CN116325827A - Setting method, terminal equipment and network equipment - Google Patents

Setting method, terminal equipment and network equipment Download PDF

Info

Publication number
CN116325827A
CN116325827A CN202080105537.8A CN202080105537A CN116325827A CN 116325827 A CN116325827 A CN 116325827A CN 202080105537 A CN202080105537 A CN 202080105537A CN 116325827 A CN116325827 A CN 116325827A
Authority
CN
China
Prior art keywords
terminal device
priority
terminal
terminal equipment
sci
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202080105537.8A
Other languages
Chinese (zh)
Inventor
赵振山
张世昌
林晖闵
丁伊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN116325827A publication Critical patent/CN116325827A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling

Abstract

The embodiment of the application relates to a setting method, a terminal device and a network device, wherein the method comprises the steps that when a first terminal device sends sidestream data, priority in sidestream control information SCI for scheduling the sidestream data is set to be a first priority. The method and the device can prevent the terminal without interception capability from only interfering with the transmission of the terminal with interception capability with high priority.

Description

Setting method, terminal equipment and network equipment Technical Field
The present application relates to the field of communications, and more particularly, to a setting method, a terminal device, and a network device.
Background
Device-to-Device communication is a side-link (SL) transmission technology based on a D2D technology, which has higher spectral efficiency and lower transmission delay, unlike the conventional cellular system in which communication data is received or transmitted through a base station. The internet of vehicles system adopts a terminal-to-terminal direct communication mode, and two transmission modes are defined in the third generation partnership project (3GPP,3rd Generation Partnership Project): a first mode and a second mode. In the second mode, the terminal may select one resource from the preconfigured or network configured resource pool to perform side transmission of data. After the terminals select the transmission resources, if data is directly transmitted on the resources, there is a possibility that two terminals select the same transmission resources and resource collision occurs. In order to solve this problem, a resource preemption (pre-solution) and re-evaluation (re-evaluation) mechanism is introduced into a New air-vehicle to other devices (NR-V2X, new Radio-Vehicle to Everything), so that a terminal can determine whether there is a resource conflict with other terminals before using the selected resource, if there is no conflict, the selected transmission resource can be continuously used, and if there is a resource conflict, avoidance and resource reselection are required according to corresponding mechanisms to avoid the resource conflict.
In order to reduce the power consumption, some terminals have no reception capability of sidestream data, i.e. have no interception capability. When a resource pool supports acquisition of transmission resources in a random selection mode and acquisition of transmission resources in a interception mode, a terminal without interception capability randomly selects resources, and then re-evaluation or pre-transmission detection is not carried out, and the selected resources are directly used for side transmission; after the terminal with interception capability selects the transmission resource, before using the resource to perform sidestream transmission, re-evaluation or pre-transmission detection is needed to determine whether resource conflict occurs with other terminals. For example, for pre-transmission detection, when a terminal with interception capability detects that a resource conflict occurs, the priority of the terminal is lower than that of the terminal with conflict, and the reference signal received power (RSRP, reference Signal Received Power) of other terminals is detected to be higher than a threshold, the terminal reselects the resource at the moment so as to avoid the conflict with other terminals; if the terminal has a higher priority than the terminal with conflict, the terminal will not perform resource reselection, but the terminal with conflict is expected to perform resource reselection, i.e. the terminal with high priority can use the conflict resource preferentially. However, if other terminals with collision are terminals without interception capability, pre-transmission detection is not performed, and resource reselection is not performed, so that the result is that the low-priority terminal can avoid resource collision with the terminals without interception capability, but the high-priority terminal cannot avoid resource collision with the terminals without interception capability, that is, the terminals without interception capability collide with the high-priority data transmission resources with interception capability, thereby affecting the performance of the high-priority data transmission.
Disclosure of Invention
The embodiment of the application provides a setting method, terminal equipment and network equipment.
The embodiment of the application provides a setting method, which comprises the following steps:
when transmitting sidestream data, the first terminal device sets the priority in the sidestream control information SCI for scheduling sidestream data to the first priority.
The embodiment of the application also provides a setting method, which comprises the following steps:
when the second terminal equipment performs resource selection, resource reselection, re-evaluation detection or resource preemption pre-emission detection, determining a Reference Signal Received Power (RSRP) threshold corresponding to the first terminal equipment according to the first configuration parameter; wherein the first terminal device comprises a terminal device without interception capability.
The embodiment of the application also provides a sidestream data transmission method, which comprises the following steps:
the terminal equipment acquires the resource pool configuration information, and determines that the transmission priority of the side line data in the resource pool is not higher than the priority corresponding to the first priority threshold according to the first priority threshold.
The embodiment of the application also provides a sidestream data transmission method, which comprises the following steps:
under the condition that the channel occupancy rate CBR is lower than a first threshold, when the second terminal equipment detects that resource conflict occurs with the first terminal equipment, the second terminal equipment performs resource reselection; wherein the first terminal device comprises a terminal device without interception capability.
The embodiment of the application also provides a configuration method, which comprises the following steps:
the network equipment sends configuration information to the second terminal equipment, wherein the configuration information is used for determining a first configuration parameter, and the first configuration parameter is used for determining an RSRP threshold corresponding to the first terminal equipment when the second terminal equipment performs resource selection, resource reselection, re-evaluation detection or pre-authentication detection; wherein,
the first terminal device comprises a terminal device without interception capability;
the second terminal device comprises a listening capable terminal device.
The embodiment of the application also provides a configuration method, which comprises the following steps:
the network device sends resource pool configuration information to the terminal device, wherein the resource pool configuration information is used for indicating the terminal device to determine that the transmission priority of the side line data in the resource pool is not higher than the priority corresponding to the first priority threshold according to the first priority threshold.
The embodiment of the application also provides a configuration method, which comprises the following steps:
the network equipment sends configuration information to the second terminal equipment, wherein the configuration information is used for indicating the second terminal equipment to reselect resources if the second terminal equipment detects that the resource conflict occurs with the first terminal equipment under the condition that CBR is lower than a first threshold; wherein,
The first terminal device comprises a terminal device without interception capability;
the second terminal device comprises a listening capable terminal device.
The embodiment of the application also provides first terminal equipment, which comprises:
and the priority setting module is used for setting the priority in SCI of the scheduling side line data as the first priority when the first terminal equipment sends the side line data.
The embodiment of the application also provides a second terminal device, which comprises:
the first determining module is used for determining a Reference Signal Receiving Power (RSRP) threshold corresponding to the first terminal equipment according to the first configuration parameter when the second terminal equipment performs resource selection, resource reselection, re-evaluation detection or resource preemption pre-emission detection; wherein the first terminal device comprises a terminal device without interception capability.
The embodiment of the application also provides a terminal device, which comprises:
and the transmission module is used for acquiring the resource pool configuration information, and determining that the transmission priority of the side line data in the resource pool is not higher than the priority corresponding to the first priority threshold according to the first priority threshold.
The embodiment of the application also provides a second terminal device, which comprises:
the resource reselection module is used for controlling the second terminal equipment to reselect resources when the second terminal equipment detects that the resource conflict occurs with the first terminal equipment under the condition that the channel occupancy rate CBR is lower than a first threshold; wherein the first terminal device comprises a terminal device without interception capability.
The embodiment of the application also provides a network device, which comprises:
the first sending module is used for sending configuration information to the second terminal equipment, the configuration information is used for determining a first configuration parameter, and the first configuration parameter is used for determining an RSRP threshold corresponding to the first terminal equipment when the second terminal equipment performs resource selection, resource reselection, re-evaluation detection or pre-evaluation detection; wherein,
the first terminal device comprises a terminal device without interception capability;
the second terminal device comprises a listening capable terminal device.
The embodiment of the application also provides a network device, which comprises:
the second sending module is used for sending resource pool configuration information to the terminal equipment, wherein the resource pool configuration information is used for indicating the terminal equipment to determine that the transmission priority of the side line data in the resource pool is not higher than the priority corresponding to the first priority threshold according to the first priority threshold.
The embodiment of the application also provides a network device, which comprises:
the third sending module is used for sending configuration information to the second terminal equipment, wherein the configuration information is used for indicating the second terminal equipment to reselect resources if the second terminal equipment detects that the second terminal equipment generates resource conflict with the first terminal equipment under the condition that CBR is lower than a first threshold; wherein,
The first terminal device comprises a terminal device without interception capability;
the second terminal device comprises a listening capable terminal device.
The embodiment of the application also provides a terminal device, which comprises: a processor and a memory for storing a computer program, the processor being adapted to call and run the computer program stored in the memory for performing the method as described above.
The embodiment of the application also provides a network device, which comprises: a processor and a memory for storing a computer program, the processor being adapted to call and run the computer program stored in the memory for performing the method as described above.
The embodiment of the application also provides a chip, which comprises: and a processor for calling and running the computer program from the memory, so that the device on which the chip is mounted performs the method as described above.
Embodiments of the present application also provide a computer-readable storage medium storing a computer program that causes a computer to perform the method as described above.
Embodiments of the present application also provide a computer program product comprising computer program instructions for causing a computer to perform the method as described above.
Embodiments of the present application also provide a computer program that causes a computer to perform the method as described above.
In the embodiment of the present application, when the first terminal device sends the sidestream data, the priority of the SCI terminal for scheduling the sidestream data is set to a specific first priority, so that all terminals with listening capability in all priority levels do or do not do resource reselection, and thus the terminal without listening capability is prevented from only interfering with the transmission of the terminal with listening capability in high priority.
Drawings
FIG. 1A is a schematic diagram of network coverage inside row communication;
FIG. 1B is a schematic diagram of partial network coverage sidestream communications;
FIG. 1C is a schematic diagram of network coverage outside line communications;
FIG. 2 is a schematic diagram of a manner in which a terminal performs resource selection within a selection window;
FIG. 3 is a schematic diagram of Re-evaluation mechanism;
FIG. 4 is a schematic diagram of the Pre-emission mechanism;
FIG. 5 is a schematic flow chart diagram of a setup method 500 according to an embodiment of the present application;
FIG. 6 is a schematic flow chart diagram of a setup method 600 according to an embodiment of the present application;
FIG. 7 is a schematic flow chart diagram of a sidestream data transmission method 700 according to an embodiment of the present application;
FIG. 8 is a schematic flow chart diagram of a sidestream data transmission method 800 according to an embodiment of the present application;
FIG. 9 is a schematic flow chart diagram of a configuration method 900 according to an embodiment of the present application;
FIG. 10 is a schematic flow chart diagram of a configuration method 1000 according to an embodiment of the present application;
