT listening may be implemented only when there is uplink transmission interruption due to invalid symbols (invalid symbols) and when first UL PUSCH retransmission transmission (or the network device does not send data to itself before UL PUSCH retransmission transmission). Wherein, if the UL PUSCH repetition transmission is a continuous transmission, the peripheral + inner LBT listening is not required for other UL PUSCH repetition transmissions except for the first UL PUSCH repetition transmission requiring peripheral LBT listening.
Optionally, the performing inner-bound listen-before-talk LBT listening on the target frequency domain resource configured by the network device for the user equipment includes:
performing inner-periphery listen-before-talk (LBT) monitoring on the target frequency domain resource under the condition that the repeated transmission is the first repeated transmission;
alternatively, the first and second electrodes may be,
performing inner-bound listen-before-talk (LBT) listening on the target frequency domain resource under the condition that invalid time exists before the target time, wherein the invalid time is time for not allowing the user equipment to transmit data;
alternatively, the first and second electrodes may be,
and under the condition that a receiver of the data transmitted at a third preset time before the target time does not comprise the user equipment and the repeated transmission is the first repeated transmission, performing inner-periphery listen-before-talk (LBT) interception on the target frequency domain resource.
Therefore, the triggering condition for performing inner LBT sensing may be any one of the following conditions one to three:
the first condition is as follows: a first repeat transmission;
and (2) carrying out a second condition: the invalid time exists in the time of the repeated transmission;
and a second condition: and the network equipment does not send data to the network equipment within a third preset time before the first repeated transmission.
For example, for PUSCH uplink repeat transmission, the UE may need to determine whether to perform the intra-LBT listening before each UL PUSCH retransmission transmission, for example, the intra-LBT listening may be implemented only when there is uplink transmission interruption due to invalid symbols (invalid symbols) and when the first UL PUSCH retransmission transmission (or the network device does not send data to itself before the UL PUSCH retransmission transmission) occurs. Wherein, if the UL PUSCH repetition transmission is a continuous transmission, the inner-surrounding LBT interception is not needed for other UL PUSCH repetition transmissions except for the first UL PUSCH repetition transmission which needs the inner-surrounding LBT interception.
Optionally, before performing inner-bound listen-before-talk LBT listening on the target frequency domain resource configured by the network device for the user equipment, the method further includes:
receiving first configuration information sent by the network device, where the first configuration information is used to indicate whether the ue needs to perform the listen-before-talk (LBT) listening if there is an invalid time before the target time, where the invalid time is a time when the ue is not allowed to send data;
the performing inner-bound listen-before-talk (LBT) listening on the target frequency domain resource configured by the network device for the user equipment includes:
and under the condition that the value of the first configuration information is a first preset value and invalid time exists before the target time, performing inner periphery Listen Before Talk (LBT) interception on the target frequency domain resource.
It can be seen that the network device may send the first configuration information to the UE to indicate whether the UE needs to perform the inner LBT listening if there is an invalid time before the target time.
For example, for PUSCH uplink repeat transmission, the network device may configure, through signaling, whether the UE allows the inner LBT listening when the UL PUSCH retransmission transmission encounters an invalid symbol, and if the bit is set to 1, it indicates that the inner LBT listening is allowed, and if the bit is set to 0, it indicates that the inner LBT listening is not allowed. When the inner LBT interception is not allowed, the UE only executes the outer LBT interception once or the UE does not need to intercept the UL PUSCH retransmission transmission directly and ensures the continuity of the transmission by the network equipment.
Optionally, before performing peripheral LBT listening on the target frequency domain resource, the method further includes:
receiving second configuration information sent by the network device, where the second configuration information includes downlink transmission time and first indication information, and the first indication information is used to indicate the downlink transmission time to perform the peripheral LBT listening;
the performing peripheral LBT listening on the target frequency domain resource includes:
and performing the peripheral LBT interception on the target frequency domain resource at the downlink transmission time.
It can be seen that the network device may configure a partial downlink transmission time for the UE for performing the peripheral LBT listening. In the part of the downlink transmission time, the network device does not send data, thereby avoiding affecting the peripheral listening result of the UE.
Note that, in the PUSCH retransmission, the invalid time may be referred to as an invalid symbol, and the invalid symbol may be a symbol occupied by a synchronization signal block (SSB block), a downlink symbol (DL symbol), a common search space (Type 0-PDCCH CSS) of a Type0 physical downlink control channel, or an invalid symbol pattern (invalid symbol pattern).
Fig. 3 is a flowchart illustrating an uplink repeat transmission method according to an embodiment of the present invention, where the method is applied to a network device. The uplink retransmission method may be applied to PUSCH retransmission or PUCCH retransmission, and the following description takes PUSCH retransmission as an example, and in the case of PUCCH retransmission, see the following example of PUSCH retransmission.
As shown in fig. 3, the method may include the steps of:
step 301: and sending the first configuration information to the user equipment.
The first configuration information is used to indicate whether or not the ue needs to perform inner listen before talk LBT listening when there is an invalid time before a target time, where the invalid time is a time when the ue is not allowed to send data, the target time is an uplink transmission time configured in advance for one uplink repeat transmission of the ue, and the inner listen before talk LBT listening is performed in a first preset time in the target time.
In addition, in the PUSCH retransmission, the invalid time may be referred to as an invalid symbol, and the invalid symbol may be a symbol occupied by a synchronization signal block (SSB block), a downlink symbol (DL symbol), a common search space (Type 0-PDCCH CSS) of a Type0 physical downlink control channel, an invalid symbol pattern (invalid symbol pattern), or the like.
It can be seen that the network device may send the first configuration information to the UE to indicate whether the UE needs to perform the inner LBT listening if there is an invalid time before the target time. After receiving the first configuration information, the UE performs inner LBT interception on the target frequency domain resource under the condition that the value of the first configuration information is a first preset value and invalid time exists before the target time, and performs the uplink repeated transmission if the inner LBT interception is successful; and if the inner LBT interception fails, giving up the repeated uplink transmission. Under the condition that the value of the first configuration information is the second preset value, the UE may perform only one time of peripheral LBT listening or the UE does not need to listen to the uplink repeat transmission directly and the network device ensures the continuity of the transmission.
For example, for PUSCH uplink repeat transmission, the network device may configure, through signaling, whether or not the UE allows the inner LBT listening when the UL PUSCH repetition transmission encounters invalid symbol, and if the bit is set to 1, it indicates that the inner LBT listening is allowed, and if the bit is set to 0, it indicates that the inner LBT listening is not allowed. When the inner LBT interception is not allowed, the UE only executes the outer LBT interception once or the UE does not need to intercept the UL PUSCH retransmission transmission directly and ensures the continuity of the transmission by the network equipment.
As can be seen from the above, in the embodiment of the present invention, the network device may configure the UE to perform inner LBT listening when there is an invalid time before the time of the current uplink retransmission of the UE, so that when the inner LBT listening is successful, the current uplink retransmission is performed through the target frequency domain resource; and when the inner LBT interception fails, the uplink repeated transmission is abandoned. Therefore, the embodiment of the invention can reserve the LBT interception window for the user equipment within one uplink repeated transmission time in advance, so that the repeated transmission can be carried out when the interception is successful.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, where the first preset time includes first N symbols in the uplink symbol, and N is a positive integer. That is, in the embodiment of the present invention, the UE may perform LBT sensing on the first N symbols in one uplink retransmission symbol configured for the UE by the network device.
For example, in PUSCH repetition transmission, inner-bound LBT sensing refers to LBT sensing using the first N symbols of UL PUSCH repetition transmission. The definition of N is: the number of LBT sensing symbols, which is specific to the subcarrier spacing parameter configuration (SCS numerology), mainly takes into consideration that sensing duration needs 25us.
Optionally, the method further includes:
sending second configuration information to the user equipment;
the second configuration information includes downlink transmission time and first indication information, where the first indication information is used to indicate that the downlink transmission time is used for performing peripheral LBT listening, and the peripheral LBT listening is performed on a second preset time before the target time.
It can be seen that the network device may configure a partial downlink transmission time for the UE for performing the peripheral LBT listening. In the part of the downlink transmission time, the network device does not send data, thereby avoiding affecting the peripheral listening result of the UE.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, the second preset time includes N consecutive symbols before the uplink symbol, and N is a positive integer.
For example, in PUSCH repeated transmission, peripheral LBT sensing refers to LBT sensing using N symbols before the UL PUSCH repetition transmission symbol. The definition of N is: the number of LBT sensing symbols, which is specific to the subcarrier spacing parameter configuration (SCS number), mainly takes 25us of sensing duration into consideration.
Optionally, the method further includes:
receiving a demodulation reference signal and third data sent by the user equipment;
determining a starting position of time for bearing the third data in the target time according to the sending position of the demodulation reference signal in the target time;
and analyzing the third data according to the starting position.
As described above in the related content of the uplink retransmission method applied to the UE, when the peripheral LBT listening is successful, the UE may perform this uplink retransmission on the target; when the peripheral LBT listening fails and the inner LBT listening succeeds, the UE may perform the uplink retransmission in the remaining time. As can be seen from this, although the UE performs the current uplink retransmission, when the listening success timing is different, the initial transmission position of the data is different, and the transmission position of the DMRS is different.
Therefore, in this scenario, when the network device receives the data of the current uplink retransmission of the UE, blind detection needs to be performed, that is, the sending position of the DMRS during the current uplink retransmission needs to be determined, so as to determine whether the current uplink retransmission is performed when the peripheral LBT listening is successful or when the internal LBT listening is successful, and further determine the initial sending position of the data during the current uplink retransmission, thereby facilitating the network device to analyze the received data.
Optionally, the method further includes:
receiving fourth data sent by the user equipment;
and analyzing the fourth data according to the starting position of the remaining time, wherein the remaining time comprises the time except the first preset time in the target time.
As described in the foregoing description of the related content of the uplink retransmission method applied to the UE, when the peripheral LBT listening is successful, the UE may perform this uplink retransmission in the remaining time; when the peripheral LBT listening fails and the inner LBT listening succeeds, the UE may perform the uplink retransmission for the time remaining. Therefore, in this scenario, no matter whether the peripheral LBT listening is successful or the inner LBT listening is successful, the UE performs this uplink repeated transmission in the remaining time, and the initial transmission positions of the data are different, and the transmission positions of the DMRS are also the same.
Therefore, in this scenario, when the network device receives the data repeatedly transmitted by the UE in the uplink, the received data can be analyzed according to the starting position of the remaining time without performing the aforementioned blind detection process.
Optionally, the network device does not send data within a time when the user equipment performs peripheral LBT listening, where the peripheral LBT listening is performed on LBT listening at a second preset time before the target time.
That is, in the embodiment of the present invention, when the UE performs peripheral LBT listening, the network device may reserve an LBT listening slot for the UE to perform peripheral LBT listening before the UE sends data, so as to avoid affecting the LBT listening result.
For example, a specific implementation of the uplink transmission method provided in the embodiment of the present invention may be as described in the following first implementation, second implementation, or third implementation.
Implementation mode one
The embodiment is mainly directed to a method for PUSCH retransmission transmission (i.e., the transmission times are not less than 1) based on inner LBT interception. Namely: the method comprises the steps that UE firstly executes inner LBT interception, if the result of inner LBT interception is idle (idle), the UE only transmits data on remaining symbols, and even if the remaining symbols only have one symbol, the UE still executes transmission; if the LBT senses the channel as non-idle (busy), the UE will abandon (drop) the transmission.
The inner LBT listening refers to LBT listening by using the first N symbols transmitted by UL PUSCH retransmission, and the total duration of the N symbols is required to be not less than 25us. The definition of N is: the number of symbols for LBT sensing is related to SCS numerology (for different SCS numerology configurations, see table 1 below for specific values of N). LBT sensing means that the UE performs no UL transmission but only Energy Detection (ED) on the channel.
TABLE 1 value of symbol number and DMRS symbol position for LBT listening window
Figure BDA0003006632520000321
1.1 about the inner LBT configuration
As shown in fig. 4, the gNB configures a CG transmission with PUSCH repetition type B for the UE. Each PUSCH transmission is accompanied by 4 Nominal repetition transmissions (Nominal repetitions), and each Nominal repetition contains 4 uplink symbols (UL symbols). Since the gNB configures the first two symbols of the (n + 1) th slot for Downlink (DL) transmission, a gap (gap) occurs between the Actual third Actual repeat transmission (i.e., actual rep #2 in fig. 4) and the fourth Actual repeat transmission (i.e., actual rep #3 in fig. 4), so that the UE cannot continuously transmit Actual rep #2 and Actual rep #3.
If the gNB configures a function of inner-periphery LBT listening when the UL PUSCH retransmission encounters an invalid symbol (invalid symbol) through signaling, the UE needs to determine whether to perform inner-periphery LBT listening before each UL PUSCH retransmission is transmitted, that is, the inner-periphery LBT listening may be implemented only when the UL PUSCH retransmission is transmitted for the first time and uplink transmission is interrupted due to the invalid symbols. If the UL PUSCH retransmission transmission is a continuous transmission, the inner LBT listening mechanism is not needed for other UL PUSCH retransmission transmissions except for the first UL PUSCH retransmission transmission that needs to perform the inner LBT listening. If the gNB does not configure inner LBT listening, the UE performs LBT listening according to the prior art (i.e. the UE performs peripheral LBT listening, and the gNB can send data in the peripheral LBT listening slot), or the UE does not need to listen to the UL PUSCH repetition transmission directly and the gNB ensures the continuity of transmission.
1.2 for the context of the inner LBT listening process:
specifically, if the gNB configures through signaling that the UE needs to implement intra-LBT sensing in case of first UL PUSCH retransmission transmission and uplink transmission interruption due to invalid symbols, the UE needs to perform intra-LBT sensing before first Nominal retransmission (i.e. Nominal rep #0 in fig. 4) and fourth Nominal retransmission (i.e. Nominal rep # 3) as shown in fig. 4, and the first N symbols of Nominal rep #0 and Nominal rep #3 are used as LBT sensing window.
If the inner LBT interception result performed on the first N symbols of the Nominal rep #0 is idle, performing data transmission on the rest symbols of the Nominal rep #0, and directly performing data transmission in the Nominal rep #1 and the Nominal rep #2 without performing inner LBT interception; if the result of inner LBT sensing performed on the first N symbols of Nominal rep #0 is busy, then data transmission on Nominal rep #0 is abandoned, and inner LBT sensing is performed on the first N symbols of Nominal rep #1, so as to perform processing according to the result of inner LBT sensing on the first N symbols of Nominal rep #1 (the specific processing method is similar to the processing method of the result of inner LBT sensing on the first N symbols of Nominal rep # 0).
After the data transmission on the Nominal rep #2 is finished, before the Nominal rep #3, performing inner LBT (local binary transmission) monitoring on the first N symbols of the Nominal rep #3, and if the result of the inner LBT monitoring on the first N symbols of the Nominal rep #3 is idle, transmitting on the remaining symbols of the Nominal rep # 3; if the result of inner LBT snooping performed on the first N symbols of Nominal rep #0 is busy, the data transmission on Nominal rep #3 is abandoned.
If the LBT window occupies one symbol as shown in fig. 4, the Actual transmission symbols of Actual rep #0 and Actual rep #3 are 3 symbols if the inner LBT listening results on both Nominal rep #0 and Nominal rep #3 are idle.
1.3, coding and rate matching for UL PUSCH repetition:
the coding and rate matching of UL PUSCH repetition may be coded and rate matched based on remaining symbols; or, coding and rate matching are performed according to the number of original symbols except for the DMRS, and then mapping is performed on remaining symbols except for the DMRS, so that after the remaining symbols are filled, redundant coded modulation symbols are discarded.
For example, coding and rate matching are performed on the Nominal rep #0 in fig. 4, where the number of remaining symbols of the Nominal rep #0 is 3, and if one DMRS needs to be transmitted in the transmission, the DMRS needs to occupy one symbol, so that the number of symbols actually carrying data is two, coding and rate matching may be performed according to 2 remaining symbols except for the DMRS, and then mapping the symbols onto the 2 remaining symbols, as shown in fig. 8.
Alternatively, for example, in fig. 7, coding and rate matching may be performed according to 3 symbols, and then mapped on 2 remaining symbols other than DMRS. Since the remaining symbols can only carry data of 2 symbols, data of 1symbol cannot be transmitted and is discarded.
1.4 DMRS position for UL PUSCH repetition:
when the UE performs UL transmission on remaining symbols, the UE may determine the position of a DMRS transmission symbol on the UL PUSCH retransmission according to the prior art by using the remaining symbols as the actually transmitted UL PUSCH retransmission, that is, determine the position of the DMRS transmission symbol on the current UL PUSCH retransmission based on the remaining symbols according to the prior art. For example, if DMRS is required to be transmitted at the position of the first symbol of UL PUSCH repetition at one time, then for Nominal rep #0 in fig. 4, if there is intra-LBT sensing, DMRS is transmitted on the first symbol of the remaining symbols, that is, DMRS is transmitted on the second symbol of Nominal rep # 0.
In summary, the foregoing 1.1 to 1.4 are PUSCH retransmission transmission methods for performing intra-LBT listening in a PUSCH retransmission type B scenario.
1.5, aiming at a PUSCH repetition type A scene, the PUSCH repetition transmission method based on inner LBT interception comprises the following steps:
as shown in fig. 5, the gNB configures a CG transmission with a PUSCH repetition type a for the UE, there are two repetitions on the PUSCH each time, each repetition occupies 10 symbols, and the positions of the 10 symbols of each repetition in each slot are the same.
As for the 1.1 PUSCH repetition type a scenario in the PUSCH repetition transmission method for performing intra-LBT listening in the PUSCH repetition type B scenario, it may also be configured that the intra-LBT listening is implemented only when the UE is performing UL PUSCH repetition transmission for the first time and uplink transmission is interrupted due to invalid symbols. Specifically, for the PUSCH repetition type a scenario shown in fig. 5, it is required that the UE may insert an inner LBT listening window at the start position of each repetition.
In addition, the specific inner periphery LBT listening process, coding and rate matching, and the DMRS position determination method of UL PUSCH repetition in the PUSCH repetition type a scene are similar to the foregoing 1.2 to 1.4, and are not described again here.
1.6, aiming at a DG PUSCH scene, the PUSCH repetition transmission method based on inner-periphery LBT interception comprises the following steps:
as shown in fig. 6, if the gNB dynamically schedules a PUSCH with a repetition type B and turns on the inner LBT function, the specific processing procedure is the same as that of 1.1 to 1.4, and is not described herein again.
Second embodiment
The embodiment is mainly directed to a peripheral LBT + inner LBT listening-based PUSCH repetition transmission method.
The specific treatment method comprises the following steps: the UE firstly executes peripheral LBT interception, if the result of the peripheral LBT interception is idle, the UE carries out UL transmission on symbles occupied by UL PUSCH retransmission or UL transmission on remaining symbles, if the result of the peripheral LBT interception is busy, the UE continues to execute the inner LBT interception, if the result of the inner LBT interception is idle, the UE transmits UL data on the remaining symbles, if the result of the inner LBT interception is only 1 symbles, the UE still executes transmission (mainly aims at occupying a channel), and if the result of the inner LBT interception is busy, the UE abandons the UL PUSCH retransmission transmission.
Wherein, the peripheral LBT listening refers to LBT listening before UL PUSCH retransmission transmission. The inner-periphery LBT listening refers to LBT listening by utilizing the first N symbols transmitted by UL PUSCH repetition, and the total duration of the N symbols is required to be not less than 25us. The definition of N is: the number of symbols for LBT sensing is related to SCS numerology (for different SCS numerology configurations, see table 1 above for specific values of N). LBT sensing means that the UE performs no UL transmission but ED only on the channel.
2.1 about peripheral + inner LBT configuration
As shown in fig. 9, the gNB configures the UE with a CG transmission with PUSCH repetition type b. Each PUSCH transmission is accompanied by 4 Nominal transmissions and each Nominal transmission contains 4 UL symbols. Since the gNB configures the first two symbols of the (n + 1) th slot for DL transmission, a gap (gap) occurs between the Actual third Actual repeated transmission (i.e., actual rep #2 in fig. 9) and the fourth Actual repeated transmission (i.e., actual rep #3 in fig. 9), resulting in that the UE cannot continuously transmit the Actual rep #2 and the Actual rep #3.
If the gNB configures a function of performing peripheral + inner LBT listening when the UL PUSCH retransmission encounters an invalid symbol (invalid symbol) through signaling, the UE needs to determine whether peripheral + inner LBT listening needs to be performed before each UL PUSCH retransmission is transmitted, that is, the peripheral + inner LBT listening may be performed only when the UL PUSCH retransmission is transmitted for the first time and uplink transmission is interrupted due to the invalid symbols. If the UL PUSCH retransmission transmission is a continuous transmission, the peripheral + inner LBT listening mechanism is not needed for other UL PUSCH retransmission transmissions except for the first UL PUSCH retransmission transmission that peripheral + inner LBT listening needs to be performed. If peripheral + inner periphery LBT listening is not configured by the gNB, the UE performs LBT listening according to the prior art (i.e., the UE performs peripheral LBT listening and the base station can send data in the peripheral LBT listening slot), or the UE does not need to listen to the UL PUSCH repetition transmission directly and the gNB ensures the continuity of transmission.
2.2, for peripheral + inner LBT listening process:
specifically, if the gNB configures, through signaling, that the UE needs to implement peripheral + intra-LBT listening under the condition of first UL PUSCH retransmission transmission and uplink transmission interruption due to invalid symbols, as shown in fig. 9, first, a peripheral + intra-LBT listening mechanism is executed for Nominal rep #0, specifically, the execution process is as follows:
if the result of the first peripheral LBT sensing (i.e. peripheral LBT sensing before the Nominal rep # 0) is idle, the UE transmits Actual rep #0 (3 remaining symbols) and Actual rep #1 and Actual rep #2, and inserts 1 DMRS of symbol at the symbol position for the first inner LBT sensing (i.e. inner LBT sensing on the Nominal rep # 0) for occupying the channel and participating in demodulation of the Actual rep # 0; if the first peripheral LBT listening result is busy, the UE will continue to perform the first peripheral LBT listening.
If the first inner LBT listening result is idle, the UE will transmit Actual rep #0 (3 remaining symbols) and Actual rep #1 and Actual rep #2; if the first inner LBT sensing result is busy, the UE may abandon data transmission on the Nominal rep #0 and perform the peripheral + inner LBT sensing mechanism for Nominal rep #1 (the specific processing method is similar to the aforementioned peripheral + inner LBT sensing process for Nominal rep # 0).
Secondly, similarly, a peripheral + inner LBT listening mechanism is executed for Nominal rep #3, and the specific execution process is as follows:
if the result of the second peripheral LBT sensing (i.e., peripheral LBT sensing ahead of Nominal rep # 3) is idle as shown in fig. 9, the UE transmits Actual rep #3 (3 remaining symbols) and inserts 1symbol of DMRS at the symbol position for the second inner LBT sensing (i.e., inner LBT sensing on Nominal rep # 3) for occupying the channel and participating in the demodulation of the Actual rep #3. If the second peripheral LBT sensing result is busy, the UE will continue to perform the second peripheral LBT sensing.
If the second inner LBT listening result is idle, the UE will transmit Actual rep #3 (3 remaining symbols); if the second inner LBT listening result is busy, the UE will abort the data transmission on the Nominal rep #3.
Here, for each peripheral LBT sensing, when the result of the current peripheral LBT sensing is idle, the UE performs the current retransmission in the following two manners:
the first method is as follows: repeating transmission on the symbol configured for the repeating transmission at the base station;
the second method comprises the following steps: and performing repeated transmission on symbols (namely the rest symbols) except the symbols for performing inner LBT (local binary transmission) listening in the symbols configured for the repeated transmission by the base station.
For example, the base station and the UE make a pre-appointment, and when the PUSCH is repeatedly transmitted every time, the base station transmits the DMRS on the first symbol of the symbols configured for this repeated transmission, and if the result of the first peripheral LBT sensing (that is, the peripheral LBT sensing before the Nominal rep # 0) in fig. 10 is idle, the UE may perform this repeated transmission in the above-mentioned manner, that is, the UE may transmit the DMRS on the first symbol, and transmit data on the 2 nd to 4 th symbols, so that the Actual transmission symbols of the Actual rep #0 are 4; or, the UE may perform the repeated transmission in the second manner, that is, the UE may transmit the DMRS on the second symbol and transmit data on the 3 rd to 4 th symbols, so that the Actual transmission symbols of Actual rep #0 are 3.
In fig. 10, if the first peripheral LBT sensing result is busy and the first inner LBT sensing result is idle, the UE transmits the DMRS on the second symbol and transmits data on the 3 rd to 4 th symbols, so that the Actual transmission symbols of Actual rep #0 are 3.
From the above comparison, when the UE adopts the first mode, the data transmission positions in the first and second cases are different, when the first peripheral LBT sensing result is idle, and when the first peripheral LBT sensing result is busy and the first inner LBT sensing result is idle. Therefore, if the first peripheral LBT listening result is idle, the UE performs the repeated transmission in the foregoing manner, and the base station needs to perform blind detection, that is, it is determined whether the peripheral LBT listening is successful or the inner LBT listening is successful according to the position of the DMRS, so that the received data is analyzed conveniently.
However, if the UE employs the second method, the sending positions of the data are the same in the above cases (i.e., in the case that the first peripheral LBT sensing result is idle, and in the case that the first peripheral LBT sensing result is busy and the first inner LBT sensing result is idle), so that if the first peripheral LBT sensing result is idle, the UE performs the repeated transmission according to the second method, and the base station does not need to perform blind detection and can directly analyze the received data.
2.3 coding and Rate matching of UL PUSCH repitition
And when the UE performs repeated transmission on the symbols configured for the repeated transmission at the time, the UE performs coding and rate matching based on the number of the symbols except the DMRS.
When the base station performs repeated transmission on the rest symbols in the symbols configured for the repeated transmission, coding and rate matching can be performed according to the rest symbols; or, coding and rate matching are carried out according to the number of original symbols except the DMRS, and then mapping is carried out on the rest symbols except the DMRS, so that after the rest symbols are filled, the redundant coded modulation symbols are discarded. The method has the advantages that when the peripheral LBT + inner LBT scheme is implemented, the secondary rate matching is not needed to be executed, only the primary rate matching is needed, and then the packing and the sending are carried out according to the actual number of symbols.
2.4 DMRS position for UL PUSCH repetition:
if the UE performs repeated transmission on the symbol configured for the repeated transmission at the time by the base station, the position of the DMRS transmission symbol on the UL PUSCH repetition is determined according to the prior art. For example, if the DMRS is required to be transmitted at the position of the first symbol of the primary UL PUSCH retransmission, the DMRS is transmitted at the first symbol for Nominal rep #0 of fig. 9.
If the UE performs repeated transmission on the remaining symbols in the symbols configured by the base station for the current repeated transmission, the remaining symbols may be used as the actually transmitted UL PUSCH repeat, and the position of the DMRS transmission symbol on the UL PUSCH repeat is determined according to the prior art, that is, the position of the DMRS transmission symbol on the current UL PUSCH repeat is determined based on the remaining symbols according to the prior art. For example, if the DMRS is required to be transmitted at the position of the first symbol of one UL PUSCH retransmission, the DMRS is transmitted on the first symbol of the remaining symbols, that is, the DMRS is transmitted on the second symbol of the Nominal rep #0, in the presence of intra-LBT sensing, in the Nominal rep #0 of fig. 9.
Under the condition that the peripheral interception result is idle, if the UE performs repeated transmission on the residual symbols in the symbols configured for the repeated transmission by the base station, the UE can insert the DMRS on the reserved symbols for performing the inner LBT interception as the additional DMRS, so that the purpose of occupying the channel is achieved, and meanwhile, the additional DMRS can also be used as the additional DMRS for transmitting the UL PUSCH retransmission on the residual symbols to participate in the demodulation of the UL PUSCH retransmission. Specifically, in one UL PUSCH retransmission, DMRS positions and additional DMRS positions may be as shown in table 1, where the principle of inserting a DMRS on a symbol for intra-LBT listening is as follows: the two DMRS transmissions are separated by less than 16us.
In addition, if the peripheral listening result is idle, if the UE performs the repeated transmission on the remaining symbols in the symbols configured by the base station for the repeated transmission, part of the data carried by the remaining symbols may be sent on the reserved symbols for performing the inner LBT listening, so as to achieve the purpose of occupying the channel. In specific implementation, when the gNB identifies that the UE occupies the channel through detection (such as multi-carrier Discontinuous Transmission (DTX), DMRS, and the like), that is, transmits the current PUSCH, the data on the first N symbols (that is, the symbols reserved for performing intra-LBT listening) may be combined with the received data of the remaining symbols.
For example, as shown in fig. 13, there are two ways to insert DMRS into the first N symbols (i.e., the symbols reserved for performing inner LBT listening) of UL PUSCH retransmission transmission: the first method is that the N symbols all carry the DMRS, and the second method is that the DMRS can be inserted into the N symbols at intervals, and the interval between two adjacent DMRS symbols is less than 16us to ensure that the UE can continuously occupy the channel.
As shown in fig. 14, partial information sent on the remaining symbols is inserted into the first N symbols (i.e. the reserved symbols for performing inner LBT listening) of UL PUSCH retransmission transmission, so that the channel may be occupied and the information on the first N symbols and the received information on the remaining symbols may be combined.
In summary, the foregoing 2.1 to 2.4 are PUSCH repetition transmission methods for performing peripheral + inner LBT listening in a PUSCH repetition type B scenario.
2.5, aiming at the PUSCH repetition type A scene, the PUSCH repetition transmission method based on peripheral and inner LBT interception comprises the following steps:
as shown in fig. 11, the gNB configures a CG transmission with PUSCH repetition type a for the UE, where there are two repetitions for the PUSCH each time, each repetition occupies 10 symbols, and the positions of the 10 symbols of each repetition in each slot are the same.
As for the 2.1 PUSCH repetition type a scenario in the PUSCH repetition transmission method for performing peripheral + inner periphery LBT listening in the PUSCH repetition type B scenario, the UE may be configured to perform peripheral + inner periphery LBT listening only when UL PUSCH repetition transmission is first performed and uplink transmission is interrupted due to invalid symbols. Specifically, for the PUSCH repetition type a scenario shown in fig. 11, it is required that the UE may insert a peripheral + inner LBT listening window at the start position of each repetition.
In addition, the specific peripheral + inner LBT listening process, coding and rate matching, and DMRS position determination method of UL PUSCH repetition in the PUSCH repetition type a scenario are similar to the aforementioned 2.2 to 2.4, and are not described herein again.
2.6, aiming at a DG PUSCH scene, the PUSCH repetition transmission method based on peripheral and inner LBT interception comprises the following steps:
as shown in fig. 12, if the gNB dynamically schedules a PUSCH with a repetition type b and starts the peripheral + inner LBT function, the specific processing procedure is the same as that of 2.1 to 2.4, and is not described herein again.
EXAMPLE III
The embodiment is mainly directed to a peripheral LBT interception based PUSCH repetition transmission method.
The specific treatment method comprises the following steps: the UE executes peripheral LBT interception, if the result of the peripheral LBT interception is idle, the UE carries out UL transmission on symbols occupied by UL PUSCH reptition, and if the result of the peripheral LBT interception is busy, the UE gives up the current UL PUSCH reptition transmission. When the UE performs peripheral LBT listening, the base station may reserve one LBT listening slot for the UE to perform peripheral LBT listening before the UE transmits data. That is, within the time of the peripheral LBT listening, the UE performs LBT listening, and the base station waits for the UE to perform LBT listening without transmitting data.
3.1 peripheral LBT configuration
As shown in fig. 15, the gNB configures a CG transmission with PUSCH repetition type B for the UE. Each PUSCH transmission is accompanied by 4 Nominal repetition transmissions (Nominal transmissions), and each Nominal repetition contains 4 uplink symbols (UL symbols). Since the gNB configures the first symbol of the (n + 1) th slot for Downlink (DL) transmission and the second symbol for LBT sensing, a gap (gap) occurs between the Actual third Actual repeated transmission (i.e. Actual rep #2 in fig. 4) and the fourth Actual repeated transmission (i.e. Actual rep #3 in fig. 4), resulting in that the UE cannot continuously transmit the Actual rep #2 and the Actual rep #3.
If the gNB configures a function of performing peripheral LBT listening when an invalid symbol (invalid symbol) is encountered in UL PUSCH retransmission transmission through signaling, the UE needs to determine whether peripheral LBT listening needs to be performed before UL PUSCH retransmission transmission every time, that is, the peripheral LBT listening may be performed only when uplink transmission is interrupted due to first UL PUSCH retransmission transmission and invalid symbols. If the UL PUSCH repetition transmission is a continuous transmission, the peripheral LBT listening mechanism is not needed for other UL PUSCH repetition transmissions except for the first UL PUSCH repetition transmission that requires peripheral LBT listening.
3.2 for peripheral LBT listening procedure:
specifically, if the gNB configures, through signaling, that the UE needs to implement peripheral LBT sensing under the condition of first UL PUSCH retransmission transmission and uplink transmission interruption due to invalid symbols, as shown in fig. 15, first, a peripheral LBT sensing mechanism is performed for Nominal rep #0, and the specific implementation procedure is as follows:
if the first peripheral LBT listening (i.e., peripheral LBT listening ahead of the Nominal rep # 0) shown in fig. 15 results in idle, the UE transmits the Actual rep #0 (4 symbols) and Actual rep #1 (4 symbols) and Actual rep #2 (2 symbols); if the first peripheral LBT sensing result is busy, the UE will abort the data transmission on the Nominal rep #0 and perform the peripheral LBT sensing mechanism for the Nominal rep #1 (the specific processing method is similar to the aforementioned peripheral LBT sensing for the Nominal rep # 0).
Secondly, similarly, a peripheral LBT listening mechanism is executed for Nominal rep #3, and the specific execution process is as follows:
if the second peripheral LBT listening (i.e. peripheral LBT listening before Nominal rep # 3) shown in fig. 15 results in idle, the UE transmits Actual rep #3 (4 symbols); if the second peripheral LBT listening results in busy, the UE will abort the data transmission on the Nominal rep #3.
3.3 coding and Rate matching of UL PUSCH repeption
And when the peripheral LBT interception is successful, the UE performs repeated transmission on the symbols configured for the repeated transmission by the base station, and then performs coding and rate matching based on the number of the symbols except the DMRS.
3.4 DMRS position for UL PUSCH repetition:
when the peripheral LBT interception is successful, the UE performs repeated transmission on the symbol configured for the repeated transmission by the base station, and then determines the position of the DMRS transmission symbol on the UL PUSCH repetition according to the prior art. For example, if the DMRS is required to be transmitted at the position of the first symbol of the UL PUSCH repetition at one time, the DMRS is transmitted at the first symbol for Nominal rep #0 in fig. 15.
In summary, the foregoing 3.1 to 3.4 are PUSCH retransmission transmission methods for performing peripheral LBT listening in a PUSCH retransmission type B scenario.
3.5, aiming at the PUSCH repetition type A scene, the PUSCH repetition transmission method based on the peripheral LBT interception comprises the following steps:
as shown in fig. 16, the gNB configures a CG transmission with PUSCH repetition type a for the UE, there are two repetitions on the PUSCH each time, each repetition occupies 10 symbols, and the positions of the 10 symbols of each repetition in each slot are the same.
As for the PUSCH retransmission type a scenario, it may also be configured that the UE implements the peripheral LBT listening only when the UL PUSCH retransmission is transmitted for the first time and the uplink transmission is interrupted due to the invalid symbols, as in the PUSCH retransmission transmission method for performing the peripheral LBT listening under the PUSCH retransmission type B scenario 3.1. Specifically, for the PUSCH repetition type a scenario shown in fig. 16, it is required that the UE may insert one peripheral LBT listening window at the start position of each repetition.
In addition, the specific peripheral LBT listening process, coding and rate matching, and the DMRS position determination method of UL PUSCH repetition in the PUSCH repetition type a scenario are similar to the foregoing 3.2 to 3.4, and are not described again here.
3.6, aiming at a DG PUSCH scene, the PUSCH repetition transmission method based on peripheral LBT interception comprises the following steps:
as shown in fig. 17, if the gNB dynamically schedules a PUSCH with a repetition type b and turns on the peripheral LBT function, the specific processing procedure is the same as that of 3.1 to 3.4, and is not described again here.
In summary, in the embodiments of the present invention, in an unauthorized frequency band, the problem that the current UL PUSCH retransmission cannot be transmitted due to LBT listening failure when the transmission is resumed after the UL PUSCH retransmission is interrupted due to invalid symbol can be solved, and the reliability of uplink transmission is improved.
With the above description of the uplink retransmission method according to the embodiment of the present invention, the uplink retransmission apparatus according to the embodiment of the present invention will be described with reference to the accompanying drawings.
Referring to fig. 18, an embodiment of the present invention further provides an uplink repeat transmission apparatus, where the apparatus includes:
an inner periphery listening module 1501, configured to perform inner periphery listen-before-talk LBT listening on a target frequency domain resource configured by a network device for the user equipment, where the inner periphery listen-before-talk LBT listening is to perform LBT listening within a first preset time in a target time, and the target time is uplink transmission time configured in advance for primary uplink repeated transmission of the user equipment;
a first processing module 1502, configured to perform, when the result of inner-periphery listen-before-talk LBT listening indicates that the target frequency domain resource is in an idle state, the uplink retransmission through the target frequency domain resource;
a second processing module 1503, configured to give up the uplink retransmission this time when the result of listen-before-talk around LBT listening indicates that the target frequency domain resource is in a non-idle state.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, where the first preset time includes first N symbols in the uplink symbol, and N is a positive integer.
Optionally, the apparatus further comprises:
a peripheral interception module, configured to perform peripheral LBT interception on the target frequency domain resource, where the peripheral LBT interception is performed within a second preset time before the target time;
a third processing module, configured to perform the uplink retransmission this time through the target frequency domain resource when the result of the peripheral LBT listening indicates that the target frequency domain resource is in an idle state;
the inner periphery listening module 1501 is specifically configured to:
and performing inner-periphery listen-before-talk (LBT) monitoring on the target frequency domain resource under the condition that the result of the peripheral LBT monitoring indicates that the target frequency domain resource is in a non-idle state.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, the second preset time includes N consecutive symbols before the uplink symbol, and N is a positive integer.
Optionally, the first processing module 1502 is specifically configured to:
under the condition that the inner periphery listen-before-talk LBT monitoring result indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission in the residual time through the target frequency domain resource;
wherein the remaining time includes a time of the target time excluding the first preset time.
Optionally, the third processing module is specifically configured to:
when the result of the peripheral LBT interception indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission at the target time or the residual time through the target frequency domain resource;
wherein the remaining time includes a time of the target time excluding the first preset time.
Optionally, the apparatus further comprises:
a fourth processing module, configured to send at least one demodulation reference signal at the first preset time through the target frequency domain resource, where when at least two demodulation reference signals are sent at the first preset time, a duration of an interval between every two adjacent demodulation reference signals is less than a preset duration;
alternatively, the first and second electrodes may be,
a fifth processing module, configured to transmit first data over the first preset time through the target frequency domain resource, where the first data includes at least part of data in data for performing uplink repeat transmission this time over the remaining time.
Optionally, when the first processing module 1502 or the third processing module performs the uplink repeat transmission of this time in the remaining time through the target frequency domain resource, the processing module is specifically configured to:
acquiring second data which can be borne by the remaining time when a predetermined coding and rate matching method is adopted from the uplink data to be repeatedly transmitted, and discarding the data except the second data in the uplink data;
coding and rate matching are carried out on the second data by adopting the coding and rate matching method to obtain a first coded modulation symbol;
transmitting the first code modulation symbol over the remaining time through the target frequency domain resource; or alternatively
Coding and rate matching are carried out on the uplink data to be transmitted repeatedly, and a second coded modulation symbol is obtained;
obtaining a third coded modulation symbol which can be carried by the residual time from the second coded modulation time, and discarding coded modulation symbols except the third coded modulation symbol in the second coded modulation symbol;
and transmitting the third code modulation symbol in the residual time through the target frequency domain resource.
Optionally, when the uplink retransmission is the retransmission of the physical uplink shared channel, the first processing module 1502 is specifically configured to:
and performing the uplink repeated transmission according to the target frequency domain resource according to an A-type physical uplink shared channel repeated transmission mechanism or a B-type physical uplink shared channel repeated transmission mechanism.
Optionally, the target time is configured by using a configuration grant scheduling transmission mechanism, or is configured by using a dynamic scheduling mechanism.
Optionally, the inner periphery listening module 1501 is specifically configured to:
under the condition that the repeated transmission is the first repeated transmission, performing inner-periphery listen-before-talk (LBT) interception on the target frequency domain resource;
alternatively, the first and second liquid crystal display panels may be,
performing inner-bound listen-before-talk (LBT) listening on the target frequency domain resource under the condition that invalid time exists before the target time, wherein the invalid time is time for not allowing the user equipment to transmit data;
alternatively, the first and second electrodes may be,
and under the condition that a receiver of the data transmitted at a third preset time before the target time does not comprise the user equipment and the repeated transmission is the first repeated transmission, performing inner-periphery listen-before-talk (LBT) interception on the target frequency domain resource.
Optionally, the peripheral interception module is specifically configured to:
performing the peripheral LBT interception on the target frequency domain resource under the condition that the repeated transmission is the first repeated transmission;
alternatively, the first and second electrodes may be,
performing the peripheral LBT interception on the target frequency domain resource under the condition that invalid time exists before the target time, wherein the invalid time is time for not allowing the user equipment to send data;
alternatively, the first and second electrodes may be,
and performing the peripheral LBT interception on the target frequency domain resource under the condition that a receiver of the data transmitted at a third preset time before the target time does not comprise the user equipment and the repeated transmission is the first repeated transmission.
Optionally, the apparatus further comprises:
a first configuration receiving module, configured to receive first configuration information sent by the network device, where the first configuration information is used to indicate whether the ue needs to perform inner listen before talk LBT listening when an invalid time exists before the target time, where the invalid time is a time when the ue is not allowed to send data;
the internal interception module 1501 is specifically configured to:
and under the condition that the value of the first configuration information is a first preset value and invalid time exists before the target time, performing inner periphery Listen Before Talk (LBT) interception on the target frequency domain resource.
Optionally, the apparatus further comprises:
a second configuration receiving module, configured to receive second configuration information sent by the network device, where the second configuration information includes downlink transmission time and first indication information, and the first indication information is used to indicate the downlink transmission time to perform the peripheral LBT listening;
the peripheral interception module is specifically configured to:
and performing the peripheral LBT interception on the target frequency domain resource at the downlink transmission time.
As can be seen from the foregoing, in the embodiment of the present invention, inner LBT listening can be performed on a target frequency domain resource configured for a user equipment by a network device, where the inner LBT listening is performed within a first preset time in a target time, and the target time is an uplink transmission time configured in advance for a primary uplink repeated transmission of the user equipment. Under the condition that the inner LBT monitoring result indicates that the target frequency domain resource is in an idle state, the uplink repeated transmission is carried out through the target frequency domain resource; and giving up the uplink repeated transmission under the condition that the inner LBT interception result indicates that the target frequency domain resource is in a non-idle state.
Therefore, the embodiment of the invention can reserve the LBT interception window for the user equipment within one uplink repeated transmission time in advance, so that the repeated transmission can be carried out when the interception is successful.
Referring to fig. 19, an embodiment of the present invention further provides an uplink repeat transmission apparatus, where the apparatus includes:
a first configuration sending module 1601, configured to send first configuration information to a user equipment;
the first configuration information is used to indicate whether or not the ue needs to perform inner listen before talk LBT listening when there is an invalid time before a target time, where the invalid time is a time when the ue is not allowed to send data, the target time is an uplink transmission time configured in advance for one uplink repeat transmission of the ue, and the inner listen before talk LBT listening is performed in a first preset time in the target time.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, where the first preset time includes first N symbols in the uplink symbol, and N is a positive integer.
Optionally, the method further includes:
a second configuration sending module, configured to send second configuration information to the user equipment;
the second configuration information includes downlink transmission time and first indication information, where the first indication information is used to indicate that the downlink transmission time is used for performing peripheral LBT listening, and the peripheral LBT listening is performed on a second preset time before the target time.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, the second preset time includes N consecutive symbols before the uplink symbol, and N is a positive integer.
Optionally, the apparatus includes:
a first data receiving module, configured to receive a demodulation reference signal and third data sent by the user equipment;
a starting position determining module, configured to determine, according to a sending position of the demodulation reference signal in the target time, a starting position of time for carrying the third data in the target time;
and the first analysis module is used for analyzing the third data according to the initial position.
Optionally, the apparatus further comprises:
a second data receiving module, configured to receive fourth data sent by the user equipment;
and the second analysis module is used for analyzing the fourth data according to the starting position of the remaining time, wherein the remaining time comprises the time except the first preset time in the target time.
Optionally, the network device does not send data within a time when the user equipment performs peripheral LBT listening, where the peripheral LBT listening is performed on LBT listening at a second preset time before the target time.
As can be seen from the above, in the embodiment of the present invention, the network device may send the first configuration information to the UE to indicate whether the UE needs to perform the inner LBT listening if there is an invalid time before the target time. After receiving the first configuration information, the UE performs inner LBT (local binary transmission) monitoring on the target frequency domain resource under the conditions that the value of the first configuration information is a first preset value and invalid time exists before the target time, and performs the uplink repeated transmission if the inner LBT monitoring is successful; and if the inner LBT interception fails, giving up the repeated uplink transmission. Under the condition that the value of the first configuration information is the second preset value, the UE may perform only one time of peripheral LBT listening or the UE does not need to listen to directly perform uplink repeat transmission and ensures the continuity of transmission by the network device.
It should be noted that, in the embodiment of the present application, the division of the unit is schematic, and is only one logic function division, and when the actual implementation is realized, another division manner may be provided. In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented as a software functional unit and sold or used as a stand-alone product, may be stored in a processor readable storage medium. Based on such understanding, the technical solutions of the present application, which are essential or contributing to the prior art, or all or part of the technical solutions may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, an optical disk, or other various media capable of storing program codes.
It should be noted that, the apparatus provided in the embodiment of the present invention can implement all the method steps implemented by the method embodiment and achieve the same technical effect, and detailed descriptions of the same parts and beneficial effects as the method embodiment in this embodiment are omitted here.
As shown in fig. 20, an embodiment of the present invention also provides a user equipment, including a first memory 1720, a first transceiver 1710, a first processor 1700:
a first memory 1720 for storing a computer program;
a first transceiver 1710 for transceiving data under the control of the first processor 1700;
a first processor 1700 configured to read the computer program in the first memory 1720 and perform the following operations:
performing inner periphery Listen Before Talk (LBT) interception on a target frequency domain resource configured for the user equipment by a network device, wherein the inner periphery Listen Before Talk (LBT) interception is performed in a first preset time in a target time, and the target time is an uplink transmission time configured for one-time uplink repeated transmission of the user equipment in advance;
controlling the first transceiver 1710 to perform uplink repeated transmission through the target frequency domain resource when the inner periphery listen-before-talk (LBT) listening result indicates that the target frequency domain resource is in an idle state;
and giving up the uplink repeated transmission under the condition that the inner-periphery listen-before-talk (LBT) listening result indicates that the target frequency domain resource is in a non-idle state.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, where the first preset time includes first N symbols in the uplink symbol, and N is a positive integer.
Optionally, the first processor 1700 is further configured to:
performing peripheral LBT (local binary time-base) monitoring on the target frequency domain resource, wherein the peripheral LBT monitoring is LBT monitoring performed within second preset time before the target time;
when the result of the peripheral LBT interception indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission through the target frequency domain resource;
when performing inner listen before talk, LBT, listening on a PUSCH, the first processor 1700 is specifically configured to:
and under the condition that the result of the peripheral LBT interception indicates that the target frequency domain resource is in a non-idle state, carrying out inner listen-before-talk LBT interception on the target frequency domain resource.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, the second preset time includes N consecutive symbols before the uplink symbol, and N is a positive integer.
Optionally, the first processor 1700, when the result of inner-periphery listen-before-talk LBT listening indicates that the target frequency domain resource is in an idle state, performs the uplink repeat transmission through the target frequency domain resource, specifically configured to:
under the condition that the inner periphery listen-before-talk LBT monitoring result indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission in the residual time through the target frequency domain resource;
wherein the remaining time includes a time of the target time excluding the first preset time.
Optionally, when the result of the peripheral LBT listening indicates that the target frequency domain resource is in an idle state, and the target frequency domain resource is used for performing uplink retransmission of this time, the first processor 1700 is specifically configured to:
when the result of the peripheral LBT interception indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission at the target time or the residual time through the target frequency domain resource;
wherein the remaining time includes a time of the target time excluding the first preset time.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the user equipment, where the first preset time includes first N symbols in the uplink symbol, and N is a positive integer;
the first processor 1700, when the result of the peripheral LBT listening indicates that the target frequency domain resource is in an idle state and the uplink repeat transmission is performed in the remaining time, is further configured to:
sending at least one demodulation reference signal at the first preset time through the target frequency domain resource, wherein when at least two demodulation reference signals are sent at the first preset time, the time length of an interval between every two adjacent demodulation reference signals is less than a preset time length;
alternatively, the first and second liquid crystal display panels may be,
and transmitting first data in the first preset time through the target frequency domain resource, wherein the first data comprises at least part of data in the data subjected to the uplink repeated transmission in the remaining time.
Optionally, the first transceiver 1710 specifically is configured to, when performing the uplink repeat transmission in the remaining time by using the target frequency domain resource, perform:
acquiring second data which can be borne by the remaining time when a predetermined coding and rate matching method is adopted from the uplink data to be repeatedly transmitted, and discarding the data except the second data in the uplink data;
coding and rate matching are carried out on the second data by adopting the coding and rate matching method to obtain a first coded modulation symbol;
transmitting the first code modulation symbol over the remaining time through the target frequency domain resource; or
Coding and rate matching are carried out on the uplink data to be transmitted repeatedly, and a second coded modulation symbol is obtained;
acquiring a third coded modulation symbol which can be borne by the residual time from the second coded modulation time, and discarding coded modulation symbols except the third coded modulation symbol from the second coded modulation symbol;
and transmitting the third code modulation symbol in the residual time through the target frequency domain resource.
Optionally, when the uplink retransmission is retransmission of a physical uplink shared channel, the first transceiver 1710 specifically is configured to:
and performing the uplink repeated transmission through the target frequency domain resource according to an A-type physical uplink shared channel repeated transmission mechanism or a B-type physical uplink shared channel repeated transmission mechanism.
Optionally, the target time is configured by using a configuration grant scheduling transmission mechanism, or is configured by using a dynamic scheduling mechanism.
Optionally, when performing inner-bound listen-before-talk LBT listening on a target frequency domain resource configured by the network device for the user equipment, the first processor 1700 is specifically configured to:
under the condition that the repeated transmission is the first repeated transmission, performing inner-periphery listen-before-talk (LBT) interception on the target frequency domain resource;
alternatively, the first and second liquid crystal display panels may be,
performing inner-bound listen-before-talk (LBT) listening on the target frequency domain resource under the condition that invalid time exists before the target time, wherein the invalid time is time for not allowing the user equipment to transmit data;
alternatively, the first and second electrodes may be,
and under the condition that a receiver of the data transmitted at a third preset time before the target time does not comprise the user equipment and the repeated transmission is the first repeated transmission, performing inner-periphery listen-before-talk (LBT) interception on the target frequency domain resource.
Optionally, when performing peripheral LBT listening on the target frequency domain resource, the first processor 1700 is specifically configured to:
performing the peripheral LBT interception on the target frequency domain resource under the condition that the repeated transmission is the first repeated transmission;
alternatively, the first and second liquid crystal display panels may be,
performing the peripheral LBT listening on the target frequency domain resource under the condition that an invalid time exists before the target time, wherein the invalid time is the time for not allowing the user equipment to send data;
alternatively, the first and second electrodes may be,
and the receiving party of the data transmitted at a third preset time before the target time does not comprise the user equipment, and the peripheral LBT interception is carried out on the target frequency domain resource under the condition that the repeated transmission is the first repeated transmission.
Optionally, the first transceiver 1710 is further configured to:
receiving first configuration information sent by the network device, where the first configuration information is used to indicate whether the ue needs to perform the listen-before-talk (LBT) listening if there is an invalid time before the target time, where the invalid time is a time when the ue is not allowed to send data;
when performing inner-bound listen-before-talk, LBT, listening on a target frequency domain resource configured for the user equipment by the network equipment, the first processor 1700 is specifically configured to:
and under the condition that the value of the first configuration information is a first preset value and invalid time exists before the target time, performing inner-periphery listen-before-talk (LBT) listening on the target frequency domain resource.
Optionally, the first transceiver 1710 is further configured to:
receiving second configuration information sent by the network device, where the second configuration information includes downlink transmission time and first indication information, and the first indication information is used to indicate the downlink transmission time to perform the peripheral LBT listening;
when performing peripheral LBT listening on the target frequency domain resource, the first processor 1700 is specifically configured to:
and performing the peripheral LBT monitoring on the target frequency domain resource in the downlink transmission time.
In fig. 17, among other things, the bus architecture may include any number of interconnected buses and bridges, with one or more processors represented by the first processor 1710 and various circuits of the memory represented by the first memory 1720 linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The first transceiver 1710 may be a plurality of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium including transmission media such as wireless channels, wired channels, fiber optic cables, and the like. The user interface 1730 may also be an interface capable of interfacing with a desired device for different user devices, including but not limited to a keypad, display, speaker, microphone, joystick, etc.
The first processor 1700 is responsible for managing a bus architecture and general processing, and the first memory 1720 may store data used by the first processor 1700 in performing operations.
Optionally, the first processor 1700 may be a CPU (central processing unit), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array), or a CPLD (Complex Programmable Logic Device), and the processor may also adopt a multi-core architecture.
The first processor 1700 is configured to call the computer program stored in the first memory 1720 to execute any one of the methods provided by the embodiments according to the obtained executable instructions. The first processor 1700 and the first memory 1720 may also be physically separated.
As shown in fig. 21, an embodiment of the present invention further provides a network device, which includes a second memory 1820, a second transceiver 1810, a second processor 1800:
a second memory 1820 for storing computer programs;
a second transceiver 1810 for transceiving data under the control of the second processor 1800;
a second processor 1800 for reading the computer program in the second memory 1820 and performing the following operations:
controlling the second transceiver 1810 to transmit first configuration information to the user equipment;
the first configuration information is used to indicate whether or not the ue needs to perform inner listen before talk LBT listening when there is an invalid time before a target time, where the invalid time is a time when the ue is not allowed to send data, the target time is an uplink transmission time configured in advance for one uplink repeat transmission of the ue, and the inner listen before talk LBT listening is performed in a first preset time in the target time.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, where the first preset time includes first N symbols in the uplink symbol, and N is a positive integer.
Optionally, the second processor 1800 is further configured to:
control the second transceiver 1810 to transmit second configuration information to the user equipment;
the second configuration information includes downlink transmission time and first indication information, where the first indication information is used to indicate that the downlink transmission time is used to perform peripheral LBT listening, and the peripheral LBT listening is performed on a second preset time before the target time.
Optionally, the target time includes an uplink symbol configured in advance for one uplink repeat transmission of the ue, the second preset time includes N consecutive symbols before the uplink symbol, and N is a positive integer.
Optionally, the second transceiver 1810 is further configured to receive a demodulation reference signal and third data sent by the user equipment; the second processor 1800 is further configured to determine, according to the sending position of the demodulation reference signal in the target time, a starting position of a time for carrying the third data in the target time; and analyzing the third data according to the starting position.
Optionally, the second transceiver 1810 is further configured to receive fourth data sent by the user equipment; the second processor 1800 is further configured to parse the fourth data according to a starting position of a remaining time, where the remaining time includes a time of the target time except the first preset time.
Optionally, the network device does not send data within a time when the user equipment performs peripheral LBT listening, where the peripheral LBT listening is performed on LBT listening at a second preset time before the target time.
In fig. 18, among other things, the bus architecture may include any number of interconnected buses and bridges with various circuits including one or more processors, represented by the second processor 1800, and memory, represented by the second memory 1820, being linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The second transceiver 1810 may be a plurality of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium including wireless channels, wired channels, fiber optic cables, and the like. The second processor 1800 is responsible for managing the bus architecture and general processing, and the second memory 1820 may store data used by the second processor 1800 in performing operations.
The second processor 1800 may be a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), or a Complex Programmable Logic Device (CPLD), and the second processor 1800 may also have a multi-core architecture.
It should be noted that, the apparatus provided in the embodiment of the present invention can implement all the method steps implemented by the method embodiment and achieve the same technical effect, and detailed descriptions of the same parts and beneficial effects as the method embodiment in this embodiment are omitted here.
An embodiment of the present invention further provides a processor-readable storage medium, where the processor-readable storage medium stores a computer program, and the computer program is configured to enable the processor to execute the uplink repeat transmission method described above.
The processor-readable storage medium can be any available medium or data storage device that can be accessed by a processor, including, but not limited to, magnetic memory (e.g., floppy disks, hard disks, magnetic tape, magneto-optical disks (MOs), etc.), optical memory (e.g., CDs, DVDs, BDs, HVDs, etc.), and semiconductor memory (e.g., ROMs, EPROMs, EEPROMs, non-volatile memories (NAND FLASH), solid State Disks (SSDs)), etc.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer-executable instructions. These computer-executable instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These processor-executable instructions may also be stored in a processor-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the processor-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These processor-executable instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (40)

1. An uplink repeat transmission method applied to a User Equipment (UE), the method comprising:
performing inner periphery Listen Before Talk (LBT) monitoring on a target frequency domain resource configured for the user equipment by the network equipment, wherein the inner periphery Listen Before Talk (LBT) monitoring is LBT monitoring performed within first preset time in target time, and the target time is uplink transmission time configured for one-time uplink repeated transmission of the user equipment in advance;
under the condition that the inner periphery listen-before-talk LBT monitoring result indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission through the target frequency domain resource;
and giving up the uplink repeated transmission under the condition that the inner-periphery listen-before-talk (LBT) listening result indicates that the target frequency domain resource is in a non-idle state.
2. The method according to claim 1, wherein the target time comprises an uplink symbol configured in advance for one uplink repeat transmission of the ue, the first preset time comprises the first N symbols in the uplink symbol, and N is a positive integer.
3. The method of claim 1, wherein before performing inner-bound listen-before-talk (LBT) listening on a target frequency domain resource configured for the UE by a network device, the method further comprises:
performing peripheral LBT (local binary time-base) monitoring on the target frequency domain resource, wherein the peripheral LBT monitoring is LBT monitoring performed within second preset time before the target time;
when the result of the peripheral LBT interception indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission through the target frequency domain resource;
performing inner circumference Listen Before Talk (LBT) interception on the PUSCH comprises the following steps:
and under the condition that the result of the peripheral LBT interception indicates that the target frequency domain resource is in a non-idle state, carrying out inner listen-before-talk LBT interception on the target frequency domain resource.
4. The method according to claim 3, wherein the target time includes an uplink symbol configured in advance for one uplink retransmission of the ue, the second preset time includes N consecutive symbols before the uplink symbol, and N is a positive integer.
5. The uplink retransmission method according to claim 1 or 3, wherein, when the result of the inner-periphery listen-before-talk LBT listening indicates that the target frequency domain resource is in an idle state, performing the uplink retransmission through the target frequency domain resource includes:
performing the uplink repeated transmission at the rest time through the target frequency domain resource under the condition that the inner periphery listen-before-talk (LBT) listening result indicates that the target frequency domain resource is in an idle state;
wherein the remaining time includes a time of the target time excluding the first preset time.
6. The uplink retransmission method according to claim 3, wherein when the result of the peripheral LBT listening indicates that the target frequency domain resource is in an idle state, performing the current uplink retransmission through the target frequency domain resource includes:
when the result of the peripheral LBT interception indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission at the target time or the residual time through the target frequency domain resource;
wherein the remaining time includes a time of the target time excluding the first preset time.
7. The uplink retransmission method according to claim 6, wherein when the result of the peripheral LBT listening indicates that the target frequency domain resource is in an idle state and the current uplink retransmission is performed in the remaining time, the method further comprises:
sending at least one demodulation reference signal at the first preset time through the target frequency domain resource, wherein when at least two demodulation reference signals are sent at the first preset time, the time length of an interval between every two adjacent demodulation reference signals is less than a preset time length;
alternatively, the first and second electrodes may be,
and transmitting first data in the first preset time through the target frequency domain resource, wherein the first data comprises at least part of data in the data which is subjected to the uplink repeated transmission in the remaining time.
8. The uplink retransmission method according to claim 5, wherein performing the uplink retransmission at the remaining time via the target frequency domain resource includes:
acquiring second data which can be borne by the remaining time when a predetermined coding and rate matching method is adopted from the uplink data to be repeatedly transmitted, and discarding the data except the second data in the uplink data;
coding and rate matching are carried out on the second data by adopting the coding and rate matching method to obtain a first coded modulation symbol;
transmitting the first code modulation symbol over the remaining time through the target frequency domain resource;
or
Coding and rate matching are carried out on the uplink data to be transmitted repeatedly, and a second coded modulation symbol is obtained;
acquiring a third coded modulation symbol which can be borne by the residual time from the second coded modulation time, and discarding coded modulation symbols except the third coded modulation symbol from the second coded modulation symbol;
and transmitting the third code modulation symbol in the residual time through the target frequency domain resource.
9. The uplink repeat transmission method according to claim 1 or 3, wherein, when the uplink repeat transmission is repeat transmission of a physical uplink shared channel, the performing of the current uplink repeat transmission through the target frequency domain resource includes:
and performing the uplink repeated transmission according to the target frequency domain resource according to an A-type physical uplink shared channel repeated transmission mechanism or a B-type physical uplink shared channel repeated transmission mechanism.
10. The method according to claim 1, wherein the target time is configured by using a configuration grant scheduling transmission mechanism or a dynamic scheduling mechanism.
11. The method of claim 1, wherein performing inner-bound listen-before-talk (LBT) listening on a target frequency domain resource configured for the UE by a network device comprises:
performing inner-periphery listen-before-talk (LBT) monitoring on the target frequency domain resource under the condition that the repeated transmission is the first repeated transmission;
alternatively, the first and second electrodes may be,
performing inner-bound listen-before-talk (LBT) listening on the target frequency domain resource under the condition that invalid time exists before the target time, wherein the invalid time is time for not allowing the user equipment to transmit data;
alternatively, the first and second liquid crystal display panels may be,
and under the condition that a receiver of the data transmitted at a third preset time before the target time does not comprise the user equipment and the repeated transmission is the first repeated transmission, performing inner-periphery listen-before-talk (LBT) interception on the target frequency domain resource.
12. The uplink retransmission method according to claim 3, wherein the performing peripheral LBT listening on the target frequency domain resource comprises:
performing the peripheral LBT interception on the target frequency domain resource under the condition that the repeated transmission is the first repeated transmission;
alternatively, the first and second electrodes may be,
performing the peripheral LBT interception on the target frequency domain resource under the condition that invalid time exists before the target time, wherein the invalid time is time for not allowing the user equipment to send data;
alternatively, the first and second liquid crystal display panels may be,
and the receiving party of the data transmitted at a third preset time before the target time does not comprise the user equipment, and the peripheral LBT interception is carried out on the target frequency domain resource under the condition that the repeated transmission is the first repeated transmission.
13. The method of claim 1, wherein before performing inner-bound listen-before-talk (LBT) listening on a target frequency domain resource configured for the UE by a network device, the method further comprises:
receiving first configuration information sent by the network device, where the first configuration information is used to indicate whether the ue needs to perform the inner listen before talk LBT listening when there is an invalid time before the target time, where the invalid time is a time when the ue is not allowed to send data;
the performing inner-bound listen-before-talk LBT listening on the target frequency domain resource configured by the network device for the user equipment includes:
and under the condition that the value of the first configuration information is a first preset value and invalid time exists before the target time, performing inner-periphery listen-before-talk (LBT) listening on the target frequency domain resource.
14. The uplink retransmission method according to claim 3, wherein before performing the peripheral LBT listening on the target frequency domain resource, the method further comprises:
receiving second configuration information sent by the network device, where the second configuration information includes downlink transmission time and first indication information, and the first indication information is used to indicate the downlink transmission time to perform the peripheral LBT listening;
the performing peripheral LBT listening on the target frequency domain resource includes:
and performing the peripheral LBT interception on the target frequency domain resource at the downlink transmission time.
15. An uplink repeat transmission method applied to a network device, the method comprising:
sending first configuration information to user equipment;
the first configuration information is used to indicate whether the ue needs to perform inner-bound listen-before-talk LBT listening when an invalid time exists before a target time, where the invalid time is a time when the ue is not allowed to send data, the target time is an uplink transmission time configured for one-time uplink repeat transmission of the ue in advance, and the inner-bound listen-before-talk LBT listening is performed within a first preset time in the target time.
16. The method according to claim 15, wherein the target time comprises an uplink symbol configured in advance for one uplink repeat transmission of the ue, the first preset time comprises the first N symbols in the uplink symbol, and N is a positive integer.
17. The uplink repeat transmission method of claim 15, wherein the method further comprises:
sending second configuration information to the user equipment;
the second configuration information includes downlink transmission time and first indication information, where the first indication information is used to indicate that the downlink transmission time is used for performing peripheral LBT listening, and the peripheral LBT listening is performed on a second preset time before the target time.
18. The method of claim 17, wherein the target time comprises an uplink symbol configured in advance for one uplink retransmission of the ue, the second preset time comprises N consecutive symbols before the uplink symbol, and N is a positive integer.
19. The uplink repeat transmission method of claim 15, wherein the method further comprises:
receiving a demodulation reference signal and third data sent by the user equipment;
determining a starting position of time for bearing the third data in the target time according to the sending position of the demodulation reference signal in the target time;
and analyzing the third data according to the starting position.
20. The uplink repeat transmission method of claim 15, wherein the method further comprises:
receiving fourth data sent by the user equipment;
and analyzing the fourth data according to the starting position of the remaining time, wherein the remaining time comprises the time except the first preset time in the target time.
21. The method according to claim 15, wherein the network device does not send data during a time period when the ue performs a peripheral LBT listening, and the peripheral LBT listening is performed at a second preset time before the target time.
22. A user device comprising a first memory, a first transceiver, a first processor:
a first memory for storing a computer program; a first transceiver for transceiving data under control of the first processor; a first processor for reading the computer program in the first memory and performing the following operations:
performing inner periphery Listen Before Talk (LBT) interception on a target frequency domain resource configured for the user equipment by a network device, wherein the inner periphery Listen Before Talk (LBT) interception is performed in a first preset time in a target time, and the target time is an uplink transmission time configured for one-time uplink repeated transmission of the user equipment in advance;
controlling the first transceiver to perform the uplink repeated transmission through the target frequency domain resource under the condition that the inner-periphery listen-before-talk (LBT) listening result indicates that the target frequency domain resource is in an idle state;
and giving up the uplink repeated transmission under the condition that the inner-periphery listen-before-talk (LBT) listening result indicates that the target frequency domain resource is in a non-idle state.
23. The UE of claim 22, wherein the target time comprises an uplink symbol configured in advance for one uplink retransmission of the UE, wherein the first preset time comprises first N symbols in the uplink symbol, and N is a positive integer.
24. The user equipment of claim 22, wherein the first processor is further configured to:
performing peripheral LBT interception on the target frequency domain resource, wherein the peripheral LBT interception is performed in a second preset time before the target time;
when the result of the peripheral LBT interception indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission through the target frequency domain resource;
when performing inner-bound listen-before-talk, LBT, listening on a PUSCH, the first processor is specifically configured to:
and performing inner-periphery listen-before-talk (LBT) monitoring on the target frequency domain resource under the condition that the result of the peripheral LBT monitoring indicates that the target frequency domain resource is in a non-idle state.
25. The UE of claim 24, wherein the target time comprises an uplink symbol configured in advance for one uplink retransmission of the UE, wherein the second preset time comprises N consecutive symbols before the uplink symbol, and wherein N is a positive integer.
26. The ue according to claim 22 or 24, wherein the first processor, when the result of the inner-periphery listen-before-talk, LBT, listening indicates that the target frequency domain resource is in an idle state, and when performing the uplink repeat transmission through the target frequency domain resource, is specifically configured to:
performing the uplink repeated transmission at the rest time through the target frequency domain resource under the condition that the inner periphery listen-before-talk (LBT) listening result indicates that the target frequency domain resource is in an idle state;
wherein the remaining time includes a time of the target time excluding the first preset time.
27. The ue of claim 24, wherein the first processor, when the result of the peripheral LBT listening indicates that the target frequency domain resource is in an idle state and the target frequency domain resource is used for performing the uplink repeat transmission, is specifically configured to:
when the result of the peripheral LBT interception indicates that the target frequency domain resource is in an idle state, performing the uplink repeated transmission at the target time or the residual time through the target frequency domain resource;
wherein the remaining time includes a time of the target time excluding the first preset time.
28. The UE of claim 27, wherein the target time comprises an uplink symbol configured in advance for one uplink retransmission of the UE, and wherein the first preset time comprises the first N symbols in the uplink symbol, where N is a positive integer;
the first processor, when the result of the peripheral LBT listening indicates that the target frequency domain resource is in an idle state and the uplink repeat transmission is performed in the remaining time, is further configured to:
sending at least one demodulation reference signal at the first preset time through the target frequency domain resource, wherein when at least two demodulation reference signals are sent at the first preset time, the time length of an interval between every two adjacent demodulation reference signals is less than a preset time length;
alternatively, the first and second electrodes may be,
and transmitting first data in the first preset time through the target frequency domain resource, wherein the first data comprises at least part of data in the data subjected to the uplink repeated transmission in the remaining time.
29. The ue of claim 26, wherein the first transceiver, when performing the uplink repeat transmission in the remaining time through the target frequency domain resource, is specifically configured to:
acquiring second data which can be borne by the remaining time when a predetermined coding and rate matching method is adopted from the uplink data to be repeatedly transmitted, and discarding the data except the second data in the uplink data;
coding and rate matching are carried out on the second data by adopting the coding and rate matching method to obtain a first coded modulation symbol;
transmitting the first code modulation symbol over the remaining time through the target frequency domain resource;
or alternatively
Coding and rate matching are carried out on the uplink data to be transmitted repeatedly, and a second coded modulation symbol is obtained;
obtaining a third coded modulation symbol which can be carried by the residual time from the second coded modulation time, and discarding coded modulation symbols except the third coded modulation symbol in the second coded modulation symbol;
and transmitting the third code modulation symbol in the residual time through the target frequency domain resource.
30. The ue according to claim 22 or 24, wherein, when the uplink retransmission is a retransmission of a physical uplink shared channel, and the first transceiver performs the current uplink retransmission through the target frequency domain resource, specifically:
and performing the uplink repeated transmission according to the target frequency domain resource according to an A-type physical uplink shared channel repeated transmission mechanism or a B-type physical uplink shared channel repeated transmission mechanism.
31. The UE of claim 22, wherein the target time is configured by using a configuration grant scheduling transmission mechanism or a dynamic scheduling mechanism.
32. The ue of claim 22, wherein the first processor, when performing listen-before-talk, LBT, listening to a target frequency domain resource configured for the ue by a network device, is specifically configured to:
under the condition that the repeated transmission is the first repeated transmission, performing inner-periphery listen-before-talk (LBT) interception on the target frequency domain resource;
alternatively, the first and second electrodes may be,
performing inner-bound listen-before-talk (LBT) listening on the target frequency domain resource under the condition that invalid time exists before the target time, wherein the invalid time is time for not allowing the user equipment to transmit data;
alternatively, the first and second electrodes may be,
and under the condition that a receiver of the data transmitted at a third preset time before the target time does not comprise the user equipment and the repeated transmission is the first repeated transmission, performing inner-periphery listen-before-talk (LBT) interception on the target frequency domain resource.
33. The ue of claim 24, wherein the first processor, when performing peripheral LBT listening on the target frequency domain resource, is specifically configured to:
performing the peripheral LBT interception on the target frequency domain resource under the condition that the repeated transmission is the first repeated transmission;
alternatively, the first and second liquid crystal display panels may be,
performing the peripheral LBT interception on the target frequency domain resource under the condition that invalid time exists before the target time, wherein the invalid time is time for not allowing the user equipment to send data;
alternatively, the first and second electrodes may be,
and the receiving party of the data transmitted at a third preset time before the target time does not comprise the user equipment, and the peripheral LBT interception is carried out on the target frequency domain resource under the condition that the repeated transmission is the first repeated transmission.
34. The user equipment of claim 22, wherein the first transceiver is further configured to:
receiving first configuration information sent by the network device, where the first configuration information is used to indicate whether the ue needs to perform the listen-before-talk (LBT) listening if there is an invalid time before the target time, where the invalid time is a time when the ue is not allowed to send data;
when performing inner-bound listen-before-talk, LBT, listening on a target frequency domain resource configured for the user equipment by the network equipment, the first processor is specifically configured to:
and under the condition that the value of the first configuration information is a first preset value and invalid time exists before the target time, performing inner-periphery listen-before-talk (LBT) listening on the target frequency domain resource.
35. The user equipment of claim 24, wherein the first transceiver is further configured to:
receiving second configuration information sent by the network device, where the second configuration information includes downlink transmission time and first indication information, and the first indication information is used to indicate the downlink transmission time to perform the peripheral LBT listening;
when performing peripheral LBT listening on the target frequency domain resource, the first processor is specifically configured to:
and performing the peripheral LBT interception on the target frequency domain resource at the downlink transmission time.
36. A network device comprising a second memory, a second transceiver, a second processor:
a second memory for storing a computer program; a second transceiver for transceiving data under the control of the second processor; a second processor for reading the computer program in the second memory and performing the following operations:
controlling the second transceiver to transmit first configuration information to user equipment;
the first configuration information is used to indicate whether or not the ue needs to perform inner listen before talk LBT listening when there is an invalid time before a target time, where the invalid time is a time when the ue is not allowed to send data, the target time is an uplink transmission time configured in advance for one uplink repeat transmission of the ue, and the inner listen before talk LBT listening is performed in a first preset time in the target time.
37. The network device of claim 36, wherein the second processor is further configured to:
controlling the second transceiver to transmit second configuration information to the user equipment;
the second configuration information includes downlink transmission time and first indication information, where the first indication information is used to indicate that the downlink transmission time is used for performing peripheral LBT listening, and the peripheral LBT listening is performed on a second preset time before the target time.
38. An uplink retransmission apparatus, applied to a user equipment, the apparatus comprising:
an inner periphery interception module, configured to perform inner periphery listen-before-talk LBT interception on a target frequency domain resource configured by a network device for the user equipment, where the inner periphery listen-before-talk LBT interception is to perform LBT interception within a first preset time in a target time, and the target time is uplink transmission time configured in advance for primary uplink repeated transmission of the user equipment;
a first processing module, configured to perform the uplink retransmission through the target frequency domain resource when the result of the inner-periphery listen-before-talk LBT listening indicates that the target frequency domain resource is in an idle state;
and the second processing module is used for giving up the uplink repeated transmission under the condition that the inner-periphery listen-before-talk (LBT) listening result indicates that the target frequency domain resource is in a non-idle state.
39. An uplink repeat transmission apparatus applied to a network device, the apparatus comprising:
a first configuration sending module, configured to send first configuration information to a user equipment;
the first configuration information is used to indicate whether the ue needs to perform inner-bound listen-before-talk LBT listening when an invalid time exists before a target time, where the invalid time is a time when the ue is not allowed to send data, the target time is an uplink transmission time configured for one-time uplink repeat transmission of the ue in advance, and the inner-bound listen-before-talk LBT listening is performed within a first preset time in the target time.
40. A processor-readable storage medium, characterized in that the processor-readable storage medium stores a computer program for causing the processor to execute the upstream repetition transmission method of any one of claims 1 to 14 or the upstream repetition transmission method of any one of claims 15 to 21.
CN202110363919.7A 2021-04-02 2021-04-02 Uplink repeat transmission method, device, equipment and storage medium Pending CN115190643A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110363919.7A CN115190643A (en) 2021-04-02 2021-04-02 Uplink repeat transmission method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110363919.7A CN115190643A (en) 2021-04-02 2021-04-02 Uplink repeat transmission method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115190643A true CN115190643A (en) 2022-10-14

Family

ID=83511493

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110363919.7A Pending CN115190643A (en) 2021-04-02 2021-04-02 Uplink repeat transmission method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115190643A (en)

Similar Documents

Publication Publication Date Title
JP7227679B2 (en) Time division duplex wireless communication system
WO2018196550A1 (en) Method and apparatus for transmitting feedback information
US11296855B2 (en) Communication method, terminal device, and network device
US10952207B2 (en) Method for transmitting data, terminal device and network device
CN114826512B (en) DMRS binding window determining method, device and storage medium
US20220174670A1 (en) Resource Multiplexing Method and Apparatus
US11064502B2 (en) Method for sending information, method for receiving information, network device, and terminal device
WO2019014923A1 (en) Data transmission method, terminal device and network device
WO2019184884A1 (en) Communication method and device, apparatus, and storage medium
US20240072974A1 (en) Resource indication method and apparatus, and storage medium
EP4280516A1 (en) Signal transmission method, apparatus, terminal device, network device, and storage medium
US11856539B2 (en) Method and device for transmitting downlink control information
WO2022142891A1 (en) Uplink scheduling method and apparatus, and storage medium
CN115190643A (en) Uplink repeat transmission method, device, equipment and storage medium
CN114070513A (en) Transmission method, device and storage medium of downlink channel
EP4322659A1 (en) Reference signal transmission position indication determining method and apparatus
CN114124315B (en) Information feedback method, information receiving method, terminal and network equipment
WO2022237498A1 (en) Method and apparatus for determining repeated transmission, terminal, and network side device
US11510183B2 (en) Scheduling a data channel corresponding to a control channel
RU2782248C1 (en) Method for feedback information transmission, terminal device and network device
JP6490867B1 (en) Downlink subframe shortening in time division duplex (TDD) systems
WO2022188649A1 (en) Communication method and apparatus
JP2017143537A (en) Downlink subframe compaction in time division duplex (tdd) system
KR20160134497A (en) Operation method of communication node in network supporting licensed and unlicensed band
CN115190598A (en) Signal transmission method, user equipment and network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination