WO2017070897A1 - 一种通信方法及装置 - Google Patents
一种通信方法及装置 Download PDFInfo
- Publication number
- WO2017070897A1 WO2017070897A1 PCT/CN2015/093234 CN2015093234W WO2017070897A1 WO 2017070897 A1 WO2017070897 A1 WO 2017070897A1 CN 2015093234 W CN2015093234 W CN 2015093234W WO 2017070897 A1 WO2017070897 A1 WO 2017070897A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal device
- bits
- crc
- device identifier
- identifier
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/12—Wireless traffic scheduling
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a communication method and apparatus.
- M2M Machine-to-Machine
- the narrowband M2M system using the M2M technology has the characteristics of supporting a large number of connections and a low communication rate.
- the base station sends a scheduling message, and the terminal device transmits data according to the scheduling message.
- the scheduling message sent by the base station needs to carry the UE (User Equipment) (User equipment) ID (Identification, identification); in the M2M system, the UE ID may be a C-RNTI (Cell Radio Network Temporary Identify), where the C-RNTI is 16 bits, 20 bits, or longer.
- the number of bits; or TLLI (Temporary Logical Link Identifier), the length of the TLLI can be 32 bits.
- the number of bits carried by the scheduling message in the M2M system is limited. For example, the number of bits carried in the scheduling message is 80 bits. If the scheduling message carries the complete UE ID, the control channel resources used when sending the scheduling message are used. The rate is lower and the control channel is less scalable.
- Embodiments of the present invention provide a communication method and apparatus for improving control channel resources. Utilization and scalability.
- a communication method including:
- the base station determines the terminal device identifier of the terminal device, where the bit length of the terminal device identifier is N;
- the base station broadcasts a scheduling message, where the scheduling message carries M bits of the terminal device identifier and a cyclic redundancy check code CRC, where the CRC is masked by NM bits, and the M is greater than or equal to 0, and an integer less than N, the bit length of the CRC is greater than or equal to the NM.
- the scheduling message carries M bits of the terminal device identifier and a cyclic redundancy check code CRC, where the CRC is masked by NM bits, and the M is greater than or equal to 0, and an integer less than N, the bit length of the CRC is greater than or equal to the NM.
- the terminal device identifier is at least one of a C-RNTI, a temporary logical link identifier TLLI, and an RA-RNTI.
- the M bits are the high M bits in the identifier of the terminal device, or Is the low M bits in the terminal device identification.
- the method before the sending, by the base station, the scheduling message, the method further includes:
- the base station sends the C-RNTI to the terminal device.
- a communication method including:
- the terminal device listens to the scheduling message sent by the base station, where the scheduling message carries the M bits of the terminal device identifier and the cyclic redundancy check code CRC, where the bit length of the terminal device identifier is N, and the CRC is adopted.
- NM bits are masked, the M is greater than or equal to 0, and is less than an integer of N, the bit length of the CRC is greater than or equal to the NM;
- the terminal device performs CRC check on the scheduling message by using the stored N-M bits of the terminal device identifier
- the terminal device Determining, by the terminal device, that the CRC check is successful, and the M ratios carried in the scheduling message
- the terminal device and the N-M bits that perform the CRC check are combined with the stored terminal device identifier, the uplink data is sent according to the scheduling message, or the downlink data is received.
- the terminal device identifier is at least one of a C-RNTI, a temporary logical link identifier TLLI, and an RA-RNTI.
- the M bits are the high M bits in the terminal device identifier, or Is the low M bits in the terminal device identification.
- the terminal device uses the stored NM bits of the terminal device identifier The bit performs a CRC check on the scheduling message, including:
- the terminal device performs CRC calculation on the scheduling message to obtain a CRC
- the terminal device performs masking on the calculated CRC value by using the stored N-M bits of the terminal device identifier
- the terminal device determines that the CRC check succeeds, and includes:
- the terminal device determines that the CRC value obtained by masking is the same as the CRC value carried in the scheduling message.
- the terminal device adopts the stored NM bits of the terminal device identifier Before the bit performs CRC check on the scheduling message, the method further includes:
- the terminal device sends an access request to the base station
- the terminal device receives the C-RNTI allocated by the base station to the terminal device according to the access request, and stores the C-RNTI.
- a third aspect provides a method for allocating a terminal device identifier, including:
- the base station allocates a first terminal device identifier to the terminal device according to the access request, where the first terminal device identifier is used to uniquely identify the terminal within a coverage of the base station;
- the base station sends an identifier allocation message to the terminal device, where the identifier allocation message carries the first terminal device identifier, the first cyclic redundancy check code CRC, and the second terminal device identifier generated according to the preset rule.
- M bits the bit length of the second terminal device identifier is N
- the first CRC is masked by the NM bits
- the M is an integer greater than or equal to 0 and less than N
- the bit length of the first CRC is greater than or equal to the NM.
- the first terminal device identifier is a cell radio network temporary identification C-RNTI and/or a temporary logical link identifier TLLI;
- the second terminal device identifier is an RA-RNTI.
- the method further includes:
- the base station broadcasts a scheduling message, where the scheduling message carries K bits and a second CRC of the first terminal device identifier, where the bit length of the first terminal device identifier is L, and the second CRC is used.
- the LK bits are masked, the K is an integer greater than or equal to 0, and less than L, and the bit length of the second CRC is greater than or equal to the LK.
- a fourth aspect provides a method for allocating a terminal device identifier, including:
- the terminal device sends an access request to the base station
- the terminal device receives an identifier allocation message that is sent by the base station according to the access request, where the identifier allocation message carries the first terminal device identifier, the first cyclic redundancy check code CRC, and generates according to a preset rule.
- the first terminal device identifier is used to uniquely identify the terminal device in the coverage of the second terminal device, and the bit length of the second terminal device identifier is N,
- the first CRC is masked by the NM bits, the M is an integer greater than or equal to 0, and is less than N, and the bit length of the first CRC is greater than or equal to the NM;
- the terminal device performs CRC check on the identifier allocation message by using the stored N-M bits of the second terminal device identifier;
- the terminal device Determining, by the terminal device, that the CRC check succeeds, and the terminal device identifier and the stored second terminal device that are combined by the M bits carried in the identifier allocation message and the NM bits that perform CRC check
- the first terminal device identifier is used as the identifier of the terminal device.
- the first terminal device identifier is a cell radio network temporary identification C-RNTI and/or a temporary logical link identifier TLLI;
- the second terminal device identifier is an RA-RNTI.
- the terminal device after the terminal device receives the identifier allocation message sent by the base station according to the access request, include:
- the terminal device receives a scheduling message broadcast by the base station, where the scheduling message carries K bits and a second CRC of the first terminal device identifier, and the second CRC uses the LK bits to mask
- the K is an integer greater than or equal to 0 and less than L
- the bit length of the second CRC is greater than or equal to the LK
- the L is a bit length of the first terminal device identifier
- the terminal device performs CRC check on the scheduling message by using the stored N-M bits of the terminal device identifier
- the uplink data is sent according to the scheduling message, or the downlink data is received.
- a base station including:
- a processing module configured to determine a terminal device identifier of the terminal device, where the bit length of the terminal device identifier is N;
- a sending module configured to broadcast a scheduling message, where the scheduling message carries M bits of the terminal device identifier and a cyclic redundancy check code CRC, where the CRC is masked by NM bits, and the M is greater than Or an integer equal to 0 and less than N, the bit length of the CRC being greater than or equal to the NM.
- the scheduling message carries M bits of the terminal device identifier and a cyclic redundancy check code CRC, where the CRC is masked by NM bits, and the M is greater than Or an integer equal to 0 and less than N, the bit length of the CRC being greater than or equal to the NM.
- the terminal device identifier is at least one of a C-RNTI, a temporary logical link identifier TLLI, and an RA-RNTI.
- the M bits are the high M bits in the terminal device identifier, or Is the low M bits in the terminal device identification.
- the method further includes: a receiving module, configured to receive an access request sent by the terminal device;
- the processing module is further configured to generate, according to the access request, a C-RNTI for identifying the terminal device;
- the sending module is further configured to send the C-RNTI to the terminal device.
- a terminal device including:
- a receiving module configured to monitor a scheduling message sent by the base station, where the scheduling message carries M bits of the terminal device identifier and a cyclic redundancy check code CRC, where the bit length of the terminal device identifier is N, The CRC is masked by NM bits, the M is an integer greater than or equal to 0, and less than N, and the bit length of the CRC is greater than or equal to the NM;
- a processing module configured to perform CRC check on the scheduling message by using the stored N-M bits of the terminal device identifier
- a sending module configured to determine, by the processing module, that the CRC check succeeds, and the terminal device identifier and the combination of the M bits carried in the scheduling message and the NM bits that perform CRC check When the terminal device identifiers are the same, the uplink data is sent according to the scheduling message;
- the receiving module is further configured to: after the processing module determines that the CRC check succeeds, and the terminal device that is configured by combining the M bits carried in the scheduling message and the NM bits performing CRC check When the identifier is the same as the stored terminal device identifier, the downlink data is received.
- the terminal device is identified as a cell
- the wireless network temporarily identifies at least one of a C-RNTI, a temporary logical link identifier TLLI, and an RA-RNTI.
- the M bits are the high M bits in the terminal device identifier, or Is the low M bits in the terminal device identification.
- the processing module adopts the stored NM bits of the terminal device identifier When the bit performs a CRC check on the scheduling message, it is specifically:
- the sending module is further configured to send an access request to the base station;
- the receiving module is further configured to receive a C-RNTI allocated by the base station to the terminal device according to the access request;
- the processing module is further configured to store the C-RNTI received by the receiving module.
- a base station including:
- a receiving module configured to receive an access request sent by the terminal device
- a processing module configured to allocate, by the terminal device, a first terminal device identifier according to the access request, where the first terminal device identifier is used to uniquely identify the terminal within a coverage of the base station;
- a sending module configured to send an identifier allocation message to the terminal device, where the identifier allocation message carries the first terminal device identifier, a first cyclic redundancy check code CRC, and a second terminal device generated according to a preset rule
- the identified M bits, the second terminal device identifier has a bit length of N, the first CRC is masked by the NM bits, and the M is greater than or equal to 0, and an integer less than N, the bit length of the first CRC is greater than or equal to the N-M.
- the first terminal device identifier is a cell radio network temporary identification C-RNTI and/or a temporary logical link identifier TLLI;
- the second terminal device identifier is an RA-RNTI.
- the sending module is further configured to: broadcast a scheduling message, where the scheduling message carries the first The K bits of the terminal device identifier and the second CRC, the bit length of the first terminal device identifier is L, and the second CRC is masked by the LK bits, where the K is greater than or equal to 0. And less than an integer of L, the bit length of the second CRC is greater than or equal to the LK.
- a terminal device including:
- a sending module configured to send an access request to the base station
- a receiving module configured to receive an identifier allocation message that is sent by the base station according to the access request, where the identifier allocation message carries the first terminal device identifier, a first cyclic redundancy check code CRC, and according to a preset rule Generating the M bits of the second terminal device identifier, where the first terminal device identifier is used to uniquely identify the terminal device within the coverage of the base station, where the bit length of the second terminal device identifier is N
- the first CRC is masked by the NM bits, the M is greater than or equal to 0, and is less than an integer of N, the bit length of the first CRC is greater than or equal to the NM;
- a processing module configured to perform CRC check on the identifier allocation message by using the stored N-M bits of the second terminal device identifier
- the processing module is further configured to: determine that the CRC check succeeds, and the terminal device identifier and the stored combination of the M bits carried in the identifier allocation message and the NM bits that perform CRC check When the second terminal device is identified, the first terminal device identifier is used as the identifier of the terminal device.
- the first terminal device identifier is a cell radio network temporary identification C-RNTI and/or a temporary logical link identifier TLLI;
- the second terminal device identifier is an RA-RNTI.
- the receiving module is further configured to receive a scheduling message that is broadcast by the base station, where the scheduling message is Carrying K bits of the first terminal device identifier and a second CRC, where the second CRC is masked by using the LK bits, where K is an integer greater than or equal to 0 and less than L, The bit length of the second CRC is greater than or equal to the LK, where L is the bit length of the first terminal device identifier;
- the processing module is further configured to perform CRC check on the scheduling message by using the stored N-M bits of the terminal device identifier;
- the sending module is further configured to: after the processing module determines that the CRC check succeeds, and the terminal device that is configured by combining the M bits carried in the scheduling message and the NM bits performing CRC check When the first terminal device identifier is identified and stored, the uplink data is sent according to the scheduling message; or
- the receiving module is further configured to: after the processing module determines that the CRC check succeeds, and the terminal device that is configured by combining the M bits carried in the scheduling message and the NM bits performing CRC check When the first terminal device identifier is identified and stored, downlink data is received.
- the scheduling message broadcasted by the base station does not need to carry all the bits of the terminal device identifier, and only needs to carry part of the bit identifier of the terminal device, and the remaining bits of the terminal device identifier.
- the bit is masked to the CRC, so that more content can be carried in the scheduling message. Therefore, the utilization of the control channel resources used in transmitting the scheduling message and the scalability of the control channel are improved.
- FIG. 1 is a flowchart of a communication method according to an embodiment of the present invention
- FIG. 2 is another flowchart of a communication method according to an embodiment of the present invention.
- FIG. 3 is a flowchart of assigning a terminal device identifier according to an embodiment of the present invention
- FIG. 4 is another flowchart of assigning a terminal device identifier according to an embodiment of the present invention.
- FIG. 5A is a schematic diagram of a base station according to an embodiment of the present disclosure.
- FIG. 5B is another schematic diagram of a base station according to an embodiment of the present disclosure.
- FIG. 6 is a schematic diagram of a terminal device according to an embodiment of the present disclosure.
- FIG. 6B is another schematic diagram of a terminal device according to an embodiment of the present disclosure.
- FIG. 7A is a schematic diagram of a base station according to an embodiment of the present disclosure.
- FIG. 7B is another schematic diagram of a base station according to an embodiment of the present disclosure.
- FIG. 8 is a schematic diagram of a terminal device according to an embodiment of the present disclosure.
- FIG. 8B is another schematic diagram of a terminal device according to an embodiment of the present invention.
- system and “network” are used interchangeably herein.
- the term “and/or” in this context is merely an association describing the associated object, indicating that there may be three relationships, for example, A and / or B, which may indicate that A exists separately, and both A and B exist, respectively. B these three situations.
- the letter “/” in this article generally indicates that the contextual object is an "or" relationship.
- a communication process is as follows:
- Step 100 The base station determines the terminal device identifier of the terminal device, and the bit length of the terminal device identifier is N;
- Step 110 The base station broadcasts a scheduling message, where the scheduling message carries M bits of the terminal device identifier and a cyclic redundancy check code CRC.
- the CRC is masked by NM bits, and M is an integer greater than or equal to 0 and less than N.
- the bit length of the CRC is greater than or equal to NM.
- the scheduling message broadcasted by the base station does not need to carry all the bits of the terminal device identifier, and only needs to carry part of the bit identifier of the terminal device, and the remaining bits of the terminal device identifier are masked to the CRC, so that scheduling More content can be carried in the message, thus improving the utilization of the control channel resources used in transmitting the scheduling message and the scalability of the control channel.
- the terminal device identifier is 20 bits, where 4 bits are carried in the scheduling message, and the remaining 16 bits are used to mask the CRC. If the scheduling message carries a total of 80 bits, if the scheduling message carries the 20-bit terminal device identifier, There are 60 bits in the scheduling message to carry other information. If the scheduling message carries a 4-bit terminal device identifier, 76 bits in the scheduling message can carry other information. Therefore, the utilization of the control channel resources used when transmitting the scheduling message is improved, and Control channel scalability.
- the terminal device identifier is at least one of a C-RNTI, a TLLI, and a RA-RNTI (Random Access Radio Network Temporary Identify).
- the M bits are the high M bits in the terminal device identifier, or the low M bits in the terminal device identifier, and may of course be the other bits in the terminal device identifier. Or a non-contiguous bit, but the bits of the location of the terminal device identifier carried in the scheduling message are negotiated by the terminal and the base station.
- the 0th to 3rd bits of the terminal device identifier may be carried in the scheduling message, or may be the 17th to 19th bits of the terminal device identifier, or may be the 0th bit.
- the bits, the second bit, the fourth bit, and the sixth bit, the remaining bits mask the CRC.
- the foregoing describes a method for a base station to carry a terminal device identifier in a scheduling message.
- the foregoing method is based on the terminal in the embodiment of the present invention. Before the base station sends the scheduling message, the method further includes:
- the base station transmits the C-RNTI to the terminal device.
- Step 200 The terminal device listens to the scheduling message sent by the base station, where the scheduling message carries the M bits of the terminal device identifier and the cyclic redundancy check code CRC.
- the bit length of the terminal device identifier is N, and the CRC uses NM bits.
- Mask, M is an integer greater than or equal to 0, and less than N, the bit length of the CRC is greater than or equal to NM;
- Step 210 The terminal device performs CRC check on the scheduling message by using N-M bits of the stored terminal device identifier.
- Step 220 The terminal device determines that the CRC check is successful, and the terminal device identifier formed by combining the M bits carried in the scheduling message and the NM bits for performing the CRC check is the same as the stored terminal device identifier, and is sent according to the scheduling message. Uplink data, or receive downlink data.
- the scheduling message monitored by the terminal device carries a part of the bit of the terminal device identifier, and the terminal device performs a CRC check on the scheduling message by using the remaining bits of the terminal device identifier, and determines that the CRC check succeeds, and
- the terminal device identifier formed by combining the M bits carried in the scheduling message and the NM bits for performing the CRC check is the same as the stored terminal device identifier, it may be determined that the scheduling message is the scheduling terminal device, that is, In this embodiment, even if the scheduling message carries a part of the terminal device identifier, and the remaining terminal device identifier checks the CRC, the terminal device can also determine whether the intercepted scheduling message is the scheduling table. The terminal device can achieve the same effect as all the bits of the scheduling message carrying the terminal device identifier. Therefore, the utilization of the control channel resources used for transmitting the scheduling message and the scalability of the control channel are improved.
- the terminal device identifier is 20 bits, where 4 bits are carried in the scheduling message, and the remaining 16 bits are used to mask the CRC.
- the terminal device After receiving the scheduling message, the terminal device performs CRC check on the 16-bit scheduling message of the stored terminal device identifier.
- the terminal device can determine that the intercepted scheduling message is the scheduling itself, so that the scheduling message carrying the 4-bit terminal device identifier and the scheduling message carrying the 20-bit terminal device identifier can achieve the same effect.
- the bearer bit is 80 bits.
- the embodiment of the present invention improves the utilization of the control channel resources used in transmitting the scheduling message and the scalability of the control channel.
- the CRC is used by the terminal device to perform the masking of the bits of the location identifier.
- the base station and the terminal device negotiate that the CRC carried in the scheduling message is the lower of the terminal device identifier. The bit is masked.
- both the terminal device and the base station know that the CRC is masked by the lower 16 bits of the terminal device identifier.
- the base station and the terminal device negotiate that the CRC carried in the scheduling message is the height of the terminal device identifier. 16 bits are masked. At this time, both the terminal device and the base station know that the CRC is masked by the upper 16 bits of the terminal device identifier.
- the terminal device identifier is at least one of C-RNTI, TLLI, and RA-RNTI.
- the M bits are the high M bits in the terminal device identifier, or the low M bits in the terminal device identifier, and may of course be the other bits in the terminal device identifier. Or a non-contiguous bit, but the bits of the location of the terminal device identifier carried in the scheduling message are negotiated by the terminal and the base station.
- the 0th to 3rd bits of the terminal device identifier may be carried in the scheduling message, or may be the 17th to 19th bits of the terminal device identifier, or may be the 0th bit.
- the bits, the second bit, the fourth bit, and the sixth bit, the remaining bits mask the CRC.
- the terminal device when the terminal device performs the CRC check on the scheduling message by using the N-M bits of the stored terminal device identifier, the terminal device may perform the following methods:
- the terminal device performs CRC calculation on the scheduling message to obtain a CRC
- the terminal device uses the N-M bits of the stored terminal device identifier to mask the calculated CRC value
- the terminal device determines whether the CRC value obtained by masking is the same as the CRC value carried in the scheduling message
- the terminal device determines that the CRC check succeeds, including:
- the terminal device determines that the CRC value obtained by masking is the same as the CRC value carried in the scheduling message.
- the terminal device when the terminal device combines the M bits carried in the scheduling message and the NM bits that perform the CRC check, the position where the M bits are located in the terminal device identifier, and the NM bits.
- the location in the terminal device identification is negotiated by the base station and the terminal.
- the terminal device before the CRC is performed on the scheduling message by using the N-M bits of the stored terminal device identifier, the terminal device further includes:
- the terminal device sends an access request to the base station
- the terminal device receives the C-RNTI allocated by the base station to the terminal device according to the access request, and stores the C-RNTI.
- the scheduling message when a base station sends a scheduling message, the scheduling message carries a part of the bit of the terminal device identifier, thereby improving the utilization of the control channel resource used when transmitting the scheduling message, and the control channel.
- Scalability when the terminal device identifier is allocated to the terminal, the above manner can be used to improve the resource utilization and the scalability of the relevant channel.
- an embodiment of the present invention further provides a method for allocating a terminal device identifier:
- Step 300 The base station receives an access request sent by the terminal device.
- Step 310 The base station allocates a first terminal device identifier to the terminal device according to the access request, where the first terminal device identifier is used to uniquely identify the terminal within the coverage of the base station;
- Step 320 The base station sends an identifier allocation message to the terminal device, where the identifier allocation message carries the first terminal device identifier, the first cyclic redundancy check code CRC, and the M bits of the second terminal device identifier generated according to the preset rule.
- the bit length of the second terminal device identifier is N
- the first CRC is masked by NM bits
- M is an integer greater than or equal to 0, and is less than N
- the bit length of the first CRC is greater than or equal to NM.
- the identity allocation message sent by the base station does not need to carry the second terminal device identifier. All the bits of the identification need only carry part of the bits of the second terminal device identifier, and the remaining bits of the second terminal device identifier mask the CRC, so that the identifier allocation message can carry more content, thereby improving resources. Utilization, and scalability of related channels.
- the second terminal device identifier is 20 bits, where 4 bits are carried in the identifier allocation message, and the remaining 16 bits are used to mask the CRC. If the identifier of the identifier allocation message is 80 bits, the identifier allocation message carries 20 bits. If the second terminal device is identified, 60 bits of the identifier allocation message may carry other information. If the identifier assignment message carries the 4-bit second terminal device identifier, 76 bits in the identifier allocation message may carry other information, thereby improving resources. Utilization, and scalability of related channels.
- the M bits are the high M bits in the terminal device identifier, or the low M bits in the terminal device identifier, and may of course be the other bits in the terminal device identifier. Or a non-contiguous bit, but the bits of the location of the terminal device identifier carried in the scheduling message are negotiated by the terminal and the base station.
- the identifiers in the assignment message may be the 0th to 3rd bits of the second terminal device identifier, or may be the 17th to 19th bits of the second terminal device identifier. Alternatively, it may be the 0th bit, the 2nd bit, the 4th bit, and the 6th bit, and the remaining bits may mask the first CRC.
- the first CRC is used by the terminal device to negotiate with the base station, and the base station and the terminal device negotiate the first CRC carried in the identifier allocation message.
- the lower 16 bits of the second terminal device identifier are used for masking.
- both the terminal device and the base station know that the first CRC is masked by using the lower 16 bits of the second terminal device identifier; for example, the base station and the terminal device negotiate The first CRC carried in the identifier allocation message is masked by using the upper 16 bits of the second terminal device identifier.
- both the terminal device and the base station know that the first CRC is masked by the upper 16 bits of the second terminal device identifier.
- the first terminal device identifier is C-RNTI and/or TLLI;
- the second terminal device identifier is an RA-RNTI.
- the base station sends the first terminal device identifier allocated to the terminal device to the terminal device. After the first terminal device identifier that is allocated to the terminal device is sent to the terminal device, the terminal device may be scheduled. Therefore, in the embodiment of the present invention, after the base station sends the identifier allocation message to the terminal device, the following operations are also included:
- the base station broadcasts a scheduling message, where the scheduling message carries K bits and a second CRC of the first terminal device identifier, the bit length of the first terminal device identifier is L, and the second CRC is masked by LK bits, and K is greater than Or an integer equal to 0 and less than L, and the bit length of the second CRC is greater than or equal to LK.
- the scheduling message broadcasted by the base station does not need to carry all the bits of the first terminal device identifier, and only needs to carry part of the bit of the first terminal device identifier, and the remaining bits of the first terminal device identifier are paired with the second bit.
- the CRC is masked so that more content can be carried in the scheduling message. Therefore, the utilization of the control channel resources used in transmitting the scheduling message and the scalability of the control channel are improved.
- the first terminal device identifier is 20 bits, where 4 bits are carried in the scheduling message, and the remaining 16 bits are used to mask the second CRC. If the scheduling message can carry a total of 80 bits, if the scheduling message carries the 20-bit number, If a terminal device is identified, 60 bits in the scheduling message can carry other information. If the scheduling message carries the 4-bit first terminal device identifier, 76 bits in the scheduling message can carry other information. Therefore, the scheduling message is used when the scheduling message is sent. The utilization of control channel resources and the scalability of the control channel.
- an embodiment of the present invention further provides a method for allocating a terminal device identifier:
- Step 400 The terminal device sends an access request to the base station.
- Step 410 The terminal device receives an identifier allocation message sent by the base station according to the access request, where the identifier allocation message carries the first terminal device identifier, the first cyclic redundancy check code CRC, and the second terminal device identifier generated according to the preset rule.
- M bits the first terminal device identifier is used to uniquely identify the terminal device within the coverage of the base station, the bit length of the second terminal device identifier is N, the first CRC is masked by NM bits, and M is greater than or An integer equal to 0 and less than N, the bit length of the first CRC is greater than or equal to NM;
- Step 420 The terminal device adopts the stored N-M bit identifiers of the second terminal device identifier. Identify the assignment message for CRC check;
- Step 430 The terminal device determines that the CRC check succeeds, and identifies the terminal device identifier and the stored second terminal device identifier that are combined with the M bits carried in the assignment message and the NM bits that perform the CRC check.
- a terminal device identifier is used as an identifier of the terminal device.
- the identifier allocation message received by the terminal device carries a part of the bit of the second terminal device identifier, and the terminal device performs the first CRC check on the scheduling message by using the remaining bits of the second terminal device identifier. Determining that the first CRC check succeeds, and the second terminal device identifier formed by combining the M bits carried in the assignment message and the NM bits performing the CRC check is the same as the stored second terminal device identifier, Determining that the identifier assignment message is to assign the terminal device identifier to the terminal device, that is, in this embodiment, even if the identifier assignment message carries a part of the second terminal device identifier, the remaining second terminal device identifier pair A CRC performs verification.
- the terminal device may also determine whether the received identifier assignment message is to assign the terminal device identifier to the terminal device, and the identifier assignment message carries all the bits of the second terminal device identifier. The same effect can be achieved, thus improving the utilization of resources and the scalability of related channels.
- the second terminal device identifier is 20 bits, wherein 4 bits are carried in the identifier allocation message, and the remaining 16 bits are used to mask the first CRC. After receiving the identifier allocation message, the terminal device uses the stored 16 bit of the second terminal device identifier.
- the terminal device may determine that the received identifier assignment message is to assign the terminal device identifier to the terminal device itself, such that the identifier assignment message carries the 4-bit second terminal device identifier and the identifier assignment message carries the 20-bit second terminal device identifier. The same effect can be achieved.
- the identifier allocation message has 76 bits. In order to carry other information, the embodiments of the present invention improve the utilization of resources and the scalability of related channels.
- the first CRC is used by the terminal device to negotiate with the base station, and the base station and the terminal device negotiate the first CRC carried in the identifier allocation message.
- the lower 16 bits of the second terminal device identifier are used for masking.
- both the terminal device and the base station know that the first CRC is masked by using the lower 16 bits of the second terminal device identifier; for example, the base station and the terminal device negotiate The first CRC carried in the identifier allocation message is masked by using the upper 16 bits of the second terminal device identifier.
- both the terminal device and the base station know that the first CRC is masked by the upper 16 bits of the second terminal device identifier.
- the first terminal device identifier is C-RNTI and/or TLLI;
- the second terminal device identifier is an RA-RNTI.
- a base station allocates a first terminal device identifier to a terminal device. After the base station allocates a first terminal device identifier to the terminal, the base station may perform scheduling on the terminal device based on the first terminal device identifier. Therefore, further, the terminal device After receiving the identifier allocation message sent by the base station according to the access request, the method further includes the following operations:
- the terminal device receives the scheduling message broadcasted by the base station, where the scheduling message carries the K bits of the first terminal device identifier and the second CRC, and the second CRC is masked by LK bits, where K is greater than or equal to 0 and less than L.
- K is greater than or equal to 0 and less than L.
- An integer where the bit length of the second CRC is greater than or equal to LK, where L is the bit length of the first terminal device identifier;
- the terminal device performs CRC check on the scheduling message by using L-K bits of the stored terminal device identifier
- the uplink data is sent according to the scheduling message. , or receive downstream data.
- the scheduling message monitored by the terminal device carries a part of the bit of the first terminal device identifier, and the terminal device performs CRC check on the scheduling message by using the remaining bits of the first terminal device identifier to determine the CRC school.
- the first terminal device identifier formed by combining the K bits carried in the scheduling message and the LK bits for performing the CRC check is the same as the stored first terminal device identifier, it can be determined that the scheduling message is Scheduling terminal equipment, that is, at In this embodiment, even if the scheduling message carries a part of the first terminal device identifier, and the remaining first terminal device identifier checks the CRC, the terminal device can determine whether the monitored scheduling message is The scheduling of the terminal device and the scheduling message carrying all the bits of the first terminal device identifier can achieve the same effect. Therefore, the utilization of the control channel resources used for transmitting the scheduling message and the scalability of the control channel are improved.
- the first terminal device identifier is 20 bits, where 4 bits are carried in the scheduling message, and the remaining 16 bits are used to mask the CRC.
- the terminal device uses the stored 16-bit scheduling message of the first terminal device identifier.
- CRC check when the CRC check is successful, and the 16 bits of the CRC check and the 4 bits carried in the scheduling message are the same as the first terminal device identifier stored by the terminal device, the terminal device can determine
- the intercepted scheduling message is the scheduling itself, so that the first terminal device identifier carrying the 4-bit scheduling message and the first terminal device identifier carrying the 20-bit scheduling message can achieve the same effect, and the total number of bits that can be carried in the scheduling message is 80bit, if the scheduling message carries the 20-bit first terminal device identifier, 60 bits in the scheduling message can carry other information. If the scheduling message carries the 4-bit first terminal device identifier, 76 bits in the scheduling message can carry other information. Therefore, the embodiment of the present invention improves the control channel resources used when sending the
- the second CRC uses the bits of the first terminal device to identify the bits of the location, and the terminal device negotiates with the base station. For example, the base station and the terminal device negotiate the second CRC carried in the scheduling message.
- the lower 16 bits of the first terminal device identifier are masked.
- both the terminal device and the base station know that the second CRC is masked by using the lower 16 bits of the first terminal device identifier; for example, the base station and the terminal device negotiate the scheduling.
- the second CRC carried in the message is masked by using the upper 16 bits of the first terminal device identifier.
- both the terminal device and the base station know that the second CRC is masked by using the upper 16 bits of the first terminal device identifier.
- a base station is provided, where the base station includes a processing module 50 and a sending module 51, where:
- the processing module 50 is configured to determine a terminal device identifier of the terminal device, where the bit length of the terminal device identifier is N;
- the sending module 51 is configured to broadcast a scheduling message, where the scheduling message carries M bits of the terminal device identifier and a cyclic redundancy check code CRC, and the CRC is masked by NM bits, where M is greater than or equal to 0, and is less than N.
- the integer, the bit length of the CRC is greater than or equal to NM.
- the terminal device identifier is at least one of a temporary identification of a C-RNTI, a temporary logical link identifier TLLI, and an RA-RNTI by the cell radio network.
- the M bits are the high M bits in the terminal device identifier, or the low M bits in the terminal device identifier.
- the embodiment of the present invention further includes a receiving module 52, configured to receive an access request sent by the terminal device;
- the processing module 50 is further configured to: generate a C-RNTI for identifying the terminal device according to the access request;
- the sending module 51 is further configured to send the C-RNTI to the terminal device.
- the base station includes a processor 500 and a transmitter 510, where:
- the processor 500 is configured to determine a terminal device identifier of the terminal device, where the bit length of the terminal device identifier is N;
- the transmitter 510 is configured to broadcast a scheduling message, where the scheduling message carries M bits of the terminal device identifier and a cyclic redundancy check code CRC, and the CRC is masked by NM bits, where M is greater than or equal to 0, and is less than N.
- the integer, the bit length of the CRC is greater than or equal to NM.
- the processor 500 is further configured to perform other operations performed by the processing module 50
- the transmitter 510 is further configured to perform other operations performed by the sending module 51
- the scheduling message broadcasted by the base station provided by FIG. 5A and FIG. 5B does not need to carry all the bits of the terminal device identifier, and only needs to carry part of the bit of the terminal device identifier, and the remaining bits of the terminal device identifier are used to mask the CRC. More information can be carried in the scheduling message. Therefore, the base station provided in FIG. 5A and FIG. 5B improves the utilization of the control channel resources used in transmitting the scheduling message and the scalability of the control channel.
- step 100 can perform step 100 to step 110, that is, The method shown in Figure 1.
- the terminal device includes a receiving module 60, a processing module 61, and a sending module 62, where:
- the receiving module 60 is configured to listen to the scheduling message sent by the base station, where the scheduling message carries the M bits of the terminal device identifier and the cyclic redundancy check code CRC, the bit length of the terminal device identifier is N, and the CRC uses NM bits. Encapsulating, M is an integer greater than or equal to 0, and less than N, the bit length of the CRC is greater than or equal to NM;
- the processing module 61 is configured to perform CRC check on the scheduling message by using N-M bits of the stored terminal device identifier;
- the sending module 62 is configured to: when the processing module 61 determines that the CRC check succeeds, and the terminal device identifier formed by combining the M bits carried in the scheduling message and the NM bits in the CRC check is the same as the stored terminal device identifier , sending uplink data according to the scheduling message; or
- the receiving module 60 is further configured to: determine, by the processing module 61, that the CRC check succeeds, and the terminal device identifier formed by combining the M bits carried in the scheduling message and the NM bits that perform the CRC check with the stored terminal device identifier. At the same time, receive downlink data.
- the terminal device identifier is at least one of a temporary identification of a C-RNTI, a temporary logical link identifier TLLI, and an RA-RNTI by the cell radio network.
- the M bits are the high M bits in the terminal device identifier, or the low M bits in the terminal device identifier.
- the processing module 61 performs CRC check on the scheduling message by using the stored N-M bits of the terminal device identifier, specifically:
- the calculated CRC value is masked by using N-M bits of the stored terminal device identifier
- the processing module 61 determines that the CRC check succeeds, it specifically:
- the sending module 62 is further configured to: send an access request to the base station;
- the receiving module 60 is further configured to: receive a C-RNTI allocated by the base station to the terminal device according to the access request;
- the processing module 61 is further configured to store the C-RNTI received by the receiving module 60.
- the terminal device includes a receiver 600, a processor 610, and a transmitter 620, where:
- the receiver 600 is configured to monitor a scheduling message sent by the base station, where the scheduling message carries the M bits of the terminal device identifier and the cyclic redundancy check code CRC, the bit length of the terminal device identifier is N, and the CRC uses NM bits. Encapsulating, M is an integer greater than or equal to 0, and less than N, the bit length of the CRC is greater than or equal to NM;
- the processor 610 is configured to perform CRC check on the scheduling message by using N-M bits of the stored terminal device identifier.
- the transmitter 620 is configured to determine, when the processor 610 determines that the CRC check succeeds, and the terminal device identifier formed by combining the M bits carried in the scheduling message and the NM bits that perform the CRC check is the same as the stored terminal device identifier. , sending uplink data according to the scheduling message; or
- the receiver 600 is further configured to: determine, by the processor 610, that the CRC check succeeds, and the terminal device identifier formed by combining the M bits carried in the scheduling message and the NM bits that perform the CRC check with the stored terminal device identifier. At the same time, receive downlink data.
- the receiver 600 is further configured to perform other operations performed by the receiving module 60
- the processor 610 is further configured to perform other operations performed by the processing module 61
- the transmitter 620 is further configured to execute the execution performed by the sending module 62. operating.
- the scheduling message monitored by the terminal device provided in FIG. 6A and FIG. 6B carries a partial bit of the terminal device identifier, and the terminal device performs CRC check on the scheduling message by using the remaining bits of the terminal device identifier to determine the CRC check. If the terminal device identifier of the combination of the M bits carried in the scheduling message and the NM bits in the CRC check is the same as the stored terminal device identifier, the scheduling message may be determined to be the scheduling terminal device. That is, in this embodiment, even if the scheduling message carries a part of the terminal device identifier and the remaining terminal device identifier checks the CRC, the terminal device provided in FIG. 6A and FIG. 6B can also determine that the terminal device is listening.
- step 200 can perform step 200 to step 220, that is, the method shown in FIG. 2.
- a base station in the embodiment of the present invention, includes a receiving module 70, a processing module 71, and a sending module 72, where:
- the receiving module 70 is configured to receive an access request sent by the terminal device.
- the processing module 71 is configured to allocate a first terminal device identifier to the terminal device according to the access request, where the first terminal device identifier is used to uniquely identify the terminal within the coverage of the base station;
- the sending module 72 is configured to send an identifier allocation message to the terminal device, where the identifier allocation message carries the first terminal device identifier, the first cyclic redundancy check code CRC, and the M bits of the second terminal device identifier generated according to the preset rule. Bit, the bit length of the second terminal device identifier is N, the first CRC is masked by NM bits, M is an integer greater than or equal to 0, and is less than N, and the bit length of the first CRC is greater than or equal to NM.
- the first terminal device identifier is a cell radio network temporary identification C-RNTI and/or a temporary logical link identifier TLLI;
- the second terminal device identifier is an RA-RNTI.
- the sending module 72 is further configured to: broadcast a scheduling message, where the scheduling message carries the K bits and the second CRC of the first terminal device identifier, and the bit length of the first terminal device identifier is L.
- the second CRC is masked by LK bits, K is an integer greater than or equal to 0 and less than L, and the bit length of the second CRC is greater than or equal to LK.
- the base station includes a receiver 700, a processor 710, and a transmitter 720, where:
- the receiver 700 is configured to receive an access request sent by the terminal device.
- the processor 710 is configured to allocate a first terminal device identifier to the terminal device according to the access request, where the first terminal device identifier is used to uniquely identify the terminal within the coverage of the base station;
- the sender 720 is configured to send an identifier allocation message to the terminal device, where the identifier allocation message carries the first terminal device identifier, the first cyclic redundancy check code CRC, and the M bits of the second terminal device identifier generated according to the preset rule. Bit, the bit length of the second terminal device identifier is N, the first CRC is masked by NM bits, M is an integer greater than or equal to 0, and is less than N, and the bit length of the first CRC is greater than or equal to NM. .
- the receiver 700 is further configured to perform other operations performed by the receiving module 70
- the processor 710 is further configured to perform other operations performed by the processing module 71
- the transmitter 720 is further configured to execute the execution performed by the sending module 72. Other operations.
- the identifier allocation message sent by the base station provided by the base station in FIG. 7A and FIG. 7B does not need to carry all the bits of the second terminal device identifier, and only needs to carry part of the bit of the second terminal device identifier, and the remaining bits of the second terminal device identifier
- the CRC is masked so that the identification allocation message can carry more content. Therefore, the base station provided in FIGS. 7A and 7B improves the resource utilization and the scalability of the associated channel.
- FIG. 7A and FIG. 7B can perform steps 300-320, that is, the method shown in FIG.
- the terminal device includes a sending module 80, a receiving module 81, and a processing module 82, where:
- the sending module 80 is configured to send an access request to the base station
- the receiving module 81 is configured to receive an identifier allocation message that is sent by the base station according to the access request, where the identifier allocation message carries the first terminal device identifier, the first cyclic redundancy check code CRC, and the second terminal device identifier generated according to the preset rule.
- M bits the first terminal device identifier is used to uniquely identify the terminal device within the coverage of the base station, the bit length of the second terminal device identifier is N, the first CRC is masked by NM bits, and M is greater than Or an integer equal to 0 and less than N, the bit length of the first CRC is greater than or equal to NM;
- the processing module 82 is configured to perform CRC check on the identifier allocation message by using the stored N-M bits of the second terminal device identifier;
- the processing module 82 is further configured to: determine that the CRC check succeeds, and identify the M carried in the assignment message. When the number of bits and the N-M bits of the CRC check are combined to form the terminal device identifier and the stored second terminal device identifier, the first terminal device identifier is used as the identifier of the terminal device.
- the first terminal device identifier is a cell radio network temporary identification C-RNTI and/or a temporary logical link identifier TLLI;
- the second terminal device identifier is an RA-RNTI.
- the receiving module 81 is further configured to receive a scheduling message broadcast by the base station, where the scheduling message carries K bits and a second CRC of the first terminal device identifier, and the second CRC uses LK bits.
- K is an integer greater than or equal to 0 and less than L
- the bit length of the second CRC is greater than or equal to LK, where L is the bit length of the first terminal device identifier;
- the processing module 82 is further configured to: perform CRC check on the scheduling message by using N-M bits of the stored terminal device identifier;
- the sending module 80 is further configured to: at the processing module 82, determine that the CRC check succeeds, and the terminal device identifier and the stored first terminal device that are combined by the M bits carried in the scheduling message and the NM bits that perform the CRC check When marking, send uplink data according to the scheduling message; or
- the receiving module 81 is further configured to: determine, by the processing module 82, that the CRC check succeeds, and the terminal device identifier and the stored first terminal device that are combined by the M bits carried in the scheduling message and the NM bits that perform the CRC check. When marking, receive downlink data.
- the transmitter 800 is further configured to perform other operations performed by the sending module 80
- the receiver 810 is further configured to perform operations performed by the receiving module 81
- the processor 820 is further configured to execute other operations performed by the processing module 82. operating.
- the identifier allocation message received by the terminal device provided by FIG. 8A and FIG. 8B carries a partial bit of the second terminal device identifier, and the terminal device uses the remaining bits of the second terminal device identifier to perform a first CRC calibration on the scheduling message.
- the identifier assignment message is to assign the terminal device identifier to the terminal device, that is, in this embodiment, even if the identifier assignment message carries a part of the second terminal device identifier, the remaining second terminal device identifier For the first
- the CRC performs the check, but the terminal device provided in FIG. 8A and FIG. 8B can also determine whether the received identifier assignment message is to assign the terminal device identifier to the terminal device, and the identifier assignment message carries the second terminal device identifier.
- the terminal devices provided in FIGS. 8A and 8B improve resource utilization and scalability of related channels.
- FIG. 8A and FIG. 8B can perform steps 400 to 430, that is, the method shown in FIG.
- embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in a block or blocks of a flow or a flow and/or a block diagram of a flowchart Step.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
一种通信方法及装置,在该实施例中,基站广播的调度消息中不需要携带终端设备标识的全部比特位,只需要携带终端设备标识的部分比特位,终端设备标识的剩余比特位对CRC进行加掩,这样,调度消息中可以承载更多内容,因此,提高了发送调度消息时采用的控制信道资源的利用率、及控制信道的可扩展性。
Description
本发明涉及通信技术领域,尤其涉及一种通信方法及装置。
通信网络技术的出现和发展,给社会生活面貌带来了极大的变化。人与人之间可以更加快捷地沟通,信息的交流更顺畅。但是,目前仅仅是计算机和其他一些IT(Internet Technology,互联网技术)类设备具备这种通信和网络能力,众多的普通机器设备几乎不具备联网和通信能力,例如,家电、车辆、自动售货机、工厂设备等。M2M(Machine-to-Machine,机器对机器)技术的目标就是使所有机器设备都具备连网和通信能力,M2M技术具有非常重要的意义,有着广阔的市场和应用,推动着社会生产和生活方式新一轮的变革。
采用M2M技术的窄带M2M系统有支持连接数较大、通信速率低的特点,M2M系统中基站发送调度消息,终端设备根据调度消息传输数据,其中,基站发送的调度消息中需要携带UE(User Equipment,用户设备)ID(Identification,标识);M2M系统中,UE ID可以是C-RNTI(Cell Radio Network Temporary Identify,小区无线网络临时识别),其中,C-RNTI长度为16bits、20bits或者使用更长比特数;或者,也可以是TLLI(Temporary Logical Link Identifier,临时逻辑链路标识),TLLI长度可以是32bits。
由于M2M系统中调度消息承载的比特数是有限的,例如,调度消息中承载的比特数为80bits,如果调度消息中携带的是完整的UE ID的话,发送调度消息时采用的控制信道资源的利用率较低、控制信道的可扩展性较差。
发明内容
本发明实施例提供了一种通信方法及装置,用于提高控制信道资源的利
用率及可扩展性。
第一方面,提供一种通信方法,包括:
基站确定终端设备的终端设备标识,所述终端设备标识的比特位长度为N;
所述基站广播调度消息,所述调度消息中携带所述终端设备标识的M个比特位和循环冗余校验码CRC,所述CRC采用N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述CRC的比特位长度大于或者等于所述N-M。
结合第一方面,在第一种可能的实现方式中,所述终端设备标识为小区无线网络临时识别C-RNTI、临时逻辑链路标识TLLI、RA-RNTI中的至少一种。
结合第一方面,或者第一方面的第一种可能的实现方式,在第二种可能的实现方式中,所述M个比特位为所述终端设备标识中的高M个比特位,或者,为所述终端设备标识中的低M个比特位。
结合第一方面,或者第一方面的第一种至第二种可能的实现方式,在第三种可能的实现方式中,所述基站发送调度消息之前,还包括:
所述基站接收所述终端设备发送的接入请求,并根据所述接入请求生成用于标识所述终端设备的C-RNTI;
所述基站将所述C-RNTI发送至所述终端设备。
第二方面,提供一种通信方法,包括:
终端设备监听基站发送的调度消息,所述调度消息中携带所述终端设备标识的M个比特位和循环冗余校验码CRC,所述终端设备标识的比特位长度为N,所述CRC采用N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述CRC的比特位长度大于或者等于所述N-M;
所述终端设备采用存储的所述终端设备标识的所述N-M个比特位对所述调度消息进行CRC校验;
所述终端设备确定CRC校验成功,及所述调度消息中携带的所述M个比
特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的终端设备标识相同时,根据所述调度消息发送上行数据,或者接收下行数据。
结合第二方面,在第一种可能的实现方式中,所述终端设备标识为小区无线网络临时识别C-RNTI、临时逻辑链路标识TLLI、RA-RNTI中的至少一种。
结合第二方面,或者第二方面的第一种可能的实现方式,在第二种可能的实现方式中,所述M个比特位为所述终端设备标识中的高M个比特位,或者,为所述终端设备标识中的低M个比特位。
结合第二方面,或者第二方面的第一种至第二种可能的实现方式,在第三种可能的实现方式中,所述终端设备采用存储的所述终端设备标识的所述N-M个比特位对所述调度消息进行CRC校验,包括:
所述终端设备对所述调度消息进行CRC计算,得到CRC;
所述终端设备采用存储的所述终端设备标识的所述N-M个比特位对计算得到的CRC值进行加掩;
所述终端设备判断加掩得到的CRC值与所述调度消息中携带的CRC值是否相同;
所述终端设备确定CRC校验成功,包括:
所述终端设备确定加掩得到的CRC值与所述调度消息中携带的CRC值相同。
结合第二方面,或者第二方面的第一种至第三种可能的实现方式,在第四种可能的实现方式中,所述终端设备采用存储的所述终端设备标识的所述N-M个比特位对所述调度消息进行CRC校验之前,还包括:
所述终端设备向所述基站发送接入请求;
所述终端设备接收所述基站根据所述接入请求为所述终端设备分配的C-RNTI,并进行存储。
第三方面,提供一种分配终端设备标识的方法,包括:
基站接收终端设备发送的接入请求;
所述基站根据所述接入请求为所述终端设备分配第一终端设备标识,所述第一终端设备标识用于在所述基站的覆盖范围内唯一标识所述终端;
所述基站向所述终端设备发送标识分配消息,所述标识分配消息中携带所述第一终端设备标识、第一循环冗余校验码CRC和根据预设规则生成的第二终端设备标识的M个比特位,所述第二终端设备标识的比特位长度为N,所述第一CRC采用所述N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述第一CRC的比特位长度大于或者等于所述N-M。
结合第三方面,在第一种可能的实现方式中,所述第一终端设备标识为小区无线网络临时识别C-RNTI和/或临时逻辑链路标识TLLI;
所述第二终端设备标识为RA-RNTI。
结合第三方面,或者第三方面的第一种可能的实现方式,在第二种可能的实现方式中,所述基站向所述终端设备发送标识分配消息之后,还包括:
所述基站广播调度消息,所述调度消息中携带所述第一终端设备标识的K个比特位和第二CRC,所述第一终端设备标识的比特位长度为L,所述第二CRC采用所述L-K个比特位加掩,所述K为大于或者等于0,且小于L的整数,所述第二CRC的比特位长度大于或者等于所述L-K。
第四方面,提供一种分配终端设备标识的方法,包括:
终端设备向基站发送接入请求;
所述终端设备接收所述基站根据所述接入请求发送的标识分配消息,所述标识分配消息中携带所述第一终端设备标识、第一循环冗余校验码CRC和根据预设规则生成的第二终端设备标识的M个比特位,所述第一终端设备标识用于在所述基站的覆盖范围内唯一标识所述终端设备,所述第二终端设备标识的比特位长度为N,所述第一CRC采用所述N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述第一CRC的比特位长度大于或者等于所述N-M;
所述终端设备采用存储的所述第二终端设备标识的所述N-M个比特位对所述标识分配消息进行CRC校验;
所述终端设备确定CRC校验成功,及所述标识分配消息中携带的所述M个比特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的第二终端设备标识时,将所述第一终端设备标识作为所述终端设备的标识。
结合第四方面,在第一种可能的实现方式中,所述第一终端设备标识为小区无线网络临时识别C-RNTI和/或临时逻辑链路标识TLLI;
所述第二终端设备标识为RA-RNTI。
结合第四方面,或者第四方面的第一种可能的实现方式,在第二种可能的实现方式中,所述终端设备接收所述基站根据所述接入请求发送的标识分配消息之后,还包括:
所述终端设备接收所述基站广播的调度消息,所述调度消息中携带所述第一终端设备标识的K个比特位和第二CRC,所述第二CRC采用所述L-K个比特位加掩,所述K为大于或者等于0,且小于L的整数,所述第二CRC的比特位长度大于或者等于所述L-K,所述L为所述第一终端设备标识的比特位长度;
所述终端设备采用存储的所述终端设备标识的所述N-M个比特位对所述调度消息进行CRC校验;
所述终端设备确定CRC校验成功,及所述调度消息中携带的所述M个比特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的第一终端设备标识时,根据所述调度消息发送上行数据,或者接收下行数据。
第五方面,提供一种基站,包括:
处理模块,用于确定终端设备的终端设备标识,所述终端设备标识的比特位长度为N;
发送模块,用于广播调度消息,所述调度消息中携带所述终端设备标识的M个比特位和循环冗余校验码CRC,所述CRC采用N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述CRC的比特位长度大于或者等于所述N-M。
结合第五方面,在第一种可能的实现方式中,所述终端设备标识为小区无线网络临时识别C-RNTI、临时逻辑链路标识TLLI、RA-RNTI中的至少一种。
结合第五方面,或者第五方面的第一种可能的实现方式,在第二种可能的实现方式中,所述M个比特位为所述终端设备标识中的高M个比特位,或者,为所述终端设备标识中的低M个比特位。
结合第五方面,或者第五方面的第一种至第二种可能的实现方式,在第三种可能的实现方式中,还包括接收模块,用于接收所述终端设备发送的接入请求;
所述处理模块还用于,根据所述接入请求生成用于标识所述终端设备的C-RNTI;
所述发送模块还用于,将所述C-RNTI发送至所述终端设备。
第六方面,提供一种终端设备,包括:
接收模块,用于监听基站发送的调度消息,所述调度消息中携带所述终端设备标识的M个比特位和循环冗余校验码CRC,所述终端设备标识的比特位长度为N,所述CRC采用N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述CRC的比特位长度大于或者等于所述N-M;
处理模块,用于采用存储的所述终端设备标识的所述N-M个比特位对所述调度消息进行CRC校验;
发送模块,用于在所述处理模块确定CRC校验成功,及所述调度消息中携带的所述M个比特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的终端设备标识相同时,根据所述调度消息发送上行数据;或者
所述接收模块还用于,在所述处理模块确定CRC校验成功,及所述调度消息中携带的所述M个比特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的终端设备标识相同时,接收下行数据。
结合第六方面,在第一种可能的实现方式中,所述终端设备标识为小区
无线网络临时识别C-RNTI、临时逻辑链路标识TLLI、RA-RNTI中的至少一种。
结合第六方面,或者第六方面的第一种可能的实现方式,在第二种可能的实现方式中,所述M个比特位为所述终端设备标识中的高M个比特位,或者,为所述终端设备标识中的低M个比特位。
结合第六方面,或者第六方面的第一种至第二种可能的实现方式,在第三种可能的实现方式中,所述处理模块采用存储的所述终端设备标识的所述N-M个比特位对所述调度消息进行CRC校验时,具体为:
对所述调度消息进行CRC计算,得到CRC;
采用存储的所述终端设备标识的所述N-M个比特位对计算得到的CRC值进行加掩;
判断加掩得到的CRC值与所述调度消息中携带的CRC值是否相同;
所述处理模块确定CRC校验成功时,具体为:
确定加掩得到的CRC值与所述调度消息中携带的CRC值相同。
结合第六方面,或者第六方面的第一种至第三种可能的实现方式,在第四种可能的实现方式中,所述发送模块还用于,向所述基站发送接入请求;
所述接收模块还用于,接收所述基站根据所述接入请求为所述终端设备分配的C-RNTI;
所述处理模块还用于,将所述接收模块接收到的C-RNTI进行存储。
第七方面,提供一种基站,包括:
接收模块,用于接收终端设备发送的接入请求;
处理模块,用于根据所述接入请求为所述终端设备分配第一终端设备标识,所述第一终端设备标识用于在所述基站的覆盖范围内唯一标识所述终端;
发送模块,用于向所述终端设备发送标识分配消息,所述标识分配消息中携带所述第一终端设备标识、第一循环冗余校验码CRC和根据预设规则生成的第二终端设备标识的M个比特位,所述第二终端设备标识的比特位长度为N,所述第一CRC采用所述N-M个比特位加掩,所述M为大于或者等于
0,且小于N的整数,所述第一CRC的比特位长度大于或者等于所述N-M。
结合第七方面,在第一种可能的实现方式中,所述第一终端设备标识为小区无线网络临时识别C-RNTI和/或临时逻辑链路标识TLLI;
所述第二终端设备标识为RA-RNTI。
结合第七方面,或者第七方面的第一种可能的实现方式,在第二种可能的实现方式中,所述发送模块还用于,广播调度消息,所述调度消息中携带所述第一终端设备标识的K个比特位和第二CRC,所述第一终端设备标识的比特位长度为L,所述第二CRC采用所述L-K个比特位加掩,所述K为大于或者等于0,且小于L的整数,所述第二CRC的比特位长度大于或者等于所述L-K。
第八方面,提供一种终端设备,包括:
发送模块,用于向基站发送接入请求;
接收模块,用于接收所述基站根据所述接入请求发送的标识分配消息,所述标识分配消息中携带所述第一终端设备标识、第一循环冗余校验码CRC和根据预设规则生成的第二终端设备标识的M个比特位,所述第一终端设备标识用于在所述基站的覆盖范围内唯一标识所述终端设备,所述第二终端设备标识的比特位长度为N,所述第一CRC采用所述N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述第一CRC的比特位长度大于或者等于所述N-M;
处理模块,用于采用存储的所述第二终端设备标识的所述N-M个比特位对所述标识分配消息进行CRC校验;
所述处理模块还用于,确定CRC校验成功,及所述标识分配消息中携带的所述M个比特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的第二终端设备标识时,将所述第一终端设备标识作为所述终端设备的标识。
结合第八方面,在第一种可能的实现方式中,所述第一终端设备标识为小区无线网络临时识别C-RNTI和/或临时逻辑链路标识TLLI;
所述第二终端设备标识为RA-RNTI。
结合第八方面,或者第八方面的第一种可能的实现方式,在第二种可能的实现方式中,所述接收模块还用于,接收所述基站广播的调度消息,所述调度消息中携带所述第一终端设备标识的K个比特位和第二CRC,所述第二CRC采用所述L-K个比特位加掩,所述K为大于或者等于0,且小于L的整数,所述第二CRC的比特位长度大于或者等于所述L-K,所述L为所述第一终端设备标识的比特位长度;
所述处理模块还用于,采用存储的所述终端设备标识的所述N-M个比特位对所述调度消息进行CRC校验;
所述发送模块还用于,在所述处理模块确定CRC校验成功,及所述调度消息中携带的所述M个比特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的第一终端设备标识时,根据所述调度消息发送上行数据;或者
所述接收模块还用于,在所述处理模块确定CRC校验成功,及所述调度消息中携带的所述M个比特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的第一终端设备标识时,接收下行数据。
本发明实施例中提出一种通信方法,在该方案中,基站广播的调度消息中不需要携带终端设备标识的全部比特位,只需要携带终端设备标识的部分比特位,终端设备标识的剩余比特位对CRC进行加掩,这样,调度消息中可以承载更多内容,因此,提高了发送调度消息时采用的控制信道资源的利用率、及控制信道的可扩展性。
图1为本发明实施例提供的通信方法的一种流程图;
图2为本发明实施例提供的通信方法的另一种流程图;
图3为本发明实施例提供的分配终端设备标识一种流程图;
图4为本发明实施例提供的分配终端设备标识另一种流程图;
图5A为本发明实施例提供的基站的一种示意图;
图5B为本发明实施例提供的基站的另一种示意图;
图6A为本发明实施例提供的终端设备的一种示意图;
图6B为本发明实施例提供的终端设备的另一种示意图;
图7A为本发明实施例提供的基站的一种示意图;
图7B为本发明实施例提供的基站的另一种示意图;
图8A为本发明实施例提供的终端设备的一种示意图;
图8B为本发明实施例提供的终端设备的另一种示意图。
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
另外,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字母“/”,一般表示前后关联对象是一种“或”的关系。
下面结合说明书附图对本发明优选的实施方式进行详细说明,应当理解,此处所描述的优选实施例仅用于说明和解释本发明,并不用于限定本发明,并且在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
下面结合附图对本发明优选的实施方式进行详细说明。
实施例一
参阅图1所示,本发明实施例中,一种通信流程如下:
步骤100:基站确定终端设备的终端设备标识,终端设备标识的比特位长度为N;
步骤110:基站广播调度消息,调度消息中携带终端设备标识的M个比特位和循环冗余校验码CRC,CRC采用N-M个比特位加掩,M为大于或者等于0,且小于N的整数,CRC的比特位长度大于或者等于N-M。
在该实施例中,基站广播的调度消息中不需要携带终端设备标识的全部比特位,只需要携带终端设备标识的部分比特位,终端设备标识的剩余比特位对CRC进行加掩,这样,调度消息中可以承载更多内容,因此,提高了发送调度消息时采用的控制信道资源的利用率、及控制信道的可扩展性。
例如,终端设备标识为20bit,其中,4bit携带在调度消息中,剩余的16bit对CRC进行加掩,若调度消息总共可承载的比特位为80bit,如果调度消息中携带20bit的终端设备标识的话,调度消息中有60bit可以承载其他信息,如果调度消息中携带4bit的终端设备标识的话,调度消息中有76bit可以承载其他信息,因此,提高了发送调度消息时采用的控制信道资源的利用率、及控制信道的可扩展性。
本发明实施例中,可选的,终端设备标识为C-RNTI、TLLI、RA-RNTI(Random Access Radio Network Temporary Identify,随机接入网络临时标识)中的至少一种。
本发明实施例中,M个比特位为终端设备标识中的高M个比特位,或者,为终端设备标识中的低M个比特位,当然也可以为终端设备标识中的其他位置的比特位,或者非连续的比特位,但是,调度消息中携带的终端设备标识的哪些位置的比特位,是终端跟基站都协商好的。
例如,终端设备标识为20bit,则调度消息中携带的可以是终端设备标识的第0-第3比特位,也可以是终端设备标识的第17-第19比特位,或者也可以是第0比特位、第2比特位、第4比特位和第6比特位,剩余的比特位对CRC进行加掩。
上述描述的是基站怎么在调度消息中携带终端设备标识的方法,上述方法是基于终端本发明实施例中,基站发送调度消息之前,还包括:
基站接收终端设备发送的接入请求,并根据接入请求生成用于标识终端
设备的C-RNTI;
基站将C-RNTI发送至终端设备。
实施例二
参阅图2所示,本发明实施例中,另一种通信流程如下:
步骤200:终端设备监听基站发送的调度消息,调度消息中携带终端设备标识的M个比特位和循环冗余校验码CRC,终端设备标识的比特位长度为N,CRC采用N-M个比特位加掩,M为大于或者等于0,且小于N的整数,CRC的比特位长度大于或者等于N-M;
步骤210:终端设备采用存储的终端设备标识的N-M个比特位对调度消息进行CRC校验;
步骤220:终端设备确定CRC校验成功,及调度消息中携带的M个比特位和进行CRC校验的N-M个比特位组合成的终端设备标识与存储的终端设备标识相同时,根据调度消息发送上行数据,或者接收下行数据。
在该实施例中,终端设备监听到的调度消息中携带的是终端设备标识的部分比特位,终端设备采用终端设备标识的剩余比特位对调度消息进行CRC校验,确定CRC校验成功,及调度消息中携带的M个比特位和进行CRC校验的N-M个比特位组合成的终端设备标识与存储的终端设备标识相同时,就可以确定出该调度消息是调度终端设备的,也就是说,在该实施例中,即使调度消息中携带的是部分终端设备标识,剩余终端设备标识对CRC进行校验,但是,采用这种方式终端设备也可以确定出监听到的调度消息是否是调度本终端设备的,与调度消息携带终端设备标识的全部比特位可以达到同样的效果,因此,提高了发送调度消息时采用的控制信道资源的利用率、及控制信道的可扩展性。
例如,终端设备标识为20bit,其中,4bit携带在调度消息中,剩余的16bit对CRC进行加掩,终端设备接收到调度消息后,采用存储的终端设备标识的16bit对调度消息进行CRC校验,当CRC校验成功,且进行CRC校验的16bit与调度消息中携带的4比特组合成的终端设备标识与终端设备存储的终端设
备标识相同时,终端设备可以确定出监听到的调度消息是调度本身的,这样,调度消息携带4bit的终端设备标识与调度消息携带20bit的终端设备标识可以达到同样的效果,若调度消息总共可承载的比特位为80bit,如果调度消息中携带20bit的终端设备标识的话,调度消息中有60bit可以承载其他信息,如果调度消息中携带4bit的终端设备标识的话,调度消息中有76bit可以承载其他信息,因此,本发明实施例提高了发送调度消息时采用的控制信道资源的利用率、及控制信道的可扩展性。
需要说明的是,CRC采用终端设备标识的哪些位置的比特位进行加掩是终端设备和基站协商好的,例如,基站和终端设备协商出调度消息中携带的CRC是采用终端设备标识的低16比特进行加掩,此时,终端设备和基站均知道CRC是采用终端设备标识的低16比特进行加掩;又例如,基站和终端设备协商出调度消息中携带的CRC是采用终端设备标识的高16比特进行加掩,此时,终端设备和基站均知道CRC是采用终端设备标识的高16比特进行加掩。
本发明实施例中,可选的,终端设备标识为C-RNTI、TLLI、RA-RNTI中的至少一种。
本发明实施例中,M个比特位为终端设备标识中的高M个比特位,或者,为终端设备标识中的低M个比特位,当然也可以为终端设备标识中的其他位置的比特位,或者非连续的比特位,但是,调度消息中携带的终端设备标识的哪些位置的比特位,是终端跟基站都协商好的。
例如,终端设备标识为20bit,则调度消息中携带的可以是终端设备标识的第0-第3比特位,也可以是终端设备标识的第17-第19比特位,或者也可以是第0比特位、第2比特位、第4比特位和第6比特位,剩余的比特位对CRC进行加掩。
本发明实施例中,终端设备采用存储的终端设备标识的N-M个比特位对调度消息进行CRC校验时,可选的,可以采用如下方式:
终端设备对调度消息进行CRC计算,得到CRC;
终端设备采用存储的终端设备标识的N-M个比特位对计算得到的CRC值进行加掩;
终端设备判断加掩得到的CRC值与调度消息中携带的CRC值是否相同;
终端设备确定CRC校验成功,包括:
终端设备确定加掩得到的CRC值与调度消息中携带的CRC值相同。
需要说明的是,终端设备将调度消息中携带的M个比特位和进行CRC校验的N-M个比特位进行组合时,M个比特位在终端设备标识中所处的位置,及N-M个比特位在终端设备标识中所处的位置都是基站和终端协商好的。
本发明实施例中,进一步的,终端设备采用存储的终端设备标识的N-M个比特位对调度消息进行CRC校验之前,还包括:
终端设备向基站发送接入请求;
终端设备接收基站根据接入请求为终端设备分配的C-RNTI,并进行存储。
上述两个实施例描述的是基站在发送调度消息时,调度消息中携带的是终端设备标识的部分比特位,这样,提高了发送调度消息时采用的控制信道资源的利用率、及控制信道的可扩展性,当然,也可以在给终端分配终端设备标识时,可以采用上述方式来提高资源的利用率、及相关信道的可扩展性。
参阅图3所示,本发明实施例还提出一种分配终端设备标识的方法:
步骤300:基站接收终端设备发送的接入请求;
步骤310:基站根据接入请求为终端设备分配第一终端设备标识,第一终端设备标识用于在基站的覆盖范围内唯一标识终端;
步骤320:基站向终端设备发送标识分配消息,标识分配消息中携带第一终端设备标识、第一循环冗余校验码CRC和根据预设规则生成的第二终端设备标识的M个比特位,第二终端设备标识的比特位长度为N,第一CRC采用N-M个比特位加掩,M为大于或者等于0,且小于N的整数,第一CRC的比特位长度大于或者等于N-M。
在该实施例中,基站发送的标识分配消息中不需要携带第二终端设备标
识的全部比特位,只需要携带第二终端设备标识的部分比特位,第二终端设备标识的剩余比特位对CRC进行加掩,这样标识分配消息中可以承载更多内容,因此,提高了资源的利用率、及相关信道的可扩展性。
例如,第二终端设备标识为20bit,其中,4bit携带在标识分配消息中,剩余的16bit对CRC进行加掩,若标识分配消息总共可承载的比特位为80bit,如果标识分配消息中携带20bit的第二终端设备标识的话,标识分配消息中有60bit可以承载其他信息,如果标识分配消息中携带4bit的第二终端设备标识的话,标识分配消息中有76bit可以承载其他信息,因此,提高了资源的利用率、及相关信道的可扩展性。
本发明实施例中,M个比特位为终端设备标识中的高M个比特位,或者,为终端设备标识中的低M个比特位,当然也可以为终端设备标识中的其他位置的比特位,或者非连续的比特位,但是,调度消息中携带的终端设备标识的哪些位置的比特位,是终端跟基站都协商好的。
例如,第二终端设备标识为20bit,则标识分配消息中携带的可以是第二终端设备标识的第0-第3比特位,也可以是第二终端设备标识的第17-第19比特位,或者也可以是第0比特位、第2比特位、第4比特位和第6比特位,剩余的比特位对第一CRC进行加掩。
需要说明的是,第一CRC采用第二终端设备标识的哪些位置的比特位进行加掩是终端设备和基站协商好的,例如,基站和终端设备协商出标识分配消息中携带的第一CRC是采用第二终端设备标识的低16比特进行加掩,此时,终端设备和基站均知道第一CRC是采用第二终端设备标识的低16比特进行加掩;又例如,基站和终端设备协商出标识分配消息中携带的第一CRC是采用第二终端设备标识的高16比特进行加掩,此时,终端设备和基站均知道第一CRC是采用第二终端设备标识的高16比特进行加掩。
本发明实施例中,可选的,第一终端设备标识为C-RNTI和/或TLLI;
第二终端设备标识为RA-RNTI。
上述描述的是基站将给终端设备分配的第一终端设备标识发送至终端设
备,在将给终端设备分配的第一终端设备标识发送至终端设备之后,还可能调度该终端设备,因此,本发明实施例中,基站向终端设备发送标识分配消息之后,还包括如下操作:
基站广播调度消息,调度消息中携带第一终端设备标识的K个比特位和第二CRC,第一终端设备标识的比特位长度为L,第二CRC采用L-K个比特位加掩,K为大于或者等于0,且小于L的整数,第二CRC的比特位长度大于或者等于L-K。
在该实施例中,基站广播的调度消息中不需要携带第一终端设备标识的全部比特位,只需要携带第一终端设备标识的部分比特位,第一终端设备标识的剩余比特位对第二CRC进行加掩,这样,调度消息中可以承载更多内容,因此,提高了发送调度消息时采用的控制信道资源的利用率、及控制信道的可扩展性。
例如,第一终端设备标识为20bit,其中,4bit携带在调度消息中,剩余的16bit对第二CRC进行加掩,若调度消息总共可承载的比特位为80bit,如果调度消息中携带20bit的第一终端设备标识的话,调度消息中有60bit可以承载其他信息,如果调度消息中携带4bit的第一终端设备标识的话,调度消息中有76bit可以承载其他信息,因此,提高了发送调度消息时采用的控制信道资源的利用率、及控制信道的可扩展性。
参阅图4所示,本发明实施例还提出一种分配终端设备标识的方法:
步骤400:终端设备向基站发送接入请求;
步骤410:终端设备接收基站根据接入请求发送的标识分配消息,标识分配消息中携带第一终端设备标识、第一循环冗余校验码CRC和根据预设规则生成的第二终端设备标识的M个比特位,第一终端设备标识用于在基站的覆盖范围内唯一标识终端设备,第二终端设备标识的比特位长度为N,第一CRC采用N-M个比特位加掩,M为大于或者等于0,且小于N的整数,第一CRC的比特位长度大于或者等于N-M;
步骤420:终端设备采用存储的第二终端设备标识的N-M个比特位对标
识分配消息进行CRC校验;
步骤430:终端设备确定CRC校验成功,及标识分配消息中携带的M个比特位和进行CRC校验的N-M个比特位组合成的终端设备标识与存储的第二终端设备标识时,将第一终端设备标识作为终端设备的标识。
在该实施例中,终端设备接收到的标识分配消息中携带的是第二终端设备标识的部分比特位,终端设备采用第二终端设备标识的剩余比特位对调度消息进行第一CRC校验,确定第一CRC校验成功,及标识分配消息中携带的M个比特位和进行CRC校验的N-M个比特位组合成的第二终端设备标识与存储的第二终端设备标识相同时,就可以确定出该标识分配消息是给该终端设备分配终端设备标识的,也就是说,在该实施例中,即使标识分配消息中携带的是部分第二终端设备标识,剩余第二终端设备标识对第一CRC进行校验,但是,采用这种方式终端设备也可以确定出接收到的标识分配消息是否是给本终端设备分配终端设备标识的,与标识分配消息携带第二终端设备标识的全部比特位可以达到同样的效果,因此,提高了资源的利用率、及相关信道的可扩展性。
例如,第二终端设备标识为20bit,其中,4bit携带在标识分配消息中,剩余的16bit对第一CRC进行加掩,终端设备接收到标识分配消息后,采用存储的第二终端设备标识的16bit对标识分配消息进行CRC校验,当CRC校验成功,且进行CRC校验的16bit与标识分配消息中携带的4比特组合成的第二终端设备标识与终端设备存储的第二终端设备标识相同时,终端设备可以确定出接收到的标识分配消息是给本终端设备本身分配终端设备标识的,这样,标识分配消息携带4bit的第二终端设备标识与标识分配消息携带20bit的第二终端设备标识可以达到同样的效果,若标识分配消息总共可承载的比特位为80bit,如果标识分配消息中携带20bit的第二终端设备标识的话,标识分配消息中有60bit可以承载其他信息,如果标识分配消息中携带4bit的终端设备标识的话,标识分配消息中有76bit可以承载其他信息,因此,本发明实施例提高了资源的利用率、及相关信道的可扩展性。
需要说明的是,第一CRC采用第二终端设备标识的哪些位置的比特位进行加掩是终端设备和基站协商好的,例如,基站和终端设备协商出标识分配消息中携带的第一CRC是采用第二终端设备标识的低16比特进行加掩,此时,终端设备和基站均知道第一CRC是采用第二终端设备标识的低16比特进行加掩;又例如,基站和终端设备协商出标识分配消息中携带的第一CRC是采用第二终端设备标识的高16比特进行加掩,此时,终端设备和基站均知道第一CRC是采用第二终端设备标识的高16比特进行加掩。
本发明实施例中,可选的,第一终端设备标识为C-RNTI和/或TLLI;
第二终端设备标识为RA-RNTI。
上述描述的是基站给终端设备分配第一终端设备标识的过程,基站在给终端分配第一终端设备标识之后,基站可能基于第一终端设备标识对终端设备进行调度,因此,进一步的,终端设备接收基站根据接入请求发送的标识分配消息之后,还包括如下操作:
终端设备接收基站广播的调度消息,调度消息中携带第一终端设备标识的K个比特位和第二CRC,第二CRC采用L-K个比特位加掩,K为大于或者等于0,且小于L的整数,第二CRC的比特位长度大于或者等于L-K,L为第一终端设备标识的比特位长度;
终端设备采用存储的终端设备标识的L-K个比特位对调度消息进行CRC校验;
终端设备确定CRC校验成功,及调度消息中携带的K个比特位和进行CRC校验的L-K个比特位组合成的终端设备标识与存储的第一终端设备标识时,根据调度消息发送上行数据,或者接收下行数据。
在该实施例中,终端设备监听到的调度消息中携带的是第一终端设备标识的部分比特位,终端设备采用第一终端设备标识的剩余比特位对调度消息进行CRC校验,确定CRC校验成功,及调度消息中携带的K个比特位和进行CRC校验的L-K个比特位组合成的第一终端设备标识与存储的第一终端设备标识相同时,就可以确定出该调度消息是调度终端设备的,也就是说,在
该实施例中,即使调度消息中携带的是部分第一终端设备标识,剩余第一终端设备标识对CRC进行校验,但是,采用这种方式终端设备也可以确定出监听到的调度消息是否是调度本终端设备的,与调度消息携带第一终端设备标识的全部比特位可以达到同样的效果,因此,提高了发送调度消息时采用的控制信道资源的利用率、及控制信道的可扩展性。
例如,第一终端设备标识为20bit,其中,4bit携带在调度消息中,剩余的16bit对CRC进行加掩,终端设备接收到调度消息后,采用存储的第一终端设备标识的16bit对调度消息进行CRC校验,当CRC校验成功,且进行CRC校验的16bit与调度消息中携带的4比特组合成的第一终端设备标识与终端设备存储的第一终端设备标识相同时,终端设备可以确定出监听到的调度消息是调度本身的,这样,调度消息携带4bit的第一终端设备标识与调度消息携带20bit的第一终端设备标识可以达到同样的效果,若调度消息总共可承载的比特位为80bit,如果调度消息中携带20bit的第一终端设备标识的话,调度消息中有60bit可以承载其他信息,如果调度消息中携带4bit的第一终端设备标识的话,调度消息中有76bit可以承载其他信息,因此,本发明实施例提高了发送调度消息时采用的控制信道资源的利用率、及控制信道的可扩展性。
需要说明的是,第二CRC采用第一终端设备标识的哪些位置的比特位进行加掩是终端设备和基站协商好的,例如,基站和终端设备协商出调度消息中携带的第二CRC是采用第一终端设备标识的低16比特进行加掩,此时,终端设备和基站均知道第二CRC是采用第一终端设备标识的低16比特进行加掩;又例如,基站和终端设备协商出调度消息中携带的第二CRC是采用第一终端设备标识的高16比特进行加掩,此时,终端设备和基站均知道第二CRC是采用第一终端设备标识的高16比特进行加掩。
参阅图5A所示,本发明实施例中,提出一种基站,该基站包括处理模块50、发送模块51,其中:
处理模块50,用于确定终端设备的终端设备标识,终端设备标识的比特位长度为N;
发送模块51,用于广播调度消息,调度消息中携带终端设备标识的M个比特位和循环冗余校验码CRC,CRC采用N-M个比特位加掩,M为大于或者等于0,且小于N的整数,CRC的比特位长度大于或者等于N-M。
本发明实施例中,可选的,终端设备标识为小区无线网络临时识别C-RNTI、临时逻辑链路标识TLLI、RA-RNTI中的至少一种。
本发明实施例中,可选的,M个比特位为终端设备标识中的高M个比特位,或者,为终端设备标识中的低M个比特位。
本发明实施例中,进一步的,还包括接收模块52,用于接收终端设备发送的接入请求;
处理模块50还用于,根据接入请求生成用于标识终端设备的C-RNTI;
发送模块51还用于,将C-RNTI发送至终端设备。
参阅图5B所示,本发明实施例中,提出一种基站的示意图,该基站包括处理器500、发送器510,其中:
处理器500,用于确定终端设备的终端设备标识,终端设备标识的比特位长度为N;
发送器510,用于广播调度消息,调度消息中携带终端设备标识的M个比特位和循环冗余校验码CRC,CRC采用N-M个比特位加掩,M为大于或者等于0,且小于N的整数,CRC的比特位长度大于或者等于N-M。
需要说明的是,处理器500还用于执行处理模块50所执行的其他操作,发送器510还用于执行发送模块51所执行的其他操作,还包括接收器520,用于执行接收模块52所执行的操作。
图5A和图5B提供的基站广播的调度消息中不需要携带终端设备标识的全部比特位,只需要携带终端设备标识的部分比特位,终端设备标识的剩余比特位对CRC进行加掩,这样,调度消息中可以承载更多内容,因此,图5A和图5B提供的基站提高了发送调度消息时采用的控制信道资源的利用率、及控制信道的可扩展性。
需要说明的是,图5A图5B所示的装置可以执行步骤100-步骤110,即
图1所示的方法。
参阅图6A所示,本发明实施例中,提出一种终端设备的示意图,该终端设备包括接收模块60、处理模块61和发送模块62,其中:
接收模块60,用于监听基站发送的调度消息,调度消息中携带终端设备标识的M个比特位和循环冗余校验码CRC,终端设备标识的比特位长度为N,CRC采用N-M个比特位加掩,M为大于或者等于0,且小于N的整数,CRC的比特位长度大于或者等于N-M;
处理模块61,用于采用存储的终端设备标识的N-M个比特位对调度消息进行CRC校验;
发送模块62,用于在处理模块61确定CRC校验成功,及调度消息中携带的M个比特位和进行CRC校验的N-M个比特位组合成的终端设备标识与存储的终端设备标识相同时,根据调度消息发送上行数据;或者
接收模块60还用于,在处理模块61确定CRC校验成功,及调度消息中携带的M个比特位和进行CRC校验的N-M个比特位组合成的终端设备标识与存储的终端设备标识相同时,接收下行数据。
本发明实施例中,可选的,终端设备标识为小区无线网络临时识别C-RNTI、临时逻辑链路标识TLLI、RA-RNTI中的至少一种。
本发明实施例中,可选的,M个比特位为终端设备标识中的高M个比特位,或者,为终端设备标识中的低M个比特位。
本发明实施例中,可选的,处理模块61采用存储的终端设备标识的N-M个比特位对调度消息进行CRC校验时,具体为:
对调度消息进行CRC计算,得到CRC;
采用存储的终端设备标识的N-M个比特位对计算得到的CRC值进行加掩;
判断加掩得到的CRC值与调度消息中携带的CRC值是否相同;
处理模块61确定CRC校验成功时,具体为:
确定加掩得到的CRC值与调度消息中携带的CRC值相同。
本发明实施例中,进一步的,发送模块62还用于,向基站发送接入请求;
接收模块60还用于,接收基站根据接入请求为终端设备分配的C-RNTI;
处理模块61还用于,将接收模块60接收到的C-RNTI进行存储。
参阅图6B所示,本发明实施例中,提出一种终端设备的示意图,该终端设备包括接收器600、处理器610和发送器620,其中:
接收器600,用于监听基站发送的调度消息,调度消息中携带终端设备标识的M个比特位和循环冗余校验码CRC,终端设备标识的比特位长度为N,CRC采用N-M个比特位加掩,M为大于或者等于0,且小于N的整数,CRC的比特位长度大于或者等于N-M;
处理器610,用于采用存储的终端设备标识的N-M个比特位对调度消息进行CRC校验;
发送器620,用于在处理器610确定CRC校验成功,及调度消息中携带的M个比特位和进行CRC校验的N-M个比特位组合成的终端设备标识与存储的终端设备标识相同时,根据调度消息发送上行数据;或者
接收器600还用于,在处理器610确定CRC校验成功,及调度消息中携带的M个比特位和进行CRC校验的N-M个比特位组合成的终端设备标识与存储的终端设备标识相同时,接收下行数据。
需要说明的是,接收器600还用于执行接收模块60所执行的其他操作,处理器610还用于执行处理模块61所执行的其他操作,发送器620还用于执行发送模块62所执行的操作。
在图6A和图6B所提供的终端设备监听到的调度消息中携带的是终端设备标识的部分比特位,终端设备采用终端设备标识的剩余比特位对调度消息进行CRC校验,确定CRC校验成功,及调度消息中携带的M个比特位和进行CRC校验的N-M个比特位组合成的终端设备标识与存储的终端设备标识相同时,就可以确定出该调度消息是调度终端设备的,也就是说,在该实施例中,即使调度消息中携带的是部分终端设备标识,剩余终端设备标识对CRC进行校验,但是,图6A和图6B所提供的终端设备也可以确定出监听到的调
度消息是否是调度本终端设备的,与调度消息携带终端设备标识的全部比特位可以达到同样的效果,因此,提高了发送调度消息时采用的控制信道资源的利用率、及控制信道的可扩展性。
需要说明的是,图6A图6B所示的装置可以执行步骤200-步骤220,即图2所示的方法。
参阅图7A所示,本发明实施例中,提出一种基站,该基站包括接收模块70、处理模块71和发送模块72,其中:
接收模块70,用于接收终端设备发送的接入请求;
处理模块71,用于根据接入请求为终端设备分配第一终端设备标识,第一终端设备标识用于在基站的覆盖范围内唯一标识终端;
发送模块72,用于向终端设备发送标识分配消息,标识分配消息中携带第一终端设备标识、第一循环冗余校验码CRC和根据预设规则生成的第二终端设备标识的M个比特位,第二终端设备标识的比特位长度为N,第一CRC采用N-M个比特位加掩,M为大于或者等于0,且小于N的整数,第一CRC的比特位长度大于或者等于N-M。
本发明实施例中,可选的,第一终端设备标识为小区无线网络临时识别C-RNTI和/或临时逻辑链路标识TLLI;
第二终端设备标识为RA-RNTI。
本发明实施例中,进一步的,发送模块72还用于,广播调度消息,调度消息中携带第一终端设备标识的K个比特位和第二CRC,第一终端设备标识的比特位长度为L,第二CRC采用L-K个比特位加掩,K为大于或者等于0,且小于L的整数,第二CRC的比特位长度大于或者等于L-K。
参阅图7B所示,本发明实施例中,提出一种基站的示意图,该基站包括接收器700、处理器710、发送器720,其中:
接收器700,用于接收终端设备发送的接入请求;
处理器710,用于根据接入请求为终端设备分配第一终端设备标识,第一终端设备标识用于在基站的覆盖范围内唯一标识终端;
发送器720,用于向终端设备发送标识分配消息,标识分配消息中携带第一终端设备标识、第一循环冗余校验码CRC和根据预设规则生成的第二终端设备标识的M个比特位,第二终端设备标识的比特位长度为N,第一CRC采用N-M个比特位加掩,M为大于或者等于0,且小于N的整数,第一CRC的比特位长度大于或者等于N-M。。
需要说明的是,接收器700还用于执行接收模块70所执行的其他操作,处理器710还用于执行处理模块71所执行的其他操作,发送器720还用于执行发送模块72所执行的其他操作。
图7A和图7B所提供的基站发送的标识分配消息中不需要携带第二终端设备标识的全部比特位,只需要携带第二终端设备标识的部分比特位,第二终端设备标识的剩余比特位对CRC进行加掩,这样标识分配消息中可以承载更多内容,因此,图7A和图7B所提供的基站提高了资源的利用率、及相关信道的可扩展性。
需要说明的是,图7A图7B所示的装置可以执行步骤300-步骤320,即图3所示的方法。
参阅图8A所示,本发明实施例中,提出一种终端设备的示意图,该终端设备包括发送模块80、接收模块81和处理模块82,其中:
发送模块80,用于向基站发送接入请求;
接收模块81,用于接收基站根据接入请求发送的标识分配消息,标识分配消息中携带第一终端设备标识、第一循环冗余校验码CRC和根据预设规则生成的第二终端设备标识的M个比特位,第一终端设备标识用于在基站的覆盖范围内唯一标识终端设备,第二终端设备标识的比特位长度为N,第一CRC采用N-M个比特位加掩,M为大于或者等于0,且小于N的整数,第一CRC的比特位长度大于或者等于N-M;
处理模块82,用于采用存储的第二终端设备标识的N-M个比特位对标识分配消息进行CRC校验;
处理模块82还用于,确定CRC校验成功,及标识分配消息中携带的M
个比特位和进行CRC校验的N-M个比特位组合成的终端设备标识与存储的第二终端设备标识时,将第一终端设备标识作为终端设备的标识。
本发明实施例中,可选的,第一终端设备标识为小区无线网络临时识别C-RNTI和/或临时逻辑链路标识TLLI;
第二终端设备标识为RA-RNTI。
本发明实施例中,进一步的,接收模块81还用于,接收基站广播的调度消息,调度消息中携带第一终端设备标识的K个比特位和第二CRC,第二CRC采用L-K个比特位加掩,K为大于或者等于0,且小于L的整数,第二CRC的比特位长度大于或者等于L-K,L为第一终端设备标识的比特位长度;
处理模块82还用于,采用存储的终端设备标识的N-M个比特位对调度消息进行CRC校验;
发送模块80还用于,在处理模块82确定CRC校验成功,及调度消息中携带的M个比特位和进行CRC校验的N-M个比特位组合成的终端设备标识与存储的第一终端设备标识时,根据调度消息发送上行数据;或者
接收模块81还用于,在处理模块82确定CRC校验成功,及调度消息中携带的M个比特位和进行CRC校验的N-M个比特位组合成的终端设备标识与存储的第一终端设备标识时,接收下行数据。
需要说明的是,发送器800还用于执行发送模块80所执行的其他操作,接收器810还用于执行接收模块81所执行的操作,处理器820还用于执行处理模块82所执行的其他操作。
图8A和图8B所提供的终端设备接收到的标识分配消息中携带的是第二终端设备标识的部分比特位,终端设备采用第二终端设备标识的剩余比特位对调度消息进行第一CRC校验,确定第一CRC校验成功,及标识分配消息中携带的M个比特位和进行CRC校验的N-M个比特位组合成的第二终端设备标识与存储的第二终端设备标识相同时,就可以确定出该标识分配消息是给该终端设备分配终端设备标识的,也就是说,在该实施例中,即使标识分配消息中携带的是部分第二终端设备标识,剩余第二终端设备标识对第一
CRC进行校验,但是,图8A和图8B所提供的终端设备也可以确定出接收到的标识分配消息是否是给本终端设备分配终端设备标识的,与标识分配消息携带第二终端设备标识的全部比特位可以达到同样的效果,因此,图8A和图8B所提供的终端设备提高了资源的利用率、及相关信道的可扩展性。
需要说明的是,图8A图8B所示的装置可以执行步骤400-步骤430,即图4所示的方法。
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步
骤。
尽管已描述了本发明的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例做出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本发明范围的所有变更和修改。
显然,本领域的技术人员可以对本发明实施例进行各种改动和变型而不脱离本发明实施例的精神和范围。这样,倘若本发明实施例的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。
Claims (30)
- 一种通信方法,其特征在于,包括:基站确定终端设备的终端设备标识,所述终端设备标识的比特位长度为N;所述基站广播调度消息,所述调度消息中携带所述终端设备标识的M个比特位和循环冗余校验码CRC,所述CRC采用N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述CRC的比特位长度大于或者等于所述N-M。
- 如权利要求1所述的方法,其特征在于,所述终端设备标识为小区无线网络临时识别C-RNTI、临时逻辑链路标识TLLI、RA-RNTI中的至少一种。
- 如权利要求1或2所述的方法,其特征在于,所述M个比特位为所述终端设备标识中的高M个比特位,或者,为所述终端设备标识中的低M个比特位。
- 如权利要求1-3任一项所述的方法,其特征在于,所述基站发送调度消息之前,还包括:所述基站接收所述终端设备发送的接入请求,并根据所述接入请求生成用于标识所述终端设备的C-RNTI;所述基站将所述C-RNTI发送至所述终端设备。
- 一种通信方法,其特征在于,包括:终端设备监听基站发送的调度消息,所述调度消息中携带所述终端设备标识的M个比特位和循环冗余校验码CRC,所述终端设备标识的比特位长度为N,所述CRC采用N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述CRC的比特位长度大于或者等于所述N-M;所述终端设备采用存储的所述终端设备标识的所述N-M个比特位对所述调度消息进行CRC校验;所述终端设备确定CRC校验成功,及所述调度消息中携带的所述M个比 特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的终端设备标识相同时,根据所述调度消息发送上行数据,或者接收下行数据。
- 如权利要求5所述的方法,其特征在于,所述终端设备标识为小区无线网络临时识别C-RNTI、临时逻辑链路标识TLLI、RA-RNTI中的至少一种。
- 如权利要求5或6所述的方法,其特征在于,所述M个比特位为所述终端设备标识中的高M个比特位,或者,为所述终端设备标识中的低M个比特位。
- 如权利要求5-7任一项所述的方法,其特征在于,所述终端设备采用存储的所述终端设备标识的所述N-M个比特位对所述调度消息进行CRC校验,包括:所述终端设备对所述调度消息进行CRC计算,得到CRC;所述终端设备采用存储的所述终端设备标识的所述N-M个比特位对计算得到的CRC值进行加掩;所述终端设备判断加掩得到的CRC值与所述调度消息中携带的CRC值是否相同;所述终端设备确定CRC校验成功,包括:所述终端设备确定加掩得到的CRC值与所述调度消息中携带的CRC值相同。
- 如权利要求5-8任一项所述的方法,其特征在于,所述终端设备采用存储的所述终端设备标识的所述N-M个比特位对所述调度消息进行CRC校验之前,还包括:所述终端设备向所述基站发送接入请求;所述终端设备接收所述基站根据所述接入请求为所述终端设备分配的C-RNTI,并进行存储。
- 一种分配终端设备标识的方法,其特征在于,包括:基站接收终端设备发送的接入请求;所述基站根据所述接入请求为所述终端设备分配第一终端设备标识,所 述第一终端设备标识用于在所述基站的覆盖范围内唯一标识所述终端;所述基站向所述终端设备发送标识分配消息,所述标识分配消息中携带所述第一终端设备标识、第一循环冗余校验码CRC和根据预设规则生成的第二终端设备标识的M个比特位,所述第二终端设备标识的比特位长度为N,所述第一CRC采用所述N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述第一CRC的比特位长度大于或者等于所述N-M。
- 如权利要求10所述的方法,其特征在于,所述第一终端设备标识为小区无线网络临时识别C-RNTI和/或临时逻辑链路标识TLLI;所述第二终端设备标识为RA-RNTI。
- 如权利要求10或11所述的方法,其特征在于,所述基站向所述终端设备发送标识分配消息之后,还包括:所述基站广播调度消息,所述调度消息中携带所述第一终端设备标识的K个比特位和第二CRC,所述第一终端设备标识的比特位长度为L,所述第二CRC采用所述L-K个比特位加掩,所述K为大于或者等于0,且小于L的整数,所述第二CRC的比特位长度大于或者等于所述L-K。
- 一种分配终端设备标识的方法,其特征在于,包括:终端设备向基站发送接入请求;所述终端设备接收所述基站根据所述接入请求发送的标识分配消息,所述标识分配消息中携带所述第一终端设备标识、第一循环冗余校验码CRC和根据预设规则生成的第二终端设备标识的M个比特位,所述第一终端设备标识用于在所述基站的覆盖范围内唯一标识所述终端设备,所述第二终端设备标识的比特位长度为N,所述第一CRC采用所述N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述第一CRC的比特位长度大于或者等于所述N-M;所述终端设备采用存储的所述第二终端设备标识的所述N-M个比特位对所述标识分配消息进行CRC校验;所述终端设备确定CRC校验成功,及所述标识分配消息中携带的所述M 个比特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的第二终端设备标识时,将所述第一终端设备标识作为所述终端设备的标识。
- 如权利要求13所述的方法,其特征在于,所述第一终端设备标识为小区无线网络临时识别C-RNTI和/或临时逻辑链路标识TLLI;所述第二终端设备标识为RA-RNTI。
- 如权利要求13或14所述的方法,其特征在于,所述终端设备接收所述基站根据所述接入请求发送的标识分配消息之后,还包括:所述终端设备接收所述基站广播的调度消息,所述调度消息中携带所述第一终端设备标识的K个比特位和第二CRC,所述第二CRC采用所述L-K个比特位加掩,所述K为大于或者等于0,且小于L的整数,所述第二CRC的比特位长度大于或者等于所述L-K,所述L为所述第一终端设备标识的比特位长度;所述终端设备采用存储的所述终端设备标识的所述N-M个比特位对所述调度消息进行CRC校验;所述终端设备确定CRC校验成功,及所述调度消息中携带的所述M个比特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的第一终端设备标识时,根据所述调度消息发送上行数据,或者接收下行数据。
- 一种基站,其特征在于,包括:处理模块,用于确定终端设备的终端设备标识,所述终端设备标识的比特位长度为N;发送模块,用于广播调度消息,所述调度消息中携带所述终端设备标识的M个比特位和循环冗余校验码CRC,所述CRC采用N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述CRC的比特位长度大于或者等于所述N-M。
- 如权利要求16所述的基站,其特征在于,所述终端设备标识为小区无线网络临时识别C-RNTI、临时逻辑链路标识TLLI、RA-RNTI中的至少一 种。
- 如权利要求16或17所述的基站,其特征在于,所述M个比特位为所述终端设备标识中的高M个比特位,或者,为所述终端设备标识中的低M个比特位。
- 如权利要求16-18任一项所述的基站,其特征在于,还包括接收模块,用于接收所述终端设备发送的接入请求;所述处理模块还用于,根据所述接入请求生成用于标识所述终端设备的C-RNTI;所述发送模块还用于,将所述C-RNTI发送至所述终端设备。
- 一种终端设备,其特征在于,包括:接收模块,用于监听基站发送的调度消息,所述调度消息中携带所述终端设备标识的M个比特位和循环冗余校验码CRC,所述终端设备标识的比特位长度为N,所述CRC采用N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述CRC的比特位长度大于或者等于所述N-M;处理模块,用于采用存储的所述终端设备标识的所述N-M个比特位对所述调度消息进行CRC校验;发送模块,用于在所述处理模块确定CRC校验成功,及所述调度消息中携带的所述M个比特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的终端设备标识相同时,根据所述调度消息发送上行数据;或者所述接收模块还用于,在所述处理模块确定CRC校验成功,及所述调度消息中携带的所述M个比特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的终端设备标识相同时,接收下行数据。
- 如权利要求20所述的终端设备,其特征在于,所述终端设备标识为小区无线网络临时识别C-RNTI、临时逻辑链路标识TLLI、RA-RNTI中的至少一种。
- 如权利要求20或21所述的终端设备,其特征在于,所述M个比特 位为所述终端设备标识中的高M个比特位,或者,为所述终端设备标识中的低M个比特位。
- 如权利要求20-22任一项所述的终端设备,其特征在于,所述处理模块采用存储的所述终端设备标识的所述N-M个比特位对所述调度消息进行CRC校验时,具体为:对所述调度消息进行CRC计算,得到CRC;采用存储的所述终端设备标识的所述N-M个比特位对计算得到的CRC值进行加掩;判断加掩得到的CRC值与所述调度消息中携带的CRC值是否相同;所述处理模块确定CRC校验成功时,具体为:确定加掩得到的CRC值与所述调度消息中携带的CRC值相同。
- 如权利要求20-23任一项所述的终端设备,其特征在于,所述发送模块还用于,向所述基站发送接入请求;所述接收模块还用于,接收所述基站根据所述接入请求为所述终端设备分配的C-RNTI;所述处理模块还用于,将所述接收模块接收到的C-RNTI进行存储。
- 一种基站,其特征在于,包括:接收模块,用于接收终端设备发送的接入请求;处理模块,用于根据所述接入请求为所述终端设备分配第一终端设备标识,所述第一终端设备标识用于在所述基站的覆盖范围内唯一标识所述终端;发送模块,用于向所述终端设备发送标识分配消息,所述标识分配消息中携带所述第一终端设备标识、第一循环冗余校验码CRC和根据预设规则生成的第二终端设备标识的M个比特位,所述第二终端设备标识的比特位长度为N,所述第一CRC采用所述N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述第一CRC的比特位长度大于或者等于所述N-M。
- 如权利要求25所述的基站,其特征在于,所述第一终端设备标识为小区无线网络临时识别C-RNTI和/或临时逻辑链路标识TLLI;所述第二终端设备标识为RA-RNTI。
- 如权利要求25或26所述的基站,其特征在于,所述发送模块还用于,广播调度消息,所述调度消息中携带所述第一终端设备标识的K个比特位和第二CRC,所述第一终端设备标识的比特位长度为L,所述第二CRC采用所述L-K个比特位加掩,所述K为大于或者等于0,且小于L的整数,所述第二CRC的比特位长度大于或者等于所述L-K。
- 一种终端设备,其特征在于,包括:发送模块,用于向基站发送接入请求;接收模块,用于接收所述基站根据所述接入请求发送的标识分配消息,所述标识分配消息中携带所述第一终端设备标识、第一循环冗余校验码CRC和根据预设规则生成的第二终端设备标识的M个比特位,所述第一终端设备标识用于在所述基站的覆盖范围内唯一标识所述终端设备,所述第二终端设备标识的比特位长度为N,所述第一CRC采用所述N-M个比特位加掩,所述M为大于或者等于0,且小于N的整数,所述第一CRC的比特位长度大于或者等于所述N-M;处理模块,用于采用存储的所述第二终端设备标识的所述N-M个比特位对所述标识分配消息进行CRC校验;所述处理模块还用于,确定CRC校验成功,及所述标识分配消息中携带的所述M个比特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的第二终端设备标识时,将所述第一终端设备标识作为所述终端设备的标识。
- 如权利要求28所述的终端设备,其特征在于,所述第一终端设备标识为小区无线网络临时识别C-RNTI和/或临时逻辑链路标识TLLI;所述第二终端设备标识为RA-RNTI。
- 如权利要求28或29所述的终端设备,其特征在于,所述接收模块还用于,接收所述基站广播的调度消息,所述调度消息中携带所述第一终端设备标识的K个比特位和第二CRC,所述第二CRC采用所述L-K个比特位 加掩,所述K为大于或者等于0,且小于L的整数,所述第二CRC的比特位长度大于或者等于所述L-K,所述L为所述第一终端设备标识的比特位长度;所述处理模块还用于,采用存储的所述终端设备标识的所述N-M个比特位对所述调度消息进行CRC校验;所述发送模块还用于,在所述处理模块确定CRC校验成功,及所述调度消息中携带的所述M个比特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的第一终端设备标识时,根据所述调度消息发送上行数据;或者所述接收模块还用于,在所述处理模块确定CRC校验成功,及所述调度消息中携带的所述M个比特位和进行CRC校验的所述N-M个比特位组合成的终端设备标识与存储的第一终端设备标识时,接收下行数据。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201580071359.0A CN107113850A (zh) | 2015-10-29 | 2015-10-29 | 一种通信方法及装置 |
PCT/CN2015/093234 WO2017070897A1 (zh) | 2015-10-29 | 2015-10-29 | 一种通信方法及装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2015/093234 WO2017070897A1 (zh) | 2015-10-29 | 2015-10-29 | 一种通信方法及装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017070897A1 true WO2017070897A1 (zh) | 2017-05-04 |
Family
ID=58629719
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/093234 WO2017070897A1 (zh) | 2015-10-29 | 2015-10-29 | 一种通信方法及装置 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107113850A (zh) |
WO (1) | WO2017070897A1 (zh) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102958137A (zh) * | 2011-08-25 | 2013-03-06 | Lg电子株式会社 | 用于在空闲模式下操作的方法和装置 |
US20130295945A1 (en) * | 2012-05-04 | 2013-11-07 | Samsung Electronics Co., Ltd | System and methods for addressing mobile station in wireless communication system |
CN104349290A (zh) * | 2013-08-09 | 2015-02-11 | 上海贝尔股份有限公司 | 在机器类型通信中发送和接收寻呼消息的方法和设备 |
-
2015
- 2015-10-29 WO PCT/CN2015/093234 patent/WO2017070897A1/zh active Application Filing
- 2015-10-29 CN CN201580071359.0A patent/CN107113850A/zh active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102958137A (zh) * | 2011-08-25 | 2013-03-06 | Lg电子株式会社 | 用于在空闲模式下操作的方法和装置 |
US20130295945A1 (en) * | 2012-05-04 | 2013-11-07 | Samsung Electronics Co., Ltd | System and methods for addressing mobile station in wireless communication system |
CN104349290A (zh) * | 2013-08-09 | 2015-02-11 | 上海贝尔股份有限公司 | 在机器类型通信中发送和接收寻呼消息的方法和设备 |
Also Published As
Publication number | Publication date |
---|---|
CN107113850A (zh) | 2017-08-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3525494B1 (en) | Multicast transmission method and apparatus, and computer storage medium | |
TWI699132B (zh) | 用於行動通訊系統之基地台及使用者裝置 | |
WO2016146073A1 (zh) | 一种支持多用户叠加的ue、基站中的方法和设备 | |
EP3251233B1 (en) | Handling of proximity services device to device related identities at radio access network level | |
JP4987118B2 (ja) | 無線通信方法、基地局装置および無線通信システム | |
CN104066194B (zh) | 数据传输调度和数据传输方法及设备 | |
EP2986039B1 (en) | Downlink information sending and receiving methods, base station, and user equipment | |
WO2015154392A1 (zh) | D2d业务的切换实现方法及装置 | |
WO2016155113A1 (zh) | 一种群组通信的方法、用户设备、基站设备及系统 | |
WO2015043465A2 (zh) | 一种资源分配的方法、装置及系统 | |
WO2014005446A1 (zh) | 数据传输方法及窄带终端、基站 | |
KR20130053650A (ko) | 디바이스간 직접 통신 서비스 시스템에서 데이터 송신 방법 및 장치 | |
US20210289477A1 (en) | Replicated Grant-free Transmissions Utilizing Multiple Configurations | |
JP6343025B2 (ja) | データ送信方法および通信装置 | |
US10785781B2 (en) | Data transmission method, terminal and data transmission system | |
EP4035493A2 (en) | Low power communication on sidelink | |
Mughal et al. | Performance analysis of V2V communications: A novel scheduling assignment and data transmission scheme | |
WO2018149384A1 (zh) | 一种信息传输方法,无线接入设备和终端 | |
WO2017185980A1 (zh) | 数据传输方法及装置 | |
TWI791072B (zh) | 終端與基站的通訊方法和裝置及機器可讀媒體 | |
WO2017070897A1 (zh) | 一种通信方法及装置 | |
US10925011B2 (en) | Method for communication between user equipments, user equipment, and base station | |
CN105191460B (zh) | 一种信息传输方法、设备及系统 | |
WO2023060435A1 (zh) | 数据传输方法、装置、设备和存储介质 | |
WO2023212068A1 (en) | Resource allocation for feedback channels in sidelink communications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15906961 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15906961 Country of ref document: EP Kind code of ref document: A1 |