OA20563A - Methods, terminal device and network node for uplink transmission. - Google Patents

Methods, terminal device and network node for uplink transmission. Download PDF

Info

Publication number
OA20563A
OA20563A OA1202100595 OA20563A OA 20563 A OA20563 A OA 20563A OA 1202100595 OA1202100595 OA 1202100595 OA 20563 A OA20563 A OA 20563A
Authority
OA
OAPI
Prior art keywords
guard band
network node
uplink transmission
terminal device
configured grant
Prior art date
Application number
OA1202100595
Inventor
Jinhua Liu
Min Wang
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Publication of OA20563A publication Critical patent/OA20563A/en

Links

Abstract

Methods, a terminal device and a network node are disclosed for uplink transmission. According to an embodiment, the terminal device receives, from a network node, a configured grant that indicates resources occupying at least a guard band. The terminal device performs an uplink transmission to the network node using at least the guard band.

Description

METHODS, TERMINAL DEVICE AND NETWORK NODE FOR UPLINK TRANSMISSION
Technîcal Field
[0001] Embodiments of the dîsclosure generally reiate to wireless communication, and, more parties la r!y, to methods, a terminal device and a network node for uplink transmission.
Backqround
[0002] This section introduces aspects that may faciiitate better understanding of the présent dîsclosure. Accordingly, the Etalements of this section are to be read in this light and are not to be understood as admissions about what is in the prier art or what is not in the prior art.
[0003] Next génération Systems are expecied to support a wide range of use cases with varying requirements ranging from fully mobile devices to stationary Internet of things (loT) or fixed wireless broadband devices. The traffic pattern associated with many use cases is expecied to consist of short or long bursts ofdata traffic with varying iength ofwaiting period in between (here called inactive State), in new radio (NR), both license assisted access and standalone unlicensed operation are to be supported in 3rd génération partnership project (3GPP).
[0004] in order to tackle with the ever increasing data demanding, NR is considered both licensed and unlicensed spectrum. Compared to Ihe long term évolution (LTE) iicensed assisted access (LAA), NR-based access to unlicensed spectrum (NR-U) also needs to support dual connectivily (DC) and standalone scénarios, where the media access control (MAC) procedures including random access channel (RACH) and scheduling procedure on unlicensed spectrum are subject to the liston before talk (LBT) failures, while there is no such restriction in LTE LAA, since there is licensed spectrum in LAA scénario so the RACH and scheduling related signaling can be transmitted on the licensed spectrum instead of unlicensed spectrum.
[0005] For discovery reference signal (DRS) transmission such as primary synchronization signal (PSS)/secondary synchronization signal (SSS), physical broadeast channel (PBCH), channel State information reference signal (CSI-RS), contre! channel transmission such as physical upiink control channel (PUCCH)/physical downiink control channel (PDCCH), physicai data channei such as physical uplink shared channel (PUSCH)/physica! downiink shared channel (PDSCH), and uplink sounding reference signal such as sounding référencé signai (SRS) transmission, channei sensing shouid be applied to déterminé the channei avaiiabiiity before the physical signai is transmitted using the channei.
[0006] The radio resource management (RRM) procedures in NR-U would be generaily 5 rathersimiiaras in LAA, since NR-U is aiming to reuse LAA/enhanced LAA (eLAA)/further enhanced LAA (feLAA) technoiogies as much as possibie to handle the coexistence between NR=U and other legacy radio access technoiogies (RATs). RRM measurements and report comprise spécial configuration procedure with respect to the channei sensing and channei avaiiabiiity.
[0007] Hence, channei access/selection for LAA is one of important aspects for coexistence with other RATs such as Wi-Fi. For instance, LAA has aimed to use carriers that are congested with Wi-Fi.
[0008] In [icensed spectrum, user equipment (UE) measures Référencé Signai Received Power (RSRP), and Référencé Signal Received Quality (RSRQ) of the downlink radio channei (e.g. synchronization signai (SS) and PB CH biock sîmply referred to as S SB, CS1-
RS), and provides the measurement reports to its serving evolved node B (eNB)/next génération node B (gNB). However, they do not reflect the interférence strength on the carrier. Another metric Received Signai Strength indicator (RSS!) can serve for such purpose. At the eNB/gNB side, it is possible to dérivé RSSi based on the received RSRP and RSRQ reports. However, this requires that they must be avaiiabie. Due to the LBT faiiure, some reports in terms of RSRP or RSRQ may be biocked (can be either due to that the référencé signa! transmission (DRS) is biocked in the downlink or the measurement report is biocked in the uplink). Hence, the measurements in terms of RSSi are very usefui. The RSSi measurements together with the time information concerning when and how long time that UEs hâve made the measurements can assist the gNB/eNB to detect the hidden node. Additionaliy, the gNB/eNB can measure the load situation of the carrier which is usefui for the network to prioritize some channels for ioad baiance and channei access faiiure avoidance purposes.
[0009] LTE LAA has defined to support measurements of averaged RSSI and channei 30 occupancy for measurement reports. The channei occupancy is defined as percentage of time that RSS! is measured above a configured threshold. For this purpose, a RSSI measurement timing configuration (RMTC) includes a measurement duration (e.g. 1-5 ms) and a period between measurements (e.g. {40, 80, 160, 320, 640} ms).
Summary
[0010] This summary is provided to introduce a sélection of concepts in a simplified form that are further described below in the detaiîed description. This summary is not iniended to identity key features oressential features ofthe claimed subject matter, nor is it intended to be used to limit the scope ofthe claimed subject matter.
[0011] One ofthe abjects ofthe disclosure is to provide an improved solution for uplink transmission.
[0012] According to a first aspect ofthe disclosure, there is provided a method in a terminal device. The method may comprise receiving, from a network node, a configured grant that indicates resources occupying at least a guard band. The method may further comprise performing an uplink transmission to the network node using at least the guard band.
[0013] In this way, the resource utilization efficiency in the case of configured scheduling can be enhanced.
[0014] In an embodiment ofthe disclosure, the resources indîcated by the configured grant may further occupy a subband adjacent to the guard band. The uplink transmission may be performed using the guard band and the subband adjacent to the guard band.
[0015] in an embodiment ofthe disclosure, a location and a size of the guard band may be signaied from the network node.
[0016] In an embodiment ofthe disclosure, a location and a size ofthe guard band may be preconfigured.
[0017] In an embodiment of the disclosure, the configured grant may be received in a configured grant configuration. The configured grant configuration may indicate that the resources indicated by the configured grant are overlapped with the guard band.
[0018] ln an embodiment of the disclosure, the configured grant may be received in a configured grant configuration. The configured grant configuration may indicate that the resources indicated by the configured grant are within the guard band.
[0019] In an embodiment of the disclosure, the method may further comprise performing LBT operations forsubbands associated with the guard band. The uplinktransmission may be performed based on results ofthe LBT operations.
[0020] in an embodiment ofthe disclosure, the LBT operations may be perfomned for two subbands adjacent to the guard band. The uplink transmission may be performed when the résulta of the LBT operations indicate that the two subbands are available for the terminai device.
[0021] in an embodiment ofthe disclosure, the subbands associated with the guard band may be indicated by the network node as available for channei occupancy time (COT) sharing. Part of a do wn link COT is able to be shared with configured grant based transmissions. A location and a size of the guard band may be indicated by the network node as available for an uplink transmission.
[0022] în an embodiment ofthe disclosure, the subbands and the location and the size of the guard band may be indicated by the network node In one or more of: COT structure information signaling; radio resource control (RRC) signaling; media access control (MAC) control element (CE); and downiink control information (DCl).
[0023] in an embodiment ofthe disclosure, performîng the uplink transmission using at least the guard band may comprise mapping first, at least one code block group (CBG) to physica! resource bîocks (PRBs) occupying the guard band. The first, at least one CBG may be different from second, at least one CBG mapped to PRBs not occupying the guard band. Alternatively, perfoiming the uplink transmission using at least the guard band may comprise mapping first, at least one logicai channel to PRBs occupying the guard band. The first, at least one logicai channel may hâve lower priority than second, at least one logicai channel mapped to PRBs not occupying the guard band.
[0024] In an embodiment ofthe disclosure, the method may further comprise transmitting, to the network node, an indication about the uplink transmission using at least the guard band.
[0025] In an embodiment of the disclosure, the indication about the uplink transmission may comprise a first indicator indicating whetherthere is an uplink transmission in a guard band.
[0026] In an embodiment of the disclosure, the first indicator for a subband may comprise two bits indicating whether there îs an uplink transmission in an upper guard band and a lower guard band of the subband respectively.
[0027] in an embodiment of the disclosure, the indication about the uplink transmission may furthercomprise a second indicator indicating a location and a size ofthe guard band.
[0028] In an embodiment of the disclosure, the indication about the uplink transmission may be transmitted to the network node in uplink control information (UCI).
[0029] in an embodiment ofthe disclosure, the method may further comprise determining whether to enable the use of a guard band for an uplink transmission, based on current channel occupancy or LBT failure staiistics measured by the terminal device.
[0030] In an embodiment ofthe disclosure, the method may further comprise providing user data and forwarding the user data to a host computer via the transmission to the base station,
[0031] According to a second aspect of the disclosure, there is provided a method in a network node. The method may comprise transmitting, to a terminal device, a first configured grantthat indicates resources occupying at least a first guard band. The method may further comprise receiving an uplink transmission from the terminal device in at least the first guard band.
[0032] In this way, the resource utilisation efficiency in the case of configured scheduling can be enhanced.
[0033] In an embodiment ofthe disclosure, the resources indicated by the first configured grant may further occupy a first subband adjacent to the first guard band. The uplink transmission may be received in the first guard band and the first subband,
[0034] In an embodiment ofthe disclosure, the method may further comprise transmitting, to the terminal device, information about locations and sizes of one or more guard bands including the first guard band.
[0035] In an embodiment ofthe disclosure, the first configured grant may be transmitted in a configured grant configuration. The configured grant configuration may indicate, for each of one or more configured grants including the first configured grant, whether resources indicated by the configured grant are overlapped with a guard band.
[0036] în an embodiment ofthe disclosure, the first configured grant may be transmitted in a configured grant configuration. The configured grant configuration may indicate, for each of one or more configured grants including the first configured grant, whether resources indicated by the configured grant are within a guard band.
[0037] In an embodiment ofthe disclosure, the method may further comprise indicating, to the terminal device, multiple subbands available for COT sharing. Part of a downlink COT is able to be shared with configured grant based transmissions. The method may further comprise indicating, to the termina] device for each of one or more guard bands inciuding the first guard band, whether the guard band is available for an uplink transmission.
