WO2019080555A1 - Procédé et dispositif d'accusé de réception pour une transmission de données sans autorisation - Google Patents

Procédé et dispositif d'accusé de réception pour une transmission de données sans autorisation

Info

Publication number
WO2019080555A1
WO2019080555A1 PCT/CN2018/095862 CN2018095862W WO2019080555A1 WO 2019080555 A1 WO2019080555 A1 WO 2019080555A1 CN 2018095862 W CN2018095862 W CN 2018095862W WO 2019080555 A1 WO2019080555 A1 WO 2019080555A1
Authority
WO
WIPO (PCT)
Prior art keywords
bitmap
terminal device
network device
terminal
data
Prior art date
Application number
PCT/CN2018/095862
Other languages
English (en)
Chinese (zh)
Inventor
杜振国
韩云博
丁志明
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201880005709.7A priority Critical patent/CN110121901B/zh
Publication of WO2019080555A1 publication Critical patent/WO2019080555A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery

Definitions

  • the network device sends a group common downlink control information (G-DCI) to the group of terminal devices, where the G-DCI carries the group terminal device.
  • G-DCI group common downlink control information
  • the G-DCI includes a bitmap, and each terminal device corresponds to at least one bit in the Bitmap, indicating whether the data of the terminal device is correctly received by the network device, for example, 1 indicates correct reception, and 0 indicates Not received correctly.
  • the network device also configures the group ID of the terminal device group for the terminal device to distinguish the G-DCI corresponding to different terminal device groups.
  • the present application provides a method and apparatus for confirming the unauthorized data transmission, which is beneficial to save the overhead in the process of confirming the transmission of the message.
  • each bit in the first Bitmap corresponds to at most one terminal device, if the first Bitmap To compress the Bitmap, one bit exists in the first Bitmap corresponding to multiple terminal devices, and/or a plurality of bits in the first Bitmap correspond to one terminal device.
  • the network device may determine, according to an actual situation, whether to compress the first Bitmap included in the confirmation message for indicating whether the data is correctly received, and carry the compression indication information in the confirmation message, to indicate whether the first A Bitmap is compressed to indicate whether the first Bitmap is a traditional Bitmap or a compressed Bitmap.
  • each bit corresponds to at most one terminal device; in a compressed Bitmap, one bit corresponds to a plurality of terminal devices, and/or a plurality of bits exist to correspond to one terminal device.
  • the terminal device herein generally refers to a terminal device that may use GF resources to transmit data within the coverage of the network device, and these terminal devices do not necessarily participate in the current data transmission.
  • the compression indication information may be an RNTI, and the RNTI may be referred to as a group RNTI (group RNTI, G-RNTI).
  • the network device may explicitly carry the G-RNTI in the acknowledgment message, or may use the G-RNTI of the group of terminal devices to scramble the G-DCI of the group of terminal devices. This is not limited.
  • the G-RNTI scrambling method does not lengthen the length of the acknowledgment message, and the transmission overhead is small.
  • the network device may compress the Bitmap by using a Bloom Filter, and determine the compressed Bitmap as the first Bitmap.
  • the network device determines, in the confirmation message, which GF data of the terminal device is correctly received, that is, the first Bitmap carries the ACK information, and the network device may first determine the identifier (ID) of the M first terminal devices that are correctly received. Using the first hash function set as described above, the identifiers of the M first terminal devices are taken as inputs, and the hash value of each first terminal device is calculated, and the position corresponding to the K 1 hash values in the first to-be-transmitted Bitmap is determined. Set to the first value, for example 1, to execute the stored procedure of the above Bloom Filter. The network device determines the first to-be-transmitted Bitmap as the first Bitmap, and sends the bitmap to the at least one terminal device. The third terminal device of the at least one terminal device performs the query process of the Bloom Filter according to its own K 1 hash value, and determines whether the data sent by itself is correctly received by the network device.
  • the length of the first to-be-transmitted Bitmap is equal to the length of the first Bitmap.
  • the values of all the bits are initially the original values, and the original values are not equal to the first value.
  • the original values of each bit in the first to-be-transmitted Bitmap are all zero.
  • the method before the network device receives the data that the at least one terminal device uses the unlicensed resource, the method further includes: the network device according to the first a hash function set and an identifier including each terminal device in the at least one terminal device, calculating K 1 hash values of each terminal device; the network device transmitting respective K to each of the terminal devices 1 hash value.
  • the at least one terminal device may be pre-configured, the terminal device can be employed for transmitting data to the network device GF resources, the network device can calculate the K terminal of each of the at least one terminal apparatus 1 in an initial stage Hash values are distributed to the at least one terminal device for subsequent direct use.
  • the compression indication information is used to indicate the first Bitmap Not a compressed Bitmap.
  • the first to-be-transmitted Bitmap carries negative acknowledgement NACK information sent by the network device to N second terminal devices in the at least one terminal device, the network device is not correctly receive the N data sent by the second terminal device, N being an integer greater than or equal to 1, Bitmap K in each of the second and the first terminal apparatus 1 ha to be transmitted The bits of the position corresponding to the hash value are all the first values.
  • the second aspect provides another method for confirming the unauthorized data transmission, including: the third terminal device sends data to the network device by using an unlicensed resource; and the third terminal device receives the network device to send according to the at least one terminal device.
  • the network device can reasonably select whether to compress the Bitmap in the acknowledgment message sent to the terminal device, and carry the compression indication information in the acknowledgment message to indicate the network device. Whether the Bitmap in the acknowledgment message is compressed, so that the terminal device can correctly parse the Bitmap in the acknowledgment message according to the compression indication information, thereby saving the overhead in the process of confirming the message transmission, thereby improving system performance.
  • the compression indication information is a radio network temporary identifier RNTI or a group identifier of a terminal device group corresponding to the at least one terminal device.
  • the first Bitmap carries acknowledgement ACK information sent by the network device to M first terminal devices in the at least one terminal device
  • the network device correctly receives the data sent by the M first terminal devices, where M is an integer greater than or equal to 1;
  • the third terminal device determines, according to the first Bitmap, whether data sent by the third terminal device is correctly received by the network device, comprising: a third terminal device determines the first Bitmap, the K bit positions with the third terminal device hash value corresponding to a value of a first value if both And K 1 is an integer greater than or equal to 1; if the value of the bit corresponding to the K 1 hash value of the third terminal device is the first value, the third terminal device determines the transmitting a third data terminal device is correctly received by the network device; bit position if the third terminal apparatus K a value corresponding hash values are not the first value, the third The terminal device determines the Three terminal device transmits the data is not correctly received by the network device.
  • the third terminal device receives an acknowledgement message that is sent by the network device according to the data received by the at least one terminal device, and includes: the third terminal Receiving, by the device, the acknowledgement message sent by the network device, where the acknowledgement message includes function set indication information, where the function set indication information is used to indicate an identifier of the first hash function set; and the third terminal device is configured according to The function set indication information determines the first hash function set.
  • a data transmission apparatus for performing the method of the first aspect or any possible implementation of the first aspect.
  • the apparatus comprises means for performing the method of any of the above-described first aspect or any of the possible implementations of the first aspect.
  • the apparatus comprises means for performing the method of any of the possible implementations of the second aspect or the second aspect described above.
  • another data transmission apparatus comprising: a transceiver, a memory, and a processor.
  • the transceiver, the memory and the processor are in communication with each other via an internal connection path for storing instructions for executing instructions stored in the memory to control the receiver to receive signals and to control the transmitter to transmit signals And when the processor executes the instructions stored by the memory, causing the processor to perform the method of the first aspect or any of the possible implementations of the first aspect.
  • the system comprises the apparatus of any of the possible implementations of the fifth or fifth aspect, and the apparatus of any of the sixth or sixth aspect of the possible implementation.
  • a computer program product comprising: computer program code, when the computer program code is executed by a computer, causing the computer to perform any of the first aspect or the first aspect described above Possible methods in the implementation.
  • a computer program product comprising: computer program code, when the computer program code is executed by a computer, causing the computer to perform any of the second aspect or the second aspect Possible methods in the implementation.
  • a tenth aspect a computer readable medium for storing a computer program, the computer program comprising instructions for performing the method of the first aspect or any of the possible implementations of the first aspect.
  • a computer readable medium for storing a computer program comprising instructions for performing the method of any of the second aspect or any of the possible implementations of the second aspect.
  • a twelfth aspect provides an apparatus, including a storage module, a processing module, and a communication interface, wherein the storage module is configured to store an instruction, and the processing module is configured to execute an instruction stored by the storage module, so that the processing module executes the first aspect Or the method of any of the possible implementations of the first aspect.
  • the device may be part of a network device, such as a chip in a network device.
  • the acknowledgement message sent by the network device to the at least one terminal device may be a group of common downlink control information G-DCI, and the sending may be “multicast” or “ Multicast” is sent in a way.
  • the at least one terminal device belongs to at least two terminal device groups.
  • the network device needs to send at least two G-DCIs to the at least one terminal device (each terminal device group corresponds to one G-DCI)
  • multiple terminal device groups correspond to one G-DCI, which saves the overhead of messages.
  • a method of confirming data transmission comprising:
  • the network device receives the GF data sent by the at least one terminal device
  • the network device sends a HARQ acknowledgment message to the at least one terminal device, where the HARQ acknowledgment message includes a Bitmap, and the Bitmap is used to confirm the GF data sent by the at least one terminal device;
  • the HARQ acknowledgment message includes a compression indication, where the compression indication is used to indicate whether the Bitmap is a compressed Bitmap.
  • the base station carries a compression indication in the HARQ acknowledgment message sent for the GF transmission, so that the UE can determine how to parse the Bitmap in the HARQ acknowledgment message based on the indication, and thereby obtain the ACK/NACK information of the data transmission.
  • the Bitmap in the HARQ acknowledgment message is a compressed Bitmap, the transmission overhead of the HARQ acknowledgment message can be reduced.
  • the Bitmap is a traditional Bitmap
  • the UE parses the Bitmap according to the traditional Bitmap method, that is, the UE has a one-to-one correspondence with the bits in the Bitmap.
  • Hash function set index and compression indication can be the same indication, thereby reducing the indication overhead.
  • the network device configuring the G-RNTI to each of the at least one terminal device before the network device receives the GF data sent by the at least one terminal device .
  • the G-RNTI is used for the compression indication.
  • Each UE should have at least two G-RNTIs (corresponding to the compressed Bitmap and the traditional Bitmap respectively).
  • the base station should configure these G-RNTIs to the UE in advance.
  • the compression indication can be a group identification. Since the group identity is explicitly carried in the HARQ acknowledgment message, although the HARQ acknowledgment message is longer, it is more flexible.
  • a method of confirming data transmission comprising:
  • the base station may carry an index of the hash function set used by the BF-generated compressed Bitmap in the HARQ acknowledgement message. Even if some hash function sets lead to misjudgment, since there are multiple hash function sets to choose from, it is still possible to find a set of hash functions that will not cause false positives, which greatly increases the chance of HARQ confirmation using compressed Bitmap. Therefore, the transmission overhead of the HARQ acknowledgment message is reduced as much as possible.
  • Hash function set index and compression indication can be the same indication, thereby reducing the indication overhead.
  • the compression indication can be a group identification. Since the group identity is explicitly carried in the HARQ acknowledgment message, although the HARQ acknowledgment message is longer, it is more flexible.
  • the transceiver is configured to receive and send data
  • a chip comprising: a processing module and a communication interface, the processing module for performing the communication method of any of embodiments 12-21.
  • FIG. 1 shows a schematic diagram of a communication system of an embodiment of the present application.
  • FIG. 3a shows a schematic flow chart of a data transmission method according to an embodiment of the present application.
  • an uplink (UL) transmission adopts a grant-based or transmission with grant, that is, a network device schedules a terminal device to perform UL transmission resources and related transmission parameters. For example, the time domain, the frequency domain, the spatial domain resource, and the modulation and coding scheme (MCS) used for UL transmission.
  • MCS modulation and coding scheme
  • the terminal device may determine, according to the group identifier, whether the G-DCI is a G-DCI corresponding to the terminal device group in which it is located, and if so, according to its own The location index obtains an acknowledgment message of the GF data from the corresponding location in the Bitmap of the G-DCI. For example, 1 indicates that the network device correctly receives, and 0 indicates that the network device does not receive correctly. In this paper, such a Bitmap is also referred to as a traditional Bitmap. In a conventional Bitmap, each bit corresponds to at most one terminal device (possibly some of the bits are reserved bits) for indicating the GF data of the terminal device.
  • the solution of the present application will be described in a manner similar to the GF resource based on FIG. 2 for dividing the terminal device group.
  • the solution of the present application is applicable to any scenario in which a HARQ acknowledgment is performed on a GF transmission of a group of terminal devices by using a multicast acknowledgment message (such as G-DCI), that is, it is applicable to using any other terminal device grouping method and mapping to multiple The scene of the broadcast confirmation message.
  • a multicast acknowledgment message such as G-DCI
  • FIG. 3a is a schematic flowchart of a data transmission method 300 according to an embodiment of the present application.
  • the method 300 can be applied to the communication system 100 shown in FIG. 1, but the embodiment of the present application is not limited thereto.
  • the network device receives data sent by the at least one terminal device that includes the third terminal device, and sends an acknowledgement message to the at least one terminal device, where the acknowledgement message includes a first bit table Bitmap and compression indication information.
  • the first Bitmap is used to indicate whether the data sent by the at least one terminal device is correctly received, and the compression indication information is used to indicate whether the first Bitmap is a compressed Bitmap, if the first Bitmap is not a compressed Bitmap.
  • Each bit in the first Bitmap corresponds to at most one terminal device. If the first Bitmap is a compressed Bitmap, one bit in the first Bitmap corresponds to multiple terminal devices, and/or the first Bitmap There are multiple bits corresponding to one terminal device;
  • the at least one terminal device is a terminal device that sends data to the network device by using an unlicensed resource
  • the at least one terminal device includes the third terminal device
  • the at least one terminal device may belong to the same terminal device group, or
  • the embodiments of the present application are not limited.
  • the acknowledgment message may be specifically sent by using the multicast or the broadcast mode, but the embodiment of the present application does not limit this.
  • the third terminal device receives the acknowledgement message, and first determines, according to the compression indication information carried in the acknowledgement message, whether the first Bitmap included in the acknowledgement message is a traditional Bitmap or a compressed Bitmap, and then the first The Bitmap determines at least one bit corresponding to itself, and further determines whether the transmitted data is correctly received by the network device.
  • the first Bitmap sent by the network device may include a sub-bitmap corresponding to the group of terminal devices, and the third terminal device may determine, according to the pre-configured group identifier, the sub-device group in the confirmation message. Bitmap, and according to the child Bitmap, determine whether its own data is correctly received by the network device.
  • the sub-bitmap may be included in the foregoing G-DCI, and a group of terminal devices correspond to one G-DCI, but the embodiment of the present application does not limit this.
  • the network device can reasonably select whether to compress the Bitmap in the acknowledgment message sent to the terminal device, and carry the compression indication information in the acknowledgment message to indicate the network device. Whether the Bitmap in the acknowledgment message is compressed, so that the terminal device can correctly parse the Bitmap in the acknowledgment message according to the compression indication information, thereby saving the overhead in the process of confirming the message transmission, thereby improving system performance.
  • the network device needs to send two G-DCIs when using the traditional Bitmap, and only one G-DCI is sent when using the compressed Bitmap by using the method of the embodiment of the present application (as shown in FIG. 3b). As shown, in the embodiment shown in Figure 3b, the signaling overhead of the acknowledgment message is reduced by half.
  • Figure 3b is an example of mapping two sets of terminal devices to a compressed Bitmap (i.e., a compressed Bitmap carried by a G-DCI carries acknowledgment information for two sets of terminal devices, or acknowledgment information).
  • a compressed Bitmap carried by a G-DCI carries acknowledgment information for two sets of terminal devices, or acknowledgment information.
  • the present application can also be extended to the R group terminal device (each group of terminal devices corresponding to a traditional Bitmap) corresponding to a compressed Bitmap, R is an integer greater than or equal to 2, the larger the value of R, the transmission overhead of the present application The more effective the savings.
  • the length of the compressed Bitmap and the length of the traditional Bitmap may be equal or not equal, which is not limited by the embodiment of the present application.
  • the length of the compressed Bitmap is equal to the length of the conventional Bitmap, the number of blind detections in which the terminal device receives the confirmation message can be reduced, thereby improving the data transmission performance.
  • the terminal device adopts code block group (CBG)-based transmission.
  • CBG code block group
  • the network device configures the terminal device to divide each TB into V CBGs for transmission, and the terminal device needs to perform HARQ confirmation for each CBG.
  • each TB sent by the terminal device needs to correspond to the Bitmap of the confirmation message.
  • V bits each of the V bits corresponds to a CBG, and V is an integer greater than or equal to 1.
  • the same terminal device may correspond to multiple sets of bits in one Bitmap, and each set of bits corresponds to one data of the terminal device (such as the same TB/CBG). It should be noted that, in the present application, there are multiple bits in a compressed Bitmap corresponding to one terminal device, which actually means that there are multiple bits corresponding to the same data of one terminal device (such as the same TB or the same CBG), instead of referring to multiple The bits correspond to different data of one terminal device.
  • the compression indication information may be an RNTI, and the RNTI may be referred to as a group RNTI (group RNTI, G-RNTI).
  • the network device may explicitly carry the G-RNTI in the acknowledgment message, or may use the G-RNTI of the group of terminal devices to scramble the G-DCI of the group of terminal devices. This is not limited.
  • the G-RNTI scrambling method does not lengthen the length of the acknowledgment message, and the transmission overhead is small.
  • the G-RNTI corresponding to each terminal device group may be a standard pre-defined one, or the network device may be configured to each terminal device by using signaling in advance, which is not limited in this embodiment of the present application.
  • the signaling may be radio resource control (RRC) signaling, media access control (MAC) layer control element (CE) signaling, or other physical layer signaling (eg, DCI). This embodiment of the present application does not limit this.
  • the acknowledgment message is G-DCI
  • the compression indication information is G-RNTI.
  • the terminal device group corresponding to the GF resource 1 and the GF resource 2 is identified by the G-RNTI 1 , that is, the G-DCI 1 (including the traditional Bitmap) is scrambled by the G-RNTI 1 ; the terminal device corresponding to the GF resource 3 and the GF resource 4
  • the group is identified by G-RNTI 2, that is, G-DCI 2 (including the traditional Bitmap) is scrambled by G-RNTI 2;
  • the terminal device group corresponding to GF resource 1-GF resource 4 is identified by G-RNTI 3, that is, G-DCI 3 (including compressed Bitmap) scrambled with G-RNTI 3.
  • the third terminal device can determine whether the received G-DCI is based on whether the G-RNTI in the G-DCI is G-RNTI 1 or G-RNTI 3.
  • the compression indication information may be specifically a group ID (G-ID) of the terminal device group corresponding to the at least one terminal device.
  • the network device may explicitly carry the G-ID in the acknowledgment message to indicate whether the currently transmitted acknowledgment message includes a Bitmap as a legacy Bitmap or a compressed Bitmap. Since the group identification G-ID is explicitly carried in the confirmation message, although the confirmation message is longer, it is more flexible.
  • the third terminal device when it receives a G-DCI, it can determine whether the G-DCI is its desired G-DCI according to the value of the G-ID field included therein, and determine the G-DCI. Contains a compressed Bitmap or a traditional Bitmap.
  • each terminal device group may be standard pre-defined, or may be configured by the network device to each terminal device by using signaling in advance, which is not limited in this embodiment of the present application.
  • the signaling may be radio resource control (RRC) signaling, media access control (MAC) layer control element (CE) signaling, or other physical layer signaling (eg, DCI). This embodiment of the present application does not limit this.
  • the first Bitmap is a compressed Bitmap
  • the method further includes:
  • the network device generates a first to-be-transmitted Bitmap based on a Bloom filter according to the receiving condition of the data sent by the at least one terminal device, where the Bloom filter is defined by a first hash function set,
  • the first hash function set includes K 1 hash functions, and K 1 is an integer greater than or equal to 1;
  • the network device determines the first to-be-transmitted Bitmap as the first Bitmap.
  • the network device may perform compression by using a Bloom Filter, and determine the compressed Bitmap as the first Bitmap.
  • Bloom Filter is a binary vector data structure that implements efficient storage. It has good space and time efficiency and is used to determine whether an element belongs to a given set. Bloom Filter is actually a Bitmap, and its use includes stored procedures and query procedures.
  • K hash functions are predefined, denoted as h i (x), 1 ⁇ i ⁇ K, and K is an integer greater than or equal to 1.
  • the K hash values h 1 (x)-h K (x) of the element x are calculated, and the corresponding positions of the K hash values in the Bloom Filter are set to 1 (Assume that the raw value of each bit in the Bloom Filter is 0). If the position corresponding to a hash value is already 1, the value of the position remains unchanged.
  • the corresponding position of the K hash values is set to 0 (referred to as the first value), and if the position corresponding to a hash value is already 0, the position is The value remains the same.
  • the description is based on the assumption that the original value of each bit in the Bloom Filter is 0. At this time, the first value is 1.
  • the foregoing element x may be an identifier (ID) of the terminal device as an input of each hash function in the first hash function set.
  • ID identifier
  • the terminal devices there are a total of 48 terminal devices capable of transmitting data by using GF resources in the coverage of the network device, and the identifiers are respectively 1-48.
  • the identifiers of the terminal devices may be predefined or configured by the network device for each terminal device by using signaling.
  • each hash function in the first hash function set can map its identity to a bit position in the Bloom Filter, which is referred to as the location index of the terminal device based on the hash function.
  • each bit does not correspond to a unique element (representing a terminal device in the embodiment of the present application), which is different from a conventional Bitmap. Therefore, this application refers to such a Bloom Filter-based Bitmap as a compressed Bitmap, which is referred to as a compressed Bitmap.
  • the Bloom Filter query process may have a false positive. As shown in FIG. 5, only the elements x 1 and x 2 are actually stored in the Bloom Filter. However, since the position indexes corresponding to the elements x 1 and x 2 can just cover the three position indexes corresponding to the element x 4 , according to the query. As a result, the terminal device will consider that the element x 4 is also stored in the Bloom Filter. How to solve this situation will be described in detail later.
  • each terminal device corresponds to one bit in the compressed Bitmap, but one bit in the compressed Bitmap may correspond to multiple terminal devices at the same time.
  • the standard can predefine the mapping relationship between the identity (ID) of the terminal device and the bits in the compressed Bitmap.
  • ID identity
  • the standard may specify that a terminal device has the same location index in the compressed Bitmap as the traditional Bitmap; or, based on the ID of the terminal device, calculate the location index of the terminal device in the compressed Bitmap, such as the location index of the terminal device is ID mod L, L is the length of the compressed Bitmap.
  • the location index of the terminal device in the compressed Bitmap can also be configured by the network device, which is not limited in this embodiment of the present application. FIG.
  • the implementation of the compressed Bitmap can be based on other compression rules in addition to the Bloom Filter. If the protocol allows a compressed Bitmap to be implemented using multiple compression rules, then in the case of using a compressed Bitmap, the network device also needs to indicate to the terminal device the compression rules currently in use.
  • the compression rule indication may be that the network device is configured in advance to the terminal device (for example, configured to the terminal device by using RRC signaling, MAC CE, or physical layer signaling), or may be dynamically carried in the HARQ acknowledgement message. The embodiment of the present application does not limit this.
  • the compressed Bitmap can be used to transmit ACK information of the terminal device, that is, which GF data of the terminal device is correctly received by the network device (implicitly the GF data of other terminal devices is not correctly received), and the compression is performed.
  • Bitmap can be called ACK Bloom Filter (ACK BF).
  • the compressed Bitmap can also be used to transmit NACK information of the terminal device, that is, which GF data of the terminal device is not correctly received by the network device (implicitly the GF data of other terminal devices are correctly received), and the compressed Bitmap can be called NACK. BF.
  • the ACK BF is applicable to the case where the network device correctly receives the GF data of the less terminal device
  • the NACK BF is applicable to the case where most of the terminal devices that have transmitted the GF data are correctly received by the network device. For the latter, only a small number of terminal devices need to be replied to NACK, so transmitting NACK information with a compressed Bitmap is suitable for such a scenario. For example, most of the terminal devices configured in the GF resource 1-GF resource 4 have sent the GF data and are correctly received by the network device. In this case, only the terminal device that has sent the GF data to a small amount and is not correctly received by the network device replies with a NACK. Just send a G-DCI, obviously saving more transmission overhead.
  • the compressed Bitmap carries ACK information or NACK information may be predefined or the network device is configured to each terminal device by signaling.
  • the standard has pre-defined the compressed Bitmap sent by the network device to carry the ACK or NACK.
  • the first to-be-transmitted Bitmap carries the acknowledgement ACK information sent by the network device to the M first terminal devices in the at least one terminal device, and the network device correctly receives the The data sent by the M first terminal devices, M is an integer greater than or equal to 1, and the bit value of the position corresponding to the K 1 hash values of each of the first terminal devices in the first to-be-transmitted Bitmap All are the first value.
  • the first transmission to be understood as a Bloom Filter Bitmap are all bits of the original value, on this basis, according to the K terminal of each of the first hash value of a device to be sent to a first position corresponding to a Bitmap The bit value is set to a first value, and the Bloom Filter storing the hash value corresponding to each first terminal device is still referred to as a first to-be-transmitted Bitmap.
  • the third terminal device determines, by the third terminal device, the data sent by the third terminal device according to the first Bitmap, if the network device determines that the first to-be-sent Bitmap is determined to be sent by using the first Bitmap. Whether it is correctly received by the network device, including:
  • the third terminal of the first device determines Bitmap, the K bit positions with the third terminal device hash value corresponding to a value of a first value if both;
  • the third terminal apparatus determines the third terminal device transmitting the data was not The network device is correctly received.
  • the network device determines, in the confirmation message, which GF data of the terminal device is correctly received, that is, the first Bitmap carries the ACK information, and the network device may first determine the identifier (ID) of the M first terminal devices that are correctly received.
  • ID the identifier
  • the identifiers of the M first terminal devices are taken as inputs, and the K 1 hash values of each first terminal device are calculated, and the first pending send Bitmap and the K 1 hash values are used.
  • the corresponding location is set to a first value, for example 1, that is, the storage process of the above Bloom Filter is executed, and the first to-be-sent Bitmap is generated.
  • the network device determines the first to-be-transmitted Bitmap as the first Bitmap, and sends the bitmap to the at least one terminal device.
  • the third terminal device of the at least one terminal device performs the query process of the Bloom Filter according to its own K 1 hash value, and determines whether the data sent by itself is correctly received by the network device.
  • said third K-bit position of a terminal apparatus corresponding hash values are not the values of the first value of K refers to the bit position of said third terminal device corresponding to a hash value At least one is not the first value.
  • the length of the first to-be-transmitted Bitmap is equal to the length of the first Bitmap.
  • the values of all the bits are original values, and the original values are not equal to the first value. In a possible implementation manner, the original values of each bit in the first to-be-transmitted Bitmap are all zero.
  • the foregoing first value may be a predefined one (that is, a standard predefined Bloom Filter original value), or may be configured by the network device for each terminal device (that is, the network device is configured with a Bloom Filter original value).
  • the third terminal device may determine its own K 1 hash values in a plurality of manners, that is, determine the location of at least one bit corresponding to itself in the Bitmap fed back by the network device, and may adopt its own ID and the first hash.
  • Xi calculated set of functions may also be received directly K network device transmits a hash value of the present application is not limited in this embodiment.
  • the network device K can be precomputed at least one terminal device to each terminal device a hash value, and stored in the memory, it sends a confirmation message to the terminal equipment when used directly in the subsequent need to save The calculation of the overhead, the network device can also calculate the K 1 hash values of each of the specific terminal devices each time the acknowledgment message needs to be sent to the specific terminal device, thereby saving the storage overhead. This is not limited.
  • the method before the third terminal device determines, in the first Bitmap, whether the value of the bit corresponding to the hash value of the third terminal device is the first value, the method also includes:
  • the third terminal apparatus calculates the hash values K 1 of the third terminal device.
  • the apparatus according to the third terminal set of a first hash function and its own ID, to calculate the K terminal of the third device a hash value, for execution of a query. Since the ID of the third terminal device is common to the network device and the third terminal device (the network device configures the ID of the third terminal device by signaling), the same hash function is used for the same ID, and the network device is used. the third terminal device obtained in the first compressing the third terminal device Bitmap K 1 corresponding bit position and a third terminal device obtained in the first compressed bit positions K 1 Bitmap is consistent with the corresponding .
  • the foregoing first hash function set may be pre-defined, or may be configured for the network device by using the signaling for each terminal device, which is not limited in this embodiment of the present application.
  • the signaling may be radio resource control (RRC) signaling, media access control (MAC) layer control element (CE) signaling, or other physical layer signaling (eg, DCI). This embodiment of the present application does not limit this.
  • the method before the network device receives the data that is sent by the at least one terminal device by using the unlicensed resource, the method further includes:
  • the network device calculates K 1 hash values of each terminal device according to the first hash function set and an identifier of each terminal device in the at least one terminal device;
  • the network device sends respective K 1 hash values to each of the terminal devices. ;
  • K the network device receiving the terminal device transmitting the third terminal of the third device a hash value.
  • the network device may calculate the hash value of the terminal device based on the identifier ID of the terminal device, and directly calculate the result.
  • the device is sent to the terminal device, that is, the network device directly instructs the terminal device to compress the position of the corresponding K 1 bit in the Bitmap.
  • the first hash function set may be standard pre-defined or implemented internally by the network device, and the terminal device does not need to know the specific form of the first hash function set.
  • the at least one terminal device may configure, for the network device, a GF resource terminal device (that is, a device that allows data to be sent to the network device by using the GF mode), and the network device may calculate the at least one terminal in an initial stage. K 1 hash values of each terminal device in the device are separately distributed to the at least one terminal device for subsequent direct use.
  • a GF resource terminal device that is, a device that allows data to be sent to the network device by using the GF mode
  • the determining, by the network device, the first to-be-transmitted Bitmap is the first Bitmap, including:
  • the network device determines the first to-be-transmitted Bitmap as the first Bitmap if the network device determines that the first to-be-transmitted Bitmap does not cause a false positive.
  • the use of the Bloom Filter-based compressed Bitmap for GF transmission confirmation may result in false positives.
  • the misjudgment here can be defined as: the terminal device sends the GF data, and the network device does not receive it correctly, but the terminal device considers that the network device correctly receives the GF data according to the received compressed Bitmap. Assume that the terminal device 1 (identified as x 1 ), the terminal device 2 (identified as x 2 ), and the terminal device 4 (identified as x 4 ) have transmitted the GF data, but the network device only correctly receives the terminal device 1 and the terminal device 2 The data.
  • the terminal device 4 obviously considers that the network device also correctly received its own GF data, and thus follows. This data will not be retransmitted. In fact, the network device does not correctly receive the data of the terminal device 4.
  • the network device may first determine whether the first to-be-sent Bitmap will cause a misjudgment, that is, determine to adopt a compressed Bitmap. Whether the feedback causes a misjudgment, and if the misjudgment is not caused, the first to-be-transmitted Bitmap is determined to be the first Bitmap transmission. If the compression of the Bitmap will lead to misjudgment, the network device can choose to still use the traditional Bitmap as the first Bitmap to feedback to avoid misjudgment.
  • the compression indication information is used to indicate that the first Bitmap is not a compressed Bitmap, that is, the first A Bitmap is a traditional Bitmap.
  • the network device determines, according to the receiving condition of the data sent by the at least one terminal device and the first hash function set, whether the first to-be-transmitted Bitmap may cause a false positive, including :
  • the network device determines, according to the first hash function set and the N second terminals, that the network device determines that the data sent by the N second terminal devices in the at least one terminal device is not correctly received.
  • An identifier of each second terminal device in the device respectively calculating K 1 hash values of each second terminal device, where N is an integer greater than or equal to 1;
  • the network device determines whether the target of the second terminal device the N second terminal device, the first transmission to be in Bitmap, the target position and K 1 of the second terminal device hash values corresponding to The bit values are all the first value;
  • the network device determines that the first to-be-sent Bitmap causes a misjudgment
  • the network device determines that the first to-be-transmitted Bitmap does not cause a false positive.
  • the network device may first perform the query process of the Bloom Filter for the N second terminal devices that are not correctly received. . If there is a target second terminal device (any one of the N second terminal devices), the bit value of the location corresponding to the target second terminal device is the first value, that is, the target second terminal can be queried. The ACK information of the device, then, the network device can determine that using a compressed Bitmap will lead to misjudgment.
  • the terminal device in the GF transmission, is distinguished by the DMRS, and the ID of the at least one terminal device may also be the DMRS of the at least one terminal device. Therefore, the network device can determine which terminal devices have transmitted the GF data based on the detected DMRS in the GF resource.
  • the terminal device in which the network device detects the DMRS but does not correctly solve the data portion is the terminal device among the N second terminal devices.
  • the data portions of some terminal devices are correctly received by the network device, and these terminal devices are called ACK terminal devices (corresponding to the above M first terminal devices), and other UEs.
  • the data portion is not correctly received by the network device, which is called a NACK terminal device (corresponding to the above N second terminal devices).
  • the network device can determine whether the use of the compressed Bitmap for acknowledgment will be misjudged based on the IDs of the ACK terminal device and the NACK terminal device. Specifically, the network device stores the IDs of all ACK terminal devices in a compressed Bitmap according to rules, and then queries the ID of the NACK terminal device.
  • each GF resource includes one or more transmission units, and each transmission unit is used to transmit GF data.
  • the network device detects all transmission units of each GF resource in the GF resource, and for the detection result of any of the transmission units, three situations may occur:
  • the network device can consider that some terminal devices send GF data, but the network device does not detect the DMRS. In this case, the network device determines that a misjudgment may occur, so the traditional Bitmap is used for confirmation. If the detection result of the network device on all the transmission units in the GF resource group is not the case 2), the network device may determine whether the compressed Bitmap will be misjudged according to the method of performing the query process described above, and if a misjudgment occurs, the traditional device is adopted. Bitmap, otherwise, use a compressed Bitmap.
  • the network device can use the compressed Bitmap for HARQ confirmation feedback (described in the example of Figure 5):
  • the GF data of the terminal device 1 (identified as x 1 ), the terminal device 2 (identified as x 2 ), and the terminal device 4 (identified as x 4 ) are correctly received by the network device.
  • the terminal device 1, the terminal device 2, and the terminal device 4 also consider that the network device correctly receives its own data, which is in line with the actual situation;
  • the terminal device 1 and the terminal device 2 transmit the GF data and are all correctly received by the network device, and the terminal device 4 does not transmit the GF data. In this case, since the terminal device 4 does not transmit the GF data, the terminal device 4 does not receive the acknowledgment message, so there is no erroneous determination.
  • the network device performs the foregoing query process for determining whether a misjudgment occurs, and is for the terminal device that sends the GF data and the GF data is not correctly received by the network device, that is, the N second terminal devices, the N
  • the second terminal device is included in at least one terminal device, and N is greater than or equal to 1. It should be understood that if the N second terminal devices are not present, the network device may not need to perform a process of erroneously determining the query.
  • the network device can directly use the traditional Bitmap method for feedback, or can replace the first hash function set to determine a second hash function set that does not cause misjudgment, and adopt the second hash.
  • the embodiment of the present application does not limit the generation of the compressed Bitmap and the feedback.
  • the network device sends an acknowledgement message to the at least one terminal device according to the receiving situation of the data sent by the at least one terminal device, including:
  • the acknowledgement message Sending, by the network device, the acknowledgement message to the at least one terminal device, where the acknowledgement message includes function set indication information, where the function set indication information is used to indicate an identifier of the first hash function set;
  • the third terminal device receives the acknowledgement message sent by the network device according to the receiving situation of the data sent by the at least one terminal device, and includes:
  • the acknowledgement message sent by the network device includes function set indication information, where the function set indication information is used to indicate an identifier of the first hash function set;
  • the third terminal device determines the first hash function set according to the function set indication information.
  • the network device may pre-define a plurality of hash function sets, and when sending the confirmation message to the terminal device, carry the identifier of the first hash function set for generating the Bloom Filter in the confirmation message, and send the same to the And the terminal device determines, according to the identifier of the first hash function set, the hash function used by the network device, to further determine whether the network device correctly receives the data sent by the terminal device.
  • the method before the sending, by the network device, the acknowledgement message to the at least one terminal device according to the receiving condition of the data sent by the at least one terminal device, the method further includes:
  • the network device determines a second set of hash function, the hash function and the second set of hash functions comprising K 2, K 2 is an integer greater than or equal to 1;
  • the network device generates second to-be-sent information based on the second hash function set
  • the network device determines that the second to-be-sent information does not cause a false positive, the network device determines the second to-be-sent information as the first bitmap;
  • the network device sends the acknowledgement message to the at least one terminal device, where the acknowledgement message includes function set indication information, and the function set indication information is used to indicate an identifier of the second hash function set.
  • the third terminal device receives the acknowledgement message sent by the network device according to the receiving situation of the data sent by the at least one terminal device, and includes:
  • the acknowledgement message sent by the network device includes function set indication information, where the function set indication information is used to indicate an identifier of the second hash function set;
  • the third terminal device determines the second hash function set according to the function set indication information.
  • multiple hash function sets may be defined in advance, and when the network device sends a first function set (ie, the first hash function set), a misjudgment may occur, and other hashes may be replaced.
  • the function set is tried.
  • the network device finds a hash function set (ie, the second hash function set) that does not cause misjudgment in the defined plurality of hash function sets the second hash function set is used to generate the compressed Bitmap, and at the same time
  • the identifier (or index) of the second hash function set is indicated in the corresponding confirmation message, so that the terminal device performs the query by using the same hash function set.
  • the network device may carry an index of the hash function set used to generate the compressed Bitmap based on the Bloom Filter in the confirmation message. Even if some hash function sets lead to misjudgment, since there are multiple hash function sets to choose from, it is still possible to find a hash function set that does not cause misjudgment, which greatly increases the use of compressed Bitmap. Confirm the opportunity for feedback to minimize the transmission overhead of the acknowledgment message.
  • the multiple hash function sets may be pre-defined, or may be configured for the network device by using the signaling for each terminal device, which is not limited in this embodiment of the present application.
  • the signaling may be radio resource control (RRC) signaling, media access control (MAC) layer control element (CE) signaling, or other physical layer signaling (eg, DCI). This embodiment of the present application does not limit this.
  • the function set indication information and the compression indication information may be the same indication information, thereby reducing the indication overhead.
  • the network device may adopt a G-RNTI method.
  • the network device may configure G-RNTI 0 to correspond to a G-DCI carrying a traditional Bitmap, and G-RNTI 1 corresponds to bearer compression.
  • Bitmap and set index is a hash function H G-DCI is 1
  • G-RNTI 2 corresponding to the compression carried Bitmap and set index is a hash function H G-DCI 2 a.
  • the network device may adopt a method for explicitly carrying a G-ID.
  • the network device may configure a G-ID 0 corresponding to a G-DCI carrying a traditional Bitmap, and a G-ID. 1 corresponds to a hash function and bearer Bitmap compression set H G-DCI index of 1, G-ID 2 corresponding to the compression carried Bitmap and set index is a hash function G-DCI H 2 in.
  • the first to-be-transmitted Bitmap carries negative acknowledgement NACK information sent by the network device to N second terminal devices in the at least one terminal device, and the network device does not correctly receive the The data sent by the N second terminal devices, where N is an integer greater than or equal to 1, and the bits of the first to-be-transmitted Bitmap corresponding to the K 1 hash values of each of the second terminal devices are taken. The values are all the first values.
  • the third terminal device determines, by the third terminal device, the data sent by the third terminal device according to the first Bitmap, if the network device determines that the first to-be-sent Bitmap is determined to be sent by using the first Bitmap. Whether it is correctly received by the network device, including:
  • the third terminal of the first device determines Bitmap, the K bit positions with the third terminal device hash value corresponding to a value of a first value if both;
  • bit position of the third terminal device K 1 values are hash values corresponding to said first value, determining the third data terminal device transmits the third terminal of the device is not The network device receives correctly;
  • the network device may indicate, in the acknowledgment message, which GF data of the terminal device is not correctly received, that is, the first Bitmap carries the NACK information, and the network device may first determine the identifiers (IDs of the N second terminal devices that are not correctly received. And using the first hash function set, using the identifiers of the N second terminal devices as input, calculating a hash value of each second terminal device, and corresponding to the K 1 hash values in the first to-be-transmitted Bitmap The location is set to a first value, for example 1, that is, the stored procedure of the above Bloom Filter is executed, and a first to-be-sent Bitmap is generated.
  • a first value for example 1, that is, the stored procedure of the above Bloom Filter is executed, and a first to-be-sent Bitmap is generated.
  • the network device determines the first to-be-transmitted Bitmap as the first Bitmap, and sends the bitmap to the at least one terminal device.
  • the third terminal device of the at least one terminal device performs the query process of the Bloom Filter according to its own K 1 hash value, and determines whether the data sent by itself is correctly received by the network device.
  • the length of the first to-be-transmitted Bitmap is equal to the length of the first Bitmap.
  • the values of all the bits are original values, and the original values are not equal to the first value. In a possible implementation manner, the original values of the bits in the first to-be-transmitted Bitmap are all 0.
  • the network device determines whether adopting the compressed Bitmap may cause a false positive, and may perform a query process of compressing the Bitmap according to the identifiers of the M first terminal devices that the data has been correctly received. It should be understood that the embodiment that carries the NACK information in the first Bitmap is similar to the embodiment in which the ACK information is carried in the first Bitmap, and details are not described herein again.
  • FIG. 7 shows a data transmission device 700 provided by an embodiment of the present application.
  • the device 700 includes:
  • the receiving unit 710 is configured to receive data that is sent by at least one terminal device by using an unlicensed resource
  • the sending unit 720 is configured to send, according to the receiving condition of the data sent by the at least one terminal device, an acknowledgement message to the at least one terminal device, where the acknowledgement message includes a first bit table Bitmap and compression indication information, where the The first Bitmap is configured to indicate whether the data sent by the at least one terminal device is correctly received, where the compression indication information is used to indicate whether the first Bitmap is a compressed Bitmap, and if the first Bitmap is not a compressed Bitmap, the first Each bit in a Bitmap corresponds to at most one terminal device. If the first Bitmap is a compressed Bitmap, one bit in the first Bitmap corresponds to multiple terminal devices, and/or multiple in the first Bitmap The bit corresponds to a terminal device.
  • the data transmission device of the embodiment of the present invention through the network device, reasonably selects whether to compress the Bitmap in the acknowledgment message sent to the terminal device, and carries the compression indication information in the acknowledgment message to indicate the network device. Whether the Bitmap in the acknowledgment message is compressed, so that the terminal device can correctly parse the Bitmap in the acknowledgment message according to the compression indication information, thereby saving the overhead in the process of confirming the message transmission, thereby improving system performance.
  • the first Bitmap is a compressed Bitmap
  • the device further includes:
  • the first to-be-transmitted Bitmap carries the acknowledgement ACK information sent by the network device to the M first terminal devices in the at least one terminal device, and the device correctly receives the M first terminals.
  • the data sent by the device, M is an integer greater than or equal to 1, and the value of the bit corresponding to the K 1 hash value of each of the first terminal devices in the first to-be-transmitted Bitmap is the first value. .
  • the processing unit is configured to: determine, according to the receiving condition of the data sent by the at least one terminal device, and the first hash function set, whether the first to-be-transmitted Bitmap may cause a false positive;
  • the first to-be-transmitted Bitmap is determined as the first Bitmap if the first to-be-transmitted Bitmap does not cause a false positive.
  • the first Bitmap carries the acknowledgement ACK information sent by the network device to the M first terminal devices in the at least one terminal device, and the network device correctly receives the M first terminal devices
  • the data sent, M is an integer greater than or equal to 1
  • the processing unit 830 is specifically configured to: determine whether the value of the bit corresponding to the K 1 hash value of the device in the first Bitmap is a first value, K 1 is an integer greater than or equal to 1; if the value of the bit corresponding to the K 1 hash value of the device is the first value, determining that the data sent by the device is correctly received by the network device; K 1 bit position corresponding hash values, if the value of the device are not the first value, determining said data transmitting means is not correctly received by the network device .
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present application may be in essence or part of the contribution to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program code. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne un procédé et un dispositif d'accusé de réception pour une transmission de données sans autorisation. Le procédé comprend les étapes suivantes : un dispositif de réseau reçoit des données transmises par au moins un dispositif de terminal utilisant une ressource sans autorisation ; le dispositif de réseau transmet un message d'accusé de réception auxdits dispositifs de terminal sur la base de l'état duquel les données transmises par lesdits dispositifs de terminal, le message d'accusé de réception comprenant une première table de bits et des informations d'indication de compression, la première table de bits étant utilisée pour indiquer si les données transmises par lesdits dispositifs de terminal sont correctement reçues, et les informations d'indication de compression sont utilisées pour indiquer si la première table de bits est une table de bits compressée. Le procédé et le dispositif de transmission de données de modes de réalisation de la présente invention facilitent un surdébit réduit dans un processus de transmission de message d'accusé de réception.
PCT/CN2018/095862 2017-10-24 2018-07-17 Procédé et dispositif d'accusé de réception pour une transmission de données sans autorisation WO2019080555A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201880005709.7A CN110121901B (zh) 2017-10-24 2018-07-17 免授权数据传输的确认方法和装置

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710997523.1 2017-10-24
CN201710997523 2017-10-24

Publications (1)

Publication Number Publication Date
WO2019080555A1 true WO2019080555A1 (fr) 2019-05-02

Family

ID=66247731

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/095862 WO2019080555A1 (fr) 2017-10-24 2018-07-17 Procédé et dispositif d'accusé de réception pour une transmission de données sans autorisation

Country Status (2)

Country Link
CN (1) CN110121901B (fr)
WO (1) WO2019080555A1 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113872736A (zh) * 2020-06-30 2021-12-31 成都鼎桥通信技术有限公司 数据传输方法、装置、设备和存储介质
US20220038221A1 (en) * 2018-09-28 2022-02-03 Sony Corporation Methods, terminal device and infrastructure equipment using transmission on a preconfigured uplink resource
US20220086819A1 (en) * 2020-09-17 2022-03-17 Qualcomm Incorporated Dynamic group common physical control channel
CN114979094A (zh) * 2022-05-13 2022-08-30 深圳智慧林网络科技有限公司 一种基于rtp的数据传输方法、装置、设备和介质
CN114979094B (zh) * 2022-05-13 2024-06-07 深圳智慧林网络科技有限公司 一种基于rtp的数据传输方法、装置、设备和介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113938905A (zh) * 2020-06-29 2022-01-14 华为技术有限公司 数据传输方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187173A (zh) * 2015-09-08 2015-12-23 魅族科技(中国)有限公司 用于非授权频谱上的数据重传方法及装置
CN106550439A (zh) * 2015-09-23 2017-03-29 华为技术有限公司 一种非连续接收的方法以及终端设备
CN107113826A (zh) * 2015-01-27 2017-08-29 华为技术有限公司 用于免授权上行链路传输方案的传输系统和方法
US20170288817A1 (en) * 2016-04-01 2017-10-05 Huawei Technologies Co., Ltd. Harq systems and methods for grant-free uplink transmissions

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11818717B2 (en) * 2014-12-31 2023-11-14 Texas Instruments Incorporated Method and apparatus for uplink control signaling with massive Carrier Aggregation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107113826A (zh) * 2015-01-27 2017-08-29 华为技术有限公司 用于免授权上行链路传输方案的传输系统和方法
CN105187173A (zh) * 2015-09-08 2015-12-23 魅族科技(中国)有限公司 用于非授权频谱上的数据重传方法及装置
CN106550439A (zh) * 2015-09-23 2017-03-29 华为技术有限公司 一种非连续接收的方法以及终端设备
US20170288817A1 (en) * 2016-04-01 2017-10-05 Huawei Technologies Co., Ltd. Harq systems and methods for grant-free uplink transmissions

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220038221A1 (en) * 2018-09-28 2022-02-03 Sony Corporation Methods, terminal device and infrastructure equipment using transmission on a preconfigured uplink resource
US11979241B2 (en) * 2018-09-28 2024-05-07 Sony Corporation Methods, terminal device and infrastructure equipment using transmission on a preconfigured uplink resource
CN113872736A (zh) * 2020-06-30 2021-12-31 成都鼎桥通信技术有限公司 数据传输方法、装置、设备和存储介质
CN113872736B (zh) * 2020-06-30 2023-08-18 成都鼎桥通信技术有限公司 数据传输方法、装置、设备和存储介质
US20220086819A1 (en) * 2020-09-17 2022-03-17 Qualcomm Incorporated Dynamic group common physical control channel
WO2022060716A1 (fr) * 2020-09-17 2022-03-24 Qualcomm Incorporated Canal physique de commande commune de groupe dynamique
CN114979094A (zh) * 2022-05-13 2022-08-30 深圳智慧林网络科技有限公司 一种基于rtp的数据传输方法、装置、设备和介质
CN114979094B (zh) * 2022-05-13 2024-06-07 深圳智慧林网络科技有限公司 一种基于rtp的数据传输方法、装置、设备和介质

Also Published As

Publication number Publication date
CN110121901A (zh) 2019-08-13
CN110121901B (zh) 2021-05-11

Similar Documents

Publication Publication Date Title
US11751206B2 (en) Method and apparatus for sending and receiving downlink control information
US9215724B2 (en) Method and apparatus for dynamic control of TTI bundling sizes
US11032778B2 (en) Uplink channel power allocation method and apparatus
CN108353405B (zh) 用于无线通信系统中下行链路控制信道传送和检测的方法和装置
WO2018121293A1 (fr) Dispositif de réseau, terminal et procédé de transmission sans licence
US11647503B2 (en) Information transmission method, terminal device, and network device
CN105519222B (zh) 数据传输方法和设备
CN109802750B (zh) 信息传输方法及装置
TWI768429B (zh) 處理接收的裝置及方法
WO2019080555A1 (fr) Procédé et dispositif d'accusé de réception pour une transmission de données sans autorisation
CN109672506B (zh) 数据传输的确认方法及设备
US11405159B2 (en) Method for transmitting feedback information, terminal device and network device
JP2019535176A (ja) グラントフリー伝送方法、ネットワークデバイス、および端末デバイス
US20200228251A1 (en) Method and apparatus for feedback transmission and reception in wireless communication system
WO2019242710A1 (fr) Procédé et appareil de génération d'informations de demande de répétition automatique hybride (harq)
US20180324821A1 (en) Cross-carrier scheduling method, feedback method, and apparatus
US20200067644A1 (en) Data feedback method and related device
CN111356236A (zh) 上行传输的方法、上行传输的装置、以及终端设备
WO2018228236A1 (fr) Procédé et dispositif de transmission de données
WO2017054208A1 (fr) Procédé et appareil pour déterminer et indiquer une ressource d'interface hertzienne
US11122601B2 (en) Buffer status report sending method, terminal device, and network device
JP2020503776A (ja) 複数のキャリア上でデータを送信するための方法、端末装置、およびネットワーク装置
WO2019028965A1 (fr) Procédé et dispositif de transmission de données
US10986619B2 (en) Method and apparatus for determining uplink transmission timing in wireless communication system
CN109565883B (zh) 基于竞争的上行链路数据传输

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18871714

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18871714

Country of ref document: EP

Kind code of ref document: A1