FIG. 11 is a schematic flow chart diagram of a configuration method 1100 according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of a first terminal device 1200 according to an embodiment of the present application;
fig. 13 is a schematic structural diagram of a second terminal apparatus 1300 according to an embodiment of the present application;
fig. 14 is a schematic structural diagram of another second terminal device 1400 according to an embodiment of the present application;
fig. 15 is a schematic structural diagram of a terminal device 1500 according to an embodiment of the present application;
fig. 16 is a schematic structural diagram of a second terminal device 1600 according to an embodiment of the present application;
fig. 17 is a schematic structural diagram of a second terminal device 1700 according to an embodiment of the present application;
fig. 18 is a schematic diagram of a network device 1800 according to an embodiment of the present application;
fig. 19 is a schematic structural diagram of a network device 1900 according to an embodiment of the present application;
fig. 20 is a schematic structural diagram of a network device 2000 according to an embodiment of the present application;
fig. 21 is a schematic structural diagram of a communication device 2100 according to an embodiment of the present application;
Fig. 22 is a schematic structural diagram of a chip 2200 according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the embodiments of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. The objects described as "first" and "second" may be the same or different.
The technical solution of the embodiment of the application can be applied to various communication systems, for example: global system for mobile communications (Global System of Mobile communication, GSM), code division multiple access (Code Division Multiple Access, CDMA) system, wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) system, general packet Radio service (General Packet Radio Service, GPRS), long term evolution (Long Term Evolution, LTE) system, long term evolution advanced (Advanced long term evolution, LTE-a) system, new Radio (NR) system, evolution system of NR system, LTE-based access to unlicensed spectrum, LTE-U) system over unlicensed spectrum, NR (NR-based access to unlicensed spectrum, NR-U) system over unlicensed spectrum, universal mobile communication system (Universal Mobile Telecommunication System, UMTS), wireless local area network (Wireless Local Area Networks, WLAN), wireless fidelity (Wireless Fidelity, wiFi), next Generation communication (5 th-Generation, 5G) system, or other communication system, etc.
Generally, the number of connections supported by the conventional communication system is limited and easy to implement, however, with the development of communication technology, the mobile communication system will support not only conventional communication but also, for example, device-to-Device (D2D) communication, machine-to-machine (Machine to Machine, M2M) communication, machine type communication (Machine Type Communication, MTC), inter-vehicle (Vehicle to Vehicle, V2V) communication, and the like, to which the embodiments of the present application can also be applied.
Optionally, the communication system in the embodiment of the present application may be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, a dual connectivity (Dual Connectivity, DC) scenario, and a Stand Alone (SA) fabric scenario.
The frequency spectrum of the application in the embodiments of the present application is not limited. For example, embodiments of the present application may be applied to licensed spectrum as well as unlicensed spectrum.
Embodiments of the present application describe various embodiments in connection with a network device and a terminal device, wherein: a terminal device may also be called a User Equipment (UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a User terminal, a wireless communication device, a User agent, a User device, or the like. The terminal device may be a Station (ST) in a WLAN, may be a cellular telephone, a cordless telephone, a session initiation protocol (Session Initiation Protocol, SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital assistant (Personal Digital Assistant, PDA) device, a handheld device with wireless communication functionality, a computing device or other processing device connected to a wireless modem, a vehicle mounted device, a wearable device, and a next generation communication system, such as a terminal device in an NR network or a terminal device in a future evolved public land mobile network (Public Land Mobile Network, PLMN) network, etc.
By way of example, and not limitation, in embodiments of the present application, the terminal device may also be a wearable device. The wearable device can also be called as a wearable intelligent device, and is a generic name for intelligently designing daily wear by applying wearable technology and developing wearable devices, such as glasses, gloves, watches, clothes, shoes and the like. The wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also can realize a powerful function through software support, data interaction and cloud interaction. The generalized wearable intelligent device includes full functionality, large size, and may not rely on the smart phone to implement complete or partial functionality, such as: smart watches or smart glasses, etc., and focus on only certain types of application functions, and need to be used in combination with other devices, such as smart phones, for example, various smart bracelets, smart jewelry, etc. for physical sign monitoring.
The network device may be a device for communicating with the mobile device, the network device may be an Access Point (AP) in WLAN, a base station (Base Transceiver Station, BTS) in GSM or CDMA, a base station (NodeB, NB) in WCDMA, an evolved base station (Evolutional Node B, eNB or eNodeB) in LTE, or a relay station or an Access Point, or a vehicle device, a wearable device, and a network device (gNB) in NR network, or a network device in future evolved PLMN network, etc.
In the embodiment of the present application, the network device provides services for a cell, and the terminal device communicates with the network device through a transmission resource (for example, a frequency domain resource, or a spectrum resource) used by the cell, where the cell may be a cell corresponding to the network device (for example, a base station), and the cell may belong to a macro base station, or may belong to a base station corresponding to a Small cell (Small cell), where the Small cell may include: urban cells (Metro cells), micro cells (Micro cells), pico cells (Pico cells), femto cells (Femto cells) and the like, and the small cells have the characteristics of small coverage area and low transmitting power and are suitable for providing high-rate data transmission services.
It should be understood that the terms "system" and "network" are used interchangeably herein. The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
It should be understood that, in the embodiments of the present application, the "indication" may be a direct indication, an indirect indication, or an indication having an association relationship. For example, a indicates B, which may mean that a indicates B directly, e.g., B may be obtained by a; it may also indicate that a indicates B indirectly, e.g. a indicates C, B may be obtained by C; it may also be indicated that there is an association between a and B.
In the description of the embodiments of the present application, the term "corresponding" may indicate that there is a direct correspondence or an indirect correspondence between the two, or may indicate that there is an association between the two, or may indicate a relationship between the two and the indicated, configured, or the like.
In order to facilitate understanding of the technical solutions of the embodiments of the present application, the following description is given of related technologies of the embodiments of the present application, and the following related technologies may be optionally combined with the technical solutions of the embodiments of the present application as an alternative, which all belong to the protection scope of the embodiments of the present application.
In the side line communication, according to the network coverage condition of the terminal for communication, the network coverage inside line communication, the partial network coverage side line communication and the network coverage outside line communication can be divided as shown in fig. 1A, 1B and 1C, respectively.
As shown in fig. 1A, in network coverage inside-line communication, all terminals performing side-line communication are within the coverage of the same base station, and all the terminals may perform side-line communication based on the same side-line configuration by receiving configuration signaling of the base station.
As shown in fig. 1B, in the case of partial network coverage sidestream communication, a part of terminals performing sidestream communication are located within the coverage area of the base station, and this part of terminal terminals can receive the configuration signaling of the base station and perform sidestream communication according to the configuration of the base station. In this case, the terminal outside the network coverage area determines the sidestream configuration according to the pre-configuration information and the information carried in the physical sidestream broadcast channel (PSBCH, physical Sidelink Broadcast Channel) sent by the terminal located in the network coverage area, so as to perform sidestream communication.
As shown in fig. 1C, for network coverage outside line communication, all terminals performing outside line communication are located outside the network coverage, and all terminals determine side line configuration according to the pre-configuration information to perform side line communication.
Device-to-device communication is a D2D based side-link transmission technique, and has higher spectral efficiency and lower transmission delay, unlike conventional cellular systems in which communication data is received or transmitted by a base station. The internet of vehicles system adopts a terminal-to-terminal direct communication mode, and two transmission modes are defined in 3 GPP: a first mode and a second mode.
First mode: the transmission resources of the terminal are allocated by the base station, and the terminal transmits data on the side links according to the resources allocated by the base station; the base station may allocate resources for single transmission to the terminal, or may allocate resources for semi-static transmission to the terminal. As shown in fig. 1A, the terminal is located in the coverage area of the network, and the network allocates transmission resources for side transmission to the terminal.
Second mode: and the terminal selects one resource from the resource pool to transmit data. As shown in fig. 1C, the terminal is located outside the coverage area of the cell, and the terminal autonomously selects transmission resources in a preconfigured resource pool to perform side transmission; or in fig. 1A, the terminal autonomously selects transmission resources from a resource pool configured by the network to perform side transmission.
In NR-V2X, automatic driving needs to be supported, and thus, higher demands are placed on data interaction between vehicles, such as higher throughput, lower latency, higher reliability, larger coverage, more flexible resource allocation, etc.
When the terminal of NR-V2X operates in the second mode (i.e., mode 2 in NR-V2X), the terminal performs resource selection according to interception, specifically, when a new data packet arrives in time slot n, resource selection is required, and the terminal performs resource selection in a resource selection window according to the interception result of a period of time. Fig. 2 is a schematic diagram of a manner in which a terminal performs resource selection within a selection window. In the example shown in fig. 2, the resource listening window (abbreviated listening window) determined by the terminal is [ n-1000, n-1 ], and the resource selection window (abbreviated selection window) is [ n+1, n+100].
The brief process of the terminal for selecting the resources in the selection window is as follows:
1. the terminal will select all available resources within the window as one set a,
2. if the terminal does not have a interception result in some subframes in the interception window, the resources of the subframes corresponding to the subframes in the selection window are eliminated;
3. if a terminal detects a physical sidelink control channel (PSCCH, physical Sidelink Control Channel) in a listening window, measuring the RSRP of the PSCCH or the RSRP of a physical sidelink shared channel (PSSCH, physical Sidelink Shared Channel) scheduled by the PSCCH, and if the measured RSRP is above an RSRP threshold and there is a resource conflict between its reserved transmission resources determined according to reservation information in the control information and data to be transmitted by the user, the user excludes the resources in set a. The selection of the RSRP threshold is determined by the priority information carried in the detected PSCCH and the priority of the data to be transmitted by the terminal.
4. If the number of the remaining resources in the set a is less than the total number of resources by X%, the terminal may raise the threshold of RSRP by 3dB, and repeat the above steps until the number of the remaining resources in the set a is greater than the total number of resources by X%. Where X is a high level configuration parameter.
5. And the terminal reports the set A to a high-rise.
And the higher layer randomly selects N transmission resources from the available resource set reported by the physical layer for side transmission.
After the terminal selects the transmission resource, as there is a possibility that two terminals will collide with each other due to the selection of the same transmission resource, in order to solve this problem, pre-transmission and re-evaluation mechanisms are introduced into NR-V2X, so that before using the selected resource, the terminal can determine whether there is a resource collision with other terminals, if there is no collision, the terminal can continue to use the selected transmission resource, if there is a resource collision, avoidance and resource reselection are required according to the corresponding mechanisms to avoid the resource collision.
In the re-evaluation mechanism, the terminal still continuously listens for sidestream control information after completing resource selection, and re-evaluates the selected but not indicated resources at least once. FIG. 3 is a schematic diagram of a re-evaluation mechanism. As shown in fig. 3, the resource w, x, y, z, v is a time-frequency resource that the UE has selected at time n, and the resource x is located in the slot m. Resources y and z for which the UE is about to send sidelink control information for the first time at resource x (resource x has been indicated previously by sidelink control information in resource w). The UE is at least in time slot m-T 3 And performing primary resource interception, namely determining a resource selection window and an interception window, and performing resource elimination on resources in the resource selection window to obtain a candidate resource set. If resources y or z are not in the candidate resource set, the UE reselects time-frequency resources among resources y and z that are not in the candidate resource set, and may also reselect any of the resources that have been selected but not indicated by the transmission-side row control information, e.g., any of resources y, z, and v. The above m-T 3 Depending on the processing capabilities of the terminal.
In NR-V2X, the conclusions about the pre-transmission mechanism are all described in terms of preempted UEs. After completing the resource selection, the UE still continues to listen to the sidestream control information, and triggers a resource reselection if the time-frequency resources that have been selected and indicated by the sending sidestream control information meet the following three conditions:
1. the resources reserved in the detected sidestream control information overlap with the resources selected and indicated by the UE, including all overlap and partial overlap.
The RSRP of PSCCH corresponding to the lateral control information detected by the UE or the RSRP of PSSCH scheduled by the PSCCH is larger than the SL RSRP threshold.
3. The priority carried in the detected side-uplink control information (SCI, sidelink Control Information) is higher than the priority of the data to be transmitted by the UE.
FIG. 4 is a schematic diagram of the pre-emission mechanism. As shown in fig. 4, the resource w, x, y, z, v is a time-frequency resource that the UE has selected, and the resource x is located in the slot m. For resources x and y indicated by the sidestream control information that the UE is about to send in slot m and that has been indicated by the sidestream control information that the UE sent before. The UE is at least in time slot m-T 3 And performing primary resource interception to determine a candidate resource set. If the resource x or y is not in the candidate resource set (meeting the conditions 1 and 2), further judging whether the resource x or y is not in the candidate resource set (meeting the condition 3) due to the indication of carrying the side uplink control information with high priority, if so, the UE performs resource reselection, and reselects the time-frequency resource meeting the 3 conditions in the x and y.
The terminal without interception capability randomly selects sidestream resources, and re-evaluation or pre-emission detection is not carried out; after selecting the transmission resource, the terminal with interception capability needs to perform re-evaluation or pre-transmission detection before using the resource for sidestream transmission to judge whether resource conflict occurs with other terminals. And when a conflict occurs, if the priority of the terminal with interception capability is higher than that of the terminal with conflict, the terminal does not perform resource reselection, but the terminal with conflict is expected to perform resource reselection, so that the terminal without interception capability only interferes with the side transmission of the terminal with interception capability with high priority.
In view of the above, the present embodiment proposes a setting method, and fig. 5 is a schematic flowchart of a setting method 500 according to the present embodiment, which may be alternatively applied to the above-described terminal device without interception capability. The method includes at least part of the following:
s510: when the first terminal device transmits the sidestream data, the priority in the SCI for scheduling the sidestream data is set as the first priority.
The first terminal device may comprise a terminal device without interception capability.
In the prior art, when a terminal sends side line data, the priority of the side line data is borne in an SCI; in this embodiment, the first priority carried in the SCI may be different from the priority corresponding to the sidestream data sent by the first terminal device.
In one embodiment, the first priority may be set to a highest priority.
Optionally, the highest priority is the highest priority in priority levels allowed by the resource pool for transmitting the sidestream data by the first terminal device, or the highest priority is the highest priority in all priorities corresponding to the sidestream data.
Example 1:
in this embodiment, when a terminal having no interception capability transmits side line data, the first priority in SCI which schedules the side line data is set to the highest priority.
When the terminal with interception capability performs pre-transmission detection, the terminal performs resource reselection under the condition that the following conditions are satisfied:
1. resources reserved in sidestream control information of other terminals (RX UEs) that are listened to by the listening terminal (TX UE) overlap with resources that have been selected and indicated by the TX UE, including all overlap and partial overlap.
RSRP of PSCCH corresponding to SCI of RX UE and detected by tx UE or RSRP of PSCCH scheduled PSSCH is greater than SL RSRP threshold.
The first priority (p_rx) carried in the sidestream control information of the RX UE detected by the TX UE is higher than the priority (p_tx) of the data to be sent by the TX UE, i.e. p_rx < p_tx, where p_rx and p_tx represent values corresponding to the priority levels, and the higher the value, the lower the priority level. For example, the priorities corresponding to the sidestream data include 8 levels, i.e., [0,7], where a priority level value of 0 indicates the highest priority and a priority level value of 7 indicates the lowest priority.
For terminals without interception capability, the transmission resources are acquired in a random selection mode, and when the transmission resources are used for lateral transmission, the first priority in the SCI is set to be the highest priority, so that the priority level of other terminals is lower than or equal to the priority level of the terminal when pre-transmission detection is carried out, and one of the conditions for triggering the terminal to reselect resources can be met.
It can be seen that the first priority in SCI of the terminal without interception capability is set to be the highest level, so that the priority of the other terminals with interception capability is lower than (or equal to) the priority of the terminal without interception capability, and in the pre-transmission detection mechanism, the terminal with interception capability can more easily meet the condition of resource preemption, trigger resource reselection, and avoid resource conflict with the terminal without interception capability.
When a terminal with interception capability performs resource selection or re-evaluation detection, if the terminal detects PSCCH in an interception window, the RSRP of the PSCCH or the RSRP of PSSCH scheduled by the PSCCH is measured, and if the measured RSRP is higher than an RSRP threshold and the reserved transmission resource determined according to reservation information in SCI has resource conflict with data to be sent by the terminal, the terminal with interception capability excludes the resource from an available resource set. The selection of the RSRP threshold is determined by the priority information carried in the detected PSCCH and the priority of the data to be transmitted by the terminal, and the higher the priority is, the higher the corresponding RSRP threshold is.
It can be seen that, setting the first priority in SCI of the terminal without interception capability to the highest level, so that the determined RSRP threshold is the highest, after the terminal with interception capability detects the PSCCH in the interception window, the possibility that the RSRP of the PSCCH or the RSRP of the PSCCH scheduled by the PSCCH is measured to be higher than the RSRP threshold is the smallest, and the possibility that the terminal with interception capability excludes the reserved transmission resource without interception capability from the available resource set is the smallest. Therefore, no matter the priority of the terminal with interception capability, the terminal is not easy to trigger resource reselection, and resource conflict exists between the transmission of the terminal without interception capability and the terminals with interception capability of all priorities, so that the terminal without interception capability is prevented from only interfering with the side transmission of the terminal with interception capability of high priority.
In another embodiment, the first priority may be set to the lowest priority.
Optionally, the lowest priority is the lowest priority in priority levels allowed by the resource pool for transmitting the sidestream data by the first terminal device, or the highest priority is the lowest priority in all priorities corresponding to the sidestream data.
Example 2:
in this embodiment, when a terminal having no interception capability transmits side line data, the first priority in SCI that schedules the side line data is set to the lowest priority.
When a terminal having interception capability performs pre-transmission detection, the terminal performs resource reselection in the case that the above 3 conditions are satisfied, as in embodiment 1.
For terminals without interception capability, a random selection mode is adopted to acquire transmission resources, and when the transmission resources are used for lateral transmission, the first priority in SCI is set to be the lowest priority, so that the priority level of other terminals is higher than or equal to the priority level of the terminal when pre-transmission detection is carried out, and one of the conditions for triggering the terminal to reselect resources is not met.
It can be seen that the first priority in SCI of the terminal without interception capability is set to the lowest level, so that the priority of the other terminals with interception capability is higher than (or equal to) the priority of the terminal without interception capability, and in the pre-transmission detection mechanism, the terminal with interception capability does not meet the condition of resource preemption, and the resource reselection is not triggered. Therefore, no matter the priority of the terminal with interception capability, the terminal does not trigger resource reselection, and resource conflict exists between the transmission of the terminal without interception capability and the terminals with interception capability of all priorities, so that the terminal without interception capability is prevented from only interfering with the side transmission of the terminal with interception capability of high priority.
When a terminal with interception capability performs resource selection or re-evaluation detection, if the terminal detects PSCCH in an interception window, the RSRP of the PSCCH or the RSRP of PSSCH scheduled by the PSCCH is measured, and if the measured RSRP is higher than an RSRP threshold and the reserved transmission resource determined according to reservation information in SCI has resource conflict with data to be sent by the terminal, the terminal with interception capability excludes the resource from an available resource set. The selection of the RSRP threshold is determined by the priority information carried in the detected PSCCH and the priority of the data to be transmitted by the terminal, and the higher the priority is, the higher the corresponding RSRP threshold is.
It can be seen that, setting the first priority in SCI of the terminal without interception capability to the lowest level, so that the determined RSRP threshold is the lowest, after the terminal with interception capability detects the PSCCH in the interception window, the possibility that the RSRP of the PSCCH or the RSRP of the PSCCH scheduled by the PSCCH is higher than the RSRP threshold is measured to be the greatest, and then the possibility that the terminal with interception capability excludes the reserved transmission resource without interception capability from the available resource set is the greatest.
In another embodiment, the first priority may be set to be not higher than a priority corresponding to the first parameter; alternatively, the value of the first priority may be set to be greater than or equal to the value of the priority corresponding to the first parameter.
Alternatively, the first parameter may include a resource preemption enable (sl-preemption enable) parameter. The sl-pre enable parameter is a parameter included in the resource pool configuration information, and is used to indicate whether pre-transmission detection is supported in the resource pool. Possible values for the sl-preemptionEnable parameter include { enabled, pl1, pl2, pl3, pl4, pl5, pl6, pl7, pl8}. When the parameter is configured as "enabled", the terminal that performs interception judges whether or not it is preempted by the resource and whether or not resource selection is necessary according to the 3 conditions in embodiment 1 and embodiment 2. At this time, in the manner of embodiment 1, that is, the first priority of the terminal without interception capability is configured as the highest priority, so that when pre-transmission detection is performed, the interception terminal more easily meets the condition of being preempted by the resource, and triggers resource selection; or when the resource selection or re-evaluation detection is carried out, the interception terminal cannot easily meet the condition of being preempted by the resource, and the resource selection is not triggered. Or, in the manner of embodiment 2, that is, the first priority of the terminal without interception capability is configured to be the lowest priority, so that when pre-transmission detection is performed, the interception terminal does not easily meet the condition of being preempted by the resource, and does not trigger resource selection; or when the resource selection or re-evaluation detection is carried out, the interception terminal can more easily meet the condition of being preempted by the resource, and the resource selection is triggered.
Example 3:
in this embodiment, when the terminal without interception capability sends the sidestream data, the value of the first priority in the SCI for scheduling the sidestream data is set to be greater than or equal to the priority value corresponding to the sl-preemption enable parameter.
When the sl-PreemptionEnable parameter is configured to be p_pre, i.e., corresponds to one value of pl1 to pl8, the listening terminal determines whether or not to be preempted by the resource and whether or not to need to perform resource selection, and in addition to the 3 conditions in embodiment 1 and embodiment 2, the following conditions need to be satisfied:
and 4, the priority carried in the sidestream control information of the RX UE, which is detected by the TX UE, is higher than the priority corresponding to the parameter sl-preemptionEnable, namely P_rx < P_pre.
Only when the 4 conditions are met, the terminal for resource interception is preempted by other terminals and triggers resource selection.
When the terminal without interception capability transmits the sidestream data, the first priority in the SCI is set to be greater than or equal to a level of p_pre, that is, p_rx > =p_pre, that is, the priority of sidestream data transmitted by the terminal without interception capability is low, so that the terminal performing interception is not preempted by resources, that is, whether the priority of the terminal performing interception is lower than the priority of the terminal without interception capability, is not preempted by resources, that is, resource reselection is not performed. That is, all terminals performing resource interception do not perform resource reselection even if a resource conflict exists between the terminals having no interception capability and the resources selected by the terminals having no interception capability. A resource conflict may exist between the transmission of the terminal without interception capability and the terminals with interception capability of all priorities, thereby avoiding that only the transmission of the terminal with interception capability with high priority is interfered.
It can be seen that the first priority of the terminal without interception capability is set to be not higher than the priority threshold configured by the first parameter (for example, the sl-preemption enable parameter), the terminal with interception capability is not preempted by the resource during interception, and the resource reselection is not performed, so that the terminal without interception capability may have resource conflict with the terminals with interception capability of all priority levels, and the transmission of the terminal with interception capability with high priority is avoided.
In the above embodiments 1 to 3, by setting the first priority of the terminal device having no listening capability, it is achieved that the interference situation is the same for all priority terminals having listening capability. A transmission of a terminal without interception capability may have resource conflict with all priority terminals with interception capability or no resource conflict with all priority terminals with interception capability, thereby avoiding affecting only the transmission of a terminal with interception capability of high priority.
The embodiment of the application also provides another setting method, and the RSRP threshold corresponding to the terminal equipment without interception capability during resource selection or resource reselection is determined through certain setting, so that the transmission of the terminal with interception capability with high priority is prevented from being influenced.
Fig. 6 is a schematic flow chart of a setup method 600 according to an embodiment of the present application, which may alternatively be applied to the above-described terminal device with listening capabilities. The method includes at least part of the following:
s610: when the second terminal equipment performs resource selection, resource reselection, re-evaluation detection or pre-solution detection, determining an RSRP threshold corresponding to the first terminal equipment according to the first configuration parameter; wherein the first terminal device comprises a terminal device without interception capability.
The first configuration parameter may be determined by network configuration information or pre-configuration information.
In some embodiments, the first configuration parameter may include a priority parameter.
Optionally, the determining, according to the first configuration parameter, the RSRP threshold corresponding to the first terminal device includes:
determining an RSRP threshold according to the first configuration parameter and priority information carried in SCI of the first terminal equipment; or,
determining an RSRP threshold according to the first configuration parameter and the priority information of the second terminal equipment; or,
and determining an RSRP threshold according to the first configuration parameter, the priority information carried in the SCI of the first terminal equipment and the priority information of the second terminal equipment.
In some embodiments, the first configuration parameter may include an RSRP threshold.
Two examples of the above-described first configuration parameters are respectively described below using two examples in embodiment 4.
Example 4:
when the terminal with interception capability performs resource selection, re-evaluation detection or pre-transmission detection, if the terminal without interception capability is detected, the terminal without interception capability is used with the first configuration parameter.
The first configuration parameter may be used for terminals without listening capabilities if the terminals with listening capabilities are able to detect and identify terminals without listening capabilities.
Example 4-1:
and in the process of resource exclusion, if SCI of other terminals is detected, determining an RSRP threshold according to priority information (denoted as P_rx) carried in SCI of other terminals and priority information (denoted as P_tx) of the terminals, and if RSRP of other terminals is measured to exceed the RSRP threshold and transmission resources reserved by other terminals and resources reserved by the terminals in a resource selection window overlap, eliminating the resources from the resource selection window. In the process, if other terminals are detected to be terminals without interception capability, the terminals determine an RSRP threshold according to the first configuration parameters.
Optionally, the first configuration parameter is a priority parameter. Further, the terminal determines an RSRP threshold according to the priority parameter, p_rx and p_tx, or the terminal determines an RSRP threshold according to the priority parameter and p_rx, or the terminal determines an RSRP threshold according to the priority parameter and p_tx, or the terminal determines an RSRP threshold according to the priority parameter only.
For example, the network configures the correspondence or table of p_tx, p_rx and RSRP thresholds, i.e. according to p_tx and p_rx, the corresponding RSRP threshold may be determined by combining the correspondence or table. In general, the higher the priority, the higher the corresponding RSRP threshold.
The network configures a priority parameter, when the terminal detects the terminal without interception capability, determines an RSRP threshold according to the priority parameter and p_tx, and the network can configure the priority corresponding to the priority parameter to be very low, for example, to be corresponding to priority 7 (i.e. lowest priority), so that the determined RSRP threshold is very low, thus the measured RSRP of the terminal without interception capability is very easy to be higher than the threshold, and resources reserved by the terminal without interception capability are excluded from a resource selection window, so that transmission collision between the terminal with interception capability and the terminal without interception capability is avoided.
For another example, the network configures a priority parameter, and when the terminal detects a terminal without interception capability, the terminal determines an RSRP threshold according to the priority parameter and p_rx, so that when the terminal with interception capability is performing resource exclusion, the RSRP threshold is determined by using the priority parameter, and no matter whether the priority corresponding to the terminal is high or low, so that the interference probability of the terminal without interception capability to the terminals with interception capability of all priority levels is the same, and the terminal with interception capability with high priority level is prevented from being interfered only. Further, the network may configure the priority level corresponding to the priority parameter to be very low, for example, to correspond to priority level 7 (i.e., the lowest priority level), so that the determined RSRP threshold is very low, which easily makes the measured RSRP of the terminal without interception capability higher than the threshold, and excludes the resources reserved by the terminal without interception capability from the resource selection window, thereby avoiding transmission collision between the terminal with interception capability and the terminal without interception capability.
For another example, the network configures a priority parameter, and when the terminal detects a terminal without interception capability, the terminal determines an RSRP threshold according to the priority parameter, so that the RSRP threshold determined when the terminal with interception capability performs resource exclusion is the same, and whether the priority corresponding to the terminal is high or low, so that the interference probability of the terminal without interception capability to the terminals with interception capability of all priority levels is the same, and the terminal with interception capability with high interference priority level is avoided. Further, the network may configure the priority level corresponding to the priority parameter to be very low, for example, to correspond to priority level 7 (i.e., the lowest priority level), so that the determined RSRP threshold is very low, which easily makes the measured RSRP of the terminal without interception capability higher than the threshold, and excludes the resources reserved by the terminal without interception capability from the resource selection window, thereby avoiding transmission collision between the terminal with interception capability and the terminal without interception capability.
For another example, when the network configures a priority parameter and the terminal detects a terminal without interception capability, an RSRP threshold is determined according to the priority parameter, p_tx and p_rx, and the network may configure the priority corresponding to the priority parameter to be very low, for example, to correspond to priority 7 (i.e. lowest priority), so that the determined RSRP threshold is very low, thus it is easy to make the measured RSRP of the terminal without interception capability be higher than the threshold, and the reserved resources of the terminal without interception capability are excluded from the resource selection window, so as to avoid transmission collision between the terminal with interception capability and the terminal without interception capability.
Example 4-2:
in this example, the first configuration parameter is an RSRP threshold.
And in the process of resource exclusion, if SCI sent by the terminal without interception capability is detected, the first configuration parameter, namely an RSRP threshold, is used for resource exclusion, namely the terminal measures the RSRP of the terminal without interception capability, and if the RSRP threshold is exceeded, transmission resources reserved by the terminal without interception capability are excluded from a resource selection window.
Therefore, as the RSRP thresholds adopted by the terminals with interception capability of all priorities are the same, the interference probability of the terminals without interception capability to the terminals with interception capability of all priorities is the same, and the situation that only the terminals with interception capability with high priority are interfered is avoided.
Further, the RSRP threshold may be set very low, so that the measured RSRP of the terminal without interception capability is easily higher than the threshold, and the resources reserved by the terminal without interception capability are excluded from the resource selection window, so that transmission collision between the terminal with interception capability and the terminal without interception capability is avoided.
In the present embodiment, a precondition is that a terminal without interception capability can be identified. The step S610 may further include: the second terminal device determines that the first terminal device is a terminal device without listening capability.
Optionally, the second terminal device determines that the first terminal device is a terminal device without interception capability in at least one of the following manners:
mode one: the second terminal equipment determines that the first terminal equipment is terminal equipment without interception capability according to the information field in the SCI of the first terminal equipment;
For example, SCI includes a 1-bit information field, and a value of 1 indicates a terminal having no interception capability, and a value of 0 indicates a terminal having interception capability.
Wherein, the SCI of the first terminal equipment can be a first-order SCI and/or a second-order SCI.
Mode two: the second terminal device determines that the first terminal device is a terminal device without interception capability according to the format of the SCI of the first terminal device.
For example, the SCI format includes a first format and a second format;
wherein the first format includes at least one of a first order SCI format (format) 1-a, a second order SCI format 2-a, and a second order SCI format 2-B.
Mode three: the second terminal device determines that the first terminal device is a terminal device without interception capability according to a scrambling sequence for scrambling the SCI bit sequence of the first terminal device;
for example, the information bit sequence of SCI, or the bit sequence after channel coding, may be scrambled, indicating a terminal with listening capability if the first sequence is used for scrambling, and indicating a terminal without listening capability if the second sequence is used for scrambling.
Mode four: the second terminal equipment determines that the first terminal equipment is the terminal equipment without interception capability according to the DMRS sequence of the PSCCH or PSSCH of the first terminal equipment;
For example, if the DMRS sequence of the PSCCH or PSSCH adopts a first sequence, it means a terminal having listening capability, and if the DMRS sequence adopts a second sequence, it means a terminal having no listening capability.
Mode five: when the second terminal device detects the PSCCH of the first terminal device in the first time-frequency resource set configured in the resource pool, the first terminal device is determined to be the terminal device without interception capability.
In this way, a first set of time-frequency resources may be configured in the resource pool, and terminals without listening capability may be configured to transmit within the first set of time-frequency resources. Accordingly, when other terminals detect a PSCCH (i.e., SCI) within the first set of time-frequency resources, it may be determined that the terminal transmitting the PSCCH is a terminal that has no listening capability.
The embodiment of the application also proposes a sidestream data transmission method, and fig. 7 is a schematic flowchart of a sidestream data transmission method 700 according to an embodiment of the application, where the method may alternatively be applied to the above-mentioned terminal device with interception capability and terminal device without interception capability. The method includes at least part of the following:
s710: the terminal equipment acquires the resource pool configuration information, and determines that the transmission priority of the sidestream data in the resource pool is not higher than the priority corresponding to the first priority threshold according to the first priority threshold.
Optionally, the resource pool configuration information includes the first priority threshold.
Optionally, the resource pool configuration information may include indication information, where the indication information is used to indicate that the terminal without interception capability allows data transmission in the resource pool.
Example 5 below corresponds to this sidestream data transmission scheme.
Example 5:
when the resource Chi Zhongyun Xu Suiji is selected, the resource pool configuration information includes a first priority threshold, and side line data with a priority higher than the first priority threshold is not allowed to be transmitted in the resource pool.
When the resource pool allows the terminals with interception capability (selecting transmission resources through interception) and the terminals without interception capability (acquiring transmission resources through random selection) to be used together, the terminals without interception capability select transmission resources, and as re-evaluation and pre-transmission detection cannot be performed, resource reselection cannot be performed, only other terminals with interception capability can be expected to avoid interference with the terminals without interception capability through re-evaluation or pre-transmission detection, and when the priority of the terminals with interception capability is higher than that of the terminals without interception capability, resource reselection cannot be triggered, so that interference between the terminals without interception capability and the terminals with interception capability with high priority is caused. Therefore, in the resource pool configuration information, the first priority threshold is configured, and the sidestream data with the priority higher than the first priority threshold is not allowed to be transmitted in the resource pool, so that interference of the terminal without interception capability to high-priority sidestream transmission can be avoided.
For example, the priority of the side line data is 8 levels, i.e., [0,7], where 0 represents the highest priority and 7 represents the lowest priority, and if the first priority threshold is p_thd=3 in the resource pool configuration information, then the side line data with priority level 0,1,2 (whose corresponding priority is higher than the priority corresponding to the first priority threshold) is not allowed to be transmitted in the resource pool, i.e., the priority of the side line data that can be supported by the resource pool is [3,7], so that interference of the terminal without interception capability to the side line data with priority level 0,1,2 is avoided.
The embodiment of the application also proposes a sidestream data transmission method, and fig. 8 is a schematic flowchart of a sidestream data transmission method 800 according to an embodiment of the application, where the method may alternatively be applied to the terminal device with interception capability. The method includes at least part of the following:
s810: under the condition that the channel occupancy rate (CBR, channel Busy Ratio) is lower than a first threshold, when the second terminal equipment detects that resource conflict occurs with the first terminal equipment, the second terminal equipment performs resource reselection; wherein the first terminal device comprises a terminal device without interception capability. The second terminal device comprises a listening capable terminal device.
Optionally, when the second terminal device detects that a resource conflict occurs with the first terminal device, and the second terminal device measures that the RSRP of the first terminal device is higher than the second threshold, the second terminal device performs resource reselection.
Optionally, the first threshold and the second threshold are determined according to network configuration information or pre-configuration information.
In the present embodiment, a precondition is that a terminal without interception capability can be identified. The step S810 may further include: the second terminal device determines that the first terminal device is a terminal device without listening capability. The specific identification manner is similar to that in the above embodiment 4, and will not be described here again.
Example 6 below corresponds to this sidestream data transmission scheme.
Example 6:
if the CBR is lower than the first threshold, when the terminal with interception capability detects that resource conflict occurs with the terminal without interception capability, the terminal with interception capability performs resource selection so as to avoid interference between the terminal with interception capability and the terminal without interception capability.
Or if the CBR is lower than the first threshold, when the terminal with interception capability detects that resource conflict occurs with the terminal without interception capability, and the RSRP of the terminal with interception capability measured by the terminal without interception capability is higher than the second threshold, the terminal with interception capability performs resource selection to avoid interference between the terminal with interception capability and the terminal without interception capability.
The first threshold and the second threshold may be determined according to network configuration information or pre-configuration information.
When the CBR measured by the terminal is below the first threshold, the system resources may be considered idle. At this time, the terminal detects that the resource conflict exists, and the terminal can be triggered to reselect the resource; because the system is idle, the probability of selecting idle resources in the process of resource reselection is high, so that interference between terminals can be avoided.
The present embodiments also provide a configuration method, and fig. 9 is a schematic flowchart of a configuration method 900 according to an embodiment of the present application, where the method may be alternatively applied to a network device. The method includes at least part of the following:
s910: the network equipment sends configuration information to the second terminal equipment, wherein the configuration information is used for determining a first configuration parameter, and the first configuration parameter is used for determining an RSRP threshold corresponding to the first terminal equipment when the second terminal equipment performs resource selection, resource reselection, re-evaluation detection or pre-authentication detection; wherein,
the first terminal device comprises a terminal device without interception capability;
the second terminal device comprises a listening capable terminal device.
Optionally, the first configuration parameter includes a priority parameter.
Optionally, the first configuration parameter is used for the second network device to determine an RSRP threshold according to the first configuration parameter and priority information carried in SCI of the first terminal device; or,
the first configuration parameter is used for the second network equipment to determine an RSRP threshold according to the first configuration parameter and the priority information of the second terminal equipment; or,
the first configuration parameter is used for the second network device to determine the RSRP threshold according to the first configuration parameter, the priority information carried in the SCI of the first terminal device, and the priority information of the second terminal device.
Optionally, the first configuration parameter includes an RSRP threshold.
The present embodiments also provide a configuration method, and fig. 10 is a schematic flowchart of a configuration method 1000 according to an embodiment of the present application, where the method may be alternatively applied to a network device. The method includes at least part of the following:
s1010: the network device sends resource pool configuration information to the terminal device, wherein the resource pool configuration information is used for indicating the terminal device to determine that the transmission priority of the side line data in the resource pool is not higher than the priority corresponding to the first priority threshold according to the first priority threshold.
Optionally, the resource pool configuration information includes a first priority threshold.
Optionally, the resource pool configuration information includes indication information, where the indication information is used to indicate that the terminal without interception capability allows data transmission in the resource pool.
The present embodiments also provide a configuration method, and fig. 11 is a schematic flowchart of a configuration method 1100 according to an embodiment of the present application, where the method may be alternatively applied to a network device. The method includes at least part of the following:
s1110: the network equipment sends configuration information to the second terminal equipment, wherein the configuration information is used for indicating the second terminal equipment to reselect resources if the second terminal equipment detects that the second terminal equipment generates resource conflict with the first terminal equipment under the condition that CBR is lower than a first threshold; wherein,
the first terminal device comprises a terminal device without interception capability;
the second terminal device comprises a listening capable terminal device.
Optionally, the configuration information is used to instruct the second terminal device to perform resource reselection if the second terminal device detects that the second terminal device collides with the first terminal device in the case that the CBR is lower than the first threshold, and the second terminal device measures that the RSRP of the first terminal device is higher than the second threshold.
Optionally, the configuration information includes a first threshold and a second threshold.
The embodiment of the present application further proposes a first terminal device, and fig. 12 is a schematic structural diagram of a first terminal device 1200 according to an embodiment of the present application, including:
a priority setting module 1210 is configured to set, when the first terminal device is sending side line data, a priority in SCI of scheduling side line data to a first priority.
Optionally, the first priority is the highest priority or the low priority; or,
the value of the first priority is larger than or equal to the value of the priority corresponding to the first parameter; or,
the first priority is not higher than the priority corresponding to the first parameter.
Optionally, the first parameter includes a resource preemption enabling (sl-preemption enable) parameter.
Optionally, the highest priority is the highest priority in priority levels allowed by the resource pool for transmitting the sidestream data by the first terminal device, or the highest priority is the highest priority in all priorities corresponding to the sidestream data.
Optionally, the lowest priority is the lowest priority in priority levels allowed by the resource pool for transmitting the sidestream data by the first terminal device, or the lowest priority is the lowest priority in all priorities corresponding to the sidestream data.
Alternatively, the first priority may be different from a priority corresponding to the sidestream data sent by the first terminal device.
Optionally, the first terminal device comprises a terminal device without interception capability.
It should be understood that the foregoing and other operations and/or functions of the modules in the first terminal device according to the embodiments of the present application are respectively for implementing the corresponding flow of the first terminal device in the method 500 of fig. 5, and are not described herein for brevity.
The embodiment of the present application further proposes a second terminal device, and fig. 13 is a schematic structural diagram of a second terminal device 1300 according to an embodiment of the present application, including:
a first determining module 1310, configured to determine, by using a second terminal device, an RSRP threshold corresponding to the first terminal device according to a first configuration parameter when performing resource selection, resource reselection, re-evaluation detection, or resource preemption pre-emission detection; wherein the first terminal device comprises a terminal device without interception capability.
Specifically, the first configuration parameter includes a priority parameter.
Specifically, the first determining module is configured to:
determining an RSRP threshold according to the first configuration parameter and priority information carried in SCI of the first terminal equipment; or,
Determining an RSRP threshold according to the first configuration parameter and the priority information of the second terminal equipment; or,
and determining an RSRP threshold according to the first configuration parameter, the priority information carried in the SCI of the first terminal equipment and the priority information of the second terminal equipment.
Specifically, the first configuration parameter includes an RSRP threshold.
Specifically, the first configuration parameter is determined by network configuration information or pre-configuration information.
Specifically, fig. 14 is a schematic structural diagram of another second terminal device 1400 according to an embodiment of the present application. The apparatus may further include: a second determining module 1420 is configured to determine that the first terminal device is a terminal device without listening capability.
Specifically, the second determining module 1420 determines that the first terminal device is a terminal device without interception capability in at least one of the following manners:
determining that the first terminal device is a terminal device without interception capability according to the information field in the SCI of the first terminal device;
determining that the first terminal device is a terminal device without interception capability according to the format of the SCI of the first terminal device;
determining that the first terminal device is a terminal device without interception capability according to a scrambling sequence that scrambles the SCI bit sequence of the first terminal device;
Determining that the first terminal equipment is terminal equipment without interception capability according to the DMRS sequence of PSCCH or PSSCH of the first terminal equipment;
