WO2018133001A1 - Procédé de transmission d'informations de commande de liaison descendante, dispositif sur le côté réseau, et dispositif terminal - Google Patents

Procédé de transmission d'informations de commande de liaison descendante, dispositif sur le côté réseau, et dispositif terminal Download PDF

Info

Publication number
WO2018133001A1
WO2018133001A1 PCT/CN2017/071692 CN2017071692W WO2018133001A1 WO 2018133001 A1 WO2018133001 A1 WO 2018133001A1 CN 2017071692 W CN2017071692 W CN 2017071692W WO 2018133001 A1 WO2018133001 A1 WO 2018133001A1
Authority
WO
WIPO (PCT)
Prior art keywords
dci
information
terminal device
verification
masking
Prior art date
Application number
PCT/CN2017/071692
Other languages
English (en)
Chinese (zh)
Inventor
铁晓磊
花梦
焦淑蓉
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201780083690.3A priority Critical patent/CN110192362B/zh
Priority to PCT/CN2017/071692 priority patent/WO2018133001A1/fr
Publication of WO2018133001A1 publication Critical patent/WO2018133001A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management

Definitions

  • the present application relates to the field of communications, and more particularly, to a method, a network side device, and a terminal device for transmitting downlink control information.
  • a terminal device performs uplink data transmission and downlink data reception based on scheduling of an LTE base station, that is, a terminal device generally receives a base station before transmitting data or receiving data.
  • the downlink control information (Downlink Control Information, DCI, and then the corresponding data transmission or reception operation according to the DCI, completes a scheduling.
  • the DCI may be divided into two levels, for example, a first level DCI and a second level DCI, wherein the first DCI belongs to a first level DCI, and the second DCI belongs to a second level DCI;
  • Each DCI corresponds to a plurality of DCIs in the second level DCI; each DCI of the plurality of DCIs in the second level DCI is combined with a corresponding DCI in the first level DCI, Scheduling the terminal device.
  • the terminal device When the terminal device detects the DCI belonging to the second-level DCI, it uses the previously received DCI belonging to the first-level DCI to transmit data. However, if the previously received DCI belonging to the first-level DCI is not current The received DCI of the DCI belonging to the second-level DCI can be correctly combined, which will cause the DCI to be erroneously combined, resulting in a data transmission error.
  • the embodiment of the present application provides a method for transmitting downlink control information, a network side device, and a terminal device, which can avoid errors in data transmission.
  • a first aspect provides a method for transmitting downlink control information, including: determining first check information according to at least part of information in a first DCI; and transmitting the first DCI and the first check to a terminal device Determining, according to at least part of the information in the first DCI and at least part of the information of the second DCI, the first DCI and the second DCI are used to schedule the terminal device; Transmitting the second DCI and the second verification information to the terminal device.
  • the network side device determines, according to at least part of the information in the first DCI and at least part of the information in the second DCI, the second verification information, and sends the second DCI and the second to the terminal device.
  • the verification information is such that after receiving the second DCI and the second verification information, the terminal device needs to perform the verification by jointly receiving the first DCI to verify success, if the terminal device does not receive or receive correctly.
  • a check error may occur to avoid data transmission error caused by the second DCI joint error DCI data transmission. .
  • the determining, according to at least part of the information in the first DCI and at least part of the information in the second DCI, the second verification information including: according to at least part of the information in the first DCI And determining, by the at least part of the information in the second DCI, a first Cyclic Redundancy Check (CRC), performing a masking operation on the first CRC to obtain the second check information.
  • CRC Cyclic Redundancy Check
  • the determining, according to at least part of the information in the first DCI and at least part of the second DCI, the first CRC including: performing the first according to a preset rule. At least in DCI The partial information and at least part of the information in the second DCI are aligned to obtain first information; and the first CRC is determined according to the first information.
  • the determining, according to at least part of the information in the first DCI and at least part of the information in the second DCI, the second verification information including: according to at least part of the information in the second DCI Determining a second CRC; obtaining a masking mask according to at least part of the information in the first DCI; performing a masking operation on the second CRC according to the masking mask to obtain the second school Test information.
  • the obtaining a masking mask according to at least part of the information in the first DCI comprising: generating a first masking sequence according to at least part of the information in the first DCI; Generating a second masking sequence according to the identifier information of the terminal device; performing a bitwise exclusive OR operation on the first masking sequence and the second masking sequence to obtain the masking mask.
  • the first DCI belongs to a first level DCI
  • the second DCI belongs to a second level DCI; each DCI in the first level DCI corresponds to the second level DCI
  • Each of the plurality of DCIs in the second-level DCI is associated with a corresponding DCI in the first-level DCI for scheduling the terminal device once.
  • the determining, according to the at least part of the information in the first DCI, the first verification information including: determining, according to at least part of the information in the first DCI, a CRC of the first DCI; The CRC of the first DCI is subjected to a masking operation to obtain the first verification information;
  • the sending the first DCI and the first verification information to the terminal device including: arranging the first DCI before the first verification information, obtaining the first to-be-sent information;
  • the channel sends the first to-be-sent information to the terminal device.
  • the second DCI and the second verification information to the terminal device include: arranging the second DCI before the second verification information, obtaining The second to-be-sent information is sent to the terminal device by using a preset physical channel.
  • the sending time of the first DCI is earlier than the sending time of the second DCI.
  • a second aspect provides a method for transmitting downlink control information, including: determining a masking sequence of a first version; and performing a masking operation on a CRC of the first DCI by using the masking sequence of the first version to obtain a first check information, sending the first DCI and the first check information to the terminal device, and performing a mask operation on the CRC of the second DCI by using the masking sequence of the first version to obtain a second Verifying information, wherein the first DCI is used in conjunction with the second DCI to schedule a terminal device; and the second DCI and the second verification information are sent to the terminal device.
  • the network side device performs a masking operation on the CRC of the first DCI and the CRC of the second DCI by using the same version of the masking sequence, and the terminal device receives the second DCI and the After the second check information is described, it is necessary to perform verification according to the masking sequence with the same version of the CRC of the first DCI to verify success, if the terminal device does not receive correctly or does not receive the first DCI.
  • the second DCI, and the second parity information for verification a verification error occurs, and data transmission due to the second DCI joint error DCI data transmission can be avoided. error.
  • the first DCI belongs to a first level DCI
  • the second DCI belongs to a second level DCI; each DCI in the first level DCI corresponds to the second level DCI
  • Each of the plurality of DCIs in the second-level DCI is associated with a corresponding DCI in the first-level DCI for scheduling the terminal device once.
  • the determining, by the masking of the first version, the first version is determined from a plurality of versions preset by the masking sequence, wherein the masking sequence of the first version is The version of the masking sequence for performing the masking operation on the CRC of the at least one DCI transmitted before the first DCI is different, and the DCI of the first DCI and the at least one DCI belong to the first level DCI.
  • the sending time of the first DCI is earlier than the sending time of the second DCI.
  • the method further includes: generating a first masking sequence according to the identifier information of the terminal device;
  • the masking operation of the CRC of the first DCI by using the masking sequence of the first version to obtain the first verification information includes: a masking sequence for the first version and the first Performing a bitwise XOR operation on a masking sequence to obtain a masking mask; and performing a masking operation on the CRC of the first DCI according to the masking mask;
  • the sending, by the first DCI, the first verification information to the terminal device includes: arranging the first DCI before the first verification information, Obtaining the first to-be-sent information; sending the first to-be-sent information to the terminal device by using a preset physical channel;
  • And transmitting the second DCI and the second check information to the terminal device including: arranging the second DCI before the second check information, and obtaining the second to-be-sent information Sending the second to-be-sent information to the terminal device by using a preset physical channel.
  • a third aspect provides a method for transmitting downlink control information, including: receiving, by a terminal device, a first DCI and first verification information sent by a network side device; and the terminal device according to at least part of information in the first DCI Performing verification with the first verification information; the terminal device receiving the second DCI and the second verification information sent by the network side device; and the terminal device according to at least part of the information and the location in the first DCI
  • the terminal device performs verification according to at least part of the information in the first DCI, at least part of the information in the second DCI, and the second verification information.
  • the terminal device When the terminal device performs verification according to at least part of the first DCI, at least part of the second DCI, and the second verification information, and the verification is successful, the terminal device is configured according to the The scheduling information of the first DCI and the second DCI joint indication is performed, and the network side device performs data transmission.
  • the terminal device performs verification according to at least part of the first DCI, at least part of the second DCI, and the second verification information, including: Determining, by the terminal device, the first CRC according to at least part of the information in the first DCI and at least part of the second DCI; the terminal device performs a masking operation on the first CRC to obtain a third Verifying the information; the terminal device determines whether the third verification information is the same as the second verification information; wherein, when the third verification information is the same as the second verification information, determining a school The verification succeeds; when the third verification information is different from the second verification information, it is determined that the verification fails.
  • the terminal device performs verification according to at least part of the first DCI, at least part of the second DCI, and the second verification information, including: Determining, by the terminal device, the second CRC according to at least part of the information in the second DCI; the terminal device obtaining a masking mask according to at least part of the information in the first DCI; Masking a mask, performing a mask operation on the second CRC to obtain fourth check information; and determining, by the terminal device, the fourth check information and the second check signal Whether the information is the same; wherein, when the fourth verification information is the same as the second verification information, determining that the verification is successful; when the fourth verification information is different from the second verification information, Determine that the verification failed.
  • the terminal device performs verification according to at least part of the information in the first DCI and the first verification information, where the terminal device is configured according to the first DCI. At least part of the information, determining a CRC of the first DCI; the terminal device performs a masking operation on the CRC of the first DCI to obtain fourth verification information; and the terminal device determines the fourth verification information and the location Whether the first verification information is the same; wherein, when the fourth verification information is the same as the first verification information, the verification is successful; and the fourth verification information and the first verification information When it is not the same, the verification fails.
  • the first DCI belongs to a first level DCI
  • the second DCI belongs to a second level DCI; each DCI in the first level DCI corresponds to the second level DCI
  • Each of the plurality of DCIs in the second-level DCI is associated with a corresponding DCI in the first-level DCI for scheduling the terminal device once.
  • the first DCI is a newly received first-level DCI when the second DCI is received.
  • a fourth aspect provides a method for transmitting downlink control information, including: receiving, by a terminal device, a first DCI and first verification information sent by a network side device; and the terminal device according to the first DCI and the first The verification information is verified; the terminal device receives the second DCI and the second verification information sent by the network side device; the terminal device determines a masking sequence of the first version, where the first version is The masking sequence is a masking sequence used when the first DCI and the first verification information are verified and the verification is successful; the terminal device is configured according to the second DCI and the second verification information.
  • the terminal device performs data transmission with the network side device according to the scheduling information of the first DCI and the second DCI joint indication.
  • the first DCI belongs to a first level DCI
  • the second DCI belongs to a second level DCI; each DCI in the first level DCI corresponds to the second level DCI
  • Each of the plurality of DCIs in the second-level DCI is associated with a corresponding DCI in the first-level DCI for scheduling the terminal device once.
  • the first DCI is a newly received first-level DCI when the second DCI is received.
  • the embodiment of the present application provides a network side device, where the method in any one of the foregoing possible implementation manners of the first aspect or the first aspect is performed.
  • the network side device includes a module unit for performing the method in any of the above possible implementation manners of the first aspect or the first aspect.
  • the embodiment of the present application provides a network side device, where the method in any one of the foregoing possible implementation manners of the second aspect or the second aspect is performed.
  • the network side device includes a module unit for performing the method in any of the foregoing possible implementation manners of the second aspect or the second aspect.
  • the embodiment of the present application provides a terminal device, which is used to perform the method in any one of the foregoing possible implementation manners of the third aspect or the third aspect.
  • the terminal device includes a module unit for performing the method in any one of the possible implementation manners of the third aspect or the third aspect described above.
  • the embodiment of the present application provides a terminal device, where the method in any one of the foregoing possible implementation manners of the fourth aspect or the fourth aspect is implemented.
  • the terminal device includes a fourth aspect for performing the above Or a modular unit of the method of any of the possible implementations of the fourth aspect.
  • the embodiment of the present application provides a network side device, where the network side device includes a processor, a memory, and the method in any one of the foregoing possible implementation manners.
  • a receiver and a transmitter, the processor, the memory, the receiver, and the transmitter are connected by a bus system, wherein the memory is for storing instructions, the receiver is for receiving information, the sending The device is configured to send information, and the processor is configured to execute the instructions stored by the memory.
  • the processor is configured to determine first verification information according to at least part of information in the first DCI;
  • the transmitter is configured to send the first DCI and the first verification information to a terminal device
  • the processor is further configured to determine, according to at least part of the information in the first DCI and at least part of information about the second DCI, where the first DCI is associated with the second DCI pair terminal device Scheduling;
  • the transmitter is further configured to send the second DCI and the second verification information to the terminal device.
  • the embodiment of the present application provides a network side device, where the network side device includes a processor, a memory, and the method in any one of the foregoing possible implementation manners.
  • a receiver and a transmitter the processor, the memory, the receiver, and the transmitter are connected by a bus system, wherein the memory is for storing instructions, the receiver is for receiving information, the sending The device is configured to send information, and the processor is configured to execute the instructions stored by the memory.
  • the processor is configured to determine a masking sequence of the first version
  • the processor is further configured to perform a masking operation on the cyclic redundancy check code CRC of the first DCI by using the masking sequence of the first version to obtain first verification information;
  • the transmitter is configured to send the first DCI and the first verification information to a terminal device
  • the processor is further configured to perform a masking operation on the CRC of the second DCI by using the masking sequence of the first version to obtain second verification information, where the first DCI is combined with the second DCI Used to schedule terminal devices;
  • the transmitter is further configured to send the second DCI and the second verification information to the terminal device.
  • the embodiment of the present application provides a terminal device, where the method in any one of the foregoing third aspect or the third aspect, the terminal device includes a processor, a memory, and a receiving And a transmitter, the processor, the memory, the receiver and the transmitter are connected by a bus system, wherein the memory is for storing instructions, the receiver is for receiving information, and the transmitter is In order to transmit information, the processor is configured to execute the instructions stored by the memory.
  • the receiver is configured to receive the first DCI and the first check information sent by the network side device.
  • the processor is configured to perform verification according to at least part of the information in the first DCI and the first verification information;
  • the receiver is further configured to receive the second DCI and the second check information sent by the network side device;
  • the processor is further configured to: according to at least part of the first DCI, when the verification module performs verification according to at least part of the first DCI and the first verification information, At least part of the information in the second DCI and the second verification information are verified;
  • the transmitter and the receiver are further configured to perform, at the check module, according to at least part of the first DCI, at least part of the second DCI, and the second check information. And verifying that the data is transmitted by the network side device according to the scheduling information of the first DCI and the second DCI joint indication.
  • the embodiment of the present application provides a terminal device, configured to perform the foregoing fourth aspect or fourth party
  • the terminal device comprising a processor, a memory, a receiver, and a transmitter, the processor, the memory, the receiver, and the transmitter passing through a bus system Connected, wherein the memory is for storing instructions, the receiver is for receiving information, the transmitter is for transmitting information, and the processor is for executing instructions stored by the memory.
  • the receiver is configured to receive the first DCI and the first check information sent by the network side device.
  • the processor is configured to perform verification according to the first DCI and the first verification information
  • the receiver is further configured to receive the second DCI and the second verification information that are sent by the network side device;
  • the processor is further configured to determine a masking sequence of the first version, where the masking sequence of the first version is verified according to the first DCI and the first verification information, and the verification succeeds The masking sequence used;
  • the processor is further configured to perform verification according to the second DCI, the second verification information, and the masking sequence of the first version
  • the transmitter and the receiver are further configured to: when the verification module successfully verifies according to the second DCI, the second verification information, and the masking sequence of the first version, according to the The first DCI and the second DCI jointly indicate scheduling information, and the network side device performs data transmission.
  • the embodiment of the present application provides a computer readable medium for storing a computer program, where the computer program includes any possible implementation manner for performing the above first aspect or the first aspect, A possible implementation of the second aspect or the second aspect, the third aspect or any possible implementation of the third aspect, and the method of any of the possible implementations of the fourth aspect or the fourth aspect Instructions.
  • FIG. 1 is a schematic structural diagram of a communication system according to an embodiment of the present application.
  • FIG. 2 is a schematic diagram of feedback delay in a communication system.
  • FIG. 3 is a schematic diagram of feedback delay in a communication system employing symbol level TTI.
  • FIG. 4 is a schematic diagram of information transmission in a communication system employing symbol level TTI.
  • FIG. 5 is a schematic flowchart of a method for transmitting downlink control information according to an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a method for transmitting downlink control information according to an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of a method for transmitting downlink control information according to an embodiment of the present application.
  • FIG. 8 is a schematic flowchart of a method for transmitting downlink control information according to an embodiment of the present application.
  • FIG. 9 is a schematic flowchart of a method for transmitting downlink control information according to an embodiment of the present application.
  • FIG. 10 is a schematic flowchart of a method for transmitting downlink control information according to an embodiment of the present application.
  • FIG. 11 is a schematic block diagram of a network side device according to an embodiment of the present application.
  • FIG. 12 is a schematic block diagram of a network side device according to an embodiment of the present application.
  • FIG. 13 is a schematic block diagram of a terminal device according to an embodiment of the present application.
  • FIG. 14 is a schematic block diagram of a terminal device according to an embodiment of the present application.
  • FIG. 15 is a schematic structural diagram of an apparatus for transmitting downlink control information according to an embodiment of the present application.
  • GSM Global System of Mobile Communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution LTE
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • UMTS Universal Mobile Telecommunication System
  • 5G future 5th-Generation
  • the present application describes various embodiments in connection with a terminal device.
  • the terminal device may also refer to a user equipment (User Equipment, UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, a wireless communication device, and a user agent.
  • the access terminal may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), with wireless communication.
  • PLMN public land mobile network
  • the access network device may be a device for communicating with the terminal device, for example, may be a combination of a base station (Base Transceiver Station, BTS) and a base station controller (BSC) in the GSM system or CDMA, or It is a base station (NodeB, NB) and a radio network controller (RNC) in the WCDMA system, and may also be an evolved base station (Evolutional Node B, eNB or eNodeB) in the LTE system, or the network device may be Relay stations, access points, in-vehicle devices, wearable devices, and access network devices in future 5G networks, such as next-generation base stations, or access network devices in future evolved PLMN networks.
  • BTS Base Transceiver Station
  • BSC base station controller
  • RNC radio network controller
  • Evolutional Node B, eNB or eNodeB evolved base station
  • the network device may be Relay stations, access points, in-vehicle devices, wearable devices, and access network devices
  • FIG. 1 is a schematic structural diagram of a communication system according to an embodiment of the present application.
  • the communication system may include a network side device 20 and at least one terminal device, such as terminal devices 10-17.
  • the network side device 20 is configured to provide communication services for at least one of the terminal devices 10 to 17 and access the core network. Any one of the terminal device 10 to the terminal device 17 and the network side device 20 may include at least one antenna, and FIG. 1 is described by taking multiple antennas as an example.
  • the communication between the terminal device 10 and the network side device 20 will be described as an example.
  • the network side device 20 can send the DCI to the terminal device 10 through a physical downlink control channel (PDCCH), and the DCI can schedule the terminal device 10 to be a physical downlink shared channel (Physical Downlink Shared Channel,
  • the downlink data is received on the PDSCH, and the terminal device 10 may be scheduled to transmit uplink data on a Physical Uplink Shared Channel (PUSCH).
  • the network side device 20 schedules the terminal device 10 to receive the downlink data, and the network device 20 first sends the DCI for the downlink scheduling. After receiving the DCI, the terminal device 10 receives the downlink data by using the time and frequency resources indicated by the DCI.
  • the device 20 can determine whether the next scheduling is to resend data that is not correctly received or to transmit new data.
  • HARQ-ACK Hybrid Automatic Repeat Request Acknowledgment
  • the DCI can also be used to request the terminal device to send a channel quality indication, perform power control through Transmit Power Control (TPC) signaling, and transmit HARQ.
  • TPC Transmit Power Control
  • Table 1 taking the LTE system as an example, DCI can be divided into different formats depending on the application.
  • the DCI may be divided into two levels, for example, a first level DCI and a second level DCI.
  • each DCI in the first level DCI corresponds to multiple DCIs in the second level DCI; each DCI in the plurality of DCIs in the second level DCI is combined with the DCI The corresponding DCI in the first-level DCI is used to perform scheduling on the terminal device once.
  • first level and the second level in the first level DCI and the second level DCI mentioned in the embodiments of the present application are only for distinguishing between two types of DCI, and the network side device may combine one type of DCI and Another type of DCI schedules the terminal device.
  • the first level DCI may include slower scheduling information
  • the second level DCI may include faster conversion scheduling information.
  • the DCI including the scheduling information with slower conversion may also be referred to as the second-level DCI
  • the DCI including the faster-changing scheduling information may be referred to as the first-level DCI, but for convenience of description, the embodiment of the present application will include
  • the DCI that transforms the slower scheduling information is referred to as a first-level DCI and the DCI including the faster-changing scheduling information is referred to as a second-level DCI.
  • the first-level DCI may include an uplink/downlink scheduling identifier, a Modulation and Coding Scheme (MCS) reference, and a power control command indicating a DCI format
  • the second-level DCI may include a HARQ process identifier, resource allocation, PDSCH rate matching indication, precoding information, antenna port information, new data indication, for HARQ and retransmission indication, additional MCS information, uplink reference signal related information, and the like.
  • one subframe may be used as a basic time scheduling unit, where the time scheduling unit may be referred to as a Transmission Time Interval (TTI).
  • TTI Transmission Time Interval
  • the length of one subframe can be 1 millisecond, and each subframe can be further divided into two slots.
  • Each slot includes seven orthogonal frequency division multiplexing (OFDM) symbols, that is, one sub-frame.
  • the frame contains 14 OFDM symbol.
  • OFDM orthogonal frequency division multiplexing
  • the first 1 to 4 OFDM symbols of one subframe may be set as a control region, and the network side device sends DCI in the control region to perform uplink or downlink scheduling.
  • the network side device can receive the PDSCH or transmit the PUSCH through the DCI scheduling terminal device, and can follow a preset timing relationship.
  • the DCI and its scheduled PDSCH are all in the same subframe, the DCI is located in the control region, the PDSCH data transmission is located in the data region after the control region, and the uplink PUSCH transmission is not in the same subframe as the DCI, and
  • the timing relationship between the DCI and the uplink data transmission is n+k, where n represents the subframe number of the subframe in which the current DCI is located, and k represents the subframe offset between the DCI and the scheduled uplink data.
  • the terminal device receives the downlink scheduling DCI sent by the network side device and the PDSCH scheduled by the network side device in subframe 0, and the terminal device is in the subframe according to a preset timing relationship. 4, according to the receiving situation of the PDSCH, if the terminal device does not correctly receive the PDSCH, it will feed back the non-acknowledgment (NACK) information to the network side device. After receiving the NACK, the network side device will be in the subframe 8. The PDSCH sent by the subframe 0 is retransmitted. At this time, the delay of the overall system is 8 subframes, that is, 8 ms.
  • NACK non-acknowledgment
  • the delay may be reduced by shortening the TTI, that is, the number of OFDM symbols in each TTI is reduced.
  • a TTI may be referred to as a short TTI (ShTTI).
  • the length of one TTI may be determined as one OFDM symbol, and the sTTI at this time may be referred to as a symbol level TTI.
  • FIG. 3 is a schematic diagram of feedback delay using symbol level TTI (ie, one TTI includes one OFDM symbol).
  • the network side device may send downlink control information to the terminal device on the 0th symbol, and send downlink data to the terminal device on the first symbol.
  • the frame structure itself may remain unchanged.
  • the length of one subframe may still be 1 millisecond, and each subframe may be further divided into two.
  • Each time slot, each time slot contains 7 OFDM.
  • each OFDM symbol is only 1/14 ms, and the Round-Trip Time (RTT) is 8 OFDM symbols (about 600 ms), which can meet the low delay target with a delay of less than 1 ms.
  • RTT Round-Trip Time
  • a TTI can occupy 2 to 7 symbols in addition to one symbol.
  • the downlink data channel scheduled by DCI is called sPDSCH
  • the uplink data channel is called sPUSCH
  • the uplink control channel is called sPUCCH.
  • sTT for data transmission can shorten the system delay, it increases the overhead of control signaling. For example, when the control information occupies one OFDM symbol, when a TTI occupies 14 OFDM symbols, the ratio of control information to data is 1:13, and when one TTI occupies 1 OFDM symbol, the ratio of control information to data is used. When 1:1, when a TTI occupies 7 OFDM symbols, the ratio of control information to data is 1:6. In contrast, the control signaling overhead of sTTI is large.
  • the overhead of the control information can be reduced by introducing the first level DCI and the second level DCI.
  • some scheduling information may not change in the three sTTIs, and the DCIs belonging to the first-level DCI may be transmitted in the first sTTI, and the DCIs belonging to the second-level DCI may be sent in the second and third sTTIs. Since the DCI belonging to the first-level DCI already contains the scheduling information with slower change, the DCI belonging to the second-level DCI can complete the scheduling only by sending a small amount of scheduling information, thereby reducing the overhead of the control information.
  • the terminal device receives the DCI1 belonging to the first-level DCI sent by the network side device on the first sTTI, and the terminal device receives the DCI11 belonging to the second-level DCI.
  • the PDSCH is received in conjunction with the scheduling information of the DCI1, and when receiving the DCI12 belonging to the second-level DCI, the PDSCH is received in conjunction with the scheduling information of the DCI1, and the processing manner of receiving the DCI13 and the DCI14, and the processing manner of receiving the DCI11 and the DCI12 are received.
  • the terminal device receives the DCI2 belonging to the first-level DCI again at the ninth time interval, and after receiving the DCI21, DCI22 or DCI23 belonging to the second-level DCI, the terminal device receives the PDSCH in conjunction with the scheduling information of the DCI2.
  • first-level DCI and the second-level DCI mentioned in the embodiments of the present application can be applied to a communication system using sTTI, and can also be applied to a communication system using non-sTTI, for example, the length of the TTI. Is one subframe, or greater than one subframe.
  • the terminal device Since the DCI belonging to the first-level DCI and the DCI belonging to the second-level DCI both include scheduling information required for the terminal device to receive the PDSCH, the terminal device needs to be able to correctly receive the DCI belonging to the first-level DCI and perform the joint-to-terminal device.
  • the scheduled DCI belonging to the second level DCI As shown in FIG. 4, if the terminal device does not receive the DCI2 or DCI2 receiving error but correctly receives the DCI 21, it may obtain the wrong scheduling information, which may cause an error in data transmission.
  • the embodiment of the present application provides a method for transmitting downlink control information, which is used to solve the above problem.
  • the first DCI mentioned in the embodiment of the present application may belong to the first level DCI
  • the second DCI may belong to the second level DCI
  • the embodiment of the present application is not only applicable to the foregoing scenario.
  • the first DCI and the second DCI mentioned in the embodiments of the present application may all belong to the first-level DCI, or belong to the second-level DCI, as long as the network It is within the protection scope of the embodiments of the present application to perform the joint scheduling of the terminal device by using the at least two or at least two types of DCI.
  • first DCI and the second DCI are used as an example for the description of the present application. It does not mean that when the network side device schedules the terminal device, only two or two types of DCI are jointly used.
  • the second DCI may be any two or two of a plurality of types or types of DCIs used in combination. For example, assuming that there are three levels of DCI, that is, one-level DCI, two-level DCI, and three-level DCI, the terminal device can perform correct data transmission after correctly acquiring the combined three-level DCI.
  • the implementation of the masking operation may be referred to each other.
  • the specific implementation of the masking operation in the embodiment of the present application may be an exclusive OR operation, for example, the masking mask is XORed with the masked object. operating.
  • the manner in which the CRC is generated or the manner in which the masking sequence is generated may be referred to each other between the embodiments.
  • FIG. 5 is a schematic flowchart of a method 100 for transmitting downlink control information according to an embodiment of the present application.
  • the method 100 is optionally performed by a network side device.
  • the network side device determines the first check information according to at least part of the information in the first DCI.
  • the network side device may determine, according to at least part of the information in the first DCI, a CRC of the first DCI; and the network side device performs a masking operation on the CRC of the first DCI to obtain the first verification information.
  • the network side device may perform a mask operation on the CRC of the first DCI by using the identifier information of the terminal device to obtain the first check information.
  • the network side device may perform a masking operation on the CRC of the first DCI by using a Radio Network Temporary Identifier (RNTI) of the terminal device.
  • RNTI Radio Network Temporary Identifier
  • the network side device may perform a bitwise XOR operation on the sequence of the identifier information carrying the terminal device and the sequence of the CRC carrying the first DCI, so as to implement the identifier information of the terminal device for the first DCI.
  • the CRC performs a masking operation.
  • the embodiment of the present application only uses the RNTI as the identification information of the terminal device as an example, but the embodiment of the present application is not limited thereto, and other information capable of identifying the terminal device may be used as the identification information of the terminal device.
  • obtaining the CRC by using at least part of the information in the first DCI may be implemented by performing a polynomial operation on the information.
  • bits of the CRC are p 0 , p 1 , p 2 , p 3 , ..., p L-1 , where A is the size of the input sequence, L is the number of bits included in the CRC, and the CRC is generated by the following cyclic generation polynomial:
  • the coding is implemented in a systematic form, which means that in the GF(2) domain (Galova domain), when the corresponding CRC generation polynomial g CRC24A (D) or g CRC24B (D) is divided by 24, the polynomial a 0 D A+23 +a 1 D A+22 +...+a A-1 D 24 +p 0 D 23 +p 1 D 22 +...+p 22 D 1 +p 23 produces a value equal to 0 Remainder; and, when divided by g CRC16 (D), the polynomial a 0 D A+15 + a 1 D A+14 +...+a A-1 D 16 +p 0 D 15 +p 1 D 14 +...+p 14 D 1 +p 15 produces a remainder equal to 0; and, when divided by g CRC8 (D), the polynomial a 0 D A+7 +a 1 D A+6 +...+ a A-1 D 8 +p 0 D 7 +p 1 D 6 +...+p 6 D 1 +
  • the network side device sends the first DCI and the first check information to the terminal device.
  • the network side device may be configured to send the first to-be-sent information before the first DCI is arranged in the first verification information, and the network-side device may send the first to-be-sent information to the terminal device by using a preset physical channel. .
  • first DCI is configured to generate the first to-be-sent information before the first verification information, but the embodiment of the present application is not limited thereto, and the first DCI and the first verification information may also be used.
  • the first to-be-sent information is generated by using other arrangements, for example, the first DCI may be arranged after the first verification information to generate the first to-be-sent information.
  • the first to-be-transmitted information may be channel-coded.
  • the network side device may also match the capacity of the physical channel by rate matching.
  • the network side device determines, according to at least part of the information in the first DCI and at least part of the information of the second DCI, where the first DCI is used in conjunction with the second DCI to perform the terminal device. Scheduling.
  • the first DCI belongs to a first level DCI
  • the second DCI belongs to a second level DCI.
  • the first DCI may include scheduling information that is changed slowly
  • the second DCI may include scheduling information that is rapidly changing, that is, the scheduling period of the first DCI is longer than the scheduling of the second DCI. information.
  • the terminal device may schedule the terminal device by combining the previously received first DCI.
  • the first DCI received by the terminal device includes an MCS reference value indicating a basis of a subset of the entire modulation and coding mode table
  • the second DCI received by the terminal device includes an MCS adjustment value, and the adjustment is performed.
  • the value indicates that the MCS reference value is adjusted. If the MCS reference value is "4" and the MCS adjustment value is "+1", it can be said that the specifically used MCS is after adding 1 to the MCS reference value. Corresponding MCS.
  • the first DCI includes a channel power reference value
  • the second DCI includes an adjustment value for adjusting the channel power reference. If the channel power reference is “25 dB” and the adjustment value is “+10 dB”, Indicates an increase of 10 dB on the channel power reference.
  • the first DCI includes a set of time-frequency resources
  • the second DCI indicates one or several time-frequency resources in the time-frequency resource set.
  • first DCI and the second DCI is described by using the MCS information, the power information, and the time-frequency resource information as an example, but the embodiment of the present application is not limited thereto.
  • the terminal device In the process of the first DCI transmission, if the terminal device does not receive the first DCI or the first DCI reception error but correctly receives the second DCI, it is possible to obtain the wrong scheduling information.
  • the network side device when the network side device sends DCI1, the channel condition is good. At this time, DCI1 will schedule a larger transmission data block in the MCS subset; and when the network side device transmits DCI2, the channel condition may encounter the cell. The inter-burst interference becomes worse. At this time, DCI2 will schedule smaller transmission data blocks in the MCS subset. Then, the network side device sends the DCI 21 to the terminal device, where the additional MCS information indicates the MCS specifically used by the network side device in the DCI 2.
  • the terminal device When DCI2 is not received and DCI21 is correctly received, the terminal device combines DCI1 with power consumption to receive and demodulate the erroneous information. At this time, MCS obtained according to the additional MCS of DCI21 due to the wrong MCS subset used. It is also wrong. At this time, the terminal device cannot correctly receive the PDSCH and feed back the NACK to the network side device.
  • the demodulated error soft judgment value may enter the decoder buffer, and the subsequent retransmission information will be combined with the soft judgment value, so it will further Affects the subsequent decoding process.
  • the network side device may schedule adaptive retransmission and retransmit the DCI 21. Since the DCI2 is not correctly received, the DCI that belongs to the second-level DCI will not be correctly scheduled. The PDSCH is received until the network side device transmits other DCIs belonging to the first level DCI.
  • the terminal device after detecting and receiving the uplink grant in the DCI 21, the terminal device sends the uplink service with the assumption of DCI1, and the terminal device may perform uplink transmission on the resource that is not allocated to itself. Causes interference to other terminal devices.
  • the network side device determines the second verification information according to at least part of the information in the first DCI and at least part of the information in the second DCI, so that the terminal device receives the second DCI and After the second verification information, the first DCI that needs to be jointly received is checked to be successful, and the data transmission error caused by the DCI belonging to the first-level DCI due to the second DCI joint error is avoided.
  • the sending time of the first DCI is earlier than the second DCI as an example, but the embodiment of the present application is not limited thereto, and the first DCI and the second DCI may also pass different at the same time.
  • the band is sent.
  • the network side device may determine the first CRC according to at least part of the information in the first DCI and at least part of the information in the second DCI; the network side device may mask the first CRC. Operation to obtain the second verification information.
  • the network side device may arrange at least part of the information in the first DCI and at least part of the second DCI according to a preset rule to obtain the first information.
  • the network side device may be configured according to the first A message determining the first CRC.
  • the network side device may arrange at least part of the information in the first DCI before at least part of the information in the first DCI to obtain the first information.
  • the network side device may arrange at least part of the information in the first DCI after at least part of the information in the second DCI to obtain the first information.
  • the network side device may further divide at least part of the information in the first DCI into two parts of information, and arrange at least part of the information in the second DCI between the two pieces of information to obtain the first information.
  • the first information may be obtained by performing a polynomial operation on the first information.
  • a polynomial operation For the specific implementation, refer to the foregoing description. For brevity, details are not described herein again.
  • At least part of the information in the first DCI may be transformed (for example, cyclically shifting a sequence corresponding to at least part of the information in the first DCI) and the second DCI Transforming at least part of the information (for example, cyclically shifting a sequence corresponding to at least part of the information in the second DCI), determining the first according to the transformed information of the first DCI and the transformed information of the second DCI CRC.
  • At least part of the information in the first DCI may be transformed, and at least part of the information of the second DCI may not be transformed; or at least part of the information in the second DCI may be transformed. At least part of the information in the first DCI is not transformed.
  • the network side device may perform a masking operation on the first CRC by using the identifier information of the terminal device to obtain the second check information.
  • the network side device may perform a masking operation on the first CRC by using the RNTI of the terminal device.
  • the network side device may perform a bitwise XOR operation on the sequence of the identifier information that carries the terminal device and the sequence that carries the first CRC, so that the identifier information of the terminal device is used to perform the CRC of the first DCI. Add mask operation.
  • the network side device may determine the second CRC according to the at least part of the information in the second DCI; the network side device may obtain the masking mask according to at least part of the information in the first DCI; The network side device may perform a masking operation on the second CRC according to the masking mask to obtain the second parity information.
  • the second CRC may be obtained by performing a polynomial operation on at least part of the information in the second DCI.
  • the network side device may obtain a masking mask according to at least part of the information in the first DCI and the identifier information of the terminal device.
  • the network side device may generate a first masking sequence according to the at least part of the information in the first DCI; the network side device may generate a second masking sequence according to the identifier information of the terminal device; the network side device able to pass Performing a bitwise exclusive OR operation on the first masking sequence and the second masking sequence to obtain the masking mask.
  • the network side device may perform a bitwise XOR operation on the obtained masking mask and the second CRC to implement the masking operation on the second CRC.
  • the network side device may intercept, as a first masking sequence, a sequence that is the same length as the second CRC from a sequence that carries at least part of the information in the first DCI.
  • the network side device may be in the first DCI.
  • a sequence of 16 bits of the sequence of at least part of the information is intercepted as the first masked sequence.
  • the network side device may perform the first DCI.
  • a sequence of at least part of the information is cyclically shifted and a 16-bit sequence thereof is intercepted as a first masked sequence.
  • the network side device may carry at least the first DCI.
  • the sequence of partial information is repeated or zero-padded until the sequence length is greater than or equal to 16 bits, and the 16-bit sequence is intercepted as the first masking sequence.
  • the network side device may further transform at least part of the information in the first DCI by using a preset rule, to obtain a first masking sequence having the same length as the second CRC.
  • the network side device maps a sequence carrying at least part of the information in the first DCI into a sequence of 16 bits in length by a hash algorithm.
  • the second masking sequence may be generated in a manner similar to generating the first masking sequence.
  • the network side device may intercept a sequence with the same length as the second CRC from at least part of the identifier information of the terminal device, as the second masking sequence.
  • the network side device may further convert at least part of the information in the identification information of the terminal device by using a preset rule, so as to obtain a second masking sequence having the same length as the second CRC.
  • the embodiment of the present application is only described by taking the masking mask by the cyclic shift and the hash mapping as an example. However, the embodiment of the present application is not limited thereto, and at least part of the information in the first DCI may also be used by other methods. Processing is performed to obtain the masking mask.
  • the network side device may further generate a masking mask according to at least part of the information in the first DCI, and perform a first masking operation on the second CRC according to the masking mask. And performing a second masking operation on the second CRC after the first masking operation according to the identifier information of the terminal device, to obtain the second parity information.
  • a one-time masking operation or a second masking operation may be implemented by performing an exclusive-OR operation on the masking mask and the masked object.
  • the network side device sends the second DCI and the second check information to the terminal device.
  • the network side device may arrange the second DCI before the second verification information to generate the second to-be-sent information.
  • the network-side device may send the second to-be-sent information to the terminal device by using a preset physical channel. .
  • the network side device may perform channel coding on the second to-be-sent information.
  • the network side device may also match the capacity of the physical channel by rate matching.
  • the network side device may send the terminal information to the terminal device.
  • the device resends the first DCI and the first verification information.
  • the size of the sequence numbers of the foregoing processes does not mean the order of execution sequence, and the order of execution of each process should be determined by its function and internal logic, and should not be applied to the embodiment of the present application.
  • the implementation process constitutes any limitation.
  • the network side device may execute 101 and 103 first, and then execute 102 and 104.
  • the network side device determines, according to at least part of the information in the first DCI and at least part of the information in the second DCI, the second verification information, and sends the second DCI and the second school to the terminal device.
  • the verification information is such that after receiving the second DCI and the second verification information, the terminal device needs to perform the verification by jointly receiving the first DCI to verify success, if the terminal device does not receive correctly or does not receive the first DCI, and using the wrong DCI, second DCI, and second parity information belonging to the first-level DCI for verification, a verification error occurs, thereby avoiding the first-level DCI due to the second DCI joint error.
  • the data transmission error caused by DCI data transmission.
  • the terminal device can know the sending time of the first-level DCI, and can solve the problem of missed detection or mis-detection of the first-level DCI to some extent, but the network is caused.
  • the side device cannot flexibly schedule the terminal device.
  • the network side device only needs to use a DCI belonging to the first-level DCI and a DCI scheduling terminal device belonging to the second-level DCI to receive a small amount of downlink data, but the time period spans multiple transmission periods.
  • a DCI belonging to the second-level DCI occurs, which not only affects the flexibility of scheduling, but also increases the overhead of control signaling.
  • the network side device can solve the problem of missed detection or misdetecting the first level DCI in a case where the first level DCI is sent aperiodically, and the scheduling flexibility can be ensured.
  • FIG. 5 is an example in which the first DCI and the second DCI are used, wherein the second verification information is generated according to at least part of the information in the first DCI and at least part of the information in the second DCI, but it should be understood that The first check information may also be generated according to at least part of the information in the first DCI and at least part of the other DCIs.
  • the other DCI may carry scheduling information that changes more slowly than the first DCI.
  • FIG. 6 is a schematic flowchart of a method 200 for transmitting downlink control information according to an embodiment of the present application.
  • the method 200 can be performed by a network side device.
  • the network side device determines a masking sequence of the first version.
  • the network side device may determine the first version from the at least n versions preset by the masking sequence, where The masking sequence of the first version is different from the version of the masking sequence of the masking operation of the CRC of the n-1 DCIs transmitted before the first DCI, and the DCI of the first DCI and the n-1 DCIs are both It belongs to the first-level DCI, and n represents an integer greater than or equal to 2.
  • the masking sequence includes two versions, version 1 and version 2, if the masking sequence corresponding to a DCI belonging to the first-level DCI sent by the network-side device before the first DCI is version 1.
  • the network side device determines that the masking sequence corresponding to the first DCI is version 2. That is, two adjacent DCIs belong to the first level DCI
  • the version of the mask sequence corresponding to the DCI is different.
  • the masking sequence includes three versions, version 1, version 2, and version 3. If the network side device sends the DCI corresponding to the first level DCI corresponding to the first DCI, When the mask sequence is version 2 and version 3, respectively, the network side device determines that the masking sequence corresponding to the first DCI is version 1. That is, the versions of the adjacent masking sequences corresponding to the DCIs belonging to the first-level DCI are different. At this time, it is still impossible to verify the success when the first-stage DCI receives an error twice.
  • the sending time of the first DCI is earlier than the second DCI as an example, but the embodiment of the present application is not limited thereto, and the first DCI and the second DCI may also pass different at the same time.
  • the frequency is sent.
  • the network side device performs a masking operation on the CRC of the first DCI by using the masking sequence of the first version to obtain first verification information.
  • the network side device may generate a masking mask by using the masking sequence of the first version and the identifier information of the terminal device; the network side device may perform the masking according to the masking mask.
  • the CRC of a DCI is masked to obtain the first check information.
  • the network side device may generate a first masking sequence according to the identifier information of the terminal device;
  • the network side device may obtain the masking mask by performing a bitwise exclusive OR operation on the masking sequence of the first version and the first masking sequence.
  • the network side device may intercept, from at least part of the identifier information of the terminal device, a sequence having the same CRC length as the first DCI, as the first masking sequence;
  • the network side device may further convert at least part of the information in the identification information of the terminal device by using a preset rule, so as to obtain a first masking sequence having the same CRC length as the first DCI.
  • the embodiment of the present application is only taken as an example of obtaining a masking mask by a bitwise exclusive OR operation.
  • the embodiment of the present application is not limited thereto, and a masking mask may also be obtained by other means.
  • the network side device may perform a bitwise XOR operation on the obtained masking mask and the masked object (the CRC of the first DCI or the CRC of the second DCI) to implement the masking operation.
  • the network side device may perform the first masking operation on the CRC of the first DCI according to the masking sequence of the first version, and then according to the identifier information of the terminal device.
  • a masking sequence performs a second masking operation on the CRC of the first DCI performing the first masking operation to obtain first parity information.
  • the network side device sends the first DCI and the first check information to the terminal device.
  • the network side device performs a mask operation on the CRC of the second DCI by using the masking sequence of the first version to obtain second check information, where the first DCI is used in conjunction with the second DCI.
  • the terminal device is scheduled.
  • the network side device may generate a masking mask by using the masking sequence of the first version and the identifier information of the terminal device; the network side device may perform the masking according to the masking mask.
  • the CRC of the second DCI performs a masking operation to obtain a second parity information.
  • the network side device may generate a first masking sequence according to the identifier information of the terminal device;
  • the network side device may obtain the masking mask by performing a bitwise exclusive OR operation on the masking sequence of the first version and the first masking sequence.
  • the network side device sends the second DCI and the second check information to the terminal device.
  • the network side device may send the terminal information to the terminal device.
  • the device resends the first DCI and the first verification information.
  • the network side device performs a mask operation on the CRC of the first DCI and the CRC of the second DCI by using the same version of the mask sequence, and the terminal device receives the second DCI and the second After verifying the information, it is necessary to perform verification according to the masking sequence with the same version of the CRC of the first DCI to verify the success, if the terminal device does not correctly receive or does not receive the first DCI, and utilizes other When the version of the masking sequence, the second DCI, and the second parity information are verified, a verification error occurs, and data transmission errors caused by the second DCI joint error DCI data transmission can be avoided.
  • the association between the first DCI and the second DCI requiring joint scheduling can be established without changing the length of the check information.
  • FIG. 6 is an example in which the first DCI and the second DCI are used, wherein the second check information is a masked sequence having the same version using a masking sequence that performs a masking operation on the CRC of the first DCI. And generating a masking operation on the CRC of the second DCI, but it should be understood that the first parity information may also have the same version of the masking sequence with the masking sequence that performs the masking operation on the CRC of the other DCI, A DCI is generated by performing a masking operation.
  • the other DCI may carry scheduling information that is slower than the first DCI.
  • a method for transmitting downlink control information is described in detail from the perspective of a network side device. The following describes the implementation according to the present application from the perspective of the terminal device with reference to FIG. 7 and FIG. 8 .
  • An example of a method of transmitting downlink control information is described in detail from the perspective of a network side device.
  • FIG. 7 is a schematic flowchart of a method 300 for transmitting downlink control information according to an embodiment of the present application.
  • the method 300 can be performed by the terminal side device.
  • the method 300 may correspond to the method 100, that is, the operation of the network side device may refer to the operation of the network side device in the method 100. It should be understood, however, that the first DCI and the second DCI in the method 300 may not be the first DCI and the second DCI in the method 100, for example, the second DCI may be any DCI in the second level DCI, the first The DCI may be the first level DCI received prior to the second level DCI.
  • the terminal device receives the first DCI and the first check information sent by the network side device.
  • the terminal device performs verification according to at least part of the information in the first DCI and the first check information.
  • the terminal device may determine, according to at least part of the information in the first DCI, a CRC of the first DCI; the terminal device performs a mask operation on the CRC of the first DCI to obtain a fifth verification information; The terminal device determines whether the fifth check information is the same as the first check information.
  • the polynomial operation may be performed by using all or part of the information in the DCI to obtain the CRC of the DCI.
  • the description in the method 100 For brevity, details are not described herein again.
  • the terminal device may perform a mask operation on the CRC of the first DCI by using the identifier information of the terminal device to obtain the fifth verification information.
  • the verification when the fifth verification information is the same as the first verification information, the verification may be successful; when the fifth verification information is different from the first verification information, the verification failure may be indicated.
  • the terminal device receives the second DCI and the second check information sent by the network side device.
  • the first DCI is the latest received when the second DCI is received.
  • Level 1 DCI As shown in FIG. 4, when the terminal device receives the DCI2 and the DCI 21, the DCI2 is the latest received first-level DCI; when the terminal device receives the DCI2 but does not receive the DCI2, and receives the DCI1, the DCI is The latest received first level DCI.
  • the terminal device when the terminal device performs verification according to at least part of the information in the first DCI and the first verification information, the terminal device is configured according to at least part of the first DCI, and the second DCI. At least part of the information and the second verification information are verified.
  • the terminal device may determine the first CRC according to at least part of the information in the first DCI and at least part of the information in the second DCI; the terminal device may perform a mask operation on the first CRC. And obtaining the third verification information; the terminal device may determine whether the third verification information is the same as the second verification information.
  • the verification when the third verification information is the same as the second verification information, the verification may be successful; when the third verification information is different from the second verification information, the verification failure may be indicated.
  • the terminal device may arrange at least part of the information in the first DCI and at least part of the information in the second DCI according to a preset rule to obtain first information; the terminal device may be configured according to the first information. , determining the first CRC.
  • the terminal device may be arranged according to a rule agreed upon by the network side device, that is, the terminal device uses at least part of the information in the first DCI and the second DCI in the same manner as the network side device. At least some of the information is arranged to obtain the first information.
  • the terminal device may further convert at least part of the information in the first DCI and at least part of the information in the second DCI according to a transformation manner negotiated with the network side device (for example, cyclically shifting) Bit), and determining the first information according to the transformed information of the first DCI and the transformed information of the second DCI. It should be understood that only at least part of the information in the first DCI or at least part of the information in the second DCI may be transformed.
  • the terminal device may perform a mask operation on the first CRC by using the identifier information of the terminal device to obtain third check information.
  • the terminal device may determine the second CRC according to at least part of the information in the second DCI; the terminal device may obtain a masking mask according to at least part of the information in the first DCI; The device may perform a masking operation on the second CRC according to the masking mask to obtain a fourth check information. The terminal device may determine whether the fourth check information is the same as the second check information.
  • the verification when the fourth verification information is the same as the second verification information, the verification may be successful; when the fourth verification information is different from the second verification information, the verification failure may be indicated.
  • the terminal device may obtain a masking mask according to at least part of the information in the first DCI and the identifier information of the terminal device.
  • the terminal device may generate a first masking sequence according to the at least part of the information in the first DCI; the terminal device may generate a second masking sequence according to the identifier information of the terminal device; The first masking sequence and the second masking sequence perform a bitwise XOR operation to obtain the masking mask.
  • the terminal device according to at least part of the first DCI, at least part of the second DCI
  • the terminal device performs data transmission with the network side device according to the scheduling information of the first DCI and the second DCI joint indication.
  • the terminal device indicates that the verification is successful according to at least part of the information in the first DCI, at least part of the information in the second DCI, and the second verification information.
  • the first DCI may be the first-level DCI corresponding to the second DCI, and the terminal device may receive the downlink data sent by the network side device or send the downlink data to the network side device according to the scheduling information of the first DCI and the second DCI joint indication. Upstream data.
  • the terminal device when the terminal device fails to check according to at least part of the information in the first DCI, at least part of the second DCI, and the second verification information, the terminal device does not send the network device to the network side device. Feedback message.
  • FIG. 8 is a schematic flowchart of a method 400 for transmitting downlink control information according to an embodiment of the present application.
  • the method 400 is performed by a terminal side device.
  • the method 400 may correspond to the method 200, that is, the operation of the network side device may refer to the operation of the network side device in the method 200. It should be understood, however, that the first DCI and the second DCI in the method 400 may not be the first DCI and the second DCI in the method 200, for example, the second DCI may be any DCI in the second level DCI, the first The DCI may be the first level DCI received prior to the second level DCI.
  • the terminal device receives the first DCI and the first check information sent by the network side device.
  • the terminal device performs verification according to the first DCI and the first check information.
  • the terminal device may determine, according to the first DCI, a CRC of the first DCI; the terminal device determines a version of the mask sequence according to an order agreed with the network side device, and masks the version by using the version.
  • the sequence performs a masking operation on the CRC of the first DCI to obtain fourth verification information; the terminal device determines whether the fourth verification information is identical to the first verification information.
  • the masking sequence has two versions, and the terminal device knows that when the DCI belonging to the first-level DCI is received last time, the masking sequence of the version 1 is used to mask the CRC of the DCI, and the terminal device can The currently received first DCI is masked according to the masking sequence of version 2.
  • the terminal device may determine, according to the first DCI, a CRC of the first DCI; the terminal device sequentially according to multiple versions of the known masking sequence, and sequentially through different versions of the masking sequence
  • the CRC of the first DCI performs a masking operation to obtain a plurality of fourth check information; the terminal device determines whether the plurality of fourth check information is the same as the first check information.
  • the masking sequence has three versions, and the terminal device uses the masking sequence of version 1, version 2, and version 3 to mask the CRC of the first DCI, respectively, and compares the different versions of the masking sequence. Whether the fourth verification information is the same as the first verification information.
  • the verification when the fourth verification information is the same as the first verification information, the verification may be successful; when the fourth verification information is different from the first verification information, the verification failure may be indicated.
  • the polynomial operation may be performed by using all or part of the information in the DCI to obtain the CRC of the DCI.
  • the description in the method 100 For brevity, details are not described herein again.
  • the terminal device receives the second DCI and the second check information sent by the network side device.
  • the first DCI is the first-level DCI that is newly received when the second DCI is received.
  • the first-level DCI that is newly received when the second DCI is received.
  • the terminal device determines a masking sequence of the first version, where the masking sequence of the first version is verified according to the first DCI and the first verification information, and the verification is performed when the verification succeeds.
  • Mask sequence the masking sequence of the first version is verified according to the first DCI and the first verification information, and the verification is performed when the verification succeeds.
  • the terminal device will be able to obtain a masked sequence of the fourth parity information identical to the first parity information.
  • the version is determined to be the first version.
  • the terminal device performs verification according to the second DCI, the second verification information, and the masking sequence of the first version.
  • the terminal device may generate a masking mask by using the masking sequence of the first version and the identifier information of the terminal device; the terminal device may perform the second DCI according to the masking mask.
  • the CRC performs a masking operation to obtain a third parity information; the terminal device determines whether the third parity information is identical to the second parity information.
  • the terminal device may generate a first masking sequence according to the identifier information of the terminal device; The device may obtain the masking mask by performing a bitwise XOR operation on the masking sequence of the first version and the first masking sequence.
  • the verification when the third verification information is the same as the second verification information, the verification may be successful; when the third verification information is different from the second verification information, the verification failure may be indicated.
  • the terminal device when the terminal device performs verification according to the second DCI, the second verification information, and the masking sequence of the first version, and the verification succeeds, the terminal device is configured according to the first DCI and the second The DCI jointly indicates the scheduling information, and the network side device performs data transmission.
  • the terminal device when the terminal device fails to verify according to at least part of the information in the first DCI, at least part of the second DCI, and the second check information, the terminal device does not send the device to the network side device. Send a feedback message.
  • FIG. 9 is a schematic flowchart of a method 500 of transmitting downlink control information according to an embodiment of the present application.
  • the network side device transmits the DCI1 and the check information 1 belonging to the first level DCI to the terminal device.
  • the terminal device After receiving the DCI1 and the check information 1, the terminal device performs verification according to at least part of the information in the DCI1 and the check information 1, and assumes that the check is successful.
  • the network side device determines the verification information 1a according to at least part of the information in the DCI 1 and at least part of the information in the DCI 1a belonging to the second level DCI.
  • the network side device sends the DCI 1a and the verification information 1a to the terminal device.
  • the network side device transmits DCI1, only one DCI1a belonging to the second-level DCI is described, but it should be understood that the network side device may send multiple DCIs belonging to the second-level DCI.
  • the terminal device After receiving the DCI 1a and the check information 1a, the terminal device performs verification according to at least part of the information in the DCI 1 , at least part of the information in the DCI 1 a, and the check information 1 a and assumes that the verification is successful.
  • the terminal device may perform data transmission with the network side device according to the scheduling information jointly indicated by DCI1 and DCI1a.
  • the network side device transmits the DCI 2 and the check information 2 belonging to the first level DCI to the terminal device.
  • the network side device determines the verification information 2a according to at least part of the information in the DCI 2 and at least part of the information in the DCI 2a.
  • the network side device transmits the DCI 2a and the check information 2a belonging to the second level DCI to the terminal device.
  • the terminal device may perform verification in combination with the previously received DCI belonging to the first-level DCI. The two situations that may occur at this time will be explained below.
  • Case 1 the terminal device receives the DCI2 and the verification information 2, and the terminal device verifies the verification according to at least part of the information in the DCI2 and the verification information 2.
  • case 1 see 509 and 510; in case 2, the terminal device does not DCI2 and check information 2 are received, but DCI1 and check information 1 are received, and case 2 is referred to as 511 and 512.
  • the terminal device determines the last first-level DCI received before receiving the DCI 2a, that is, the DCI 2, and the terminal device can perform calibration according to at least part of the information in the DCI 2, at least part of the information in the DCI 2a, and the check information 2a. It is assumed that the verification is successful.
  • the terminal device when the verification is successful, performs data transmission with the network side device according to the scheduling information jointly indicated by DCI2 and DCI2a.
  • the terminal device determines the last first-level DCI received before receiving the DCI 2a, that is, DCI1, and the terminal device performs verification according to at least part of the information in the DCI1, at least part of the information in the DCI 2a, and the check information 2a. At this time, the verification will fail.
  • the network side device may resend the DCI 2 and the verification information 2 to the terminal device.
  • each step in the method 500 in the embodiment of the present application in FIG. 9 may refer to the specific description in the method 100 and the method 300 according to the embodiment of the present application in FIG. 5 and FIG. Let me repeat.
  • FIG. 10 is a schematic flowchart of a method 600 for transmitting downlink control information according to an embodiment of the present application.
  • the network side device determines the masking sequence of the version 1, and performs a masking operation on the CRC of the DCI1 belonging to the first level DCI by using the masking sequence of the version 1 to obtain the verification information 1.
  • the network side device sends DCI1 and check information 1 to the terminal device.
  • the terminal device performs verification according to the masking sequence of DCI1, check information 1 and version 1 and assumes that the verification is successful.
  • the terminal device may determine the masking sequence of the version 1 according to an order agreed with the network side device.
  • the terminal device may further determine, from the plurality of versions of the known masking sequence, that the masking sequence that can be verified according to the DCI1 and the verification information 1 and that is successfully verified is version 1. Mask the sequence.
  • the network side device masks the CRC of the DCI 1a belonging to the second level DCI by using the masking sequence of version 1 to obtain the check information 1a.
  • the network side device transmits the DCI 1a and the check information 1a to the terminal device.
  • the terminal side device determines a masking sequence of version 1, and the masking sequence of the version 1 is a masking sequence used when the DCI1 and the verification information 1 are checked and the verification is successful.
  • the terminal device performs verification according to the masking sequence of DCI 1a, check information 1a, and version 1 and assumes that the verification is successful.
  • the terminal device may perform data transmission with the network side device according to the scheduling information jointly indicated by DCI1 and DCI1a.
  • the network side device determines the masking sequence of version 2, and performs a masking operation on the CRC of DCI2 belonging to the first level DCI by using the masking sequence of the version 2 to obtain the verification information 2.
  • the network side device sends the DCI2 and the check information 2 belonging to the first level DCI to the terminal device.
  • the network side device masks the CRC of the DCI 2a belonging to the second level DCI by using the masking sequence of version 2 to obtain the check information 2a.
  • the network side device sends the DCI 2a and the check information 2a to the terminal device.
  • the terminal device may perform verification in combination with the previously received first-level DCI. The two situations that may occur at this time will be explained below.
  • Case 1 the terminal device receives the DCI2 and the verification information 2, and the terminal device successfully verifies according to the masking sequence of the DCI 2, the verification information 2, and the version 2, and the case 1 refers to 612 to 614; The device does not receive DCI2 and check information 2, but receives DCI1 and check information 1, and case 2 see 615 and 617.
  • the terminal device determines the last first level DCI received prior to receiving the DCI 2a, ie, DCI 2, and the terminal device determines the version of the mask sequence that successfully verified the DCI 2, ie, version 2.
  • the terminal device may determine the version 2 masking sequence according to an order agreed with the network side device.
  • the terminal device may further determine, from the plurality of versions of the known masking sequence, that the masking sequence that can be verified according to the DCI2 and the verification information 2 and that is successfully verified is version 2 Mask the sequence.
  • the terminal device can determine the masking sequence that is used according to the DCI 2 and the check information 2 and the masking sequence used when the check succeeds is the version 2 masking sequence.
  • the terminal device after determining the masking sequence of version 2, the terminal device performs a check according to the masking sequence of DCI 2a, check information 2a, and version 2 and assumes that the check is successful.
  • the terminal device when the verification is successful, performs data transmission with the network side device according to the scheduling information jointly indicated by DCI2 and DCI2a.
  • the terminal device determines the last first level DCI received prior to receiving the DCI 2a, ie, DCI1, and the terminal device determines the version of the mask sequence that successfully verified DCI1, ie, version 1.
  • the terminal device after determining the masking sequence of version 1, the terminal device performs verification according to the masking sequence of DCI 2a, verification information 2a, and version 1, and the verification fails.
  • the network side device may resend the DCI 2 and the verification information 2 to the terminal device.
  • the method for transmitting downlink control information according to the embodiment of the present application is described in detail above with reference to FIG. 5 to FIG. 10.
  • the network side device and the terminal device according to the embodiment of the present application are described in detail below with reference to FIG. 11 to FIG.
  • FIG. 11 is a schematic block diagram of a network side device 700 according to an embodiment of the present application. As shown in FIG. 11, the network side device 700 includes:
  • a determining module 701 configured to determine first verification information and second verification information
  • the sending module 702 is configured to send the first DCI and the first check information to the terminal device, and send the second DCI and the second check information to the terminal device.
  • network side device 700 may correspond to the network side device in the embodiment of the present application, and the foregoing and other operations and/or functions of the respective modules in the network side device 700 respectively implement FIG.
  • the corresponding processes of the respective methods in FIG. 7 and FIG. 9 are not described herein again for the sake of brevity.
  • FIG. 12 is a schematic block diagram of a network side device 800 according to an embodiment of the present application. As shown in Figure 12, the network Side device 800 includes:
  • a determining module 801 configured to determine a masking sequence of the first version
  • the masking module 802 is configured to obtain the first verification information and the second verification information by using the masking sequence of the first version
  • the sending module 803 is configured to send the first DCI and the first check information to the terminal device, and send the second DCI and the second check information to the terminal device.
  • network side device 800 may correspond to the network side device in the embodiment of the present application, and the foregoing and other operations and/or functions of the respective modules in the network side device 800 respectively implement FIG.
  • the corresponding processes of the respective methods in FIG. 8 and FIG. 10 are not described herein again for the sake of brevity.
  • FIG. 13 is a schematic block diagram of a terminal device 900 according to an embodiment of the present application. As shown in FIG. 13, the terminal device 900 includes:
  • the receiving module 901 is configured to receive the first DCI and the first verification information that are sent by the network side device, and receive the second DCI and the second verification information that are sent by the network side device;
  • the verification module 902 is configured to perform verification according to at least part of the information in the first DCI and the first verification information, and according to at least part of the information in the first DCI, in the second DCI At least part of the information and the second verification information are verified;
  • the transmission module 903 is configured to perform data transmission with the network side device.
  • terminal device 900 may correspond to the terminal device in the embodiment of the present application, and the foregoing and other operations and/or functions of the respective modules in the terminal device 900 are respectively implemented in FIG. 5 and FIG. 7 and The corresponding processes of the respective methods in FIG. 9 are not described herein for the sake of brevity.
  • FIG. 14 is a schematic block diagram of a terminal device 1000 according to an embodiment of the present application. As shown in FIG. 14, the terminal device 1000 includes:
  • the receiving module 1001 is configured to receive the first DCI and the first verification information that are sent by the network side device, and receive the second DCI and the second verification information that are sent by the network side device;
  • the verification module 1002 is configured to perform verification according to the first DCI and the first verification information, and according to the second DCI, the second verification information, and the masking sequence of the first version. Perform verification
  • a determining module 1003, configured to determine a masking sequence of the first version
  • the transmission module 1004 is configured to perform data transmission with the network side device.
  • terminal device 1000 may correspond to the terminal device in the embodiment of the present application, and the foregoing and other operations and/or functions of the respective modules in the terminal device 1000 are respectively implemented to implement FIG. 6 and FIG. 8 and The corresponding processes of the respective methods in FIG. 10 are not described herein for the sake of brevity.
  • FIG. 15 is a schematic structural diagram of an apparatus 1100 for transmitting downlink control information according to an embodiment of the present application.
  • the device 1100 for transmitting downlink control information includes a processor 1101, a memory 1102, a receiver 1103, a transmitter 1104, and a bus system 1105.
  • the processor 1101, the memory 1102, and the receiver 1103 The transmitter 1104 is connected to the bus system 1105, wherein the memory 1102 is for storing instructions, the receiver 1103 is for receiving information, the transmitter 1104 is for transmitting information, and the processor 1101 is for The instructions stored by the memory 1102 are executed.
  • the device 1100 for transmitting the downlink control information may correspond to the network side device in the embodiment of the present application, and the foregoing and other operations and/or functions of the respective modules in the device 1100 for transmitting the downlink control information are respectively implemented.
  • the corresponding processes of the respective methods in FIG. 5 to FIG. 10 are not described herein again for the sake of brevity.
  • the device 1100 for transmitting downlink control information may correspond to the terminal device in the embodiment of the present application, and the foregoing operations and/or functions of the respective modules in the device 1100 for transmitting the downlink control information are respectively implemented for 5 to the corresponding flow of each method in FIG. 10, for brevity, no further details are provided herein.
  • the device 1100 for transmitting downlink control information may be a network side device or a terminal device as described above, and the processor 1103 implements the method flow mentioned in the previous embodiment of the present invention by executing an instruction stored in the memory 1102.
  • the processor may be a Central Processing Unit (CPU), a Network Processor (NP), or a combination of a CPU and an NP.
  • the processor may further include a hardware chip.
  • the hardware chip may be an Application-Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), or a combination thereof.
  • the PLD may be a Complex Programmable Logic Device (CPLD), a Field-Programmable Gate Array (FPGA), a Generic Array Logic (GAL), or any combination thereof.
  • the memory can be either volatile memory or non-volatile memory, or can include both volatile and non-volatile memory.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read only memory (PROM), an erasable programmable read only memory (Erasable PROM, EPROM), or an electric Erase programmable read only memory (EEPROM) or flash memory.
  • the volatile memory can be a Random Access Memory (RAM) that acts as an external cache.
  • the bus system may include a power bus, a control bus, and a status signal bus in addition to the data bus.
  • a power bus may include a power bus, a control bus, and a status signal bus in addition to the data bus.
  • a control bus may include a control bus, and a status signal bus in addition to the data bus.
  • a status signal bus in addition to the data bus.
  • only one thick line is used to indicate the bus system, but it does not mean that there is only one bus or one type of bus.
  • the embodiment of the present application provides a computer readable medium for storing a computer program, where the computer program includes a method for transmitting downlink control information according to the embodiment of the present application in FIG. 5 to FIG.
  • the readable medium may be a ROM or a RAM, which is not limited in this embodiment of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne un procédé de transmission d'informations de commande de liaison descendante, un dispositif sur le côté réseau, et un dispositif terminal. Le procédé consiste à : déterminer des premières informations de vérification d'après au moins une partie des informations dans des premières DCI ; envoyer les premières DCI et les premières informations de vérification à un dispositif terminal; déterminer des secondes informations de vérification d'après la ou les parties des informations dans les premières DCI et au moins une partie des informations dans des secondes DCI, les premières DCI étant utilisées conjointement avec les secondes DCI pour programmer le dispositif terminal ; et envoyer les secondes DCI et les secondes informations de vérification au dispositif terminal. Les modes de réalisation de la présente invention permettent d'éviter une erreur de transmission de données provoquée par la transmission de données de secondes DCI conjointement avec des DCI erronées.
PCT/CN2017/071692 2017-01-19 2017-01-19 Procédé de transmission d'informations de commande de liaison descendante, dispositif sur le côté réseau, et dispositif terminal WO2018133001A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201780083690.3A CN110192362B (zh) 2017-01-19 2017-01-19 传输下行控制信息的方法、网络侧设备和终端设备
PCT/CN2017/071692 WO2018133001A1 (fr) 2017-01-19 2017-01-19 Procédé de transmission d'informations de commande de liaison descendante, dispositif sur le côté réseau, et dispositif terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/071692 WO2018133001A1 (fr) 2017-01-19 2017-01-19 Procédé de transmission d'informations de commande de liaison descendante, dispositif sur le côté réseau, et dispositif terminal

Publications (1)

Publication Number Publication Date
WO2018133001A1 true WO2018133001A1 (fr) 2018-07-26

Family

ID=62907486

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/071692 WO2018133001A1 (fr) 2017-01-19 2017-01-19 Procédé de transmission d'informations de commande de liaison descendante, dispositif sur le côté réseau, et dispositif terminal

Country Status (2)

Country Link
CN (1) CN110192362B (fr)
WO (1) WO2018133001A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SG11202003769TA (en) * 2017-12-13 2020-07-29 Qualcomm Inc Soft-combining for control channels

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056198A (zh) * 2009-10-31 2011-05-11 华为技术有限公司 一种下行信道传输及检测方法、装置和系统
CN102148657A (zh) * 2010-02-10 2011-08-10 株式会社Ntt都科摩 基站、用户设备及控制信号格式信息的传输方法
CN102958184A (zh) * 2011-08-25 2013-03-06 华为技术有限公司 下行控制信道传输方法、装置和系统
US20140133440A1 (en) * 2011-07-27 2014-05-15 Fujitsu Limited Method for sending and receiving downlink control information, base station, and mobile terminal
CN105992378A (zh) * 2015-02-27 2016-10-05 上海朗帛通信技术有限公司 一种增强的载波聚合中的pdcch方法和装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056198A (zh) * 2009-10-31 2011-05-11 华为技术有限公司 一种下行信道传输及检测方法、装置和系统
CN102148657A (zh) * 2010-02-10 2011-08-10 株式会社Ntt都科摩 基站、用户设备及控制信号格式信息的传输方法
US20140133440A1 (en) * 2011-07-27 2014-05-15 Fujitsu Limited Method for sending and receiving downlink control information, base station, and mobile terminal
CN102958184A (zh) * 2011-08-25 2013-03-06 华为技术有限公司 下行控制信道传输方法、装置和系统
CN105992378A (zh) * 2015-02-27 2016-10-05 上海朗帛通信技术有限公司 一种增强的载波聚合中的pdcch方法和装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI: "Email Discussion [86b-23] on Multi-steps DL Control Channel Design", 3GPP TSG RAN WG1 MEETING #87, RL-1611656, 18 November 2016 (2016-11-18), XP051176989 *

Also Published As

Publication number Publication date
CN110192362A (zh) 2019-08-30
CN110192362B (zh) 2020-11-10

Similar Documents

Publication Publication Date Title
US10966118B2 (en) Channel encoding method and communication device
US10367611B2 (en) Methods and apparatus for enhancement for HARQ with channel repetitions
US10972228B2 (en) Base station device, user equipment, wireless communication system, and communication method
US10516505B2 (en) Baseband processors, base station, user device, and methods thereof
US10887050B2 (en) Downlink signal reception method and user equipment, and downlink signal transmission method and base station
WO2018107400A1 (fr) Appareil et procédé de transmission
RU2754435C2 (ru) Способ, устройство передачи данных и система связи
US20120084618A1 (en) Jointly encoding a scheduling request indicator and acknowledgments/negative acknowledgments
CN110138523B (zh) 一种反馈码本确定方法及装置
US11411673B2 (en) Method and apparatus for transmitting information, and method and apparatus for receiving information
US20210203361A1 (en) Method and apparatus for transmitting information
US20190132106A1 (en) Uplink transmission method and apparatus
JP2022046754A (ja) チャネル符号化に用いるユーザー装置、基地局における方法及び装置
WO2017101023A1 (fr) Procédé de communication, dispositif de réseau et équipement utilisateur
WO2018233705A1 (fr) Procédé de transmission de données, procédé de retour de transmission de données, et dispositif associé
JP6873245B2 (ja) 複数のキャリア上でデータを送信するための方法、端末装置、およびネットワーク装置
JP7297678B2 (ja) データが破損しているかどうかを判断するための方法および装置
WO2020210992A1 (fr) Procédés et appareils de réémission et de rétroaction de transmission en liaison montante, terminal, et support de stockage
WO2018133001A1 (fr) Procédé de transmission d'informations de commande de liaison descendante, dispositif sur le côté réseau, et dispositif terminal
US11863330B2 (en) Method for HARQ feedback in wireless communication system and apparatus therefor
US10693614B2 (en) Data transmission method, terminal device, and network device
WO2019178736A1 (fr) Procédés et appareils de transmission et de réception d'informations de commande, et système de communication
CN111836308B (zh) 一种数据传输方法及通信设备
WO2020220317A1 (fr) Procédé de transmission d'accusé de réception de demande de répétition automatique hybride, dispositif et support d'enregistrement
JP2019146258A (ja) 制御情報を送信するための方法、ユーザ機器、及び基地局

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17892176

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17892176

Country of ref document: EP

Kind code of ref document: A1