WO2018232757A1 - 抢占时频资源的确定方法及装置、用户设备和基站 - Google Patents

抢占时频资源的确定方法及装置、用户设备和基站 Download PDF

Info

Publication number
WO2018232757A1
WO2018232757A1 PCT/CN2017/089857 CN2017089857W WO2018232757A1 WO 2018232757 A1 WO2018232757 A1 WO 2018232757A1 CN 2017089857 W CN2017089857 W CN 2017089857W WO 2018232757 A1 WO2018232757 A1 WO 2018232757A1
Authority
WO
WIPO (PCT)
Prior art keywords
service data
time
frequency resource
resource region
determining
Prior art date
Application number
PCT/CN2017/089857
Other languages
English (en)
French (fr)
Inventor
周珏嘉
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2017/089857 priority Critical patent/WO2018232757A1/zh
Priority to US16/623,927 priority patent/US11546884B2/en
Priority to EP17914509.9A priority patent/EP3644667A4/en
Priority to CN201780000726.7A priority patent/CN108401506B/zh
Publication of WO2018232757A1 publication Critical patent/WO2018232757A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0044Arrangements for allocating sub-channels of the transmission path allocation of payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • H04L1/1812Hybrid protocols; Hybrid automatic repeat request [HARQ]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0091Signaling for the administration of the divided path
    • H04L5/0094Indication of how sub-channels of the path are allocated
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Definitions

  • the present disclosure relates to the field of communications technologies, and in particular, to a method and apparatus for determining preemptive time-frequency resources, a user equipment, a base station, and a computer readable storage medium.
  • 5G fifth generation of mobile communication technology
  • 5G's current business types include at least Enhanced Mobile Broad Band (eMBB), Massive Machine Type Communication (MMTC), Ultra Reliable Low Latency Communication (referred to as Ultra Reliable Low Latency Communication).
  • eMBB Enhanced Mobile Broad Band
  • MMTC Massive Machine Type Communication
  • Ultra Reliable Low Latency Communication referred to as Ultra Reliable Low Latency Communication
  • URLLC Ultra Reliable Low Latency Communication
  • these services are both data services, but the requirements for delay and reliability are different.
  • the URLLC service is used in areas such as car networking that require low latency, and the timeliness is very high.
  • the mMTC service is usually not sensitive to delay and can be sent to the data for a long time.
  • One way to achieve efficient transmission of delay-sensitive services is to improve the transmission of Hybrid Automatic Repeat ReQuest (HARQ), for example, to make retransmission feedback faster and more accurate.
  • HARQ Hybrid Automatic Repeat ReQuest
  • HARQ feedback is performed in units of a Transmission Block (TB), and each TB feeds back a 1-bit (ACK) response or a non-acknowledgement (NACK) message.
  • ACK 1-bit
  • NACK non-acknowledgement
  • 3GPP proposes to retransmit based on Code Block Group (CBG), which is a smaller unit of data unit in TB, and a CBG corresponds to 1 bit ACK.
  • CBG Code Block Group
  • NACK feedback since the retransmission granularity will be smaller, the position of the erroneous transmission can be more accurately reflected, thereby making the retransmission more accurate, and the retransmission efficiency is higher because the amount of data that needs to be retransmitted is smaller.
  • the URLLC service will preempt the eMBB transmission time-frequency resource, resulting in the original eMBB service in the HARQ feedback.
  • the eMBB data transmission error is incorrectly considered, thereby discarding useful URLLC data.
  • How to judge the URLLC to seize the time-frequency resources of eMBB is a technical problem that needs to be solved.
  • the present application discloses a method and device for determining preemptive time-frequency resources, user equipment, base station, and computer readable storage.
  • the medium is used to determine the situation in which the time-frequency resources are preempted between the service data.
  • a method for determining a preemptive time-frequency resource comprising:
  • the method further includes:
  • the method further includes:
  • the sending the HARQ feedback information of the first service data to the base station includes:
  • the method further includes:
  • the pre-cached service data of the time-frequency resource region is erased.
  • the method before the decrypting part or all of the service data of the time-frequency resource region and its associated time-frequency resource region, the method further includes:
  • the decrypting part or all of the service data of the time-frequency resource region and its associated time-frequency resource region includes:
  • the preset scrambling code includes a radio network temporary identifier RNTI, where the RNTI includes a cell radio network temporary identifier C-RNTI or a novel RNTI.
  • a method for determining a preemptive time-frequency resource comprising:
  • the method further includes:
  • the second service data belongs to a preset scheduling type, and determining that the second service data can preempt the time-frequency resource of the first service data.
  • the determining that the second service data can preempt the time-frequency resources of the first service data includes:
  • time-frequency resource region used for scheduling the second service data is located in a time-frequency resource region used by the first service data, determining that the second service data can preempt the first service data Frequency resources.
  • the method further includes:
  • the configuration information is sent to the UE, where the configuration information is used to notify the UE of the relevant time-frequency resource region information used for decryption.
  • the encrypting part or all of the second service data includes:
  • the preset scrambling code includes a radio network temporary identifier RNTI, where the RNTI includes a cell radio network temporary identifier C-RNTI or a novel RNTI.
  • apparatus for determining preemption time-frequency resources comprising:
  • Receiving a reading module configured to receive and read the first service data sent by the base station
  • Determining a decryption module configured to determine, when the first read service module reads the first service data, if there is a first service data that fails to be received, determining a time-frequency resource region corresponding to the first service data that fails to be received Decrypting part or all of the service data of the time-frequency resource region and its associated time-frequency resource region;
  • a determining module configured to: after the decryption module decrypts part or all of the service data of the time-frequency resource region and its associated time-frequency resource region, if the decryption is successful, determining that the second service data preempts the first service Time-frequency resources of data.
  • the apparatus further includes:
  • the receiving module is configured to receive the partially encrypted or fully encrypted second service sent by the base station before the determining the decryption module decrypts part or all of the service data of the time-frequency resource region and its associated time-frequency resource region data.
  • the apparatus further includes:
  • a reservation sending module configured to: after the determining module determines that the second service data preempts the time-frequency resource of the first service data, retain the second service data that preempts the time-frequency resource, and send the first service data to the base station A hybrid automatic retransmission request for HARQ feedback information.
  • the reservation sending module includes:
  • the first sending unit is configured to set a receiving success or failure state of the first service data preempted by the time-frequency resource to be successfully received, and send the HARQ feedback information to the base station;
  • the second sending unit is configured to send the HARQ feedback information to the base station according to a first data reception success or failure status other than the first service data that is preempted by the time-frequency resource.
  • the apparatus further includes:
  • the erasing module is configured to: after the decryption module decrypts part or all of the service data of the time-frequency resource region and its associated time-frequency resource region, if the decryption fails, erasing the pre-cached Business data of the time-frequency resource area.
  • the apparatus further includes:
  • Receiving the learning module configured to receive configuration information sent by the base station before the determining the decryption module decrypts part or all of the service data of the time-frequency resource region and its associated time-frequency resource region, and according to the Configuration letter
  • the relevant time-frequency resource area is known.
  • the determining the decryption module comprises:
  • a descrambling unit configured to descramble part or all of the service data of the time-frequency resource region and its associated time-frequency resource region using a preset scrambling code
  • a descrambling check unit configured to descramble part or all of the service data of the time-frequency resource region and its associated time-frequency resource region using a preset scrambling code, and verify the descrambling result
  • a verification unit configured to verify part or all of the service data of the time-frequency resource region and its associated time-frequency resource region
  • the preset scrambling code includes a radio network temporary identifier RNTI, where the RNTI includes a cell radio network temporary identifier C-RNTI or a novel RNTI.
  • a device for determining a preemptive time-frequency resource comprising:
  • the first sending module is configured to send the first service data to the user equipment UE;
  • the encrypted sending module is configured to: after the first sending module sends the first service data, encrypt part or all of the second service data, and send the encrypted second service data to the UE, where The UE decrypts part or all of the service data of the time-frequency resource region corresponding to the first service data that is failed to be received and the related time-frequency resource region to determine whether the second service data preempts the time-frequency resource of the first service data.
  • the apparatus further includes:
  • a determining module configured to determine that the second service data belongs to a preset scheduling type and that the second service data can preempt the first before the encrypted sending module encrypts part or all of the second service data Time-frequency resources of business data.
  • the determining module is configured to determine, if the time-frequency resource region used by the second service data is located in a time-frequency resource region used by the first service data, The second service data can preempt the time-frequency resource of the first service data.
  • the apparatus further includes:
  • a second sending module configured to: after the encrypted sending module sends the encrypted second service data to the UE, send configuration information to the UE, where the configuration information is used to notify the UE to use for decryption.
  • Related time-frequency resource area information configured to: after the encrypted sending module sends the encrypted second service data to the UE, send configuration information to the UE, where the configuration information is used to notify the UE to use for decryption.
  • Related time-frequency resource area information configured to: after the encrypted sending module sends the encrypted second service data to the UE, send configuration information to the UE, where the configuration information is used to notify the UE to use for decryption.
  • the encryption sending module includes:
  • a scrambling unit configured to scramble some or all of the second service data using a preset scrambling code
  • a verification scrambling unit configured to verify part or all of the second service data and to scramble the verified second service data using a preset scrambling code
  • a verification unit configured to verify part or all of the second service data
  • the preset scrambling code includes a radio network temporary identifier RNTI, where the RNTI includes a cell radio network temporary identifier C-RNTI or a novel RNTI.
  • a user equipment including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • a base station including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • a computer readable storage medium having stored thereon a computer program, the program being executed by a processor to implement the step of determining the preemptive time-frequency resource.
  • a computer readable storage medium having stored thereon a computer program, When the program is executed by the processor, the step of determining the preemptive time-frequency resource is implemented.
  • the second service data sent by the base station is received by the base station to provide a condition for determining whether the second service data preempts the time-frequency resource of the first service data.
  • the purpose of retaining the useful second service data is achieved, so that the second service data can be normally transmitted, and the hybrid automatic retransmission request HARQ feedback information is sent by sending the first service data to the base station. So that the base station can judge the eMBB data that failed to be sent according to this, thereby providing conditions for retransmitting the transmitted eMBB data.
  • the HARQ feedback information can be sent to the base station in multiple ways, and the implementation manner is flexible and diverse.
  • the service data of the pre-cached time-frequency resource area is erased, thereby saving the cache space of the UE. .
  • the implementation manner is simple by receiving the configuration information sent by the base station and obtaining the relevant time-frequency resource region according to the configuration information.
  • Some or all of the service data of the time-frequency resource region and its associated time-frequency resource region can be decrypted in various ways, and the implementation manner is flexible and diverse.
  • the time-frequency resource region used for scheduling the second service data is located in the time-frequency resource region used for scheduling the first service data, to determine that the second service data can preempt the time-frequency resource of the first service data, and the implementation manner is simple.
  • the configuration information is sent to the UE, so that the UE can learn the relevant time-frequency resource region according to the configuration information, so that part or all of the service data of the determined time-frequency resource region and its related time-frequency resource region can be decrypted.
  • Some or all of the second service data can be encrypted in various ways, and the implementation manner is flexible and diverse.
  • FIG. 1A is a flowchart of a method for determining preemptive time-frequency resources according to an exemplary embodiment of the present application
  • FIG. 1B is a schematic diagram showing a first service data with a failure of reception according to an exemplary embodiment of the present application
  • FIG. 2 is a flowchart of another method for determining preemptive time-frequency resources according to an exemplary embodiment of the present application
  • FIG. 3 is a flowchart of another method for determining preemptive time-frequency resources according to an exemplary embodiment of the present application
  • FIG. 4 is a flowchart of another method for determining preemptive time-frequency resources according to an exemplary embodiment of the present application.
  • FIG. 5 is a flowchart of another method for determining preemptive time-frequency resources according to an exemplary embodiment of the present application.
  • FIG. 6 is a flowchart of still another method for determining preemptive time-frequency resources according to an exemplary embodiment of the present application.
  • FIG. 7A is a flowchart of still another method for determining preemptive time-frequency resources according to an exemplary embodiment of the present application.
  • FIG. 7B is a flowchart of still another method for determining preemptive time-frequency resources according to an exemplary embodiment of the present application.
  • FIG. 8 is a block diagram of a determining apparatus for preempting time-frequency resources according to an exemplary embodiment
  • FIG. 9A is a block diagram of another apparatus for determining preemptive time-frequency resources, according to an exemplary embodiment.
  • FIG. 9B is a block diagram of another apparatus for determining preemptive time-frequency resources, according to an exemplary embodiment.
  • FIG. 9C is a block diagram of another apparatus for determining preemptive time-frequency resources, according to an exemplary embodiment.
  • FIG. 9D is a block diagram of another apparatus for determining preemptive time-frequency resources, according to an exemplary embodiment.
  • FIG. 9E is a block diagram of another apparatus for determining preemptive time-frequency resources, according to an exemplary embodiment.
  • FIG. 9F is a block diagram of another apparatus for determining preemptive time-frequency resources, according to an exemplary embodiment.
  • FIG. 10 is a block diagram of still another apparatus for determining preemptive time-frequency resources according to an exemplary embodiment
  • FIG. 11A is a block diagram of still another apparatus for determining preemptive time-frequency resources according to an exemplary embodiment
  • FIG. 11B is a block diagram of still another apparatus for determining time-frequency resource preemption according to an exemplary embodiment
  • FIG. 11C is a block diagram of still another apparatus for determining preemptive time-frequency resources according to an exemplary embodiment
  • FIG. 12 is a block diagram of a determining apparatus suitable for preempting time-frequency resources, according to an exemplary embodiment
  • FIG. 13 is a block diagram of another determining apparatus suitable for preempting time-frequency resources, according to an exemplary embodiment.
  • FIG. 1A is a flowchart of a method for determining preemptive time-frequency resources according to an exemplary embodiment of the present application. The embodiment is described from a user equipment (UE) side, as shown in FIG. 1A, determining the preemptive time-frequency resource. Methods include:
  • step S101 the first service data sent by the base station is received and read.
  • the UE may receive the first service data sent by the base station according to the preset resource unit, where the preset resource unit may include, but is not limited to, a subframe, a slot, and a symbol.
  • the preset resource unit may include, but is not limited to, a subframe, a slot, and a symbol.
  • the code block group (CBG) or the like the first service data may include but is not limited to eMBB data.
  • step S103 if it is determined that there is a first service data that fails to be received, determining a time-frequency resource region corresponding to the failed first service data, and performing part or all of the services of the time-frequency resource region and its associated time-frequency resource region The data is decrypted.
  • the time-frequency resource area corresponding to the service data refers to the area corresponding to the time domain resource and the frequency domain resource occupied by the service data.
  • the relevant time-frequency resource region of a certain time-frequency resource region refers to a time-frequency resource region related to at least one of a time domain and a frequency domain of the time-frequency resource region, a certain time-frequency resource region and its associated time-frequency resource region.
  • the area usually shares certain control information, which may include, but is not limited to, control information that periodically appears in time and frequency, such as a synchronization signal or a reference signal, etc., and the relevant time-frequency resource region may include, but is not limited to, the time-frequency.
  • the adjacent time-frequency resource area of the resource area As shown in FIG.
  • the time-frequency resource region corresponding to the first service data that is failed to be received is the time-frequency resource region corresponding to the CBG4, and the adjacent time-frequency resource region of the time-frequency resource region corresponding to the CBG4 is the time-frequency resource region in FIG. 1B.
  • Control information including, but not limited to, time and frequency cycles, such as synchronization signals, reference signals, and the like.
  • decrypting part or all of the service data of the time-frequency resource region and its associated time-frequency resource region may include, but is not limited to, any one of the following:
  • the preset scrambling code may include, but is not limited to, a Radio Network Temporary Identity (RNTI), and the RNTI may include a Cell Radio Network Temporary Identity (C-RNTI) or a novel RNTI (ie, a customized RNTI).
  • RNTI Radio Network Temporary Identity
  • C-RNTI Cell Radio Network Temporary Identity
  • novel RNTI ie, a customized RNTI
  • the preset scrambling code may include, but is not limited to, an RNTI, and the RNTI may include a C-RNTI or a new type of RNTI.
  • the descrambling result may be further verified, for example, cyclic redundancy. Test (CRC). If the packet is successfully descrambled and passed the check, it indicates that the decryption is successful. Otherwise, the decryption fails.
  • part or all of the service data of the time-frequency resource region and its associated time-frequency resource region may be subjected to CRC check. If the check is successful, the decryption is successful, otherwise, the decryption fails.
  • the embodiment can decrypt part or all of the service data of the time-frequency resource region and its related time-frequency resource region in multiple manners, and the implementation manner is flexible and diverse.
  • step S105 if the decryption is successful, it is determined that the second service data preempts the time-frequency resource of the first service data.
  • the second service data may include, but is not limited to, URLLC data.
  • the second service has a higher priority than the first service, that is, the second service has higher requirements for timeliness than the first service.
  • the time-frequency resource region corresponding to the first service data that fails to be received is determined, and part or all of the service data of the time-frequency resource region and the related time-frequency resource region are decrypted.
  • the second service data preempts the time-frequency resources of the first service data, so that the situation of preempting the time-frequency resources between the service data can be determined.
  • FIG. 2 is a flowchart of another method for determining a preemptive time-frequency resource according to an exemplary embodiment of the present application. As shown in FIG. 2, after the step S103, the method may further include:
  • step S104 if the decryption fails, the service data of the pre-cached time-frequency resource region is erased.
  • the decryption fails, it is confirmed that the first service data reception fails. Therefore, the pre-cached service data of the time-frequency resource area can be erased.
  • the service data of the pre-cached time-frequency resource region is erased, thereby saving UE Cache space.
  • FIG. 3 is a flowchart of another method for determining a preemptive time-frequency resource according to an exemplary embodiment of the present application. As shown in FIG. 3, before the step S103, the method may further include:
  • step S102 the partially encrypted or fully encrypted second service data sent by the base station is received.
  • the base station may send the partially encrypted or fully encrypted second service data to the UE, and the second service data that is partially encrypted or fully encrypted is sent for
  • the UE decrypts part or all of the service data of the time-frequency resource area corresponding to the first service data that is failed to be received and the related time-frequency resource area, the UE can determine whether the second service data preempts the time-frequency of the first service data. Resources.
  • the second service data sent by the base station is received, or the second service data is completely encrypted, and the condition for determining whether the second service data preempts the time-frequency resource of the first service data is provided.
  • FIG. 4 is a flowchart of another method for determining a preemptive time-frequency resource according to an exemplary embodiment of the present application. As shown in FIG. 4, before the step S103, the method may further include:
  • step S106 the configuration information sent by the base station is received, and the relevant time-frequency resource region is obtained according to the configuration information.
  • the relevant time-frequency resource region can be obtained, so that part or all of the service data of the determined time-frequency resource region and its associated time-frequency resource region can be decrypted.
  • the UE can also learn related time-frequency resource regions by using other methods, for example, the related time-frequency resource region can be obtained in a pre-agreed manner.
  • the implementation manner is simple by receiving the configuration information sent by the base station and obtaining the relevant time-frequency resource region according to the configuration information.
  • FIG. 5 is a flowchart of another method for determining a preemptive time-frequency resource according to an exemplary embodiment of the present application. As shown in FIG. 5, after the step S105, the method may further include:
  • step S107 the second service data of the preempted time-frequency resource is reserved, and the HARQ feedback information of the first service data is sent to the base station.
  • the second service data of the time-frequency resource is not erased because the second service data of the time-frequency resource is preempted, that is, the UE retains the second service data of the time-frequency resource.
  • the UE may send the HARQ feedback information of the first service data to the base station in multiple manners.
  • the HARQ feedback information may be sent to the base station in the following two manners:
  • the receiving success or failure state of the first service data of the preempted time-frequency resource may be set to be successfully received, and the HARQ feedback information is sent to the base station.
  • the reception success or failure state of the eMBB data corresponding to the CBG4 in FIG. 1B may be set to be successful, and the eMBB data corresponding to other CBGs may be fed back according to the existing manner, that is, the reception success or failure status of the eMBB data corresponding to other CBGs is The receiving is successful, and the corresponding HARQ feedback information is sent to the base station.
  • the HARQ feedback information may be sent to the base station according to the first data reception success or failure status other than the first service data of the preempted time-frequency resource.
  • FIG. 1B is still taken as an example.
  • the eMBB data corresponding to the CBG4 is the first service data of the preempted time-frequency resource, and the UE may send the CBG1, CBG2, CBG3, CBG5, CBG6, CBG7, and CBG8 to the base station.
  • HARQ feedback information is still taken as an example.
  • the eMBB data corresponding to the CBG4 is the first service data of the preempted time-frequency resource
  • the UE may send the CBG1, CBG2, CBG3, CBG5, CBG6, CBG7, and CBG8 to the base station.
  • HARQ feedback information is still taken as an example.
  • the base station may determine the eMBB data that failed to be transmitted according to this, and retransmit the eMBB data that failed to be transmitted.
  • the embodiment can send the HARQ feedback information to the base station in multiple manners, and the implementation manner is flexible and diverse.
  • the purpose of retaining the useful second service data is achieved, so that the second service data can be normally transmitted, and the hybrid automatic retransmission of the first service data is sent to the base station.
  • the HARQ feedback information is requested, so that the base station can determine the eMBB data that failed to be transmitted according to the network, thereby providing conditions for retransmitting the transmitted eMBB data.
  • FIG. 6 is a flowchart of still another method for determining preemptive time-frequency resources according to an exemplary embodiment of the present application. The embodiment is described from the side of the base station. As shown in FIG. 6, the method for determining preemptive time-frequency resources includes: :
  • step S601 the first service data is sent to the UE.
  • the first service data may include, but is not limited to, eMBB data.
  • step S603 some or all of the second service data is encrypted, and the encrypted second service data is sent to the UE for the time-frequency resource region corresponding to the first service data that the UE fails to receive and the related time.
  • Part or all of the service data of the frequency resource area is decrypted to determine whether the second service data preempts the time-frequency resource of the first service data.
  • encrypting some or all of the second service data may include, but is not limited to, any of the following:
  • the second service data may be scrambled using a preset scrambling code, where the preset scrambling code may include, but is not limited to, an RNTI, and the RNTI may include a C-RNTI or a new type of RNTI.
  • the scrambled second service data may periodically appear in time or frequency.
  • the data to be decrypted may be the scrambled second service data.
  • the scrambled The second service data periodically appears on the frequency.
  • the CRC check may be performed on some or all of the second service data, and then the second service data after the verification is scrambled by using the preset scrambling code, where the preset scrambling code may include but not Limited to RNTI, the RNTI may include a C-RNTI or a novel RNTI.
  • the UE needs to perform descrambling and then perform verification, which is beneficial to improving the success rate of determining the time-frequency resource of the second service data to preempt the first service data.
  • some or all of the second service data may be CRC checked.
  • the embodiment can encrypt part or all of the second service data in multiple manners, and the implementation manner is flexible and diverse.
  • the UE may send the encrypted second service data to the UE by using the encrypted second service data, so that the UE can receive the time-frequency resource region corresponding to the failed first service data and the related time-frequency.
  • Part or all of the service data of the resource area is decrypted to determine whether the second service data preempts the time-frequency resource of the first service data.
  • FIG. 7A is a flowchart of a method for determining a preemptive time-frequency resource according to an exemplary embodiment of the present application. As shown in FIG. 7A, before the step S603, the method may further include:
  • step S602 it is determined that the second service data belongs to the preset scheduling type and determines that the second service data can preempt the time-frequency resource of the first service data.
  • the preset scheduling type may include no scheduling, and the second service data may include but is not limited to URLLC data.
  • the base station may encrypt some or all of the second service data.
  • the second service data can preempt the time-frequency of the first service data. Resources.
  • FIG. 7B is a flowchart of a method for determining a preemptive time-frequency resource according to an exemplary embodiment of the present application. As shown in FIG. 7B, after the step S603, the method may further include:
  • step S604 configuration information is sent to the UE, and the configuration information is used to notify the UE of the relevant time-frequency resource region information used for decryption.
  • the UE by sending the configuration information to the UE, the UE can learn the relevant time-frequency resource region according to the configuration information, so that part or all of the service data of the determined time-frequency resource region and its related time-frequency resource region can be performed. Decrypt.
  • the UE by sending the configuration information to the UE, the UE can learn the relevant time-frequency resource region according to the configuration information, so that part or all of the service data of the determined time-frequency resource region and its related time-frequency resource region can be decrypted.
  • FIG. 8 is a block diagram of a determining apparatus for preempting time-frequency resources according to an exemplary embodiment. As shown in FIG. 8, the determining apparatus for preempting time-frequency resources includes: receiving a reading module 81, determining a decrypting module 82, and determining Module 83.
  • the receiving read module 81 is configured to receive and read the first service data transmitted by the base station.
  • the UE may receive the first service data sent by the base station according to the preset resource unit, where the preset resource unit may include, but is not limited to, a subframe, a slot, and a symbol.
  • the preset resource unit may include, but is not limited to, a subframe, a slot, and a symbol.
  • the code block group (CBG) or the like the first service data may include but is not limited to eMBB data.
  • Determining that the decryption module 82 is configured to, after the receiving and reading module 81 reads the first service data, determine that there is a first service data that fails to be received, and then determine a time-frequency resource region corresponding to the first service data that fails to be received, and Part or all of the service data of the time-frequency resource region and its associated time-frequency resource region are decrypted.
  • the time-frequency resource area corresponding to the service data refers to the area corresponding to the time domain resource and the frequency domain resource occupied by the service data.
  • the relevant time-frequency resource region of a certain time-frequency resource region refers to a time-frequency resource region related to at least one of a time domain and a frequency domain of the time-frequency resource region, a certain time-frequency resource region and its associated time-frequency resource region.
  • the area usually shares certain control information, which may include, but is not limited to, control information that occurs periodically over time and frequency, such as synchronization.
  • the associated time-frequency resource region may include, but is not limited to, an adjacent time-frequency resource region of the time-frequency resource region. As shown in FIG.
  • the time-frequency resource region corresponding to the first service data that is failed to be received is the time-frequency resource region corresponding to the CBG4, and the adjacent time-frequency resource region of the time-frequency resource region corresponding to the CBG4 is the time-frequency resource region in FIG. 1B.
  • Control information including, but not limited to, time and frequency cycles, such as synchronization signals, reference signals, and the like.
  • the determining module 83 is configured to determine, when the decryption module 82 decrypts part or all of the service data of the time-frequency resource region and its associated time-frequency resource region, if the decryption is successful, determining that the second service data preempts the first service data Frequency resources.
  • the second service data may include, but is not limited to, URLLC data.
  • the second service has a higher priority than the first service, that is, the second service has higher requirements for timeliness than the first service.
  • the time-frequency resource region corresponding to the first service data that fails to be received is determined, and part or all of the service data of the time-frequency resource region and the related time-frequency resource region are decrypted.
  • the second service data preempts the time-frequency resources of the first service data, so that the situation of preempting the time-frequency resources between the service data can be determined.
  • FIG. 9A is a block diagram of another apparatus for determining time-frequency resource preemption according to an exemplary embodiment. As shown in FIG. 9A, on the basis of the foregoing embodiment shown in FIG. 8, the apparatus may further include: a receiving module. 84.
  • the receiving module 84 is configured to receive the partially encrypted or fully encrypted second service data sent by the base station before determining that the decryption module 82 decrypts part or all of the service data of the time-frequency resource region and its associated time-frequency resource region.
  • the base station may send the encrypted second service data to the UE, and the second service data is sent to facilitate the UE to fail the reception.
  • the second service data After decrypting part or all of the service data of the time-frequency resource area corresponding to the service data and the related time-frequency resource area, it is determined whether the second service data preempts the time-frequency resource of the first service data.
  • the second service data that is sent by the base station is received, and the condition for determining whether the second service data preempts the time-frequency resource of the first service data is provided.
  • FIG. 9B is a block diagram of another apparatus for determining preemptive time-frequency resources according to an exemplary embodiment. As shown in FIG. 9B, on the basis of the foregoing embodiment shown in FIG. 8, the apparatus may further include: Module 85.
  • the reservation sending module 85 is configured to reserve the second service data of the preempted time-frequency resource after the determining module 83 determines that the second service data preempts the time-frequency resource of the first service data, and send the hybrid automatic weight of the first service data to the base station. Request HARQ feedback information.
  • the time-frequency resource is preempted.
  • the second service data is not erased, that is, the UE reserves the second service data that preempts the time-frequency resource.
  • the purpose of retaining the useful second service data is achieved, so that the second service data can be normally transmitted, and the hybrid automatic retransmission of the first service data is sent to the base station.
  • the HARQ feedback information is requested, so that the base station can determine the eMBB data that failed to be transmitted according to the network, thereby providing conditions for retransmitting the transmitted eMBB data.
  • FIG. 9C is a block diagram of another apparatus for determining preemptive time-frequency resources according to an exemplary embodiment.
  • the reservation sending module 85 may include: A transmitting unit 851 or a second transmitting unit 852.
  • the first sending unit 851 is configured to set the reception success or failure state of the first service data of the preempted time-frequency resource to be successfully received, and send the HARQ feedback information to the base station.
  • the reception success or failure state of the eMBB data corresponding to the CBG4 in FIG. 1B may be set to be successful, and the eMBB data corresponding to other CBGs may be fed back according to the existing manner, that is, the reception success or failure status of the eMBB data corresponding to other CBGs is The receiving is successful, and the corresponding HARQ feedback information is sent to the base station.
  • the second sending unit 852 is configured to send the HARQ feedback information to the base station according to the first data reception success or failure status other than the first service data of the preempted time-frequency resource.
  • FIG. 1B is still taken as an example.
  • the eMBB data corresponding to the CBG4 is the first service data of the preempted time-frequency resource, and the UE may send the CBG1, CBG2, CBG3, CBG5, CBG6, CBG7, and CBG8 to the base station.
  • HARQ feedback information is still taken as an example.
  • the eMBB data corresponding to the CBG4 is the first service data of the preempted time-frequency resource
  • the UE may send the CBG1, CBG2, CBG3, CBG5, CBG6, CBG7, and CBG8 to the base station.
  • HARQ feedback information is still taken as an example.
  • the base station may determine the eMBB data that failed to be transmitted according to this, and retransmit the eMBB data that failed to be transmitted.
  • the HARQ feedback information can be sent to the base station in multiple manners, and the implementation manner is flexible and diverse.
  • FIG. 9D is a block diagram of another apparatus for determining preemptive time-frequency resources according to an exemplary embodiment. As shown in FIG. 9D, on the basis of the foregoing embodiment shown in FIG. 8, the apparatus may further include: erasing Module 86.
  • the erasing module 86 is configured to erase the pre-cached time-frequency resource region if the decryption module 82 determines that the decryption module 82 decrypts part or all of the service data of the time-frequency resource region and its associated time-frequency resource region. Business data.
  • the decryption fails, it is confirmed that the first service data reception fails. Therefore, the pre-cached service data of the time-frequency resource area can be erased.
  • the service data of the pre-cached time-frequency resource region is erased, thereby saving The cache space of the UE.
  • FIG. 9E is a block diagram of another apparatus for determining preemptive time-frequency resources according to an exemplary embodiment. As shown in FIG. 9E, on the basis of the foregoing embodiment shown in FIG. 8, the apparatus may further include: receiving and receiving Module 87.
  • the receiving and learning module 87 is configured to receive configuration information sent by the base station, and obtain relevant time-frequency resources according to the configuration information, before determining that the decryption module 82 decrypts part or all of the service data of the time-frequency resource region and its associated time-frequency resource region. region.
  • the relevant time-frequency resource region can be obtained, so that part or all of the service data of the determined time-frequency resource region and its associated time-frequency resource region can be decrypted.
  • the UE can also learn related time-frequency resource regions by using other methods, for example, the related time-frequency resource region can be obtained in a pre-agreed manner.
  • the implementation manner is simple by receiving the configuration information sent by the base station and obtaining the relevant time-frequency resource region according to the configuration information.
  • FIG. 9F is a block diagram of another apparatus for determining preemptive time-frequency resources according to an exemplary embodiment. As shown in FIG. 9A, on the basis of the foregoing embodiment shown in FIG. 8, determining that the decryption module 82 may include: The scrambling unit 821, the descrambling check unit 822, or the check unit 823.
  • the descrambling unit 821 is configured to descramble some or all of the traffic data of the time-frequency resource region and its associated time-frequency resource region using the preset scrambling code.
  • the preset scrambling code may include, but is not limited to, a Radio Network Temporary Identity (RNTI), and the RNTI may include a Cell Radio Network Temporary Identity (C-RNTI) or a novel RNTI (ie, a customized RNTI).
  • RNTI Radio Network Temporary Identity
  • C-RNTI Cell Radio Network Temporary Identity
  • novel RNTI ie, a customized RNTI
  • the descrambling check unit 822 is configured to descramble some or all of the service data of the time-frequency resource region and its associated time-frequency resource region using the preset scrambling code, and verify the descrambling result.
  • the preset scrambling code may include, but is not limited to, an RNTI, and the RNTI may include a C-RNTI or a new type of RNTI.
  • the descrambling result may be further verified, for example, cyclic redundancy. Test (CRC). If successful solution If the interference is passed and the check is successful, the decryption is successful. Otherwise, the decryption fails.
  • the verification unit 823 is configured to verify some or all of the service data of the time-frequency resource region and its associated time-frequency resource region.
  • part or all of the service data of the time-frequency resource region and its associated time-frequency resource region may be subjected to CRC check. If the check is successful, the decryption is successful, otherwise, the decryption fails.
  • part or all of the service data of the time-frequency resource region and its related time-frequency resource region may be decrypted in multiple manners, and the implementation manner is flexible and diverse.
  • FIG. 10 is a block diagram of still another apparatus for determining time-frequency resource preemption according to an exemplary embodiment.
  • the determining apparatus for preempting time-frequency resources includes: a first sending module 110 and an encrypted sending module 120.
  • the first sending module 110 is configured to send the first service data to the user equipment UE.
  • the first service data may include, but is not limited to, eMBB data.
  • the encryption sending module 120 is configured to encrypt part or all of the second service data after the first sending module 110 sends the first service data, and send the encrypted second service data to the UE for the UE to receive the failure.
  • the part of the time-frequency resource region corresponding to the first service data and the service data of the relevant time-frequency resource region are decrypted to determine whether the second service data preempts the time-frequency resource of the first service data.
  • the UE may send the encrypted second service data to the UE by using the encrypted second service data, so that the UE can receive the time-frequency resource region corresponding to the failed first service data and the related time-frequency.
  • Part or all of the service data of the resource area is decrypted to determine whether the second service data preempts the time-frequency resource of the first service data.
  • FIG. 11A is a block diagram of still another apparatus for determining time-frequency resource preemption according to an exemplary embodiment. As shown in FIG. 11A, on the basis of the foregoing embodiment shown in FIG. 10, the apparatus may further include: determining a module. 130.
  • the determining module 130 is configured to determine that the second service data belongs to the preset scheduling type and determines that the second service data can preempt the time-frequency resource of the first service data before the encryption sending module 120 encrypts part or all of the second service data.
  • the determining module 130 may be configured to determine that the second service data can preempt the first service data if the time-frequency resource region used for scheduling the second service data is located in the time-frequency resource region used for scheduling the first service data. Time-frequency resources.
  • the preset scheduling type may include no scheduling, and the second service data may include but is not limited to the URLLC number. according to.
  • the base station may encrypt some or all of the second service data.
  • the second service data can preempt the time-frequency of the first service data. Resources.
  • FIG. 11B is a block diagram of another apparatus for determining time-frequency resource preemption according to an exemplary embodiment. As shown in FIG. 11B, on the basis of the foregoing embodiment shown in FIG. 10, the apparatus may further include: The sending module 140.
  • the second sending module 140 is configured to send configuration information to the UE after the encrypted sending module 120 sends the encrypted second service data to the UE, where the configuration information is used to notify the UE of the relevant time-frequency resource region information used for decryption.
  • the UE by sending the configuration information to the UE, the UE can learn the relevant time-frequency resource region according to the configuration information, so that part or all of the service data of the determined time-frequency resource region and its related time-frequency resource region can be performed. Decrypt.
  • the UE by sending the configuration information to the UE, the UE can learn the relevant time-frequency resource region according to the configuration information, so that part or all of the service data of the determined time-frequency resource region and its related time-frequency resource region can be decrypted.
  • FIG. 11C is a block diagram of still another apparatus for determining time-frequency resource preemption according to an exemplary embodiment.
  • the encryption sending module 120 may include: The scrambling unit 1201, the check scramble unit 1202, or the check unit 1203.
  • the scrambling unit 1201 is configured to scramble some or all of the second service data using a preset scrambling code.
  • the second service data may be scrambled using a preset scrambling code, where the preset scrambling code may include, but is not limited to, an RNTI, and the RNTI may include a C-RNTI or a new type of RNTI.
  • the scrambled second service data may periodically appear in time or frequency.
  • the data to be decrypted may be the scrambled second service data.
  • the scrambled The second service data periodically appears on the frequency.
  • the verification scrambling unit 1202 is configured to verify part or all of the second service data and to scramble the verified second service data using a preset scrambling code.
  • the CRC check may be performed on some or all of the second service data, and then the second service data after the verification is scrambled by using the preset scrambling code, where the preset scrambling code may include but not Limited to RNTI, the RNTI may include a C-RNTI or a novel RNTI.
  • the UE needs to perform descrambling and then perform verification, which is beneficial to improving the success rate of determining the time-frequency resource of the second service data to preempt the first service data.
  • the verification unit 1203 is configured to verify some or all of the second service data.
  • some or all of the second service data may be CRC checked.
  • some or all of the second service data may be encrypted in multiple manners, and the implementation manner is flexible and diverse.
  • FIG. 12 is a block diagram of a determining apparatus suitable for preempting time-frequency resources, according to an exemplary embodiment.
  • device 1200 can be a user device such as a mobile phone, computer, digital broadcast terminal, messaging device, game console, tablet device, medical device, fitness device, personal digital assistant, and the like.
  • apparatus 1200 can include one or more of the following components: processing component 1202, memory 1204, power component 1206, multimedia component 1208, audio component 1210, input/output (I/O) interface 1212, sensor component 1214, And a communication component 1216.
  • Processing component 1202 typically controls the overall operation of device 1200, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • Processing component 1202 can include one or more processors 1220 to execute instructions to perform all or part of the steps of the above described methods.
  • processing component 1202 can include one or more modules to facilitate interaction between component 1202 and other components.
  • processing component 1202 can include a multimedia module to facilitate interaction between multimedia component 1208 and processing component 1202.
  • Memory 1204 is configured to store various types of data to support operation at device 1200. Examples of such data include instructions for any application or method operating on device 1200, contact data, phone book data, messages, pictures, videos, and the like.
  • the memory 1204 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Disk or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Disk Disk or Optical Disk.
  • Power component 1206 provides power to various components of device 1200.
  • Power component 1206 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 1200.
  • the multimedia component 1208 includes a screen between the device 1200 and the user that provides an output interface.
  • the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
  • the multimedia component 1208 includes a front camera and/or a rear camera. When the device 1200 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
  • the audio component 1210 is configured to output and/or input an audio signal.
  • audio component 1210 includes a microphone (MIC) that is configured to receive an external audio signal when device 1200 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
  • the received audio signal may be further stored in memory 1204 or transmitted via communication component 1216.
  • audio component 1210 also includes a speaker for outputting an audio signal.
  • the I/O interface 1212 provides an interface between the processing component 1202 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
  • Sensor assembly 1214 includes one or more sensors for providing status assessment of various aspects to device 1200.
  • sensor assembly 1214 can detect an open/closed state of device 1200, relative positioning of components, such as the display and keypad of device 1200, and sensor component 1214 can also detect a change in position of one component of device 1200 or device 1200. The presence or absence of contact by the user with the device 1200, the orientation or acceleration/deceleration of the device 1200 and the temperature change of the device 1200.
  • Sensor assembly 1214 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 1214 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor assembly 1214 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 1216 is configured to facilitate wired or wireless communication between device 1200 and other devices.
  • the device 1200 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
  • the communication component 1216 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
  • the communication component 1216 also includes a near field communication (NFC) module to facilitate short range communication.
  • NFC near field communication
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • device 1200 may be implemented by one or more application specific integrated circuits (ASICs), digital Signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation for Perform the above method.
  • ASICs application specific integrated circuits
  • DSP digital Signal processor
  • DSPD digital signal processing device
  • PLD programmable logic device
  • FPGA field programmable gate array
  • controller microcontroller, microprocessor or other electronic component implementation for Perform the above method.
  • non-transitory computer readable storage medium comprising instructions, such as a memory 1204 comprising instructions executable by processor 1220 of apparatus 1200 to perform the above method.
  • the non-transitory computer readable storage medium can be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
  • FIG. 13 is a block diagram of another determining apparatus suitable for preempting time-frequency resources, according to an exemplary embodiment.
  • Apparatus 1300 can be provided as a base station.
  • apparatus 1300 includes a processing component 1322, a wireless transmit/receive component 1324, an antenna component 1326, and a signal processing portion specific to the wireless interface.
  • Processing component 1322 can further include one or more processors.
  • One of the processing components 1322 can be configured to:
  • the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
  • the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment. Those of ordinary skill in the art can understand and implement without any creative effort.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开是关于一种抢占时频资源的确定方法及装置、用户设备、基站和计算机可读存储介质。其中,抢占时频资源的确定方法包括:接收并读取基站发送的第一业务数据,若确定存在接收失败的第一业务数据,则确定接收失败的第一业务数据对应的时频资源区域,并对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密,若解密成功,则确定第二业务数据抢占第一业务数据的时频资源。本公开实施例可以判断出业务数据间抢占时频资源的情况。

Description

抢占时频资源的确定方法及装置、用户设备和基站 技术领域
本公开涉及通信技术领域,尤其涉及一种抢占时频资源的确定方法及装置、用户设备、基站和计算机可读存储介质。
背景技术
随着通信技术的发展,出现了第五代移动通信技术(5th Generation,简称5G)。5G目前的业务类型至少包括增强移动宽带(enhanced Mobile Broad Band,简称eMBB)、海量机器类通信(massive Machine Type Communication,简称mMTC)、超高可靠与低延迟的通信(Ultra Reliable Low Latency Communication,简称URLLC)等多种类型。这些业务同属数据业务,但对时延和可靠性的要求各不相同,例如URLLC业务用于车联网等需要低时延的领域,对及时性要求很高,建立业务时需要及时,甚至对之前的业务具有抢占性。而mMTC业务则通常对时延并不敏感,可以间隔较长时间送达数据。实现对时延敏感业务有效传输的一种方式是改进混合自动重传请求(Hybrid Automatic Repeat reQuest,简称HARQ)的传输,例如,使得重传反馈更快更准确。
长期演进(Long Term Evolution,简称LTE)中是以传输块(Transmission Block,简称TB)为单位进行HARQ反馈,每个TB反馈1比特(bit)的应答(ACK)或者非应答(NACK)消息。为了提高重传准确率,第三代合作伙伴计划(3GPP)提出基于代码块组(Code Block Group,简称CBG)进行重传,CBG是TB中更小的数据单元单位,一个CBG对应1bit的ACK或者NACK反馈,由于重传的颗粒度将更小,因此可以更精确地反映错误传输的位置,进而使得重传更准确,而由于需要重传的数据量更小,因此,重传效率更高。
但是,如果出现业务抢占(preemption)的情况,例如,当eMBB业务已经开始传输或即将开始传输时,URLLC业务来临,则URLLC会抢占eMBB的传输时频资源,导致原有eMBB业务在HARQ反馈时错误地认为eMBB数据传输错误,从而丢弃有用的URLLC数据。而如何判断URLLC抢占eMBB的时频资源是需要解决的一个技术问题。
发明内容
本申请公开了一种抢占时频资源的确定方法及装置、用户设备、基站和计算机可读存储 介质,以判断出业务数据间抢占时频资源的情况。
根据本公开实施例的第一方面,提供一种抢占时频资源的确定方法,所述方法包括:
接收并读取基站发送的第一业务数据;
若确定存在接收失败的第一业务数据,则确定接收失败的第一业务数据对应的时频资源区域,并对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密;
若解密成功,则确定第二业务数据抢占第一业务数据的时频资源。
在一实施例中,所述方法还包括:
在所述对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之前,接收基站发送的部分加密或全部加密后的第二业务数据。
在一实施例中,在所述确定第二业务数据抢占第一业务数据的时频资源之后,所述方法还包括:
保留抢占所述时频资源的第二业务数据,并向所述基站发送所述第一业务数据的混合自动重传请求HARQ反馈信息。
在一实施例中,所述向所述基站发送所述第一业务数据的HARQ反馈信息,包括:
将被抢占所述时频资源的第一业务数据的接收成败状态设置为接收成功,并向所述基站发送所述HARQ反馈信息;或者
根据除被抢占所述时频资源的第一业务数据之外的第一数据接收成败状态,向所述基站发送所述HARQ反馈信息。
在一实施例中,所述方法还包括:
若解密失败,则擦写掉预先缓存的所述时频资源区域的业务数据。
在一实施例中,在所述对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之前,所述方法还包括:
接收所述基站发送的配置信息,并根据所述配置信息获知所述相关时频资源区域。
在一实施例中,所述对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密,包括:
使用预设扰码对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰;或者
使用预设扰码对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰,并对解扰结果进行校验;或者
对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行校验;
其中,所述预设扰码包括无线网络临时标识RNTI,所述RNTI包括小区无线网络临时标识C-RNTI或新型的RNTI。
根据本公开实施例的第二方面,提供一种抢占时频资源的确定方法,所述方法包括:
向用户设备UE发送第一业务数据;
对部分或全部第二业务数据进行加密,并向所述UE发送加密后的第二业务数据,以用于所述UE对接收失败的第一业务数据对应的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密来确定第二业务数据是否抢占第一业务数据的时频资源。
在一实施例中,所述方法还包括:
在所述对部分或全部第二业务数据进行加密之前,确定所述第二业务数据属于预设调度类型且确定所述第二业务数据能够抢占所述第一业务数据的时频资源。
在一实施例中,所述确定所述第二业务数据能够抢占所述第一业务数据的时频资源,包括:
若调度所述第二业务数据所使用的时频资源区域位于调度所述第一业务数据所使用的时频资源区域内,则确定所述第二业务数据能够抢占所述第一业务数据的时频资源。
在一实施例中,所述方法还包括:
在所述向所述UE发送加密后的第二业务数据之后,向所述UE发送配置信息,所述配置信息用于通知所述UE用于解密的相关时频资源区域信息。
在一实施例中,所述对部分或全部第二业务数据进行加密,包括:
使用预设扰码对部分或全部第二业务数据进行加扰;或者
对部分或全部第二业务数据进行校验,并使用预设扰码对校验后的第二业务数据进行加扰;或者
对部分或全部第二业务数据进行校验;
其中,所述预设扰码包括无线网络临时标识RNTI,所述RNTI包括小区无线网络临时标识C-RNTI或新型的RNTI。
根据本公开实施例的第三方面,提供一种抢占时频资源的确定装置,所述装置包括:
接收读取模块,被配置为接收并读取基站发送的第一业务数据;
确定解密模块,被配置为在所述接收读取模块读取所述第一业务数据之后,若确定存在接收失败的第一业务数据,则确定接收失败的第一业务数据对应的时频资源区域,并对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密;
确定模块,被配置为在所述确定解密模块对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之后,若解密成功,则确定第二业务数据抢占第一业务数据的时频资源。
在一实施例中,所述装置还包括:
接收模块,被配置为在所述确定解密模块对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之前,接收基站发送的部分加密或全部加密后的第二业务数据。
在一实施例中,所述装置还包括:
保留发送模块,被配置为在所述确定模块确定第二业务数据抢占第一业务数据的时频资源之后,保留抢占所述时频资源的第二业务数据,并向所述基站发送所述第一业务数据的混合自动重传请求HARQ反馈信息。
在一实施例中,所述保留发送模块包括:
第一发送单元,被配置为将被抢占所述时频资源的第一业务数据的接收成败状态设置为接收成功,并向所述基站发送所述HARQ反馈信息;或者
第二发送单元,被配置为根据除被抢占所述时频资源的第一业务数据之外的第一数据接收成败状态,向所述基站发送所述HARQ反馈信息。
在一实施例中,所述装置还包括:
擦写模块,被配置为在所述确定解密模块对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之后,若解密失败,则擦写掉预先缓存的所述时频资源区域的业务数据。
在一实施例中,所述装置还包括:
接收获知模块,被配置为在所述确定解密模块对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之前,接收所述基站发送的配置信息,并根据所述配置信 息获知所述相关时频资源区域。
在一实施例中,所述确定解密模块包括:
解扰单元,被配置为使用预设扰码对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰;或者
解扰校验单元,被配置为使用预设扰码对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰,并对解扰结果进行校验;或者
校验单元,被配置为对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行校验;
其中,所述预设扰码包括无线网络临时标识RNTI,所述RNTI包括小区无线网络临时标识C-RNTI或新型的RNTI。
根据本公开实施例的第四方面,提供一种抢占时频资源的确定装置,所述装置包括:
第一发送模块,被配置为向用户设备UE发送第一业务数据;
加密发送模块,被配置为在所述第一发送模块发送第一业务数据之后,对部分或全部第二业务数据进行加密,并向所述UE发送加密后的第二业务数据,以用于所述UE对接收失败的第一业务数据对应的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密来确定第二业务数据是否抢占第一业务数据的时频资源。
在一实施例中,所述装置还包括:
确定模块,被配置为在所述加密发送模块对部分或全部第二业务数据进行加密之前,确定所述第二业务数据属于预设调度类型且确定所述第二业务数据能够抢占所述第一业务数据的时频资源。
在一实施例中,所述确定模块,被配置为若调度所述第二业务数据所使用的时频资源区域位于调度所述第一业务数据所使用的时频资源区域内,则确定所述第二业务数据能够抢占所述第一业务数据的时频资源。
在一实施例中,所述装置还包括:
第二发送模块,被配置为在所述加密发送模块向所述UE发送加密后的第二业务数据之后,向所述UE发送配置信息,所述配置信息用于通知所述UE用于解密的相关时频资源区域信息。
在一实施例中,所述加密发送模块包括:
加扰单元,被配置为使用预设扰码对部分或全部第二业务数据进行加扰;或者
校验加扰单元,被配置为对部分或全部第二业务数据进行校验,并使用预设扰码对校验后的第二业务数据进行加扰;或者
校验单元,被配置为对部分或全部第二业务数据进行校验;
其中,所述预设扰码包括无线网络临时标识RNTI,所述RNTI包括小区无线网络临时标识C-RNTI或新型的RNTI。
根据本公开实施例的第五方面,提供一种用户设备,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收并读取基站发送的第一业务数据;
若确定存在接收失败的第一业务数据,则确定接收失败的第一业务数据对应的时频资源区域,并对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密;
若解密成功,则确定第二业务数据抢占第一业务数据的时频资源。
根据本公开实施例的第六方面,提供一种基站,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
向用户设备UE发送第一业务数据;
对部分或全部第二业务数据进行加密,并向所述UE发送加密后的第二业务数据,以用于所述UE对接收失败的第一业务数据对应的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密来确定第二业务数据是否抢占第一业务数据的时频资源。
根据本公开实施例的第七方面,提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现上述抢占时频资源的确定方法的步骤。
根据本公开实施例的第八方面,提供一种计算机可读存储介质,其上存储有计算机程序, 该程序被处理器执行时实现上述抢占时频资源的确定方法的步骤。
本公开的实施例提供的技术方案可以包括以下有益效果:
通过确定接收失败的第一业务数据对应的时频资源区域,并对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密,若解密成功,则可以确定第二业务数据抢占第一业务数据的时频资源,从而可以判断出业务数据间抢占时频资源的情况。
通过接收基站发送的部分加密或全部加密后的第二业务数据,为后续判断第二业务数据是否抢占第一业务数据的时频资源提供条件。
通过保留抢占时频资源的第二业务数据,达到保留有用的第二业务数据的目的,从而使得第二业务数据可以正常传输,通过向基站发送第一业务数据的混合自动重传请求HARQ反馈信息,使得基站可以据此判断出发送失败的eMBB数据,从而为重传发送失败的eMBB数据提供条件。
可以通过多种方式向基站发送HARQ反馈信息,实现方式灵活多样。
在对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之后,若确认解密失败,则擦写掉预先缓存的时频资源区域的业务数据,从而可以节省UE的缓存空间。
通过接收基站发送的配置信息,并根据该配置信息获知相关时频资源区域,实现方式简单。
可以通过多种方式对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密,实现方式灵活多样。
通过对部分或全部第二业务数据进行加密,并向UE发送加密后的第二业务数据,使得UE可以对接收失败的第一业务数据对应的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密来确定第二业务数据是否抢占第一业务数据的时频资源。
通过在确定第二业务数据属于免调度且确定第二业务数据能够抢占第一业务数据的时频资源之后,对部分或全部第二业务数据进行加密,有利于节省基站的计算资源。
通过调度第二业务数据所使用的时频资源区域位于调度第一业务数据所使用的时频资源区域内,来确定第二业务数据能够抢占第一业务数据的时频资源,实现方式简单。
通过向UE发送配置信息,使得UE可以根据该配置信息获知相关时频资源区域,从而可以对确定的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密。
可以通过多种方式对部分或全部第二业务数据进行加密,实现方式灵活多样。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。
图1A是本申请一示例性实施例示出的一种抢占时频资源的确定方法的流程图;
图1B是本申请一示例性实施例示出的一种存在接收失败的第一业务数据的示意图;
图2是本申请一示例性实施例示出的另一种抢占时频资源的确定方法的流程图;
图3是本申请一示例性实施例示出的另一种抢占时频资源的确定方法的流程图;
图4是本申请一示例性实施例示出的另一种抢占时频资源的确定方法的流程图;
图5是本申请一示例性实施例示出的另一种抢占时频资源的确定方法的流程图;
图6是本申请一示例性实施例示出的又一种抢占时频资源的确定方法的流程图;
图7A是本申请一示例性实施例示出的再一种抢占时频资源的确定方法的流程图;
图7B是本申请一示例性实施例示出的再一种抢占时频资源的确定方法的流程图;
图8是根据一示例性实施例示出的一种抢占时频资源的确定装置的框图;
图9A是根据一示例性实施例示出的另一种抢占时频资源的确定装置的框图;
图9B是根据一示例性实施例示出的另一种抢占时频资源的确定装置的框图;
图9C是根据一示例性实施例示出的另一种抢占时频资源的确定装置的框图;
图9D是根据一示例性实施例示出的另一种抢占时频资源的确定装置的框图;
图9E是根据一示例性实施例示出的另一种抢占时频资源的确定装置的框图;
图9F是根据一示例性实施例示出的另一种抢占时频资源的确定装置的框图;
图10是根据一示例性实施例示出的又一种抢占时频资源的确定装置的框图;
图11A是根据一示例性实施例示出的再一种抢占时频资源的确定装置的框图;
图11B是根据一示例性实施例示出的再一种抢占时频资源的确定装置的框图;
图11C是根据一示例性实施例示出的再一种抢占时频资源的确定装置的框图;
图12是根据一示例性实施例示出的一种适用于抢占时频资源的确定装置的框图;
图13是根据一示例性实施例示出的另一种适用于抢占时频资源的确定装置的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一些方面相一致的装置和方法的例子。
图1A是本申请一示例性实施例示出的一种抢占时频资源的确定方法的流程图,该实施例从用户设备(UE)侧进行描述,如图1A所示,抢占时频资源的确定方法包括:
在步骤S101中,接收并读取基站发送的第一业务数据。
在该实施例中,UE可以按照预设资源单元接收基站发送的第一业务数据,其中,预设资源单元可以包括但不局限于子帧(subframe)、时隙(slot)、符号(symbol)和代码块组(CBG)等,第一业务数据可以包括但不局限于eMBB数据。
在步骤S103中,若确定存在接收失败的第一业务数据,则确定接收失败的第一业务数据对应的时频资源区域,并对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密。
其中,业务数据对应的时频资源区域是指该业务数据所占用的时域资源和频域资源所对应的区域。某个时频资源区域的相关时频资源区域是指与该时频资源区域的时域和频域中的至少一项相关的时频资源区域,某个时频资源区域及其相关时频资源区域通常共用某些控制信息,这些控制信息可以包括但不局限于在时间和频率上周期出现的控制信息,例如同步信号或参考信号等,相关时频资源区域可以包括但不局限于该时频资源区域的邻近时频资源区域。如图1B所示,接收失败的第一业务数据对应的时频资源区域是CBG4对应的时频资源区域,CBG4对应的时频资源区域的邻近时频资源区域为图1B中的时频资源区域X。包括但不限于时间和频率上周期出现的控制信息,如同步信号、参考信号等。
在该实施例中,对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密可以包括但不局限于以下任一项:
1)使用预设扰码对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰。
其中,预设扰码可以包括但不局限于无线网络临时标识(RNTI),该RNTI可以包括小区无线网络临时标识(C-RNTI)或新型的RNTI(即自定义的RNTI)。在该实施例中,使用预设扰码对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰之后,若得到的业务数据为预先约定的业务数据,则表明解密成功,否则,解密失败。
2)使用预设扰码对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰,并对解扰结果进行校验。
其中,预设扰码可以包括但不局限于RNTI,该RNTI可以包括C-RNTI或新型的RNTI。在该实施例中,在使用预设扰码对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰之后,可以对解扰结果进行进一步校验,例如循环冗余校验(CRC)。若成功解扰且通过校验,则表明解密成功,否则,解密失败。
3)对时频资源区域及其相关时频资源区域的部分或全部业务数据进行校验。
在该实施例中,可以对时频资源区域及其相关时频资源区域的部分或全部业务数据进行CRC校验,若通过校验,则表明解密成功,否则,解密失败。
由此可见,该实施例可以通过多种方式对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密,实现方式灵活多样。
在步骤S105中,若解密成功,则确定第二业务数据抢占第一业务数据的时频资源。
其中,第二业务数据可以包括但不局限于URLLC数据。第二业务的优先级要高于第一业务,即第二业务相对于第一业务对及时性要求更高。
上述实施例,通过确定接收失败的第一业务数据对应的时频资源区域,并对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密,若解密成功,则可以确定第二业务数据抢占第一业务数据的时频资源,从而可以判断出业务数据间抢占时频资源的情况。
图2是本申请一示例性实施例示出的另一种抢占时频资源的确定方法的流程图,如图2所示,在上述步骤S103之后,该方法还可以包括:
在步骤S104中,若解密失败,则擦写掉预先缓存的时频资源区域的业务数据。
若解密失败,则确认第一业务数据接收失败,因此,可以擦写掉预先缓存的该时频资源区域的业务数据。
上述实施例,在对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之后,若确认解密失败,则擦写掉预先缓存的时频资源区域的业务数据,从而可以节省UE 的缓存空间。
图3是本申请一示例性实施例示出的另一种抢占时频资源的确定方法的流程图,如图3所示,在上述步骤S103之前,该方法还可以包括:
在步骤S102中,接收基站发送的部分加密或全部加密后的第二业务数据。
在该实施例中,基站在向UE发送第一业务数据之后,可以向UE发送部分加密或全部加密后的第二业务数据,之所以发送部分加密或全部加密后的第二业务数据,是为了方便UE在对接收失败的第一业务数据对应的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之后,可以判断出第二业务数据是否抢占第一业务数据的时频资源。
上述实施例,通过接收基站发送的部分加密或全部加密后的第二业务数据,为后续判断第二业务数据是否抢占第一业务数据的时频资源提供条件。
图4是本申请一示例性实施例示出的另一种抢占时频资源的确定方法的流程图,如图4所示,在上述步骤S103之前,该方法还可以包括:
在步骤S106中,接收基站发送的配置信息,并根据该配置信息获知相关时频资源区域。
在该实施例中,通过接收基站发送的配置信息,可以获知相关时频资源区域,从而可以对确定的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密。
另外,UE还可以通过其他方式获知相关时频资源区域,例如可以通过预先约定的方式获知相关时频资源区域。
上述实施例,通过接收基站发送的配置信息,并根据该配置信息获知相关时频资源区域,实现方式简单。
图5是本申请一示例性实施例示出的另一种抢占时频资源的确定方法的流程图,如图5所示,在上述步骤S105之后,该方法还可以包括:
在步骤S107中,保留抢占时频资源的第二业务数据,并向基站发送第一业务数据的HARQ反馈信息。
在该实施例中,由于抢占时频资源的第二业务数据是有用的数据,故抢占时频资源的第二业务数据不会被擦写掉,即UE保留抢占时频资源的第二业务数据。
在该实施例中,UE可以通过多种方式向基站发送第一业务数据的HARQ反馈信息,例如可以通过以下两种方式向基站发送HARQ反馈信息:
第一种方式,可以将被抢占时频资源的第一业务数据的接收成败状态设置为接收成功,并向基站发送HARQ反馈信息。
例如,可以将图1B中CBG4对应的eMBB数据的接收成败状态设置为接收成功,对于其他CBG对应的eMBB数据可以按照现有的方式进行反馈,即其他CBG对应的eMBB数据的接收成败状态均为接收成功,并向基站发送对应的HARQ反馈信息。
第二种方式,可以根据除被抢占时频资源的第一业务数据之外的第一数据接收成败状态,向基站发送HARQ反馈信息。
仍然以图1B为例进行描述,在图1B中,CBG4对应的eMBB数据为被抢占时频资源的第一业务数据,UE可以向基站发送CBG1、CBG2、CBG3、CBG5、CBG6、CBG7和CBG8的HARQ反馈信息。
基站在接收到UE发送的HARQ反馈信息后,可以据此判断出发送失败的eMBB数据,并重传发送失败的eMBB数据。
由此可见,该实施例可以通过多种方式向基站发送HARQ反馈信息,实现方式灵活多样。
上述实施例,通过保留抢占时频资源的第二业务数据,达到保留有用的第二业务数据的目的,从而使得第二业务数据可以正常传输,通过向基站发送第一业务数据的混合自动重传请求HARQ反馈信息,使得基站可以据此判断出发送失败的eMBB数据,从而为重传发送失败的eMBB数据提供条件。
图6是本申请一示例性实施例示出的又一种抢占时频资源的确定方法的流程图,该实施例从用基站侧进行描述,如图6所示,抢占时频资源的确定方法包括:
在步骤S601中,向UE发送第一业务数据。
其中,第一业务数据可以包括但不局限于eMBB数据。
在步骤S603中,对部分或全部第二业务数据进行加密,并向UE发送加密后的第二业务数据,以用于UE对接收失败的第一业务数据对应的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密来确定第二业务数据是否抢占第一业务数据的时频资源。
在该实施例中,对部分或全部第二业务数据进行加密可以包括但不局限于以下任一项:
1)使用预设扰码对部分或全部第二业务数据进行加扰。
在该实施例中,可以使用预设扰码对部分或全部第二业务数据进行加扰,其中,预设扰码可以包括但不局限于RNTI,该RNTI可以包括C-RNTI或新型的RNTI。加扰后的第二业务数据可以在时间或频率上周期性出现,如图1B所示,待解密的数据可以是加扰后的第二业务数据,从图1B可以看出,加扰后的第二业务数据在频率上周期性出现。
2)对部分或全部第二业务数据进行校验,并使用预设扰码对校验后的第二业务数据进行加扰。
在该实施例中,可以先对部分或全部第二业务数据进行CRC校验,然后使用预设扰码对校验后的第二业务数据进行加扰,其中,预设扰码可以包括但不局限于RNTI,该RNTI可以包括C-RNTI或新型的RNTI。这样,UE在接收到加扰后的第二业务数据后需要先解扰,然后进行校验,有利于提高确定第二业务数据抢占第一业务数据的时频资源的成功率。
3)对部分或全部第二业务数据进行校验。
在该实施例中,可以对部分或全部第二业务数据进行CRC校验。
由此可见,该实施例可以通过多种方式对部分或全部第二业务数据进行加密,实现方式灵活多样。
上述实施例,通过对部分或全部第二业务数据进行加密,并向UE发送加密后的第二业务数据,使得UE可以对接收失败的第一业务数据对应的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密来确定第二业务数据是否抢占第一业务数据的时频资源。
图7A是本申请一示例性实施例示出的再一种抢占时频资源的确定方法的流程图,如图7A所示,在上述步骤S603之前,该方法还可以包括:
在步骤S602中,确定第二业务数据属于预设调度类型且确定第二业务数据能够抢占第一业务数据的时频资源。
其中,预设调度类型可以包括免调度,第二业务数据可以包括但不局限于URLLC数据。
在该实施例中,基站在确定第二业务数据属于免调度且确定第二业务数据能够抢占第一业务数据的时频资源之后,可以对部分或全部第二业务数据进行加密。这样做的好处是,如果确定第二业务数据不能够抢占第一业务数据的时频资源,则可以不对第二业务数据进行加密,从而可以节省基站的计算资源。
在该实施例中,若调度第二业务数据所使用的时频资源区域位于调度第一业务数据所使用的时频资源区域内,则可以确定第二业务数据能够抢占第一业务数据的时频资源。
上述实施例,通过在确定第二业务数据属于免调度且确定第二业务数据能够抢占第一业务数据的时频资源之后,对部分或全部第二业务数据进行加密,有利于节省基站的计算资源。
图7B是本申请一示例性实施例示出的再一种抢占时频资源的确定方法的流程图,如图7B所示,在上述步骤S603之后,该方法还可以包括:
在步骤S604中,向UE发送配置信息,该配置信息用于通知UE用于解密的相关时频资源区域信息。
在该实施例中,通过向UE发送配置信息,使得UE可以根据该配置信息获知相关时频资源区域,从而可以对确定的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密。
上述实施例,通过向UE发送配置信息,使得UE可以根据该配置信息获知相关时频资源区域,从而可以对确定的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密。
图8是根据一示例性实施例示出的一种抢占时频资源的确定装置的框图,如图8所示,抢占时频资源的确定装置包括:接收读取模块81、确定解密模块82和确定模块83。
接收读取模块81被配置为接收并读取基站发送的第一业务数据。
在该实施例中,UE可以按照预设资源单元接收基站发送的第一业务数据,其中,预设资源单元可以包括但不局限于子帧(subframe)、时隙(slot)、符号(symbol)和代码块组(CBG)等,第一业务数据可以包括但不局限于eMBB数据。
确定解密模块82被配置为在接收读取模块81读取第一业务数据之后,若确定存在接收失败的第一业务数据,则确定接收失败的第一业务数据对应的时频资源区域,并对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密。
其中,业务数据对应的时频资源区域是指该业务数据所占用的时域资源和频域资源所对应的区域。某个时频资源区域的相关时频资源区域是指与该时频资源区域的时域和频域中的至少一项相关的时频资源区域,某个时频资源区域及其相关时频资源区域通常共用某些控制信息,这些控制信息可以包括但不局限于在时间和频率上周期出现的控制信息,例如同步 信号或参考信号等,相关时频资源区域可以包括但不局限于该时频资源区域的邻近时频资源区域。如图1B所示,接收失败的第一业务数据对应的时频资源区域是CBG4对应的时频资源区域,CBG4对应的时频资源区域的邻近时频资源区域为图1B中的时频资源区域X。包括但不限于时间和频率上周期出现的控制信息,如同步信号、参考信号等。
确定模块83被配置为在确定解密模块82对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之后,若解密成功,则确定第二业务数据抢占第一业务数据的时频资源。
其中,第二业务数据可以包括但不局限于URLLC数据。第二业务的优先级要高于第一业务,即第二业务相对于第一业务对及时性要求更高。
上述实施例,通过确定接收失败的第一业务数据对应的时频资源区域,并对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密,若解密成功,则可以确定第二业务数据抢占第一业务数据的时频资源,从而可以判断出业务数据间抢占时频资源的情况。
图9A是根据一示例性实施例示出的另一种抢占时频资源的确定装置的框图,如图9A所示,在上述图8所示实施例的基础上,该装置还可以包括:接收模块84。
接收模块84被配置为在确定解密模块82对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之前,接收基站发送的部分加密或全部加密后的第二业务数据。
在该实施例中,基站在向UE发送第一业务数据之后,可以向UE发送加密后的第二业务数据,之所以发送加密后的第二业务数据,是为了方便UE在对接收失败的第一业务数据对应的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之后,可以判断出第二业务数据是否抢占第一业务数据的时频资源。
上述实施例,通过接收基站发送的加密后的第二业务数据,为后续判断第二业务数据是否抢占第一业务数据的时频资源提供条件。
图9B是根据一示例性实施例示出的另一种抢占时频资源的确定装置的框图,如图9B所示,在上述图8所示实施例的基础上,该装置还可以包括:保留发送模块85。
保留发送模块85被配置为在确定模块83确定第二业务数据抢占第一业务数据的时频资源之后,保留抢占时频资源的第二业务数据,并向基站发送第一业务数据的混合自动重传请求HARQ反馈信息。
在该实施例中,由于抢占时频资源的第二业务数据是有用的数据,故抢占时频资源的 第二业务数据不会被擦写掉,即UE保留抢占时频资源的第二业务数据。
上述实施例,通过保留抢占时频资源的第二业务数据,达到保留有用的第二业务数据的目的,从而使得第二业务数据可以正常传输,通过向基站发送第一业务数据的混合自动重传请求HARQ反馈信息,使得基站可以据此判断出发送失败的eMBB数据,从而为重传发送失败的eMBB数据提供条件。
图9C是根据一示例性实施例示出的另一种抢占时频资源的确定装置的框图,如图9C所示,在上述图9B所示实施例的基础上,保留发送模块85可以包括:第一发送单元851或者第二发送单元852。
第一发送单元851被配置为将被抢占时频资源的第一业务数据的接收成败状态设置为接收成功,并向基站发送HARQ反馈信息。
例如,可以将图1B中CBG4对应的eMBB数据的接收成败状态设置为接收成功,对于其他CBG对应的eMBB数据可以按照现有的方式进行反馈,即其他CBG对应的eMBB数据的接收成败状态均为接收成功,并向基站发送对应的HARQ反馈信息。
第二发送单元852被配置为根据除被抢占时频资源的第一业务数据之外的第一数据接收成败状态,向基站发送HARQ反馈信息。
仍然以图1B为例进行描述,在图1B中,CBG4对应的eMBB数据为被抢占时频资源的第一业务数据,UE可以向基站发送CBG1、CBG2、CBG3、CBG5、CBG6、CBG7和CBG8的HARQ反馈信息。
基站在接收到UE发送的HARQ反馈信息后,可以据此判断出发送失败的eMBB数据,并重传发送失败的eMBB数据。
上述实施例,可以通过多种方式向基站发送HARQ反馈信息,实现方式灵活多样。
图9D是根据一示例性实施例示出的另一种抢占时频资源的确定装置的框图,如图9D所示,在上述图8所示实施例的基础上,该装置还可以包括:擦写模块86。
擦写模块86被配置为在确定解密模块82对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之后,若解密失败,则擦写掉预先缓存的时频资源区域的业务数据。
若解密失败,则确认第一业务数据接收失败,因此,可以擦写掉预先缓存的该时频资源区域的业务数据。
上述实施例,在对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之后,若确认解密失败,则擦写掉预先缓存的时频资源区域的业务数据,从而可以节省UE的缓存空间。
图9E是根据一示例性实施例示出的另一种抢占时频资源的确定装置的框图,如图9E所示,在上述图8所示实施例的基础上,该装置还可以包括:接收获知模块87。
接收获知模块87被配置为在确定解密模块82对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之前,接收基站发送的配置信息,并根据配置信息获知相关时频资源区域。
在该实施例中,通过接收基站发送的配置信息,可以获知相关时频资源区域,从而可以对确定的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密。
另外,UE还可以通过其他方式获知相关时频资源区域,例如可以通过预先约定的方式获知相关时频资源区域。
上述实施例,通过接收基站发送的配置信息,并根据该配置信息获知相关时频资源区域,实现方式简单。
图9F是根据一示例性实施例示出的另一种抢占时频资源的确定装置的框图,如图9A所示,在上述图8所示实施例的基础上,确定解密模块82可以包括:解扰单元821、解扰校验单元822或者校验单元823。
解扰单元821被配置为使用预设扰码对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰。
其中,预设扰码可以包括但不局限于无线网络临时标识(RNTI),该RNTI可以包括小区无线网络临时标识(C-RNTI)或新型的RNTI(即自定义的RNTI)。在该实施例中,使用预设扰码对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰之后,若得到的业务数据为预先约定的业务数据,则表明解密成功,否则,解密失败。
解扰校验单元822被配置为使用预设扰码对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰,并对解扰结果进行校验。
其中,预设扰码可以包括但不局限于RNTI,该RNTI可以包括C-RNTI或新型的RNTI。在该实施例中,在使用预设扰码对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰之后,可以对解扰结果进行进一步校验,例如循环冗余校验(CRC)。若成功解 扰且通过校验,则表明解密成功,否则,解密失败。
校验单元823被配置为对时频资源区域及其相关时频资源区域的部分或全部业务数据进行校验。
在该实施例中,可以对时频资源区域及其相关时频资源区域的部分或全部业务数据进行CRC校验,若通过校验,则表明解密成功,否则,解密失败。
上述实施例,可以通过多种方式对时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密,实现方式灵活多样。
图10是根据一示例性实施例示出的又一种抢占时频资源的确定装置的框图,如图10所示,抢占时频资源的确定装置包括:第一发送模块110和加密发送模块120。
第一发送模块110被配置为向用户设备UE发送第一业务数据。
其中,第一业务数据可以包括但不局限于eMBB数据。
加密发送模块120被配置为在第一发送模块110发送第一业务数据之后,对部分或全部第二业务数据进行加密,并向UE发送加密后的第二业务数据,以用于UE对接收失败的第一业务数据对应的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密来确定第二业务数据是否抢占第一业务数据的时频资源。
上述实施例,通过对部分或全部第二业务数据进行加密,并向UE发送加密后的第二业务数据,使得UE可以对接收失败的第一业务数据对应的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密来确定第二业务数据是否抢占第一业务数据的时频资源。
图11A是根据一示例性实施例示出的再一种抢占时频资源的确定装置的框图,如图11A所示,在上述图10所示实施例的基础上,该装置还可以包括:确定模块130。
确定模块130被配置为在加密发送模块120对部分或全部第二业务数据进行加密之前,确定第二业务数据属于预设调度类型且确定第二业务数据能够抢占第一业务数据的时频资源。
其中,确定模块130可以被配置为若调度第二业务数据所使用的时频资源区域位于调度第一业务数据所使用的时频资源区域内,则确定第二业务数据能够抢占第一业务数据的时频资源。
其中,预设调度类型可以包括免调度,第二业务数据可以包括但不局限于URLLC数 据。
在该实施例中,基站在确定第二业务数据属于免调度且确定第二业务数据能够抢占第一业务数据的时频资源之后,可以对部分或全部第二业务数据进行加密。这样做的好处是,如果确定第二业务数据不能够抢占第一业务数据的时频资源,则可以不对第二业务数据进行加密,从而可以节省基站的计算资源。
在该实施例中,若调度第二业务数据所使用的时频资源区域位于调度第一业务数据所使用的时频资源区域内,则可以确定第二业务数据能够抢占第一业务数据的时频资源。
上述实施例,通过在确定第二业务数据属于免调度且确定第二业务数据能够抢占第一业务数据的时频资源之后,对部分或全部第二业务数据进行加密,有利于节省基站的计算资源。
图11B是根据一示例性实施例示出的再一种抢占时频资源的确定装置的框图,如图11B所示,在上述图10所示实施例的基础上,该装置还可以包括:第二发送模块140。
第二发送模块140被配置为在加密发送模块120向UE发送加密后的第二业务数据之后,向UE发送配置信息,配置信息用于通知UE用于解密的相关时频资源区域信息。
在该实施例中,通过向UE发送配置信息,使得UE可以根据该配置信息获知相关时频资源区域,从而可以对确定的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密。
上述实施例,通过向UE发送配置信息,使得UE可以根据该配置信息获知相关时频资源区域,从而可以对确定的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密。
图11C是根据一示例性实施例示出的再一种抢占时频资源的确定装置的框图,如图11C所示,在上述图10所示实施例的基础上,加密发送模块120可以包括:加扰单元1201、校验加扰单元1202或者校验单元1203。
加扰单元1201被配置为使用预设扰码对部分或全部第二业务数据进行加扰。
在该实施例中,可以使用预设扰码对部分或全部第二业务数据进行加扰,其中,预设扰码可以包括但不局限于RNTI,该RNTI可以包括C-RNTI或新型的RNTI。加扰后的第二业务数据可以在时间或频率上周期性出现,如图1B所示,待解密的数据可以是加扰后的第二业务数据,从图1B可以看出,加扰后的第二业务数据在频率上周期性出现。
校验加扰单元1202被配置为对部分或全部第二业务数据进行校验,并使用预设扰码对校验后的第二业务数据进行加扰。
在该实施例中,可以先对部分或全部第二业务数据进行CRC校验,然后使用预设扰码对校验后的第二业务数据进行加扰,其中,预设扰码可以包括但不局限于RNTI,该RNTI可以包括C-RNTI或新型的RNTI。这样,UE在接收到加扰后的第二业务数据后需要先解扰,然后进行校验,有利于提高确定第二业务数据抢占第一业务数据的时频资源的成功率。
校验单元1203被配置为对部分或全部第二业务数据进行校验。
在该实施例中,可以对部分或全部第二业务数据进行CRC校验。
上述实施例,可以通过多种方式对部分或全部第二业务数据进行加密,实现方式灵活多样。
图12是根据一示例性实施例示出的一种适用于抢占时频资源的确定装置的框图。例如,装置1200可以是移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等用户设备。
参照图12,装置1200可以包括以下一个或多个组件:处理组件1202,存储器1204,电源组件1206,多媒体组件1208,音频组件1210,输入/输出(I/O)的接口1212,传感器组件1214,以及通信组件1216。
处理组件1202通常控制装置1200的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理元件1202可以包括一个或多个处理器1220来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件1202可以包括一个或多个模块,便于处理组件1202和其他组件之间的交互。例如,处理部件1202可以包括多媒体模块,以方便多媒体组件1208和处理组件1202之间的交互。
存储器1204被配置为存储各种类型的数据以支持在设备1200的操作。这些数据的示例包括用于在装置1200上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器1204可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件1206为装置1200的各种组件提供电力。电源组件1206可以包括电源管理系统,一个或多个电源,及其他与为装置1200生成、管理和分配电力相关联的组件。
多媒体组件1208包括在装置1200和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件1208包括一个前置摄像头和/或后置摄像头。当设备1200处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件1210被配置为输出和/或输入音频信号。例如,音频组件1210包括一个麦克风(MIC),当装置1200处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1204或经由通信组件1216发送。在一些实施例中,音频组件1210还包括一个扬声器,用于输出音频信号。
I/O接口1212为处理组件1202和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件1214包括一个或多个传感器,用于为装置1200提供各个方面的状态评估。例如,传感器组件1214可以检测到设备1200的打开/关闭状态,组件的相对定位,例如所述组件为装置1200的显示器和小键盘,传感器组件1214还可以检测装置1200或装置1200一个组件的位置改变,用户与装置1200接触的存在或不存在,装置1200方位或加速/减速和装置1200的温度变化。传感器组件1214可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件1214还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件1214还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件1216被配置为便于装置1200和其他设备之间有线或无线方式的通信。装置1200可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信部件1216经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信部件1216还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,装置1200可以被一个或多个应用专用集成电路(ASIC)、数字 信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器1204,上述指令可由装置1200的处理器1220执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
图13是根据一示例性实施例示出的另一种适用于抢占时频资源的确定装置的框图。装置1300可以被提供为一基站。参照图13,装置1300包括处理组件1322、无线发射/接收组件1324、天线组件1326、以及无线接口特有的信号处理部分,处理组件1322可进一步包括一个或多个处理器。
处理组件1322中的其中一个处理器可以被配置为:
向用户设备UE发送第一业务数据;
对部分或全部第二业务数据进行加密,并向所述UE发送加密后的第二业务数据,以用于所述UE对接收失败的第一业务数据对应的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密来确定第二业务数据是否抢占第一业务数据的时频资源。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
本领域技术人员在考虑说明书及实践这里公开的公开后,将容易想到本公开的其它实 施方案。本申请旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。

Claims (28)

  1. 一种抢占时频资源的确定方法,其特征在于,所述方法包括:
    接收并读取基站发送的第一业务数据;
    若确定存在接收失败的第一业务数据,则确定接收失败的第一业务数据对应的时频资源区域,并对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密;
    若解密成功,则确定第二业务数据抢占第一业务数据的时频资源。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    在所述对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之前,接收基站发送的部分加密或全部加密后的第二业务数据。
  3. 根据权利要求1所述的方法,其特征在于,在所述确定第二业务数据抢占第一业务数据的时频资源之后,所述方法还包括:
    保留抢占所述时频资源的第二业务数据,并向所述基站发送所述第一业务数据的混合自动重传请求HARQ反馈信息。
  4. 根据权利要求3所述的方法,其特征在于,所述向所述基站发送所述第一业务数据的HARQ反馈信息,包括:
    将被抢占所述时频资源的第一业务数据的接收成败状态设置为接收成功,并向所述基站发送所述HARQ反馈信息;或者
    根据除被抢占所述时频资源的第一业务数据之外的第一数据接收成败状态,向所述基站发送所述HARQ反馈信息。
  5. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    若解密失败,则擦写掉预先缓存的所述时频资源区域的业务数据。
  6. 根据权利要求1所述的方法,其特征在于,在所述对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之前,所述方法还包括:
    接收所述基站发送的配置信息,并根据所述配置信息获知所述相关时频资源区域。
  7. 根据权利要求1所述的方法,其特征在于,所述对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密,包括:
    使用预设扰码对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰;或者
    使用预设扰码对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰,并对解扰结果进行校验;或者
    对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行校验;
    其中,所述预设扰码包括无线网络临时标识RNTI,所述RNTI包括小区无线网络临时标识C-RNTI或新型的RNTI。
  8. 一种抢占时频资源的确定方法,其特征在于,所述方法包括:
    向用户设备UE发送第一业务数据;
    对部分或全部第二业务数据进行加密,并向所述UE发送加密后的第二业务数据,以用于所述UE对接收失败的第一业务数据对应的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密来确定第二业务数据是否抢占第一业务数据的时频资源。
  9. 根据权利要求8所述的方法,其特征在于,所述方法还包括:
    在所述对部分或全部第二业务数据进行加密之前,确定所述第二业务数据属于预设调度类型且确定所述第二业务数据能够抢占所述第一业务数据的时频资源。
  10. 根据权利要求9所述的方法,其特征在于,所述确定所述第二业务数据能够抢占所述第一业务数据的时频资源,包括:
    若调度所述第二业务数据所使用的时频资源区域位于调度所述第一业务数据所使用的时频资源区域内,则确定所述第二业务数据能够抢占所述第一业务数据的时频资源。
  11. 根据权利要求8所述的方法,其特征在于,所述方法还包括:
    在所述向所述UE发送加密后的第二业务数据之后,向所述UE发送配置信息,所述配置信息用于通知所述UE用于解密的相关时频资源区域信息。
  12. 根据权利要求8所述的方法,其特征在于,所述对部分或全部第二业务数据进行加密,包括:
    使用预设扰码对部分或全部第二业务数据进行加扰;或者
    对部分或全部第二业务数据进行校验,并使用预设扰码对校验后的第二业务数据进行加扰;或者
    对部分或全部第二业务数据进行校验;
    其中,所述预设扰码包括无线网络临时标识RNTI,所述RNTI包括小区无线网络临时标识C-RNTI或新型的RNTI。
  13. 一种抢占时频资源的确定装置,其特征在于,所述装置包括:
    接收读取模块,被配置为接收并读取基站发送的第一业务数据;
    确定解密模块,被配置为在所述接收读取模块读取所述第一业务数据之后,若确定存在接收失败的第一业务数据,则确定接收失败的第一业务数据对应的时频资源区域,并对所述 时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密;
    确定模块,被配置为在所述确定解密模块对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之后,若解密成功,则确定第二业务数据抢占第一业务数据的时频资源。
  14. 根据权利要求13所述的装置,其特征在于,所述装置还包括:
    接收模块,被配置为在所述确定解密模块对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之前,接收基站发送的部分加密或全部加密后的第二业务数据。
  15. 根据权利要求13所述的装置,其特征在于,所述装置还包括:
    保留发送模块,被配置为在所述确定模块确定第二业务数据抢占第一业务数据的时频资源之后,保留抢占所述时频资源的第二业务数据,并向所述基站发送所述第一业务数据的混合自动重传请求HARQ反馈信息。
  16. 根据权利要求15所述的装置,其特征在于,所述保留发送模块包括:
    第一发送单元,被配置为将被抢占所述时频资源的第一业务数据的接收成败状态设置为接收成功,并向所述基站发送所述HARQ反馈信息;或者
    第二发送单元,被配置为根据除被抢占所述时频资源的第一业务数据之外的第一数据接收成败状态,向所述基站发送所述HARQ反馈信息。
  17. 根据权利要求13所述的装置,其特征在于,所述装置还包括:
    擦写模块,被配置为在所述确定解密模块对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之后,若解密失败,则擦写掉预先缓存的所述时频资源区域的业务数据。
  18. 根据权利要求13所述的装置,其特征在于,所述装置还包括:
    接收获知模块,被配置为在所述确定解密模块对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密之前,接收所述基站发送的配置信息,并根据所述配置信息获知所述相关时频资源区域。
  19. 根据权利要求13所述的装置,其特征在于,所述确定解密模块包括:
    解扰单元,被配置为使用预设扰码对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰;或者
    解扰校验单元,被配置为使用预设扰码对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解扰,并对解扰结果进行校验;或者
    校验单元,被配置为对所述时频资源区域及其相关时频资源区域的部分或全部业务数据 进行校验;
    其中,所述预设扰码包括无线网络临时标识RNTI,所述RNTI包括小区无线网络临时标识C-RNTI或新型的RNTI。
  20. 一种抢占时频资源的确定装置,其特征在于,所述装置包括:
    第一发送模块,被配置为向用户设备UE发送第一业务数据;
    加密发送模块,被配置为在所述第一发送模块发送第一业务数据之后,对部分或全部第二业务数据进行加密,并向所述UE发送加密后的第二业务数据,以用于所述UE对接收失败的第一业务数据对应的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密来确定第二业务数据是否抢占第一业务数据的时频资源。
  21. 根据权利要求20所述的装置,其特征在于,所述装置还包括:
    确定模块,被配置为在所述加密发送模块对部分或全部第二业务数据进行加密之前,确定所述第二业务数据属于预设调度类型且确定所述第二业务数据能够抢占所述第一业务数据的时频资源。
  22. 根据权利要求21所述的装置,其特征在于,所述确定模块,被配置为若调度所述第二业务数据所使用的时频资源区域位于调度所述第一业务数据所使用的时频资源区域内,则确定所述第二业务数据能够抢占所述第一业务数据的时频资源。
  23. 根据权利要求20所述的装置,其特征在于,所述装置还包括:
    第二发送模块,被配置为在所述加密发送模块向所述UE发送加密后的第二业务数据之后,向所述UE发送配置信息,所述配置信息用于通知所述UE用于解密的相关时频资源区域信息。
  24. 根据权利要求20所述的装置,其特征在于,所述加密发送模块包括:
    加扰单元,被配置为使用预设扰码对部分或全部第二业务数据进行加扰;或者
    校验加扰单元,被配置为对部分或全部第二业务数据进行校验,并使用预设扰码对校验后的第二业务数据进行加扰;或者
    校验单元,被配置为对部分或全部第二业务数据进行校验;
    其中,所述预设扰码包括无线网络临时标识RNTI,所述RNTI包括小区无线网络临时标识C-RNTI或新型的RNTI。
  25. 一种用户设备,其特征在于,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    接收并读取基站发送的第一业务数据;
    若确定存在接收失败的第一业务数据,则确定接收失败的第一业务数据对应的时频资源区域,并对所述时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密;
    若解密成功,则确定第二业务数据抢占第一业务数据的时频资源。
  26. 一种基站,其特征在于,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    向用户设备UE发送第一业务数据;
    对部分或全部第二业务数据进行加密,并向所述UE发送加密后的第二业务数据,以用于所述UE对接收失败的第一业务数据对应的时频资源区域及其相关时频资源区域的部分或全部业务数据进行解密来确定第二业务数据是否抢占第一业务数据的时频资源。
  27. 一种非临时计算机可读存储介质,其上存储有计算机程序,其特征在于,该程序被处理器执行时实现权利要求1至7中任一项所述的抢占时频资源的确定方法的步骤。
  28. 一种非临时计算机可读存储介质,其上存储有计算机程序,其特征在于,该程序被处理器执行时实现权利要求8至12中任一项所述的抢占时频资源的确定方法的步骤。
PCT/CN2017/089857 2017-06-23 2017-06-23 抢占时频资源的确定方法及装置、用户设备和基站 WO2018232757A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PCT/CN2017/089857 WO2018232757A1 (zh) 2017-06-23 2017-06-23 抢占时频资源的确定方法及装置、用户设备和基站
US16/623,927 US11546884B2 (en) 2017-06-23 2017-06-23 Method and device for determining time-frequency resource preemption, user equipment and base station
EP17914509.9A EP3644667A4 (en) 2017-06-23 2017-06-23 METHOD AND DEVICE FOR DETERMINING TIME-FREQUENCY RESOURCES, USER DEVICE AND BASE STATION
CN201780000726.7A CN108401506B (zh) 2017-06-23 2017-06-23 抢占时频资源的确定方法及装置、用户设备和基站

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/089857 WO2018232757A1 (zh) 2017-06-23 2017-06-23 抢占时频资源的确定方法及装置、用户设备和基站

Publications (1)

Publication Number Publication Date
WO2018232757A1 true WO2018232757A1 (zh) 2018-12-27

Family

ID=63095060

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/089857 WO2018232757A1 (zh) 2017-06-23 2017-06-23 抢占时频资源的确定方法及装置、用户设备和基站

Country Status (4)

Country Link
US (1) US11546884B2 (zh)
EP (1) EP3644667A4 (zh)
CN (1) CN108401506B (zh)
WO (1) WO2018232757A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6786407B2 (ja) * 2017-01-23 2020-11-18 株式会社クボタ 作業車無線管理システム
EP3981097A1 (en) * 2019-06-28 2022-04-13 Huawei Technologies Co., Ltd. Device and method for enhanced preemption of transmissions
CN111009239A (zh) * 2019-11-18 2020-04-14 北京小米移动软件有限公司 回声消除方法、回声消除装置及电子设备
CN111246588B (zh) * 2020-01-10 2021-10-26 北京邮电大学 Nr系统中的解决不同优先级业务之间无序调度的方法

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016115683A1 (zh) * 2015-01-20 2016-07-28 华为技术有限公司 一种信息传输方法、设备及系统
CN106455103A (zh) * 2016-11-30 2017-02-22 宇龙计算机通信科技(深圳)有限公司 资源配置方法和资源配置装置

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170077197A (ko) * 2014-11-07 2017-07-05 후아웨이 테크놀러지 컴퍼니 리미티드 데이터 전송 방법, 장치, 그리고 시스템
US10382169B2 (en) * 2016-04-01 2019-08-13 Huawei Technologies Co., Ltd. HARQ systems and methods for grant-free uplink transmissions
US11252717B2 (en) * 2016-09-02 2022-02-15 Huawei Technologies Co., Ltd. Co-existence of latency tolerant and low latency communications
WO2018064128A1 (en) * 2016-09-28 2018-04-05 Idac Holdings, Inc. 5g nr data delivery for flexible radio services
US10925081B2 (en) * 2016-11-15 2021-02-16 Lg Electronics Inc. Method for transmitting information regarding available resource, and apparatus therefor
US10567142B2 (en) * 2017-03-23 2020-02-18 Apple Inc. Preemption indicators and code-block-group-based retransmission techniques for multiplexing different services on physical layer frames
US11115257B2 (en) * 2017-03-23 2021-09-07 Huawei Technologies Co., Ltd. System and method for multiplexing traffic
WO2018204491A1 (en) * 2017-05-03 2018-11-08 Idac Holdings, Inc. Method and apparatus for improving hybrid automatic repeat request (harq) feedback performance of enhanced mobile broadband (embb) when impacted by low latency traffic
US10601551B2 (en) * 2017-05-04 2020-03-24 Sharp Kabushiki Kaisha Hybrid automatic repeat request for uplink ultra-reliable and low-latency communications

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016115683A1 (zh) * 2015-01-20 2016-07-28 华为技术有限公司 一种信息传输方法、设备及系统
CN106455103A (zh) * 2016-11-30 2017-02-22 宇龙计算机通信科技(深圳)有限公司 资源配置方法和资源配置装置

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
INTEL CORPORATION: "Indication of Preemption of DL Transmissions", 3GPP TSG RAN WG1 MEETING #89, RL-1707414, 15 May 2017 (2017-05-15), XP051272623, Retrieved from the Internet <URL:http://www.3gpp.org/ftp/Meetings_3GPP_SYNC/RAN1/Docs/.> *
SAMSUNG: "Summary of E-mail Discussions on Multiplexing EMBB and URLLC in DL", TSG RAN WG1 NR AD-HOC MEETING, RL-1700972, 10 January 2017 (2017-01-10), pages 1, 13, XP051203264, Retrieved from the Internet <URL:http://www.3gpp.org/ftp/tsg-ran/WG1_RL1/TSGR1_AH/NR_AH_1701/Docs/.> *
See also references of EP3644667A4 *

Also Published As

Publication number Publication date
EP3644667A4 (en) 2020-12-16
CN108401506B (zh) 2021-02-19
EP3644667A1 (en) 2020-04-29
US11546884B2 (en) 2023-01-03
CN108401506A (zh) 2018-08-14
US20200137723A1 (en) 2020-04-30

Similar Documents

Publication Publication Date Title
JP2022546193A (ja) フィードバック情報伝送方法、装置、端末及び記憶媒体
US12035312B2 (en) Communication feedback method, user device, and storage medium
WO2019134098A1 (zh) 数据传输方法、装置及用户设备
CN108391467B (zh) 数据传输方法及装置、用户设备和基站
CN108401506B (zh) 抢占时频资源的确定方法及装置、用户设备和基站
CN108401480B (zh) Harq反馈方法及装置、设备、计算机可读存储介质
CN109196805B (zh) 传输重传码本的方法及装置
CN109429556B (zh) Harq反馈方法、装置、用户设备和基站
CN108513723B (zh) 抢占时频资源的确定方法及装置和用户设备
WO2022213333A1 (zh) 物理直连链路反馈方法、装置及存储介质
WO2019148456A1 (zh) 信息传输方法、装置、系统及存储介质
US20210314108A1 (en) Uplink feedback method and apparatus, terminal, base station and storage medium
WO2018120779A1 (zh) 下行链路数据的传输方法及装置
CN109075958A (zh) 下行控制信息发送方法、接收方法、装置及存储介质
CN110574332B (zh) 数据传输方法、装置及存储介质
CN109451800A (zh) 混合自动重传请求反馈方法及装置和数据接收设备
CN110178337A (zh) 数据反馈、传输方法及装置、基站和用户设备
CN114982327A (zh) 传输数据的方法、装置、通信设备及存储介质
WO2019140696A1 (zh) 信息传输方法、装置、系统和存储介质
WO2019127183A1 (zh) 传输混合自动重传请求信息的方法及装置
US20230171759A1 (en) Data transmission scheduling mehtod and apparatus, communicaiton device and storage medium
WO2023050237A1 (zh) 一种harq-ack码本生成和接收方法、装置、设备及存储介质
CN113767668A (zh) 非授权频段反馈方法、非授权频段反馈装置及存储介质
CN116830513A (zh) Pssch资源的确定方法、装置、通信设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17914509

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2017914509

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2017914509

Country of ref document: EP

Effective date: 20200123