[0038] In an embodiment of the disclosure, the multiple subbands and the one or more guard bands may be indicated by the network node in one or more of: COT structure information signaling; RRC signaling; MAC CE; and DC1.
[0039] In an embodiment of the disclosure, the method may further comprise receiving, from the terminal device, an indication about the uplink transmission using at least the first guard band.
[0040] In an embodiment of the disclosure, the indication about the uplink transmission may comprise a first indicator indicating whetherthere is an uplink transmission in a guard band.
[0041] In an embodiment ofthe dîsciosure, the first indicatorfor a subband may comprise two bits indicating whether there is an uplink transmission in an upper guard band and a lowerguard band ofthe subband respectively.
[0042] In an embodiment of the disclosure, the indication about the uplink transmission may further comprise a second indicator indicating a location and a size ofthe first guard band.
[0043] In an embodiment of the disclosure, the indication about the uplink transmission may be received from the terminai device in UCI.
[0044] In an embodiment ofthe disclosure, whether or not to use a guard band for an uplink transmission maybe configured perceil/camer/bandwidth part (BWP).
[0045] In an embodiment ofthe disclosure, whether or not to use a guard band for an upiink transmission may be configured per terminai device/service/logical channel/fogical channel group.
[0046]According to a third aspect ofthe disclosure, there is provided a terminal device, The temninal device may comprise at least one processor and at least one memory. The at least one memory may contain instructions exécutable by the at îeast ons processor, whereby the terminal device may be operative to receive, from a network node, a 5 configured grant that indicates resources occupying at least a guard band, The temninal device may be further operative to perform an uplink transmission to the network node using at least the guard band.
[0047] In an embodiment ofthe disclosure, the terminal device may be operative to perform the method according to the above first aspect, lû [0048] According to a fourth aspect ofthe disclosure, there is provided a network node. The network node may comprise at least one processor and at least one memory. The at least one memory may contain instructions exécutable by the at least one processor, whereby the network node may be operative to transmit, to a terminal device, a first configured grant that indicates resources occupying at least a first guard band. The network 15 node may be further operative to receive an uplink transmission from the terminal device in at least the first guard band.
[0049] In an embodiment ofthe disclosure, the network node may be operative to perform the method acconding to the above second aspect,
[0050] According to a fifth aspect of the disclosure, there is provided a computer program 20 product. The computer program product may comprise instructions which when executed by at least one processor, cause the ai least one processor to perform the method according to any ofthe above first and second aspects.
[0051] According to a sixth aspect ofthe disclosure, there is provided a computer readable storage medium. The computer readable storage medium may comprise instructions which 25 when executed by at least one processor, cause the at least one processor to perform the method according to any ofthe above first and second aspects,
[0052] According to a seventh aspect ofthe disclosure, there is provided a terminal device. The terminai device may comprise a réception module for receiving, from a network node, a configured grant that indicates resources occupying at least a guard band. The terminal 30 device may further comprise a transmission module for performing an uplink transmission to the network node using at least the guard band.
[0053] According to an eighth aspect of the disclosure, there is provided a network node. The network node may comprise a transmission module for transmitting, to a terminal device, a first configured grant that indicates resources occupying at least a first gnard band. The network node may further comprise a réception module for receiving an uplink 5 transmission from the terminal device in at least the first guard band.
[0054] According to a ninth aspect of the disclosure, there is provided a method implemented in a communication System including a host computer, a base station and a terminal device. The method may comprise, at the host computer, receiving user data transmitted to the base station from the termina! device. The terminal device may receive, 10 from a base station, a configured grant that indicates resources occupying at least a guard band. The terminal device may perform an upiink transmission to the base station using at least the guard band.
[0055] In an embodiment of the disclosure, the method may further comprise, at the terminal device, providing the user data to the base station.
[0056] In an embodiment of the disclosure, the method may further comprise, at the terminal device, executing a client application, thereby providing the user data to be transmitted. The method may further comprise, at the host computer, executing a host application associated with the client application.
[0057] In an embodiment of the disclosure, the method may further comprise, at the 20 terminal device, executing a client application. The method may further comprise, at the terminal device, receiving input data to the client application. The input data may be provided at the host computer by executing a host application associated with the client application. The user data to be transmitted may be provided by the client application in response to the input data.
[0058] According to a tenth aspect of the disclosure, there is provided a communication system including a host computer comprising a communication interface configured to receive user data originatîng from a transmission from a terminal device to a base station. The terminal device may comprise a radio interface and processing circuitry. The Processing circuitry of the terminal device may be configured to receive, from a base station, a configured grant that indicates resources occupying at least a guard band. The processing circuitry of the terminai device may be further configured to perform an uplink transmission to the base station using at least the guard band.
[0059] in an embodiment ofthe disclosure, the communication System may further include the terminal device.
[0060] In an embodiment ofthe disclosure, the communication system may further include the base station. The base station may comprise a radio interface configured to communicate with the terminal device and a communication interface configured to forward to the host computer the user data carried by a transmission from the terminal device to the base station.
[0061] In an embodiment of the disclosure, the processing circuitry of the host computer may be configured to execute a host application. The processing circuitry ofthe terminal device may be configured to execute a client application associated with the host application, thereby providing the user data.
[0062] In an embodiment of the disclosure, the processing circuitry of the host computer may be configured to execute a host application, thereby providing request data. The Processing circuitry ofthe terminal device may be configured to execute a client application associated with the host application, thereby providing the user data in response to the request data.
[0063] According to an eleventh aspect of the disclosure, there is provided a method implemented in a communication system incïuding a host computer, a base station and a terminal device. The method may comprise, atthe host computer, receiving, from the base station, user data originating from a transmission which the base station has received from the terminal device, The base station may transmit, to a terminal device, a first configured grant that indicates resources occupying at least a first guard band. The base station may receive an uplink transmission from the terminal device in at least the first guard band.
[0064] In an embodiment of the disclosure, the method may further comprise, at the base station, receiving the user data from the terminal device,
[0065] In an embodiment of the disclosure, the method may further comprise, at the base station, initiating a transmission of the received user data to the host computer.
[0066] According to a twelfth aspect of the disclosure, there is provided a communication System including a host computer comprising a communication interface configured to receive user data originating from a transmission from a terminal device to a base station, The base station may comprise a radio interface and processing circuitry. The base station's processing circuitry may be configured to transmit, to a terminal device, a first configured grant that indicates resources occupying at least a first guard band. The base station’s processing circuitry may be further configured to receive an uplink transmission from the terminal device in at ieast the first guard band.
[0067] In an embodiment ofthe disclosure, the communication System may further include the base station.
[0068] In an embodiment ofthe disclosure, the communication system may further include the terminal device. The terminai device may be configured to communicate with the base station.
[0069] In an embodiment ofthe disclosure, the processing circuitry ofthe host computer may be configured to execute a host application. The termina! device may be configured to execute a client application associated with the host application, thereby providing the user data to be received by the host computer.
[0070] According to a thirteenth aspect of the disclosure, there is provided a method implemented in a communication system including a network node and a terminal device. The method may comprise, at the network node, transmitting, to the termina! device, a first configured grantthat indicates resources ocGupying at least a first guard band. The method may further comprise, at the terminal device, receiving, from the network node, the configured grant that indicates resources occupying at least the first guard band. The method may further comprise, at the terminal device, performing an uplink transmission to the network node using at least the first guard band. The method may further comprise, at the network node, receiving the uplink transmission from the terminal device in at least the first guard band.
[0071] According to a fourteenth aspect of the disclosure, there is provided a communication system comprising a network node and a terminal device. The network node may be configured to transmit, te a terminal device, a first configured grant that indicates resources occupying at ieast a first guard band, and receive an uplink transmission from the terminal device in at ieast the firat guard band. The terminal device may be configured to receive, from the network node, the configured grant that indicates resources occupying at least the first guard band, and perform the uplink transmission to the network node using at least the first guard band.
Brief Description of the Drawings
[0072] These and other objects, features and advantages of the disclosure will become apparent from the following detailed description of illustrative embodiments thereof, which are to be read in connection with the accompanying drawings.
[0073] FIG. 1 illustrâtes transmission opportunities with and without COT sharing;
[0074] FiG. 2 illustrâtes a wideband carrier containing a BWP with four subbands;
[0075] FIG. 3 illustrâtes configured grant configurations according to an embodiment of the disclosure;
[0076] FiG. 4 is a flowchart illustrating an exempiary process according to an embodiment 10 of the disclosure;
[0077] FIG. 5 is a flowchart illustrating a method implemented at a terminal device according to an embodiment of the disclosure;
[0078] FiG. 6 is a flowchart illustrating a method implemented at a terminai device according to another embodiment ofthe disclosure;
[0079] FIG. 7 is a flowchart illustrating a method implemented at a network node according to an embodiment ofthe disclosure;
[0080] FiG. 8 is a flowchart illustrating a method implemented at a network node according to another embodiment ofthe disclosure;
[0081] FIG. 9 is a flowchart iilustrating a method implemented at a network node according 20 to another embodiment of the disclosure;
[0082] FIG. 10 is a block diagram showing an apparatus suitable for use in practicing some embodiments of the disclosure;
[0033] FiG. 11 is a block diagram showing a terminal device according to an embodiment of the disclosure;
[0084] FiG. 12 is a block diagram showing a network node according to an embodiment of the disclosure;
[0085] FIG. 13 is a diagram showing a télécommunication network connected via an rntemnediate network to a host computer in accordance with some embodiments ;
[0086] FIG. 14 is a diagram showing a host computer communicating via a base station 30 with a user equipment in accordance with some embodiments;
[0087] FIG. 15 is a flowchart illustrating a method implemented in a communication system in accordance with some embodiments;
[0088] FIG. 16 is a flowchart illustrating a method implemented in a communication system in accordance with some embodiments;
[0089] FIG. 17 is a flowchart illustrating a method implemented in a communication System in accordance with some embodiments; and
[0090] FIG. 18 is a flowchart illustrating a method implemented in a communication system in accordance with some embodiments.
Detaiied Description
[0091] For the purpose of explanation, details are set forth in the following description in order to provide a thorough understanding of the embodiments disclosed. It is apparent, however, to those skiiled in the art that the embodiments may be implemented without these spécifie details or with an équivalent arrangement.
[0092] For a node (e.g., NR-U gNB/UE, LTE-LAA eNB/UE, or Wi-Fi access point (AP)/siation (STA)) to be allowed îo transmit in uniieensed spectrum (e.g., 5GHz band), it typicaily needs to perform a clear channel assessment (CCA). This procedure typicaily incîudes sensing the mediumto be idle fora number of time intervals. Sensing the medium to be idle can be done in different ways, e.g. using energy détection, preamble détection or using Virtual carrier sensing. The latter implies that the node reads control information from other transmitting nodes informing when a transmission ends. After sensing the medium to be idle, the node is typicaily allowed to transmit for a certain amount of time, sometimes referred to as transmission opportunity (TXOP). The length of the TXOP dépends on régulation and type of CCA that has been performed, but typicaily ranges from 1 ms to 10ms. This duration is often referred to as Channel Occupancy Time (COT).
[0093] In Wi-Fi, feedback of data réception acknowledgements (ACKs) is transmitted without performing clear channel assessment Preceding feedback transmission, a smaii time duration (called SIFS) is introduced between the data transmission and the corresponding feedback which does not include arguai sensing of the channel. In 802.11, the SIFS period (16 ps for5GHz orthogonal frequency division multipîexing (OFDM) PHYs) is defined as:
aSIFSTime = aRxPHYDelay + aMACProcessingDelay + aRxTxTurnaroundTime where aRxPHYDelay defines the duration needed by the physical (PHY) layer to deliver a packet to the MAC layer, aMACProcessingDelay defines the duration that the MAC layer needs to triggerthe PHY layer transmitting a response, and gRxTxTurnaroundTime defines the duration needed to tum the radio from réception into transmission mode, Therefore, the StFS duration is used to accommodate for the hardware delay to switch the direction from réception to transmission.
[0094] it is anticipated that for NR in uniicensed bands (NR-U), a similar gap to accommodate for the radio tumaround time will be allowed. For example, this wili enable the transmission of PUCCH carrying uplink contre! information (UCI) feedback as well as PUSCH carrying data and possible UCI within the same transmit opportunity (TXOP) acquired by the inîtiating gNB witbout the UE performing clear channel assessment before PUSCH/PUCCH transmission as long as the gap between downlink (DL) and uplink (UL) transmission is less than orequalto 16 ps. Operation in this manner istypically called “COT sharing.” An example on COT sharing is illustrated in FIG 1. It shows TXOP both with and without COT sharing where CCA is performed by the inîtiating node (gNB). For the case of COT sharing, the gap between DL and UL transmissions is less than 16 ps.
[0095] Listen-before-talk (LBT) is designed for uniicensed spectrum co-existence with other RATs. In this mechanlsm, a radio device applies a clear channel assessment (CCA) check (i.e. channel sensing) before any transmission. The transmitter involves energy détection (ED) over a time period compared fo a certain energy détection threshold (ED threshoid) in orderto détermine if a channel is idle. In case the channel isdetermined to be occupied, the transmitter performs a random back-off within a contention window before next CCA attempt. In orderto protectthe ACK transmissions, the transmitter must déféra period after each busy CCA slot prior to resuming back-off. As soon as the transmitter has grasped access to a channel, the transmitter is only allowed to perform transmission up to a maximum time duration (namely, the maximum channel occupancy time (MCOT)). For quality of service (QoS) différentiation, a channel access priority based on the service type has been defined. For example, there are four LBT priority classes defined for différentiation of channel access priorities between services using contention window size (CWS) and MCOT duration,
[0096] The channel access schemes for NR-based access for uniicensed spectrum can be classified into the following categories. Category 1 is immédiate transmission after a short switching gap. This îs used for a transmitter to immediately transmit after a UL/DL switching gap Inside a COT. The switching gap from réception to transmission is to , 1 accommodate the transceivertumaround time and is no longer than 16 ps. Category 2 is LBT without random back-off. The duration oftime that the channel is sensed to be idle before the transmitting entity transmits is deterministic.
[0097] Category 3 is LBT with random back-off with a contention window of fixed size. The 5 LBT procedure has the foiiowing procedure as one of its components. The transmitting entity draws a random number N within a contention window. The size of the contention window îs specified by the minimum and maximum value of N. The size ofthe contention window is fixed. The random number N is used in the LBT procedure to detemnine the duration oftime thatthe channel is sensed to be idle before the transmitting entity transmits 10 on the channel.
[0098] Category 4 is LBT with random back-off with a contention window of variable size. The LBT procedure has the following as one of its components. The transmitting entity draws a random number N within a contention window. The size of contention window is specified by the minimum and maximum value of N. The transmitting entity can vary the 15 size of the contention window when drawing the random number N. The random number
N is used in the LBT procedure to détermine the duration oftime that the channel îs sensed to be idle before the transmitting entity transmits on the channel. For different transmissions in a COT and different channels/signals to be transmitted, different categories of channel access schemes can be used.
[0099] As for NR in licensed bands, it is expected that NR-U will support transmissions over a wide bandwidth (» 20 MHz), which is configured with multiple LBT subbands and each of them contains 20 MHz. In this case, a UE may net grasp al! configured LBT subbands due to the LBT failures priorto a transmission.
[00100] Two possible approaches (nameîy alternative 1 (Alt.1) and Ait. 2) for UL 25 transmissions in a wideband carrier may be used. For UL transmissions in a serving cell with carrier bandwidth greaterthan LBT bandwidth, for the case where UE perforais CCA before UL transmission, at least Alt. 1 may be supported among the following alternatives. In Alt. 1, UE transmits the PUSCH only if CCA is successful at UE in ail LBT bandwidths of the scheduled PUSCH. in Alt. 2, UE transmits the PUSCH in ail or a subset of LBT 30 bandwidths ofthe scheduled PUSCH forwhich CCA is successful at the UE.
[00101] In a wideband carrier, a guard band is required to be configured between two adjacent LBT subbands, to avoid/mitigate LBT operation and receiver performance to be negativeiy impacted by potentia! in-carrier leakage. Guard band requirements, e.g., minimum bandwidth, absolute location, etc. may then be defined accordingiy. it may be désirable that the guard bands are configured in a bandwidth part (BWP) as integer multiplies of physical resource block (PRB). An example of a wideband carrier containing multiple LBT subbands is iliustrated in FIG. 2.
[00102] In MR, configured scheduiing is used to ailocate semi-static periodic assignments or grants for a UE. For uplink, there are two types of configured scheduiing schemes: Type 1 and Type 2. For Type 1, configured grants are configured via radio resource control (RRC) signaling only. For Type 2, similar configuration procedure as semi-persistent scheduiing (SPS) upiink (UL) in LTE was defined, i.e, some parameters are preconfigured via RRC signaling and some physical layer parameters are configured via MAC scheduiing procedure. The detail procedures can be found în 3GPPtechnical spécification (TS) 38.321 V15.4.0. The configured uplink scheduiing will be also used in NR uniîcensed operation. For NR-U, the configured scheduiing can improve the channe! access probability for PUSCH transmission because additional LBT for PDCCH transmission per UL grant is avoided and the UE can acquire channel for PUSCH transmission using a configured grant after LBT success. In this uplink transmission procedure, only single LBT procedure is needed compared to 3 LBT procedures (one forscheduiing request (SR) transmission (TX), one for PDCCH for UL grant and one for PUSCH TX) relying on SR/buffer status report (BSR) procedure. This can significantly improve the channel access probability for PUSCH transmission.
[00103] Ailowing consecutive configured grant resources in time without any gaps in between the resources and non-consecutive configured grant resources (not necessarily periodic) with gaps in between the resources is bénéficiai.
[00104] in carrier aggregation, each carrier comportent (CC) has a guard band defined by RAN4. However, from RAN4 perspective, there is no requirement that the guard bands between two or more contiguous carriers are left empty. Hence, optimizations may be considered whereby the transmitting device uses the guard PRBs and the receiving device assumes that data symbois are mapped to these PRBs.
[00105] For a wideband carrier/BWP containing multiple lbt subbands, once the guard bands are needed, the defauftBWP configuration should skipall the guard bands assuming ail the adjacent subbands are not avaitable for data transmission and réception. Specifically, for a configured grant configuration of a UE, the allocated configured grant by the gNB would skip the guard bands, which reduces the spectral utilization efficiency.
[00106] However, when two adjacent subbands are both available, the guard band between them may not be needed. Jn other words, the guard bands can be utilized for transmission or réception in such cases which can improve the resource utilization efficiency. Because the g NB is not aware of LBT results for UL transmissions since the LBT operation is performed at the UE side, in orderto utilize the guard bands for UL configured grant based transmissions, the UE must report the LBT results to rts serving gNB. After that, the gNB can reconfigure configured grants to the UE, which is not delay efficient, Therefore, it would be advantageous to study how to utilize the guard bands for UL configured grant based transmissions in case of configured scheduiing.
[00107] The présent disciosure proposes an improved solution foruplink transmission. The solution may be applied to a wireless communication system including a terminal device and a network node such as a base station or any other node with similar functionality. The terminal device can communicate through a radio access communication link with the base station. The base station can provide radio access communication links to terminal devices that are within its communication service cell. Note that the communications may be performed between the terminai device and the base station accordîng to any suitable communication standards and protocols. The terminai device may also be referred to as, for example, device, access terminal, user equipment (UE), mobile station, mobile unit, subscriber station, or the like. !t may referto any end device that can access a wireless communication network and receive services therefrom. By way of example and not limitation, the terminal device may include a portable computer, an image capture terminal device such as a digital caméra, a gaming teiminal device, a music storage and playback appliance, a mobile phone, a cellular phone, a smart phone, a tablet, a wearable device, a Personal digital assistant (PDA), orthe like.
[00103] In an Internet of things (ioT) scénario, a termina! device may represent a machine or other device that performs monitoring and/or measurements, and transmits the results of such monitoring and/or measurements to another terminai device and/or a network equipment. In this case, the terminal device may be a machinerto-machine (M2M) device, which may, in a 3GPP context, be referred to as a machine-type communication (MTC) device. Particuiar examples of such machines or devices may include sensors, metering devices such as power meters, industrial machineries, bikes, vehicies, or home or Personal appliances, e.g. réfrigérât ors, télévisions, personai wearables such as watches, and so on.
[00109] Now, several embodiments wil! be described to explain the improved solution for uplink transmission. Although these embodiments will be described in the context of NR-U, the principe of the disclosure ts also applicable to other unlicensed operation scénarios such as LTE LAA/eLAA/feLAA/MuLteFire.
[00110] As a first embodiment, a UE can be configured with a configured grant în a guard band région. The gNB can indicate if a configured grant is within oroverlapped with a guard band in the configured grant configuration. The information on the adjacent subbands associated with the guard band may be also signaledfindicated to the UE. The UE can décidé if the configured grant is usable depending on outcome ofthe LBT operation ofthe current subband and the adjacent LBT subband to thisguard band, i.e. the configured grant in the guard band is usable if the LBT succeeds in both adjacent subbands associated with the guard band. tn other words, both adjacent subbands are available forthe UE to transmit UL data and/or signaling.
[00111] FIG. 3 illustrâtes an example in which 3 configured grant (CG) grants are configured in the same subband in the same Slot (mini-slot) for a UE, If LBT succeeds in Channel 1 and 0 but faits in Channel 2, the UE can use CG grant 0 and 1 for UL transmission. If LBT succeeds in Channel 1 and Channel 2 but faiis in Channel 0, the UE can use CG grant 1 and 2 for UL transmission.
[00112] As a second embodiment, a configured grant comprising guard band(s) may be configured fora suband and the UE may préparé single MAC protocol data unit (PDU) and map different code block groups (CBGs) to the PRBs not occupying guard bands and to the PRBs in the guard bands separately. In case a guard band is not able to be used, the UE MAC may oniy retransmit the CBGs that are mapped to the guard band région. As another option, the UE may map logical channels (LCHs) with lower priority to PRBs in a guard band, while mapping LCHs with higher priority to PRBs not overlapped with a guard band.
[00113] As a third embodiment, a CG UL transmission may be performed using guard bands as shown in FIG. 4. At block 401, the gNB signals/preconfigures locations and sizes of guard bands to the UE. At block 402, the gNB configures at least a configured grant occupying a guard band to the UE. At block 403, the UE perforais LBT operations prior to a UL transmission with the configured grant. At block 404, the UE uses the guard band between two adjacent subbands if both of them hâve passed LBT, At block 405, the UE signais the gNB whetherthe UL transmission is occupying guard bands in the UCI, At block 406, the gNB monitors and processes réception of data and/or signaling in the guard band régions.
[00114] As a fourth embodiment, in case the gNB has initiated a DL channel occupancy time (COT), which is allowed to be shared with UL configured grant based transmissions during a spécifie time period, the gNB may not only indicate the subbands that are available for sharing, but also indicate if the guard bands (i.e., the guard band locations and sizes) are available to be used for UL data transfer. The indicators may be carried directly in the COT structure information signaling, or signaled via other signaling means such as RRC, or MAC CE or UE dedicated DCI, etc. Within the period shared for UL transmission, a UE décidés whether the guard bands can be used for its data transmission relyîng on the outcome of the LBT operations. In other words, the guard band between two adjacent subbands is available for UL data transmission only in case both subbands hâve passed the LBT operations.
[00115] As a fifth embodiment, the UE may indicate if there is uplinktransmission in a guard band in a UCI (e.g., CG-UCI). Optionally. the information on locations and sizes of guard bands that are occupied may be also carried in the UCI (e.g. CG-UCI). Upon réception of the indicators, the gNB monitors and processes the réception of data and/or signaling in the guard band accordingly. As an example, there may be two bits in the UCI (e.g. CG-UCI) to indicate whether there are UL transmissions in the upper and down guard band of a subband respectively.
[00116] As a sixth embodiment, whether or not to use a guard band région for UL transmission may be configured per cell/carrier/BWP. Different options may be configured for different serving cell/camsr/BWP.
[00117] As a seventh embodiment, whether or not to use a guard band région for UL transmission may be configured per UE/service/LCH/iogical channel group (LCG). As one example, a delay non-sensîtive service/LCH/LCG may be configured to use a guard band for UL transmission.
[00118] As an eîghth embodiment, whether or not to use a guard band région for UL transmission may be enabled or disabled based on measured channel occupancy or LBT statistics. As an example, the UE may be allowed to use a guard band between LBT subbands for UL transmission if the associated cell/BWP/carrier is experiencing low load since in this case, the UE has higher probability to grasp more than one LBT subbands for UL transmissions. As another example, the UE is not allowed to use a guard band for UL transmissions, ifthe associated cell/BWP/carrier has high channel occupancy meaning that the UE may only be able to grasp a single LBT subband for UL transmissions.
[00119] Heresnafter, the solution wtll be furtherdescribed with reference to FIGs. 5-18. FIG. 5 is a flowchart ülustrating a method implemented at a terminât device according to an embodiment of the disclosure. At block 502. the terminai devise receives, from a network node, a configured grant that indicates resources occupytog at least a guard band. The network node may be a base station or any other node with sîmitar functionality. The configured grant may be received in a configurer! grant configuration which indicates that the resources indicated by the configured grant are within or overtapped with the guard band. The location and size of the guard band may be preconfigured or signaled from the network node. Optionally, the resources indicated by the configurée! grant may further occupy a subband adjacent to the gnard band.
[00120] At block 504, the terminai device performs LBT operations for subbands associated with the guard band. The subbands associated with the guard band may be two subbands adjacent to the guard band. At block 506, the terminal device performs an uplink transmission to the network node usina at leasttheguard band based on resuits ofthe LBT operations, in this way, the resource utitization efficiency in the case of configured scheduting can be enhanced since the guard band can be used for uplink transmission. For example, the uplink transmission may be performed when the resuits of the LBT operations indicate that the two subbands are avaiiabie forthe terminal device. The uplink transmission may comprise transmission of data and/or signaling. Optionally, if the resources indicated by the configured grant further occupy a subband adjacent to the guard band, the uplink transmission may be performed using the guard band and the subband adjacent to the guard band.
[00121] As an option, the upTmk transmission may be performed by mapping first, at least one CBG to PRBs occupying the guard band. Tlie first, at least one CBG may be different from second, at ieast one CBGmappedto PRBs not occupying the guard band. As another option, the uplink transmission may be performed by mapping first, at least one logical channel to PRBs occupying the guard band. The first, at least one logical channel may hâve lower priority than second, at least one logical channel mapped to PRBs noî occupying the guard band.
[00122] As an exempfary exampie, the subbands associated with the guard band may be indicated by the network node as available forCOT sharing. Part of a downlink COT is able to be shared with configured grant based transmissions. The location and size ofthe guard band may be indicated by the network node as available for an uplink transmission. In this case, blocks 504 and 506 may be performed. The subbands and the location and the size of the g Liard band may be indicated by the network node in one or more of: COT structure information signaling, RRC signaling, MAC CE, and DCL
[00123] As mentioned above, the channel access schemes for NR-based access for unlîcensed spectrum can be ciassified into four categories (see 3GPP TR 38.889 V16.0.0). Category 1 is immédiate transmission after a short switching gap. This is used for a transmitter to immediately transmit after a UL/DL switch rng gap inside a COT. The switchîng gap from réception to transmission is to accommodate the transceivertumaround time and is no longer than 16 ps. Therefore, for category 1 channel access/LBT option, UE can skip the LBT if the UL/DL switching gap is not longer than 16 ps. In other words, it is possible that in case a COT is initiated by the gNB and shared with UE, UE can skip the LBT operation for UL transmission if the DL-UL gap is not more than 16 ps. This means block 504 may be an optional block.
[00124] Therefore, at least one embodiment of lhe présent disclosure provides a method in a terminal device, The method comprises receiving, from a network node, a configured grant that indicates resources occupying at least a gnard band, and performing an uplink transmission to the network node using at least the gnard band.
[00125] FIG. 6 is a flowchart illnstrating a method implemented at a terminal device according to another embodiment of the disclosure. At block 502, the terminal device receives, from a network node, a configured grant that indicates resources occupying at least a guard band. At block 603, the terminai device détermines whetherto enable the use of a guard band for an uplink transmission, based on current channel occupancy or LBT failure statistics measured by the terminal device. For example, the use of the guard band may be enabled if the current channel occupancy or LBT failure probability is low, The use of the guard band may be d Isa bled if the current channel occupancy or LBT failure probability is high.
[00126] If it is determined to enable the use of the guard band, blocks 504 and 506 may be performed. At block 6Q8, the terminal device transmits, to the network node, an indication about the uplink transmission using at least the guard band. The indication about the uplink transmission may comprise a first indicator indicating whether there is an uplink transmission in a guard band. For example, the first indicator for a subband may comprise two bits indicating whether there is an uplink transmission in an upper guard band and a lower guard band of the subband respectîveiy. The upper guard band refers to the guard band adjacent to the upperedge ofthe subband (or channel). The lower guard band refers to the guard band adjacent to the lower edge of the subband (or channel). Optionally, the indication about the uplink transmission may further comprise a second indicator indicating a location and a size of the guard band. The indication about the uplink transmission may be transmitted to the network node in UCI such as CG-UCI.
[00127] FIG. 7 is a flowchart iilustrating a method implemented ata network node according to an embodiment ofthe disclosure. The network node may be a base station or any other node with simiîar functionality. At block 702, the network node transmits, to a terminal device, a first configured grant that indicates resources occupying at least a first guard band. Optionally, the resources indicated by the first configured grant may further occupy a first subband adjacent to the first guard band. The first configured grant may be transmitted in a configured grant configuration. The configured grant configuration may indicate, for each of one or more configured grants including the first configured grant, whether resources indicated by the configured grant are wïthin or overlapped with a guard band. Optionally, whether or not to use a guard band for an uplink transmission may be configured per cell/carrier/BWP. Altematively, whether or not to use a guard band for an uplink transmission may be configured per terminal device/service/logical channel/logical channel group.
[00128] At block 704. the network node receives an uplink transmission from the terminal device in at least the first guard band. For exampie, the uplink transmission may be received by monitoring the first guard band. if the signal transmitted in the first guard band is not from a competing System (e.g. Wi-Fi), the network node may process the signal. Optionally, if the resources indicated by the first configured grant further occupy a first subband adjacent to the first guard band, the uplink transmission may be received in the first guard band and the first subband.
[00129] FIG. 8 is a flowchart iilustrating a method implemented at a network node according to another embodiment of the disclosure, At block 801, the network node transmits, to the terminal device, information about locations and sizes of one or more guard bands including the first guard band. At block 702, the network node transmits, to a terminal device, a first configured grant that indicates resources occupying at least a first guard band. At block 803, the network node receives, from the terminal device, an indication about the uplink transmission using at least the first guard band. The indication about the uplink transmission may comprise a first indicator indicating whether there is an uplink transmission in a guard band. For exampie, the first indicator for a subband may comprise two bits indicating whether there rs an uplink transmission in an upper guard band and a lower guard band of the subband respectively. Optionally, the indication about the upiink transmission may further comprise a second indicator indicating a location and a size of the first guard band. The indication about the uplink transmission may be received from the terminal device in UCI such as CG-UCI. in response to the indication, the network node receives an upiink transmission from the terminai device in at least the first guard band at Klrxr'L· ΤΛΛ uivvn î
[00130] FIG. 9 is a flowchart illustrating a method implemented at a network node according to anotherembodiment ofthe disclosure. Atblock SOS, the network node indicates, to the terminal device, multiple subbands availabie for COT sharing. Part of a downlînk COT is able to be shared with configured grant based transmissions. At block 908, the network node indicates, to the terminal device for each of one or more guard bands inciuding the first guard band, whether the guard band is availabie for an upiink transmission. For example, the muttiple subbands and the one or more guard bands may be indicated by the network node in one or more of: COT structure information signaling, RRC signaling, MAC CE, and DCI. At block 704, the network node receives an uplink transmission from the terminal device in at least the first guard band. it should be noted that two blocks shown in succession in the figures may, in fact, be executed substantiaily concurrently, orthe biocks may sometimes be executed in the reverse order, depending upon the functionality involved.
[00131] Based on the above description, at ieast one aspect of the présent disclosure provides a method implemented in a communication system including a network node and a terminal device. The method comprises, atthe network node, transmitting, to the terminai device, a first configured grant that indicates resources occupying at least a first guard band. The method further comprises, ai the terminal device, receiving, from the network node, the configured grant that indicates resources occupying at least the first guard band. The method further comprises, atthe terminai device, perfbrming an uplink transmission to the network node using ai least the first guard band. The method further comprises, at the network node, receiving the uplink transmission from the terminal device in at least the first guard band.
[00132] FIG. 10 is a block diagram showing an apparatus suitable for use in practicing some embodiments ofthe disclosure. Forexample, any one ofthe terminal device and the network node described above may be implemented through the apparatus 1000. As shown, the apparatus 1000 may include a processor 1010, a memory 1020 that stores a program, and optionally a communication interface 1030 for communicating data with other external devices through wired and/or wireless communication.
[00133] The program includes program instructions that, when executed by the processor 1010, enable the apparatus 1000 to operate in accordance with the embodiments of the présent disclosure, as discussed above. That is, the embodiments ofthe présent disclosure may be implemented at least in part by computer software exécutable by the processor 1010, or by hardware, or by a combination of software and hardware.
[00134] The memory 1020 may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as semiconductor based memory device s, flash memories, magnetic memory de vices and Systems, optical memory devices and Systems, fixed memories and removable memories. The processor 1010 may be of any type suitable to the local technical environment, and may include one or more of general purpose computers, spécial purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multi-core processor architectures, as non-limiting examples.
[00135] FIG. 11 is a block diagram showing a terminal device according to an embodiment ofthe disclosure. As shown, the termina! device 1100 comprises a réception module 1102, an LBT module 1104 and a transmission module 1106. The réception module 1102 may be configured to receive, from a network node, a configured grant that indicates resources occupying at least a guard band, as described above with respect to block 502. The LBT module 1104 may be configured to perform LBT operations for subbands associated with the guard band, as described above with respect to block 504. The transmission module 1106 may be configured to perform an uplink transmission to the network node using at least the guard band based on results of the LBT operations, as described above with respect to block 506.
[00136] FIG. 12 is a block diagram showing a network node according to an embodiment ofthe disclosure. As shown, the network node 1200 comprises a transmission module 1202 and a réception module 1204. The transmission module 1202 may be configured to transmit, to a terminal device, a first configured grant that indicates resources occupying at least a first guard band, as described above with respect to bîock 702. The réception module 1204 may be configured to receive an uplink transmission from the temninal device in at least the first guard band, as described above with respect to bîock 704. The modules described above may be implemented by hardware, or software, or a combination of both.
[00137] Based on the above description, at least one aspect of the présent disclosure provides a communication system comprising a network node and a terminal device. The network node is configured to transmit, to a termina! device, a first configured grant that indicates resources occupying at least a first guard band, and receive an uplink transmission from the terminal device in at least the first guard band. The terminal device is configured to receive, from the network node, the configured grant that indicates resources occupying at ieast the first guard band, and perform the uplink transmission to the network node using at least the first guard band.
[00138] With reference to FiG. 13, in accordance with an embodiment, a communication system includes télécommunication network 3210, such as a 3GPP-type cellular network, which comprises access network 3211, such as a radio access network, and core network 3214, Access network 3211 comprises a piurality of base stations 3212a, 3212b, 3212c, such as NBs, eNBs, gNBs or other types of wireless access points, each defining a corresponding coverage area 3213a, 3213b, 3213c. Each base station 3212a, 3212b, 3212c is connectable to core network 3214 over a wired or wireless connection 3215. A first UE 3291 located in coverage area 3213c is configured to wirelessly connect to, or be paged by, the corresponding base station 3212c. A second UE 3292 in coverage area 3213a is wîrelessly connectable to the corresponding base station 3212a, While a piurality of UEs 3291, 3292 are illustrated in this example, the disclosed embodiments are equally applicable to a situation where a soie UE is in the coverage area or where a sole UE is connecting to the corresponding base station 3212.
[00139] Télécommunication network 3210 is rtseif connected to host computer 3230, which may be embodied in the hardware and/or software of a standaione server, a cloudimplemented server, a distributed server or as processing resources in a server farm. Host computer 3230 may be under the ownership or control of a service provider, or may be operated by the service provider or on behalf ofthe service provider. Connections 3221 and 3222 between télécommunication network 3210 and host computer 3230 may exterici directly from core network 3214 to host computer 3230 or may go via an optional intermediate network 3220. Intermediate network 3220 may be one of, or a combination of more than one of, a public, private or hosted network; intermediate network 3220, if any, may be a backbone network or the Internet; in particular, intermediate network 3220 may comprise two or more sub-networks (not shown).
[00140] The communication system of FIG. 13 as a whole enables connectivity between the connected UEs 3291, 3292 and host computer 3230. The connectivity may be described as an over-the-top (OTT) connection 3250. Host computer 3230 and the connected UEs 3291,3292 are configured to communicate data and/or signaling via OTT connection 3250, using access network 3211, core network 3214, any intermediate network 3220 and possible further infrastructure (not shown) as intermediaries. OTT connection 3250 may be transparent in the sense that the participating communication devices through which OTT connection 3250 passes are unaware of routing of uplink and downiink communications. For example, base station 3212 may not or need net be mformed about the past routing of an incoming downlink communication with data originating from host computer 3230 to be forwarded (e.g., handed over) to a connected UE 3291. Similarty, base station 3212 need not be aware of the future routing of an outgoing uplink communication originating from the UE 3291 towards the host computer 3230.
[00141] Example implémentations, in accordance with an embodiment, of the UE, base station and host computer discussed in the preceding paragraphe will now be described with reference to FIG. 14. In communication system 3300, host computer 3310 comprises hardware 3315 including communication interface 3316 configured to set up and maintain a wired or wireless connection with an interface of a different communication device of communication System 3300. Host computer 3310 further comprises processing circuitry 3318, which may hâve storage and/or processing capabilrties. In partîcular, processing circuitry 3318 may comprise one or more programmable processors, application-spécifie integrated circuits, field programmable gâte arrays or combinations of these (not shown) adapted to execute instructions. Host computer 3310 further comprises software 3311, which is stored in or accessible by host computer 3310 and exécutable by processing circuitry 3318. Software 3311 includes host application 3312. Host application 3312 may be opérable to provide a service to a remote user, such as UE 3330 connecting via ΟΤΎ connection 3350 terminating at UE 3330 and host computer 3310. In providing the service to the remote user, host application 3312 may provide user data which is transmitted using OTT connection 3350.
[00142] Communication System 3300 further includes base station 3320 provided in a télécommunication System and comprising hardware 3325 enabling itto communicate with host computer 3310 and with UE 3330. Hardware 3325 may include communication interface 3326 for setting up and maintaining a wired or wireless connection with an interface of a different communication device of communication system 3300, as well as radio interface 3327 for setting up and maintaining at least wireless connection 3370 with UE 3330 located in a coverage area (not shown in FIG. 14) served by base station 3320, Communication interface 3326 may be configured to facilitai© connection 3360 to host computer 3310. Connection 3360 may be direct or it may pass through a core network (not shown in FIG. 14) of the télécommunication system and/or through one or more intermediate networks outside the télécommunication system. In the embodiment shown, hardware 3325 of base station 3320 further includes processing circuitry 3328, which may comprise one or more programmable processors, appiication-specific integrated circuits, field programmable gâte arrays or combinations of these (not shown) adapted to execute instructions. Base station 3320 further has software 3321 stored Internally or accessible via an external connection,
[00143] Communication system 3300 further includes UE 3330 already referred to. Its hardware 3335 may include radio interface 3337 configured to set up and mainlain wireless 5 connection 3370 with a base station serving a coverage area in which UE 3330 is currently located. Hardware 3335 of UE 3330 further includes processing circuitry 3338, which may comprise one or more programmable processors, application-specific integrated circuits, field programmable gâte arrays or combinations of these (not shown) adapted to execute instructions. UÉ 3330 further comprises software 3331, which is stored in or accessible by
UE 3330 and exécutable by processing circuitry 3338. Software 3331 includes client application 3332. Client application 3332 may be opérable to provide a service to a human or non-human user via UE 3330, with the support of host computer 3310. In host computer 3310, an executing host application 3312 may communicate with the executing client application 3332 via OTT connection 3350 terminating at UE 3330 and host computer3310.
In providing the service to the user, client application 3332 may receive request data from host application 3312 and provide user data in response to the request data. OTT connection 3350 may transfer both the request data and the user data. Client application 3332 may interact with the userto generate the user data that it provides.
[00144] It is noted that host computer 3310, base station 3320 and UE 3330 illustrated in 20 FIG. 14 may be similar or identical to host computer 3230, one of base stations 3212a,
3212b, 3212c and one of UEs 3291,3292 of FIG. 13, respectively. This is to say, the inner workings of these entities may be as shown in FIG. 14 and independently, the surrounding network topology may be that of FIG. 13.
[00145] In FIG. 14, OTT connection 3350 has been drawn abstractly to illustrate the 25 communication between host computer3310 and UE 3330 via base station 3320, without expticît référencé to any intermediary devices and the précisé routing of messages via these devices. Network infrastructure may détermine the routing, which it may be configured to hide from UE 3330 orfrom the service provider operating host computer 3310, or both. While OTT connection 3350 is active, the network infrastructure may further take 30 decisions by which it dynamically changes the routing (e.g., on the basis of load balancmg considération orreconfïguration ofthe network).
[00146] Wireless connection 3370 between UE 3330 and base station 3320 is in accordance with the teachings ofthe embodiments described throughout this disclosure. One or more of the various embodiments improve the performance of OTT services 35 provided to UE 3330 using OTT connection 3350, in which wireless connection 3370 forms the last segment. More precisely, the teachings of these embodiments may improve the iatency and thereby provide benefrts such as reduced userwaiting time.
[00147] A measurement procedure may be provided for the purpose of monitoring data rate, iatency and other factors on which the one or more embodiments improve. There may further be an optional network fa notion aiity for reconfiguring OTT connection 3350 between host computer 3310 and UE 3330, in response to variations in the measurement results. The measurement procedure and/or the network functionality for reconfiguring OTT connection 3350 may be implemented in software 3311 and hardware 3315 of hast computer 3310 or in software 3331 and hardware 3335 of UE 3330, or both. In embodiments, sensors (not shown) may be deployed in or in association with communication devices through which OTT connection 3350 passes; the sensors may participais in the measurement procedure by supplying values ofthe monitored quantifies exemplified above, or supplying values of other physical quantifies from which software 3311, 3331 may compote or estimate the monitored quantifies. The reconfiguring of OTT connection 3350 may incîude message format, retransmission settings, preferred routing etc.; the reconfiguring need not affect base station 3320, and it may be unknown or imperceptible to base station 3320. Such procedures and functio nantie s may be known and practiced in the art. In certain embodiments, measurements may invoive proprietary UE signaling facililating host computer 3310‘s measurements of throughput, propagation fîmes, Iatency and the like, The measurements may be impiemented in that software 3311 and 3331 causes messages to be transmitted, in particular empty or 'dummy' messages, using OTT connection 3350 while it monitors propagation times, errors etc.
[00148] FIG. 15 is a fiowchart illustrating a method implemented in a communication System, in accordance with one embodiment. The communication sysfem includes a host computer, a base station and a UE which may be those described with reference to FIGs.
and 14. Forsimplicity ofthe présent dîsclosure, only drawing référencés to FIG. 15 will be included in this section. In step 3410, the host computer pro vides user data. In substep 3411 (which may be optional) of step 3410, the host computer provîdesthe user data by executing a host application. In step 3420, the host computer initiâtes a transmission carrying the user data to the UE. în step 3430 (which may be optional), the base station transmits to the UE the user data which was carried in the transmission that the host computer inîtiated, in accordance with the teachings of the embodiments described throughout this dîsclosure. In step 3440 (which may also be optional), the UE executes a client application associated with the host application executed by the host computer.
[00149] FIG. 16 îs a flowchart illustrating a method implemented in a communication System, in accordance with one embodiment. The communication System includes a host computer, a base station and a UE which may be those described with reference to FIGs. 13 and 14. For simplicity ofthe présent disclosure, only drawing references to FIG. 16 will be included in this section. In step 3510 ofthe method, the host computer provides user data, in an optîonal substep (not shown) the host computer provides the user data by executing a host application, in step 3520, the host computer initiâtes a transmission carrying the user data to the UE. The transmission may pass via the base station, in accordance with the teachings ofthe embodiments described throughout this disclosure.
In step 3530 (which may be optîonal), the UE receives the user data carried in the transmission,
[00150] FIG. 17 is a flowchart illustrating a method implemented in a communication System, in accordance with one embodiment. The communication System includes a host computer, a base station and a UE which may be those described with reference to FIGs.
13 and 14. For simplicity ofthe présent disclosure, only drawing references to FIG. 17 will be included in this section. In step 3610 (which may be optîonal), the UE receives input data provided by the host computer. Additionally or alternatively, in step 3620, the UE provides user data. In substep 3621 (which may be optîonal) of step 3620, the UE provides the user data by executing a client application. In substep 3611 (which may be optîonal) of step 3610, the UE executes a client application which provides the user data in reaction to the received input data provided by the host computer. In providing the user data, the executed client application may further consider user input received from the user. Regardless ofthe spécifie manner in which the user data was provided, the UE initiâtes, in substep 3630 (which may be optîonal), transmission ofthe user data to the host computer, 25 in step 3640 of the method, the host computer receives the user data transmitted from the UE, in accordance wîth the teachings of the embodiments described throughout this disclosure.
[00151] FIG. 18 îs a flowchart illustratiny a method implemented in a communication System, in accordance with one embodiment. The communication System includes a host 30 computer, a base station and a UE which may be those described with reference to FIGs.
and 14. Forsimplicity ofthe présent disclosure, only drawing references to FIG. 18 will be included in this section. In step 3710 (which may be optîonal), in accordance with the teachings of the embodiments described throughout this disclosure, the base station receives user data from the UE. In step 3720 (which may be optîonal), the base station 35 initiâtes transmission of the received user data to the host computer. In step 3730 (which may be optional), the host computer receives the user data carried in the transmission initiated by the base station.
[00152] in générai, the various exemplary embodiments may be implemented in hardware or spécial purpose circuits, software, logic or any combination thereof. For example, some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controiier, microprocessor or other computing device, aithough the disciosure is not limited thereto. While various aspects of the exemplary embodiments of this disclosure may be illustrated and described as biock diagrams, flow charts, or using some other pictorial représentation, it is well understood that these biocks, apparatus, Systems, techniques or methods described herein may be implemented in, as non-limiting examples, hardware, software, firmware, spécial purpose circuits or logic, générai purpose hardware or controiier or other computing devices, or some combination thereof.
[00153] As such, it should be apprecîated that at ieast some aspects of the exemplary embodiments ofthe disclosure maybe practiced in various components such as integrated circuit chips and modules. It shouid thus be apprecîated that the exemplary embodiments of this disclosure may be realized in an apparatus that is embodied as an integrated circuit, where the integrated circuit may comprise circuitry (as well as possibiy firmware) for embodying at least one or more of a data processor, a digital signal processor, baseband circuitry and radio frequency circuitry that are configurable so as to operate in accordance with the exemplary embodiments of this disclosure.
[00154] It shouid be apprecîated that at ieast some aspects ofthe exemplary embodiments ofthe disciosure may be embodied in computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device. The computer exécutable instructions may be stored on a computer readable medium such as a hard disk, optical disk, removable storage media, solid State memory, RAM, etc. As will be apprecîated by one skilled in the art, the Fonction of the program modules may be combined or dïstributed as desired in various embodiments. !n addition, the fonction may be embodied in whole or in part in firmware or hardware équivalents such as integrated circuits, field programmable gâte arrays (FPGA), and the like.
[00155] Référencés in the present disciosure to “one embodiment”, “an embodiment” and so on, indîcate that the embodiment described may include a particular feature, structure, or charactenstiG, but it is not necessary that every embodiment includes the particular feature, structure, or characteristic. Moreover, such phrases are not necessariiy referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skiîled in the artto implement such feature, structure, or characteristic in connection with other embodiments whether or not explrcitly described.
[00156} It should be understood that, although the terms “first, “second and so on may be used herein to describe various éléments, these éléments should not be limited by these terms, These terms are only used to distinguish one element from another. For exemple, a first element could be termed a second element, and similariy, a second element coutd be termed a first element, without departing from the scope ofthe disclosure. As used herein, the term “and/or” includes any and ail combinations of one or more ofthe associated iisted tenus
[00157] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit the présent disclosure. As used herein, the singular forms “a, “an” and “the are intended to include the plural forms as well, unless the context clearly indicates otherwise. [t will be further understood that the terms “comprises, “comprising, “has”, “having”, “includes” and/or “including”, when used herein, specify the presence of stated features, éléments, and/or components, but do not preclude the presence or addition of one or more other features, éléments, components and/ or combinations thereof. The terms “connect, “connects, “connecting and/or “connected” used herein cover the direct and/or indirect connection between two éléments.
[00158] The présent disclosure includes any novel feature or combination of features disclosed herein either explicitly or any generalization thereof. Various modifications and adaptations to the foregoing exemplary embodiments of this disclosure may become apparentto those skilled in the relevant arts in view ofthe foregoing description, when read in conjonction with the accompanying drawings. However, any and ali modifications will still faH within the scope ofthe non-Limiting and exemplary embodiments of this disclosure.

Claims (13)

1. A method in a termina! device comprising:
receiving (502), from a network node, a configured grant that indicates resources s occupying at least a guard band; and performing (506) an uplink transmission to the network node using at leastthe guard band.
2. The method according to claim 1, wherein the resources indicated by the configured grant further occupy a subband adjacent to the guard band; and io wherein the uplink transmission is performed using the guard band and the subband adjacent to the guard band.
3. The method according to claim 1 or2, wherein a location and a size ofthe guard band is signaled from the network node.
4. The method according to claim 1 or2, wherein a location and a size ofthe guard band is preconfigured.
5. The method according to any of claims 1 to 4, wherein the configured grant is 20 received in a configured grant configuration; and wherein the configured grant configuration indicates that the resources indicated by the configured grant are overiapped with the guard band.
6. The method according to any of claims 1 to 4, wherein the configured grant is 25 received in a configured grant configuration; and wherein the configured grant configuration indicates that the resources indicated by the configured grant are within the guard band.
7. The method according to any of claims 1 to 6, further comprising:
30 performing (504) listen before talk, LBT, operations for subbands associated with the guard band;
wherein the upiink transmission is performed based on results ofthe LBT operations.
8. The method according to claim 7, wherein the LBT operations are performed for 35 two subbands adjacent to the guard band; and wherein the uplink transmission is performed when the results of the LBT operations indicate that the two subbands are available for the terminai device.
9, The method according to any of daims 1 to 8, further comprising:
5 transmitting (608), to the network node, an indication about the uplink transmission using at least the guard band; optionally, the indication about the uplink transmission comprises: a first indicator indicating whether there is an uplink transmission în a guard band.
10. The method according to claim 9, wherein the first indicator for a subband
10 comprises two bits indicating whether there is an uplink transmission in an upper guard band and a lowerguard band ofthe subband respectiveîy.
11. The method according to 9 or 10, wherein the indication about the uplink transmission is transmitted to the network node in uplink control information, UCI.
12. The method according to any of ciaims 1 to 11, further comprising: determining (603) whether to enabîe the use of a guard band for an uplink transmission, based on current channel occupancy or LBT failure statistics measured by the terminal device.
20
13. A method in a network node comprising:
transmitting (702), to a terminal device, a first configured grant that indicates resources occupying at least a first guard band; and receiving (704) an uplink transmission from the terminal device in at least the fîrst guard band.
14. A terminal device (1000) comprising:
at least one processor (1010); and at least one memory (1020), the at least one memory (1020) containing instructions exécutable by the at least one processor (1010), whereby the terminal device (1000) is 30 operatîve to:
receive, from a network node, a configured grant that indicates resources occupying at least a guard band; and perform an uplink transmission to the network node using at least the guard band.
35 15, A network node (1000) comprising:
at least one processor (1010); and at least one memory (1020), the at least one memory (1020) containing instructions exécutable by the at least one processor (1010), whereby the network node (1000) is operative to;
transmit, to a terminal device, a first configured grant that indicates resources occupying at 5 least a first guard band; and reçoive an uplink transmission from the terminal device in at least the first guard band.
OA1202100595 2019-06-27 2020-04-30 Methods, terminal device and network node for uplink transmission. OA20563A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNPCT/CN2019/093162 2019-06-27

Publications (1)

Publication Number Publication Date
OA20563A true OA20563A (en) 2022-10-27

Family

ID=

Similar Documents

Publication Publication Date Title
JP7279116B2 (en) Terminal, wireless communication method, base station and system
JP7231626B2 (en) Method for physical downlink control channel (PDCCH) candidate determination
CN107079302B (en) Hidden node detection in LTE license assisted access
US20190342045A1 (en) Transmission diversity for fbe idle period handling
EP3407653A1 (en) User terminal, wireless base station, and wireless communication method
TW202027525A (en) Methods and user equipment of efficient wideband operation for intra-band non-contiguous spectrum
WO2020125121A1 (en) Method and device operating in unlicensed spectrum
JP7313425B2 (en) Terminal, wireless communication method, base station and system
GB2498932A (en) Distributed carrier aggregation on unlicensed bands
US10693618B2 (en) Multiplexed messaging in wireless network
KR102648948B1 (en) Techniques and apparatuses for signaling regarding control region size
US11510225B2 (en) Methods, terminal device and base station for physical downlink control channel monitoring
JP7264919B2 (en) Terminal, wireless communication method and system
WO2020228665A1 (en) Methods, terminal device and network node for uplink transmission
US20220150980A1 (en) Ue, network node and methods for handling 2-step and 4-step random access procedures
WO2020259083A1 (en) Methods, terminal device and network node for uplink transmission
WO2019087359A1 (en) User equipment and wireless communication method
US20230337278A1 (en) Method and Apparatus for Channel Occupancy Measurement
OA20563A (en) Methods, terminal device and network node for uplink transmission.
US20220400514A1 (en) Controlling transmission medium access in an open spectrum
Wang et al. Study on flexible TTI scheduling for LAA systems
OA20551A (en) Methods, terminal device and network node for uplink transmission.