when the PSCCH of the first terminal device is detected in the first time-frequency resource set configured in the resource pool, the first terminal device is determined to be the terminal device without interception capability.
Specifically, the information field in the SCI of the first terminal device includes:
information fields in the first order SCI and/or the second order SCI of the first terminal device.
Specifically, the format of SCI includes a first format and a second format;
wherein the first format includes at least one of a first order SCI format 1-a, a second order SCI format 2-a, and a second order SCI format 2-B.
It should be understood that the foregoing and other operations and/or functions of the modules in the second terminal device according to the embodiments of the present application are respectively for implementing the corresponding flow of the second terminal device in the method 600 of fig. 6, and are not described herein for brevity.
The embodiment of the present application further proposes a terminal device, and fig. 15 is a schematic structural diagram of a terminal device 1500 according to an embodiment of the present application, including:
the transmission module 1510 is configured to obtain the resource pool configuration information, and determine, according to the first priority threshold, to transmit side line data with a priority level not higher than a priority level corresponding to the first priority threshold in the resource pool.
Optionally, the resource pool configuration information includes a first priority threshold.
Optionally, the resource pool configuration information includes indication information, where the indication information is used to indicate that the terminal without interception capability allows data transmission in the resource pool.
It should be appreciated that the foregoing and other operations and/or functions of the modules in the terminal device according to the embodiments of the present application are respectively for implementing the corresponding flow of the terminal device in the method 700 of fig. 7, and are not described herein for brevity.
The embodiment of the present application further proposes a second terminal device, and fig. 16 is a schematic structural diagram of a second terminal device 1600 according to an embodiment of the present application, including:
a resource reselection module 1610, configured to, when the second terminal device detects that a resource conflict occurs with the first terminal device under the condition that the CBR is lower than the first threshold, control the second terminal device to perform resource reselection; wherein the first terminal device comprises a terminal device without interception capability.
Optionally, the resource reselection module 1610 is configured to:
and when the second terminal equipment detects that the resource conflict occurs with the first terminal equipment and the second terminal equipment measures that the RSRP of the first terminal equipment is higher than a second threshold, controlling the second terminal equipment to reselect the resource.
Optionally, the first threshold and the second threshold are determined according to network configuration information or pre-configuration information.
Optionally, fig. 17 is a schematic structural diagram of a second terminal device 1700 according to an embodiment of the present application, and further includes:
a third determining module 1720 is configured to determine that the first terminal device is a terminal device without listening capability.
Optionally, the third determining module 1720 determines that the first terminal device is a terminal device without listening capability in at least one of the following ways:
determining that the first terminal device is a terminal device without interception capability according to the information field in the SCI of the first terminal device;
determining that the first terminal device is a terminal device without interception capability according to the format of the SCI of the first terminal device;
determining that the first terminal device is a terminal device without interception capability according to a scrambling sequence that scrambles the SCI bit sequence of the first terminal device;
determining that the first terminal equipment is terminal equipment without interception capability according to the DMRS sequence of PSCCH or PSSCH of the first terminal equipment;
when the PSCCH of the first terminal device is detected in the first time-frequency resource set configured in the resource pool, the first terminal device is determined to be the terminal device without interception capability.
Optionally, the information field in the SCI of the first terminal device includes:
information fields in the first order SCI and/or the second order SCI of the first terminal device.
Optionally, the format of the SCI includes a first format and a second format;
wherein the first format includes at least one of a first order SCI format 1-a, a second order SCI format 2-a, and a second order SCI format 2-B.
It should be understood that the foregoing and other operations and/or functions of the modules in the second terminal device according to the embodiments of the present application are respectively for implementing the corresponding flow of the second terminal device in the method 800 of fig. 8, and are not described herein for brevity.
The embodiment of the present application further proposes a network device, and fig. 18 is a schematic structural diagram of a network device 1800 according to an embodiment of the present application, including:
a first sending module 1810, configured to send configuration information to the second terminal device, where the configuration information is used to determine a first configuration parameter, and the first configuration parameter is used to determine an RSRP threshold corresponding to the first terminal device when the second terminal device performs resource selection, resource reselection, re-evaluation detection or pre-evaluation detection; wherein,
the first terminal device comprises a terminal device without interception capability;
the second terminal device comprises a listening capable terminal device.
Optionally, the first configuration parameter comprises a priority parameter.
Optionally, the first configuration parameter is used for the second network device to determine an RSRP threshold according to the first configuration parameter and priority information carried in the SCI of the first terminal device; or,
the first configuration parameter is used for the second network equipment to determine an RSRP threshold according to the first configuration parameter and the priority information of the second terminal equipment; or,
the first configuration parameter is used for the second network device to determine the RSRP threshold according to the first configuration parameter, the priority information carried in the SCI of the first terminal device, and the priority information of the second terminal device.
Optionally, the first configuration parameter comprises an RSRP threshold.
It should be appreciated that the foregoing and other operations and/or functions of the modules in the network device according to the embodiments of the present application are respectively for implementing the corresponding flow of the network device in the method 900 of fig. 9, and are not described herein for brevity.
The embodiment of the present application further proposes a network device, and fig. 19 is a schematic structural diagram of a network device 1900 according to an embodiment of the present application, including:
a second sending module 1910, configured to send resource pool configuration information to the terminal device, where the resource pool configuration information is used to instruct the terminal device to determine, according to the first priority threshold, to transmit side line data with a priority level not higher than a priority level corresponding to the first priority threshold in the resource pool.
Optionally, the resource pool configuration information includes a first priority threshold.
Optionally, the resource pool configuration information includes indication information, where the indication information is used to indicate that the terminal without interception capability allows data transmission in the resource pool.
It should be understood that the foregoing and other operations and/or functions of the modules in the network device according to the embodiments of the present application are respectively for implementing the corresponding flow of the network device in the method 1000 of fig. 10, and are not described herein for brevity.
The embodiment of the present application further proposes a network device, and fig. 20 is a schematic structural diagram of a network device 2000 according to an embodiment of the present application, including:
a third sending module 2010, configured to send configuration information to the second terminal device, where the configuration information is used to instruct the second terminal device to reselect resources if it is detected that a resource conflict occurs with the first terminal device if CBR is lower than a first threshold; wherein,
the first terminal device comprises a terminal device without interception capability;
the second terminal device comprises a listening capable terminal device.
Optionally, the configuration information is used to instruct the second terminal device to perform resource reselection if the second terminal device detects that a resource conflict occurs with the first terminal device and the second terminal device measures that the RSRP of the first terminal device is higher than the second threshold under the condition that the CBR is lower than the first threshold.
Optionally, the configuration information includes a first threshold and a second threshold.
It should be appreciated that the foregoing and other operations and/or functions of the modules in the network device according to the embodiments of the present application are respectively for implementing the corresponding flow of the network device in the method 1100 of fig. 11, and are not described herein for brevity.
Fig. 21 is a schematic structural diagram of a communication device 2100 according to an embodiment of the present application. The communication device 2100 shown in fig. 21 includes a processor 2110, and the processor 2110 can call and execute a computer program from a memory to implement the method in the embodiments of the present application.
Optionally, as shown in fig. 21, the communication device 2100 may also include a memory 2120. Wherein the processor 2110 may invoke and run a computer program from the memory 2120 to implement the method in the embodiments of the present application.
The memory 2120 may be a separate device from the processor 2110, or may be integrated into the processor 2110.
Optionally, as shown in fig. 21, the communication device 2100 may further include a transceiver 2130, and the processor 2110 may control the transceiver 2130 to communicate with other devices, in particular, may send information or data to other devices, or receive information or data sent by other devices.
Among other things, transceiver 2130 may include a transmitter and a receiver. The transceiver 2130 may further include an antenna, the number of which may be one or more.
Alternatively, the communication device 2100 may be a terminal device in the embodiment of the present application, and the communication device 2100 may implement a corresponding flow implemented by the terminal device in each method in the embodiment of the present application, which is not described herein for brevity.
Optionally, the communication device 2100 may be a network device in the embodiments of the present application, and the communication device 2100 may implement a corresponding flow implemented by the network device in each method in the embodiments of the present application, which is not described herein for brevity.
Fig. 22 is a schematic structural diagram of a chip 2200 according to an embodiment of the present application. The chip 2200 shown in fig. 22 includes a processor 2210, and the processor 2210 may call and execute a computer program from a memory to implement the method in the embodiment of the application.
Optionally, as shown in fig. 22, the chip 2200 may further include a memory 2220. Wherein the processor 2210 may call and run a computer program from the memory 2220 to implement the methods in embodiments of the application.
Wherein the memory 2220 may be a separate device from the processor 2210 or may be integrated in the processor 2210.
Optionally, the chip 2200 may also include an input interface 2230. Wherein processor 2210 may control the input interface 2230 to communicate with other devices or chips, and in particular, may obtain information or data sent by the other devices or chips.
Optionally, the chip 2200 may further include an output interface 2240. Wherein the processor 2210 may control the output interface 2240 to communicate with other devices or chips, in particular, may output information or data to the other devices or chips.
Optionally, the chip may be applied to a terminal device in the embodiment of the present application, and the chip may implement a corresponding flow implemented by the terminal device in each method in the embodiment of the present application, which is not described herein for brevity.
Optionally, the chip may be applied to a network device in the embodiment of the present application, and the chip may implement a corresponding flow implemented by the network device in each method in the embodiment of the present application, which is not described herein for brevity.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, or the like.
The processors mentioned above may be general purpose processors, digital signal processors (digital signal processor, DSP), off-the-shelf programmable gate arrays (field programmable gate array, FPGA), application specific integrated circuits (application specific integrated circuit, ASIC) or other programmable logic devices, transistor logic devices, discrete hardware components, etc. The general-purpose processor mentioned above may be a micro-processor or any conventional processor.
The memory mentioned above may be volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. The volatile memory may be random access memory (random access memory, RAM).
It should be understood that the above memory is exemplary but not limiting, and for example, the memory in the embodiments of the present application may be Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), direct RAM (DR RAM), and the like. That is, the memory in embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line (Digital Subscriber Line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., a floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), or the like.
It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
The foregoing is merely a specific embodiment of the present application, but the protection scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions should be covered in the protection scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (80)

  1. A setting method, comprising:
    when transmitting sidestream data, the first terminal device sets the priority in the sidestream control information SCI for scheduling the sidestream data as a first priority.
  2. The method of claim 1, wherein the first priority is a highest priority or a low priority; or,
    The value of the first priority is larger than or equal to the value of the priority corresponding to the first parameter; or,
    the first priority is not higher than the priority corresponding to the first parameter.
  3. The method of claim 2, wherein the highest priority is a highest priority among priority levels allowed by a resource pool for transmitting sidestream data by the first terminal device, or the highest priority is a highest priority among all priorities corresponding to sidestream data.
  4. The method of claim 2, wherein the lowest priority is a lowest priority among priority levels allowed by a resource pool for transmitting sidestream data by the first terminal device, or the lowest priority is a lowest priority among all priorities corresponding to sidestream data.
  5. The method according to any one of claims 1 to 4, wherein the first priority is different from a priority corresponding to sidestream data transmitted by the first terminal device.
  6. The method according to any of claims 1 to 5, wherein the first terminal device comprises a terminal device without interception capability.
  7. A setting method, comprising:
    when the second terminal equipment performs resource selection, resource reselection, re-evaluation detection or resource preemption pre-emission detection, determining a Reference Signal Received Power (RSRP) threshold corresponding to the first terminal equipment according to the first configuration parameter; wherein the first terminal device comprises a terminal device without interception capability.
  8. The method of claim 7, wherein the first configuration parameter comprises a priority parameter.
  9. The method according to claim 7 or 8, wherein the determining, according to the first configuration parameter, the RSRP threshold corresponding to the first terminal device includes:
    determining the RSRP threshold according to the first configuration parameter and the priority information carried in the SCI of the first terminal equipment; or,
    determining the RSRP threshold according to the first configuration parameter and the priority information of the second terminal equipment; or,
    and determining the RSRP threshold according to the first configuration parameter, the priority information carried in the SCI of the first terminal equipment and the priority information of the second terminal equipment.
  10. The method of claim 7, wherein the first configuration parameter comprises an RSRP threshold.
  11. A method according to any of claims 7 to 10, the first configuration parameter being determined by network configuration information or pre-configuration information.
  12. The method of any of claims 7 to 11, further comprising: the second terminal device determines that the first terminal device is a terminal device without interception capability.
  13. The method of claim 12, wherein the second terminal device determines that the first terminal device is a terminal device without listening capability in at least one of:
    The second terminal equipment determines that the first terminal equipment is terminal equipment without interception capability according to the information field in the SCI of the first terminal equipment;
    the second terminal equipment determines that the first terminal equipment is terminal equipment without interception capability according to the format of SCI of the first terminal equipment;
    the second terminal device determines that the first terminal device is a terminal device without interception capability according to a scrambling sequence for scrambling the SCI bit sequence of the first terminal device;
    the second terminal equipment determines that the first terminal equipment is the terminal equipment without interception capability according to a demodulation reference signal (DMRS) sequence of a Physical Sidelink Control Channel (PSCCH) or a Physical Sidelink Shared Channel (PSSCH) of the first terminal equipment;
    and when the second terminal equipment detects the PSCCH of the first terminal equipment in a first time-frequency resource set configured in the resource pool, the first terminal equipment is determined to be the terminal equipment without interception capability.
  14. The method of claim 13, wherein the information field in the SCI of the first terminal device comprises:
    information fields in the first order SCI and/or the second order SCI of the first terminal device.
  15. The method of claim 14 wherein the format of the SCI comprises a first format and a second format;
    wherein the first format includes at least one of a first-order SCI format 1-a, a second-order SCI format 2-a, and a second-order SCI format 2-B.
  16. A sidestream data transmission method, comprising:
    and the terminal equipment acquires the resource pool configuration information and determines that the transmission priority of the sidestream data in the resource pool is not higher than the priority corresponding to the first priority threshold according to the first priority threshold.
  17. The method of claim 16, wherein the first priority threshold is included in the resource pool configuration information.
  18. The method according to claim 16 or 17, wherein the resource pool configuration information comprises indication information, the indication information being used for indicating that a terminal without listening capability is allowed to perform data transmission in the resource pool.
  19. A sidestream data transmission method, comprising:
    under the condition that the channel occupancy rate CBR is lower than a first threshold, when the second terminal equipment detects that resource conflict occurs with the first terminal equipment, the second terminal equipment performs resource reselection; wherein the first terminal device comprises a terminal device without interception capability.
  20. The method of claim 19, wherein the second terminal device performs resource reselection when the second terminal device detects that a resource conflict occurs with the first terminal device, comprising:
    and when the second terminal equipment detects that resource conflict occurs with the first terminal equipment and the second terminal equipment measures that the RSRP of the first terminal equipment is higher than a second threshold, the second terminal equipment performs resource reselection.
  21. The method of claim 20, wherein the first threshold and the second threshold are determined according to network configuration information or pre-configuration information.
  22. The method of any of claims 19 to 21, further comprising: the second terminal device determines that the first terminal device is a terminal device without interception capability.
  23. The method of claim 22, wherein the second terminal device determines that the first terminal device is a terminal device without listening capability in at least one of:
    the second terminal equipment determines that the first terminal equipment is terminal equipment without interception capability according to the information field in the SCI of the first terminal equipment;
    the second terminal equipment determines that the first terminal equipment is terminal equipment without interception capability according to the format of SCI of the first terminal equipment;
    The second terminal device determines that the first terminal device is a terminal device without interception capability according to a scrambling sequence for scrambling the SCI bit sequence of the first terminal device;
    the second terminal equipment determines that the first terminal equipment is terminal equipment without interception capability according to the DMRS sequence of PSCCH or PSSCH of the first terminal equipment;
    and when the second terminal equipment detects the PSCCH of the first terminal equipment in a first time-frequency resource set configured in the resource pool, the first terminal equipment is determined to be the terminal equipment without interception capability.
  24. The method of claim 23, wherein the information field in the SCI of the first terminal device comprises:
    information fields in the first order SCI and/or the second order SCI of the first terminal device.
  25. The method of claim 24 wherein the format of the SCI comprises a first format and a second format;
    wherein the first format includes at least one of a first-order SCI format 1-a, a second-order SCI format 2-a, and a second-order SCI format 2-B.
  26. A configuration method, comprising:
    the network equipment sends configuration information to second terminal equipment, wherein the configuration information is used for determining a first configuration parameter, and the first configuration parameter is used for determining an RSRP threshold corresponding to the first terminal equipment when the second terminal equipment performs resource selection, resource reselection, re-evaluation detection or pre-evaluation detection; wherein,
    The first terminal device comprises a terminal device without interception capability;
    the second terminal device comprises a terminal device with interception capability.
  27. The method of claim 26, wherein the first configuration parameter comprises a priority parameter.
  28. The method according to claim 26 or 27, wherein the first configuration parameter is used for the second network device to determine the RSRP threshold according to the first configuration parameter and priority information carried in the SCI of the first terminal device; or,
    the first configuration parameter is used for the second network device to determine the RSRP threshold according to the first configuration parameter and the priority information of the second terminal device; or,
    the first configuration parameter is used for the second network device to determine the RSRP threshold according to the first configuration parameter, priority information carried in the SCI of the first terminal device, and priority information of the second terminal device.
  29. The method of claim 26, wherein the first configuration parameter comprises an RSRP threshold.
  30. A configuration method, comprising:
    the network equipment sends resource pool configuration information to the terminal equipment, wherein the resource pool configuration information is used for indicating the terminal equipment to determine that the transmission priority of the sidestream data in the resource pool is not higher than the priority corresponding to the first priority threshold according to the first priority threshold.
  31. The method of claim 30, wherein the first priority threshold is included in the resource pool configuration information.
  32. The method according to claim 30 or 31, wherein the resource pool configuration information comprises indication information, the indication information being used for indicating that a terminal without listening capability is allowed to perform data transmission in the resource pool.
  33. A configuration method, comprising:
    the network equipment sends configuration information to second terminal equipment, wherein the configuration information is used for indicating the second terminal equipment to reselect resources if the second terminal equipment detects that the second terminal equipment generates resource conflict with first terminal equipment under the condition that CBR is lower than a first threshold; wherein,
    the first terminal device comprises a terminal device without interception capability;
    the second terminal device comprises a terminal device with interception capability.
  34. The method of claim 33, wherein the configuration information is used to instruct the second terminal device to perform resource reselection if a resource conflict with a first terminal device is detected and the second terminal device measures that the RSRP of the first terminal device is above a second threshold if CBR is below a first threshold.
  35. The method of claim 34, wherein the configuration information includes the first threshold and the second threshold.
  36. A first terminal device, comprising:
    and the priority setting module is used for setting the priority in SCI for scheduling the sidestream data as a first priority when the first terminal equipment sends the sidestream data.
  37. The first terminal device of claim 36, wherein the first priority is a highest priority or a low priority; or,
    the value of the first priority is larger than or equal to the value of the priority corresponding to the first parameter; or,
    the first priority is not higher than the priority corresponding to the first parameter.
  38. The first terminal device of claim 37, wherein the highest priority is a highest priority among priority levels allowed by a resource pool for transmitting sidestream data by the first terminal device, or the highest priority is a highest priority among all priorities corresponding to sidestream data.
  39. The first terminal device of claim 37, wherein the lowest priority is a lowest priority among priority levels allowed by a resource pool of the first terminal device for sidestream data transmission, or the lowest priority is a lowest priority among all priorities corresponding to sidestream data.
  40. The first terminal device of any of claims 36 to 39, wherein the first priority is different from a priority corresponding to sidestream data sent by the first terminal device.
  41. The first terminal device of any of claims 36 to 40, wherein the first terminal device comprises a terminal device without interception capability.
  42. A second terminal device comprising:
    the first determining module is used for determining a Reference Signal Receiving Power (RSRP) threshold corresponding to the first terminal equipment according to the first configuration parameter when the second terminal equipment performs resource selection, resource reselection, re-evaluation detection or resource preemption pre-emission detection; wherein the first terminal device comprises a terminal device without interception capability.
  43. A second terminal device as defined in claim 42, wherein the first configuration parameter comprises a priority parameter.
  44. The second terminal device according to claim 42 or 43, wherein the first determining module is configured to:
    determining the RSRP threshold according to the first configuration parameter and the priority information carried in the SCI of the first terminal equipment; or,
    determining the RSRP threshold according to the first configuration parameter and the priority information of the second terminal equipment; or,
    And determining the RSRP threshold according to the first configuration parameter, the priority information carried in the SCI of the first terminal equipment and the priority information of the second terminal equipment.
  45. A second terminal device as defined in claim 42, wherein the first configuration parameter comprises an RSRP threshold.
  46. A second terminal device according to any of claims 42 to 45, wherein the first configuration parameter is determined by network configuration information or pre-configuration information.
  47. The second terminal device according to any of the claims 42 to 46, further comprising: and the second determining module is used for determining that the first terminal equipment is terminal equipment without interception capability.
  48. The second terminal device of claim 47, wherein the second determining module determines that the first terminal device is a terminal device without listening capability in at least one of:
    determining that the first terminal device is a terminal device without interception capability according to an information field in the SCI of the first terminal device;
    determining that the first terminal device is a terminal device without interception capability according to the format of the SCI of the first terminal device;
    determining that the first terminal device is a terminal device without interception capability according to a scrambling sequence that scrambles the SCI bit sequence of the first terminal device;
    Determining that the first terminal equipment is terminal equipment without interception capability according to a demodulation reference signal (DMRS) sequence of a Physical Sidelink Control Channel (PSCCH) or a Physical Sidelink Shared Channel (PSSCH) of the first terminal equipment;
    and when the PSCCH of the first terminal equipment is detected in a first time-frequency resource set configured in the resource pool, determining that the first terminal equipment is terminal equipment without interception capability.
  49. The second terminal device of claim 47, wherein the information field in the SCI of the first terminal device comprises:
    information fields in the first order SCI and/or the second order SCI of the first terminal device.
  50. The second terminal device of claim 49, wherein the format of the SCI comprises a first format and a second format;
    wherein the first format includes at least one of a first-order SCI format 1-a, a second-order SCI format 2-a, and a second-order SCI format 2-B.
  51. A terminal device, comprising:
    and the transmission module is used for acquiring the resource pool configuration information and determining that the transmission priority of the sidestream data in the resource pool is not higher than the priority corresponding to the first priority threshold according to the first priority threshold.
  52. The terminal device of claim 51, wherein the first priority threshold is included in the resource pool configuration information.
  53. The terminal device of claim 50 or 51, wherein the resource pool configuration information includes indication information, where the indication information is used to indicate that the terminal without interception capability is allowed to perform data transmission in the resource pool.
  54. A second terminal device comprising:
    the resource reselection module is used for controlling the second terminal equipment to reselect resources when the second terminal equipment detects that the resource conflict occurs with the first terminal equipment under the condition that the channel occupancy rate CBR is lower than a first threshold; wherein the first terminal device comprises a terminal device without interception capability.
  55. The second terminal device of claim 54, wherein the resource reselection module is configured to:
    and when the second terminal equipment detects that resource conflict occurs with the first terminal equipment and the second terminal equipment measures that the RSRP of the first terminal equipment is higher than a second threshold, controlling the second terminal equipment to reselect resources.
  56. The second terminal device of claim 55, wherein the first and second thresholds are determined based on network configuration information or pre-configuration information.
  57. The second terminal device of claims 54 to 56, further comprising:
    and a third determining module, configured to determine that the first terminal device is a terminal device without interception capability.
  58. The second terminal device of claim 57, wherein the third determining module determines that the first terminal device is a terminal device without listening capability in at least one of:
    determining that the first terminal device is a terminal device without interception capability according to an information field in the SCI of the first terminal device;
    determining that the first terminal device is a terminal device without interception capability according to the format of the SCI of the first terminal device;
    determining that the first terminal device is a terminal device without interception capability according to a scrambling sequence that scrambles the SCI bit sequence of the first terminal device;
    determining that the first terminal equipment is terminal equipment without interception capability according to the DMRS sequence of PSCCH or PSSCH of the first terminal equipment;
    and when the PSCCH of the first terminal equipment is detected in a first time-frequency resource set configured in the resource pool, determining that the first terminal equipment is terminal equipment without interception capability.
  59. The second terminal device of claim 58, wherein the information field in the SCI of the first terminal device comprises:
    information fields in the first order SCI and/or the second order SCI of the first terminal device.
  60. The second terminal device of claim 59, wherein the format of the SCI includes a first format and a second format;
    wherein the first format includes at least one of a first-order SCI format 1-a, a second-order SCI format 2-a, and a second-order SCI format 2-B.
  61. A network device, comprising:
    the first sending module is used for sending configuration information to the second terminal equipment, the configuration information is used for determining a first configuration parameter, and the first configuration parameter is used for determining an RSRP threshold corresponding to the first terminal equipment when the second terminal equipment performs resource selection, resource reselection, re-evaluation detection or pre-transmission detection; wherein,
    the first terminal device comprises a terminal device without interception capability;
    the second terminal device comprises a terminal device with interception capability.
  62. The network device of claim 61, wherein the first configuration parameter comprises a priority parameter.
  63. The network device of claim 61 or 62, wherein the first configuration parameter is used by the second network device to determine the RSRP threshold according to the first configuration parameter and priority information carried in the SCI of the first terminal device; or,
    The first configuration parameter is used for the second network device to determine the RSRP threshold according to the first configuration parameter and the priority information of the second terminal device; or,
    the first configuration parameter is used for the second network device to determine the RSRP threshold according to the first configuration parameter, priority information carried in the SCI of the first terminal device, and priority information of the second terminal device.
  64. The network device of claim 61, wherein the first configuration parameter comprises an RSRP threshold.
  65. A network device, comprising:
    the second sending module is used for sending resource pool configuration information to the terminal equipment, wherein the resource pool configuration information is used for indicating the terminal equipment to determine that the transmission priority of the sidestream data in the resource pool is not higher than the priority corresponding to the first priority threshold according to the first priority threshold.
  66. The network device of claim 65, wherein the first priority threshold is included in the resource pool configuration information.
  67. The network device of claim 65 or 66, wherein the resource pool configuration information includes indication information for indicating that a terminal without listening capability is allowed to perform data transmission in the resource pool.
  68. A network device, comprising:
    a third sending module, configured to send configuration information to a second terminal device, where the configuration information is used to instruct the second terminal device to reselect resources if it is detected that a resource conflict occurs with the first terminal device when CBR is lower than a first threshold; wherein,
    the first terminal device comprises a terminal device without interception capability;
    the second terminal device comprises a terminal device with interception capability.
  69. The network device of claim 68, wherein the configuration information is used to instruct the second terminal device to perform resource reselection if a resource conflict with a first terminal device is detected and the second terminal device measures that the RSRP of the first terminal device is above a second threshold if CBR is below a first threshold.
  70. The network device of claim 69, wherein the configuration information includes the first threshold and the second threshold.
  71. A terminal device, comprising: a processor and a memory for storing a computer program, the processor being for invoking and running the computer program stored in the memory, performing the method of any of claims 1 to 25.
  72. A network device, comprising: a processor and a memory for storing a computer program, the processor being for invoking and running the computer program stored in the memory, performing the method of any of claims 26 to 35.
  73. A chip, comprising: a processor for calling and running a computer program from a memory, causing a device on which the chip is mounted to perform the method of any one of claims 1 to 25.
  74. A chip, comprising: a processor for calling and running a computer program from a memory, causing a device on which the chip is mounted to perform the method of any of claims 26 to 35.
  75. A computer readable storage medium storing a computer program for causing a computer to perform the method of any one of claims 1 to 25.
  76. A computer readable storage medium storing a computer program for causing a computer to perform the method of any one of claims 26 to 35.
  77. A computer program product comprising computer program instructions for causing a computer to perform the method of any one of claims 1 to 25.
  78. A computer program product comprising computer program instructions for causing a computer to perform the method of any one of claims 26 to 35.
  79. A computer program which causes a computer to perform the method of any one of claims 1 to 25.
  80. A computer program which causes a computer to perform the method of any one of claims 26 to 35.
CN202080105537.8A 2020-12-30 2020-12-30 Setting method, terminal equipment and network equipment Pending CN116325827A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/141350 WO2022141181A1 (en) 2020-12-30 2020-12-30 Setting method, terminal device, and network device

Publications (1)

Publication Number Publication Date
CN116325827A true CN116325827A (en) 2023-06-23

Family

ID=82258778

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080105537.8A Pending CN116325827A (en) 2020-12-30 2020-12-30 Setting method, terminal equipment and network equipment

Country Status (2)

Country Link
CN (1) CN116325827A (en)
WO (1) WO2022141181A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109478991A (en) * 2016-08-11 2019-03-15 高通股份有限公司 Resource selection priority-based in device-to-device communication system
CN109565680A (en) * 2017-08-04 2019-04-02 Oppo广东移动通信有限公司 Method, terminal device and the network equipment of scheduling of resource
WO2019178749A1 (en) * 2018-03-20 2019-09-26 Oppo广东移动通信有限公司 Resource sharing method and terminal device
CN110972290A (en) * 2018-09-29 2020-04-07 中国信息通信研究院 Resource allocation method for terminal direct communication
US20200296701A1 (en) * 2019-03-15 2020-09-17 Samsung Electronics Co., Ltd. Method and device for priority-based control and data information transmission in wireless communication system
WO2020222595A1 (en) * 2019-05-02 2020-11-05 Lg Electronics Inc. Management of sidelink using sidelink control information and resource allocation

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106792885B (en) * 2016-06-15 2019-11-22 北京展讯高科通信技术有限公司 D2D communication resource reselecting method, device and terminal
EP3525539B1 (en) * 2016-11-03 2021-07-21 LG Electronics Inc. Method and device for transmitting sidelink channel busy ratio in wireless communication system
US11012835B2 (en) * 2017-11-01 2021-05-18 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Method and terminal for acquiring transmission resource in vehicle to everything
CN110266449A (en) * 2018-03-12 2019-09-20 华为技术有限公司 A kind of communication means and communication equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109478991A (en) * 2016-08-11 2019-03-15 高通股份有限公司 Resource selection priority-based in device-to-device communication system
CN109565680A (en) * 2017-08-04 2019-04-02 Oppo广东移动通信有限公司 Method, terminal device and the network equipment of scheduling of resource
WO2019178749A1 (en) * 2018-03-20 2019-09-26 Oppo广东移动通信有限公司 Resource sharing method and terminal device
CN110972290A (en) * 2018-09-29 2020-04-07 中国信息通信研究院 Resource allocation method for terminal direct communication
US20200296701A1 (en) * 2019-03-15 2020-09-17 Samsung Electronics Co., Ltd. Method and device for priority-based control and data information transmission in wireless communication system
WO2020222595A1 (en) * 2019-05-02 2020-11-05 Lg Electronics Inc. Management of sidelink using sidelink control information and resource allocation

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
OPPO: "Resource pool sharing between mode 3 and mode 4", 《3GPP TSG RAN WG1 MEETING #92 R1-1802113》, 13 February 2018 (2018-02-13), pages 2 - 3 *
RENO: "Discussion on sidelink resource allocation in mode 2 for NR V2X", 《3GPP TSG RAN WG1 #99 R1-1912753》, 8 November 2019 (2019-11-08), pages 5 - 6 *

Also Published As

Publication number Publication date
WO2022141181A1 (en) 2022-07-07

Similar Documents

Publication Publication Date Title
US20210258921A1 (en) Communication method and communications apparatus
US20230069646A1 (en) Method for determining transmission resources and terminal device
CN112640347B (en) Wireless communication method, terminal equipment and network equipment
US20220338262A1 (en) Information determination method, information indication method, terminal device, and network device
US20200374887A1 (en) Channel transmission method and apparatus, and computer storage medium
US20230069425A1 (en) Sidelink resource allocation method and terminal device
CN115245027A (en) Resource allocation method and terminal
US20220394503A1 (en) Wireless communication method and device
WO2022067611A1 (en) Method for reporting listen-before-talk failure, terminal device, and network device
EP3751930B1 (en) Method and apparatus for transmitting harq information, and computer storage medium
CN116325827A (en) Setting method, terminal equipment and network equipment
CN116170117A (en) Sidestream feedback information processing method, terminal equipment and network equipment
CN115190628B (en) Resource transmission method and terminal equipment
US20220303061A1 (en) Parameter setting method, parameter indication method, terminal device, and network device
WO2022236511A1 (en) Listening method, terminal device, network device, chip and storage medium
WO2023044735A9 (en) Wireless communication method and terminal device
WO2022077215A1 (en) Wireless communication method, terminal and network device
EP4210415A1 (en) Method for reporting random access situation, and terminal device and network device
WO2022170478A1 (en) Wireless communication method, terminal device and network device
CN114731239B (en) Conflict processing method and terminal equipment
WO2023115306A1 (en) Congestion control method and terminal device
WO2023279258A1 (en) Resource selection method and terminal device
CN116326187A (en) Interception method and terminal based on discontinuous reception
CN116058028A (en) Resource set transmission method and terminal
CN117136568A (en) Wireless communication method and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination