CN115603873A - Method and arrangement in a communication node used for wireless communication - Google Patents

Method and arrangement in a communication node used for wireless communication Download PDF

Info

Publication number
CN115603873A
CN115603873A CN202110766077.XA CN202110766077A CN115603873A CN 115603873 A CN115603873 A CN 115603873A CN 202110766077 A CN202110766077 A CN 202110766077A CN 115603873 A CN115603873 A CN 115603873A
Authority
CN
China
Prior art keywords
signaling
pdcch
pci
node
cell
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110766077.XA
Other languages
Chinese (zh)
Inventor
于巧玲
张晓博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Langbo Communication Technology Co Ltd
Original Assignee
Shanghai Langbo Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Langbo Communication Technology Co Ltd filed Critical Shanghai Langbo Communication Technology Co Ltd
Priority to CN202110766077.XA priority Critical patent/CN115603873A/en
Priority to PCT/CN2022/104045 priority patent/WO2023280192A1/en
Publication of CN115603873A publication Critical patent/CN115603873A/en
Priority to US18/404,909 priority patent/US20240147493A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0091Signaling for the administration of the divided path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method and arrangement in a communication node for wireless communication is disclosed. A communication node receives a first signaling, wherein the first signaling indicates a target identifier; monitoring a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; receiving second signaling, the second signaling being used to indicate a second PCI; in response to receiving a second signaling for the behavior, monitor a second PDCCH associated with a second downlink RS resource associated with the second PCI and forgo monitoring the first PDCCH; the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled by using a source identifier; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.

Description

Method and arrangement in a communication node used for wireless communication
Technical Field
The present application relates to a transmission method and apparatus in a wireless communication system, and more particularly, to a transmission method and apparatus for mobility.
Background
Conventional Network Controlled (Network Controlled) mobility includes cell level mobility and beam level mobility, wherein the cell level mobility depends on RRC (Radio Resource Control) signaling, and the beam level mobility does not involve RRC signaling. Prior to the 3GPP (third Generation Partnership Project) R16, beam-level mobility was only for Beam Management (Beam Management) and the like within a single cell of a cell. The 3GPPRAN #80 meetings decide to develop a Work item (Work Iterm, WI) of 'future enhancements on MIMO for NR', support multi-beam (multi-beam) operation (operation), and enhance inter-cell mobility (L1/L2-centralized inter-cell mobility) with Layer one (Layer 1, L1)/Layer two (Layer 2, L2) as the center.
Disclosure of Invention
The mobility between cells with L1/L2 as the center can be realized in a manner similar to mTRP (multiple Transmit/Receive Point), parameters related to the mobility between cells with L1/L2 as the center are configured through RRC messages, a UE (User Equipment) determines to use a TRP of another cell for data transmission by receiving a downlink command in a coverage area of a current Serving cell (Serving cell), and the another cell and the current Serving cell have different PCIs. When the UE uses the TRP of another cell for data transmission, the operation of the serving cell is affected and needs to be enhanced.
In view of the above, the present application provides a solution. In the above description of the problem, the uu port scenario is taken as an example; the present application is also applicable to, for example, a sidelink (sidelink) scenario, and achieves technical effects similar to those in a uu interface scenario. In addition, the adoption of a unified solution for different scenarios also helps to reduce hardware complexity and cost.
As an example, the interpretation of the term (Terminology) in the present application refers to the definitions of the specification protocol TS36 series of 3 GPP.
As an embodiment, the interpretation of the terms in the present application refers to the definitions of the 3GPP specification protocol TS38 series.
As an embodiment, the interpretation of the terms in the present application refers to the definitions of the 3GPP specification protocol TS37 series.
As an example, the terms in the present application are explained with reference to the definition of the specification protocol of IEEE (Institute of Electrical and Electronics Engineers).
It should be noted that, in the case of no conflict, the embodiments and features in the embodiments in any node of the present application may be applied to any other node. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.
The application discloses a method in a first node used for wireless communication, characterized by comprising:
receiving a first signaling, wherein the first signaling indicates a target identifier;
monitoring a first PDCCH (Physical downlink control channel) associated to a first downlink RS (Reference signal) resource associated to a first PCI (Physical Cell Identifier);
receiving second signaling, the second signaling being used to indicate a second PCI;
in response to receiving a second signaling in response to the behavior, monitor a second PDCCH associated with a second downlink RS resource associated with the second PCI and forgo monitoring the first PDCCH;
wherein the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source Identifier and the target Identifier are respectively an RNTI (Radio Network Temporary Identifier).
As an embodiment, the problem to be solved by the present application includes: how to achieve inter-cell mobility centered on L1/L2.
As an embodiment, the L1/L2 centric inter-cell mobility includes: the first node uses radio resources of another cell within a serving cell, the another cell and the serving cell having different PCIs.
As an embodiment, the first node is in a serving cell, and the serving cell remains unchanged while using radio resources of another cell.
As an embodiment, when the first node uses radio resources of another cell in one serving cell, the first node continues to monitor a BCCH (Broadcast Control Channel) of the serving cell.
As an embodiment, when the first node uses the radio resource of another cell in one serving cell, it continues to monitor the system message of the serving cell.
As an embodiment, the L1/L2 centric inter-cell mobility includes: the first node performs PUSCH (Physical uplink shared channel)/PDSCH (Physical downlink shared channel) transmission through another TRP in a serving cell, where the another TRP does not belong to the serving cell.
As an embodiment, the L1/L2 centric inter-cell mobility includes: and the first node triggers cell switching according to the L1/L2 measurement.
As an embodiment, the L1/L2 centric inter-cell mobility includes: no switching based on L3 (Layer 3, layer three) is performed.
As an embodiment, when the first node triggers cell handover according to L1/L2 measurement, the serving cell changes.
As an embodiment, the problem to be solved by the present application includes: how to guarantee service continuity.
As an embodiment, the problem to be solved by the present application includes: how to implement HARQ operation for inter-cell mobility centered on L1/L2.
As an example, the benefits of the above method include: inter-cell mobility centered on L1/L2 is performed without resetting the MAC.
As an example, the benefits of the above method include: service continuity is improved.
As an example, the benefits of the above method include: and multiplexing the HARQ process.
As an example, the benefits of the above method include: avoiding triggering unnecessary beam failures.
As an example, the benefits of the above method include: HARQ combination of data on cells identified by different PCIs is avoided, and data processing complexity is reduced.
As an example, the benefits of the above method include: l3 handover is avoided.
According to one aspect of the application, the method is characterized by comprising the following steps:
in response to the act of receiving second signaling, treating the first secondary cell as a deactivated state;
wherein the first secondary cell and the cell identified by the first PCI belong to the same cell group.
As an embodiment, the characteristics of the above method include: when an SpCell (Special Cell) performs inter-Cell mobility centered around L1/L2, an SCell in a corresponding Cell group is considered as a deactivated state.
According to an aspect of the present application, wherein the first secondary cell and the cell identified by the second PCI belong to different TAGs (Timing Advance Group).
As an embodiment, the characteristics of the above method include: the state of the SCell belonging to the same TAG as the SpCell remains unchanged.
As an embodiment, the characteristics of the above method include: and deactivating an SCell belonging to a different TAG from the SpCell.
According to one aspect of the application, the method is characterized by comprising the following steps:
and setting C-RNTI (Cell RNTI, cell radio network temporary identifier) as the target identifier as a response of the behavior receiving the second signaling.
As an embodiment, the characteristics of the above method include: and the UE side only maintains one C-RNTI at the same time, and the value of the C-RNTI is related to the currently used physical resource.
As an embodiment, the characteristics of the above method include: and when the SpCell executes the inter-cell mobility with L1/L2 as the center, setting the C-RNTI as the target identification.
According to one aspect of the application, the method is characterized by comprising the following steps:
receiving a first uplink grant and a second uplink grant, wherein the first uplink grant is associated with the source identifier, and the second uplink grant is associated with the target identifier;
in response to receiving the first and second uplink grants as the behavior, considering that the first NDI (New Data Indicator) has been flipped;
wherein the first uplink grant and the second uplink grant are associated to a same HARQ (Hybrid automatic repeat request) process; and the receiving time of the first uplink grant is earlier than the receiving time of the second uplink grant.
According to one aspect of the application, the method is characterized by comprising the following steps:
receiving a first uplink grant and a second uplink grant, wherein the first uplink grant is associated with the source identifier, and the second uplink grant is associated with the target identifier; receiving, as a response to the behavior, a first uplink grant and a second uplink grant, considering that the first NDI is not flipped;
wherein the first uplink grant and the second uplink grant are associated to the same HARQ process; and the receiving time of the first uplink grant is earlier than the receiving time of the second uplink grant.
As an embodiment, the characteristics of the above method include: aiming at the same HARQ process, when a UL grant associated to the C-RNTI is received, if the previous UL grant is associated to the target identifier, the first NDI is considered to be overturned; wherein the target identity is a C-RNTI of the first node in a cell identified by the second PCI.
According to one aspect of the application, the method is characterized by comprising the following steps:
clearing the first counter in response to the behavior receiving the second signaling; the first counter is maintained at a MAC (Medium Access Control) layer.
As an embodiment, the characteristics of the above method include: the first COUNTER is BFI _ COUNTER.
As an embodiment, the characteristics of the above method include: the first COUNTER is LBT _ COUNTER.
As an embodiment, the characteristics of the above method include: the first counter is for a cell identified by the first PCI or the first counter is for a cell identified by the second PCI.
As an embodiment, the characteristics of the above method include: and when the SpCell executes the mobility between the cells with the L1/L2 as the center, clearing the first counter.
According to one aspect of the application, the method is characterized by comprising the following steps:
receiving a first type of reference signal, the first type of reference signal being associated to the second PCI, a measurement for the first type of reference signal being used to determine to update the first counter;
when the first counter reaches a first value, initiating a first random access process; sending a first wireless signal in response to the behavior initiating a first random access procedure, the first wireless signal associated with the first PCI;
wherein the first numerical value is a positive integer; the first type of reference signal is independent of the first PCI.
As an embodiment, the characteristics of the above method include: when the SpCell performs inter-cell mobility centered at L1/L2, beam failure recovery is performed on the cell identified by the first PCI if a beam failure occurs on the cell identified by the second PCI.
As an embodiment, the characteristics of the above method include: random access resources used for BFR are configured on the cell of the first PCI identification, and random access resources used for BFR are not configured on the cell of the second PCI identification.
According to one aspect of the application, the method is characterized by comprising the following steps:
transmitting a second wireless signal, the second wireless signal including the source identification;
wherein the second wireless signal belongs to the first random access procedure; the second wireless signal is transmitted after the first wireless signal.
The application discloses a method in a second node used for wireless communication, characterized by comprising:
sending a first signaling, wherein the first signaling indicates a target identifier;
transmitting a first PDCCH associated to a first downlink RS resource associated to a first PCI;
sending second signaling, the second signaling being used to indicate a second PCI;
wherein, in response to the second signaling being received, a second PDCCH is monitored and the first PDCCH is relinquished to be monitored, the second PDCCH being associated to a second downlink RS resource, the second downlink RS resource being associated to the second PCI; the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
According to an aspect of the application, characterized in that as a response to the second signaling being received, the first secondary cell is considered to be deactivated; wherein the first secondary cell and the cell identified by the first PCI belong to the same cell group.
According to an aspect of the application, wherein the first secondary cell and the cell identified by the second PCI belong to different TAGs.
According to an aspect of the application, C-RNTI is set to the target identity as a response to the second signaling being received.
According to one aspect of the application, the method is characterized by comprising the following steps:
sending a first uplink grant, the first uplink grant being associated with the source identifier;
wherein the first NDI is considered to have been flipped in response to the first and second uplink grants being received; the second uplink grant is associated with the target identifier; the first uplink grant and the second uplink grant are associated to the same HARQ process; and the receiving time of the first uplink grant is earlier than the receiving time of the second uplink grant.
According to one aspect of the application, the method is characterized by comprising the following steps:
sending a first uplink grant, the first uplink grant being associated with the source identifier;
wherein the first NDI is considered not to be flipped in response to the first and second uplink grants being received; the second uplink grant is associated with the target identifier; the first uplink grant and the second uplink grant are associated to the same HARQ process; and the receiving time of the first uplink grant is earlier than the receiving time of the second uplink grant.
According to one aspect of the application, characterized in that as a response to the second signaling being received, the first counter is cleared; the first counter is maintained at the MAC layer.
According to one aspect of the application, the method is characterized by comprising the following steps:
receiving a first wireless signal, the first wireless signal associated with the first PCI;
wherein a first type of reference signal is received, the first type of reference signal being associated to the second PCI, a measurement for the first type of reference signal being used to determine to update the first counter; when the first counter reaches a first value, a first random access procedure is initiated; in response to the first random access procedure being initiated, the first wireless signal is transmitted; the first numerical value is a positive integer; the first type of reference signal is independent of the first PCI.
According to one aspect of the application, the method is characterized by comprising the following steps:
receiving a second wireless signal, the second wireless signal including the source identification;
wherein the second wireless signal belongs to the first random access procedure; the second wireless signal is transmitted after the first wireless signal.
The application discloses a first node used for wireless communication, characterized by comprising:
a first receiver for receiving a first signaling, wherein the first signaling indicates a target identifier; monitoring a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; receiving second signaling, the second signaling being used to indicate a second PCI; in response to receiving a second signaling in response to the behavior, monitor a second PDCCH associated with a second downlink RS resource associated with the second PCI and forgo monitoring the first PDCCH;
wherein the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; the second PDCCH is scrambled using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
The present application discloses a second node for wireless communication, comprising:
a second transmitter for transmitting a first signaling, the first signaling indicating a target identifier; transmitting a first PDCCH associated to a first downlink RS resource associated to a first PCI; sending second signaling, wherein the second signaling is used for indicating a second PCI;
wherein, in response to the second signaling being received, a second PDCCH is monitored and the first PDCCH is relinquished to be monitored, the second PDCCH being associated to a second downlink RS resource, the second downlink RS resource being associated to the second PCI; the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
As an example, compared with the conventional scheme, the method has the following advantages:
-avoiding L3 handover;
improving service continuity;
multiplexing HARQ processes;
avoid failure to trigger unnecessary beams;
no MAC reset when inter-cell mobility centered at L1/L2 is performed;
avoid HARQ combining of data on cells identified by different PCIs, reducing data processing complexity.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof with reference to the accompanying drawings in which:
fig. 1 shows a flow diagram of transmission of a first signaling, a second signaling, a first PDCCH, and a second PDCCH according to one embodiment of the application;
FIG. 2 shows a schematic diagram of a network architecture according to an embodiment of the present application;
figure 3 shows a schematic diagram of an embodiment of a radio protocol architecture for the user plane and the control plane according to an embodiment of the present application;
fig. 4 shows a schematic diagram of a first communication device and a second communication device according to an embodiment of the application;
FIG. 5 shows a wireless signal transmission flow diagram according to an embodiment of the present application;
FIG. 6 shows a wireless signal transmission flow diagram according to another embodiment of the present application;
FIG. 7 illustrates a wireless signal transmission flow diagram according to yet another embodiment of the present application;
FIG. 8 illustrates a wireless signal transmission flow diagram according to yet another embodiment of the present application;
figure 9 shows a schematic diagram of a first secondary cell and a cell identified by a second PCI belonging to different TAGs according to an embodiment of the present application;
FIG. 10 shows a schematic diagram of a relationship between a second node and a fourth node according to an embodiment of the application;
FIG. 11 shows a block diagram of a processing device for use in a first node according to an embodiment of the present application;
FIG. 12 shows a block diagram of a processing device for use in a second node according to an embodiment of the application;
fig. 13 illustrates a wireless signal transmission flow diagram where receiving a first uplink grant and a second uplink grant is used to determine that a first NDI is considered not to be flipped according to one embodiment of the present application.
Detailed Description
The technical solutions of the present application will be further described in detail with reference to the accompanying drawings, and it should be noted that the embodiments and features of the embodiments in the present application can be arbitrarily combined with each other without conflict.
Example 1
Embodiment 1 illustrates a flowchart of transmission of first signaling, second signaling, first PDCCH, and second PDCCH according to an embodiment of the present application, as shown in fig. 1. In fig. 1, each block represents a step, and it is particularly emphasized that the sequence of the blocks in the figure does not represent a chronological relationship between the represented steps.
In embodiment 1, a first node in the present application receives a first signaling in step 101, where the first signaling indicates a target identifier; monitoring a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; receiving second signaling, the second signaling being used to indicate a second PCI; in response to receiving a second signaling for the behavior, monitor a second PDCCH associated with a second downlink RS resource associated with the second PCI and forgo monitoring the first PDCCH; wherein the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; the second PDCCH is scrambled using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
As one embodiment, the phrase the first signaling comprises an RRC message comprising: the first signaling includes at least one RRC (Radio Resource Control) Message (Message).
As one embodiment, the phrase the first signaling comprises an RRC message comprising: the first signaling comprises at least one IE (Information Element) in an RRC message.
For one embodiment, the phrase the first signaling comprises an RRC message comprising: the first signaling includes at least one Field (Field) in an RRC message.
As an embodiment, the first signaling includes an rrcreeconfiguration message or an RRCConnectionReconfiguration message.
As an embodiment, the first signaling is transmitted over an air interface.
As an embodiment, the first signaling is a higher layer message.
As an embodiment, the Signaling Radio Bearer (SRB) of the first signaling includes SRB1.
As an embodiment, the signaling radio bearer of the first signaling comprises SRB3.
As an embodiment, the first signaling is a command to modify an RRC connection.
As an embodiment, the first signaling comprises an RRCSetup message or an RRCConnectionSetup message.
For one embodiment, the first signaling comprises an RRCReestablishment message or an rrcconnectionreestipplication message.
For one embodiment, the first signaling comprises a rrcreesume message or a rrcconnectionresponse message.
As an embodiment, the phrase the first signaling indication target identity comprises: the first signaling is used to determine the target identity.
As an embodiment, the phrase the first signaling indication target identity comprises: and setting the target identification according to the first signaling.
As an embodiment, the phrase the first signaling indication target identity comprises: the first signaling comprises the target identification.
As an embodiment, the phrase the first signaling indication target identity comprises: one field in the first signaling indicates the target identity.
As an example, the listening means includes monitoring.
As an embodiment, the meaning of listening comprises searching (search).
As one embodiment, the meaning of snooping includes monitor.
As an embodiment, the listening means passing CRC (Cyclic Redundancy Check) Check.
As an embodiment, the behavior monitoring one PDCCH includes: and determining whether a DCI (Downlink Control Information) exists or not through energy detection in a search space corresponding to the first PDCCH.
As an embodiment, the behavior monitoring one PDCCH includes: and determining whether one DCI exists through coherent detection in a search space corresponding to the one PDCCH, wherein the one PDCCH is the first PDCCH or the second PDCCH.
As an embodiment, the behavior monitoring one PDCCH includes: and determining whether one piece of DCI exists through broadband detection in a search space corresponding to the one PDCCH, wherein the one PDCCH is the first PDCCH or the second PDCCH.
As an embodiment, the behavior monitoring one PDCCH includes: and determining whether one piece of DCI exists through correlation detection on a search space corresponding to the one PDCCH, wherein the one PDCCH is the first PDCCH or the second PDCCH.
As an embodiment, the behavior monitoring one PDCCH includes: and determining whether one piece of DCI exists through synchronous detection in a search space corresponding to the one PDCCH, wherein the one PDCCH is the first PDCCH or the second PDCCH.
As an embodiment, the behavior monitoring one PDCCH includes: and determining whether a piece of DCI exists through waveform detection in a search space corresponding to the PDCCH, wherein the PDCCH is the first PDCCH or the second PDCCH.
As an embodiment, the behavior monitoring one PDCCH includes: determining whether one DCI exists through maximum likelihood detection in a search space corresponding to the one PDCCH, wherein the one PDCCH is the first PDCCH or the second PDCCH.
As an embodiment, the behavior monitoring the first PDCCH includes: monitoring PDCCH candidates of DCI with CRC scrambled by the source identification.
As an embodiment, the behavior monitoring the second PDCCH includes: monitoring PDCCH candidates of DCI of which CRC is scrambled by the target identification.
As an embodiment, the behavior monitors that a first PDCCH is used to determine a DCI with a CRC scrambled by the source identity.
As an embodiment, the behavior monitors that a second PDCCH is used to determine a DCI with a CRC scrambled by the target identity.
As one embodiment, the first PDCCH carries at least one DCI.
As one embodiment, the first PDCCH includes one DCI.
As an embodiment, the first PDCCH includes one PDCCH candidate (candidate).
As an embodiment, a CRC of the DCI on the first PDCCH is scrambled by the source identity.
As one embodiment, the first PDCCH includes PDCCH candidates (candidates) for DCIs with CRCs scrambled by the source identity.
As an embodiment, the first PDCCH comprises a PDCCH transmission scrambled by the source identity.
As an embodiment, the first PDCCH comprises one PDCCH transmission scrambled by the source identity, the PDCCH transmission comprising one DCI.
As an embodiment, the first PDCCH includes one PDCCH search space (PDCCH search space).
As an embodiment, the first PDCCH includes one PDCCH search space set (set).
As one embodiment, the first PDCCH includes at least one PDCCH candidate.
As an embodiment, the first PDCCH includes a Common Search Space (CSS) set.
As one embodiment, the first PDCCH includes a set of USSs (UE-specific search space).
As an embodiment, the first PDCCH is a USS set.
As an embodiment, the first PDCCH is a Type3-PDCCH CSS set.
As an embodiment, the first PDCCH is a Type3A-PDCCH CSS set.
As an embodiment, the first PDCCH is a Type4-PDCCH CSS set.
As an embodiment, the first PDCCH does not include a Type0-PDCCH CSS set.
As an embodiment, the first PDCCH does not include a Type0A-PDCCH CSS set.
As an embodiment, the first PDCCH does not include a Type1-PDCCH CSS set.
As an embodiment, the first PDCCH does not include a Type2-PDCCH CSS set.
As an embodiment, the first PDCCH is associated with one search space (search space), the one search space is associated with one core set, and the one core set is associated with the first downlink RS resource.
As an embodiment, the phrase that the first PDCCH is associated to a first downlink RS resource comprises: the first PDCCH comprises a PDCCH dedicated to the first node.
As one embodiment, the phrase that the first PDCCH is associated to a first downlink RS resource includes: the first PDCCH is associated with a time/frequency control resource set (CORESET), and the CORESET includes the first downlink RS resource.
As one embodiment, the phrase that the first PDCCH is associated to a first downlink RS resource includes: the first PDCCH is associated with a search space (search space), the search space corresponds to a CORESET, and the CORESET comprises the first downlink RS resource.
As an embodiment, the first downlink RS resource is used to determine CORESET for searching downlink control information.
As an embodiment, the first downlink RS resource corresponds to a CORESET identifier.
As an embodiment, the first downlink RS resource corresponds to a search space identifier.
As an embodiment, the first downlink RS resource is associated to a CORESET.
As an embodiment, the first downlink RS resource corresponds to a TCI (Transmission Configuration Indication) status (State) identifier.
For one embodiment, the first downlink RS resource is associated with a TCI state.
As one embodiment, the first downlink RS resource includes at least one Reference Signal (Reference Signal).
As one embodiment, the first downlink RS resource includes at least one CSI-RS (Channel State Information Reference Signal).
As one embodiment, the first downlink RS resource includes at least one SSB (Synchronization Signal Block).
As an embodiment, the first downlink RS resource includes a CSI-RS indexed by NZP-CSI-RS-resource id.
For one embodiment, the first downlink RS resource includes an SSB indexed by an SSB-Index.
As one embodiment, the phrase that the first downstream RS resource is associated to a first PCI includes: the first downlink RS resource is used to determine CORESET for searching downlink control information in the cell identified by the first PCI.
As one embodiment, the phrase that the first downstream RS resource is associated to a first PCI includes: the first downlink RS resource is configured for the cell identified by the first PCI.
As one embodiment, the phrase that the first downlink RS resource is associated to a first PCI includes: the first downlink RS resource is dedicated to the cell identified by the first PCI.
As one embodiment, the phrase that the first downstream RS resource is associated to a first PCI includes: any reference signal included in the first downlink RS resource is transmitted through one TRP in the cell identified by the first PCI.
As one embodiment, the phrase that the first downlink RS resource is associated to a first PCI includes: any reference signal included in the first downlink RS resource corresponds to one beam (beam) of one TRP in the cell identified by the first PCI.
As an embodiment, the phrase said second signaling comprises signaling below the RRC layer including: the second signaling is a MAC layer signaling.
As an embodiment, the phrase said second signaling comprises signaling below the RRC layer including: the second signaling is a physical layer signaling.
As an embodiment, the phrase said second signaling comprises signaling below the RRC layer including: the second signaling is generated at a MAC layer.
As an embodiment, the phrase said second signaling comprises signaling below the RRC layer including: the second signaling is generated at a physical layer.
As an embodiment, the phrase said second signaling comprises signaling below the RRC layer including: the second signaling is not one of a CCCH SDU or a DCCH SDU or a DTCH SDU or a BCCH SDU or a PCCH SDU.
As an embodiment, the second signaling is used to determine to perform L1/L2 centric inter-cell mobility.
As an embodiment, the second signaling is used to determine to use radio resources of the cell identified by the second PCI.
As an embodiment, the second signaling includes a MAC PDU (Protocol Data Unit).
As an embodiment, the second signaling includes a MAC SDU (Service Data Unit).
As an embodiment, the second signaling includes a MAC CE (Control Element).
As an embodiment, the second signaling includes a MAC Subheader (Subheader).
As an embodiment, the second signaling comprises a MAC field.
As an embodiment, the second signaling includes one PDCCH.
As an embodiment, the second signaling includes one DCI.
As one embodiment, the phrase the second signaling is used to indicate that the second PCI comprises: the second signaling explicitly indicates the second PCI.
As one embodiment, the phrase the second signaling is used to indicate that the second PCI comprises: the second signaling implicitly indicates the second PCI.
As one embodiment, the phrase the second signaling is used to indicate that the second PCI comprises: the second signaling is associated to the second PCI.
As one embodiment, the phrase the second signaling is used to indicate that the second PCI comprises: the second signaling is used to determine to use radio resources of the cell identified by the second PCI.
As one embodiment, the phrase the second signaling is used to indicate that the second PCI comprises: the second signaling is used to determine to monitor a PDCCH for the cell identified by the second PCI.
As one embodiment, the phrase the second signaling is used to indicate that the second PCI comprises: the second signaling is used to determine to perform L1/L2 centric inter-cell mobility.
As an embodiment, a CORESET ID field is included in the second signaling, and the CORESET ID field is used to indicate one CORESET.
As an embodiment, a CORESET ID field is included in the second signaling, and the CORESET ID field is used to indicate one CORESET associated to the cell identified by the second PCI.
As an embodiment, a TCI State ID field is included in the second signaling, the TCI State ID field being used to indicate a TCI status.
As an embodiment, a TCI State ID field is included in the second signaling, the TCI State ID field being used to indicate one TCI State associated with the cell identified by the second PCI.
As an embodiment, the second signaling includes a TCI State ID field, where the TCI State ID field is used to indicate a TCI status, and the TCI status is associated with the second downlink RS resource; wherein the second downlink RS resource is associated to the second PCI.
As an embodiment, the second signaling includes a Serving Cell ID field, where the Serving Cell ID field indicates an identifier of the Serving Cell.
As an embodiment, the second signaling includes a first domain, the first domain indicates the second PCI, and the first domain is not one of a Serving Cell ID domain, a core set ID domain, and a TCI State ID domain.
As a sub-embodiment of this embodiment, the first domain is set to the second PCI.
As a sub-embodiment of this embodiment, the first domain is set to an index of the second PCI.
As a sub-embodiment of this embodiment, the first field is set to a first configuration index, the first configuration index corresponds to a cell identified by the second PCI, and the first configuration index is a non-negative integer.
As a subsidiary embodiment of this sub-embodiment, said first configuration index is configured by an RRC message.
As an adjunct embodiment of the sub-embodiment, the first configuration index is an index of a set of indices.
As a lower embodiment of this subsidiary embodiment, one index in the one index set is not less than 0 and the one configuration index is not more than 7.
As a lower embodiment of the dependent embodiment, the number of indexes in the index set corresponds to the number of candidate cells for inter-cell mobility centered on L1/L2.
As a sub-embodiment of this embodiment, the first field indicates the target identity.
As a sub-embodiment of this embodiment, the first domain is set as the target identity, which is associated to the second PCI.
As an embodiment, the second signaling includes at least one of the Serving Cell ID field, the core set ID field, the TCI State ID field, or the first field.
As a sub-embodiment of this embodiment, said second signaling consists of one said Serving Cell ID field, one said CORESET ID field, and one said TCI State ID field.
As a sub-embodiment of this embodiment, the second signaling consists of one Serving Cell ID field, two core set ID fields, and one TCI State ID field.
As a sub-embodiment of this embodiment, said second signaling consists of one said Serving Cell ID field, one said CORESET ID field, one said TCI State ID field and one said first field.
As a sub-embodiment of this embodiment, the second signaling consists of one Serving Cell ID field, two core set ID fields, one TCI State ID field, and one first field.
As one embodiment, the phrase receiving second signaling in response to the action comprises: when the second signaling is received.
As one embodiment, the phrase receiving second signaling in response to the action comprises: if the second signaling is received.
As one embodiment, the phrase receiving second signaling in response to the action comprises: if an indication that the second signaling is received at the MAC layer.
As one embodiment, the phrase receiving second signaling in response to the action comprises: as a subsequent action to the second signaling being received.
As an embodiment, the behavior receiving second signaling triggers the behavior to monitor a second PDCCH and to forgo monitoring the first PDCCH.
As an embodiment, the second PDCCH carries at least one DCI.
As an embodiment, the second PDCCH includes a DCI (Downlink Control Information).
As an embodiment, the second PDCCH includes one PDCCH candidate (candidate).
As one embodiment, a CRC of the DCI on the second PDCCH is scrambled by the target identity.
As one embodiment, the second PDCCH includes a PDCCH candidate (candidate) of a DCI whose CRC is scrambled by the target identity.
As an embodiment, the second PDCCH comprises a PDCCH transmission scrambled by the target identity.
As an embodiment, the second PDCCH comprises a PDCCH transmission scrambled by the target identity, the PDCCH transmission comprising a DCI.
As an embodiment, the second PDCCH includes one PDCCH search space (PDCCH search space).
As an embodiment, the second PDCCH includes one PDCCH search space set (set).
As an embodiment, the second PDCCH comprises at least one PDCCH candidate.
As an embodiment, the second PDCCH includes a CSS set.
As one embodiment, the second PDCCH includes a USS set.
As an embodiment, the second PDCCH is a USS set.
As an embodiment, the second PDCCH is a Type3-PDCCH CSS set.
As an embodiment, the second PDCCH is a Type3A-PDCCH CSS set.
As an embodiment, the second PDCCH is a Type4-PDCCH CSS set.
As an embodiment, the second PDCCH does not include a Type0-PDCCH CSS set.
As an embodiment, the second PDCCH does not include a Type0A-PDCCH CSS set.
As an embodiment, the second PDCCH does not include a Type1-PDCCH CSS set.
As an embodiment, the second PDCCH does not include a Type2-PDCCH CSS set.
As an embodiment, the second PDCCH is associated with one search space, the one search space is associated with one CORESET, and the one CORESET is associated with the second downlink RS resource.
As an embodiment, one search space of the first PDCCH association and one search space of the second PDCCH association are different.
As an embodiment, one core set associated with the first PDCCH and one core set associated with the second PDCCH are different.
As an embodiment, one core set associated with the first PDCCH is the same as one core set associated with the second PDCCH.
As an embodiment, the phrase that the second PDCCH is associated to a second downlink RS resource comprises: the second PDCCH comprises a PDCCH dedicated to the first node.
As an embodiment, the phrase that the second PDCCH is associated to a second downlink RS resource comprises: the second PDCCH is associated with a time/frequency (time/frequency) control resource set (core set), and the core set includes the second downlink RS resource.
As an embodiment, the phrase that the second PDCCH is associated to a second downlink RS resource comprises: the second PDCCH is associated with a search space (search space), the search space corresponds to a core set, and the core set includes the second downlink RS resource.
In an embodiment, the second downlink RS resource is used to determine a time-frequency control resource set for searching downlink control information.
As an embodiment, the second downlink RS resource corresponds to a CORESET identifier.
As an embodiment, the second downlink RS resource is associated to a CORESET.
For an embodiment, the second downlink RS resource corresponds to a TCI status (TCI State) identifier.
As an embodiment, the second downlink RS resource is associated to a TCI state.
As an embodiment, the second downlink RS resource includes at least one Reference Signal (Reference Signal).
As an embodiment, the second downlink RS resource includes at least one CSI-RS.
As an embodiment, the second downlink RS resource includes at least one SSB.
As an embodiment, the second downlink RS resource includes a CSI-RS indexed by NZP-CSI-RS-resource id.
As an embodiment, the second downlink RS resource includes an SSB indexed by an SSB-Index.
As one embodiment, the phrase that the second downlink RS resource is associated to the second PCI includes: the second downlink RS resource is used to determine a set of time-frequency control resources for searching downlink control information in the cell identified by the second PCI.
As one embodiment, the phrase that the second downlink RS resource is associated to the second PCI includes: and the second downlink RS resource is configured aiming at the cell identified by the second PCI.
As one embodiment, the phrase that the second downlink RS resource is associated to the second PCI includes: the second downlink RS resource is dedicated to the cell identified by the second PCI.
As one embodiment, the phrase that the second downlink RS resource is associated to the second PCI includes: any reference signal included in the second downlink RS resource is sent through one TRP in the cell identified by the second PCI.
As one embodiment, the phrase that the second downlink RS resource is associated to the second PCI includes: any reference signal included in the second downlink RS resource corresponds to a beam (beam) of a TRP in the cell identified by the second PCI.
As an example, the behavior monitoring the second PDCCH and relinquishing monitoring the first PDCCH comprises: beginning to monitor the second PDCCH and not continuing to monitor the first PDCCH.
As an example, the behavior monitoring the second PDCCH and relinquishing monitoring the first PDCCH comprises: starting to monitor the second PDCCH, and not expecting (expectedly) to continue monitoring the first PDCCH.
As one embodiment, the phrase the first PDCCH is scrambled using source identification comprising: the CRC of the first PDCCH is scrambled using the source identity.
As one embodiment, the phrase the first PDCCH is scrambled using source identification comprising: the source identification is used to generate a scrambling sequence (scrambling sequence) of the first PDCCH.
As one embodiment, the phrase the first PDCCH is scrambled using source identification comprising: the source identification is used to generate an initial scrambling sequence for the first PDCCH.
As one embodiment, the phrase the second PDCCH is scrambled using the target identity comprises: the CRC of the second PDCCH is scrambled using the target identity.
As an embodiment, the phrase the second PDCCH is scrambled using the target identity comprises: the target identity is used to generate a scrambling sequence (scrambling sequence) of the second PDCCH.
As one embodiment, the phrase the second PDCCH is scrambled using the target identity comprises: the target identity is used to generate an initial scrambling sequence for the second PDCCH.
As an embodiment, the phrase the source identification and the target identification being different includes: the source identification and the target identification have different names.
As an embodiment, the phrase the source identification and the target identification being different includes: the source identifier and the target identifier have the same name, but the source identifier and the target identifier have different values.
As an embodiment, the phrase the source identification and the target identification being different includes: the source identification and the target identification are different in name and different in value.
As an embodiment, the phrase the source identification and the target identification being different includes: the source identification and the target identification have different values.
As an embodiment, the value of the one RNTI includes one integer.
As an embodiment, the value of the one RNTI is one integer not less than 0 and not more than 65535.
As an embodiment, the Value of the one RNTI includes RNTI-Value.
As an example, the value of one RNTI is a hexadecimal (hexadecimal) integer.
As an embodiment, the value of the one RNTI is a hexadecimal (hexadecimal) integer, and the value of the one RNTI is not less than 0001, and the value of the one RNTI is not more than FFF2.
As an embodiment, the one RNTI is a C-RNTI.
As an embodiment, the one RNTI is an MCS-C-RNTI.
As an embodiment, the source identity is a C-RNTI and the target identity is a C-RNTI.
As an embodiment, the source identity is an MCS-C-RNTI and the target identity is a C-RNTI.
As an embodiment, the source identity is a C-RNTI and the target identity is an MCS-C-RNTI.
As an embodiment, the name of the source identity is C-RNTI and the name of the target identity is not C-RNTI.
As an embodiment, the source identity is an identity of the first node in the first cell, and the target identity is an identity of the first node in the second cell.
As an embodiment, the source identity is an identity of the first node in the second cell, and the target identity is an identity of the first node in the first cell.
As an embodiment, the source identity is an identity of the first node in the cell identified by the first PCI, and the target identity is an identity of the first node in the cell identified by the second PCI.
As an embodiment, the source identity is a C-RNTI of the first node in the cell identified by the first PCI; the target identity is a C-RNTI of the first node in the cell identified by the second PCI.
As an embodiment, the source identity and the target identity are of the same type.
As an embodiment, the source identification and the target identification are of different types.
As an embodiment, the name of the source identity is not C-RNTI and the name of the target identity is C-RNTI.
As an embodiment, the source identity is an RNTI in the PCell of the first node.
As an embodiment, the source identity is a C-RNTI.
As an embodiment, the source identity is a C-RNTI for an MCG by the first node.
As an embodiment, the PCI of one serving cell to which the first node is configured is the same as the first PCI or the second PCI.
As a sub-embodiment of this embodiment, the PCI of a serving cell in which the first node is configured is the same as the first PCI.
As a sub-embodiment of this embodiment, the PCI of a serving cell in which the first node is configured is the same as the second PCI.
As a sub-embodiment of this embodiment, the PCI of one serving cell to which the first node is configured is the same as the first PCI, and the PCI of any serving cell to which the first node is configured is different from the second PCI.
As a sub-embodiment of this embodiment, the PCI of one serving cell to which the first node is configured is the same as the second PCI, and the PCI of any one serving cell to which the first node is configured is different from the first PCI.
As an embodiment, the first PDCCH indicates scheduling information of the second signaling.
As an embodiment, one PDCCH indicates scheduling information of one PUSCH, and the one PDCCH is the first PDCCH or the second PDCCH.
As an embodiment, one PDCCH indicates scheduling information of one PDSCH, the one PDCCH being the first PDCCH or the second PDCCH.
As an embodiment, the scheduling information includes at least one of a time domain position, a frequency domain position, a Modulation and Coding Scheme (MCS), a Redundancy Version (RV), a New Data Indicator (NDI), or a HARQ Process number (Process Identity).
As an embodiment, the time domain location comprises a Resource allocation in time domain in the time domain.
As one embodiment, the time domain location includes a slot assignment.
As one embodiment, the time domain position includes a symbol allocation.
As an example, the time domain position is calculated according to section 5.1.2.1 in TS 38.214.
As an embodiment, the Time domain position is calculated according to a domain in the DCI corresponding to the PDCCH, where the domain includes a Time domain resource assignment domain, and the PDCCH is the first PDCCH or the second PDCCH.
As an embodiment, the Time domain position is determined according to a Time domain resource assignment field.
As an embodiment, the time domain location is determined according to a PDSCH-timedomainresource allocation field.
As an example, the time domain position is determined according to table 5.1.2.1.1-1 in TS 38.214.
As an embodiment, one field in the DCI corresponding to the one PDCCH indicates an m value, the m value is used to determine the time domain position, the m value indicates a row index (row index) m +1 of table 5.1.2.1.1-1 in TS 38.214, and the one PDCCH is the first PDCCH or the second PDCCH.
As one embodiment, the Time domain resource assignment field indicates the value of m.
As an embodiment, the row index m +1 is used to determine at least one of a slot offset (slot offset) K0, or a Start and Length Indicator (SLIV), or a direct start symbol S, or an allocation length L, or a PDSCH mapping type.
As an embodiment, the frequency domain location comprises a Resource allocation in frequency domain (Resource allocation in frequency domain) on the frequency domain.
As an example, the frequency domain position is calculated according to section 5.1.2.2.2 in TS 38.214.
As an embodiment, the Frequency domain position is calculated according to a domain in the DCI corresponding to the PDCCH, where the domain includes a Frequency domain resource assignment domain, and the PDCCH is the first PDCCH or the second PDCCH.
As an embodiment, the frequency domain position is determined according to a Downlink resource allocation (Downlink resource allocation) mode 0 (type 0).
As an embodiment, the frequency domain position is determined according to Downlink resource allocation (Downlink resource allocation) mode 1 (type 1).
As an embodiment, the frequency domain position is determined by a bitmap (bitmap), where the bitmap indicates Resource Block Groups (RBGs), and one Resource Block group includes a group of consecutive virtual Resource blocks (virtual Resource blocks).
As an embodiment, one field in DCI corresponding to the one PDCCH indicates a Resource Indication Value (RIV) indicating a start of a virtual resource block (RBstart) and lengths in units of continuously allocated resource blocks (LRBs), and the one PDCCH is the first PDCCH or the second PDCCH.
As one embodiment, the Frequency domain resource assignment field indicates the RIV.
As an embodiment, the MCS is determined according to one field of DCI corresponding to the one PDCCH, where the one field includes a modulation and coding scheme field (IMCS), and the one PDCCH is the first PDCCH or the second PDCCH.
As one embodiment, the MCS includes at least one of a modulation order (Qm) or a target code rate (R).
As an embodiment, the NDI is determined according to one field in DCI corresponding to the one PDCCH, where the one field includes an NDI field (NDI field), and the one PDCCH is the first PDCCH or the second PDCCH.
As an embodiment, the HARQ process number includes a HARQ process number.
As an embodiment, the HARQ process number is determined according to one field in DCI corresponding to the one PDCCH, where the one field includes a HARQ process number field (HARQ process number field), and the one PDCCH is the first PDCCH or the second PDCCH.
As an embodiment, the RV is determined according to one field of DCI corresponding to the one PDCCH, where the one field includes a redundancy version field (RV), and the one PDCCH is the first PDCCH or the second PDCCH.
As an embodiment, one of the cell identified by the first PCI and the cell identified by the second PCI is configured as a serving cell of the first node.
As an embodiment, the cell identified by the first PCI is the first cell and the cell identified by the second PCI is the second cell.
As an embodiment, the source identity is an identity of the first node in the cell identified by the first PCI; the target identity is an identity of the first node in the cell identified by the second PCI.
As one embodiment, the first PCI and the second PCI are different.
As an embodiment, the first node always listens for a BCCH on the cell identified by the first PCI at least one time slot before the behavior receives the second signaling and at least one time slot after the behavior receives the second signaling.
As an embodiment, the first node always keeps a System Information (SI) on the cell identified by the first PCI at least one time slot before the behavior receives the second signaling and at least one time slot after the behavior receives the second signaling.
As an example, the associated meaning includes: is addressed to (address to).
As an example, the meaning of the association includes: it is related.
As an example, the associated meaning includes: the asset.
As an example, the associated meaning includes: and (4) correlating.
As an example, the meaning of A1 in relation to B1 includes: the B1 can be obtained from the A1.
As an example, the meaning of A1 in relation to B1 includes: the A1 can be obtained by the B1.
As an example, the meaning of A1 in relation to B1 includes: the A1 is used to determine the B1.
As an example, the meaning of A1 associated with B1 includes: the B1 is used to determine the A1.
As an example, the meaning of A1 in relation to B1 includes: a1 and B1 are in one-to-one correspondence.
As an example, the meaning of A1 in relation to B1 includes: the A1 includes the B1.
As an example, the meaning of A1 in relation to B1 includes: the B1 includes the A1.
As an example, the meaning of A1 in relation to B1 includes: said A1 is related to said B1.
As an example, the meaning of A1 associated with B1 includes: the A1 and the B1 correspond to the same parameter.
As an example, the meaning of A1 in relation to B1 includes: the A1 and the B1 correspond to the same identifier.
Example 2
Embodiment 2 illustrates a schematic diagram of a network architecture according to an embodiment of the present application, as shown in fig. 2. Fig. 2 illustrates a network architecture 200 of a 5G NR (New Radio, new air interface)/LTE (Long-Term Evolution)/LTE-a (Long-Term Evolution Advanced, enhanced Long-Term Evolution) system. The 5G NR/LTE-a network architecture 200 may be referred to as a 5GS (5G System)/EPS (Evolved Packet System) 200, some other suitable terminology. The 5GS/EPS 200 includes at least one of UE (User Equipment) 201, ran (radio access network) 202,5gc (5G Core network )/EPC (Evolved Packet Core) 210, hss (Home Subscriber Server), home Subscriber Server)/UDM (Unified Data Management) 220, and internet service 230. The 5GS/EPS may interconnect with other access networks, but these entities/interfaces are not shown for simplicity. As shown, the 5GS/EPS provides packet switched services, however those skilled in the art will readily appreciate that the various concepts presented throughout this application may be extended to networks providing circuit switched services or other cellular networks. The RAN includes node 203 and other nodes 204. Node 203 provides user and control plane protocol termination towards UE 201. Node 203 may be connected to other nodes 204 via an Xn interface (e.g., backhaul)/X2 interface. The node 203 may also be referred to as a base station, a base transceiver station, a radio base station, a radio transceiver, a transceiver function, a Basic Service Set (BSS), an Extended Service Set (ESS), a TRP (transmit receive node), or some other suitable terminology. The node 203 provides an access point for the UE201 to the 5GC/EPC210. Examples of the UE201 include a cellular phone, a smart phone, a Session Initiation Protocol (SIP) phone, a laptop, a Personal Digital Assistant (PDA), a satellite radio, non-terrestrial base station communications, satellite mobile communications, a global positioning system, a multimedia device, a video device, a digital audio player (e.g., MP3 player), a camera, a game console, a drone, an aircraft, a narrowband internet of things device, a machine type communication device, a terrestrial vehicle, an automobile, a wearable device, or any other similar functioning device. UE201 may also be referred to by those skilled in the art as a mobile station, a subscriber station, a mobile unit, a subscriber unit, a wireless unit, a remote unit, a mobile device, a wireless communications device, a remote device, a mobile subscriber station, an access terminal, a mobile terminal, a wireless terminal, a remote terminal, a handset, a user agent, a mobile client, a client, or some other suitable terminology. Node 203 is connected to 5GC/EPC210 through an S1/NG interface. The 5GC/EPC210 includes MME (Mobility Management Entity)/AMF (Authentication Management domain)/SMF (Session Management Function) 211, other MME/AMF/SMF214, S-GW (serving Gateway)/UPF (User Plane Function) 212, and P-GW (Packet data Network Gateway)/UPF 213. The MME/AMF/SMF211 is a control node that handles signaling between the UE201 and the 5GC/EPC210. In general, the MME/AMF/SMF211 provides bearer and connection management. All user IP (Internet protocol) packets are transported through the S-GW/UPF212, which S-GW/UPF212 itself is connected to the P-GW/UPF213. The P-GW provides UE IP address allocation as well as other functions. The P-GW/UPF213 is connected to the internet service 230. The internet service 230 includes an operator-corresponding internet protocol service, and may specifically include the internet, an intranet, an IMS (IP Multimedia Subsystem), and a packet-switched streaming service.
As an embodiment, the UE201 corresponds to the first node in this application.
As an embodiment, the UE201 is a User Equipment (UE).
As an embodiment, the UE201 is an end terminal (ender).
As an embodiment, the node 203 corresponds to the second node in this application.
As an embodiment, the node 203 is a base station equipment (BS).
As an example, the node 203 is a Base Transceiver Station (BTS).
For one embodiment, the node 203 is a node B (NodeB, NB).
As an embodiment, the node 203 is a gNB.
For an embodiment, the node 203 is an eNB.
As an embodiment, the node 203 is a ng-eNB.
For one embodiment, the node 203 is an en-gNB.
As an embodiment, the node 203 is a user equipment.
As an embodiment, the node 203 is a relay.
For one embodiment, the node 203 is a Gateway (Gateway).
As an embodiment, the node 203 comprises at least one TRP.
As an embodiment, the node 204 corresponds to the third node in the present application.
As an embodiment, the node 204 corresponds to the fourth node in this application.
For one embodiment, the node 204 is a base station equipment (BS).
For one embodiment, the node 204 is a BS.
For one embodiment, the node 204 is a BTS.
For one embodiment, the node 204 is an NB.
For one embodiment, the node 204 is a gNB.
For one embodiment, the node 204 is an eNB.
For one embodiment, the node 204 is an ng-eNB.
For one embodiment, the node 204 is an en-gNB.
For one embodiment, the node 204 is a user equipment.
For one embodiment, the node 204 is a relay.
For one embodiment, the node 204 is a Gateway (Gateway).
For one embodiment, the node 204 includes at least one TRP.
As an embodiment, the user equipment supports transmission of a Non-Terrestrial Network (NTN).
As an embodiment, the user equipment supports transmission of a non-Terrestrial Network (Terrestrial Network).
As an embodiment, the user equipment supports transmission in a large delay-difference network.
As an embodiment, the user equipment supports Dual Connection (DC) transmission.
As one embodiment, the user device comprises an aircraft.
As an embodiment, the user equipment includes a vehicle-mounted terminal.
As one embodiment, the user equipment comprises a ship.
As an embodiment, the user equipment includes an internet of things terminal.
As an embodiment, the user equipment includes a terminal of an industrial internet of things.
As an embodiment, the user equipment comprises a device supporting low-latency high-reliability transmission.
As an embodiment, the user equipment comprises a test equipment.
As an embodiment, the user equipment comprises a signaling tester.
As an embodiment, the user equipment supports NR.
As an embodiment, the user equipment supports UTRA.
As an embodiment, the user equipment supports EUTRA.
As one embodiment, the base station apparatus supports transmission in a non-terrestrial network.
As an embodiment, the base station apparatus supports transmission in a large delay-difference network.
As an embodiment, the base station apparatus supports transmission of a terrestrial network.
As an embodiment, the base station device includes a macro Cellular (Marco Cellular) base station.
As one embodiment, the base station apparatus includes a Micro Cell base station.
As one embodiment, the base station apparatus includes a Pico Cell (Pico Cell) base station.
As an embodiment, the base station device includes a home base station (Femtocell).
As an embodiment, the base station apparatus includes a base station apparatus supporting a large delay difference.
As one embodiment, the base station device comprises a flying platform device.
As one embodiment, the base station apparatus includes a satellite apparatus.
As an embodiment, the base station device includes a TRP (Transmitter Receiver Point).
As an embodiment, the base station apparatus includes a CU (Centralized Unit).
As an embodiment, the base station apparatus includes a DU (Distributed Unit).
As an embodiment, the base station device comprises a test device.
As one embodiment, the base station apparatus includes a signaling tester.
As an embodiment, the base station device includes an IAB (Integrated Access and Backhaul) -node.
For one embodiment, the base station equipment includes an IAB-donor.
For one embodiment, the base station equipment includes an IAB-donor-CU.
As an embodiment, the base station equipment comprises an IAB-donor-DU.
As an embodiment, the base station device comprises an IAB-DU.
For one embodiment, the base station device includes an IAB-MT.
As one embodiment, the relay includes a relay.
As one embodiment, the relay includes an L3 relay.
As one embodiment, the relay includes an L2 relay.
For one embodiment, the relay includes a router.
As one embodiment, the relay includes a switch.
As one embodiment, the relay includes a user equipment.
As one embodiment, the relay includes a base station apparatus.
As an embodiment, at least one of a connection between the UE201 and the node 203 and a connection between the UE201 and the node 204 exists.
As a sub-embodiment of this embodiment, a connection between the UE201 and the node 203 exists, and a connection between the UE201 and the node 204 does not exist.
As a sub-embodiment of this embodiment, a connection between the UE201 and the node 203 does not exist, and a connection between the UE201 and the node 204 exists.
As a sub-embodiment of this embodiment, a connection exists between the UE201 and the node 203, and a connection exists between the UE201 and the node 204.
Example 3
Embodiment 3 shows a schematic diagram of an embodiment of a radio protocol architecture for the user plane and the control plane according to the present application, as shown in fig. 3. Fig. 3 is a schematic diagram illustrating an embodiment of radio protocol architecture for the user plane 350 and the control plane 300, fig. 3 showing the radio protocol architecture for the control plane 300 in three layers: layer 1, layer 2 and layer 3. Layer 1 (L1 layer) is the lowest layer and implements various PHY (physical layer) signal processing functions. The L1 layer will be referred to herein as PHY301. A layer 2 (L2 layer) 305 is above the PHY301, and includes a MAC (Medium Access Control) sublayer 302, an RLC (Radio Link Control, radio Link layer Control) sublayer 303, and a PDCP (Packet Data Convergence Protocol) sublayer 304. The PDCP sublayer 304 provides multiplexing between different radio bearers and logical channels. The PDCP sublayer 304 also provides security by ciphering packets and provides handover support. The RLC sublayer 303 provides segmentation and reassembly of upper layer packets, retransmission of lost packets, and reordering of packets to compensate for out-of-order reception due to HARQ. The MAC sublayer 302 provides multiplexing between logical and transport channels. The MAC sublayer 302 is also responsible for allocating various radio resources (e.g., resource blocks) in one cell. The MAC sublayer 302 is also responsible for HARQ operations. The RRC (Radio Resource Control) sublayer 306 in layer 3 (L3 layer) in the Control plane 300 is responsible for obtaining Radio resources (i.e., radio bearers) and configuring the lower layers using RRC signaling. The radio protocol architecture of the user plane 350, which includes layer 1 (L1 layer) and layer 2 (L2 layer), is substantially the same in the user plane 350 for the physical layer 351, the PDCP sublayer 354 in the L2 layer 355, the RLC sublayer 353 in the L2 layer 355, and the MAC sublayer 352 in the L2 layer 355 as the corresponding layers and sublayers in the control plane 300, but the PDCP sublayer 354 also provides header compression for upper layer packets to reduce radio transmission overhead. The L2 layer 355 in the user plane 350 further includes an SDAP (Service Data Adaptation Protocol) sublayer 356, and the SDAP sublayer 356 is responsible for mapping between QoS streams and Data Radio Bearers (DRBs) to support diversity of services.
As an example, the wireless protocol architecture in fig. 3 is applicable to the first node in this application.
As an example, the radio protocol architecture in fig. 3 is applicable to the second node in this application.
As an example, the radio protocol architecture in fig. 3 is applicable to the third node in the present application.
As an example, the radio protocol architecture in fig. 3 is applicable to the fourth node in this application.
As an embodiment, the first signaling in this application is generated in the RRC306.
As an embodiment, the first signaling in this application is generated in the MAC302 or the MAC352.
As an embodiment, the first signaling in this application is generated in the PHY301 or the PHY351.
As an embodiment, the second signaling in this application is generated in the MAC302 or the MAC352.
As an embodiment, the second signaling in this application is generated in the PHY301 or the PHY351.
As an embodiment, the first PDCCH in the present application is generated in the PHY301 or the PHY351.
As an embodiment, the second PDCCH in the present application is generated in the PHY301 or the PHY351.
As an embodiment, the first uplink grant in this application is generated in the MAC302 or the MAC352.
As an embodiment, the first uplink grant in this application is generated in the PHY301 or the PHY351.
As an embodiment, the second uplink grant in this application is generated in the MAC302 or the MAC352.
As an embodiment, the second uplink grant in this application is generated in the PHY301 or the PHY351.
As an embodiment, the first type of reference signal in the present application is generated in the PHY301 or the PHY351.
As an embodiment, the first wireless signal in this application is generated in the MAC302 or the MAC352.
As an embodiment, the first wireless signal in the present application is generated in the PHY301 or the PHY351.
As an embodiment, the second wireless signal in this application is generated in the MAC302 or the MAC352.
As an embodiment, the second wireless signal in the present application is generated in the PHY301 or the PHY351.
Example 4
Embodiment 4 shows a schematic diagram of a first communication device and a second communication device according to the present application, as shown in fig. 4. Fig. 4 is a block diagram of a first communication device 450 and a second communication device 410 communicating with each other in an access network.
The first communications device 450 includes a controller/processor 459, a memory 460, a data source 467, a transmit processor 468, a receive processor 456, a multiple antenna transmit processor 457, a multiple antenna receive processor 458, a transmitter/receiver 454, and an antenna 452.
The second communications device 410 includes a controller/processor 475, a memory 476, a receive processor 470, a transmit processor 416, a multiple antenna receive processor 472, a multiple antenna transmit processor 471, a transmitter/receiver 418 and an antenna 420.
In transmission from the second communication device 410 to the first communication device 450, at the second communication device 410, upper layer data packets from the core network are provided to a controller/processor 475. The controller/processor 475 implements the functionality of the L2 layer. In transmissions from the second communications device 410 to the first communications device 450, the controller/processor 475 provides header compression, encryption, packet segmentation and reordering, multiplexing between logical and transport channels, and radio resource allocation to the first communications device 450 based on various priority metrics. The controller/processor 475 is also responsible for retransmission of lost packets and signaling to the first communication device 450. The transmit processor 416 and the multi-antenna transmit processor 471 implement various signal processing functions for the L1 layer (i.e., the physical layer). The transmit processor 416 implements coding and interleaving to facilitate Forward Error Correction (FEC) at the second communication device 410, as well as mapping of signal constellation based on various modulation schemes (e.g., binary Phase Shift Keying (BPSK), quadrature Phase Shift Keying (QPSK), M-phase shift keying (M-PSK), M-quadrature amplitude modulation (M-QAM)). The multi-antenna transmit processor 471 performs digital spatial precoding, including codebook-based precoding and non-codebook based precoding, and beamforming processing on the coded and modulated symbols to generate one or more spatial streams. Transmit processor 416 then maps each spatial stream to subcarriers, multiplexes with reference signals (e.g., pilots) in the time and/or frequency domain, and then uses an Inverse Fast Fourier Transform (IFFT) to generate the physical channels that carry the time-domain multicarrier symbol streams. The multi-antenna transmit processor 471 then performs transmit analog precoding/beamforming operations on the time domain multi-carrier symbol stream. Each transmitter 418 converts the baseband multicarrier symbol stream provided by the multi-antenna transmit processor 471 into a radio frequency stream that is then provided to a different antenna 420.
In a transmission from the second communications apparatus 410 to the first communications apparatus 450, each receiver 454 receives a signal through its respective antenna 452 at the first communications apparatus 450. Each receiver 454 recovers information modulated onto a radio frequency carrier and converts the radio frequency stream into a baseband multi-carrier symbol stream that is provided to a receive processor 456. Receive processor 456 and multi-antenna receive processor 458 implement the various signal processing functions of the L1 layer. A multi-antenna receive processor 458 performs receive analog precoding/beamforming operations on the baseband multi-carrier symbol stream from the receiver 454. Receive processor 456 converts the baseband multicarrier symbol stream after the receive analog precoding/beamforming operation from the time domain to the frequency domain using a Fast Fourier Transform (FFT). In the frequency domain, the physical layer data signals and the reference signals to be used for channel estimation are demultiplexed by the receive processor 456, and the data signals are subjected to multi-antenna detection in the multi-antenna receive processor 458 to recover any spatial streams destined for the first communication device 450. The symbols on each spatial stream are demodulated and recovered at a receive processor 456 and soft decisions are generated. The receive processor 456 then decodes and deinterleaves the soft decisions to recover the upper layer data and control signals transmitted by the second communications device 410 on the physical channel. The upper layer data and control signals are then provided to a controller/processor 459. The controller/processor 459 implements the functions of the L2 layer. The controller/processor 459 may be associated with a memory 460 that stores program codes and data. Memory 460 may be referred to as a computer-readable medium. In transmissions from the second communications device 410 to the second communications device 450, the controller/processor 459 provides demultiplexing between transport and logical channels, packet reassembly, deciphering, header decompression, control signal processing to recover upper layer packets from the core network. The upper layer packet is then provided to all protocol layers above the L2 layer. Various control signals may also be provided to L3 for L3 processing.
In a transmission from the first communications device 450 to the second communications device 410, a data source 467 is used at the first communications device 450 to provide upper layer data packets to a controller/processor 459. The data source 467 represents all protocol layers above the L2 layer. Similar to the send function at the second communications apparatus 410 described in the transmission from the second communications apparatus 410 to the first communications apparatus 450, the controller/processor 459 performs header compression, encryption, packet segmentation and reordering, and multiplexing between logical and transport channels based on radio resource allocation, performing L2 layer functions for the user plane and control plane. The controller/processor 459 is also responsible for retransmission of lost packets and signaling to said second communications device 410. A transmit processor 468 performs modulation mapping, channel coding, and digital multi-antenna spatial precoding by a multi-antenna transmit processor 457 including codebook-based precoding and non-codebook based precoding, and beamforming, and the transmit processor 468 then modulates the resulting spatial streams into multi-carrier/single-carrier symbol streams, which are provided to different antennas 452 via a transmitter 454 after analog precoding/beamforming in the multi-antenna transmit processor 457. Each transmitter 454 first converts the baseband symbol stream provided by the multi-antenna transmit processor 457 into a radio frequency symbol stream and provides the radio frequency symbol stream to the antenna 452.
In a transmission from the first communication device 450 to the second communication device 410, the functionality at the second communication device 410 is similar to the receiving functionality at the first communication device 450 described in the transmission from the second communication device 410 to the first communication device 450. Each receiver 418 receives an rf signal through its respective antenna 420, converts the received rf signal to a baseband signal, and provides the baseband signal to a multi-antenna receive processor 472 and a receive processor 470. The receive processor 470 and the multiple antenna receive processor 472 collectively implement the functions of the L1 layer. The controller/processor 475 implements L2 layer functions. The controller/processor 475 may be associated with a memory 476 that stores program codes and data. Memory 476 may be referred to as a computer-readable medium. In transmission from the first communications device 450 to the second communications device 410, the controller/processor 475 provides demultiplexing between transport and logical channels, packet reassembly, deciphering, header decompression, control signal processing to recover upper layer packets from the UE 450. Upper layer data packets from the controller/processor 475 may be provided to a core network.
As an embodiment, the first communication device 450 includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code configured to, with the at least one processor, the first communication device 450 at least: receiving a first signaling, wherein the first signaling indicates a target identifier; monitoring a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; receiving second signaling, the second signaling being used to indicate a second PCI; in response to receiving a second signaling in response to the behavior, monitor a second PDCCH associated with a second downlink RS resource associated with the second PCI and forgo monitoring the first PDCCH; wherein the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
As an embodiment, the first communication device 450 includes: a memory storing a program of computer readable instructions that when executed by at least one processor result in actions comprising: receiving a first signaling, wherein the first signaling indicates a target identifier; monitoring a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; receiving second signaling, the second signaling being used to indicate a second PCI; in response to receiving a second signaling in response to the behavior, monitor a second PDCCH associated with a second downlink RS resource associated with the second PCI and forgo monitoring the first PDCCH; wherein the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
As an embodiment, the second communication device 410 includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured for use with the at least one processor. The second communication device 410 at least: sending a first signaling, wherein the first signaling indicates a target identifier; transmitting a first PDCCH associated to a first downlink RS resource associated to a first PCI; sending second signaling, the second signaling being used to indicate a second PCI; wherein, in response to the second signaling being received, a second PDCCH is monitored and the first PDCCH is relinquished to monitoring, the second PDCCH being associated to a second downlink RS resource associated to the second PCI; the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
As an embodiment, the second communication device 410 includes: a memory storing a program of computer readable instructions that when executed by at least one processor result in actions comprising: sending a first signaling, wherein the first signaling indicates a target identifier; transmitting a first PDCCH associated to a first downlink RS resource associated to a first PCI; sending second signaling, the second signaling being used to indicate a second PCI; wherein, in response to the second signaling being received, a second PDCCH is monitored and the first PDCCH is relinquished to be monitored, the second PDCCH being associated to a second downlink RS resource, the second downlink RS resource being associated to the second PCI; the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; the second PDCCH is scrambled using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
For one embodiment, the antenna 452, the receiver 454, the receive processor 456, the controller/processor 459 are configured to receive a first signaling; at least one of the antenna 420, the transmitter 418, the transmit processor 416, and the controller/processor 475 is configured to send first signaling.
For one embodiment, the antenna 452, the receiver 454, the receive processor 456, the controller/processor 459 are configured to receive second signaling; at least one of the antenna 420, the transmitter 418, the transmit processor 416, and the controller/processor 475 is configured to send second signaling.
For one embodiment, the antenna 452, the receiver 454, the receive processor 456, the controller/processor 459 are configured to receive a first uplink grant; at least one of the antenna 420, the transmitter 418, the transmit processor 416, and the controller/processor 475 is configured to send a first uplink grant.
For one embodiment, the antenna 452, the receiver 454, the receive processor 456, the controller/processor 459 are configured to receive a second uplink grant; at least one of the antenna 420, the transmitter 418, the transmit processor 416, and the controller/processor 475 is configured to send a second uplink grant.
For one embodiment, the antenna 452, the receiver 454, the receive processor 456, the controller/processor 459 are configured to receive reference signals of a first type; at least one of the antenna 420, the transmitter 418, the transmit processor 416, and the controller/processor 475 is configured to transmit a first type of reference signal.
For one embodiment, the antenna 452, the receiver 454, the receive processor 456, the controller/processor 459 are configured to monitor a first PDCCH; at least one of the antenna 420, the transmitter 418, the transmit processor 416, the controller/processor 475 is configured to transmit a first PDCCH.
For one embodiment, the antenna 452, the receiver 454, the receive processor 456, the controller/processor 459 are configured to monitor a second PDCCH; at least one of the antenna 420, the transmitter 418, the transmit processor 416, and the controller/processor 475 is configured to transmit a second PDCCH.
As one implementation, the antenna 452, the transmitter 454, the transmit processor 468, the controller/processor 459 are used to send a second wireless signal; at least one of the antenna 420, the receiver 418, the receive processor 470, the controller/processor 475 is configured to receive a second wireless signal.
As an embodiment, the first communication device 450 corresponds to a first node in the present application.
As an embodiment, the second communication device 410 corresponds to a second node in the present application.
As an embodiment, the second communication device 410 corresponds to a third node in the present application.
As an embodiment, the second communication device 410 corresponds to a fourth node in the present application.
For one embodiment, the first communication device 450 is a user device.
For one embodiment, the first communication device 450 is a user equipment supporting a large delay difference.
As an embodiment, the first communication device 450 is a user equipment supporting NTN.
As an example, the first communication device 450 is an aircraft device.
For one embodiment, the first communication device 450 is location-enabled.
As an example, the first communication device 450 does not have the capability to subscribe.
As an embodiment, the first communication device 450 is a TN-capable user equipment.
As an embodiment, the second communication device 410 is a base station device (gNB/eNB/ng-eNB).
As an embodiment, the second communication device 410 is a base station device supporting large delay inequality.
As an embodiment, the second communication device 410 is a base station device supporting NTN.
For one embodiment, the second communication device 410 is a satellite device.
For one embodiment, the second communication device 410 is a flying platform device.
As an embodiment, the second communication device 410 is a base station device supporting TN.
Example 5
Embodiment 5 illustrates a wireless signal transmission flow chart according to an embodiment of the present application, as shown in fig. 5. It is specifically noted that the order in this example does not limit the order of signal transmission and the order of implementation in this application.
For theFirst node U01In step S5101, receiving a first signaling, where the first signaling indicates a target identifier; in step S5102, monitoring a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; receiving second signaling, which is used to indicate a second PCI, in step S5103; in step S5104, in response to receiving the second signaling as the action, monitor a second PDCCH associated with a second downlink RS resource associated with the second PCI and forgo monitoring the first PDCCH.
For theSecond node N02In step S5201, the first signaling is transmitted; in step S5202, the second signaling is transmitted.
For theThird node N03In step S5301, the first signaling is transmitted.
In embodiment 5, the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
As an embodiment, the first node U01 is a user equipment.
As an embodiment, the first node U01 is a terminal.
As an embodiment, the second node N02 comprises one TRP.
As an example, the second node N02 comprises a DU.
As an embodiment, the second node N02 comprises one gNB.
As an embodiment, the second node N02 comprises a base station apparatus.
As an embodiment, the second node N02 comprises a user equipment.
As an embodiment, the third node N03 comprises one TRP.
As an embodiment, the third node N03 comprises one TRP.
As an example, the third node N03 comprises a DU.
For one embodiment, the third node N03 includes a gNB.
As an embodiment, the third node N03 comprises a base station device.
As an embodiment, the third node N03 comprises a user equipment.
As an embodiment, the second node N02 and the third node N03 are each a TRP, the second node N02 is associated to the first PCI, and the third node N03 is associated to the second PCI.
In an embodiment, the uplink transmission timing of the second node N02 and the uplink transmission timing of the third node N03 are the same.
As an embodiment, the uplink transmission timings of the second node N02 and the third node N03 are different.
As an embodiment, there is an ideal backhaul between the second node N02 and the third node N03.
As an embodiment, a non-ideal backhaul is provided between the second node N02 and the third node N03.
As an embodiment, the second node N02 and the third node N03 belong to the same DU.
As an example, the second node N02 and the third node N03 belong to different DUs.
As an embodiment the dashed box F5.1 is optional.
As an example, the dashed box F5.1 exists.
As an example, the dashed box F5.1 is not present.
As an embodiment the dashed box F5.2 is optional.
As an example, the dashed box F5.2 exists.
As an example, the dashed box F5.2 is not present.
As an example, the dashed box F5.1 is present and the dashed box F5.2 is absent.
As an embodiment, the third node N03 comprises a maintaining base station for the PCell of the first node U01 to switch to a cell preceding the cell identified by the first PCI.
As an embodiment, the third node N03 comprises a maintaining base station of the cell identified by the second PCI.
As an embodiment, the second node N02 comprises a maintaining base station of the cell identified by the first PCI.
As one embodiment, the cell identified by the first PCI comprises the second cell.
As an embodiment, the second node N02 comprises a maintaining base station of the second cell.
As an embodiment, the second node N02 includes the second TRP.
As an embodiment, the first signaling is used to synchronize a reconfiguration process.
As an embodiment, the first signaling is used for handover configuration.
As an embodiment, the first signaling comprises physical layer parameters of the first node U01 in the first cell.
As an embodiment, the first signaling includes a C-RNTI of the first node U01 in the first cell, and the C-RNTI is the target identity.
As an embodiment, the first signaling includes MAC layer parameters of the first node U01 in the first cell.
As an embodiment, the first signaling comprises PDCP layer parameters of the first node U01 in the first cell.
As an embodiment, the first signaling comprises RLC layer parameters of the first node U01 in the first cell.
As an embodiment, the first signaling includes the second PCI of the first cell.
For one embodiment, the first signaling includes a timer T304.
As an embodiment, the first signaling includes a reconfigurationWithSync field.
As an embodiment, the configuration in the first signaling is applied when the first signaling is received.
As an embodiment, the phrase the first signaling indication target identity comprises: applying a value of one identity of the first signaling indication as the target identity.
As a sub-embodiment of this embodiment, the one Identity comprises a newUE-Identity; the Value of the one identifier comprises an RNTI-Value; the target identity comprises a C-RNTI.
As a sub-embodiment of this embodiment, the first signaling includes a field in an RRC message, and the name of the field includes reconfigurationWithSync.
As a sub-embodiment of this embodiment, the first node U01 applies a value of one identifier indicated by the first signaling as the target identifier during a synchronization reconfiguration (synchronization with sync) process.
As a sub-embodiment of this embodiment, the phrase applying a value of an identity of the first signaling indication as the target identity comprises: applying the value of newUE-Identity as the C-RNTI for the first cell group of the first cell group.
As an example, the dashed box F5.1 is absent and the dashed box F5.2 is present.
As an embodiment, the second node N02 comprises a maintaining base station of the cell identified by the first PCI.
As an embodiment, the cell identified by the first PCI is the first cell.
As an embodiment, the second node N02 comprises a maintaining base station of the first cell.
As an embodiment, the second node N02 comprises the first TRP.
As an embodiment, the first signaling comprises a rrcreeconfiguration message.
As an embodiment, the first signaling is used to configure one candidate cell.
As an embodiment, the first signaling is used to configure one C-RNTI.
As an embodiment, the first signaling is used to configure a C-RNTI of a cell other than the serving cell of the first node U01.
As an embodiment, the first signaling comprises physical layer parameters of the first node U01 in the second cell.
As an embodiment, the first signaling includes a C-RNTI of the first node U01 in the second cell, and the C-RNTI is the target identity.
As an embodiment, the configuration in the first signaling is not applied when the first signaling is received, and the configuration in the first signaling is applied when the second signaling is received.
As an embodiment, the meaning of maintaining a base station for a cell includes: the radio signal in the one cell is transmitted or received by the maintenance base station.
As an embodiment, the meaning of maintaining the base station of one cell includes: the one cell is associated to the maintaining base station.
As an embodiment, the source identity is an identity of the first node U01 in the first cell, and the target identity is an identity of the first node U01 in the second cell.
As an embodiment, the source identifier is an identifier of the first node U01 in the second cell, and the target identifier is an identifier of the first node U01 in the first cell.
Example 6
Embodiment 6 illustrates a wireless signal transmission flow diagram according to another embodiment of the present application, as shown in fig. 6. It is specifically noted that the order in this example does not limit the order of signal transmission and the order of implementation in this application.
For theFirst node U01In step S6101, a first signaling is received, where the first signaling indicates a target identifier; in step S6102, a first uplink grant is received, the first uplink grant being associated with the source identifier; in step S6103, a first PDCCH is monitored, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; in step S6104, second signaling is received, the second signaling being used to indicate a second PCI; in step S6105, in response to receiving the second signaling as the behavior, monitoring a second PDCCH and abandoning monitoring the first PDCCH, the second PDCCH being associated with a second downlink RS resource, the second downlink RS resource being associated with the second PCI; in step S6106, a second uplink grant is received, the second uplink grant being associated with the target identifier;in step S6107, the first NDI is considered to have flipped in response to the behavior receiving the first uplink grant and the second uplink grant.
For theSecond node N02In step S6201, the first uplink grant is sent; in step S6202, the second signaling is sent.
For theFourth node N04In step S6401, the second uplink grant is transmitted.
In embodiment 6, the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled by using a source identifier; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI; the first uplink grant and the second uplink grant are associated to the same HARQ process; and the receiving time of the first uplink grant is earlier than the receiving time of the second uplink grant.
As an embodiment, the first PDCCH indicates scheduling information of the first uplink grant; the scheduling information includes at least one of a time domain position, a frequency domain position, an MCS, an RV, an NDI, or an HARQ process number.
As an embodiment, the second PDCCH indicates scheduling information of the second uplink grant; the scheduling information includes at least one of a time domain position, a frequency domain position, an MCS, an RV, an NDI, or an HARQ process number.
As an example, there is no Xn connection between the second node N02 and the fourth node N04.
As an example, an Xn connection exists between the second node N02 and the fourth node N04.
As an embodiment, there is an ideal backhaul between the second node N02 and the fourth node N04.
As an example, a non-ideal backhaul is provided between the second node N02 and the fourth node N04.
As an embodiment, the second node N02 and the fourth node N04 belong to the same physical cell.
As an embodiment, the second node N02 and the fourth node N04 belong to different physical cells.
As an embodiment, the second node N02 and the fourth node N04 have the same Physical Cell Identity (PCI).
As an embodiment, the second node N02 and the fourth node N04 have different physical cell identities.
As an example, the second node N02 and the fourth node N04 belong to two different sites.
As an embodiment, the first uplink grant includes one UL grant.
As an embodiment, the first uplink grant is received on a PDCCH.
As an embodiment, the first uplink grant is a UL grant sent to the source identifier.
As an embodiment, the first uplink grant is received on the first PDCCH.
As one embodiment, the first uplink grant is received on a PDCCH for the source identity.
As an embodiment, the second uplink grant includes one UL grant.
As an embodiment, the second uplink grant is received on a PDCCH.
As an embodiment, the second uplink grant is a UL grant sent to the target identifier.
As an embodiment, the second uplink grant is received on the second PDCCH.
As an embodiment, the second uplink grant is received on a PDCCH for the target identity.
As one embodiment, the phrase associating the first uplink grant to the source identification includes: the first uplink grant is received on a PDCCH for the source identity.
As one embodiment, the phrase associating the first uplink grant to the source identification includes: the first uplink grant is for The source identity.
As an embodiment, the phrase associating the second uplink grant to the target identity includes: the second uplink grant is received on a PDCCH for the target identity.
As an embodiment, the phrase associating the second uplink grant to the target identity includes: the second uplink grant is identified to the target.
As one embodiment, the phrase receiving the responses of the first uplink grant and the second uplink grant as the action includes: if the first uplink grant is received, and the second uplink grant is received.
As one embodiment, the phrase receiving the responses of the first uplink grant and the second uplink grant as the action includes: when the second uplink grant is received, if the first uplink grant was previously received.
As an example, the meaning of the act "in response to the act receiving the first uplink grant and the second uplink grant, assuming that the first NDI has flipped" includes: considering that the first NDI has been flipped, regardless of whether a value of the first NDI provided in the HARQ information associated with the first uplink grant is different from a value of the first NDI provided in the HARQ information associated with the second uplink grant.
As an example, the meaning of the behavior "in response to the behavior receiving the first uplink grant and the second uplink grant, considering that the first NDI has flipped" includes: in response to the act of receiving a first uplink grant and a second uplink grant, the second uplink grant is considered to be used for transmitting new data.
As one example, the act of considering that the first NDI has flipped includes: the value of the first NDI is considered to have changed.
As one example, the act of considering that the first NDI has flipped comprises: the connector the first NDI to have been toggle.
As an embodiment, for the same HARQ process, when the value of the first NDI provided in the HARQ information associated with the current and last two UL grants is different, the last UL grant is used for transmitting new data.
As an embodiment, for the same HARQ process, when the value of the first NDI provided in the HARQ information associated with the current last two UL grants is the same, the last UL grant is used for retransmission (retransmission).
As an embodiment, the first NDI is an NDI.
For one embodiment, the first NDI includes 1 bit.
As an embodiment, the value of the first NDI is equal to 0 or 1.
As an embodiment, the first NDI is received in HARQ information.
As one embodiment, the first NDI is received in DCI.
As an embodiment, the first NDI is HARQ process specific.
As an embodiment, the first receiver receives one DCI, where the one DCI includes the first uplink grant and first HARQ information, the first uplink grant is associated with one HARQ process, the one HARQ process is identified by a target integer, the first HARQ information includes the first NDI, and the first NDI is set to a first value; receiving another DCI, where the another DCI includes the second uplink grant and second HARQ information, the second uplink grant is associated with one HARQ process, the one HARQ process is identified by the target integer, the second HARQ information includes the first NDI, and the first NDI is set to a second value; wherein the one DCI is associated to the first PDCCH; the other DCI is associated with the second PDCCH; the target integer is a non-negative integer.
As a sub-embodiment of this embodiment, the target integer is not less than 0 and not more than 15.
As a sub-embodiment of this embodiment, the target integer is not less than 0 and not more than 31.
As a sub-embodiment of this embodiment, the target integer is a HARQ process identity.
As an embodiment, in a time interval between the receiving time of the first uplink grant and the receiving time of the second uplink grant, the MAC entity is not reset.
As an embodiment, in a time interval between the receiving time of the first uplink grant and the receiving time of the second uplink grant, no other UL grant is received.
As an embodiment, in a time interval between the reception time of the first uplink grant and the reception time of the second uplink grant, no other UL grant is received through the PDCCH.
As an embodiment, the phrase that the first uplink grant and the second uplink grant are associated to the same HARQ process includes: the first uplink grant and the second uplink grant have a same HARQ process identification (HARQ process ID).
As an embodiment, the phrase that the first uplink grant and the second uplink grant are associated to the same HARQ process includes: the first uplink grant and the second uplink grant belong to the same HARQ process.
As an embodiment, the HARQ process associated with the first uplink grant is identified by the target integer, and the HARQ process associated with the second uplink grant is identified by the target integer.
As an embodiment, the second uplink grant is a UL grant after the first uplink grant.
As an example, the act "receiving a second uplink grant in response to the act, assuming that the first NDI has flipped" comprises: if the second uplink grant is received on the PDCCH for the target identity of the MAC entity (if the second uplink grant for the Serving Cell had been received on the PDCCH for the MAC entry's target identity), and if the second uplink grant is for the target identity of the MAC entity (if the second uplink grant for the MAC entry's second identity), and if the previous uplink grant of the same HARQ process that was submitted to the HARQ entity is an uplink grant for the source identity of the MAC entity (and the previous uplink grant delayed to the HARQ entry for the same HARQ process of the HARQ entity is for the MAC entity's source identity), not considering how much of the value of the NDI corresponds to the HARQ process of the MAC entry's first identifier (if the HARQ process identifier is submitted to the HARQ process identifier of the HARQ process).
As a sub-embodiment of this embodiment, for section 5.4.1 of TS 38.321, the following is performed:
1> if an uplink grant for this Serving Cell has been received on the PDCCH for the MAC entity identity' or temporal C-RNTI or the target identity; or
1>if an uplink grant has been received in a Random Access Response:
2>if the uplink grant is for MAC entity's C-RNTI and if the previous uplink grant delivered to the HARQ entity for the same HARQ process was either an uplink grant received for the MAC entity's CS-RNTI or a configured uplink grant,or,
2>if the uplink grant received for the MAC entity's target identity and if the previous uplink grant delivered to the HARQ entity for the same HARQ process was an uplink grant received for the MAC entity’s source identity,or,
3>consider the NDI to have been toggled for the corresponding HARQ process regardless of the value of the NDI。
As an additional embodiment of this sub-embodiment, at least one of the source identity and the target identity is a C-RNTI in a serving cell of the first node U01.
As an additional embodiment of this sub-embodiment, the source identity is a C-RNTI.
As a lower embodiment of this dependent embodiment, the target identity is a C-RNTI of the first node U01 in the second cell.
As an additional embodiment of this sub-embodiment, the target identity is a C-RNTI.
As a lower embodiment of the dependent embodiment, the source identifier is a C-RNTI of the first node U01 in the second cell.
Example 7
Embodiment 7 illustrates a wireless signal transmission flow diagram according to yet another embodiment of the present application, as shown in fig. 7. It is specifically noted that the order in this example does not limit the order of signal transmission and the order of implementation in this application.
For theFirst node U01In step S7101, receiving a first signaling, where the first signaling indicates a target identifier; in step S7102, monitoring a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; receiving second signaling, which is used to indicate a second PCI, in step S7103; in step S7104, in response to receiving the second signaling as the behavior, monitor a second PDCCH and abandon monitoring the first PDCCH, the second PDCCH being associated with a second downlink RS resource, the second downlink RS resource being associated with the second PCI; in step S7105, in response to the behavior receiving the second signaling, a first counter is cleared; in step S7106, in response to the behavior receiving the second signaling, regarding the first secondary cell as a deactivated state; in step S7107, in response to the behavior receiving the second signaling, the C-RNTI is set as the target identity.
ForSecond node N02In step S7201, the second signaling is transmitted.
In embodiment 7, the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI; the first counter is maintained at the MAC layer; the first secondary cell and the cell identified by the first PCI belong to the same cell group.
As an embodiment, the behavior receives a second signaling trigger to clear the first counter.
As an embodiment, the act of receiving second signaling triggers the act of considering the first secondary cell as a deactivated state.
As an embodiment, the behavior receiving the second signaling triggers the behavior to set the C-RNTI to the target identity.
As an embodiment, the behavior receives a second signaling to trigger the behavior to monitor a second PDCCH and abandon monitoring of a first PDCCH, or the behavior clears a first counter, or the behavior regards a first secondary cell as a deactivated state, or the behavior sets a C-RNTI to at least one of target identifiers.
As an embodiment, a first receiver receives a first signaling, the first signaling indicating a target identity; monitoring a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; receiving second signaling, the second signaling being used to indicate a second PCI; in response to receiving the second signaling as a result of the behavior, treating the first secondary cell as a deactivated state, and monitoring a second PDCCH associated with a second downlink RS resource associated with the second PCI and abandoning monitoring of the first PDCCH; wherein the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI (radio network temporary identifier); the first secondary cell and the cell identified by the first PCI belong to the same cell group.
As an embodiment, the first secondary cell is an SCell.
As an embodiment, the first secondary cell is an SCell in an MCG.
As an embodiment, the first secondary cell is an SCell in an SCG.
As an embodiment, the first secondary cell is any one SCell in an MCG.
As an embodiment, the first secondary cell is any one SCell in an SCG.
As one embodiment, the act of considering the first secondary cell as a deactivated state includes: and if the first auxiliary cell is in an activated state, converting the first auxiliary cell into the deactivated state.
As one embodiment, the act of considering the first secondary cell as a deactivated state includes: and if the first auxiliary cell is in the deactivation state, keeping the first auxiliary cell in the deactivation state.
As one embodiment, the act of considering the first secondary cell as a deactivated state includes: the first secondary cell performs a deactivated state of behavior regardless of whether the first secondary cell is in a deactivated state.
As one embodiment, the act of considering the first secondary cell as a deactivated state includes at least one of:
-stopping the sCellDeactivationTimer associated to the first secondary cell.
-stop the bwp-InactivetyTimer associated to the first secondary cell.
-deactivating any active BWP (any active BWP) associated to the first secondary cell.
-deleting the configured downlink assignment (configured downlink assignment) and the configured uplink grant Type2 (configured uplink grant Type 2) associated to said first secondary cell.
-delete PUSCH resources associated to semi-persistent CSI reporting of the first secondary cell.
-suspending a configured uplink grant Type1 (configured uplink grant Type 1) associated to said first secondary cell.
-flushing all HARQ buffers (buffers) associated to the first secondary cell.
-cancel a consecutive LBT failure triggered for the first secondary cell if there are consecutive LBT failures triggered for the first secondary cell.
As one embodiment, the act of considering the first secondary cell as a deactivated state includes: not transmitting an SRS on the first secondary cell.
As one embodiment, the act of considering the first secondary cell as a deactivated state includes: reporting no CSI on the first auxiliary cell.
As one embodiment, the act of considering the first secondary cell as a deactivated state includes: not transmitting on the UL-SCH on the first secondary cell.
As one embodiment, the act of considering the first secondary cell as a deactivated state includes: not transmitting on the RACH on the first secondary cell.
As one embodiment, the act of considering the first secondary cell as a deactivated state includes: not monitoring a PDCCH on the first secondary cell.
As one embodiment, the act of considering the first secondary cell as a deactivated state includes: not monitoring a PDCCH for the first secondary cell.
As one embodiment, the act of considering the first secondary cell as a deactivated state includes: not transmitting PUCCH on the first secondary cell.
As one embodiment, the first secondary cell includes an SCell.
As an embodiment, the same cell group is an MCG.
As an embodiment, the same cell group is one SCG.
As an embodiment, the phrase that the first secondary cell and the cell identified by the first PCI belong to the same group of cells includes: the first secondary cell and the cell identified by the first PCI are two cells in the same group of cells.
As an embodiment, the phrase that the first secondary cell and the cell identified by the first PCI belong to the same group of cells includes: the first secondary cell and the cell identified by the first PCI are configured with the same cellGroupId.
As an embodiment, the cell identified by the first PCI is a PCell of an MCG, and the first secondary cell is an SCell of the MCG.
As an embodiment, the cell identified by the first PCI is a PSCell of one SCG, and the first secondary cell is an SCell of the one SCG.
As an embodiment, the first secondary cell and the cell identified by the second PCI belong to different TAGs.
As an embodiment, the first secondary cell and the cell identified by the second PCI belong to the same TAG.
As an embodiment, a first receiver receives a first signaling, the first signaling indicating a target identity; monitoring a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; receiving second signaling, the second signaling being used to indicate a second PCI; setting the C-RNTI to a value of the target identifier in response to receiving a second signaling as the behavior, and monitoring a second PDCCH associated with a second downlink RS resource associated with the second PCI and abandoning monitoring of the first PDCCH; wherein the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; the second PDCCH is scrambled using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
As an embodiment, the act of setting the C-RNTI to the target identity includes: and setting the C-RNTI as the value of the target identifier.
As an embodiment, the act of setting the C-RNTI to the target identity includes: and setting the C-RNTI as the value of the target identifier.
As an embodiment, the act of setting the C-RNTI to the target identity includes: and modifying the C-RNTI from the source identifier to the target identifier at the MAC layer.
As an embodiment, the act of setting the C-RNTI to the target identity includes: and modifying the C-RNTI from the source identifier to the target identifier at the PHY layer.
As an embodiment, C-RNTI is set as the target identity at the MAC layer.
As an embodiment, C-RNTI is set as the target identity at the PHY layer.
As an embodiment, the C-RNTI is a C-RNTI in an MAC entity corresponding to the cell group to which the cell identified by the first PCI belongs by the first node U01.
As an embodiment, the C-RNTI is a C-RNTI in an MAC entity corresponding to a cell group to which the first cell belongs by the first node U01.
As an embodiment, the C-RNTI is a C-RNTI of the first node U01 in a MAC entity corresponding to the MCG.
As an embodiment, the C-RNTI is a C-RNTI of the first node U01 in a MAC entity corresponding to the SCG.
As an embodiment, the C-RNTI is maintained by the MAC entity corresponding to the cell group to which the cell identified by the first PCI belongs by the first node U01.
As an embodiment, the C-RNTI is associated with a group of cells to which the cell identified by the first PCI belongs.
As an embodiment, the C-RNTI corresponds to a cell group to which the cell identified by the first PCI belongs.
As an embodiment, the C-RNTI is an identity of the first node U01 in the first cell group.
As an embodiment, the C-RNTI is a value of the source identity immediately before the behavior sets the C-RNTI to the target identity, and the C-RNTI is a value of the target identity immediately after the behavior sets the C-RNTI to the target identity.
As an embodiment, just before the act sets the C-RNTI to the target identity, the first node U01 monitors the first PDCCH; the first node U01 monitors the second PDCCH right after the behavior sets the C-RNTI to the target identity.
As an embodiment, a first receiver receives a first signaling, the first signaling indicating a target identity; monitoring a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; receiving second signaling, the second signaling being used to indicate a second PCI; resetting the first counter in response to receiving the second signaling in said behavior, and monitoring the second PDCCH associated with the second downlink RS resource associated with the second PCI and abandoning monitoring the first PDCCH; wherein the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the first counter is maintained at the MAC layer.
As one embodiment, the phrase receiving second signaling in response to the action comprises: when the second signaling is received.
As one embodiment, the phrase receiving second signaling in response to the action comprises: if the second signaling is received.
As one embodiment, the phrase receiving second signaling in response to the action comprises: if the MAC entity receives the second signaling.
As one embodiment, the phrase receiving second signaling in response to the action comprises: if the MAC entity receives the second signaling.
As one embodiment, the act of clearing the first counter comprises: setting the first counter to 0.
As one embodiment, the act of clearing the first counter comprises: setting a value of the first counter to 0.
As one embodiment, the act of clearing the first counter comprises: resetting the first counter.
As one embodiment, the act of clearing the first counter comprises: setting the first counter to an initial value.
As one embodiment, the act of clearing the first counter comprises: initializing the first counter, wherein the initial value of the first counter is 0.
As one embodiment, the phrase the first counter is maintained at a MAC layer includes: the first counter is a MAC layer counter.
As one embodiment, the phrase the first counter is maintained at a MAC layer includes: the first counter is maintained at the MAC entity.
As an embodiment, the first counter is a counter of beam failure instance indication (beam failure instance indication), and an initial value of the first counter is set to 0.
As an embodiment, the first counter is used to count the number of beam failure instance indications.
As an embodiment, the first counter is a counter of LBT (Listen Before Talk) failure indication (LBT failure indication), and an initial value of the first counter is set to 0.
As an embodiment, the first counter is used to count the number of LBT failure indications.
As an embodiment, the beam failure instance indication is indicated by the physical layer to the MAC layer.
For one embodiment, the first COUNTER is BFI _ COUNTER.
As an embodiment, the first COUNTER is LBT _ COUNTER.
As an embodiment, the first timer is stopped in response to the act receiving the second signaling, the first timer being maintained at a MAC layer.
As an embodiment, in response to receiving the second signaling, the behavior clears the first counter and stops the first timer; the first counter is maintained at the MAC layer and the first timer is maintained at the MAC layer.
For one embodiment, the first timer comprises an lbt-FailureDetectionTimer.
For one embodiment, the first timer includes a beamFailureDetectionTimer.
As one embodiment, the first timer is an lbt-FailureDetectionTimer.
As an embodiment, the first timer is a beamFailureDetectionTimer.
As an embodiment, the dashed box F7.1 is optional.
As an example, the dashed box F7.1 exists.
As an example, the dashed box F7.1 is not present.
As an embodiment the dashed box F7.2 is optional.
As an example, the dashed box F7.2 exists.
As an example, the dashed box F7.2 is not present.
As an embodiment the dashed box F7.3 is optional.
As an example, the dashed box F7.3 exists.
As an example, the dashed box F7.3 is not present.
As an embodiment, at least one of the dashed box F7.1, or the dashed box F7.2, or the dashed box F7.3 is present.
Example 8
Embodiment 8 illustrates a wireless signal transmission flow chart according to yet another embodiment of the present application, as shown in fig. 8. It is specifically noted that the order in this example does not limit the order of signal transmission and the order of implementation in this application.
For theFirst node U01In step S8101, a first signaling is received, where the first signaling indicates a target identifier; in step S8102, a first PDCCH is monitored, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; receiving second signaling, which is used to indicate a second PCI, in step S8103; in step S8104, in response to receiving the second signaling as the behavior, monitor a second PDCCH and abandon monitoring the first PDCCH, the second PDCCH being associated with a second downlink RS resource, the second downlink RS resource being associated with the second PCI; in step S8105, clearing the first counter as a response to the behavior receiving the second signaling; in step S8106, a first type of reference signal is received, the first type of reference signal being associated to the second PCI, a measurement for the first type of reference signal being used to determine to update the first counter; in step S8107, the first counter reaches a first value; in step S8108, when the first counter reaches a first value, a first random access procedure is initiated; in step S8109, in response to the behavior initiating a first random access procedure, sending a first wireless signal, the first wireless signal being associated with the first PCI; in step S8110, a first RAR is received; in step S8111, a second wireless signal is transmitted, where the second wireless signal includes the source identifier.
For theSecond node N02In step S8201, the first signaling is sent; in step S8202, the second signaling is sent; in step S8203, receiving the first wireless signal; in step S8204, the first RAR is sent; in step S8205, the second wireless signal is received.
For theFourth node N04In step S8401, the first type reference signal is transmitted.
In embodiment 8, the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI; the first counter is maintained at the MAC layer; the first numerical value is a positive integer; the first class of reference signals is independent of the first PCI; the second wireless signal belongs to the first random access procedure; the second wireless signal is transmitted after the first wireless signal.
As an embodiment, the cell identified by the first PCI is the first cell; the cell identified by the second PCI is the second cell.
As one embodiment, the first COUNTER is BFI _ COUNTER.
As one embodiment, the phrase associating the first class of reference signals to the second PCI includes: the first type of reference signal is only for the cells identified by the second PCI.
As one embodiment, the phrase associating the first class of reference signals to the second PCI includes: the first type of reference signal is configured for the cell identified by the second PCI.
As one embodiment, the phrase associating the first class of reference signals to the second PCI includes: the first type of reference signal is transmitted by a maintaining base station of the cell identified by the second PCI.
As one embodiment, the phrase associating the first class of reference signals to the second PCI includes: the first type of reference signal is specific to the cell identified by the second PCI.
As an embodiment, the reference signals of the first type are used for beam measurement.
As an embodiment, the reference signals of the first type are used for L1 measurements.
As an embodiment, the first type of reference signal Beam Failure Detection (BFD).
As an embodiment, the first type of reference signal is a physical layer signal.
As an embodiment, the first type of reference signal is cell-specific.
As an embodiment, the first type of reference signals are beam-specific.
As an embodiment, the first type of reference signal is a periodic signal.
As an embodiment, the first type of reference signal is antenna port specific.
As an embodiment, the reference signals of the first type are associated to one beam.
As an embodiment, the first type of reference signal is associated to one beam of the first cell.
As an embodiment, the first type of reference signal is associated to one beam of the second cell.
For one embodiment, the first type of reference signal includes SSB.
In one embodiment, the first type of reference signal includes a CSI-RS.
As one embodiment, the phrase, when the first counter reaches a first value, includes: if the first counter reaches a first value.
As one embodiment, the phrase, when the first counter reaches a first value, includes: if the first counter equals the first value.
As one embodiment, the phrase, when the first counter reaches a first value, includes: if the first counter is greater than the first value.
As one embodiment, the phrase, when the first counter reaches a first value, includes: if the first counter is not less than the first value.
As one embodiment, the act of initiating the first random access procedure includes: triggering the first random access procedure.
As one embodiment, the act of initiating a first random access procedure comprises: the first random access procedure is initiated.
As one embodiment, the act of initiating a first random access procedure comprises: section 5.1.1 or section 5.1.1a in TS 38.321 begins to be executed.
As one embodiment, the act of initiating the first random access procedure includes: section 5.1.2 or section 5.1.2a in TS 38.321 begins to be executed.
As one embodiment, the initiation is initial.
As an embodiment, the first random access procedure refers to a random access procedure on the cell identified by the first PCI, which is a PCell or a PSCell.
As one embodiment, the first random access procedure is used for BFR.
As one embodiment, the first random access procedure is used to fallback to the cell identified by the first PCI.
As one embodiment, the phrase, in response to the behavior initiating the first random access procedure, includes: after the first random access procedure is triggered.
As one embodiment, the phrase, in response to the act initiating the first random access procedure, includes: when the first random access procedure is performed.
As one embodiment, the phrase, in response to the act initiating the first random access procedure, includes: in the course of performing the first random access procedure.
As one embodiment, the first wireless signal includes at least a random access Preamble (Preamble).
As one embodiment, the first wireless signal is for a four-step random access procedure, the first wireless signal including only a random access preamble.
As one embodiment, the first wireless signal is for a two-step random access procedure, the first wireless signal including a random access preamble.
As one embodiment, the first wireless signal is for a two-step random access procedure, the first wireless signal including a random access preamble and a PUSCH transmission.
As a sub-embodiment of this embodiment, the PUSCH transmission includes one MAC CE.
As a sub-embodiment of this embodiment, the PUSCH transmission comprises one C-RNTI MAC CE.
As an adjunct embodiment to the sub-embodiment, the PUSCH transmission comprises the second wireless signal.
As an additional embodiment of this sub-embodiment, the PUSCH transmission is the second radio signal.
As a sub-embodiment of this embodiment, the first wireless signal is an MSGA.
For one embodiment, the first value is configurable.
As an embodiment, the first value is pre-configured.
As an embodiment, the first value is configured by an RRC message.
As an embodiment, the first value is configured for the cell identified by the second PCI.
For one embodiment, the phrase that the first class of reference signals is independent of the first PCI comprises: the first type of reference signal is independent of the cell identified by the first PCI.
For one embodiment, the phrase that the first class of reference signals is independent of the first PCI includes: any reference signal in the first class of reference signals is different from any reference signal in the cell identified by the first PCI.
For one embodiment, the phrase that the first class of reference signals is independent of the first PCI comprises: any reference signal in the first class of reference signals is not associated with any reference signal in a cell identified by the first PCI.
For one embodiment, the second wireless signal includes MSG3.
For one embodiment, the second wireless signal includes a MAC PDU.
For one embodiment, the second wireless signal includes a MAC subheader.
As an embodiment, the second radio signal comprises a C-RNTI MAC CE.
In one embodiment, the second radio signal is transmitted via a UL-SCH.
For one embodiment, the phrase the second wireless signal including the source identification includes: the second wireless signal indicates the source identification.
For one embodiment, the phrase the second wireless signal including the source identification includes: one field in the second wireless signal indicates the source identification.
For one embodiment, the phrase the second wireless signal including the source identification includes: the second wireless signal is C-RNTI MAC CE, and a C-RNTI domain in the C-RNTI MAC CE indicates the source identification.
As one embodiment, the phrase the second wireless signal belongs to the first random access procedure includes: the second wireless signal is a signal in the first random access procedure.
As one embodiment, the phrase the second wireless signal belongs to the first random access procedure includes: the second wireless signal is transmitted in the first random access procedure.
As one embodiment, the phrase the second wireless signal belongs to the first random access procedure includes: the uplink resource used by the second wireless signal is indicated by a RAR received in the first random access procedure.
As an embodiment, the first RAR is a MAC RAR.
As an example, the first RAR is a fallback RAR.
As an embodiment, the first RAR is a success RAR.
As an embodiment, the first RAR is used to determine a UL grant of the second wireless signal.
As an embodiment, the dashed box F8.1 is optional.
As an example, the dashed box F8.1 exists.
As an example, the dashed box F8.1 is not present.
As an embodiment, the dashed box F8.2 is optional.
As an example, the dashed box F8.2 exists.
As an example, the dashed box F8.2 is not present.
As an embodiment, the dashed box F8.3 is optional.
As an example, the dashed box F8.3 exists.
As an example, the dashed box F8.3 is not present.
As an embodiment, the dashed box F8.2 is not present, and the dashed box F8.3 is not present.
As a sub-embodiment of this embodiment, the first wireless signal is for a four-step random access procedure, and the first wireless signal includes only a random access preamble.
As a sub-embodiment of this embodiment, the first wireless signal is for a two-step random access procedure, the first wireless signal comprising a random access preamble.
As a sub-embodiment of this embodiment, the first RAR is not successfully received.
As a sub-embodiment of this embodiment, the first RAR is not sent.
As a sub-embodiment of this embodiment, the first wireless signal is not received by the second node N02.
As an example, the dashed box F8.2 exists, and the dashed box F8.3 exists.
As a sub-embodiment of this embodiment, the first wireless signal is for a four-step random access procedure, and the first wireless signal includes only a random access preamble.
As a sub-embodiment of this embodiment, the second wireless signal includes MSG3.
As an embodiment, the dashed box F8.2 is not present and the dashed box F8.3 is present.
As a sub-embodiment of this embodiment, the first radio signal is for a two-step random access procedure.
As a sub-embodiment of this embodiment, the first wireless signal includes a random access preamble and the second wireless signal.
As a sub-embodiment of this embodiment, the second wireless signal is part of the first wireless signal.
Example 9
Embodiment 9 illustrates a schematic diagram that the first secondary cell and the cell identified by the second PCI belong to different TAGs according to an embodiment of the present application, as shown in fig. 9.
In embodiment 9, a first signaling is received, the first signaling indicating a target identifier; monitoring a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; receiving second signaling, the second signaling being used to indicate a second PCI; in response to receiving a second signaling in response to the behavior, monitor a second PDCCH associated with a second downlink RS resource associated with the second PCI and forgo monitoring the first PDCCH; considering the first secondary cell as a deactivated state in response to the behavior receiving the second signaling; wherein the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; the second PDCCH is scrambled using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI (radio network temporary identifier); the first auxiliary cell and the cell identified by the first PCI belong to the same cell group; the first secondary cell and the cell identified by the second PCI belong to different TAGs.
As an embodiment, an uplink transmission timing (uplink transmission timing) of the first node in the first auxiliary cell is different from an uplink transmission timing of the first node in a cell associated with the target identifier.
As an embodiment, the first secondary cell and the cell associated with the target identity belong to different TAGs.
As an embodiment, the cells associated with the first secondary cell and the target identity are configured in different TAGs.
As an embodiment, when the first secondary cell and the cell associated with the target identity belong to different TAGs, the first secondary cell is considered to be in a deactivated state in response to the behavior receiving the second signaling.
As an embodiment, the status of the first secondary cell is maintained in response to the behavior receiving second signaling when the first secondary cell and the cell associated with the target identity belong to the same TAG.
As a sub-embodiment of this embodiment, the act of maintaining the state of the first secondary cell comprises: the state of the first secondary cell does not change.
As a sub-embodiment of this embodiment, the act of maintaining the state of the first secondary cell comprises: the state of the first secondary cell is an active state if immediately before the act receives second signaling, and the state of the first secondary cell is an active state immediately after the act receives second signaling.
As a sub-embodiment of this embodiment, the act of maintaining the state of the first secondary cell comprises: the state of the first secondary cell is a deactivated state if immediately before the act of receiving second signaling, and the state of the first secondary cell is a deactivated state immediately after the act of receiving second signaling.
Example 10
Embodiment 10 illustrates a schematic diagram of a relationship between a second node and a fourth node according to an embodiment of the present application, as shown in fig. 10.
As an embodiment, the second node comprises at least the first TRP1002.
As an embodiment, the first TRP1002 belongs to the first DU1004.
As an embodiment, the first TRP1002 is a portion in the second node.
As an embodiment, the first TRP1002 belongs to the first cell 1006.
As an embodiment, said second node comprises said first DU1004.
As an embodiment, the first DU1004 includes one CU.
As an example, the first DU1004 includes one DU.
As an embodiment, the first DU1004 includes part of the second node.
As an embodiment, said fourth node comprises at least said second TRP1003.
As an embodiment, the second TRP1003 belongs to the second DU1005.
As an embodiment, the second TRP1003 is part of the fourth node.
As an embodiment, the second TRP1003 belongs to the second cell 1007.
As an embodiment, said fourth node comprises said second DU1005.
As an embodiment, the second DU1005 includes one CU.
As an embodiment, the second DU1005 includes one DU.
As an embodiment, said second DU1005 includes part of said fourth node.
As an embodiment, the first DU1004 and the second DU1005 are the same DU.
As an embodiment, the first DU1004 and the second DU1005 are two different DUs.
As an embodiment, the beam of the first TRP1002 and the beam of the second TRP1003 correspond to the same CORESET.
As an embodiment, the beam of the first TRP1002 and the beam of the second TRP1003 correspond to different CORESET.
For one embodiment, the first cell 1006 includes one or more beams in the second node.
For one embodiment, the first cell 1006 includes one or more beams of a first TRP1002.
For one embodiment, the first cell 1006 is associated with a second node.
For one embodiment, the maintaining base station of the first cell 1006 is the second node.
As an embodiment, the first cell 1006 is a primary cell of the first node, and the second cell 1007 is a neighboring cell of the primary cell of the first node.
For one embodiment, the first cell 1006 is a physical cell.
As an embodiment, the first cell 1006 belongs to the serving cell of the first node 1001, and the second cell 1007 does not belong to the serving cell of the first node 1001.
For one embodiment, the first cell 1006 is a SpCell of the first node.
As an embodiment, the first downlink RS resource belongs to the first cell 1006.
As an embodiment, the first downlink RS resource corresponds to at least one beam of the first TRP1002.
For one embodiment, the first downlink RS resource is associated with the first cell 1006.
For one embodiment, the first PCI is used to identify the first cell 1006.
For one embodiment, the second cell 1007 includes one or more beams in a fourth node.
For one embodiment, the second cell 1007 includes one or more beams of a second TRP1003.
For one embodiment, the second cell 1007 is associated with a fourth node.
As an embodiment, the maintaining base station of the second cell 1007 is the fourth node.
As an embodiment, the second cell 1007 is a physical cell.
For an embodiment, when the second cell 1007 is configured, the first node 1001 maintains an RRC connection with the first cell 1006; when the second cell 1007 is applied, the serving cell id of the first node 1001 is unchanged.
As an embodiment, the second downlink RS resource belongs to the second cell 1007.
As an embodiment, the second downlink RS resource corresponds to at least one beam of the second TRP1003.
As an embodiment, the second downlink RS resource is associated to the second cell 1007.
As an embodiment, the second PCI is used to identify the second cell 1007.
As an embodiment, the first cell 1006 and the second cell 1007 are co-frequency.
As an embodiment, the first cell 1006 and the second cell 1007 are inter-frequency.
As an embodiment, the cell identified by the first PCI is the first cell 1006; the cell identified by the second PCI is the second cell 1007.
As an embodiment, the cell identified by the first PCI is the second cell 1007; the cell identified by the second PCI is the first cell 1006.
As an embodiment, the first cell 1006 comprises a serving cell of the first node 1001, and the second cell 1007 comprises a non-serving cell of the first node 1001.
As an embodiment, the first cell 1006 comprises a serving cell of the first node 1001, and the second cell 1007 comprises a neighboring cell of the first cell 1006.
As an embodiment, there is an RRC connection between the first node 1001 and the first cell 1006, and there is no RRC connection between the first node 1001 and the second cell 1007.
As an embodiment, the first PDCCH is transmitted by a maintaining base station of the second cell 1007; the second PDCCH is transmitted by the maintaining base station of the first cell 1006.
As an embodiment, the first PDCCH is transmitted by the second TRP 1003; the second PDCCH is transmitted by the first TRP1002.
As an example, the first PDCCH is transmitted by a maintaining base station of the first cell 1006; the second PDCCH is transmitted by a maintaining base station of the second cell 1007.
As an embodiment, the first PDCCH is transmitted by the first TRP 1002; the second PDCCH is transmitted by the second TRP1003.
Arrow 1008 represents at least one of a BCCH, or a paging signal, or system information, for one embodiment.
Arrow 1009 represents at least one of PUSCH or PDSCH or PDCCH, as an embodiment.
As an embodiment, arrow 1010 represents at least one of a PUSCH or PDSCH or PDCCH.
As one embodiment, one of the arrow 1009 and the arrow 1010 is present.
As an example, arrow 1009 and arrow 1010 are not present at the same time.
For one embodiment, arrow 1009 includes the first PDCCH, and arrow 1010 includes the second PDCCH.
For one embodiment, the arrow 1009 includes the first uplink grant, and the arrow 1010 includes the second uplink grant.
As an embodiment, arrow 1009 includes the second PDCCH, and arrow 1010 includes the first PDCCH.
For one embodiment, the arrow 1009 includes the second uplink grant, and the arrow 1010 includes the first uplink grant.
As an embodiment, the first node 1001 determines physical resources between the first cell 1006 and the second cell 1007 through the second signaling.
As an example, the serving cell of the first node 1001 remains unchanged as the first node 1001 moves between the first cell 1006 and the second cell 1007.
As a sub-embodiment of this embodiment, the phrase that the serving cell of the first node 1001 remains unchanged includes: a protocol stack (protocol stack) of at least one of the RRC layer, or PDCP layer, or RLC layer, or MAC layer, or PHY layer of the first node 1001 does not need to be relocated (relocation).
As a sub-embodiment of this embodiment, the phrase that the serving cell of the first node 1001 remains unchanged includes: the RRC connection of the first node 1001 remains unchanged.
As a sub-embodiment of this embodiment, the phrase that the serving cell of the first node 1001 remains unchanged includes: the serving cell identity of the first node 1001 remains unchanged.
As a sub-embodiment of this embodiment, the phrase that the serving cell of the first node 1001 remains unchanged includes: all or part of the ServingCellConfigCommon configuration of the first node 1001 remains unchanged.
As a sub-embodiment of this embodiment, the phrase that the serving cell of the first node 1001 remains unchanged includes: all or part of the ServingCellConfigCommonSIB configuration of the first node 1001 remains unchanged.
As an embodiment, the serving cell refers to a PCell or a PSCell or an SCell.
As a sub-embodiment of this embodiment, the PCell refers to a cell operating at a primary frequency (primary frequency), and the first node 1001 performs an initial connection establishment procedure or initiates a connection re-establishment procedure on the PCell.
As a sub-embodiment of this embodiment, the PSCell refers to an SCG cell in which, for the first node 1001 configured with a dual connectivity operation (dual connectivity operation), the first node 1001 performs a random access procedure when performing a synchronization reconfiguration procedure.
As a sub-embodiment of this embodiment, the SCell refers to a cell that provides additional radio resources over an SpCell for the first node 1001 configured with CA.
For one embodiment, the serving cell includes the first cell 1006.
As an example, the second cell 1007 provides additional physical resources above the serving cell.
As an embodiment, the first node 1001 does not have a separate MAC entity for the second cell 1007.
As an embodiment, the first node 1001 does not have a separate MAC process for the second cell 1007.
As an embodiment, the MAC entity of the first node 1001 has no separate HARQ entity for the second cell 1007.
As an embodiment, the MAC entity of the first node 1001 includes one HARQ entity for the first cell 1006 and the second cell 1007.
As an embodiment, the MAC entity of the first node 1001 shares the same HARQ entity for the first cell 1006 and the second cell 1007.
As an embodiment, the first cell 1006 and the second cell 1007 are associated to the same HARQ entity.
Example 11
Embodiment 11 illustrates a block diagram of a processing apparatus for use in a first node according to an embodiment of the present application; as shown in fig. 11. In fig. 11, a processing means 1100 in a first node comprises a first receiver 1101 and a first transmitter 1102.
A first receiver 1101 that receives a first signaling, the first signaling indicating a target identity; monitoring a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; receiving second signaling, the second signaling being used to indicate a second PCI; in response to receiving a second signaling for the behavior, monitor a second PDCCH associated with a second downlink RS resource associated with the second PCI and forgo monitoring the first PDCCH;
in embodiment 11, the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled by using a source identifier; the second PDCCH is scrambled using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
As an embodiment, the first receiver 1101, in response to the act receiving second signaling, treats the first secondary cell as a deactivated state; wherein the first secondary cell and the cell identified by the first PCI belong to the same cell group.
As an embodiment, the first secondary cell and the cell identified by the second PCI belong to different TAGs.
As an embodiment, the first receiver 1101, in response to the behavior receiving the second signaling, sets C-RNTI to the target identity.
For an embodiment, the first receiver 1101 receives a first uplink grant and a second uplink grant, where the first uplink grant is associated with the source identifier and the second uplink grant is associated with the destination identifier; in response to receiving the first uplink grant and the second uplink grant as the behavior, consider that the first NDI has flipped; wherein the first uplink grant and the second uplink grant are associated to the same HARQ process; and the receiving time of the first uplink grant is earlier than the receiving time of the second uplink grant.
In one embodiment, the first receiver 1101, in response to receiving the second signaling by the behavior, clears a first counter; the first counter is maintained at the MAC layer.
For one embodiment, the first receiver 1101 receives a first type of reference signal, the first type of reference signal being associated with the second PCI, a measurement for the first type of reference signal being used to determine to update the first counter; a first transmitter 1102, which initiates a first random access procedure when the first counter reaches a first value; sending a first wireless signal in response to the behavior initiating a first random access procedure, the first wireless signal associated with the first PCI; wherein the first numerical value is a positive integer; the first type of reference signal is independent of the first PCI.
For one embodiment, the first transmitter 1102 transmits a second wireless signal, the second wireless signal including the source identifier; wherein the second wireless signal belongs to the first random access procedure; the second wireless signal is transmitted after the first wireless signal.
For one embodiment, the first receiver 1101 includes the antenna 452, the receiver 454, the multi-antenna receive processor 458, the receive processor 456, the controller/processor 459, the memory 460, and the data source 467 of fig. 4 of the present application.
For one embodiment, the first receiver 1101 includes the antenna 452, the receiver 454, the multi-antenna receive processor 458, and the receive processor 456 of fig. 4.
For one embodiment, the first receiver 1101 includes the antenna 452, the receiver 454, and the receive processor 456 of fig. 4.
The first transmitter 1102, for one embodiment, includes the antenna 452, the transmitter 454, the multi-antenna transmit processor 457, the transmit processor 468, the controller/processor 459, the memory 460, and the data source 467 of fig. 4 of the present application.
For one embodiment, the first transmitter 1102 includes the antenna 452, the transmitter 454, the multi-antenna transmit processor 457 and the transmit processor 468 of fig. 4.
For one embodiment, the first transmitter 1102 includes the antenna 452, the transmitter 454, and the transmit processor 468 of fig. 4.
Example 12
Embodiment 12 illustrates a block diagram of a processing apparatus for use in a second node according to an embodiment of the present application; as shown in fig. 12. In fig. 12, the processing means 1200 in the second node comprises a second transmitter 1201 and a second receiver 1202.
A second transmitter 1201, configured to transmit a first signaling, where the first signaling indicates a target identifier; transmitting a first PDCCH associated to a first downlink RS resource associated to a first PCI; sending second signaling, wherein the second signaling is used for indicating a second PCI;
in embodiment 12, in response to the second signaling being received, a second PDCCH is monitored and the first PDCCH is discarded from monitoring, the second PDCCH being associated with a second downlink RS resource associated with the second PCI; the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
As an embodiment, the second PDCCH is transmitted by a maintaining base station of the cell identified by the second PCI.
As an embodiment, the first secondary cell is considered to be in a deactivated state in response to the second signaling being received; wherein the first secondary cell and the cell identified by the first PCI belong to the same cell group.
As an embodiment, the first secondary cell and the cell identified by the second PCI belong to different TAGs.
As an embodiment, C-RNTI is set to the target identity in response to the second signaling being received.
As an embodiment, the C-RNTI is set as the target identity in a MAC entity of a recipient of the second signaling.
For an embodiment, the second transmitter 1201 sends a first uplink grant, where the first uplink grant is associated with the source identifier; wherein the first NDI is considered to have flipped in response to the first and second uplink grants being received; the second uplink grant is associated with the target identifier; the first uplink grant and the second uplink grant are associated to the same HARQ process; and the receiving time of the first uplink grant is earlier than the receiving time of the second uplink grant.
As an embodiment, the first NDI is considered by a recipient of the second signaling to have been flipped.
As an embodiment, the first counter is cleared in response to the second signaling being received; the first counter is maintained at the MAC layer.
As an embodiment, the first counter is cleared by a MAC entity of a receiver of the second signaling.
As an embodiment, the second receiver 1202 receives a first wireless signal, the first wireless signal being associated with the first PCI; wherein a first type of reference signal is received, the first type of reference signal being associated to the second PCI, a measurement for the first type of reference signal being used to determine to update the first counter; when the first counter reaches a first value, a first random access procedure is initiated; in response to the first random access procedure being initiated, the first wireless signal is transmitted; the first numerical value is a positive integer; the first type of reference signal is independent of the first PCI.
As an embodiment, the reference signals of the first type are received by a receiver of the second signaling.
As an embodiment, the first random access procedure is sent by a receiver of the second signaling.
As one embodiment, the first wireless signal is sent by a recipient of the second signaling.
For one embodiment, the second receiver 1202 receives a second wireless signal, the second wireless signal including the source identifier; wherein the second wireless signal belongs to the first random access procedure; the second wireless signal is transmitted after the first wireless signal.
For one embodiment, the second transmitter 1201 includes the antenna 420, the transmitter 418, the multi-antenna transmit processor 471, the transmit processor 416, the controller/processor 475, and the memory 476 of fig. 4.
For one embodiment, the second transmitter 1201 includes the antenna 420, the transmitter 418, the multi-antenna transmit processor 471 and the transmit processor 416 shown in fig. 4.
The second transmitter 1201 includes, for one embodiment, the antenna 420, the transmitter 418, and the transmit processor 416 of fig. 4.
For one embodiment, the secondary receiver 1202 includes the antenna 420, receiver 418, multi-antenna receive processor 472, receive processor 470, controller/processor 475, and memory 476 of fig. 4.
For one embodiment, the second receiver 1202 includes the antenna 420, the receiver 418, the multi-antenna receive processor 472, and the receive processor 470 shown in fig. 4.
For one embodiment, the second receiver 1202 includes the antenna 420, the receiver 418, and the receive processor 470 shown in fig. 4.
Example 13
Embodiment 13 illustrates a wireless signal transmission flow diagram in which receiving a first uplink grant and a second uplink grant is used to determine that a first NDI is considered to be not flipped according to an embodiment of the present application, as shown in fig. 13. It is specifically noted that the order in this example does not limit the order of signal transmission and the order of implementation in this application.
For theFirst node U01In step S13101, receiving a first signaling, where the first signaling indicates a target identifier; in step S13102, a first uplink grant is received, where the first uplink grant is associated with the source identifier; in step S13103, monitor a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; in the step S13104, in this step,receiving second signaling, the second signaling being used to indicate a second PCI; in step S13105, in response to receiving the second signaling as the behavior, monitor a second PDCCH and abandon monitoring the first PDCCH, the second PDCCH being associated with a second downlink RS resource, the second downlink RS resource being associated with the second PCI; in step S13106, a second uplink grant is received, where the second uplink grant is associated with the target identifier; in step S13107, the first NDI is considered not to be flipped in response to the behavior receiving the first uplink grant and the second uplink grant.
ForSecond node N02In step S13201, the first uplink grant is sent; in step S13202, the second signaling is sent.
ForFourth node N04In step S13401, the second uplink grant is transmitted.
In embodiment 13, the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI (radio network temporary identifier); the first uplink grant and the second uplink grant are associated to the same HARQ process; and the receiving time of the first uplink grant is earlier than the receiving time of the second uplink grant.
As an example, the meaning of the act "receiving the first uplink grant and the second uplink grant as a response to the act, assuming that the first NDI is not flipped" includes: considering the first NDI not to be flipped regardless of whether the value of the first NDI provided in the HARQ information associated with the first uplink grant is different from the value of the first NDI provided in the HARQ information associated with the second uplink grant.
As an example, the meaning of the act "receiving the first uplink grant and the second uplink grant as a response to the act, assuming that the first NDI is not flipped" includes: in response to the act receiving the first uplink grant and the second uplink grant, consider the second uplink grant to be used for retransmission.
As an example, the act "receiving a second uplink grant in response to the act, assuming that the first NDI is not flipped" comprises: if the second uplink grant is received on the PDCCH for the target identity of the MAC entity, and if the second uplink grant is for the target identity of the MAC entity, and if a previous uplink grant of the same HARQ process submitted to the HARQ entity is for the source identity of the MAC entity, the NDI of the corresponding HARQ process is considered not to be flipped, regardless of the value of the NDI.
As an example, the act of considering that the first NDI is not flipped includes: the connector the first NDI not to have been bootgged.
As an example, the behavior recognizing that the first NDI is not flipped includes: the value of the first NDI is considered unchanged.
It will be understood by those skilled in the art that all or part of the steps of the above methods may be implemented by instructing relevant hardware through a program, and the program may be stored in a computer readable storage medium, such as a read-only memory, a hard disk or an optical disk. Alternatively, all or part of the steps of the above embodiments may be implemented by using one or more integrated circuits. Accordingly, the module units in the foregoing embodiments may be implemented in the form of hardware, or may be implemented in the form of software functional modules, and the present application is not limited to any specific combination of software and hardware. User equipment, terminal and UE in this application include but not limited to unmanned aerial vehicle, communication module on the unmanned aerial vehicle, remote control aircraft, the aircraft, small aircraft, the cell-phone, the panel computer, the notebook, vehicle Communication equipment, wireless sensor, the network card, thing networking terminal, the RFID terminal, NB-IOT terminal, MTC (Machine Type Communication) terminal, EMTC (enhanced MTC) terminal, the data card, the network card, vehicle Communication equipment, low-cost cell-phone, wireless Communication equipment such as low-cost panel computer. The base station or the system device in the present application includes, but is not limited to, a macro cell base station, a micro cell base station, a home base station, a relay base station, a gNB (NR node B) NR node B, a TRP (Transmitter Receiver Point), and other wireless communication devices.
The above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (11)

1. A first node configured for wireless communication, comprising:
a first receiver for receiving a first signaling, wherein the first signaling indicates a target identifier; monitoring a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI; receiving second signaling, the second signaling being used to indicate a second PCI; in response to receiving a second signaling in response to the behavior, monitor a second PDCCH associated with a second downlink RS resource associated with the second PCI and forgo monitoring the first PDCCH;
wherein the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; the second PDCCH is scrambled using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
2. The first node of claim 1, comprising:
the first receiver, in response to the act receiving the second signaling, treats the first secondary cell as a deactivated state;
wherein the first secondary cell and the cell identified by the first PCI belong to the same cell group.
3. The first node of claim 2, wherein the first secondary cell and the cell identified by the second PCI belong to different TAGs.
4. The first node according to any of claims 1 to 3, comprising:
the first receiver, as a response to the behavior receiving the second signaling, sets the C-RNTI as the target identifier.
5. The first node according to any of claims 1 to 4, comprising:
the first receiver receives a first uplink grant and a second uplink grant, wherein the first uplink grant is associated with the source identifier, and the second uplink grant is associated with the target identifier; in response to receiving the first uplink grant and the second uplink grant as the behavior, consider that the first NDI has flipped;
wherein the first uplink grant and the second uplink grant are associated to the same HARQ process; and the receiving time of the first uplink grant is earlier than the receiving time of the second uplink grant.
6. The first node according to any of claims 1 to 4, comprising:
the first receiver, as a response to the behavior receiving the second signaling, clears the first counter; the first counter is maintained at the MAC layer.
7. The first node of claim 6, comprising:
the first receiver receives a first type of reference signal, the first type of reference signal being associated with the second PCI, a measurement for the first type of reference signal being used to determine to update the first counter;
a first transmitter for initiating a first random access procedure when the first counter reaches a first value; sending a first wireless signal in response to the behavior initiating a first random access procedure, the first wireless signal associated with the first PCI;
wherein the first numerical value is a positive integer; the first type of reference signal is independent of the first PCI.
8. The first node of claim 7, comprising:
the first transmitter transmits a second wireless signal, wherein the second wireless signal comprises the source identifier;
wherein the second wireless signal belongs to the first random access procedure; the second wireless signal is transmitted after the first wireless signal.
9. A second node configured for wireless communication, comprising:
a second transmitter for transmitting a first signaling, the first signaling indicating a target identifier; transmitting a first PDCCH associated to a first downlink RS resource associated to a first PCI; sending second signaling, the second signaling being used to indicate a second PCI;
wherein, in response to the second signaling being received, a second PDCCH is monitored and the first PDCCH is relinquished to be monitored, the second PDCCH being associated to a second downlink RS resource, the second downlink RS resource being associated to the second PCI; the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
10. A method in a first node used for wireless communication, comprising:
receiving a first signaling, wherein the first signaling indicates a target identifier;
monitoring a first PDCCH, the first PDCCH being associated to a first downlink RS resource, the first downlink RS resource being associated to a first PCI;
receiving second signaling, the second signaling being used to indicate a second PCI;
in response to receiving a second signaling for the behavior, monitor a second PDCCH associated with a second downlink RS resource associated with the second PCI and forgo monitoring the first PDCCH;
wherein the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
11. A method in a second node used for wireless communication, comprising:
sending a first signaling, wherein the first signaling indicates a target identifier;
transmitting a first PDCCH associated to a first downlink RS resource associated to a first PCI;
sending second signaling, the second signaling being used to indicate a second PCI;
wherein, in response to the second signaling being received, a second PDCCH is monitored and the first PDCCH is relinquished to be monitored, the second PDCCH being associated to a second downlink RS resource, the second downlink RS resource being associated to the second PCI; the first signaling comprises an RRC message; the second signaling comprises signaling below an RRC layer; the first PDCCH is scrambled using a source identity; scrambling the second PDCCH using the target identity; the source identification and the target identification are different; the source identifier and the target identifier are respectively an RNTI.
CN202110766077.XA 2021-07-07 2021-07-07 Method and arrangement in a communication node used for wireless communication Pending CN115603873A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202110766077.XA CN115603873A (en) 2021-07-07 2021-07-07 Method and arrangement in a communication node used for wireless communication
PCT/CN2022/104045 WO2023280192A1 (en) 2021-07-07 2022-07-06 Method and apparatus in communication node used for wireless communication
US18/404,909 US20240147493A1 (en) 2021-07-07 2024-01-05 Method and device used in communication node for wireless communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110766077.XA CN115603873A (en) 2021-07-07 2021-07-07 Method and arrangement in a communication node used for wireless communication

Publications (1)

Publication Number Publication Date
CN115603873A true CN115603873A (en) 2023-01-13

Family

ID=84840644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110766077.XA Pending CN115603873A (en) 2021-07-07 2021-07-07 Method and arrangement in a communication node used for wireless communication

Country Status (1)

Country Link
CN (1) CN115603873A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024153034A1 (en) * 2023-01-20 2024-07-25 上海朗帛通信技术有限公司 Method and apparatus used in communication node for wireless communication
WO2024207386A1 (en) * 2023-04-06 2024-10-10 富士通株式会社 Method and apparatus for transmitting information in l1/l2 signaling

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024153034A1 (en) * 2023-01-20 2024-07-25 上海朗帛通信技术有限公司 Method and apparatus used in communication node for wireless communication
WO2024207386A1 (en) * 2023-04-06 2024-10-10 富士通株式会社 Method and apparatus for transmitting information in l1/l2 signaling

Similar Documents

Publication Publication Date Title
CN115603873A (en) Method and arrangement in a communication node used for wireless communication
CN115664473B (en) Method and apparatus in a node for wireless communication
CN114980369A (en) Method and arrangement in a communication node used for wireless communication
CN114258073A (en) Method and arrangement in a communication node used for wireless communication
CN114793372A (en) Method and arrangement in a communication node used for wireless communication
CN114641092A (en) Method and arrangement in a communication node used for wireless communication
CN112910615A (en) Method and apparatus in a node used for wireless communication
CN114337741B (en) Method and apparatus in a node used for wireless communication
CN114257274B (en) Method and apparatus in a node used for wireless communication
CN115119330A (en) Method and arrangement in a communication node used for wireless communication
CN114389770A (en) Method and arrangement in a communication node used for wireless communication
CN114698042A (en) Method and arrangement in a communication node used for wireless communication
CN114285533B (en) Method and apparatus in a node for wireless communication
WO2024104208A1 (en) Method and apparatus used in communication node for radio communication
WO2024183747A1 (en) Method and apparatus used in communication node for wireless communication
CN112994857B (en) Method and equipment used for wireless communication
WO2024017078A1 (en) Method and apparatus in communication node used in wireless communication
WO2024078434A1 (en) Method and apparatus used in communication node for radio communication
WO2024051626A1 (en) Method and device used in communication node for wireless communication
WO2024051560A1 (en) Method and apparatus used in communication node for wireless communication
WO2024208251A1 (en) Method used in communication node for wireless communication and apparatus
WO2024046155A1 (en) Method and apparatus used in communication node for wireless communication
CN112887065B (en) Method and equipment used for wireless communication
WO2024007870A1 (en) Method and apparatus used in communication node for wireless communication
CN116438773A (en) Method and apparatus in a communication node for wireless communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination