WO2020094133A1 - 数据传输的方法和通信装置 - Google Patents

数据传输的方法和通信装置 Download PDF

Info

Publication number
WO2020094133A1
WO2020094133A1 PCT/CN2019/116781 CN2019116781W WO2020094133A1 WO 2020094133 A1 WO2020094133 A1 WO 2020094133A1 CN 2019116781 W CN2019116781 W CN 2019116781W WO 2020094133 A1 WO2020094133 A1 WO 2020094133A1
Authority
WO
WIPO (PCT)
Prior art keywords
time domain
domain resource
time
domain resources
resources
Prior art date
Application number
PCT/CN2019/116781
Other languages
English (en)
French (fr)
Inventor
马蕊香
官磊
李�远
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201910028765.9A external-priority patent/CN111181707B/zh
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to BR112021008666A priority Critical patent/BR112021008666A2/pt
Priority to JP2021524305A priority patent/JP7319363B2/ja
Priority to CA3118605A priority patent/CA3118605A1/en
Priority to EP19881571.4A priority patent/EP3869886A4/en
Publication of WO2020094133A1 publication Critical patent/WO2020094133A1/zh
Priority to US17/313,903 priority patent/US20210266912A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation

Definitions

  • the present application relates to the field of communication, and more specifically, to a data transmission method and communication device.
  • the fifth generation (5G) mobile communication system is dedicated to supporting higher system performance, supporting multiple service types, different deployment scenarios, and a wider spectrum range.
  • multiple business types include enhanced mobile broadband (eMBB), massive machine type communication (mMTC), ultra-reliable and low-latency communication (URLLC), multimedia Broadcast and multicast services (multimedia broadcast service, MBMS) and positioning services.
  • the business types of URLLC include many, and typical use cases include industrial control, industrial production process automation, human-computer interaction, and telemedicine.
  • the specific requirements of the URLLC service include: the reliability of data transmission reaches 99.999%, the transmission delay is less than 1ms, and the signaling overhead is reduced as much as possible under the requirements of high reliability and low delay. Ensuring the reliability and delay of URLLC has become a very important issue in this field. In order to ensure the reliability of the data transmission of the URLLC service, at present, it is proposed to repeat the data transmission based on the slot level to improve the reliability of the data transmission of the URLLC service and reduce the delay, but it still cannot meet the requirements of the URLLC service.
  • This application provides a data transmission method and device, which can realize the repeated transmission of data on multiple mini-slot level time domain resources, and further reduce the time of data transmission on the premise of improving the reliability of data transmission Delay.
  • a data transmission method is provided.
  • the execution subject of the transmission method may be either a terminal device or a chip applied to the terminal device.
  • the method includes: the terminal device determines A time domain resource; the terminal device determines M second time domain resources according to the first time domain resource, M is an integer greater than 1; the terminal device sends M times the first time domain network resource to the network device on the M second time domain resources One data or M transmissions of the second data received from the network device.
  • data is repeatedly transmitted on the M second time domain resources, and the M second time domain resources are determined according to the first time domain resources, and the M second time domain resources Can be the length of the mini-slot level.
  • the repeated data transmission is realized, the time delay of data transmission is reduced, and the reliability of data transmission is also improved.
  • the terminal device determining M second time domain resources according to the first time domain resource includes: the terminal device determining R third times according to the first time domain resource For the domain resource, R is an integer greater than 1.
  • the terminal device determines the M second time domain resources according to whether the R third time domain resources cross the slot boundary.
  • the terminal device determines the M second time domain resources according to whether the R third time domain resources cross a slot boundary, including: when the R third time domain resources Under the condition that none of the domain resources cross the slot boundary, the R third time domain resources are determined to be the second time domain resources of M, and M is equal to R.
  • the terminal device determines the M second time-domain resources according to whether the R third time-domain resources cross a slot boundary, including: Among the three time-domain resources, the time-domain resources that cross the slot boundary are divided according to the slot boundary; the terminal device is divided according to the time-domain resources that do not cross the slot boundary and the slot boundary among the R third time-domain resources After the time domain resources, the M second time domain resources are determined.
  • the terminal device determines the M second time-domain resources according to whether the R third time-domain resources cross a slot boundary, including: Among the three time-domain resources, the time-domain resources that cross the slot boundary are divided according to the slot boundary; the terminal device is divided according to the time domain resources that do not cross the slot boundary and the slot boundary among the R third time-domain resources After the time domain resource, the M second time domain resources are determined, where M is equal to R.
  • the terminal device divides the time domain resources across the slot boundary from the R third time domain resources according to the slot boundary, including: The fourth time domain resource across the time slot boundary in the third time domain resource is divided into H + 1 second time domain resources, wherein the fourth time domain resource is the time across the R third time domain resources Any time-domain resource on the slot boundary, the fourth time-domain resource spans H time slot boundaries, and H is a positive integer.
  • the H + 1 second time domain resources include: from the start symbol of the fourth time domain resource to the first time slot boundary of the H time slot boundaries
  • the time domain resource is a second time domain resource
  • the H-1 time slots in the middle are H-1 second time domain resources, from the last time slot boundary of the H time slot boundaries to the fourth time
  • the time domain resource at the end of the domain resource is a second time domain resource.
  • the M second time domain resources include a second time domain resource determined according to the fourth time domain resource and Q third time domain resources, and the Q third time domain resources
  • the domain resource is a time domain resource that does not cross a slot boundary among the R third time domain resources
  • the fourth time domain resource is any one of the time domain resources that spans a slot boundary among the R third time domain resources
  • the fourth time domain resource spans H time slot boundaries
  • the H + 1 second time domain resources determined according to the fourth time domain resource include: from the start symbol of the fourth time domain resource to the H time
  • the time domain resource of the first time slot boundary in the slot boundary is a second time domain resource
  • the middle H-1 time slots are H-1 second time domain resources. From the last of the H time slot boundaries
  • the time domain resource from the slot boundary to the end symbol of the fourth time domain resource is a second time domain resource.
  • R is greater than M.
  • the terminal device divides the time domain resources across the slot boundary from the R third time domain resources according to the slot boundary, including: The fourth time domain resource across the slot boundary in the third time domain resource is divided into H + 1 fifth time domain resources, where the fourth time domain resource is the R third time domain resource across the time slot Any time domain resource on the boundary, the fourth time domain resource spans the boundary of H time slots, and H is a positive integer; the terminal device uses the first fifth time domain resource among the H + 1 fifth time domain resources Merge with the previous third time domain resource of the fourth time domain resource to form a second time domain resource; the last fifth time domain resource among the H + 1 fifth time domain resources and the fourth The third time-domain resources after the time-domain resources are combined to form a second time-domain resource.
  • R is less than M.
  • the terminal device determining R third time domain resources according to the first time domain resource includes: the terminal device according to the number of repetitions between R and R third time domain resources , The first time domain resource is repeated R times to obtain the R third time domain resources.
  • the method further includes: the terminal device receives seventh indication information from the network device, where the seventh indication is used to indicate among the R third time-domain resources interval.
  • the interval of the R third time-domain resources is 0, or the R third time-domain resources are continuous in the time domain.
  • the terminal device determining R third time domain resources according to the first time domain resource includes: the terminal device divides the first time domain resource to obtain the R number The third time domain resource.
  • the terminal device should divide the first time domain resource to obtain the R third time domain resources, including: the terminal device uses the first time
  • the domain resource is divided into the R third time domain resources, wherein, among the R third time domain resources, there are R-1 third time domain resources, and the number of continuous symbols of each third time domain resource is L is the number of continuous symbols of the first time domain resource, and L is a positive integer.
  • the dividing the first time domain resource to obtain the R third time domain resources includes: according to the first time domain resource at a first time slot boundary The number of the preceding symbol divides the first time-domain resource to obtain the R third time-domain resources, where the first time-domain resource spans X slot boundaries, and the first time-domain resource is in the first The number of symbols before a slot boundary is T, and the number of symbols of the last third time domain resource among the R third time domain resources is less than or equal to T.
  • the dividing the first time domain resource to obtain the R third time domain resources includes: dividing the first time domain resource into X according to a slot boundary +1 time domain resource, the first time domain resource spans X time slot boundaries, and the number of symbols of the first time domain resource before the first time slot boundary is T; the X + 1 time domain resources The time-domain resources of each resource are divided according to the length of T symbols; if any of the X + 1 time-domain resources has K symbols remaining and K ⁇ T, the K symbols As a third time domain resource, or divide the K symbols into the previous third time domain resource.
  • dividing the first time domain resource to obtain the R third time domain resources includes: according to the first time domain resource after the last time slot boundary The number of symbols, divide the first time-domain resource to obtain the R third time-domain resources, where the first time-domain resource spans X slot boundaries, and the first time-domain resource is in the last The number of symbols after the slot boundary is Y, and the number of symbols of the last third time domain resource among the R third time domain resources is less than or equal to Y.
  • the dividing the first time domain resource to obtain the R third time domain resources includes: dividing the first time domain resource into X according to a slot boundary +1 time domain resource, the first time domain resource spans X slot boundaries, the number of symbols of the first time domain resource after the last slot boundary is Y; the X + 1 time domain resources The time-domain resources of each are divided according to the length of Y symbols; if any of the X + 1 time-domain resources have K symbols remaining in the time domain, and K ⁇ Y, the K symbols are used as a The third time domain resource, or divide the K symbols into the previous third time domain resource.
  • the terminal device should divide the first time domain resource to obtain R third time domain resources, including: receiving first indication information from the network device, the first An indication information is used to indicate the first division method of the first time domain resource; according to the first division method, the first time domain resource is divided into R third time domain resources, wherein the first time domain resource Corresponding to multiple division modes, the first division mode is one of the multiple division modes.
  • the method further includes: receiving second indication information from a network device, where the second indication information is used to indicate the value of the number R of repetitions.
  • the terminal device determining the first time domain resource includes: receiving third indication information from the network device, where the third indication information is used to indicate the first time domain resource
  • S is the number of the starting symbol of the first time-domain resource, S is an integer greater than or equal to zero, L is the number of symbols that the first time-domain resource continues, and L and N are positive integers.
  • the terminal device determining the first time domain resource includes: the terminal device receives third indication information from the network device, and the third indication information is used to indicate a time domain resource table
  • the row in the time-domain resource table contains the number S of the starting symbol and the number of symbols L that the first time-domain resource lasts. S is an integer greater than or equal to zero, and L is a positive integer; L. Determine the time domain position of the first time domain resource.
  • the time domain resource table is configured for high-level signaling.
  • the determining the first time domain resource includes: receiving fourth indication information from a network device, where the fourth indication information is used to indicate that the first time domain resource spans The number of timeslot boundaries X, X is a non-negative integer; receiving fifth indication information from the network device, the fifth indication information is used to indicate the number S and reference of the start symbol of the first time domain resource Length L; the number of the starting symbol of the first time domain resource is S, and the length is L + (X-1) * 14 symbols.
  • the determining the first time domain resource includes: receiving sixth indication information from a network device, where the sixth indication information is used to indicate that the first time domain resource spans The number of time slots W, W is a non-negative integer; receiving fifth indication information from the network device, the fifth indication information is used to indicate the number S and the reference length of the starting symbol of the first time domain resource L; the number S of the starting symbol of the first time domain resource is L + W * 14 symbols.
  • a data transmission method is provided.
  • the execution subject of the transmission method may be either a network device or a chip applied to a network device.
  • the method includes: A time domain resource; the network device determines M second time domain resources according to the first time domain resource, M is an integer greater than 1; the network device sends the M times to the terminal device on the M second time domain resources Two data or M transmissions of the first data received from the terminal device.
  • the data transmission method provided in the second aspect because data is repeatedly transmitted on the M second time domain resources, and the M second time domain resources are determined according to the first time domain resources, and the M second time domain resources Can be the length of the mini-slot level.
  • the repeated data transmission is realized, the time delay of data transmission is reduced, and the reliability of data transmission is also improved.
  • the network device determining M second time domain resources according to the first time domain resource includes: the network device determining R third times according to the first time domain resource For the domain resource, R is an integer greater than 1.
  • the network device determines the M second time domain resources according to whether the R third time domain resources cross the slot boundary.
  • the network device determines the M second time-domain resources according to whether the R third time-domain resources cross the slot boundary, including: Under the condition that none of the domain resources cross the slot boundary, the R third time domain resources are determined to be the second time domain resources of M, and M is equal to R.
  • the network device determines the M second time domain resources according to whether the R third time domain resources cross the slot boundary, including: the network device uses the R third time domain resources Among the three time-domain resources, the time-domain resources that cross the slot boundary are divided according to the slot boundary; the network device is divided according to the time-domain resources that do not cross the slot boundary and the slot boundary among the R third time-domain resources After the time domain resources, the M second time domain resources are determined.
  • M is equal to R.
  • the network device should divide the time domain resources across the slot boundary of the R third time domain resources according to the slot boundary, including: the network device divides the R The fourth time domain resource across the time slot boundary among the third time domain resources is divided into H + 1 second time domain resources, where the fourth time domain resource is across the R third time domain resources Any time domain resource on a slot boundary, the fourth time domain resource spans H slot boundaries, and H is a positive integer.
  • the H + 1 second time domain resources include: from the start symbol of the fourth time domain resource to the first time slot boundary of the H time slot boundaries
  • the time domain resource is a second time domain resource
  • the H-1 time slots in the middle are H-1 second time domain resources, from the last time slot boundary of the H time slot boundaries to the fourth time
  • the time domain resource at the end of the domain resource is a second time domain resource.
  • the M second time domain resources include a second time domain resource determined according to the fourth time domain resource and Q third time domain resources, and the Q third time domain resources
  • the domain resource is a time domain resource that does not cross a slot boundary among the R third time domain resources
  • the fourth time domain resource is any one of the time domain resources that spans a slot boundary among the R third time domain resources
  • the fourth time domain resource spans H time slot boundaries
  • the H + 1 second time domain resources determined according to the fourth time domain resource include: from the start symbol of the fourth time domain resource to the H time
  • the time domain resource of the first time slot boundary in the slot boundary is a second time domain resource
  • the middle H-1 time slots are H-1 second time domain resources. From the last of the H time slot boundaries
  • the time domain resource from the slot boundary to the end symbol of the fourth time domain resource is a second time domain resource.
  • R is greater than M.
  • the network device should divide the time domain resources across the slot boundary of the R third time domain resources according to the slot boundary, including: the network device divides the R The fourth time domain resource across the time slot boundary among the third time domain resources is divided into H + 1 fifth time domain resources, where the fourth time domain resource is the time across the R third time domain resources Any time domain resource on the slot boundary, the fourth time domain resource spans the boundary of H time slots, and H is a positive integer; the network device uses the first fifth time domain among the H + 1 fifth time domain resources The resource is merged with the previous third time domain resource of the fourth time domain resource to form a second time domain resource; the last time domain resource among the H + 1 fifth time domain resources is combined with the fourth time domain resource The third time domain resources after the domain resources are combined to form a second time domain resource.
  • R is less than M.
  • the network device determining R third time domain resources according to the first time domain resource includes: the network device according to the number of repetitions between R and R third time domain resources , The first time domain resource is repeated R times to obtain the R third time domain resources.
  • the method further includes: the network device sends seventh indication information to the terminal device, where the seventh indication is used to indicate an interval between the R third time-domain resources.
  • the interval of the R third time-domain resources is 0, or the R third time-domain resources are continuous in the time domain.
  • the network device determining R third time domain resources according to the first time domain resource includes: the network device divides the first time domain resource to obtain the R third Three time domain resources.
  • the network device should divide the first time domain resource to obtain the R third time domain resources, including: the network device uses the first time
  • the domain resource is divided into the R third time domain resources, wherein, among the R third time domain resources, there are R-1 third time domain resources, and the number of continuous symbols of each third time domain resource is L is the number of continuous symbols of the first time domain resource, and L is a positive integer.
  • the dividing the first time domain resource to obtain the R third time domain resources includes: according to the first time domain resource at a first time slot boundary The number of the preceding symbol divides the first time-domain resource to obtain the R third time-domain resources, where the first time-domain resource spans X slot boundaries, and the first time-domain resource is in the first The number of symbols before a slot boundary is T, and the number of symbols of the last third time domain resource among the R third time domain resources is less than or equal to T.
  • dividing the first time domain resource to obtain the R third time domain resources includes: dividing the first time domain resource into X according to a slot boundary +1 time domain resource, the first time domain resource spans X time slot boundaries, and the number of symbols of the first time domain resource before the first time slot boundary is T; the X + 1 time domain resources The time-domain resources of each resource are divided according to the length of T symbols; if any of the X + 1 time-domain resources has K symbols remaining and K ⁇ T, the K symbols As a third time domain resource, or divide the K symbols into the previous third time domain resource.
  • dividing the first time domain resource to obtain the R third time domain resources includes: according to the first time domain resource after the last time slot boundary The number of symbols, divide the first time-domain resource to obtain the R third time-domain resources, where the first time-domain resource crosses X slot boundaries, and the first time-domain resource is in the last The number of symbols after the slot boundary is Y, and the number of symbols of the last third time domain resource among the R third time domain resources is less than or equal to Y.
  • dividing the first time domain resource to obtain the R third time domain resources includes: dividing the first time domain resource into X according to a slot boundary +1 time domain resource, the first time domain resource spans X slot boundaries, the number of symbols of the first time domain resource after the last slot boundary is Y; the X + 1 time domain resources The time-domain resources of each are divided according to the length of Y symbols; if any of the X + 1 time-domain resources have K symbols remaining in the time domain, and K ⁇ Y, the K symbols are used as a The third time domain resource, or divide the K symbols into the previous third time domain resource.
  • the network device should divide the first time domain resource to obtain the R third time domain resources, including: the network device sends the first indication information to the terminal device, the The first indication information is used to indicate a first division method of the first time domain resource, and the network device divides the first time domain resource into the R third time domain resources according to the first division method, wherein the first A time domain resource corresponds to multiple division modes, and the first division mode is one of the multiple division modes.
  • the method further includes: the network device sends second indication information to the terminal device, where the second indication information is used to indicate the value of the number R of repetitions.
  • the method further includes: the network device sends third indication information to the terminal device, where the third indication information is used to indicate the start of the first time domain resource and the length indication value SLIV , Where SLIV and S and L satisfy the following mapping relationship:
  • S is the number of the starting symbol of the first time-domain resource, S is an integer greater than or equal to zero, L is the number of symbols that the first time-domain resource continues, and L and N are positive integers.
  • the method further includes: the network device sends third indication information to the terminal device, where the third indication information is used to indicate a row in the time domain resource table, and the time domain resource table
  • the line of contains the number S of the starting symbol and the number of symbols L that the first time-domain resource continues. S is an integer greater than or equal to zero, and L is a positive integer.
  • the time domain resource table is configured for high-level signaling.
  • the method further includes: sending fourth indication information to the terminal device, where the fourth indication information is used to indicate the number of time slot boundaries crossed by the first time domain resource X and X are non-negative integers; send fifth indication information to the terminal device, where the fifth indication information is used to indicate the number S and reference length L of the start symbol of the first time domain resource;
  • the number of the starting symbol of the first time domain resource is S, and the length is L + (X-1) * 14 symbols.
  • the method further includes: sending sixth indication information to the terminal device, where the sixth indication information is used to indicate the number of time slots spanned by the first time domain resource W , W is a non-negative integer; send fifth indication information to the terminal device, the fifth indication information is used to indicate the number S and length L of the start symbol of the first time domain resource; wherein, the The number S of the starting symbol is L + W * 14 symbols in length.
  • a communication device which includes a unit for performing each step in the above first aspect or any possible implementation manner of the first aspect.
  • a communication device including a unit for performing each step in the above second aspect or any possible implementation manner of the second aspect.
  • a communication device including at least one processor and a memory, the at least one processor configured to execute the method in the above first aspect or any possible implementation manner of the first aspect.
  • a communication device includes at least one processor and a memory, and the at least one processor is configured to execute the method in the second aspect or any possible implementation manner of the second aspect.
  • a communication device includes at least one processor and an interface circuit, and the at least one processor is configured to execute the method in the above first aspect or any possible implementation manner of the first aspect.
  • a communication device includes at least one processor and an interface circuit, and the at least one processor is configured to execute the method in the second aspect or any possible implementation manner of the second aspect.
  • a terminal device in a ninth aspect, includes the communication device provided in the third aspect above, or the terminal includes the communication device provided in the fifth aspect above, or the terminal includes the communication provided in the seventh aspect above Device.
  • a network device including the communication device provided in the fourth aspect above, or the network device includes the communication device provided in the sixth aspect above, or the network device includes the eighth aspect provided above Communication device.
  • a computer program product includes a computer program, which when executed by a processor, is used to execute the method in the first aspect or any possible implementation manner of the first aspect Or execute the method in the second aspect or any possible implementation manner of the second aspect.
  • a computer-readable storage medium in which a computer program is stored, and when the computer program is executed, it is used to execute the first aspect or any possible implementation manner of the first aspect In the second aspect or any possible implementation of the second aspect.
  • FIG. 2 is a schematic interaction diagram of an example of a data transmission method provided by an embodiment of the present application.
  • FIG. 3 is a schematic interaction diagram of another example of a data transmission method provided by an embodiment of the present application.
  • FIG. 4 is a schematic interaction diagram of another example of a data transmission method provided by an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a third time domain resource according to an embodiment of the present application.
  • FIG. 6 is a schematic interaction diagram of an example of a data transmission method provided by an embodiment of the present application.
  • FIG. 7 is a schematic diagram of a third time domain resource according to an embodiment of the present application.
  • FIG. 8 is a schematic diagram of second time domain resources according to an embodiment of the present application.
  • FIG. 9 is a schematic diagram of a second time domain resource according to another embodiment of the present application.
  • FIG. 10 is a schematic diagram of second time domain resources according to another embodiment of the present application.
  • FIG. 11 is a schematic interaction diagram of another example of a data transmission method provided by an embodiment of the present application.
  • FIG. 12 is a schematic interaction diagram of another example of a data transmission method provided by an embodiment of the present application.
  • FIG. 13 is a schematic diagram of a first time-domain resource division manner in which the length of a symbol is 8 symbols according to an embodiment of the present application.
  • FIG. 14 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to an embodiment of the present application.
  • 15 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to another embodiment of the present application.
  • 16 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to another embodiment of the present application.
  • FIG. 17 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to another embodiment of the present application.
  • FIG. 18 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to another embodiment of the present application.
  • FIG. 19 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to another embodiment of the present application.
  • 20 is a schematic interaction diagram of another example of a data transmission method provided by an embodiment of the present application.
  • 21 is a schematic diagram of a communication device provided by an embodiment of the present application.
  • FIG. 22 is a schematic diagram of yet another example of a communication device provided by an embodiment of the present application.
  • FIG. 23 is a schematic diagram of a communication device provided by an embodiment of the present application.
  • 24 is a schematic diagram of yet another example of a communication device provided by an embodiment of the present application.
  • FIG. 25 is a schematic diagram of a terminal device provided by an embodiment of the present application.
  • FIG. 26 is a schematic diagram of a network device provided by an embodiment of the present application.
  • LTE Long Term Evolution
  • 5G 5th Generation
  • NR new radio
  • FIG. 1 is a schematic structural diagram of a mobile communication system applicable to an embodiment of the present application.
  • the mobile communication system 100 may include a core network device 110, a radio access network device 120, and at least one terminal device (terminal device 130 and terminal device 140 shown in FIG. 1).
  • the terminal device is connected to the wireless access network device in a wireless manner
  • the wireless access network device is connected to the core network device in a wireless or wired manner.
  • the core network device and the wireless access network device may be independent and different physical devices, or they may integrate the functions of the core network device and the logical function of the wireless access network device on the same physical device, or may be a physical device It integrates the functions of some core network devices and some of the wireless access network devices.
  • the terminal device may be fixed or mobile.
  • FIG. 1 is only a schematic diagram, and the communication system may also include other network devices, such as wireless relay devices and wireless backhaul devices, which are not shown in FIG. 1.
  • the embodiments of the present application do not limit the number of core network devices, radio access network devices, and terminal devices included in the mobile communication system.
  • the terminal device in the mobile communication system 100 may also be called a terminal, a user equipment (UE), a mobile station (MS), a mobile terminal (MT), and so on.
  • Terminal devices can be mobile phones, tablets, computers with wireless transceiver functions, virtual reality (Virtual Reality, VR) terminal devices, augmented reality (Augmented Reality, AR) terminal devices, industrial control (industrial control) ), Wireless terminals in self-driving (self-driving), wireless terminals in remote surgery (remote medical), wireless terminals in smart grid (smart grid), wireless in transportation safety (transportation safety) Terminals, wireless terminals in smart cities (smart cities), wireless terminals in smart homes (smart homes), etc.
  • the aforementioned terminal devices and chips applicable to the aforementioned terminal devices are collectively referred to as terminal devices. It should be understood that the embodiments of the present application do not limit the specific technology and the specific device form adopted by the terminal device.
  • the wireless access network device 120 is an access device in which the terminal device wirelessly accesses the mobile communication system.
  • the wireless access network device 120 may be: a base station, an evolved base station (evolved node B, base station), a home base station, an access point (AP) in a wireless fidelity (WIFI) system, a wireless Relay nodes, wireless backhaul nodes, transmission points (transmission points, TP) or transmission reception points (transmission reception points, TRP), etc., can also be gNB in the NR system, or can also be a component or part of a base station Equipment, such as centralized unit (CU), distributed unit (DU) or baseband unit (BBU), etc.
  • CU centralized unit
  • DU distributed unit
  • BBU baseband unit
  • the specific technology and the specific device form adopted by the wireless access network device are not limited.
  • the wireless access network equipment is referred to as network equipment for short.
  • network equipment refers to wireless access network equipment.
  • the network device may refer to the network device itself, or may be a chip applied in the network device to complete the wireless communication processing function.
  • the terminal device or the network device includes a hardware layer, an operating system layer running on the hardware layer, and an application layer running on the operating system layer.
  • the hardware layer includes hardware such as a central processing unit (CPU), memory management unit (MMU), and memory.
  • the operating system may be any one or more computer operating systems that implement business processes through processes, for example, a Linux operating system, a Unix operating system, an Android operating system, an iOS operating system, or a windows operating system.
  • the application layer includes browser, address book, word processing software, instant messaging software and other applications.
  • the embodiment of the present application does not specifically limit the specific structure of the execution body of the method provided in the embodiment of the present application, as long as it can run the program that records the code of the method provided by the embodiment of the present application to provide according to the embodiment of the present application
  • the method may be used for communication.
  • the execution body of the method provided in the embodiments of the present application may be a terminal device or a network device, or a functional module in the terminal device or network device that can call a program and execute the program.
  • various storage media described herein may represent one or more devices and / or other machine-readable media for storing information.
  • machine-readable medium may include, but is not limited to, wireless channels and various other media capable of storing, containing, and / or carrying instructions and / or data.
  • Time domain resources or time units
  • time domain symbols
  • one time domain resource is not limited.
  • one time domain resource may be one or more subframes; alternatively, it may be one or more time slots; or, it may be one or more symbols.
  • multiple time-domain resources have a time-series relationship in the time domain, and the time lengths corresponding to any two time-domain resources may be the same or different.
  • a major feature of the 5G system compared with the 4G communication system is the increased support for URLLC services.
  • the business types of URLLC include many, and typical use cases include industrial control, industrial production process automation, human-computer interaction, and telemedicine.
  • the performance indicators of URLLC services are currently defined as follows:
  • Delay is defined as the transmission required by the user application layer data packets from the service data unit (SDU) at the sending end wireless protocol stack 2 or 3 layer to the receiving end wireless protocol stack 2 or 3 layer SDU time.
  • the user plane delay requirement of URLLC service is 0.5ms for both uplink and downlink.
  • the performance requirement of 0.5ms here only applies to both the sending end (such as a base station) and the receiving end (such as a terminal) being in a discontinuous reception state (discontinuous reception (DRX)).
  • DRX discontinuous reception
  • the performance requirement of 0.5ms refers to the average delay of the data packet, and is not tied to the reliability requirements described below.
  • the process of the terminal device determining the time domain resource for sending data to the network device (ie, uplink transmission) or determining the time domain resource for receiving data sent by the network device (ie, downlink transmission) mainly includes:
  • the terminal device first determines a time domain resource table.
  • the time domain resource table may include an S parameter and an L parameter.
  • S is a start symbol (number of the start symbol) indicating a data channel.
  • L length is the number of symbols occupied by the data channel.
  • the terminal device receives the indication information sent by the network device, the indication information is used to indicate a certain row of the time domain resource table, or the indication information can also be used to indicate the result of joint coding based on S and L in the time domain resource table A start and length indicator (SLIV), which may be included in the time domain resource table.
  • the terminal device can determine the time domain resource according to a row or SLIV of the time domain resource table indicated by the network device,
  • the process of the terminal device determining the time domain resource for sending data to the network device or determining the time domain resource for receiving data sent by the network device will be specifically described below.
  • the terminal device determines a time domain resource table.
  • the time domain resource table may be a time domain resource table specified in the protocol or a time domain resource table configured for high-level signaling.
  • the time domain resource table includes 16 rows, and for uplink transmission, each row includes:
  • One S parameter one L parameter, K2 parameter or K0 parameter, physical downlink shared channel (physical downlink shared channel, PDSCH) mapping type (mapping) type or physical uplink shared channel (physical uplink link shared channel, PUSCH) mapping type (mapping type) ).
  • physical downlink shared channel physical downlink shared channel, PDSCH
  • mapping type mapping
  • physical uplink shared channel physical uplink link shared channel, PUSCH
  • S is the number representing the start symbol of the data channel, and S is referenced to the boundary of the slot.
  • L is the number of symbols occupied by the data channel, and may also be called the number of continuous symbols of the data channel, or may be called the time-domain length of the data channel. L is the number of consecutive symbols starting from S.
  • the time domain resources determined by S and L must be in a slot, and a certain time domain resource will not cross the slot boundary.
  • K2 is the number of slots indicating the transmission interval of the physical uplink shared channel (physical uplink link shared channel, PUSCH) received from the physical downlink control channel (physical downlink control channel, PDCCH), and K0 refers to the physical downlink link shared channel received from the PDCCH.
  • PUSCH physical uplink shared channel
  • PDCCH physical downlink control channel
  • PDSCH physical downlink link shared channel
  • the PDSCH mapping type mainly determines the time domain symbol position of the demodulation reference signal (DMRS) of the PDSCH, and can also be used to determine all reasonable start positions and durations of the PDSCH.
  • the PDSCH mapping includes two types: type A (type A) or type B (type B). type A indicates that the position of the first DMRS is in the third or fourth symbol of the slot, and type B indicates that the position of the first DMRS is the first symbol in the beginning of the data.
  • the PUSCH mapping type mainly determines the time-domain symbol position of the demodulation reference signal (DMRS) of the PUSCH, and can also be used to determine all reasonable starting positions and durations of the PUSCH.
  • PUSCH mapping includes two types: type A (type A) or type B (type B). type A indicates that the position of the first DMRS is the third symbol or the fourth symbol of the slot, and type B indicates that the position of the first DMRS is the first symbol at the beginning of the data.
  • the SLIV value is the result obtained by jointly coding S and L.
  • SLIV and S and L satisfy the following mapping relationship:
  • mapping relationship (1) the above mapping relationship is referred to as a mapping relationship (1).
  • the value range of S is 0 to 13, combined with the above mapping relationship (1), it can be seen that the time domain resources determined by S and L will not cross the boundary of the slot.
  • a SLIV value can uniquely determine a combination of the value of S and the value of L, and a combination of the value of S and the value of L can also uniquely determine a SLIV value.
  • K2 parameter The definition of the K2 parameter, K0 parameter, PDSCH mapping type and PUSCH mapping type is similar to the definition of the time domain resource table specified in the protocol, and will not be described here.
  • Table 1 and Table 2 further restrict the combination of the values of S and L for different mapping types.
  • Table 1 is a combination table of effective S and L in the time domain resource for downlink transmission
  • Table 2 is a combination table of S and L in the time domain resource for uplink transmission.
  • the start symbol S can only be equal to 0, and the length L can be any value from 4 to 14, but it must not exceed 14 to satisfy S + L. Because once it is exceeded, since the length of a slot is 14 symbols, if the value of S + L exceeds 14, it means that the time domain resource crosses the slot boundary, that is, exceeds the boundary of one slot, and crosses to the next slot went. Since the start position of a certain time slot is generally placed on the control channel, not used to carry data, if a certain time domain resource crosses into the next slot, it will affect the scheduling of network equipment and data transmission. Therefore, S + L cannot exceed 14, and the value of S is less than or equal to 13.
  • the terminal device After the terminal device determines a certain time-domain resource table, for example, after adopting the time-domain resource table specified in the protocol, and then receives the PDCCH sent by the network device, the PDCCH carries control information downlink control information (downlink control information, DCI), The DCI contains a field with a length of X bits. This field is used to indicate a row in the time domain resource table, thereby indicating the start symbol S and the length L of the data channel.
  • the terminal device may also receive high-level signaling sent by the network device. The high-level signaling indicates a row in the time-domain resource table, that is, the start symbol S and the length L of the data channel.
  • the terminal device After the terminal device receives the time domain resource table configured by the higher layer, it also receives the PDCCH sent by the network device or the higher layer signaling sent by the network device.
  • the PDCCH or higher layer signaling is used to indicate the time domain configured by the higher layer
  • SLIV can be determined according to the above mapping relationship (1).
  • the values of S and L should meet the conditions of Table 1 and Table 2 above.
  • the terminal device determines S and L according to the SLIV value, and then determines the location of the time domain resource according to S and L.
  • the terminal device can determine the start symbol and the number of symbols of the time domain resource of the data channel. Then send data to the network device or receive data sent by the network device on the time domain resource.
  • the method for the network device to determine the start symbol and the number of symbols of the time domain resource of the data channel is similar to the above method,
  • the network device may also send high-level signaling to the terminal device.
  • the high-level signaling is used to configure an aggregation factor (aggregation factor).
  • the aggregation factor is denoted as K, and K represents data transmission in several consecutive slots.
  • the terminal device determines that the start symbol of the data channel is at symbol 2, the length is 4, and the aggregation factor is 2, meaning that data is transmitted in 2 consecutive slots, and the start symbol of the data in each slot is 2 , The length is 4.
  • the network device may also indicate the format of each slot of the terminal device through high-level signaling or through DCI.
  • the format of the slot refers to which symbols in the slot are upstream symbols, which symbols are downstream symbols, and which symbols are flexible symbols.
  • Mini-slots are shorter than a slot.
  • the duration of a mini-slot can be 2 symbols, 4 symbols, or 7 symbols.
  • Mini-slot-level repetition can be understood as: the interval between the start symbols of any two consecutive mini-slot time-domain resources is less than 14 symbols, or the interval between end symbols is less than 14 symbols.
  • the delay of mini-slot data transmission is shorter, which can further reduce the delay under the premise of ensuring multiple repetitions to improve reliability.
  • the start symbol of a time-domain resource for transmitting data is 2 and the length is 4 symbols. If mini-slot-level transmission is supported, assuming that the number of repetitions is 2, the data can be transmitted in symbols 2 to 5 and symbols 6 to 9. This means that the data can be transmitted twice in a slot. If mini-slot-level transmission is not supported, you need to wait until the symbols 2 to 5 of the next slot before repeating the transmission.
  • the present application provides a data transmission method and communication device, which can support repeated transmission of data at the mini-slot level, which solves the problem of data transmission when multiple mini-slots cross the time slot boundary, further Reduce the delay of data transmission and improve the reliability of data transmission.
  • FIG. 2 is a schematic interaction diagram of a feedback information transmission method 200 according to an embodiment of the present application.
  • the method 200 may be applied in the scenario shown in FIG. 1 Of course, it can also be applied to other communication scenarios, and the embodiments of the present application are not limited herein.
  • the data transmission method provided in this application first determines M second time-domain resources that do not cross the time slot boundary according to the first time-domain resources, and then performs a mini on the M second time-domain resources -Slot level data is repeatedly transmitted. This method further reduces the time delay of data transmission on the premise of improving the reliability of data transmission.
  • the terminal device and the network device are used as the execution bodies for executing the steps in the method 200 as an example to describe the method 200.
  • the main body for executing each step in the method 200 may also be a chip applied to a terminal device and a chip applied to a network device.
  • the method 200 includes:
  • the terminal device and the network device determine the first time domain resource.
  • the terminal device and the network device determine M second time domain resources according to the first time domain resource, where M is an integer greater than 1.
  • the terminal device For uplink data transmission, the terminal device sends the first data to the network device M times on the M second time domain resources. Correspondingly, the network device receives from the terminal device on the M second time domain resources M transmissions of the first data. Or, for downlink data transmission, the network device sends the second data to the terminal device M times on the M second time domain resources. Correspondingly, the terminal device receives from the network device on the M second time domain resources M times transmission of the second data.
  • the terminal device or the network device needs to determine the time domain resource for sending the data.
  • the data may be data of URLLC services or may be data of other service types. That is, in S210, the terminal device or the network device determines the first time domain resource for sending the data.
  • the first time domain resource is a time domain resource used when the terminal device sends data or control information to the network device, and the first time domain resource has a determined time domain boundary.
  • the length of time occupied by the first time domain resource may be fixed, that is, the first time domain resource may be a block of time domain resources.
  • the terminal device may send data or control information to the network device on all symbols or part of symbols included in the first time domain resource.
  • the time domain length of the first time domain resource may be greater than one time slot or less than one time slot.
  • the first time domain resource may or may not cross the slot boundary.
  • the first time domain resource may be a time unit, and the time slots or symbols included in the first time domain resource may all be used for uplink transmission, may also be used for downlink transmission, or may be included for uplink simultaneously. Transmission and symbols used for downstream transmission.
  • the first time domain resource includes symbol 4 to symbol 10.
  • Symbol 4 to symbol 10 may be all symbols used for uplink transmission, or may be all symbols used for downlink transmission, or symbol 4 to symbol 6 are symbols used for uplink transmission, and symbol 7 to symbol 10 are used for Downlink transmission symbol.
  • the embodiments of the present application are not limited herein.
  • the terminal device or the network device determines M second time domain resources according to the first time domain resource, where M is an integer greater than 1. For example, for the data of the URLLC service, it is necessary to ensure the reliability of data transmission and reduce the delay of data transmission. Therefore, after determining the first time domain resource, the terminal device or the network device will determine the first time domain resource M second time domain resources. M is an integer greater than 1.
  • the length of any one or more second time domain resources may be less than one time slot, for example, the M second time domain resources may all be mini-slot-level lengths.
  • each second time-domain resource does not cross the slot boundary.
  • the M second time domain resources may be continuous, that is, there is no time interval between two adjacent second time domain resources, or the time interval between two adjacent second time domain resources is 0.
  • the M second time domain resources may also be discontinuous, for example, separated by two symbols.
  • the M second time domain resources may be time domain resources used for uplink data transmission, or may be time domain resources used for downlink data transmission.
  • the terminal device sends the network to the network on the M second time domain resources
  • the device sends the first data M times, that is, each second time-domain resource is used to transmit the first data once, thereby achieving M repeated transmissions of the first data. That is to say, the M second time domain resources are used to repeatedly send the same data packet or transmission block.
  • the network device receives M transmissions of the first data from the terminal device on the M second time domain resources. If the M second time domain resources are time domain resources used for downlink data transmission, the network device sends the second data to the terminal device M times on the M second time domain resources.
  • the terminal device The second time domain resource receives M transmissions of the second data from the network device.
  • the M second time domain resources can be The length of the mini-slot level. The repeated data transmission is realized, the time delay of data transmission is reduced, and the reliability of data transmission is also improved.
  • FIG. 3 is a schematic interaction diagram of a data transmission method according to another embodiment of the present application.
  • the terminal device and the network device determine M second time domain resources according to the first time domain resources, including:
  • the terminal device or the network device determines R third time-domain resources according to the first time-domain resource, and R is an integer greater than 1;
  • the terminal device or the network device determines the M second time-domain resources according to whether the R third time-domain resources cross the slot boundary.
  • the length of the first time domain resource may be greater than one time slot, it may also be less than one time slot.
  • the length of the first time domain resource may be greater than one time slot, it may also be less than one time slot.
  • a certain time-domain resource used to transmit data crosses into the next slot, it will affect the scheduling of network devices and the transmission of data. Therefore, it is necessary to ensure that none of the M second time domain resources can cross the slot boundary, that is, each second time domain resource cannot include the slot boundary from the start position to the end position. For example, suppose a slot includes 14 symbols, numbered 0 to 13, and a certain second time domain resource is symbol 8 to symbol 13, then this second time domain resource does not cross the slot boundary.
  • a certain second time domain resource is symbol 12 to symbol 2, that is, symbol 0, symbol 1, and symbol 2 extending to the next time slot, then this second time domain resource crosses the time slot boundary.
  • the first time domain resource may or may not cross the slot boundary. Therefore, in step S221, the terminal device or the network device first determines R third time-domain resources according to the first time-domain resource, and R is an integer greater than 1. In this application, if there is no special explanation, it is assumed that there are 14 symbols in a time slot, the numbers are 0 to 13, respectively.
  • the length of any one third time-domain resource may be greater than one time slot or less than one time slot. That is, any third time-domain resource may or may not cross the slot boundary.
  • the R third time-domain resources may be the length of the mini-slot level.
  • the R third time domain resources may be continuous, that is, there is no time interval between two adjacent third time domain resources, or the time interval is 0.
  • the R third time-domain resources may also be discontinuous, for example, separated by two symbols.
  • the R third time domain resources may all be time domain resources used for uplink data transmission, or may be all time domain resources used for downlink data transmission.
  • the included symbols are all symbols used for uplink data transmission, or the included symbols are all symbols used for downlink data transmission. That is, all symbols included in a third time domain resource have the same transmission direction.
  • two adjacent time-domain resources are used to transmit data in the same direction. For example, for transmitting data in the upstream direction or for transmitting data in the downstream direction, that is, the R third time domain resources are time domain resources for uplink data transmission, or the R third time domain resources are for downlink Time domain resources for data transmission.
  • step S222 after determining that the R third time domain resources are determined, the terminal device or the network device determines M second time domain resources according to whether the R third time domain resources cross the slot boundary. Since it is necessary to ensure that none of the M second time domain resources can cross the time slot boundary, the M second time domain resources are determined according to whether the R third time domain resources cross the time slot boundary, and M second time resources can be guaranteed None of the domain resources cross the time slot boundary, thereby further ensuring the reliability of data transmission on the M second time domain resources on the premise of reducing the time delay of data transmission, and improving the efficiency of data transmission.
  • FIG. 4 is a schematic interaction diagram of a data transmission method according to another embodiment of the present application.
  • the terminal device or the network device determines the M second time-domain resources according to whether the R third time-domain resources cross the slot boundary, including:
  • the R third time domain resources are M second time domain resources.
  • FIG. 5 is a schematic diagram of a third time domain resource according to an embodiment of the present application.
  • the R value is 4, that is, there are 4 third time domain resources
  • the first third time domain resource is symbol 10 to symbol 11
  • the second third time domain resource is symbol 12 to symbol 13
  • the first The three third time domain resources are symbols 0 to 1 of the next time slot
  • the fourth third time domain resources are symbols 2 to 3. It can be seen that none of the four third time-domain resources crosses the time slot boundary.
  • the four third time-domain resources are determined to be the second time-domain resources, that is, the M value is 4.
  • the first second time domain resource is symbol 10 to symbol 11, the second second time domain resource is symbol 12 to symbol 13, and the third second time domain resource is symbol 0 to symbol of the next time slot 1.
  • the fourth second time domain resource is symbol 2 to symbol 3.
  • FIG. 6 is a schematic interaction diagram of a data transmission method according to another embodiment of the present application.
  • the terminal device or the network device determines the M second time-domain resources according to whether the R third time-domain resources cross the slot boundary, including:
  • S222b The terminal device or the network device divides the time domain resource across the slot boundary among the R third time domain resources according to the slot boundary.
  • S222c The terminal device or the network device determines the M second time domain resources according to the time domain resources that do not cross the slot boundary and the time domain resources divided according to the slot boundary among the R third time domain resources.
  • step S222b since it is necessary to ensure that none of the M second time domain resources cross the slot boundary, and the M second time domain resources are determined according to the R third time domain resources. Therefore, in step S222b, if there is a third time domain resource across the slot boundary among the R third time domain resources, it is also necessary to The time domain resources are divided according to time slot boundaries to ensure that the divided time domain resources do not cross the time slot boundaries. In step S222c, the terminal device or the network device determines the M second time domains according to the time domain resources that do not cross the slot boundary and the time domain resources divided according to the slot boundary among the R third time domain resources Resources.
  • FIG. 7 is a schematic diagram of a third time domain resource according to an embodiment of the present application.
  • the R value is 3, that is, there are three third time domain resources
  • the first third time domain resource is symbol 8 to symbol 11
  • the second third time domain resource is symbol 12 to the next time slot Symbol 1
  • the third and third time domain resources are symbols 2 to 5 of the next time slot. It can be seen that the second and third time domain resources are across the time slot boundary. In this case, the The second and third time domain resources are divided according to time slot boundaries. Then, the M second time domain resources are determined according to the time domain resources obtained after the division and the time domain resources that are not divided.
  • the fourth time domain resource across the slot boundary among the R third time domain resources is divided into H + 1 second time domain resources, where the fourth time domain resource is R In the third time domain resource, any one of the time domain resources crossing the slot boundary.
  • the fourth time domain resource spans H time slot boundaries, H is a positive integer. That is, if one of the third time-domain resources crosses H slot boundaries, the third time-domain resource is divided into H + 1 second time-domain resources by slot boundaries.
  • the same data packet or transmission block is transmitted on each second time domain resource.
  • the M second time domain resources include the H + 1 second time domain resources, and further include a third time domain resource that does not cross a boundary among the R third time domain resources.
  • FIG. 8 is a schematic diagram of a second time domain resource according to an embodiment of the present application.
  • the start and end symbols of the four second time domain resources are: symbol 8 to symbol 11, symbol 12 to symbol 13, symbol 0 to symbol 1 of the next time slot, symbol 2 to symbol 5 of the next time slot.
  • the fourth time-domain resource that spans the slot boundary is divided into H + 1 fifth time-domain resources, where the fourth time-domain resource is Any one of the time domain resources across the slot boundary among the R third time domain resources, the fourth time domain resource spans the boundary of H time slots, H is a positive integer; the H + 1 fifth time domain resource
  • the first fifth time domain resource in is combined with the previous third time domain resource of the fourth time domain resource to form a second time domain resource.
  • the last fifth time domain resource among the H + 1 time domain resources and the third time domain resource following the fourth time domain resource are combined to form a second time domain resource. That is, if among the R third time domain resources, a certain third time domain resource crosses H slot boundaries, the third time domain resource is the fourth time domain resource crossing the slot boundary. In this division, R is less than M.
  • first and last fifth time domain resources are excluded from the above H + 1 fifth time domain resources, and the middle H-1 fifth time domain resources may be used as H-1 second time domain resources .
  • the fourth time domain resource is the first third time domain resource
  • the above first fifth time domain resource is directly regarded as the first second time domain resource; similarly, when the fourth time domain resource When the domain resource is the last third time domain resource, the last fifth time domain resource is directly used as the last second time domain resource.
  • the finally determined M second time domain resources include the merged and reorganized second time domain resources, and also include the third time domain resources that do not cross the boundary among the R third time domain resources, and The aforementioned H-1 second time-frequency resources.
  • FIG. 9 is a schematic diagram of a second time domain resource according to an embodiment of the present application.
  • a certain third time domain resource across the slot boundary is called a fourth time domain resource. If the fourth time domain resource crosses the boundary of H time slots, the fourth time domain resource may determine H + 1 second time domain resources.
  • the H + 1 second time domain resources include, from the fourth time The time domain resource from the start symbol of the domain resource to the first time slot boundary is a second time domain resource, and the middle H-1 time slots are H-1 second time domain resources, from the last time slot boundary to The time domain resource at the end of the fourth time domain resource is determined to be a second time domain resource.
  • the M second time domain resources include Q second time domain resources and the H + 1 second time domain resources. According to method 1, R is finally greater than M.
  • FIG. 7 is a schematic diagram of a third time domain resource according to an embodiment of the present application.
  • the R value is 3, that is, there are three third time domain resources, the first third time domain resource is symbol 8 to symbol 11, and the second third time domain resource is symbol 12 to the next time slot Symbol 1, the third and third time-domain resources are symbols 2 to 5 of the next time slot.
  • M second time domain resources determined according to R third time domain resources may be as shown in FIG. 8.
  • FIG. 8 is a schematic diagram of second time domain resources according to an embodiment of the present application.
  • the fourth time domain resource determines two second time domain resources, which are symbol 12 to symbol 13, and symbol 0 to symbol 1 in the next time slot. In this way, a total of 4 second time domain resources can be obtained. As shown in FIG. 8, each second time domain resource does not cross the time domain boundary.
  • the start and end symbols of the four second time domain resources are: symbol 8 to symbol 11, symbol 12 to symbol 13, symbol 0 to symbol 1 of the next time slot, symbol 2 to symbol 5 of the next time slot.
  • a third time domain resource across the slot boundary is called a fourth time domain resource. If the fourth time domain resource crosses the boundary of H time slots, then H + 1 second time domain resources can be determined according to the fourth time domain resource, including: the third time domain resource preceding the fourth time domain resource
  • the time domain resource from the start symbol to the first slot boundary is a second time domain resource, and the H-1 slots in the middle are H-1 second time domain resources, from the last slot boundary to the fourth
  • the time domain resource of an end symbol of a third time domain resource behind the time domain resource is determined to be a second time domain resource.
  • the H + 1 time domain resources include: from the start symbol of the fourth time domain resource to the first time slot boundary
  • the time domain resource is a second time domain resource
  • the middle H-1 time slots are H-1 second time domain resources, from the last time slot boundary to a third time domain resource behind the fourth time domain resource
  • the time-domain resource of the ending symbol of is determined as a second time-domain resource
  • the H + 1 time-domain resources include: from the fourth time-domain resource
  • the time domain resource from the start symbol of the previous third time domain resource to the first time slot boundary is a second time domain resource
  • the middle H-1 time slots are H-1 second time domain resources, from the last The time domain resource from a slot boundary to the end symbol of the fourth time domain resource is determined as a second time domain resource.
  • the fifth time domain resource is any one of the R third time domain resources that does not cross the slot boundary, and a third time domain resource in front of the fifth time domain resource and a third None of the time domain resources cross the time slot boundary, then the fifth time domain resource is a second time domain resource;
  • the M second time domain resources include: a second time domain resource determined by the fourth time domain resource and a second time domain resource determined according to the fifth time domain resource.
  • FIG. 9 is a schematic diagram of a second time domain resource according to an embodiment of the present application.
  • the first part is merged into the third time domain resource before the fourth time domain resource, and the first second time domain resource becomes symbol 8 to symbol 13 after the merge.
  • the second part is merged into the third time domain resource after the fourth time domain resource, that is, into the third third time domain resource, and the second second time domain resource is Symbol 0 to symbol 5 of the next time slot.
  • there is no fifth time domain resource that is, there is no third time domain resource that neither crosses the slot boundary, nor there is no third time domain resource that crosses the boundary, such as the first third
  • the time domain resource does not cross the boundary
  • the following third time domain resource crosses the boundary
  • the front third time domain resource crosses the boundary. Therefore, a total of 2 second time domain resources are obtained.
  • the M second time domain resources are determined according to the time domain resources that do not cross the slot boundary and the time domain resources after dividing the fourth time domain resource among the R third time domain resources, where R and M The values are equal.
  • the first P third time domain resources of the R third time domain resources do not cross the boundary, the first P third time domain resources are the first P third time domain resources of the M second time domain resources Second time domain resources.
  • the P + 1 third time domain resource among the R third time domain resources crosses the slot boundary
  • the P + 1 second time domain resource among the M second time domain resources is the P + th
  • the start symbol of a third time domain resource reaches the slot boundary.
  • the M second time domain resources include the P + 1 second time domain resources
  • P + 1 ⁇ R then the P + 2 second time domain resource among the M second time domain resources is the end symbol from the slot boundary to the P + 1 third time domain resource
  • FIG. 10 is a schematic diagram of second time domain resources according to an embodiment of the present application.
  • the second time domain resource shown in FIG. 10 may be determined by the three third time domain resources shown in FIG. 7. According to the method described in way three,
  • the M second time-domain resources include the first three of the four sixth time-domain resources, respectively: symbol 8 to symbol 11, symbol 12 to symbol 13, and symbol 0 to symbol 1 in the next time slot. So M equals 3 and R equals 3. M is equal to R, all equal to 3.
  • FIG. 11 is a schematic interaction diagram of a data transmission method according to another embodiment of the present application. As shown in FIG. 11, in step S221, the terminal device or the network device determines R third time domain resources according to the first time domain resources, including:
  • the terminal device or the network device repeats the first time domain resource R times according to the interval between the repetition times R and the R third time domain resources to obtain R third time domain resources.
  • R third time domain resources need to be determined according to the first time domain resource.
  • One possible manner is: repeating the first time domain resource R times according to the interval between the repetition times R and the R third time domain resources to obtain R third time domain resources.
  • the number of repetitions R may be predefined by the protocol, or the network device may send second indication information to the terminal device, where the second indication information is used to indicate the value of the number of repetitions R.
  • the second indication information may also be used to indicate the interval between R third time-domain resources.
  • the second indication information may be carried in DCI or high layer signaling.
  • high-level signaling may refer to signaling sent by a high-level protocol layer, and the high-level protocol layer is at least one protocol layer above the physical layer.
  • the high-level protocol layer may specifically include at least one of the following protocol layers: a medium access control (MAC) layer, a radio link control (RLC) layer, and a packet data convergence protocol (packet data convergence) protocol (PDCP) layer, radio resource control (radio resource control (RRC) layer and non-access layer (NAS).
  • MAC medium access control
  • RLC radio link control
  • PDCP packet data convergence protocol
  • RRC radio resource control
  • NAS non-access layer
  • the position of the first time-domain resource is symbol 9 to symbol 12
  • the number of symbols that determine the interval of the R third time-domain resources are all 0, the first time-domain resource Repeat 4 times, you will get 4 third time domain resources.
  • the start and end symbols of the four third time domain resources are: symbol 9 to symbol 12, symbol 13 to symbol 2, symbol 3 to symbol 6, symbol 7 to symbol 10.
  • the interval between two adjacent third time-domain resources may be the same or different.
  • the interval of the R third time-domain resources may be predefined, for example, as specified in the protocol.
  • the R third time domain resources are continuous, that is, the interval between the R third time domain resources is 0; or the network device may send seventh indication information to the terminal device, and the seventh indication information is used to indicate R The interval between the third time domain resources.
  • the seventh indication information may directly indicate the interval between every two adjacent third time domain resources in the R third time domain resources, or may indirectly indicate R number by indicating a mode of the first time domain resource The interval between resources in the third time domain.
  • the seventh indication information may be carried in DCI or high layer signaling.
  • the seventh indication information and the second indication information may carry the same DCI or higher layer signaling.
  • the network device may directly notify the terminal device of the number of repetitions R and the interval of R third time-domain resources through the indication information. Alternatively, the network device may also notify the terminal device that the R third time domain resources are continuous. If the R third time domain resources are determined to be continuous, the interval between the R third time domain resources may be determined to be 0, that is, It is an implicit instruction method. Alternatively, the correspondence between the two parameters of the length of the first time domain resource and R and the interval of the R third time domain resources may be defined in advance. For example, a table can be stored, as shown in Table 3. Table 3 shows a case where the interval between two adjacent third time-domain resources is the same, that is, the intervals between the R third time-domain resources are determined to be the same. After determining the two parameters of the length of the first time domain resource and the number of repetitions R, the interval of the R third time domain resources can be determined. It is a predetermined pattern.
  • Table 3 is only exemplary and should not cause any limitation to the embodiments of the present application.
  • the intervals between the R third time-domain resources may be partially the same or all different.
  • the interval of the R third time-domain resources may also be determined in other ways.
  • the embodiments of the present application are not limited herein.
  • FIG. 12 is a schematic interaction diagram of a data transmission method according to another embodiment of the present application.
  • the terminal device or the network device determines R third time domain resources according to the first time domain resources, including:
  • S221b The terminal device or the network device divides the first time domain resource to obtain R third time domain resources.
  • R third time domain resources need to be determined according to the first time domain resource.
  • Another possible way is to divide the first time domain resource to obtain R third time domain resources, that is, the number of continuous symbols of each third time domain resource in the R third time domain resources is less than or It is equal to the number of symbols in the first time-domain resource.
  • the terminal device or the network device divides the first time domain resource to obtain R third time domain resources, including:
  • the first time domain resource is divided into R third time domain resources, wherein, among the R third time domain resources, there are R-1 third time domain resources, each third time
  • the number of continuous symbols of domain resources is L is the number of continuous symbols of the first time domain resource, and L is a positive integer. Means round down.
  • This implementation manner can also be expressed as: the terminal device or the network device determines the R third time domain resources according to the number of repetitions R and the first time domain resource, where R-1 of the R third time domain resources The number of symbols in each third time domain resource in the third time domain resource is There is a third time-domain resource that lasts for a number of symbols L is the number of continuous symbols of the first time domain resource, and L is a positive integer. Means round down.
  • the first time domain resource may be divided according to the number of repetitions R to obtain R third time domain resources.
  • the number of repetitions R may be notified by the network device to the terminal device through indication information, which may be carried in DCI or higher layer signaling, or may be pre-defined by the protocol.
  • the R third time-domain resources there are R-1 third time-domain resources.
  • the first time domain resource is symbol 10 of the first time slot to symbol 4 of the second time slot.
  • the value of the sustained L of the first time domain resource is 9, and it is determined that R is equal to 5, calculate The calculation result is 1, then.
  • the 5 third time-domain resources there are 4 third time-domain resources, each of which has a symbol number of 1, and one third time-domain resource has 5 symbols.
  • the number of these four continuous symbols all being 1 may be the first 4 third time domain resources, the last 4 third time domain resources, or any 4 third time domain resources.
  • the four third time-domain resources may be continuous or discontinuous.
  • the number of continuous symbols of the first time-domain resource is just divisible by R, then the number of continuous symbols of each third time-domain resource in the R third time-domain resources may be equal, which is L / R. That is, the first time domain resource is divided into R third time domain resources on average.
  • the number of symbols L that the first time-domain resource lasts is just divisible by R, among the R third time-domain resources, the number of symbols that each third time-domain resource continues may not be equal.
  • the L symbols of the first time domain resource include symbols in different directions, for example, the first time domain resource is an uplink transmission resource, but L contains a downlink symbol or a reserved symbol (for example, DMRS symbol reserved). Then, when calculating the number of symbols occupied by each third time domain resource in the R third time domain resources, L should be replaced by L ', L' is the remaining symbol after removing the downlink symbols and reserved symbols in L Number.
  • the start position of the first time domain resource is the 10th symbol
  • the length L is 8
  • the first time domain resource is the symbol 10 of the first time slot to the symbol 3 of the second time slot
  • R is determined that R is equal to 4
  • the number of symbols occupied by each third time domain resource is 1.
  • R third time domain resources are all used for uplink transmission, or all symbols included in the R third time domain resources are used for downlink transmission.
  • the start position of the first time domain resource is the 10th symbol and the length L is 8, and the first time domain resource is the symbol 10 of the first time slot to the symbol 3 of the second time slot .
  • the first time domain resource contains 4 downlink symbols (symbol 12 in the first slot to symbol 1 in the second slot), and each third time domain resource in the 4 third time domain resources The number of symbols is 1, and the four third time-domain resources are the first slot symbol 10, the symbol 11, the second slot symbol 2, and the symbol 3.
  • the four third time-domain resources are all used For upstream transmission.
  • step S221b the terminal device or the network device divides the first time domain resource to obtain R third time domain resources, including:
  • the first division mode of the first time domain resource divide the first time domain resource into the R third time domain resources, where the first time domain resource corresponds to multiple division modes, and the first division mode It is one of the multiple divisions.
  • This implementation manner can also be expressed as: the terminal device or the network device determines the R third time-domain resources according to the first division method of the first time-domain resources.
  • the first time-domain resource of each length L can be predefined or configured with fixed divisions.
  • FIG. 13 is a schematic diagram of a first time domain resource division method with a length of 8 according to an embodiment of the present application. It is assumed that there are 4 division methods of the first time-domain resource with a length L of 8.
  • the division method 1 divides the first time domain resource into a third time domain resource.
  • the division manner 2 divides the first time domain resource into two third time domain resources, the first four symbols are a third time domain resource, and the last four symbols are a third time domain resource.
  • the division method 3 divides the first time domain resource into three third time domain resources, the first two symbols are a third time domain resource, the last four symbols are a third time domain resource, and the remaining middle two are A third time domain resource.
  • the division manner 4 divides the first time domain resource into four third time domain resources, and every two symbols are one third time domain resource.
  • the corresponding division mode of a first time-domain resource may only be related to the number of symbols L that the first time-domain resource continues.
  • L is determined
  • the corresponding multiple division modes are also determined.
  • the terminal device or the network device may divide the first time domain resource into the R third time domain resources according to the first time domain resource, and the first time domain resource corresponds to multiple division modes, and the first division mode It is one of the multiple divisions. Assuming that the number L of continuous symbols of the first time domain resource is 8, and the first division mode is division mode 3, it can be determined that the first time domain resource is divided into the three third time domain resources.
  • FIG. 13 is only exemplary and should not cause any limitation to the embodiments of the present application. For example, there may be more different division methods for a corresponding division method of a first time domain resource. The embodiments of the present application are not limited herein.
  • the network device may send first indication information to the terminal device, where the first indication information is used to indicate the first division manner of the first time domain resource.
  • the terminal device may determine the first division manner of the first time domain resource through the first indication information.
  • the first indication information may be carried in DCI or high-layer signaling and sent to the terminal device.
  • the first time-domain resources are divided to obtain R third time-domain resources. Since the network device does not need to notify the terminal device of the number of repetitions R, the signaling overhead can be reduced.
  • step S221b the terminal device or the network device divides the first time domain resource to obtain R third time domain resources, including:
  • the first time domain resource may be divided into the first time domain resource according to the time slot boundary in the first time domain resource
  • the R third time-domain resources can also be expressed as: the terminal device or the network device determines the R third time-domain resources according to the first time-domain resources and time slot boundaries.
  • FIG. 14 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to an embodiment of the present application.
  • the start symbol of the first time domain resource is symbol 9, and the length is 14 symbols.
  • the first time domain resource is symbol 9 of the first time slot to symbol 8 of the second time slot.
  • a third time domain resource can be divided every 5 symbols, and finally the remaining 4 symbols form a single
  • the first time domain resource can be divided into three third time domain resources, that is, the value of R is 3.
  • a more general description of this division method is: if the first time domain resource crosses X slot boundaries, the first time domain resource can be carried out according to the number of symbols of the first time domain resource before the first slot boundary Divided to obtain R third time domain resources, the number of symbols of the first time domain resource before the first slot boundary is T symbols.
  • the first time domain resource spans X time slots, the number of symbols of the first time domain resource before the first time slot boundary is T, and the last third time domain resource among the R third time domain resources The number of symbols is less than or equal to T.
  • the first and third time domain resources are symbols 9 to 13 of the first time slot
  • the second and third time domain resources are symbols 0 to 4 of the second time slot
  • the third and third time domain resources It is symbol 5 to symbol 9 of the first time slot
  • the fourth third time domain resource is the symbol 10 of the second time slot to the symbol 0 of the third time slot
  • the fifth third time domain resource is the first
  • the sixth and third time domain resources are symbols 6 to 8 of the third time slot.
  • X + 1 time-domain resources may be determined according to the X time slot boundaries according to the first time-domain resource (or it may be Called "X + 1 time domain resources"), and then divide the time domain resources of each segment of the X + 1 time domain resources according to the number of symbols of the first time domain resources before the first slot boundary, the The number of symbols of the first time domain resource before the first slot boundary is T symbols. If the remaining K symbols in a time-domain resource among the X + 1 time-domain resources, K ⁇ T, then use the K symbols as a third time-domain resource, or assign the K symbols to the previous first Three time domain resources.
  • FIG. 16 is a schematic diagram of dividing the first time-domain resource according to slot boundaries according to an embodiment of the present application.
  • the start symbol of the first time domain resource is symbol 9, and the length is 28 symbols.
  • After the slot boundary is divided, it is divided into 3 time domain resources, that is, X 2, the first time domain resource is divided into 3 time domain resources, and the first time domain resource is 5 before the first slot boundary Symbols, the second time domain resource is the second slot, and the third time domain resource is the remaining 9 symbols after the slot boundary.
  • every 5 symbols of the second time domain resource are divided into a third time domain resource, and the remaining 4 symbols in the second time domain resource constitute a single third time domain resource.
  • the first and third time domain resources are symbols 9 to 13 of the first time slot
  • the second and third time domain resources are symbols 0 to 4 of the second time slot
  • the third and third time domain resources Symbols 5 to 9 of the first time slot
  • symbols 4 to 3 of the third time domain are symbols 10 to 13 of the second time slot
  • symbols 5 to the third resource of the third time domain are symbol 0 of the third time slot
  • the sixth and third time domain resources are symbols 5 to 8 of the third time slot.
  • Fig. 15 shows that the remaining 4 symbols of the second time domain resource are used as a third time domain resource alone.
  • the remaining 4 symbols in the second time domain resource may also be incorporated into the third third time domain resource, or into the fifth third time domain resource.
  • Division method 2 Divide the first time domain resource into R third time domain resources according to the number of symbols after the slot boundary.
  • FIG. 17 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to another embodiment of the present application.
  • the start symbol of the first time domain resource is symbol 9, and the length is 14 symbols.
  • the first time domain resource is symbol 9 of the first time slot to symbol 8 of the second time slot.
  • the first third time domain resource is symbol 9 to symbol 13 of the first time slot
  • the second third time domain resource is symbol 0 to symbol 8 of the second time slot.
  • a more general description of this division method is: if the first time domain resource crosses X slot boundaries, the first time domain resource can be divided according to the number of symbols of the first time domain resource after the last slot boundary , Get R third time domain resources, the number of symbols of the first time domain resource after the last slot boundary is Y symbols, and the number of symbols of the last third time domain resource in R third time domain resources Less than or equal to Y.
  • the first time domain resource may be first divided into X + 1 time domain resources according to X slot boundaries (or it may be It is called "X + 1 time domain resource"), and then the time domain resource of each segment of the X + 1 time domain resource is divided according to the number of symbols of the first time domain resource after the last slot boundary.
  • the number of symbols in a time-domain resource after the last slot boundary is Y symbols. If the remaining K symbols in a time-domain resource in X + 1 time-domain resources, K ⁇ Y, then the K symbols are regarded as A third time domain resource, or the K symbols are grouped into the previous third time domain resource.
  • the process of dividing the first time domain resource to obtain R third time domain resources it may also be divided from the end to the front from the end of the first time domain resource.
  • FIG. 18 is a schematic diagram of dividing the first time domain resource according to the slot boundary according to an embodiment of the present application.
  • the start symbol of the first time domain resource is symbol 9, and the length is 28 symbols.
  • the first time domain resource is symbol 9 of the first time slot to symbol 8 of the third time slot, and the value of Y is equal to 9 symbols.
  • the first time domain resource is divided into 3 time domain resources, the first time domain resource is the 5 symbols before the first slot boundary, and the second time domain resource is the second slot, the third time domain resource is 9 symbols after the slot boundary.
  • the first time domain resource When dividing from the end of the first time domain resource from back to front, first divide the second time domain resource into a third for every 9 symbols In the time domain resource, the first 5 symbols in the second time domain resource constitute a single third time domain resource, and the first time domain resource can be divided into 4 third time domain resources, that is, the value of R is 4.
  • the first and third time domain resources are symbols 9 to 13 of the first time slot
  • the second and third time domain resources are symbols 0 to 4 of the second time slot
  • the third and third time domain resources It is symbol 5 to symbol 13 of the first time slot
  • the fourth third time domain resource is symbol 0 to 8 of the third time slot.
  • FIG. 18 shows that the remaining five symbols in the second-stage time domain resource are used as a third time-domain resource alone.
  • the remaining 5 symbols in the second-stage time domain resource may also be incorporated into the first third time domain resource, or into the third third time domain resource.
  • the first time domain resource is divided into R third time domain resources according to the smaller value of the number of symbols before the slot boundary and the number of symbols at the slot boundary.
  • the first time domain resource is divided into R third time domain resources according to the larger value of the number of symbols before the slot boundary and the number of symbols after the slot boundary.
  • a more general description of this division method is: if the first time domain resource crosses X slot boundaries, then the number of symbols of the first time domain resource before the first slot boundary and the first time domain resource at the end The smaller the number of symbols in the number of symbols after a slot boundary, that is, the first time-domain resource is divided according to the smaller of T and Y to obtain R third time-domain resources.
  • the first time domain resource may be first divided into H + 1 time domain resources according to H slot boundaries, and then the H + 1 time resources The time-domain resources of each domain resource are divided according to W symbols. If the remaining K symbols in a certain time-domain resource, K ⁇ W, then K symbols are regarded as a third time-domain resource alone, or the K The symbols are grouped into the previous third time domain resource, or the K symbols are grouped into the latter third time domain resource.
  • the value of W may be predefined or configured by the network device, and the value of W may also be the smaller of T and Y. For a specific division method, reference may be made to the description of the division method 1 or the description of the division method 2, which will not be repeated here.
  • step S221b the terminal device or the network device divides the first time domain resource to obtain R third time domain resources, including:
  • the first time-domain resource is divided into the R third time-domain resources according to the time-domain segmentation position in the first time-domain resource, and the time-domain segmentation position is independent of the starting point of the first time-domain resource.
  • R third time-domain resources are determined according to the time-domain segmentation position in the first time-domain resource and the first time-domain resource.
  • a fixed time-domain segmentation position in each slot may be predefined or configured, and the segmentation location is fixed, and has no relationship with the length of the first time-domain resource and the starting point. That is, regardless of the location of the first time domain resource, the first time domain resource is divided according to the fixed time domain segmentation position within the first time domain resource, thereby obtaining the R third time domain resources.
  • FIG. 19 is a schematic diagram of dividing a first time-domain resource according to a time-domain segmentation position according to an embodiment of the present application.
  • the start symbol of the first time domain resource is symbol 9, and the length is 14 symbols.
  • the first time domain resource is symbol 9 of the first time slot to symbol 8 of the second time slot.
  • the fixed time-domain segmentation positions in each slot are: the end time of the third symbol, the end time of the seventh symbol, the end time of the eleventh symbol, and the end time of the thirteenth symbol.
  • the start symbol of the first time domain resource is symbol 9 and the length is 14 symbols.
  • the first time domain resource can be segmented into 5
  • the third time domain resource that is, R is equal to 5.
  • the first and third time domain resources are symbols 9 to 11 of the first time slot
  • the second and third time domain resources are symbols 12 to 13 of the first time slot
  • the third and third time domain resources Symbols 0 to 3 for the second time slot, symbols 4 to 7 for the second third time domain resource, symbols for the second third time domain resource, and symbols for the second time slot 8.
  • the terminal device and the network device may also directly determine M second time domain resources according to the first time domain resource, that is, there is no need to first determine the R number Three time domain resources, and then M second time domain resources are determined according to whether the R third time domain resources cross the slot boundary. There is no need to perform steps S221 and S222.
  • the terminal device or the network device may also divide the first time domain resource into M second time domain resources according to whether the first time domain resource crosses the slot boundary. For example, in the case where the first time domain resource does not cross the slot boundary, according to the value of M, the first time domain resource can be evenly divided into M second time domain resources, or each second time domain resource The number of continuous symbols may also be unequal.
  • the specific division method is similar to the process of determining R third time-domain resources according to the first time-domain resource in step S221. Specifically, refer to the A method for dividing a time domain resource into R third time domain resources, dividing the first time domain resource into M second time domain resources; or referring to the utilization and first time domain resources described in FIG.
  • the method of dividing the first time domain resource into R third time domain resources using a certain division method corresponding to the first time domain resource, dividing the first time domain resource into M third 2.
  • Time domain resources For brevity, I will not repeat them here.
  • the value of M may be notified by the network device to the terminal device through the indication information or predefined by the protocol. For details, reference may be made to the determination method of the number of repetitions R, which will not be described in detail.
  • the first time domain resource when the first time domain resource crosses the slot boundary, the first time domain resource may be divided into M second time domain resources by using the slot boundary.
  • the specific dividing method may be similar to the process of dividing the first time-domain resources to obtain R third time-domain resources as shown in FIG. 13 to FIG. 17.
  • the first time domain resource may be divided into M second time domain resources by using a certain division method corresponding to the first time domain resource as shown in FIG. 12.
  • the first time domain resource may be divided into M second time domain resources according to the time domain segmentation position in the first time domain resource as shown in FIG. 15. For brevity, I will not repeat them here.
  • FIG. 20 is a schematic interaction diagram of a data transmission method according to another embodiment of the present application. As shown in FIG. 20, the method 200 further includes:
  • the terminal device receives third indication information from the network device, where the third indication information is used to indicate the start and length indication value SLIV of the first time domain resource, where SLIV and S and L satisfy the following mapping relationship:
  • mapping relationship (2) the above mapping relationship is referred to as a mapping relationship (2).
  • S is the number of the starting symbol of the first time domain resource
  • S is an integer greater than or equal to zero
  • L is the number of symbols that the first time domain resource continues
  • L and N are positive integers.
  • N can be a value stipulated in the protocol or notified by the network device to the terminal device through signaling.
  • N M * 14
  • M is an integer greater than or equal to 2
  • N 28.
  • the signaling may be physical layer signaling or higher layer signaling
  • the above mapping relationship is called a mapping relationship (2).
  • a SLIV value can uniquely determine a combination of the value of S and the value of L, and a combination of the value of S and the value of L can also uniquely determine a SLIV value.
  • SLIV, S, and L satisfy the mapping relationship described in the foregoing mapping relationship (1).
  • the terminal device determines the first time domain resource according to the third indication information.
  • the terminal device may receive third indication information sent by the network device, where the third indication information is used to indicate a row in a time domain resource table, and the time domain resource table may Predefined for the protocol or configured by higher layers.
  • each row of the time domain resource table may include the following parameters:
  • a SLIV, K2 parameter or K0 parameter, PUSCH or PDSCH mapping type For a detailed description of these parameters, please refer to the previous introduction, which will not be repeated here.
  • time domain resources determined according to S and L may cross the boundary of the slot.
  • the value range of S, L, and S + L in the above mapping relationship (2) can be further restricted.
  • the following is a table to illustrate the limitation of the value range of S, L, and S + L.
  • Table 4 is a combination table of S and L valid for downlink
  • Table 5 is a combination table of S and L valid for uplink
  • the mapping relationship satisfied by SLIV and S and L and the limits of the value range of S, L and S + L may be defined by the protocol.
  • SLIV is determined by joint coding of S and L according to the above mapping relationship (2), and S and L should meet the limitations of Table 4 and Table 5.
  • the network device determines the time-domain position of the first time-domain resource. Specifically, the position of the first time-domain resource may be determined according to a scheduling algorithm or the like, which is not limited in this application. And the start symbols S and L of the first time domain resource must meet the restrictions in Table 4 and Table 5.
  • the network device After the network device determines the S and L of the first time domain resource, it can determine the SLIV by jointly coding S and L according to the above mapping relationship (2), and use the third indication information to SLIV informs the terminal equipment. Therefore, after the terminal device receives the third indication information for indicating the SLIV of the first time domain resource, the terminal device can determine the time domain position of the first time domain resource according to the above-mentioned mapping relationship (2).
  • the first time domain resource may cross the slot boundary.
  • the third indication information may be carried in DCI or high-layer signaling and sent to the terminal device.
  • each row of the time domain resource table includes a start symbol S And length L.
  • the value of the start symbol S and the length L must meet certain restrictions. That is, the values of the start symbol S and the length L of the first time domain resource determined by the network device must meet certain restrictions.
  • the description is in the form of a limited form. For example, the values of the start symbol S and the length L must meet the limits of Table 6 and Table 7.
  • Table 6 is a combination table of valid S and L in the downlink
  • Table 7 is a combination table of valid S and L in the uplink.
  • the candidate value of S is 0 to 13
  • the candidate value of L is 1 to P, where P can be specified by the protocol.
  • P can be specified by the protocol.
  • P can be 14.
  • P can be 12.
  • the terminal device determines S and L according to a certain row of the table indicated by the third indication information, and then according to S and L, the time domain position of the first time domain resource can be determined.
  • the terminal device when the terminal device determines the first time domain resource, it can receive the third indication information sent by the network device.
  • the third indication information directly indicates the values of the start symbol S and the length L, and the values of the start symbol S and the length L are Satisfying the restrictions of Table 6 and Table 7 above, the terminal device determines S and L according to the third indication information, and then according to S and L, the time domain position of the first time domain resource can be determined.
  • the first time domain resource may cross the slot boundary.
  • the third indication information is used to indicate a row in a time domain resource table
  • each row of the time domain resource table may include the following parameters:
  • a SLIV, K2 parameter or K0 parameter, PUSCH or PDSCH mapping type For a detailed description of these parameters, please refer to the previous introduction, which will not be repeated here.
  • each row of the time domain resource table includes S and L, as described above.
  • the third indication information is also used to indicate the start symbol S and the reference length L of the first time domain resource.
  • the reference length is a parameter that needs to be used when calculating the length of the first time domain resource, not the actual length of the first time domain resource.
  • the terminal device also receives fourth indication information sent by the network device, and the fourth indication information indicates an X value.
  • X is the number of timeslot boundaries crossed by the first time domain resource.
  • the network device sends fourth indication information, and the fourth indication information is carried in DCI or in higher layer signaling.
  • the terminal device also receives fifth indication information sent by the network device, where the fifth indication information is used to indicate the start symbol S and the reference length L of the first time domain resource. That is, the fifth indication information may be used to indicate a row in a time domain resource table, where the time domain resource table is a time domain resource table configured by higher layer signaling or a resource table pre-defined by the protocol.
  • the fifth indication information and the third indication information may be the same piece of indication information, or may also be different indication information.
  • the terminal device determines S and L according to the above-mentioned fifth indication information, and determines the start symbol of the first time domain resource as S and the length as L + (X-1) * 14 in combination with the fourth indication information.
  • the terminal device further receives sixth indication information sent by the network device, where the sixth indication information is used to indicate the number W of time slots spanned by the first time domain resource, where W is a non-negative integer.
  • the network device sends sixth indication information, and the sixth indication information is carried in DCI or in higher layer signaling.
  • the terminal device also receives fifth indication information sent by the network device, where the fifth indication information is used to indicate the start symbol S and the reference length L of the first time domain resource. That is, the fifth indication information may be used to indicate a row in a time domain resource table, where the time domain resource table is a time domain resource table configured by higher layer signaling or a resource table pre-defined by the protocol.
  • sixth indication information and the third indication information may be the same piece of indication information, or may also be different indication information.
  • the terminal device determines S and L according to the above-mentioned sixth indication information, and determines the number S of the starting symbol of the first time-domain resource in combination with the fourth indication information, and the length is L + W * 14 symbols.
  • M second time domain resources can be determined according to the first time domain resource in combination with the method described above to ensure that the M second time domain resources do not cross the slot boundary, M
  • the second time-domain resource is used for M repeated transmissions of data, which reduces the transmission delay while ensuring the reliability of data transmission.
  • the terminal device or the network device may also use the method in the prior art to determine the first time domain resource. Specifically, there are several possible implementation methods as follows:
  • the network device determines the first time domain resource by using the value ranges of S, L, and S + L in Table 1 and Table 2. After determining the S and L of the first time domain resource, then use the mapping relationship (1) to jointly encode S and L to determine the SLIV, and notify the terminal device of the SLIV of the first time domain resource through the third indication information. After the terminal device receives the third indication information for indicating the SLIV of the first time domain resource, the terminal device can combine S, L, and S + in Table 1 and Table 2 according to the above mapping relationship (1) The value range of L determines the time domain position of the first time domain resource. The first time domain resource does not cross the slot boundary.
  • the third indication information may be carried in DCI or higher layer signaling and sent to the terminal device.
  • the network device may determine the first time domain resource by using S and L in Table 1 and Table 2.
  • the terminal device may receive third indication information sent by the network device, where the third indication information is used to indicate a row in a time domain resource table, and each row of the time domain resource table contains Start symbol S and length L. Among them, the value of the start symbol S and the length L should meet the restrictions of Table 1 and Table 2.
  • the terminal device determines S and L according to the third instruction information, and then determines the time domain position of the first time domain resource according to the S and L, and the first time domain resource does not cross the slot boundary.
  • predefined may be implemented by pre-storing corresponding codes, tables, or other methods that can be used to indicate relevant information in devices (for example, including terminal devices and network devices). There is no limitation on its specific implementation.
  • the device 300 may correspond to the terminal device described in the above method 200, or may be a chip or a component applied to the terminal device, and the device 300 Each module or unit is used to perform each action or processing performed by the terminal device in the above method 200.
  • the communication device 300 may include a processing unit 310 and a communication unit 320.
  • the processing unit 310 is used to determine the first time domain resource.
  • the communication unit 320 is configured to send M times of first data to the network device or receive M times of transmission of second data from the network device on the M second time domain resources.
  • the communication unit 320 may include a receiving unit (module) and a sending unit (module) for performing the method 200 and the terminal devices in FIGS. 2 to 4, 6, 6, 10, 11 and 20 to receive information and Steps to send information.
  • the communication device 300 may further include a storage unit 330, which is used to store instructions executed by the communication unit 320 and the processing unit 310.
  • the communication unit 320, the processing unit 310, and the storage unit 330 are coupled to each other.
  • the storage unit 330 stores instructions.
  • the processing unit 310 is used to execute the instructions stored by the storage unit 330.
  • the communication unit 320 is used to perform specific signal transmission and reception under the drive of the processing unit 310. .
  • the processing unit 310 may be a processor, and the communication unit 320 may be a transceiver, an input / output interface, or an interface circuit.
  • the storage unit 330 may be a memory. As shown in FIG. 22, the communication device 400 may include a processor 410, a memory 420, and a transceiver 430. When the communication device is a chip in a communication device, the storage unit 330 may be a storage unit in the chip (for example, registers, cache, etc.), or may be a storage unit in the communication device outside the chip (for example , Read only memory, random access memory, etc.).
  • the device 500 may correspond to the network device described in the above method 200, or may be a chip or a component applied to the network device, and the device 500 Each module or unit is used to perform each action or processing performed by the network device in the above method 200.
  • the communication apparatus 500 may include a processing unit 510 and a communication unit 520.
  • the processing unit 510 is used to: determine the first time domain resource
  • the processing unit 510 is further configured to determine M second time-domain resources according to the first time-domain resources, where M is an integer greater than 1;
  • the communication unit 520 is used to send M times of second data to the terminal device or receive M times of transmission of the first data from the terminal device on the M second time domain resources.
  • the communication unit 520 may include a receiving unit (module) and a sending unit (module) for performing the method 200 and the network devices in FIGS. 2 to 4, 6, 6, 10, 11 and 20 to receive information and Steps to send information.
  • the communication device 500 may further store a unit 550, which is used to store instructions executed by the communication unit 520 and the processing unit 510.
  • the communication unit 520, the processing unit 510 and the storage unit 550 are coupled to each other.
  • the storage unit 550 stores instructions.
  • the processing unit 510 is used to execute the instructions stored by the storage unit 550. .
  • the processing unit 510 may be implemented by a processor, and the communication unit 520 may be implemented by a transceiver.
  • the storage unit may be realized by a memory.
  • the communication device 600 may include a processor 610, a memory 620, and a transceiver 630.
  • each unit in the device can be implemented in the form of software calling through processing elements; they can also be implemented in the form of hardware; some units can also be implemented in software through processing elements, and some units can be implemented in hardware.
  • each unit can be a separate processing element, or it can be integrated in a chip of the device.
  • it can also be stored in the memory in the form of a program, which is called and executed by a processing element of the device.
  • the processing element may also be called a processor, and may be an integrated circuit with signal processing capability.
  • each step of the above method or each unit above may be implemented by an integrated logic circuit of hardware in a processor element or in the form of software invoking through a processing element.
  • the unit in any of the above devices may be one or more integrated circuits configured to implement the above method, for example: one or more application specific integrated circuits (application specific integrated circuits, ASIC), or, one or Multiple digital signal processors (DSPs), or one or more field programmable gate arrays (FPGAs), or a combination of at least two of these integrated circuit forms.
  • ASIC application specific integrated circuits
  • DSPs Multiple digital signal processors
  • FPGAs field programmable gate arrays
  • the unit in the device can be implemented in the form of a processing element scheduling program
  • the processing element may be a general-purpose processor, such as a central processing unit (CPU) or other processor that can call a program.
  • CPU central processing unit
  • these units can be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • SOC system-on-a-chip
  • FIG. 25 shows a schematic structural diagram of a terminal device provided by an embodiment of the present application. It may be the terminal device in the above embodiment, and is used to implement the operation of the terminal device in the above embodiment.
  • the terminal device includes an antenna 710, a radio frequency device 720, and a baseband device 730.
  • the antenna 710 is connected to the radio frequency device 720.
  • the radio frequency device 720 receives the information sent by the network device through the antenna 710, and sends the information sent by the network device to the baseband device 730 for processing.
  • the baseband device 730 processes the information of the terminal device and sends it to the radio frequency device 720.
  • the radio frequency device 720 processes the information of the terminal device and sends it to the network device through the antenna 710.
  • the baseband device 730 may include a modulation and demodulation subsystem to implement processing of each communication protocol layer of data; it may also include a central processing subsystem to implement processing of the terminal operating system and application layer; in addition, it may include other Subsystems, such as multimedia subsystems, peripheral subsystems, etc., where the multimedia subsystem is used to control the terminal device camera, screen display, etc., and the peripheral subsystem is used to connect with other devices.
  • the modem subsystem can be an independent chip.
  • the above device for the terminal may be located in the modem subsystem.
  • the modem subsystem may include one or more processing elements 731, for example, including a master CPU and other integrated circuits.
  • the modem subsystem may also include a storage element 732 and an interface circuit 733.
  • the storage element 732 is used to store data and programs, but the program used to execute the method performed by the terminal device in the above method may not be stored in the storage element 732, but stored in a memory other than the modem subsystem.
  • the interface circuit 733 is used to communicate with other subsystems.
  • the above device for a terminal device may be located in a modulation and demodulation subsystem.
  • the modulation and demodulation subsystem may be implemented by a chip.
  • the chip includes at least one processing element and an interface circuit, where the processing element is used to perform any of the above terminal devices.
  • the interface circuit is used to communicate with other devices.
  • the unit of the terminal device that implements the steps in the above method may be implemented in the form of a processing element scheduler, for example, the device for the terminal device includes a processing element and a storage element, and the processing element calls the program stored by the storage element to Perform the method performed by the terminal in the above method embodiments.
  • the storage element may be a storage element whose processing element is on the same chip, that is, an on-chip storage element.
  • the program for executing the method executed by the terminal device in the above method may be in a storage element on a different chip from the processing element, that is, an off-chip storage element.
  • the processing element calls or loads the program from the off-chip storage element on the on-chip storage element to call and execute the method executed by the terminal in the above method embodiments.
  • the unit of the terminal device that implements the steps of the above method may be configured as one or more processing elements, and these processing elements are disposed on the modem subsystem, where the processing elements may be integrated circuits, For example: one or more ASICs, or one or more DSPs, or one or more FPGAs, or a combination of these integrated circuits. These integrated circuits can be integrated together to form a chip.
  • the unit of the terminal device that implements each step in the above method may be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • SOC system-on-a-chip
  • FIG. 26 is a schematic structural diagram of a network device according to an embodiment of the present application. It is used to realize the operation of the network device in the above embodiments.
  • the network device includes an antenna 801, a radio frequency device 802, and a baseband device 803.
  • the antenna 801 is connected to the radio frequency device 802.
  • the radio frequency device 802 receives the information sent by the terminal through the antenna 801, and sends the information sent by the terminal device to the baseband device 803 for processing.
  • the baseband device 803 processes the information of the terminal and sends it to the radio frequency device 802.
  • the radio frequency device 802 processes the information of the terminal device and sends it to the terminal through the antenna 801.
  • the baseband device 803 may include one or more processing elements 8031, for example, including a main control CPU and other integrated circuits.
  • the baseband device 803 may further include a storage element 8032 and an interface 8033.
  • the storage element 8032 is used to store programs and data; the interface 8033 is used to exchange information with the radio frequency device 802, and the interface is, for example, a common public radio interface (common public radio interface) , CPRI).
  • the above apparatus for network equipment may be located in the baseband apparatus 803, for example, the above apparatus for network equipment may be a chip on the baseband apparatus 803, the chip includes at least one processing element and an interface circuit, wherein the processing element is used to perform the above network Each step of any method performed by the device, the interface circuit is used to communicate with other devices.
  • the unit of the network device that implements the steps of the above method may be implemented in the form of a processing element scheduler.
  • an apparatus for a network device includes a processing element and a storage element, and the processing element calls the program stored by the storage element to Perform the method performed by the network device in the above method embodiments.
  • the storage element may be a storage element on the same chip as the processing element, that is, an on-chip storage element, or a storage element on a different chip from the processing element, that is, an off-chip storage element.
  • the unit that the network device implements the steps in the above method may be configured as one or more processing elements, which are disposed on the baseband device, where the processing element may be an integrated circuit, such as: Or multiple ASICs, or, one or more DSPs, or, one or more FPGAs, or a combination of these integrated circuits. These integrated circuits can be integrated together to form a chip.
  • the units of the network device that implement the various steps in the above method may be integrated together and implemented in the form of a system on chip.
  • the baseband device includes the SOC chip, which is used to implement the above method.
  • the terminal device and the network device in each of the above device embodiments can completely correspond to the terminal device or the network device in the method embodiment, and the corresponding steps are executed by corresponding modules or units, for example, when the device is implemented in the form of a chip,
  • the receiving unit may be an interface circuit of the chip for receiving signals from other chips or devices.
  • the above unit for sending is an interface circuit of the device for sending signals to other devices, for example, when the device is implemented in the form of a chip, the sending unit is the chip for sending signals to other chips or devices Interface circuit.
  • An embodiment of the present application further provides a communication system.
  • the communication system includes the foregoing terminal device and the foregoing network device.
  • An embodiment of the present application further provides a computer-readable medium for storing computer program code, the computer program including instructions for executing the data transmission method of the embodiment of the present application in the above method 200.
  • the readable medium may be a read-only memory (read-only memory, ROM) or a random access memory (random access memory, RAM), which is not limited in the embodiments of the present application.
  • the present application also provides a computer program product, the computer program product including instructions, when the instructions are executed, so that the terminal device and the network device perform the operations of the terminal device and the network device corresponding to the above method.
  • An embodiment of the present application further provides a system chip.
  • the system chip includes a processing unit and a communication unit.
  • the processing unit may be, for example, a processor, and the communication unit may be, for example, an input / output interface, a pin, or a circuit.
  • the processing unit can execute computer instructions to cause the chip in the communication device to execute any of the data transmission methods provided in the embodiments of the present application.
  • the computer instructions are stored in the storage unit.
  • the storage unit is a storage unit within the chip, such as a register, a cache, etc.
  • the storage unit may also be a storage unit located outside the chip within the terminal, such as a read-only memory (read-only memory, ROM) ) Or other types of static storage devices that can store static information and instructions, random access memory (random access memory, RAM), etc.
  • the processor mentioned in any one of the above may be a CPU, a microprocessor, an ASIC, or one or more integrated circuits for executing the program for controlling the above-mentioned feedback information transmission method.
  • the processing unit and the storage unit can be decoupled, respectively set on different physical devices, and connected by wired or wireless means to realize the respective functions of the processing unit and the storage unit, so as to support the system chip to implement the above embodiments Various functions in.
  • the processing unit and the memory may also be coupled on the same device.
  • RAM random access memory
  • static RAM static random access memory
  • dynamic RAM dynamic RAM
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous RAM, SDRAM
  • double data rate Synchronous dynamic random access memory double data SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory direct RAMbus, DR, RAM
  • system and "network” are often used interchangeably in this document.
  • the term “and / or” in this article is just an association relationship that describes an associated object, indicating that there can be three relationships, for example, A and / or B, which can mean: A exists alone, A and B exist at the same time, exist alone B these three cases.
  • the character "/" in this article generally indicates that the related objects before and after are in an "or” relationship.
  • upstream and downstream appearing in this application are used to describe the direction of data / information transmission in specific scenarios.
  • the "upstream” direction generally refers to the direction or distribution of data / information transmission from the terminal to the network side
  • the “downlink” direction generally refers to the direction of data / information transmission from the network side to the terminal, or the transmission direction of the centralized unit to the distributed unit. It can be understood that “uplink” and “downlink” “It is only used to describe the direction of data / information transmission, and the specific starting and ending devices of the data / information transmission are not limited.
  • the methods in the embodiments of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software When implemented using software, it can be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer programs or instructions. When the computer program or instructions are loaded and executed on a computer, the processes or functions described in the embodiments of the present application are fully or partially executed.
  • the computer may be a general-purpose computer, a dedicated computer, a computer network, or other programmable devices.
  • the computer program or instructions may be stored in a computer-readable storage medium or transmitted through the computer-readable storage medium.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server integrating one or more available media.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a division of logical functions.
  • there may be other divisions for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供一种数据的传输方法和通信装置,该方法包括:首先根据第一时域资源确定M个mini-slot级别的、不跨时隙边界的第二时域资源,然后在该M个第二时域资源上进行mini-slot级别的数据重复传输。该方法在提高数据传输的可靠性的前提下,进一步降低了数据传输的时延。

Description

数据传输的方法和通信装置
本申请要求于2018年11月9日提交中国专利局、申请号为201811333734.6、申请名称为“数据传输的方法和通信装置”的中国专利申请的优先权,以及,要求于2019年1月11日提交中国专利局、申请号为201910028765.9、申请名称为“数据传输的方法和通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信领域,更为具体的,涉及一种数据传输的方法和通信装置。
背景技术
第五代(the fifth generation,5G)移动通信系统致力于支持更高的系统性能,支持多种业务类型、不同部署场景和更宽的频谱范围。其中,多种业务类型包括增强移动宽带(enhanced mobile broadband,eMBB)、海量机器类型通信(massive machine type communication,mMTC)、超可靠低延迟通信(ultra-reliable and low-latency communications,URLLC)、多媒体广播多播业务(multimedia broadcast multicast service,MBMS)和定位业务等。
URLLC的业务种类包括很多种,典型的用例包括工业控制、工业生产流程自动化、人机交互和远程医疗等。URLLC业务具体的需求包括:数据传输可靠性达到99.999%,传输时延低于1ms,以及在满足高可靠性及低时延要求下,尽可能减小信令开销。保证URLLC的可靠性和时延成为本领域非常关注的问题。为了保证URLLC业务的数据传输的可靠性,目前提出了基于时隙(slot)级别的数据重复传输来提高URLLC业务的数据传输的可靠性和降低时延,但是仍然不能达到URLLC业务的要求。
发明内容
本申请提供了一种数据传输方法和装置,可以实现了数据在多个mini-slot级别的时域资源上的重复发送,在提高数据传输的可靠性的前提下,进一步降低了数据传输的时延。
第一方面,提供了一种数据传输方法,该传输方法的执行主体既可以是终端设备也可以是应用于终端设备的芯片,以执行主体为终端设备为例,该方法包括:终端设备确定第一时域资源;终端设备根据该第一时域资源,确定M个第二时域资源,M为大于1的整数;终端设备在该M个第二时域资源上向网络设备发送M次第一数据或者接收来自于该网络设备的第二数据的M次传输。
第一方面提供的数据传输的方法,由于数据在该M个第二时域资源上重复传输,而M个第二时域资源是根据第一时域资源确定的,M个第二时域资源可以为mini-slot级别的长度。实现了数据的重复发送,降低了数据传输的时延,也提高了数据传输的可靠性。
在第一方面的一种可能的实现方式中,终端设备根据该第一时域资源,确定M个第 二时域资源,包括:终端设备根据该第一时域资源,确定R个第三时域资源,R为大于1的整数;终端设备根据该R个第三时域资源是否横跨时隙边界,确定该M个第二时域资源。采用该传输方法,可以保证M个第二时域资源均不横跨时隙边界,从而在降低数据传输的时延的前提下,进一步保证了数据在该M个第二时域资源上传输的可靠性,提高了数据传输的效率。
在第一方面的一种可能的实现方式中,终端设备根据该R个第三时域资源是否横跨时隙边界,确定该M个第二时域资源,包括:在该R个第三时域资源均不跨时隙边界的条件下,将该R个第三时域资源确定为该M第二个时域资源,M等于R。
在第一方面的一种可能的实现方式中,终端设备根据该R个第三时域资源是否横跨时隙边界,确定该M个第二时域资源,包括:终端设备将该R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分;终端设备根据该R个第三时域资源中不跨时隙边界的时域资源和按照时隙边界进行划分后的时域资源,确定该M个第二时域资源。
在第一方面的一种可能的实现方式中,终端设备根据该R个第三时域资源是否横跨时隙边界,确定该M个第二时域资源,包括:终端设备将该R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分;终端设备根据该R个第三时域资源中不跨时隙边界的时域资源和按照时隙边界进行划分后的时域资源,确定该M个第二时域资源,其中,M等于R。
在第一方面的一种可能的实现方式中,终端设备将该R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分,包括:终端设备将该R个第三时域资源中横跨时隙边界的第四时域资源划分为H+1个该第二时域资源,其中,该第四时域资源为R个第三时域资源中横跨时隙边界的任一个时域资源,该第四时域资源横跨H个时隙边界,H为正整数。
在第一方面的一种可能的实现方式中,该H+1个第二时域资源包括:从该第四时域资源的开始符号到该H个时隙边界中的第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从该H个时隙边界中的最后一个时隙边界到该第四时域资源的结束的时域资源为一个第二时域资源。
在第一方面的一种可能的实现方式中,该M个第二时域资源包括根据第四时域资源确定的第二时域资源和Q个第三时域资源,该Q个第三时域资源为该R个第三时域资源中不跨时隙边界的时域资源,该第四时域资源为该R个第三时域资源中横跨时隙边界的任意一个时域资源,该第四时域资源横跨H个时隙边界,根据该第四时域资源确定出的H+1个第二时域资源包括:从该第四时域资源的开始符号到该H个时隙边界中第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从该H个时隙边界中最后一个时隙边界到该第四时域资源的结束符号的时域资源为一个第二时域资源。
在第一方面的一种可能的实现方式中,R大于M。
在第一方面的一种可能的实现方式中,终端设备将该R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分,包括:终端设备将该R个第三时域资源中横跨时隙边界的第四时域资源划分为H+1个第五时域资源,其中,该第四时域资源为R个第三时域资源中横跨时隙边界的任一个时域资源,该第四时域资源横跨H个时隙边界,H为正 整数;终端设备将该H+1个第五时域资源中的第一个第五时域资源与该第四时域资源的前一个第三时域资源合并,共同构成一个第二时域资源;将该H+1个第五时域资源中的最后一个第五时域资源与该第四时域资源的后一个第三时域资源合并,共同构成一个第二时域资源。
在第一方面的一种可能的实现方式中,R小于M。
在第一方面的一种可能的实现方式中,终端设备根据该第一时域资源,确定R个第三时域资源,包括:终端设备根据重复次数R和R个第三时域资源之间的间隔,将该第一时域资源重复R次,得到该R个第三时域资源。
在第一方面的一种可能的实现方式中,该方法还包括:终端设备接收来自于该网络设备的第七指示信息,该第七指示用于指示该R个第三时域资源之间的间隔。
在第一方面的一种可能的实现方式中,该R个第三时域资源的间隔为0,或者,该R个第三时域资源在时域上是连续的。
在第一方面的一种可能的实现方式中,终端设备根据该第一时域资源,确定R个第三时域资源,包括:终端设备将该第一时域资源进行划分,得到该R个第三时域资源。
在第一方面的一种可能的实现方式中,终端设备该将该第一时域资源进行划分,得到该R个第三时域资源,包括:终端设备根据重复次数R,将该第一时域资源划分为该R个第三时域资源,其中,该R个第三时域资源中有R-1个第三时域资源中每个第三时域资源持续的符号个数均为
Figure PCTCN2019116781-appb-000001
L为该第一时域资源持续的符号个数,L为正整数。
在第一方面的一种可能的实现方式中,该将该第一时域资源进行划分,得到该R个第三时域资源,包括:根据该第一时域资源在第一个时隙边界前的符号个数,将该第一时域资源进行划分,得到该R个第三时域资源,其中,该第一时域资源横跨X个时隙边界,该第一时域资源在第一个时隙边界前的符号个数为T,该R个第三时域资源中的最后一个第三时域资源的符号个数小于或者等于T。
在第一方面的一种可能的实现方式中,该将该第一时域资源进行划分,得到该R个第三时域资源,包括:将该第一时域资源按照时隙边界划分为X+1个时域资源,该第一时域资源横跨X个时隙边界,该第一时域资源在第一个时隙边界前的符号个数为T;将该X+1个时域资源的每一个的时域资源按照T个符号的长度进行划分;如果该X+1个时域资源中的任意一个时域资源中剩余K个符号,并且,K<T,将该K个符号作为一个第三时域资源,或者将该K个符号划入到前一个第三时域资源中。
在第一方面的一种可能的实现方式中,该将该第一时域资源进行划分,得到该R个第三时域资源,包括:根据该第一时域资源在最后一个时隙边界后的符号个数,将该第一时域资源进行划分,得到该R个第三时域资源,其中,该第一时域资源横跨X个时隙边界,该第一时域资源在最后一个时隙边界后的符号个数为Y,该R个第三时域资源中的最后一个第三时域资源的符号个数小于或者等于Y。
在第一方面的一种可能的实现方式中,该将该第一时域资源进行划分,得到该R个第三时域资源,包括:将该第一时域资源按照时隙边界划分为X+1个时域资源,该第一时域资源横跨X个时隙边界,该第一时域资源在最后一个时隙边界后的符号个数为Y;将该X+1个时域资源的每一个的时域资源按照Y个符号的长度进行划分;如果该X+1个时域资源中的任意一个时域中剩余K个符号,并且,K<Y,将该K个符号作为一个第三时域 资源,或者将该K个符号划入到前一个第三时域资源中。
在第一方面的一种可能的实现方式中,终端设备该将该第一时域资源进行划分,得到R个第三时域资源,包括:接收来自于网络设备的第一指示信息,该第一指示信息用于指示该第一时域资源的第一划分方式;根据该第一划分方式,将该第一时域资源划分为R个第三时域资源,其中,该第一时域资源对应多种划分方式,该第一划分方式为该多种划分方式中的一种。采用该划分方式,由于不需要获取重复次数R,可以降低信令的开销。
在第一方面的一种可能的实现方式中,该方法还包括:接收来自于网络设备的第二指示信息,该第二指示信息用于指示该重复次数R的值。
在第一方面的一种可能的实现方式中,终端设备确定第一时域资源,包括:接收来自于网络设备的第三指示信息,该第三指示信息用于指示该第一时域资源的开始和长度指示值SLIV,其中,SLIV与S和L满足以下映射关系:
如果
Figure PCTCN2019116781-appb-000002
则SLIV=N*(L-1)+S,
否则,SLIV=N*(N-L+1)+(N-1-S),其中,0<L≤(N-S),
其中,N>14,
S为该第一时域资源的起始符号的编号,S为大于或者等于零的整数,L为该第一时域资源持续的符号个数,L和N为正整数。
在第一方面的一种可能的实现方式中,终端设备确定第一时域资源,包括:终端设备接收来自于该网络设备的第三指示信息,该第三指示信息用于指示时域资源表格中的一行,该时域资源表格的一行包含起始符号的编号S和该第一时域资源持续的符号个数L,S为大于或者等于零的整数,L为正整数;终端设备根据S和L,确定该第一时域资源的时域位置。可选的,该时域资源表格为高层信令配置的。
在第一方面的一种可能的实现方式中,该确定第一时域资源,包括:接收来自于网络设备的第四指示信息,该第四指示信息用于指示该第一时域资源横跨的时隙边界的个数X,X为非负整数;接收来自于该网络设备的第五指示信息,该第五指示信息用于指示该第一时域资源的起始符号的编号S和参考长度L;该第一时域资源的起始符号的编号为S,长度为L+(X-1)*14个符号。
在第一方面的一种可能的实现方式中,该确定第一时域资源,包括:接收来自于网络设备的第六指示信息,该第六指示信息用于指示该第一时域资源横跨的时隙的个数W,W为非负整数;接收来自于该网络设备的第五指示信息,该第五指示信息用于指示该第一时域资源的起始符号的编号S和参考长度L;该第一时域资源的起始符号的编号S,长度为L+W*14个符号。
第二方面,提供了一种数据传输方法,该传输方法的执行主体既可以是网络设备也可以是应用于网络设备的芯片,以执行主体为网络设备为例,该方法包括:网络设备确定第一时域资源;网络设备根据该第一时域资源,确定M个第二时域资源,M为大于1的整数;网络设备在该M个第二时域资源上向终端设备发送M次第二数据或者接收来自于该终端设备的第一数据的M次传输。
第二方面提供的数据传输的方法,由于数据在该M个第二时域资源上重复传输,而M个第二时域资源是根据第一时域资源确定的,M个第二时域资源可以为mini-slot级别的长度。实现了数据的重复发送,降低了数据传输的时延,也提高了数据传输的可靠性。
在第二方面的一种可能的实现方式中,网络设备根据该第一时域资源,确定M个第二时域资源,包括:网络设备根据该第一时域资源,确定R个第三时域资源,R为大于1的整数;网络设备根据该R个第三时域资源是否横跨时隙边界,确定该M个第二时域资源。采用该传输方法,可以保证M个第二时域资源均不横跨时隙边界,从而在降低数据传输的时延的前提下,进一步保证了数据在该M个第二时域资源上传输的可靠性,提高了数据传输的效率。
在第二方面的一种可能的实现方式中,网络设备根据该R个第三时域资源是否横跨时隙边界,确定该M个第二时域资源,包括:在该R个第三时域资源均不跨时隙边界的条件下,将该R个第三时域资源确定为该M第二个时域资源,M等于R。
在第二方面的一种可能的实现方式中,网络设备根据该R个第三时域资源是否横跨时隙边界,确定该M个第二时域资源,包括:网络设备将该R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分;网络设备根据该R个第三时域资源中不跨时隙边界的时域资源和按照时隙边界进行划分后的时域资源,确定该M个第二时域资源。
在第二方面的一种可能的实现方式中,M等于R。
在第二方面的一种可能的实现方式中,网络设备该将该R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分,包括:网络设备将该R个第三时域资源中横跨时隙边界的第四时域资源划分为H+1个该第二时域资源,其中,该第四时域资源为R个第三时域资源中横跨时隙边界的任一个时域资源,该第四时域资源横跨H个时隙边界,H为正整数。
在第二方面的一种可能的实现方式中,该H+1个第二时域资源包括:从该第四时域资源的开始符号到该H个时隙边界中的第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从该H个时隙边界中的最后一个时隙边界到该第四时域资源的结束的时域资源为一个第二时域资源。
在第二方面的一种可能的实现方式中,该M个第二时域资源包括根据第四时域资源确定的第二时域资源和Q个第三时域资源,该Q个第三时域资源为该R个第三时域资源中不跨时隙边界的时域资源,该第四时域资源为该R个第三时域资源中横跨时隙边界的任意一个时域资源,该第四时域资源横跨H个时隙边界,根据该第四时域资源确定出的H+1个第二时域资源包括:从该第四时域资源的开始符号到该H个时隙边界中第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从该H个时隙边界中最后一个时隙边界到该第四时域资源的结束符号的时域资源为一个第二时域资源。
在第二方面的一种可能的实现方式中,R大于M。
在第二方面的一种可能的实现方式中,网络设备该将该R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分,包括:网络设备将该R个第三时域资源中横跨时隙边界的第四时域资源划分为H+1个第五时域资源,其中,该第四时域资源为R个第三时域资源中横跨时隙边界的任一个时域资源,该第四时域资源横跨H个时隙边界,H为正整数;网络设备将该H+1个第五时域资源中的第一个第五时域资源与该第四时域资源的前一个第三时域资源合并,共同构成一个第二时域资源;将该H+1个第五时域资源中的最后一个时域资源与该第四时域资源的后一个第三时域资源合并,共同构成一个第二时 域资源。
在第二方面的一种可能的实现方式中,R小于M。
在第二方面的一种可能的实现方式中,网络设备根据该第一时域资源,确定R个第三时域资源,包括:网络设备根据重复次数R和R个第三时域资源之间的间隔,将该第一时域资源重复R次,得到该R个第三时域资源。
在第二方面的一种可能的实现方式中,该方法还包括:网络设备向终端设备发送第七指示信息,该第七指示用于指示该R个第三时域资源之间的间隔。
在第二方面的一种可能的实现方式中,该R个第三时域资源的间隔为0,或者,该R个第三时域资源在时域上是连续的。
第二方面的一种可能的实现方式中,网络设备根据该第一时域资源,确定R个第三时域资源,包括:网络设备将该第一时域资源进行划分,得到该R个第三时域资源。
在第二方面的一种可能的实现方式中,网络设备该将该第一时域资源进行划分,得到该R个第三时域资源,包括:网络设备根据重复次数R,将该第一时域资源划分为该R个第三时域资源,其中,该R个第三时域资源中有R-1个第三时域资源中每个第三时域资源持续的符号个数均为
Figure PCTCN2019116781-appb-000003
L为该第一时域资源持续的符号个数,L为正整数。
在第二方面的一种可能的实现方式中,该将该第一时域资源进行划分,得到该R个第三时域资源,包括:根据该第一时域资源在第一个时隙边界前的符号个数,将该第一时域资源进行划分,得到该R个第三时域资源,其中,该第一时域资源横跨X个时隙边界,该第一时域资源在第一个时隙边界前的符号个数为T,该R个第三时域资源中的最后一个第三时域资源的符号个数小于或者等于T。
在第二方面的一种可能的实现方式中,该将该第一时域资源进行划分,得到该R个第三时域资源,包括:将该第一时域资源按照时隙边界划分为X+1个时域资源,该第一时域资源横跨X个时隙边界,该第一时域资源在第一个时隙边界前的符号个数为T;将该X+1个时域资源的每一个的时域资源按照T个符号的长度进行划分;如果该X+1个时域资源中的任意一个时域资源中剩余K个符号,并且,K<T,将该K个符号作为一个第三时域资源,或者将该K个符号划入到前一个第三时域资源中。
在第二方面的一种可能的实现方式中,该将该第一时域资源进行划分,得到该R个第三时域资源,包括:根据该第一时域资源在最后一个时隙边界后的符号个数,将该第一时域资源进行划分,得到该R个第三时域资源,其中,该第一时域资源横跨X个时隙边界,该第一时域资源在最后一个时隙边界后的符号个数为Y,该R个第三时域资源中的最后一个第三时域资源的符号个数小于或者等于Y。
在第二方面的一种可能的实现方式中,该将该第一时域资源进行划分,得到该R个第三时域资源,包括:将该第一时域资源按照时隙边界划分为X+1个时域资源,该第一时域资源横跨X个时隙边界,该第一时域资源在最后一个时隙边界后的符号个数为Y;将该X+1个时域资源的每一个的时域资源按照Y个符号的长度进行划分;如果该X+1个时域资源中的任意一个时域中剩余K个符号,并且,K<Y,将该K个符号作为一个第三时域资源,或者将该K个符号划入到前一个第三时域资源中。
在第二方面的一种可能的实现方式中,网络设备该将该第一时域资源进行划分,得到该R个第三时域资源,包括:网络设备向终端设备发送第一指示信息,该第一指示信息用 于指示该第一时域资源的第一划分方式,网络设备根据该第一划分方式,将该第一时域资源划分为该R个第三时域资源,其中,该第一时域资源对应多种划分方式,该第一划分方式为该多种划分方式中的一种。
在第二方面的一种可能的实现方式中,该方法还包括:网络设备向终端设备发送第二指示信息,该第二指示信息用于指示该重复次数R的值。
在第二方面的一种可能的实现方式中,该方法还包括:网络设备向终端设备发送第三指示信息,该第三指示信息用于指示该第一时域资源的开始和长度指示值SLIV,其中,SLIV与S和L满足以下映射关系:
如果
Figure PCTCN2019116781-appb-000004
则SLIV=N*(L-1)+S,
否则,SLIV=N*(N-L+1)+(N-1-S),其中,0<L≤(N-S),
其中,N>14;
S为该第一时域资源的起始符号的编号,S为大于或者等于零的整数,L为该第一时域资源持续的符号个数,L和N为正整数。
在第二方面的一种可能的实现方式中,该方法还包括:网络设备向终端设备发送第三指示信息,该第三指示信息用于指示时域资源表格中的一行,该时域资源表格的一行包含起始符号的编号S和该第一时域资源持续的符号个数L,S为大于或者等于零的整数,L为正整数。可选的,该时域资源表格为高层信令配置的。
在第二方面的一种可能的实现方式中,该方法还包括:向终端设备发送第四指示信息,该第四指示信息用于指示该第一时域资源横跨的时隙边界的个数X,X为非负整数;向终端设备发送第五指示信息,该第五指示信息用于指示该第一时域资源的起始符号的编号S和参考长度L;
其中,该第一时域资源的起始符号的编号为S,长度为L+(X-1)*14个符号。
在第二方面的一种可能的实现方式中,该方法还包括:向终端设备发送第六指示信息,该第六指示信息用于指示该第一时域资源横跨的时隙的个数W,W为非负整数;向终端设备发送第五指示信息,该第五指示信息用于指示该第一时域资源的起始符号的编号S和长度L;其中,该第一时域资源的起始符号的编号S,长度为L+W*14个符号。
第三方面,提供了一种通信装置,该装置包括用于执行以上第一方面或第一方面的任意可能的实现方式中各个步骤的单元。
第四方面,提供了一种通信装置,该装置包括用于执行以上第二方面或第二方面的任意可能的实现方式中各个步骤的单元。
第五方面,提供了一种通信装置,该装置包括至少一个处理器和存储器,该至少一个处理器用于执行以上第一方面或第一方面的任意可能的实现方式中的方法。
第六方面,提供了一种通信装置,该装置包括至少一个处理器和存储器,该至少一个处理器用于执行以上第二方面或第二方面的任意可能的实现方式中的方法。
第七方面,提供了一种通信装置,该装置包括至少一个处理器和接口电路,该至少一个处理器用于执行以上第一方面或第一方面的任意可能的实现方式中的方法。
第八方面,提供了一种通信装置,该装置包括至少一个处理器和接口电路,该至少一个处理器用于执行以上第二方面或第二方面的任意可能的实现方式中的方法。
第九方面,提供了一种终端设备,该终端设备包括上述第三方面提供的通信装置,或者,该终端包括上述第五方面提供的通信装置,或者,该终端包括上述第七方面提供的通 信装置。
第十方面,提供了一种网络设备,该网络设备包括上述第四方面提供的通信装置,或者,该网络设备包括上述第六方面提供的通信装置,或者,该网络设备包括上述第八方面提供的通信装置。
第十一方面,提供了一种计算机程序产品,该计算机程序产品包括计算机程序,该计算机程序在被处理器执行时,用于执行第一方面或第一方面的任意可能的实现方式中的方法,或者执行第二方面或第二方面的任意可能的实现方式中的方法。
第十二方面,提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序,当该计算机程序被执行时,用于执行第一方面或第一方面的任意可能的实现方式中的方法,或者执行第二方面或第二方面的任意可能的实现方式中的方法。
附图说明
图1是适用于本申请实施例的移动通信系统的架构示意图。
图2是本申请实施例提供的一例数据传输的方法的示意性交互图。
图3是本申请实施例提供的另一例数据传输的方法的示意性交互图。
图4是本申请实施例提供的另一例数据传输的方法的示意性交互图。
图5是本申请一个实施例的第三时域资源的示意图。
图6是本申请实施例提供的一例数据传输的方法的示意性交互图。
图7是本申请一个实施例的第三时域资源的示意图。
图8是本申请一个实施例的第二时域资源的示意图。
图9是本申请另一个实施例的第二时域资源的示意图。
图10是本申请另一个实施例的第二时域资源的示意图。
图11是本申请实施例提供的另一例数据传输的方法的示意性交互图。
图12是本申请实施例提供的另一例数据传输的方法的示意性交互图。
图13是本申请一个实施例的符号的长度为8个符号的第一时域资源划分方式的示意图。
图14是本申请一个实施例的将第一时域资源按照slot边界进行划分的示意图。
图15是本申请另一个实施例的将第一时域资源按照slot边界进行划分的示意图。
图16是本申请另一个实施例的将第一时域资源按照slot边界进行划分的示意图。
图17是本申请另一个实施例的将第一时域资源按照slot边界进行划分的示意图。
图18是本申请另一个实施例的将第一时域资源按照slot边界进行划分的示意图。
图19是本申请另一个实施例的将第一时域资源按照slot边界进行划分的示意图。
图20是本申请实施例提供的另一例数据传输的方法的示意性交互图。
图21是本申请实施例提供的通信装置的示意图。
图22是本申请实施例提供的又一例通信装置的示意图。
图23是本申请实施例提供的通信装置的示意图。
图24是本申请实施例提供的又一例通信装置的示意图。
图25是本申请实施例提供的终端设备的示意图。
图26是本申请实施例提供的网络设备的示意图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
本申请实施例的技术方案可以应用于各种通信系统,例如:长期演进(Long Term Evolution,LTE)系统、第五代(5th generation,5G)移动通信系统中的新无线(new radio,NR)系统或未来演进的移动通信系统。本申请对实施例中应用的移动通信系统不做限定等。
图1是适用于本申请实施例的移动通信系统的架构示意图。如图1所示,该移动通信系统100可以包括核心网设备110、无线接入网设备120和至少一个终端设备(如图1中所示的终端设备130和终端设备140)。终端设备通过无线的方式与无线接入网设备相连,无线接入网设备通过无线或有线方式与核心网设备连接。核心网设备与无线接入网设备可以是独立的不同的物理设备,也可以是将核心网设备的功能与无线接入网设备的逻辑功能集成在同一个物理设备上,还可以是一个物理设备上集成了部分核心网设备的功能和部分的无线接入网设备的功能。终端设备可以是固定位置的,也可以是可移动的。图1只是示意图,该通信系统中还可以包括其它网络设备,如还可以包括无线中继设备和无线回传设备,在图1中未画出。本申请的实施例对该移动通信系统中包括的核心网设备、无线接入网设备和终端设备的数量不做限定。
该移动通信系统100中的终端设备也可以称为终端Terminal、用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal,MT)等。终端设备可以是手机(mobile phone)、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(Virtual Reality,VR)终端设备、增强现实(Augmented Reality,AR)终端设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等等,本申请中将前述终端设备及可应用于前述终端设备的芯片统称为终端设备。应理解,本申请实施例对终端设备所采用的具体技术和具体设备形态不做限定。
在移动通信系统100中,无线接入网设备120是终端设备通过无线方式接入到该移动通信系统中的接入设备。该无线接入网设备120可以是:基站、演进型基站(evolved node B,基站)、家庭基站、无线保真(wireless-fidelity,WIFI)系统中的接入点(access point,AP)、无线中继节点、无线回传节点、传输点(transmission point,TP)或者传输接收点(transmission reception point,TRP)等,还可以为NR系统中的gNB,或者,还可以是构成基站的组件或一部分设备,如集中式单元(centralized unit,CU)、分布式单元(distributed unit,DU)或基带单元(baseband unit,BBU)等。应理解,本申请的实施例中,对无线接入网设备所采用的具体技术和具体设备形态不做限定。在本申请中,无线接入网设备简称网络设备,如果无特殊说明,在本申请中,网络设备均指无线接入网设备。在本申请中,网络设备可以是指网络设备本身,也可以是应用于网络设备中完成无线通信处理功能的芯片。
在本申请实施例中,终端设备或网络设备包括硬件层、运行在硬件层之上的操作系统 层,以及运行在操作系统层上的应用层。该硬件层包括中央处理器(central processing unit,CPU)、存储器管理单元(memory management unit,MMU)和内存等硬件。该操作系统可以是任意一种或多种通过进程(process)实现业务处理的计算机操作系统,例如,Linux操作系统、Unix操作系统、Android操作系统、iOS操作系统或windows操作系统等。该应用层包含浏览器、通讯录、文字处理软件、即时通信软件等应用。并且,本申请实施例并未对本申请实施例提供的方法的执行主体的具体结构特别限定,只要能够通过运行记录有本申请实施例的提供的方法的代码的程序,以根据本申请实施例提供的方法进行通信即可,例如,本申请实施例提供的方法的执行主体可以是终端设备或网络设备,或者,是终端设备或网络设备中能够调用程序并执行程序的功能模块。
另外,本申请的各个方面或特征可以实现成方法、装置或使用标准编程和/或工程技术的制品。本申请中使用的术语“制品”涵盖可从任何计算机可读器件、载体或介质访问的计算机程序。例如,计算机可读介质可以包括,但不限于:磁存储器件(例如,硬盘、软盘或磁带等),光盘(例如,压缩盘(compact disc,CD)、数字通用盘(digital versatile disc,DVD)等),智能卡和闪存器件(例如,可擦写可编程只读存储器(erasable programmable read-only memory,EPROM)、卡、棒或钥匙驱动器等)。另外,本文描述的各种存储介质可代表用于存储信息的一个或多个设备和/或其它机器可读介质。术语“机器可读介质”可包括但不限于,无线信道和能够存储、包含和/或承载指令和/或数据的各种其它介质。
为便于理解本申请实施例,下面先对本申请涉及到的几个概念进行简单介绍。
时域资源(或者时间单元)和时域符号:
基站和终端设备用于无线通信的时域资源可以划分为多个时域资源。并且,在本申请实施例中,多个时域资源可以是连续的,也可以是某些相邻的时域资源之间设有预设的间隔,本申请实施例并未特别限定。
在本申请实施例中,对一个时域资源的长度不做限定。例如,1个时域资源可以是一个或多个子帧;或者,也可以是一个或多个时隙;或者,也可以是一个或多个符号。
在本申请的实施例中,符号也称为时域符号,可以是正交频分复用(orthogonal frequency division multiplexing,OFDM)符号,也可以是单载波频分多址(single carrier frequency division multiple access,SC-FDMA)符号,其中SC-FDMA又称为带有转换预编码的正交频分复用(orthogonal frequency division multiplexing with transform precoding,OFDM with TP)。
在本申请实施例中,多个时域资源在时域上存在时序关系,且任意两个时域资源对应的时间长度可以相同也可以不同。
5G系统与4G通信系统相比的一大特征就是增加了对URLLC业务的支持。URLLC的业务种类包括很多种,典型的用例包括工业控制、工业生产流程自动化、人机交互和远程医疗等。为更好的量化URLLC业务的性能指标,从而给5G系统设计提供基准输入和评估准则,目前对URLLC业务的性能指标做了如下定义:
时延:时延的定义为用户应用层数据包从发送端无线协议栈2或3层的服务数据单元(service data unit,SDU)到达接收端无线协议栈2或3层的SDU所需的传输时间。URLLC业务的用户面时延要求对于上下行均为0.5ms。这里的0.5ms的性能要求仅适用于发送端(如基站)和接收端(如终端)都不处于非连续接收态(discontinuous reception,DRX)。 另外,这里0.5ms的性能要求是指数据包的平均时延,不与下述的可靠性要求绑定。
可靠性:发送端在一定时间内(L秒)向接收端正确传输X比特数据的成功概率,上述的时间(L秒)仍定义为用户应用层数据包从发送端无线协议栈2或3层的SDU到达接收端无线协议栈2或3层的SDU所需的传输时间。对于URLLC业务,一个典型需求是在1ms内发送32字节(bytes)数据达到99.999%的可靠性。需要指出的上述性能指标仅是个典型值,具体URLLC业务可能对可靠性有不同的需求,比如某些极端苛刻的工业控制需要在端到端时延在0.25ms内达到99.9999999%的传输成功概率。
现有技术中,终端设备确定向网络设备发送数据的时域资源(即上行传输)或者确定接收网络设备发送的数据的时域资源(即下行传输)的过程主要包括:
终端设备首先确定一个时域资源表格,该时域资源表格可以包括一个S参数、一个L参数,S是表示数据信道的开始(start)符号(开始符号的编号)。L(length)是表示数据信道所占的符号个数。然后终端设备接收网络设备发送的指示信息,该指示信息用于指示该时域资源表格的某一行,或者,该指示信息还可以用于指示根据时域资源表格中的S和L联合编码得到的一个开始和长度指示值(start and length indicator value,SLIV),时域资源表格中可以包括该SLIV。终端设备根据网络设备指示的时域资源表格的某一行或者SLIV,可以确定出时域资源,
下面将具体描述终端设备确定向网络设备发送数据的时域资源或者确定接收网络设备发送的数据的时域资源的过程。
首先终端设备确定一个时域资源表格,该时域资源表格可以为协议规定的时域资源表格或者为高层信令配置的一个时域资源表格。
对于协议规定的时域资源表格,该时域资源表格包括16行,对于上行传输,每一行包括:
一个S参数、一个L参数,K2参数或者K0参数、物理下行共享信道(physical downlink shared channel,PDSCH)映射类型(mapping type)或者物理上行共享信道(physical uplink shared channel,PUSCH)映射类型(mapping type)。
其中,S是表示数据信道的开始(start)符号的编号,S是以slot的边界为参考的。L(length)是表示数据信道所占的符号个数,也可以称为数据信道的持续的符号个数,或者也可以称为数据信道的时域长度。L是从S开始的连续的符号的个数。该时域资源表格中,S和L确定出的时域资源一定是在一个slot中,某一个时域资源不会跨slot的边界。
K2参数只存在于上行传输的时域资源表格中,K0参数只存在于下行传输的时域资源表格中,也就是协议针对上行传输和下行传输分别都规定了时域资源表格。K2是指示从物理下行控制信道(physical downlink control channel,PDCCH)接收到物理上行共享信道(physical uplink shared channel,PUSCH)发送间隔的slot个数,K0是指从PDCCH接收到(physical downlink shared channel,PDSCH)接收间隔的slot个数。
对于PDSCH映射类型,PDSCH映射类型主要是确定PDSCH的解调参考信号(demodulation reference signal,DMRS)的时域符号位置,还可以用来确定PDSCH所有合理的开始位置、持续时间等。PDSCH映射包括两种类型:类型A(type A)或者类型B(type B)。type A表示第一个DMRS的位置在slot的第3或者第4个符号,type B表示第一个DMRS的位置在数据开始的第一个符号。
对于PUSCH映射类型,PUSCH映射类型主要是确定PUSCH的解调参考信号(demodulation reference signal,DMRS)的时域符号位置,还可以用来确定PUSCH所有合理的开始位置、持续时间等。PUSCH映射包括两种类型:类型A(type A)或者类型B(type B)。type A表示第一个DMRS的位置在slot的第3个符号或者第4个符号,type B表示第一个DMRS的位置在数据开始的第一个符号。
对于高层信令配置的时域资源表格,该时域资源表格最多有16行,每一行都包括下面的参数:
一个SLIV、K2参数或者K0参数、物PDSCH映射类型(mapping type)或者PUSCH映射类型(mapping type)。
其中,SLIV值是将S和L联合编码得到的结果。其中,SLIV与S和L满足以下映射关系:
如果(L-1)≤7,则SLIV=14*(L-1)+S,
否则,SLIV=14*(14-L+1)+(14-1-S),其中,0<L≤(14-S)。
在本申请中,上述映射关系被称为映射关系(1)。其中,S的取值范围为0到13,再结合上面的映射关系(1)可以看出S和L确定出来的时域资源不会跨slot的边界。通过上述映射关系(1),一个SLIV值可以唯一的确定S的取值和L的取值的一个组合,S的取值和L的取值的一个组合也可以唯一确定一个SLIV值。
K2参数、K0参数、PDSCH mapping类型和PUSCH mapping类型的定义与协议规定的时域资源表格的定义类似,这里不再描述。
表1和表2针对不同的映射类型,对S和L的取值的组合做了进一步的限定。其中,表1为下行传输的时域资源中有效的S和L的组合表,表2为上行传输的时域资源中有效的S和L的组合表。
表1
Figure PCTCN2019116781-appb-000005
表2
Figure PCTCN2019116781-appb-000006
以表2为例说明:对于PUSCH映射类型、正常循环前缀的情况下,开始符号S只能是等于0,长度L可以是4到14的任意值,但是要满足S+L不能超过14。因为一旦超过,由于一个slot的长度为14个符号,如果S+L的值超过14,则意味着该时域资源横跨时隙边界,也就是超出一个slot的边界,跨到下一个slot中去了。由于某一个时隙的开始位置一般放置的是控制信道,不是用于承载数据的,如果某一个时域资源跨到下一个slot 中去,会影响网络设备的调度以及数据的传输,因此,S+L不能超过14,且S的值小于或者等于13。
在终端设备确定了某一个时域资源表格后,例如采用了协议规定的时域资源表格后,然后接收网络设备发送的PDCCH,该PDCCH中携带控制信息下行控制信息(downlink control information,DCI),DCI中包含一个长度为X个比特(bit)的字段,该字段用于指示时域资源表格中的某一行,从而指示出数据信道的开始符号S和长度L。终端设备也可以接收网络设备发送的高层信令,该高层信令指示该时域资源表格中的某一行,即指示数据信道的开始符号S和长度L。
又例如,在终端设备收到了高层配置的时域资源表格后,也会接收到网络设备发送的PDCCH或者是网络设备发送的高层信令,该PDCCH或者高层信令用于指示高层配置的时域资源表格中的一行,由于根据前面的描述,该时域资源表格的每一行都包含一个SLIV的值,SLIV可以根据上述的映射关系(1)确定。其中,S和L的值应满足上述的表1和表2的条件。终端设备根据SLIV值,确定出S和L,然后根据S和L,便可以确定出时域资源的位置。
根据上面的方法,终端设备便可以确定出数据信道的时域资源的开始符号和符号个数。然后在该时域资源上向网络设备发送数据或者接收网络设备发送的数据。网络设备确定数据信道的时域资源的开始符号和符号个数的方法与和上述的方法类似,
此外,网络设备还可以给终端设备发送高层信令,该高层信令用于配置一个聚合因子(aggregation factor),该聚合因子记为K,K代表在几个连续的slot中进行数据传输。例如,终端设备确定数据信道的开始符号是在符号2,长度是是4,并且聚合因子是2,意味着在连续的2个slot中传输数据,每个slot中的数据的开始符号都是2,长度都是4。网络设备还会通过高层信令或者通过DCI指示给终端设备每个slot的格式,slot的格式是指slot中那些符号是上行符号,哪些符号是下行符号,哪些符号是灵活符号。
以上行数据传输为例:如果终端设备确定出2个连续的slot中有数据传输,且每个slot中数据传输的开始符号都是2,长度都是4,根据高层信令或者通过DCI确定出每个slot的格式,如果某一个slot中的时域资源位置与下行符号冲突,则该时域资源位置的数据传输取消,或者将传输往后延迟到上行符号位置继续进行数据传输。
现有技术中,由于数据重复传输的资源只能是slot级的,也就是每个slot只能有一个数据发送,连续K个slot重复传输,也就是只能以slot为单位进行重复传输,不允许在一个slot里面重复多次,这种设计无法满足URLLC这种低时延业务的需求。
目前提出了支持以微时隙(mini-slot)为单位的重复,mini-slot就是比一个slot的时长要短。例如,一个mini-slot的时长可以为2个符号或者4个符号,或者7个符号。mini-slot级重复可以理解为:任意两个连续的mini-slot的时域资源的开始符号的间隔小于14个符号,或者说结束符号的间隔小于14个符号。相比数据传输只能以slot级别的重复而言,mini-slot级的数据传输的时延更短,能够在保证多次重复提高可靠性的前提下,进一步的降低时延。
例如,一个传输数据的时域资源开始符号是2,长度是4个符号,如果支持mini-slot级的传输,假设重复次数为2,该数据可以在符号2至5、符号6至9传输两次,即该数据可以在一个slot中重复传输两次。如果不支持mini-slot级的传输,则需要等到下一个slot 的符号2至5再进行重复传输。
但是目前还没有确定基于多个mini-slot上重复发送数据时,多个mini-slot的资源确定的方法,并且,多个mini-slot的横跨时隙边界的问题还没有解决方案。
基于上述问题,本申请提供了一种数据传输方法和通信装置,可以支持数据在mini-slot级别的重复传输,解决了多个mini-slot的横跨时隙边界时的数据传输问题,进一步的降低数据传输的时延并提高数据传输的可靠性。
下面结合图2详细说明本申请提供的反馈信息的传输方法,图2是本申请一个实施例的反馈信息的传输方法200的示意性交互图,该方法200可以应用在图1所示的场景中,当然也可以应用在其他通信场景中,本申请实施例在此不作限制。
本申请提供的数据的传输方法,首先根据第一时域资源确定M个mini-slot级别的、不跨时隙边界的第二时域资源,然后在该M个第二时域资源上进行mini-slot级别的数据重复传输。该方法在提高数据传输的可靠性的前提下,进一步降低了数据传输的时延。
应理解,在本申请实施例中,以终端设备和网络设备作为执行方法200中的各个步骤的执行主体为例,对方法200进行说明。作为示例而非限定,执行方法200中的各个步骤执行主体也可以是应用于终端设备的芯片和应用于网络设备的芯片。
如图2所示,该方法200包括:
S210,终端设备和网络设备确定第一时域资源。
S220,终端设备和网络设备根据该第一时域资源,确定M个第二时域资源,M为大于1的整数。
S230,对于上行数据传输,终端设备在该M个第二时域资源上向网络设备发送M次第一数据,相应的,网络设备在该M个第二时域资源上接收来自于该终端设备的第一数据的M次传输。或者,对于下行数据传输,网络设备在该M个第二时域资源上向终端设备发送M次第二数据,相应的,终端设备在该M个第二时域资源上接收来自于该网络设备的第二数据的M次传输。
具体而言,在终端设备需要向网络设备发送数据或者网络设备需要向终端设备发送数据时,终端设备或者网络设备需要确定发送该数据的时域资源。例如,该数据可以是URLLC业务的数据或者可以是其他业务类型的数据。即在S210中,终端设备或者网络设备确定发送该数据的第一时域资源。
第一时域资源是终端设备向网络设备发送数据或者控制信息时使用的时域资源,第一时域资源具有确定的时域边界。第一时域资源的所占的时间长度可以是固定的,即第一时域资源可是一块时域资源。终端设备可以在该第一时域资源包括的所有符号上或者部分符号上向网络设备发送数据或者控制信息等。
第一时域资源的时域长度可以大于一个时隙,也可以小于一个时隙。并且,第一时域资源可以横跨时隙边界,也可以不横跨时隙边界。第一时域资源可以为一个时间单元,第一时域资源包括的时隙或者符号可以全部是用于上行传输的,也可以全部是用于下行传输的,或者,可以是同时包括用于上行传输和用于下行传输的符号。例如,第一时域资源包括符号4至符号10。符号4至符号10可以是全部是用于上行传输的符号,也可以全部是用于下行传输的符号,或者,符号4至符号6是用于上行传输的符号,符号7至符号10是用于下行传输的符号。本申请实施例在此不作限制。
在S220中,终端设备或者网络设备根据该第一时域资源,确定M个第二时域资源,M为大于1的整数。例如,对于URLLC业务的数据,需要保证数据传输的可靠性和降低数据传输的时延,因此,在确定了第一时域资源后,终端设备或者网络设备会根据该第一时域资源,确定M个第二时域资源。M为大于1的整数。
应理解,M个第二时域资源中,任何一个或者多个第二时域资源的长度可以小于一个时隙,例如,M个第二时域资源可以均为mini-slot级别的长度。M个第二时域资源中,每一个第二时域资源都是不横跨时隙边界。M个第二时域资源可以是连续的,即相邻两个第二时域资源之间没有时间间隔,或者相邻两个第二时域资源的时间间隔为0。当然,M个第二时域资源也可以是不连续的,例如,间隔两个符号。M个第二时域资源可以是用于上行数据传输的时域资源,或者也可以是用于下行数据传输的时域资源。
在S230中,在确定了M个第二时域资源后,如果该M个第二时域资源是用于上行数据传输的时域资源,终端设备在该M个第二时域资源上向网络设备发送M次第一数据,即每一个第二时域资源都用于传输一次第一数据,实现了第一数据的M次重复传输。也就是说M个第二时域资源用于重复发送同一个数据包或者传输块。相应的,网络设备在该M个第二时域资源上接收来自于该终端设备的第一数据的M次传输。如果该M个第二时域资源是用于下行数据传输的时域资源,网络设备在该M个第二时域资源上向终端设备发送M次第二数据,相应的,终端设备在该M个第二时域资源上接收来自于该网络设备的第二数据M次传输。
本申请提供的数据传输的方法,由于数据在该M个第二时域资源上重复传输,而M个第二时域资源是根据第一时域资源确定的,M个第二时域资源可以为mini-slot级别的长度。实现了数据的重复发送,降低了数据传输的时延,也提高了数据传输的可靠性。
可选的,作为一个实施例,图3是本申请另一个实施例的数据传输的方法的示意性交互图。如图3所示,在步骤S220中,终端设备和网络设备根据所述第一时域资源,确定M个第二时域资源,包括:
S221,终端设备或者网络设备根据该第一时域资源,确定R个第三时域资源,R为大于1的整数;
S222,终端设备或者网络设备根据R个第三时域资源是否横跨时隙边界,确定该M个第二时域资源。
具体的,由于第一时域资源的长度可以大于一个时隙,也可以小于一个时隙。由上文可知,如果某一个用于传输数据的时域资源跨到下一个slot中,会影响网络设备的调度以及数据的传输。因此,需要保证M个第二时域资源均不能横跨时隙边界,即每一个第二时域资源从开始位置到结束位置之间不能包括时隙边界。例如,假设一个slot包括14个符号,编号为0至13,某一个第二时域资源为符号8至符号13,则这个第二时域资源没有横跨时隙边界。某一个第二时域资源为符号12至符号2,即延伸到了下一个时隙的符号0、符号1、符号2,则这个第二时域资源横跨时隙边界。由于第一时域资源可以横跨时隙边界,也可以不横跨时隙边界。因此,在步骤S221中,终端设备或者网络设备根据该第一时域资源,首先确定R个第三时域资源,R为大于1的整数。在本申请中,如果没有特殊说明,均假设一个时隙有14个符号,编号分别为0至13。
应理解,R个第三时域资源中,任意一个第三时域资源的长度可以大于一个时隙,也 可以小于一个时隙。即任意一个第三时域资源可以横跨时隙边界,也可以不横跨时隙边界。R个第三时域资源可以为mini-slot级别的长度。R个第三时域资源可以是连续的,即相邻两个第三时域资源之间没有时间间隔,或者时间间隔为0。当然,R个第三时域资源也可以是不连续的,例如,间隔两个符号。R个第三时域资源可以全部是用于上行数据传输的时域资源,或者也可以全部是用于下行数据传输的时域资源。对于每个第三时域资源而言,包括的符号全部为用于上行数据传输的符号,或者,包括的符号全部为用于下行数据传输的符号。即一个第三时域资源包括的所有符号的传输方向相同。并且,R个第三时域资源中,相邻两个时域资源均用于传输相同方向的数据。例如,用于传输上行方向的数据或者用于传输下行方向的数据,即R个第三时域资源是用于上行数据传输的时域资源,或者,R个第三时域资源是用于下行数据传输的时域资源。
在步骤S222中,在确定了确定R个第三时域资源后,终端设备或者网络设备根据R个第三时域资源是否横跨时隙边界,确定M个第二时域资源。由于需要保证M个第二时域资源均不能横跨时隙边界,因此根据R个第三时域资源是否横跨时隙边界,确定M个第二时域资源,可以保证M个第二时域资源均不横跨时隙边界,从而在降低数据传输的时延的前提下,进一步保证了数据在该M个第二时域资源上传输的可靠性,提高了数据传输的效率。
可选的,作为一个实施例,图4是本申请另一个实施例的数据传输的方法的示意性交互图。如图4所示,在步骤S222中,终端设备或者网络设备根据R个第三时域资源是否横跨时隙边界,确定所述M个第二时域资源,包括:
S222a:在该R个第三时域资源都不横跨时隙边界的情况下,将该R个第三时域资源确定为该M第二个时域资源,M等于R。
具体的,由于需要保证M个第二时域资源均不横跨时隙边界,而M个第二时域资源是根据R个第三时域资源确定的。因此,如果该R个第三时域资源都不横跨时隙边界,即R个第三时域资源均满足要求,在这种情况下,可以直接将该R个第三时域资源确定为该M第二个时域资源。即R和M的值相等。R个第三时域资源就是M第二个时域资源。
举例说明:图5是本申请一个实施例的第三时域资源的示意图。图5中,R值为4,即有4个第三时域资源,第一个第三时域资源为符号10至符号11,第二个第三时域资源为符号12至符号13,第三个第三时域资源为下一个时隙的符号0至符号1,第四个第三时域资源为符号2至符号3。可以看出,这4个第三时域资源均没有横跨时隙边界,在这种情况下,将该4个第三时域资源确定为该4第二个时域资源,即M值为4,第一个第二时域资源为符号10至符号11,第二个第二时域资源为符号12至符号13,第三个第二时域资源为下一个时隙的符号0至符号1,第四个第二时域资源为符号2至符号3。
可选的,作为一个实施例,图6是本申请另一个实施例的数据传输的方法的示意性交互图。如图6所示,在步骤S222中,终端设备或者网络设备根据R个第三时域资源是否横跨时隙边界,确定该M个第二时域资源,包括:
S222b:终端设备或者网络设备将该R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分。
S222c:终端设备或者网络设备根据该R个第三时域资源中不跨时隙边界的时域资源 和按照时隙边界进行划分后的时域资源,确定该M个第二时域资源。
具体而言,由于需要保证M个第二时域资源均不横跨时隙边界,而M个第二时域资源是根据R个第三时域资源确定的。因此,在步骤S222b中,如果该R个第三时域资源中存在横跨时隙边界的第三时域资源,则还需要将该R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分,以确保划分后的时域资源不横跨时隙边界。在步骤S222c中,终端设备或者网络设备根据该R个第三时域资源中不跨时隙边界的时域资源和按照时隙边界进行划分后的时域资源,确定该M个第二时域资源。
举例说明:图7是本申请一个实施例的第三时域资源的示意图。图7中,R值为3,即有3个第三时域资源,第一个第三时域资源为符号8至符号11,第二个第三时域资源为符号12至下一个时隙的符号1,第三个第三时域资源为下一个时隙的符号2至符号5,可以看出,第二个第三时域资源为横跨时隙边界,在这种情况下,需要将该第二个第三时域资源按照时隙边界进行划分。然后根据划分后得到的时域资源和没有进行划分的时域资源,确定该M个第二时域资源。
作为一种具体的实现方式,将R个第三时域资源中横跨时隙边界的第四时域资源划分为H+1个第二时域资源,其中,第四时域资源是R个第三时域资源中横跨时隙边界的任意一个时域资源。第四时域资源横跨H个时隙边界,H为正整数。即如果R个第三时域资源中,某一个第三时域资源是跨H个slot边界的,则将该第三时域资源用slot边界划分为H+1个第二时域资源,每个第二时域资源上均传输同一个数据包或者传输块。M个第二时域资源包括所述H+1个第二时域资源,还包括R个第三时域资源中不跨边界的第三时域资源。
举例说明:图8是本申请一个实施例的第二时域资源的示意图。图8中所示的第二时域资源可以由图7所示的3个第三时域资源划分得到。由于图7中的第二个第三时域资源为符号12至下一个时隙的符号1。即第二个第三时域资源为该第四时域资源,第二个第三时域资源只横跨一个时隙边界,即H=1,在这种情况下,需要将该第二个第三时域资源按照时隙边界进行划分,将第二个第三时域资源划分为两个时域资源,分别为符号12至符号13,下一个时隙的符号0至符号1。这样可以一共得到4个第二时域资源。如图8所示,每个第二时域资源均不跨时域边界。4个第二时域资源的起止符号分别为:符号8至符号11,符号12至符号13、下一个时隙的符号0至符号1,下一个时隙的符号2至符号5。
作为另一种具体的实现方式,将该R个第三时域资源中横跨时隙边界的第四时域资源划分为H+1个第五时域资源,其中,第四时域资源是R个第三时域资源中横跨时隙边界的任意一个时域资源,该第四时域资源横跨H个时隙边界,H为正整数;将该H+1个第五时域资源中的第一个第五时域资源与该第四时域资源的前一个第三时域资源合并,共同构成一个第二时域资源。将该H+1个时域资源中的最后一个第五时域资源与该第四时域资源的后一个第三时域资源合并,共同组成一个第二时域资源。即如果R个第三时域资源中,某一个第三时域资源是跨H个slot边界的,该第三时域资源为横跨时隙边界的第四时域资源。在这种划分方式中,R小于M。
应理解,上述的H+1个第五时域资源中除去第一个和最后一个第五时域资源,中间的H-1个第五时域资源可以作为H-1个第二时域资源。
还应理解,当第四时域资源为第一个第三时域资源时,则上述的第一个第五时域资源直接当做第一个第二时域资源;类似的,当第四时域资源为最后一个第三时域资源时,则最后一个第五时域资源直接当做最后一个第二时域资源。
还应理解,最终确定的M个第二时域资源中包括所述合并后的重组的第二时域资源,还包括R个第三时域资源中不跨边界的第三时域资源,以及前面所述的H-1个第二时频资源。
举例说明:图9是本申请一个实施例的第二时域资源的示意图。图9中所示的第二时域资源可以由图7所示的3个第三时域资源划分得到。由于图7中的第二个第三时域资源为符号12至下一个时隙的符号1。即第二个第三时域资源为该第四时域资源,第二个第三时域资源只横跨一个时隙边界,即H=1,在这种情况下,需要将该第二个第三时域资源按照时隙边界进行划分为两个第五时域资源,第一个第五时域资源为符号12至符号13,第二个第五时域资源为下一个时隙的符号0至符号1。将第一个第五时域资源并入到第四时域资源的前一个第三时域资源中,即将第一个第五时域资源并入到第一个第三时域资源中,并入后第一个第二时域资源变为符号8至符号13。将第二个第五时域资源并入到第四时域资源的后一个第三时域资源中,即将第一个第五时域资源并入到第三个第三时域资源中,并入后得到第二个第二时域资源为下一个时隙的符号0至符号5。即得到两个第二时域资源。
可选的,作为一个实施例,在步骤S222中,终端设备或者网络设备根据R个第三时域资源是否横跨时隙边界,确定所述M个第二时域资源,包括:
方式一:若R个第三时域资源中有Q个第三时域资源不跨时隙边界,则该Q个第三时域资源确定为Q个第二时域资源。
若该R个第三时域资源中有横跨时隙边界的第三时域资源,将某一个横跨时隙边界的第三时域资源称为第四时域资源。如果第四时域资源横跨H个时隙边界,则第四时域资源可以确定出H+1个第二时域资源,所述H+1个第二时域资源包括,从第四时域资源的开始符号到第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从最后一个时隙边界到第四时域资源的结束的时域资源确定为一个第二时域资源。
M个第二时域资源包括Q个第二时域资源和该H+1个第二时域资源。根据方式1可知,最终R大于M。
举例说明:图7是本申请一个实施例的第三时域资源的示意图。图7中,R值为3,即有3个第三时域资源,第一个第三时域资源为符号8至符号11,第二个第三时域资源为符号12至下一个时隙的符号1,第三个第三时域资源为下一个时隙的符号2至符号5,可以看出,第二个第三时域资源为横跨时隙边界,根据方式一所述的方法,根据R个第三时域资源确定的M个第二时域资源可以如图8所示。
图8是本申请一个实施例的第二时域资源的示意图。图8中所示的第二时域资源可以由图7所示的3个第三时域资源确定得到。按照方式一所述的方法,由于图7中第一个第三时域资源和第三个第三时域资源均没有跨边界,则这两个第三时域资源确定为图8中的第一个第二时域资源和第四个第二时域资源;由于图7中的第二个第三时域资源为符号12至下一个时隙的符号1。即第二个第三时域资源为该第四时域资源,第二个第三时域资 源只横跨一个时隙边界,即H=1,在这种情况下,可以根据该第四时域资源确定2个第二时域资源,分别为符号12至符号13,下一个时隙的符号0至符号1。这样可以一共得到4个第二时域资源。如图8所示,每个第二时域资源均不跨时域边界。4个第二时域资源的起止符号分别为:符号8至符号11,符号12至符号13、下一个时隙的符号0至符号1,下一个时隙的符号2至符号5。
方式二:若所述R个第三时域资源中有横跨时隙边界的第三时域资源,将某一个横跨时隙边界的第三时域资源称为第四时域资源。如果第四时域资源横跨H个时隙边界,则根据第四时域资源可以确定出H+1个第二时域资源,包括:从第四时域资源的前一个第三时域资源的开始符号到第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从最后一个时隙边界到第四时域资源后面的一个第三时域资源的结束符号的时域资源确定为一个第二时域资源。需要说明的是,如果第四时域资源为第一个第三时域资源,则所述H+1个时域资源包括:从第四时域资源的开始符号到第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从最后一个时隙边界到第四时域资源后面的一个第三时域资源的结束符号的时域资源确定为一个第二时域资源;如果第四时域资源为最后一个第三时域资源,则所述H+1个时域资源包括:从第四时域资源的前一个第三时域资源的开始符号到第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从最后一个时隙边界到第四时域资源的结束符号的时域资源确定为一个第二时域资源。
第五时域资源为所述R个第三时域资源中不横跨时隙边界的任意一个时域资源,且该第五时域资源前面的一个第三时域资源和后面的一个第三时域资源均不横跨时隙边界,则所述第五时域资源为一个第二时域资源;
所述M个第二时域资源包括:第四时域资源确定的第二时域资源和根据所述第五时域资源确定的第二时域资源。
举例说明:图9是本申请一个实施例的第二时域资源的示意图。图9中所示的第二时域资源可以由图7所示的3个第三时域资源确定得到。按照方式二所述的方法,由于图7中的第二个第三时域资源为符号12至下一个时隙的符号1。即第二个第三时域资源为该第四时域资源,第二个第三时域资源只横跨一个时隙边界,即H=1,在这种情况下,可以根据第四时域资源确定出2个第二时域资源,第四时域资源的第一部分为符号12至符号13,第二部分为下一个时隙的符号0至符号1。将第一部分并入到第四时域资源的前一个第三时域资源中,并入后第一个第二时域资源变为符号8至符号13。将第二个部分并入到第四时域资源的后一个第三时域资源中,即并入到第三个第三时域资源中,并入后得到第二个第二时域资源为下一个时隙的符号0至符号5。在3个第三时域资源中,没有第五时域资源,即没有一个第三时域资源既不跨时隙边界,前后也没有跨边界的第三时域资源,例如第一个第三时域资源虽然不跨边界,但是后面的第三时域资源跨边界,第三个第三时域资源虽然不跨边界,但是前面的第三时域资源跨边界。因此共得到2个第二时域资源。
方式三:根据该R个第三时域资源中的横跨时隙边界的第四时域资源的位置以及该第四时域资源横跨的时隙边界个数,将该第四时域资源进行划分;
根据该R个第三时域资源中不跨时隙边界的时域资源和将该第四时域资源进行划分后的时域资源,确定该M个第二时域资源,其中,R和M的值相等。
具体而言,若该R个第三时域资源中前P个第三时域资源不跨边界,则该前P个第三时域资源为该M个第二时域资源中的前P个第二时域资源。
如果该R个第三时域资源中第P+1个第三时域资源跨时隙边界,则该M个第二时域资源中第P+1个第二时域资源为该第P+1个第三时域资源的开始符号到时隙边界,此时,如果P+1=R,则该M个第二时域资源包括该P+1个第二时域资源,如果P+1<R,则该M个第二时域资源中第P+2个第二时域资源为该时隙边界到第P+1个第三时域资源的结束符号;如果P+2=R则所有的M个第二时域资源包括该P+2个第二时域资源。如果P+2<R,则继续判断R个第三时域资源中下一个第三时域资源即第P+2个第三时域资源是否跨边界。
如果该R个第三时域资源中第P+2个第三时域资源不跨边界,则该M个第二时域资源中第P+3个第二时域资源为该第P+2个第三时域资源;如果该R个第三时域资源中第P+2个第三时域资源跨时隙边界,则该M个第二时域资源中第P+3个第二时域资源为该第P+2个第三时域资源的开始符号到时隙边界,此时如果P+3<R,则该M个第二时域资源中第P+4个第二时域资源为该时隙边界到第P+2个第三时域资源的结束符号。如果P+4=R则所有的M个第二时域资源包括该P+4个第二时域资源。如果P+4<R,则继续判断R个第三时域资源中下一个第三时域资源即第P+3个第三时域资源是否跨边界。如此往复,确定M个第二时域资源。
根据方式三的划分步骤可以看出,最终确定的M个第二个时域资源的个数等于所述R。
结合图10所示的例子进行说明。图10本申请一个实施例的第二时域资源的示意图。图10中所示的第二时域资源可以由图7所示的3个第三时域资源确定得到。按照方式三所述的方法,
由于图7中的第1个第三时域资源不跨时隙边界,则第1个第三时域资源就是第一个第二时域资源,即第一个第二时域资源为符号8至符号11,P=1;第2个第三时域资源跨时隙边界,则第2个第二时域资源为符号12至符号13,根据由于P+1=2<R,则第3个第二时域资源为下个时隙的符号0到1;由于P+2=R,则M个第二时域资源就包括了前面确定的P+2也就是3个第二时域资源分别为:符号8至符号11,符号12至符号13、下一个时隙的符号0至符号1。
换句话说,由于图7中的第1个第三时域资源不跨时隙边界,则第1个第三时域资源就是一个第六时域资源,即第一个第六时域资源为符号8至符号11,P=1;第2个第三时域资源跨时隙边界,根据该第二个时域资源可以确定出2个第六时域资源,分别为符号12至符号13以及下个时隙的符号0到1;第2个第三时域资源跨时隙边界,则根据该第三时域资源可以确定出一个第六时域资源,为下一个时隙的符号2到符号5。M个第二时域资源就包括了4个第六时域资源中的前3个,分别为:符号8至符号11,符号12至符号13、下一个时隙的符号0至符号1。所以M等于3,R等于3。M等于R,都等于3。
应理解,在本申请实施例中,除了利用上述的两种方式将R个第三时域资源中横跨时隙边界的时域资源进行划分,结合R个第三时域资源中不跨时隙边界的时域资源确定该M个第二时域资源之外,还有其他的实现方式,只要保证该M个第二时域资源均不横跨时隙边界即可,本申请在此不作限制可选的,作为一个实施例,图11是本申请另一个实施例的数据传输的方法的示意性交互图。如图11所示,在步骤S221中,终端设备或者网络 设备根据第一时域资源,确定R个第三时域资源,包括:
S221a,终端设备或者网络设备根据重复次数R和R个第三时域资源之间的间隔,将第一时域资源重复R次,得到R个第三时域资源。
具体而言,在确定了第一时域资源后,需要根据第一时域资源确定R个第三时域资源。一种可能的方式为:根据重复次数R和R个第三时域资源之间的间隔,将第一时域资源重复R次,得到R个第三时域资源。
可选的,重复次数R可以是协议预定义的,或者网络设备可以向终端设备发送第二指示信息,该第二指示信息用于指示该重复次数R的值。该第二指示信息还可以用于指示R个第三时域资源之间的间隔。第二指示信息可以承载在DCI中也可以承载在高层信令中。在本申请中,高层信令可以是指高层协议层发出的信令,高层协议层为物理层以上的至少一个协议层。其中,高层协议层具体可以包括以下协议层中的至少一个:媒体接入控制(medium access control,MAC)层、无线链路控制(radio link control,RLC)层、分组数据会聚协议(packet data convergence protocol,PDCP)层、无线资源控制(radio resource control,RRC)层和非接入层(non access stratum,NAS)。
例如,假设确定重复次数R=4,第一个时域资源的位置为符号9到符号12,且确定R个第三时域资源间隔的符号个数均为0,将第一个时域资源重复4次,则会得到4个第三时域资源。4个第三时域资源的起止符号分别为:符号9到符号12,符号13到符号2,符号3到符号6,符号7到符号10。
应理解,在本申请实施例中,相邻两个第三时域资源之间的间隔可以相同,也可以不同。R个第三时域资源的间隔可以是预定义的,例如协议规定。R个第三时域资源为连续的,也就是说R个第三时域资源之间的间隔为0;或者网络设备可以向终端设备发送第七指示信息,该第七指示信息用于指示R个第三时域资源之间的间隔。该第七指示信息可以直接指示R个第三时域资源中每两个相邻第三时域资源之间的间隔,也可以通过指示一个第一时域资源的模式,来间接的指示R个第三时域资源之间的间隔。第七指示信息可以承载在DCI中也可以承载在高层信令中。可选地,该第七指示信息可以和第二指示信息承载相同的DCI或者高层信令中。具体地,有很多种实现方式,例如:
网络设备可以直接通过指示信息通知给终端设备重复次数R和R个第三时域资源的间隔。或者,网络设备也可以通知终端设备R个第三时域资源是连续的,如果确定该R个第三时域资源是连续的,则可以确定R个第三时域资源的间隔是0,即为一种隐式的指示方法。或者,还可以提前定义第一时域资源的长度和R这两个参数与R个第三时域资源的间隔对应关系。例如,可以存储一张表格,如表3所示。表3所示为相邻两个第三时域资源之间的间隔相同的情况,即确定R个第三时域资源的间隔均相同。在确定了第一时域资源的长度和重复次数R这两个参数后,就可以确定R个第三时域资源的间隔。即为一个预定的模式。
表3
Figure PCTCN2019116781-appb-000007
Figure PCTCN2019116781-appb-000008
应理解,表3只是示例性的,不应该对本申请的实施例造成任何限制。例如,在本申请实施例中,R个第三时域资源之间的间隔可以部分相同,或者全部不同。或者,还可以由其他方式确定R个第三时域资源的间隔。本申请实施例在此不作限制。
可选的,作为一个实施例,图12是本申请另一个实施例的数据传输的方法的示意性交互图。如图12所示,在S221中,终端设备或者网络设备根据第一时域资源,确定R个第三时域资源,包括:
S221b:终端设备或者网络设备将第一时域资源进行划分,得到R个第三时域资源。
具体而言,在确定了第一时域资源后,需要根据第一时域资源确定R个第三时域资源。另一种可能的方式为对第一时域资源进行划分,得到R个第三时域资源,即R个第三时域资源中每一个第三时域资源的持续的符号个数均小于或等于第一时域资源持续的符号个数。作为一种具体的实现方式,在步骤S221b中,终端设备或者网络设备将第一时域资源进行划分,得到R个第三时域资源,包括:
根据重复次数R,将该第一时域资源划分为该R个第三时域资源,其中,该R个第三时域资源中有R-1个第三时域资源中每个第三时域资源持续的符号个数均为
Figure PCTCN2019116781-appb-000009
L为该第一时域资源持续的符号个数,L为正整数。
Figure PCTCN2019116781-appb-000010
表示向下取整。
本实现方式还可以表述为:终端设备或者网络设备根据重复次数R,以及第一时域资源确定该R个第三时域资源,其中,该R个第三时域资源中有R-1个第三时域资源中每个第三时域资源持续的符号个数均为
Figure PCTCN2019116781-appb-000011
有一个第三时域资源持续的符号个数为
Figure PCTCN2019116781-appb-000012
L为该第一时域资源持续的符号个数,L为正整数。
Figure PCTCN2019116781-appb-000013
表示向下取整。
具体而言,在确定了第一时域资源后,可以根据重复次数R,将第一时域资源进行划分得到R个第三时域资源。重复次数R可以网络设备通过指示信息通知给终端设备的,该指示信息可以承载在DCI或者高层信令中,或者也可以是协议预定义的。该R个第三时域资源中,有R-1个第三时域资源中每个第三时域资源持续的符号个数均为
Figure PCTCN2019116781-appb-000014
有一个第三时域资源持续的符号个数为
Figure PCTCN2019116781-appb-000015
例如,第一时域资源为第一个时隙的符号10至第二个时隙的符号4。该第一时域资源持续的L的值为9,且确定R是等于5的,计算
Figure PCTCN2019116781-appb-000016
得到计算结果为1,那么。5个第三时域资源中,有4个第三时域资源中每个第三时域资源持续的符号个数均为1,有一个第三时域资源持续的符号个数均为5。这四个持续的符号个数均为1的可以为前4个第三时域资源,也可以为后4个第三时域资源,也可以为任意的4个第三时域资源。4个第三时域资源可以连续,也可以不连续。
如果该第一时域资源持续的符号个数L刚好可以被R整除,则R个第三时域资源中,每一个第三时域资源持续的符号个数可以都相等,为L/R。即将第一时域资源平均划分为R个第三时域资源。当然,如果该第一时域资源持续的符号个数L刚好可以被R整除,R个第三时域资源中,每个第三时域资源持续的符号个数也可以不相等。
应理解,如果第一时域资源的L个符号包含了不同方向的符号,例如,第一时域资源是上行传输的资源,但是L中包含了下行的符号或者是预留的符号(例如,预留的DMRS符号)。则计算R个第三时域资源中每个第三时域资源所占的符号个数时,应该将L用L’代替,L’为L中除去下行符号和预留的符号后剩余的符号个数。
例如:第一时域资源的开始位置为第10个符号,长度L为8,第一时域资源为第一个时隙的符号10至第二个时隙的符号3,且确定R是等于4的,但是第一时域资源中包含了4个下行符号(第一个时隙的符号12至第二个时隙的符号1),所以应该用L’=8-4=4来代替原来的L。这样,每个第三时域资源所占的符号个数为1。
还应理解,R个第三时域资源包括的所有符号全部是用于上行传输的,或者,R个第三时域资源包括的所有符号全部是用于下行传输的。
例如,在上述的例子中,第一时域资源的开始位置为第10个符号,长度L为8,第一时域资源为第一个时隙的符号10至第二个时隙的符号3。但是第一时域资源中包含了4个下行符号(第一个时隙的符号12至第二个时隙的符号1),4个第三时域资源中每个第三时域资源所占的符号个数均为1,4个第三时域资源分别为第一个时隙的符号10,符号11,第二个时隙的符号2,符号3。4个第三时域资源均用于上行传输。
作为另一种具体的实现方式,在步骤S221b中,终端设备或者网络设备将第一时域资源进行划分,得到R个第三时域资源,包括:
根据该第一时域资源的第一划分方式,将该第一时域资源划分为该R个第三时域资源,其中,该第一时域资源对应多种划分方式,该第一划分方式为该多种划分方式中的一种。
本实现方式还可以表述为:终端设备或者网络设备根据该第一时域资源的第一划分方式,确定该R个第三时域资源。
具体而言,可以预定义或者配置每种长度L的第一时域资源具有固定几种划分方式。例如,图13是本申请一个实施例的长度为8的第一时域资源划分方式的示意图。假设长度L为8的第一时域资源有的4种划分方式。划分方式1将第一时域资源划分为一个第三时域资源。划分方式2将第一时域资源划分为两个第三时域资源,前四个符号为一个第三时域资源,后四个符号为一个第三时域资源。划分方式3将第一时域资源划分为三个第三时域资源,前两个符号为一个第三时域资源,后四个符号为一个第三时域资源,剩剩余的中间两个为一个第三时域资源。划分方式4将第一时域资源划分为四个第三时域资源,每两个符号为一个第三时域资源。
应理解,某一个第一时域资源的对应的划分方式可以只与该第一时域资源持续的符号个数L相关,L确定了,则对应的多种划分方式也就确定了。则终端设备或网络设备可以根据该第一时域资源,将该第一时域资源划分为该R个第三时域资源,该第一时域资源对应多种划分方式,该第一划分方式为该多种划分方式中的一种。假设第一时域资源持续的符号个数L为8,第一划分方式为划分方式3,则可以确定将该第一时域资源划分为该3个第三时域资源。应理解,图13只是示例性的,不应该对本申请的实施例造成任何限制。例如,某一个第一时域资源的对应的划分方式还可以有更多种不同的划分方式。本申请实施例在此不作限制。
网络设备可以通过向终端设备发送第一指示信息,该第一指示信息用于指示所述第一 时域资源的第一划分方式。终端设备可以通过第一指示信息确定第一时域资源的第一划分方式。第一指示信息可以承载在DCI或者是高层信令中发送给终端设备。
利用该方式将第一时域资源进行划分得到R个第三时域资源,由于网络设备不需要将重复次数R通知给终端设备,可以降低信令的开销。
作为另一种具体的实现方式,在步骤S221b中,终端设备或者网络设备将第一时域资源进行划分,得到R个第三时域资源,包括:
根据该第一时域资源内的时隙边界,将该第一时域资源划分为该R个第三时域资源;
由于第一时域资源的长度可以大于一个时隙,在第一时域资源横跨时隙边界时,可以根据该第一时域资源内的时隙边界,将该第一时域资源划分为该R个第三时域资源。本实现方式还可以表述为:终端设备或者网络设备根据该第一时域资源以及时隙边界,确定该R个第三时域资源。
具体可以有以下几种划分方式:
划分方式1:按照slot边界前的符号个数将第一时域资源划分为R个第三时域资源。
图14是本申请一个实施例的将第一时域资源按照slot边界进行划分的示意图。第一时域资源的开始符号是符号9,长度是14个符号,第一时域资源为第一个时隙的符号9至第二个时隙的符号8。通过slot边界切分以后,slot边界前剩余5个符号,slot边界后还剩余9个符号,则可以每5个符号划分出一个第三时域资源,最后将剩余4个符号构成一个单独的第三时域资源,则可以将第一时域资源划分为3个第三时域资源,即R的值为3。第一个第三时域资源为第一个时隙的符号9至符号13,第二个第三时域资源为第二个时隙的符号0至符号4,第三个第三时域资源为第一个时隙的符号9至符号13,第二个第三时域资源为第二个时隙的符号5至符号8。
本划分方式更加一般化的描述为:如果第一时域资源跨X个时隙边界,则可以按照第一时域资源在第一个slot边界前的符号个数,将第一时域资源进行划分,得到R个第三时域资源,该第一时域资源在第一个slot边界前的符号个数为T个符号。其中,第一时域资源横跨X个时隙,第一时域资源在第一个时隙边界前的符号个数为T,R个第三时域资源中的最后一个第三时域资源的符号个数小于或者等于T。
结合图15进行说明:图15是本申请一个实施例的将第一时域资源按照slot边界进行划分的示意图。第一时域资源的开始符号是符号9,长度是28个符号,第一时域资源为第一个时隙的符号9至第三个时隙的符号8,T=5个符号。通过slot边界切分以后,slot边界前剩余5个符号,slot边界后还剩余23个符号,则可以每5个符号划分出一个第三时域资源,最后将剩余3个符号构成一个单独的第三时域资源,则可以将第一时域资源划分为6个第三时域资源,即R的值为6。第一个第三时域资源为第一个时隙的符号9至符号13,第二个第三时域资源为第二个时隙的符号0至符号4,第三个第三时域资源为第一个时隙的符号5至符号9,第四个第三时域资源为第二个时隙的符号10至第三个时隙的符号0,第五个第三时域资源为第三个时隙的符号1至符号5,第六个第三时域资源为第三个时隙的符号6至符号8。
可选地,对于划分方式1,如果第一时域资源跨X个时隙边界,则可以根据第一时域资源首先按照X个时隙边界确定出X+1个时域资源(或者也可以称为“X+1段时域资源”),然后将X+1段时域资源中的每一段的时域资源按照第一时域资源在第一个slot边界前的符 号个数划分,该第一时域资源在第一个slot边界前的符号个数为T个符号。如果该X+1个时域资源中某个时域资源中的剩余K个符号,K<T,则将K个符号当做一个第三时域资源,或者将该K个符号归到前一个第三时域资源中。
结合图16进行说明:图16是本申请一个实施例的将第一时域资源按照slot边界进行划分的示意图。第一时域资源的开始符号是符号9,长度是28个符号,第一时域资源为第一个时隙的符号9至第三个时隙的符号8,T=5个符号。通过slot边界切分以后,切分为3个时域资源,即X=2,将第一时域资源切分成3段时域资源,第一段时域资源为第一个slot边界前的5个符号,第二段时域资源为第二个slot,第三段时域资源为slot边界后还剩余的9个符号。则首先将第二段时域资源每5个符号划分出一个第三时域资源,第二段时域资源中剩余4个符号构成一个单独的第三时域资源,第三段时域资源每5个符号划分出一个第三时域资源,第三段时域资源中剩余4个符号构成一个单独的第三时域资源,则可以将第一时域资源划分为6个第三时域资源,即R的值为6。第一个第三时域资源为第一个时隙的符号9至符号13,第二个第三时域资源为第二个时隙的符号0至符号4,第三个第三时域资源为第一个时隙的符号5至符号9,第四个第三时域资源为第二个时隙的符号10至13,第五个第三时域资源为第三个时隙的符号0至符号4,第六个第三时域资源为第三个时隙的符号5至符号8。图15所示的为将第二段时域资源剩余的4个符号单独当做一个第三时域资源。可选的,还可以将第二段时域资源中剩余的4个符号并入到第三个第三时域资源中,或者并入到第五个第三时域资源中。
划分方式2:按照slot边界后的符号个数将第一时域资源划分为R个第三时域资源。
图17是本申请另一个实施例的将第一时域资源按照slot边界进行划分的示意图。第一时域资源的开始符号是符号9,长度是14个符号。第一时域资源为第一个时隙的符号9至第二个时隙的符号8。通过slot边界切分以后,slot边界前剩余5个符号,slot边界后还剩余9个符号,则可以每9个符号划分出一个第三时域资源。即将第一时域资源划分为2个第三时域资源,即R的值为2。第一个第三时域资源为第一时隙的符号9至符号13,第二个第三时域资源为第二时隙的符号0至符号8。
本划分方式更加一般化的描述为:如果第一时域资源跨X个时隙边界,则可以按照第一时域资源在最后一个slot边界后的符号个数,将第一时域资源进行划分,得到R个第三时域资源,第一时域资源在最后一个slot边界后的符号个数为Y个符号,R个第三时域资源中的最后一个第三时域资源的符号个数小于或者等于Y。
可选地,对于划分方式2,如果第一时域资源跨X个时隙边界,则可以将第一时域资源首先按照X个时隙边界划分为X+1个时域资源(或者也可以称为“X+1段时域资源”),然后将该X+1段时域资源中的每一段的时域资源按照第一时域资源在最后一个slot边界后的符号个数划分,第一时域资源在最后一个slot边界后的符号个数为Y个符号,如果X+1个时域资源中某个时域资源中的剩余K个符号,K<Y,则将K个符号当做一个第三时域资源,或者将该K个符号归到前一个第三时域资源中。
具体的划分方式可以参照划分方式1中的图14或者图15所描述的,为了简洁,这里不在赘述。区别点在于T和Y的定义不同。
可选地,将第一时域资源进行划分,得到R个第三时域资源的过程中,还可以从第一时域资源的结尾从后往前划分。
结合图18进行说明:图18是本申请一个实施例的将第一时域资源按照slot边界进行划分的示意图。第一时域资源的开始符号是符号9,长度是28个符号,第一时域资源为第一个时隙的符号9至第三个时隙的符号8,Y的值等于9个符号。通过slot边界切分以后,将第一时域资源切分为3段时域资源,第一段时域资源为第一个slot边界前的5个符号,第二段时域资源为第二个slot,第三段时域资源为slot边界后还剩余9个符号,从第一时域资源的结尾从后往前划分时,首先将第二段时域资源每9个符号划分出一个第三时域资源,第二段时域资源中前5个符号构成一个单独的第三时域资源,则可以将第一时域资源划分为4个第三时域资源,即R的值为4。第一个第三时域资源为第一个时隙的符号9至符号13,第二个第三时域资源为第二个时隙的符号0至符号4,第三个第三时域资源为第一个时隙的符号5至符号13,第四个第三时域资源为第三个时隙的符号0至8。图18所示的为将第二段时域资源中剩余的5个符号单独当做一个第三时域资源。可选的,还可以将第二段时域资源中的剩余的5个符号并入到第一个第三时域资源中,或者并入到第三个第三时域资源中。
划分方式3:按照slot边界前的符号个数和slot边界的符号个数中符号个数的较小值第一时域资源划分为R个第三时域资源。或者,按照slot边界前的符号个数和slot边界后符号个数中符号个数的较大值将第一时域资源划分为R个第三时域资源。
结合图13或者图17所示的例子,可以看出,slot边界前的符号个数为5,slot边界后的符号个数为9,则可以按照slot边界前的符号个数将第一时域资源划分为R个第三时域资源,即将第一时域资源划分为3个第三时域资源。
本划分方式更加一般化的描述为:如果第一时域资源跨X个时隙边界,则可以按照第一时域资源在第一个slot边界前的符号个数和第一时域资源在最后一个slot边界后符号个数中符号个数较小值,即按照T和Y中的较小者,将第一时域资源进行划分,得到R个第三时域资源。
可选地,如果第一时域资源跨X个时隙边界,则可以将第一时域资源首先按照H个时隙边界划分为H+1个时域资源,然后将该H+1个时域资源的每一个的时域资源按照W个符号划分,如果某个时域资源中的剩余K个符号,K<W,则将K个符号单独当做一个第三时域资源,或者将该K个符号归到前一个第三时域资源中,或者,将该K个符号归到后一个第三时域资源中。W的值可以是预定义的,也可以是网络设备配置的,W的值也可以是T和Y中的较小者。具体的划分方式可以参照划分方式1所描述的,或者参照划分方式2所描述的,这里不再赘述。
作为另一种具体的实现方式,在步骤S221b中,终端设备或者网络设备将第一时域资源进行划分,得到R个第三时域资源,包括:
根据该第一时域资源内的时域切分位置,将该第一时域资源划分为该R个第三时域资源,该时域切分位置与该第一时域资源的起点无关。换句话说,根据第一时域资源内的时域切分位置以及第一时域资源,确定出R个第三时域资源。
具体而言,可以预定义或者配置每一个slot内固定的时域切分位置,该切分位置是固定的,与第一时域资源的长度以及起点没有关系。即无论第一时域资源位置在哪,都按照第一时域资源内的固定的时域切分位置去划分第一时域资源,从而得到该R个第三时域资源。
图19是本申请一个实施例的将第一时域资源按照时域切分位置进行划分的示意图。第一时域资源的开始符号是符号9,长度是14个符号。第一时域资源为第一个时隙的符号9至第二个时隙的符号8。每一个slot内固定时域切分位置为:第3个符号的结束时刻,第7个符号结束时刻,第11个符号的结束时刻,第13个符号的结束时刻。第一时域资源的开始符号是符号9,长度是14个符号,按照固定的时域切分位置进行切分后,如图18所示,可以将该第一时域资源切分为5个第三时域资源,即R等于5。第一个第三时域资源为第一个时隙的符号9至符号11,第二个第三时域资源为第一个时隙的符号12至符号13,第三个第三时域资源为第二个时隙的符号0至符号3,第四个第三时域资源为第二个时隙的符号4至符号7,第五个第三时域资源为第二个时隙的符号8。
应理解,在本申请实施例中,除了利用上述的几种划分方式将第一时域资源进行划分得到R个第三时域资源之外,还可以利用其他的方式,例如,随机将第一时域资源进行划分,得到R个第三时域资源等。本申请实施例在此不作限制。还应理解,在本申请实施例中,终端设备和网络设备也可以根据第一时域资源,直接确定M个第二时域资源,即不需要先根据第一时域资源,确定R个第三时域资源,再根据R个第三时域资源是否横跨时隙边界,确定M个第二时域资源。不需要执行步骤S221和S222。
具体的,终端设备或者网络设备也可以根据第一时域资源是否横跨时隙边界,将第一时域资源划分为M个第二时域资源。例如,在第一时域资源不横跨时隙边界的情况下,根据M的值,可以将第一时域资源平均划分为M个第二时域资源,或者每个第二时域资源的持续的符号个数也可以不相等,具体的划分方法和步骤S221中根据第一时域资源确定R个第三时域资源的过程类似,具体地,可以参照图11所述的将所述第一时域资源划分为R个第三时域资源的方法,将所述第一时域资源划分为M个第二时域资源;或者也可以参照图12所述的利用与第一时域资源对应的某一划分方式,将第一时域资源划分为R个第三时域资源的方法,利用与第一时域资源对应的某一划分方式,将第一时域资源划分为M个第二时域资源。为了简洁,这里不再赘述。M的值可以是网络设备通过指示信息通知给终端设备的或者协议预定义的,具体可以参照重复次数R的确定方式,不再赘述。
例如,在第一时域资源横跨时隙边界的情况下,可以利用时隙边界将第一时域资源划分为M个第二时域资源。具体的划分方法可以和图13至图17所示的将第一时域资源进行划分得到R个第三时域资源的过程类似。或者也可以参照图12所示的、利用与第一时域资源对应的某一划分方式,将第一时域资源划分为M个第二时域资源。或者,还可以利用图15所示的、根据第一时域资源内的时域切分位置,将该第一时域资源划分为M个第二时域资源等。为了简洁,这里不再赘述。
可选的,图20是本申请另一个实施例的数据传输的方法的示意性交互图。如图20所示,该方法200还包括:
S211,终端设备接收来自于网络设备的第三指示信息,该第三指示信息用于指示该第一时域资源的开始和长度指示值SLIV,其中,SLIV与S和L满足以下映射关系:
如果
Figure PCTCN2019116781-appb-000017
则SLIV=N*(L-1)+S,
否则,SLIV=N*(N-L+1)+(N-1-S),其中,0<L≤(N-S),
其中,N>14。
在本申请中,上述映射关系被称为映射关系(2)。其中,S为该第一时域资源的起 始符号的编号,S为大于等于零的整数,L为该第一时域资源持续的符号个数,L和N为正整数。N可以为协议规定或者是网络设备通过信令通知给终端设备的一个数值。可选的,N=M*14,且M为大于或者等于2的整数,例如N=28。在本申请中,信令可以是物理层信令也可以是高层信令,上述映射关系被称为映射关系(2)。通过上述映射关系(2),一个SLIV值可以唯一的确定S的取值和L的取值的一个组合,S的取值和L的取值的一个组合也可以唯一确定一个SLIV值。
在另一种具体的实现方式中,SLIV与S和L满足前述映射关系(1)中所述的映射关系。
S212,终端设备根据该第三指示信息,确定第一时域资源。
具体而言,在终端设备确定第一时域资源时,可以通过接收网络设备发送的第三指示信息,该第三指示信息用于指示一个时域资源表格中的一行,该时域资源表格可以为协议预定义的或者高层配置的。
当该时域资源表格为高层信令配置的时域资源表格时,该时域资源表格每一行可以包括下述参数:
一个SLIV、K2参数或者K0参数、PUSCH或者PDSCH映射类型。有关这些参数的详细描述可以参见前面的介绍,这里不加赘述。
结合上面的映射关系(2)可以看出根据S和L确定出来的时域资源可能会跨slot的边界。
因为某一个DCI中指示的开始符号S就是指示slot内的开始符号位置,所以可以进一步限制上述映射关系(2)中的S、L以及S+L的取值范围。下面以表格的形式来举例说明S、L以及S+L的取值范围的限定。
具体限定如下表4和表5所示,其中表4为下行有效的S和L的组合表,表5为上行有效的S和L的组合表,
表4
Figure PCTCN2019116781-appb-000018
表5
Figure PCTCN2019116781-appb-000019
以表5为例说明:对于PUSCH映射类型为type A、正常循环前缀的时候,开始符号S只能是等于0,长度L可以是4到N的任意值,但是要满足S+L不能超过N。
SLIV与S和L满足的映射关系以及S、L以及S+L的取值范围的限制可以是协议定 义的。SLIV是根据上述的映射关系(2)对S和L进行联合编码确定的,并且S、L应该满足表4和表5的限制。网络设备确定第一时域资源的时域位置,具体可以根据调度算法等确定第一时域资源的位置,本申请不做限定。并且该第一时域资源的开始符号S和L必须满足表4和表5的限制。网络设备确定出出第一时域资源的S和L后,便可以根据上述的映射关系(2),对S、L联合编码确定出SLIV,通过该第三指示信息将第一时域资源的SLIV通知给终端设备。因此,在终端设备接收到用于指示该第一时域资源的SLIV的第三指示信息后,终端设备便可以根据上述的映射关系(2),确定出第一时域资源的时域位置。第一时域资源可以横跨时隙边界。第三指示信息可以承载在DCI或者是高层信令中发送给终端设备。
作为另外一种可能的实现方式:当终端设备用于确定第一时域资源的时域资源表格为高层信令配置的时域资源表格时,该时域资源表格的每一行都包含开始符号S和长度L。其中,开始符号S和长度L的值要满足一定的限制。即网络设备确定的第一时域资源的起始符号S和长度L的值要满足一定的限制。以限定形式为表格的形式进行说明。例如起始符号S和长度L的值要满足表格6和表格7的限制。其中表6为下行有效的S和L的组合表,表7为上行有效的S和L的组合表。
表6
Figure PCTCN2019116781-appb-000020
表7
Figure PCTCN2019116781-appb-000021
其中S的候选值为0~13,L的候选值为1~P,其中P可以为协议规定的,例如正常循环前缀的时候,P可以为14。扩展循环前缀的时候,P可以为12。结合上面表格6和7.可以看出根据S和L确定出来的时域资源可能会跨slot的边界。
终端设备根据第三指示信息指示的表格的某一行,确定出S和L,然后根据S和L,便可以确定出第一时域资源的时域位置。
或者,在终端设备确定第一时域资源时,可以通过接收网络设备发送的第三指示信息,该第三指示信息直接指示开始符号S和长度L的值,开始符号S和长度L的值要满足上述的表格6和表格7的限制,终端设备根据该第三指示信息,确定出S和L,然后根据S和L,便可以确定出第一时域资源的时域位置。第一时域资源可能会横跨时隙边界。
作为另外一种可能的实现方式:
该第三指示信息用于指示一个时域资源表格中的一行,
当该时域资源表格为高层信令配置的时域资源表格时,该时域资源表格每一行可以包括下述参数:
一个SLIV、K2参数或者K0参数、PUSCH或者PDSCH映射类型。有关这些参数的详细描述可以参见前面的介绍,这里不加赘述。
结合上面的映射关系(2)可以看出根据S和L确定出来的时域资源可能会跨slot的边界。并且令其中映射关系(2)中的N=28.S、L以及S+L的取值范围的限定仍然满足表4和表5。
或者,时域资源表格每一行包括S和L,如前所述。
可选的,该第三指示信息还用于指示第一时域资源的开始符号S和参考长度L。其中,参考长度是第一时域资源长度计算时需要用到的参数,不是实际的第一时域资源的长度。
此外,终端设备还接收网络设备发送的第四指示信息,第四指示信息指示一个X值。X为第一时域资源横跨的时隙边界的个数。相应地,网络设备发送第四指示信息,第四指示信息承载在DCI中或者承载在高层信令中。
终端设备还接收网络设备发送的第五指示信息,该第五指示信息用于指示第一时域资源的开始符号S和参考长度L。即该第五指示信息可以用于指示一个时域资源表格中的一行,该时域资源表格为高层信令配置的时域资源表格或者协议预定义的资源表格。
应理解,第五指示信息和第三指示信息可以是同一条指示信息,或者,也可以是不同的指示信息。
终端设备根据上述的第五指示信息,确定S和L,并结合第四指示信息确定第一时域资源的开始符号为S,长度为L+(X-1)*14。
可选的,终端设备还接收网络设备发送的第六指示信息,第六指示信息用于指示所述第一时域资源横跨的时隙的个数W,W为非负整数。相应地,网络设备发送第六指示信息,第六指示信息承载在DCI中或者承载在高层信令中。
终端设备还接收网络设备发送的第五指示信息,该第五指示信息用于指示第一时域资源的开始符号S和参考长度L。即该第五指示信息可以用于指示一个时域资源表格中的一行,该时域资源表格为高层信令配置的时域资源表格或者协议预定义的资源表格。
应理解,第六指示信息和第三指示信息可以是同一条指示信息,或者,也可以是不同的指示信息。
终端设备根据上述的第六指示信息,确定S和L,并结合第四指示信息确定第一时域资源的起始符号的编号S,长度为L+W*14个符号。
例如,终端设备接收第五指示信息,确定第一时域资源位置为开始符号为S=10,参考长度为L=7,并且接收第四指示信息,确定X=1,则第一时域资源为符号S=10,长度为7。
在确定了第一时域资源后,可以结合前面所述的方法根据第一时域资源,确定M个第二时域资源,保证M个第二时域资源不会跨slot的边界,M个第二时域资源用于进行数据的M次重复传输,在保证数据传输可靠性的同时,降低了传输的时延。
应理解,终端设备或者网络设备在确定第一时域资源的过程中,还可以利用现有技术中的方法确定第一时域资源。具体的,可以有如下的几种可能的实现方式:
作为一种可能的实现方式,网络设备利用表1和表2中的S、L以及S+L的取值范围 确定出第一时域资源。确定出出第一时域资源的S和L后,然后利用映射关系(1)对S、L进行联合编码确定SLIV,通过第三指示信息将第一时域资源的SLIV通知给终端设备。在终端设备接收到用于指示该第一时域资源的SLIV的第三指示信息后,终端设备便可以根据上述的映射关系(1),结合表1和表2中的S、L以及S+L的取值范围,确定出第一时域资源的时域位置。第一时域资源是不横跨时隙边界。该第三指示信息可以承载在DCI或者是高层信令中发送给终端设备。
作为另外一种可能的实现方式:网络设备可以利用表1和表2中的S、L确定出第一时域资源。在终端设备确定第一时域资源时,可以通过接收网络设备发送的第三指示信息,该第三指示信息用于指示一个时域资源表格中的一行,该时域资源表格的每一行都包含开始符号S和长度L。其中,起始符号S和长度L的值要满足表格1和表格2的限制。终端设备根据第三指示信息,确定出S和L,然后根据S和L,便可以确定出第一时域资源的时域位置,第一时域资源不横跨时隙边界。
作为另外一种可能的实现方式:网络设备可以利用表1和表2中的S、L确定出第一时域资源。在终端设备确定第一时域资源时,可以通过接收网络设备发送的指示信息,该指示信息直接指示开始符号S和长度L的值,开始符号S和长度L的值要满足上述的表格1和表格2的限制,终端设备根据该指示信息,确定出S和L,然后根据S和L,便可以确定出第一时域资源的时域位置。第一时域资源不横跨时隙边界。
应理解,本申请实施例中的方式、情况、类别以及实施例的划分仅是为了描述的方便,不应构成特别的限定,各种方式、类别、情况以及实施例中的特征在不矛盾的情况下可以相结合。
还应理解,在本申请的实施例中涉及的各种数字编号仅为描述方便进行的区分,并不用来限制本申请的实施例的范围。上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
还应理解,上述只是为了帮助本领域技术人员更好地理解本申请实施例,而非要限制本申请实施例的范围。本领域技术人员根据所给出的上述示例,显然可以进行各种等价的修改或变化,例如,上述方法200中某些步骤可以是不必须的,或者可以新加入某些步骤等。或者上述任意两种或者任意多种实施例的组合。这样的修改、变化或者组合后的方案也落入本申请实施例的范围内。
还应理解,上文对本申请实施例的描述着重于强调各个实施例之间的不同之处,未提到的相同或相似之处可以互相参考,为了简洁,这里不再赘述。
还应理解,本申请实施例中,“预定义”可以通过在设备(例如,包括终端设备和网络设备)中预先保存相应的代码、表格或其他可用于指示相关信息的方式来实现,本申请对于其具体的实现方式不做限定。
以上结合图2至图20对本申请实施例的反馈信息的传输方法做了详细说明。以下,结合图21至图26对本申请实施例通信装置进行详细说明。
图21示出了本申请实施例的通信装置300的示意性框图,该装置300可以对应上述方法200中描述的终端设备,也可以是应用于终端设备的芯片或组件,并且,该装置300中各模块或单元分别用于执行上述方法200中终端设备所执行的各动作或处理过程,如图 17所示,该通信装置300可以包括:处理单元310和通信单元320。
该处理单元310用于:确定第一时域资源。
该处理单元310还用于根据该第一时域资源,确定M个第二时域资源,M为大于1的整数。
该通信单元320用于在该M个第二时域资源上向网络设备发送M次第一数据或者接收来自于该网络设备的第二数据的M次传输。
应理解,装置300中各单元执行上述相应步骤的具体过程请参照前文中结合图2至图16的方法实施例的描述,为了简洁,这里不加赘述。
可选的,通信单元320可以包括接收单元(模块)和发送单元(模块),用于执行方法200以及图2至图4、图6、图10、图11和图20中终端设备接收信息和发送信息的步骤。可选的,通信装置300还可以存储单元330,存储单元330用于存储通信单元320和处理单元310执行的指令。通信单元320、处理单元310和存储单元330相互耦合,存储单元330存储指令,处理单元310用于执行存储单元330存储的指令,通信单元320用于在处理单元310的驱动下执行具体的信号收发。
处理单元310可以是处理器,通信单元320可以是收发器、输入/输出接口或接口电路。存储单元330可以是存储器。如图22所示,通信装置400可以包括处理器410、存储器420和收发器430。当该通信装置是通信设备内的芯片时,该存储单元330可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该通信设备内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
本领域技术人员可以清楚地了解到,通信装置300和400所执行的步骤以及相应的有益效果可以参考上述方法200中终端设备的相关描述,为了简洁,在此不再赘述。
图23示出了本申请实施例的通信装置500的示意性框图,该装置500可以对应上述方法200中描述的网络设备,也可以是应用于网络设备的芯片或组件,并且,该装置500中各模块或单元分别用于执行上述方法200中网络设备所执行的各动作或处理过程,如图19所示,该通信装置500可以包括:处理单元510和通信单元520。
该处理单元510用于:确定第一时域资源;
该处理单元510还用于根据该第一时域资源,确定M个第二时域资源,M为大于1的整数;
该通信单元520用于在该M个第二时域资源上向终端设备发送M次第二数据或者接收来自于该终端设备的第一数据的M次传输。
应理解,装置500中各单元执行上述相应步骤的具体过程请参照前文中结合图2至图16的方法实施例的描述,为了简洁,这里不加赘述。
可选的,通信单元520可以包括接收单元(模块)和发送单元(模块),用于执行方法200以及图2至图4、图6、图10、图11和图20中网络设备接收信息和发送信息的步骤。可选的,通信装置500还可以存储单元550,存储单元550用于存储通信单元520和处理单元510执行的指令。通信单元520、处理单元510和存储单元550相互耦合,存储单元550存储指令,处理单元510用于执行存储单元550存储的指令,通信单元520用于在处理单元510的驱动下执行具体的信号收发。
应理解,处理单元510可由处理器实现,通信单元520可以由收发器实现。存储单元 可以由存储器实现。如图24所示,通信装置600可以包括处理器610、存储器620和收发器630。
本领域技术人员可以清楚地了解到,通信装置500和600所执行的步骤以及相应的有益效果可以参考上述方法200中网络设备的相关描述,为了简洁,在此不再赘述。
还应理解,以上装置中单元的划分仅仅是一种逻辑功能的划分,实际实现时可以全部或部分集成到一个物理实体上,也可以物理上分开。且装置中的单元可以全部以软件通过处理元件调用的形式实现;也可以全部以硬件的形式实现;还可以部分单元以软件通过处理元件调用的形式实现,部分单元以硬件的形式实现。例如,各个单元可以为单独设立的处理元件,也可以集成在装置的某一个芯片中实现,此外,也可以以程序的形式存储于存储器中,由装置的某一个处理元件调用并执行该单元的功能。这里该处理元件又可以称为处理器,可以是一种具有信号处理能力的集成电路。在实现过程中,上述方法的各步骤或以上各个单元可以通过处理器元件中的硬件的集成逻辑电路实现或者以软件通过处理元件调用的形式实现。
在一个例子中,以上任一装置中的单元可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个专用集成电路(application specific integrated circuit,ASIC),或,一个或多个数字信号处理器(digital signal processor,DSP),或,一个或者多个现场可编程门阵列(field programmable gate array,FPGA),或这些集成电路形式中至少两种的组合。再如,当装置中的单元可以通过处理元件调度程序的形式实现时,该处理元件可以是通用处理器,例如中央处理器(central processing unit,CPU)或其它可以调用程序的处理器。再如,这些单元可以集成在一起,以片上系统(system-on-a-chip,SOC)的形式实现。
图25示出了本申请实施例提供的一种终端设备的结构示意图。其可以为以上实施例中的终端设备,用于实现以上实施例中终端设备的操作。如图25所示,该终端设备包括:天线710、射频装置720、基带装置730。天线710与射频装置720连接。在下行方向上,射频装置720通过天线710接收网络设备发送的信息,将网络设备发送的信息发送给基带装置730进行处理。在上行方向上,基带装置730对终端设备的信息进行处理,并发送给射频装置720,射频装置720对终端设备的信息进行处理后经过天线710发送给网络设备。
基带装置730可以包括调制解调子系统,用于实现对数据各通信协议层的处理;还可以包括中央处理子系统,用于实现对终端操作系统以及应用层的处理;此外,还可以包括其它子系统,例如多媒体子系统,周边子系统等,其中多媒体子系统用于实现对终端设备相机,屏幕显示等的控制,周边子系统用于实现与其它设备的连接。调制解调子系统可以为一个独立的芯片。可选的,以上用于终端的装置可以位于该调制解调子系统。
调制解调子系统可以包括一个或多个处理元件731,例如,包括一个主控CPU和其它集成电路。此外,该调制解调子系统还可以包括存储元件732和接口电路733。存储元件732用于存储数据和程序,但用于执行以上方法中终端设备所执行的方法的程序可能不存储于该存储元件732中,而是存储于调制解调子系统之外的存储器中。接口电路733用于与其它子系统通信。以上用于终端设备的装置可以位于调制解调子系统,该调制解调子系统可以通过芯片实现,该芯片包括至少一个处理元件和接口电路,其中处理元件用于执行以上终端设备执行的任一种方法的各个步骤,接口电路用于与其它装置通信。在一种实现 中,终端设备实现以上方法中各个步骤的单元可以通过处理元件调度程序的形式实现,例如用于终端设备的装置包括处理元件和存储元件,处理元件调用存储元件存储的程序,以执行以上方法实施例中终端执行的方法。存储元件可以为处理元件处于同一芯片上的存储元件,即片内存储元件。
在另一种实现中,用于执行以上方法中终端设备所执行的方法的程序可以在与处理元件处于不同芯片上的存储元件,即片外存储元件。此时,处理元件从片外存储元件调用或加载程序于片内存储元件上,以调用并执行以上方法实施例中终端执行的方法。
在又一种实现中,终端设备实现以上方法中各个步骤的单元可以是被配置成一个或多个处理元件,这些处理元件设置于调制解调子系统上,这里的处理元件可以为集成电路,例如:一个或多个ASIC,或,一个或多个DSP,或,一个或者多个FPGA,或者这些类集成电路的组合。这些集成电路可以集成在一起,构成芯片。
终端设备实现以上方法中各个步骤的单元可以集成在一起,以片上系统(system-on-a-chip,SOC)的形式实现,该SOC芯片,用于实现以上方法。
图26是本申请实施例提供的一种网络设备的结构示意图。用于实现以上实施例中网络设备的操作。如图26所示,该网络设备包括:天线801、射频装置802、基带装置803。天线801与射频装置802连接。在上行方向上,射频装置802通过天线801接收终端发送的信息,将终端设备发送的信息发送给基带装置803进行处理。在下行方向上,基带装置803对终端的信息进行处理,并发送给射频装置802,射频装置802对终端设备的信息进行处理后经过天线801发送给终端。
基带装置803可以包括一个或多个处理元件8031,例如,包括一个主控CPU和其它集成电路。此外,该基带装置803还可以包括存储元件8032和接口8033,存储元件8032用于存储程序和数据;接口8033用于与射频装置802交互信息,该接口例如为通用公共无线接口(common public radio interface,CPRI)。以上用于网络设备的装置可以位于基带装置803,例如,以上用于网络设备的装置可以为基带装置803上的芯片,该芯片包括至少一个处理元件和接口电路,其中处理元件用于执行以上网络设备执行的任一种方法的各个步骤,接口电路用于与其它装置通信。在一种实现中,网络设备实现以上方法中各个步骤的单元可以通过处理元件调度程序的形式实现,例如用于网络设备的装置包括处理元件和存储元件,处理元件调用存储元件存储的程序,以执行以上方法实施例中网络设备执行的方法。存储元件可以为处理元件处于同一芯片上的存储元件,即片内存储元件,也可以为与处理元件处于不同芯片上的存储元件,即片外存储元件。
在另一种实现中,网络设备实现以上方法中各个步骤的单元可以是被配置成一个或多个处理元件,这些处理元件设置于基带装置上,这里的处理元件可以为集成电路,例如:一个或多个ASIC,或,一个或多个DSP,或,一个或者多个FPGA,或者这些类集成电路的组合。这些集成电路可以集成在一起,构成芯片。
网络设备实现以上方法中各个步骤的单元可以集成在一起,以片上系统的形式实现,例如,基带装置包括该SOC芯片,用于实现以上方法。
上述各个装置实施例中的终端设备与网络设备可以与方法实施例中的终端设备或者网络设备完全对应,由相应的模块或者单元执行相应的步骤,例如,当该装置以芯片的方式实现时,该接收单元可以是该芯片用于从其他芯片或者装置接收信号的接口电路。以上 用于发送的单元是一种该装置的接口电路,用于向其他装置发送信号,例如,当该装置以芯片的方式实现时,该发送单元是该芯片用于向其他芯片或者装置发送信号的接口电路。
本申请实施例还提供了一种通信系统,该通信系统包括:上述终端设备和上述网络设备。
本申请实施例还提供了一种计算机可读介质,用于存储计算机程序代码,该计算机程序包括用于执行上述方法200中本申请实施例的数据传输方法的指令。该可读介质可以是只读存储器(read-only memory,ROM)或随机存取存储器(random access memory,RAM),本申请实施例对此不做限制。
本申请还提供了一种计算机程序产品,该计算机程序产品包括指令,当该指令被执行时,以使得该终端设备和该网络设备执行对应于上述方法的终端设备和网络设备的操作。
本申请实施例还提供了一种系统芯片,该系统芯片包括:处理单元和通信单元,该处理单元,例如可以是处理器,该通信单元例如可以是输入/输出接口、管脚或电路等。该处理单元可执行计算机指令,以使该通信装置内的芯片执行上述本申请实施例提供的任一种数据传输方法。
可选地,该计算机指令被存储在存储单元中。
可选地,该存储单元为该芯片内的存储单元,如寄存器、缓存等,该存储单元还可以是该终端内的位于该芯片外部的存储单元,如只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)等。其中,上述任一处提到的处理器,可以是一个CPU,微处理器,ASIC,或一个或多个用于控制上述的反馈信息的传输方法的程序执行的集成电路。该处理单元和该存储单元可以解耦,分别设置在不同的物理设备上,通过有线或者无线的方式连接来实现该处理单元和该存储单元的各自的功能,以支持该系统芯片实现上述实施例中的各种功能。或者,该处理单元和该存储器也可以耦合在同一个设备上。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是ROM、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是RAM,其用作外部高速缓存。RAM有多种不同的类型,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
本申请中出现的术语“上行”和“下行”,用于在特定场景描述数据/信息传输的方向,比如,“上行”方向一般是指数据/信息从终端向网络侧传输的方向,或者分布式单元向集中式 单元传输的方向,“下行”方向一般是指数据/信息从网络侧向终端传输的方向,或者集中式单元向分布式单元传输的方向,可以理解,“上行”和“下行”仅用于描述数据/信息的传输方向,该数据/信息传输的具体起止的设备都不作限定。
在本申请中可能出现的对各种消息/信息/设备/网元/系统/装置/动作/操作/流程/概念等各类客体进行了赋名,可以理解的是,这些具体的名称并不构成对相关客体的限定,所赋名称可随着场景,语境或者使用习惯等因素而变更,对本申请中技术术语的技术含义的理解,应主要从其在技术方案中所体现/执行的功能和技术效果来确定。
在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。
本申请的实施例中的方法可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序或指令。在计算机上加载和执行所述计算机程序或指令时,全部或部分地执行本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机程序或指令可以存储在计算机可读存储介质中,或者通过所述计算机可读存储介质进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是集成一个或多个可用介质的服务器等数据存储设备。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (53)

  1. 一种数据传输的方法,其特征在于,包括:
    确定第一时域资源;
    根据所述第一时域资源,确定M个第二时域资源,M为大于1的整数;
    在所述M个第二时域资源上向网络设备发送M次第一数据或者接收来自于所述网络设备的第二数据的M次传输。
  2. 根据权利要求1所述的方法,其特征在于,所述根据所述第一时域资源,确定M个第二时域资源,包括:
    根据所述第一时域资源,确定R个第三时域资源,R为大于1的整数;
    根据所述R个第三时域资源是否横跨时隙边界,确定所述M个第二时域资源。
  3. 根据权利要求2所述的方法,其特征在于,所述根据所述R个第三时域资源是否横跨时隙边界,确定所述M个第二时域资源,包括:
    在所述R个第三时域资源均不跨时隙边界的条件下,将所述R个第三时域资源确定为所述M第二个时域资源,M等于R。
  4. 根据权利要求2所述的方法,其特征在于,所述根据所述R个第三时域资源是否横跨时隙边界,确定所述M个第二时域资源,包括:
    将所述R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分;
    根据所述R个第三时域资源中不跨时隙边界的时域资源和按照时隙边界进行划分后的时域资源,确定所述M个第二时域资源。
  5. 根据权利要求4所述的方法,其特征在于,M等于R。
  6. 根据权利要求4所述的方法,其特征在于,所述将所述R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分,包括:
    将所述R个第三时域资源中横跨时隙边界的第四时域资源划分为H+1个所述第二时域资源,其中,所述第四时域资源横跨H个时隙边界,H为正整数。
  7. 根据权利要求6所述的方法,其特征在于,所述H+1个第二时域资源包括:从所述第四时域资源的开始符号到所述H个时隙边界中的第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从所述H个时隙边界中的最后一个时隙边界到所述第四时域资源的结束的时域资源为一个第二时域资源。
  8. 根据权利要求2所述的方法,其特征在于:
    所述M个第二时域资源包括根据第四时域资源确定的第二时域资源和Q个第三时域资源,所述Q个第三时域资源为所述所述R个第三时域资源中不跨时隙边界的时域资源,所述第四时域资源为所述R个第三时域资源中横跨时隙边界的任意一个时域资源,所述第四时域资源横跨H个时隙边界,根据所述第四时域资源确定出的H+1个第二时域资源包括:从所述第四时域资源的开始符号到所述H个时隙边界中第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从所述H个时隙边界中最后一个时隙边界到所述第四时域资源的结束符号的时域资源为一个第二时域资源。
  9. 根据权利要求7或8所述的方法,其特征在于,R大于M。
  10. 根据权利要求4所述的方法,其特征在于,所述将所述R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分,包括:
    将所述R个第三时域资源中横跨时隙边界的第四时域资源划分为H+1第五个时域资源,其中,所述第四时域资源横跨H个时隙边界,H为正整数;
    将所述H+1个第五时域资源中的第一个第五时域资源与所述第四时域资源的前一个第三时域资源合并,共同构成一个第二时域资源;
    将所述H+1第五个时域资源中的最后一个第五时域资源与所述第四时域资源的后一个第三时域资源合并,共同构成一个第二时域资源。
  11. 根据权利要求9所示的方法,其特征在于,R小于M。
  12. 根据权利要求2至11中任一项所述的方法,其特征在于,所述根据所述第一时域资源,确定R个第三时域资源,包括:
    根据重复次数R和R个第三时域资源之间的间隔,将所述第一时域资源重复R次,得到所述R个第三时域资源。
  13. 根据权利要求12所述的方法其特征在于,所述方法还包括:
    接收来自于所述网络设备的第七指示信息,所述第七指示用于指示所述R个第三时域资源之间的间隔。
  14. 根据权利要求12或13所述的方法,其特征在于,所述R个第三时域资源的间隔为0,或者,所述R个第三时域资源在时域上是连续的。
  15. 根据权利要求2至11中任一项所述的方法,其特征在于,所述根据所述第一时域资源,确定R个第三时域资源,包括:
    将所述第一时域资源进行划分,得到所述R个第三时域资源。
  16. 根据权利要求15所述的方法,其特征在于,所述将所述第一时域资源进行划分,得到所述R个第三时域资源,包括:
    根据重复次数R,将所述第一时域资源划分为所述R个第三时域资源,其中,所述R个第三时域资源中有R-1个第三时域资源中每个第三时域资源持续的符号个数均为
    Figure PCTCN2019116781-appb-100001
    L为所述第一时域资源持续的符号个数,L为正整数。
  17. 根据权利要求15所述的方法,其特征在于,所述将所述第一时域资源进行划分,得到所述R个第三时域资源,包括:
    根据所述第一时域资源在第一个时隙边界前的符号个数,将所述第一时域资源进行划分,得到所述R个第三时域资源,
    其中,所述第一时域资源横跨X个时隙边界,所述第一时域资源在第一个时隙边界前的符号个数为T,所述R个第三时域资源中的最后一个第三时域资源的符号个数小于或者等于T。
  18. 根据权利要求15所述的方法,其特征在于,所述将所述第一时域资源进行划分,得到所述R个第三时域资源,包括:
    将所述第一时域资源按照时隙边界划分为X+1个时域资源,所述第一时域资源横跨X个时隙边界,所述第一时域资源在第一个时隙边界前的符号个数为T;
    将所述X+1个时域资源的每一个的时域资源按照T个符号的长度进行划分;
    如果所述X+1个时域资源中的任意一个时域资源中剩余K个符号,并且,K<T,将 所述K个符号作为一个第三时域资源,或者将所述K个符号划入到前一个第三时域资源中。
  19. 根据权利要求15所述的方法,其特征在于,所述将所述第一时域资源进行划分,得到所述R个第三时域资源,包括:
    接收来自于网络设备的第一指示信息,所述第一指示信息用于指示所述第一时域资源的第一划分方式;
    根据所述第一划分方式,将所述第一时域资源划分为所述R个第三时域资源,其中,所述第一时域资源对应多种划分方式,所述第一划分方式为所述多种划分方式中的一种。
  20. 根据权利要求2至19任一项所述的方法,其特征在于,所述方法还包括:
    接收来自于网络设备的第二指示信息,所述第二指示信息用于指示所述重复次数R的值。
  21. 根据权利要求1至20中任一项所述的方法,其特征在于,所述确定第一时域资源,包括:
    接收来自于网络设备的第三指示信息,所述第三指示信息用于指示所述第一时域资源的开始和长度指示值SLIV,其中,SLIV与S和L满足以下映射关系:
    如果
    Figure PCTCN2019116781-appb-100002
    则SLIV=N*(L-1)+S,
    否则,SLIV=N*(N-L+1)+(N-1-S),其中,0<L≤(N-S),
    其中,N>14;
    S为所述第一时域资源的起始符号的编号,S为大于或者等于零的整数,L为所述第一时域资源持续的符号个数,L和N为正整数。
  22. 根据权利要求1至20中任一项所述的方法,其特征在于,所述确定第一时域资源,包括:
    接收来自于所述网络设备的第三指示信息,所述第三指示信息用于指示时域资源表格中的一行,所述时域资源表格的一行包含起始符号的编号S和所述第一时域资源持续的符号个数L,S为大于或者等于零的整数,L为正整数;
    根据S和L,确定所述第一时域资源的时域位置。
  23. 根据权利要求1至22中任一项所述的方法,其特征在于,所述确定第一时域资源,包括:
    接收来自于网络设备的第四指示信息,所述第四指示信息用于指示所述第一时域资源横跨的时隙边界的个数X,X为非负整数;
    接收来自于所述网络设备的第五指示信息,所述第五指示信息用于指示所述第一时域资源的起始符号的编号S和参考长度L;
    所述第一时域资源的起始符号的编号为S,长度为L+(X-1)*14个符号。
  24. 根据权利要求1至22中任一项所述的方法,其特征在于,所述确定第一时域资源,包括:
    接收来自于网络设备的第六指示信息,所述第六指示信息用于指示所述第一时域资源横跨的时隙的个数W,W为非负整数;
    接收来自于所述网络设备的第五指示信息,所述第五指示信息用于指示所述第一时域资源的起始符号的编号S和参考长度L;
    所述第一时域资源的起始符号的编号S,长度为L+W*14个符号。
  25. 一种数据传输的方法,其特征在于,包括:
    确定第一时域资源;
    根据所述第一时域资源,确定M个第二时域资源,M为大于1的整数;
    在所述M个第二时域资源上向终端设备发送M次第二数据或者接收来自于所述终端设备的第一数据的M次传输。
  26. 根据权利要求25所述的方法,其特征在于,所述根据所述第一时域资源,确定M个第二时域资源,包括:
    根据所述第一时域资源,确定R个第三时域资源,R为大于1的整数;
    根据所述R个第三时域资源是否横跨时隙边界,确定所述M个第二时域资源。
  27. 根据权利要求26所述的方法,其特征在于,所述根据所述R个第三时域资源是否横跨时隙边界,确定所述M个第二时域资源,包括:
    在所述R个第三时域资源均不跨时隙边界的条件下,将所述R个第三时域资源确定为所述M个第二时域资源,M等于R。
  28. 根据权利要求26所述的方法,其特征在于,所述根据所述R个第三时域资源是否横跨时隙边界,确定所述M个第二时域资源,包括:
    将所述R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分;
    根据所述R个第三时域资源中不跨时隙边界的时域资源和按照时隙边界进行划分后的时域资源,确定所述M个第二时域资源。
  29. 根据权利要求28所述的方法,其特征在于,M等于R。
  30. 根据权利要求28所述的方法,其特征在于,所述将所述R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分,包括:
    将所述R个第三时域资源中横跨时隙边界的第四时域资源划分为H+1个所述第二时域资源,其中,所述第四时域资源横跨H个时隙边界,H为正整数。
  31. 根据权利要求28所述的方法,其特征在于,所述H+1个第二时域资源包括:从所述第四时域资源的开始符号到所述H个时隙边界中的第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从所述H个时隙边界中的最后一个时隙边界到所述第四时域资源的结束的时域资源为一个第二时域资源。
  32. 根据权利要求26所述的方法,其特征在于,
    所述M个第二时域资源包括根据第四时域资源确定的第二时域资源和Q个第三时域资源,所述Q个第三时域资源为所述所述R个第三时域资源中不跨时隙边界的时域资源,所述第四时域资源为所述R个第三时域资源中横跨时隙边界的任意一个时域资源,所述第四时域资源横跨H个时隙边界,根据所述第四时域资源确定出的H+1个第二时域资源包括:从所述第四时域资源的开始符号到所述H个时隙边界中第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从所述H个时隙边界中最后一个时隙边界到所述第四时域资源的结束符号的时域资源为一个第二时域资源。
  33. 根据权利要求31或32所述的方法,其特征在于,R大于M。
  34. 根据权利要求28所述的方法,其特征在于,所述将所述R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分,包括:
    将所述R个第三时域资源中横跨时隙边界的第四时域资源划分为H+1个第五时域资 源,其中,所述第四时域资源横跨H个时隙边界,H为正整数;
    将所述H+1个第五时域资源中的第一个第五时域资源与所述四时域资源的前一个第三时域资源合并,共同构成一个第二时域资源;
    将所述H+1个第五时域资源中的最后一个第五时域资源与所述四时域资源的后一个第三时域资源合并,共同构成一个第二时域资源。
  35. 根据权利要求34所述的方法,其特征在于,R小于M。
  36. 根据权利要求26至35中任一项所述的方法,其特征在于,所述根据所述第一时域资源,确定R个第三时域资源,包括:
    根据重复次数R和R个第三时域资源之间的间隔,将所述第一时域资源重复R次,得到所述R个第三时域资源。
  37. 根据权利要求36所述的方法其特征在于,所述方法还包括:
    向所述终端设备发送第七指示信息,所述第七指示用于指示所述R个第三时域资源之间的间隔。
  38. 根据权利要求36或37所述的方法,其特征在于,所述R个第三时域资源的间隔为0,或者,所述R个第三时域资源在时域上是连续的。
  39. 根据权利要求36至35中任一项所述的方法,其特征在于,所述根据所述第一时域资源,确定R个第三时域资源,包括:
    将所述第一时域资源进行划分,得到所述R个第三时域资源。
  40. 根据权利要求39所述的方法,其特征在于,所述将所述第一时域资源进行划分,得到所述R个第三时域资源,包括:
    根据重复次数R,将所述第一时域资源划分为所述R个第三时域资源,其中,所述R个第三时域资源中有R-1个第三时域资源中每个第三时域资源持续的符号个数均为
    Figure PCTCN2019116781-appb-100003
    L为所述第一时域资源持续的符号个数,L为正整数。
  41. 根据权利要求39所述的方法,其特征在于,所述将所述第一时域资源进行划分,得到所述R个第三时域资源,包括:
    根据所述第一时域资源在第一个时隙边界前的符号个数,将所述第一时域资源进行划分,得到所述R个第三时域资源,
    其中,所述第一时域资源横跨X个时隙边界,所述第一时域资源在第一个时隙边界前的符号个数为T,所述R个第三时域资源中的最后一个第三时域资源的符号个数小于或者等于T。
  42. 根据权利要求39所述的方法,其特征在于,所述将所述第一时域资源进行划分,得到所述R个第三时域资源,包括:
    将所述第一时域资源按照时隙边界划分为X+1个时域资源,所述第一时域资源横跨X个时隙边界,所述第一时域资源在第一个时隙边界前的符号个数为T;
    将所述X+1个时域资源的每一个的时域资源按照T个符号个数的长度进行划分;
    如果所述X+1个时域资源中的任意一个时域中剩余K个符号,K<T,将所述K个符号作为一个第三时域资源,或者将所述K个符号归到前一个第三时域资源中。
  43. 根据权利要求39所述的方法,其特征在于,所述将所述第一时域资源进行划分,得到所述R个第三时域资源,包括:
    向终端设备发送第一指示信息,所述第一指示信息用于指示所述第一时域资源的第一划分方式;
    根据所述第一划分方式,将所述第一时域资源划分为所述R个第三时域资源,其中,所述第一时域资源对应多种划分方式,所述第一划分方式为所述多种划分方式中的一种。
  44. 根据权利要求26至43中任一项所述的方法,其特征在于,所述方法还包括:
    向终端设备发送第二指示信息,所述第二指示信息用于指示所述重复次数R的值。
  45. 根据权利要求25至44中任一项所述的方法,其特征在于,所述方法还包括:
    向终端设备发送第三指示信息,所述第三指示信息用于指示所述第一时域资源的开始和长度指示值SLIV,其中,SLIV与S和L满足以下映射关系:
    如果
    Figure PCTCN2019116781-appb-100004
    则SLIV=N*(L-1)+S,
    否则,SLIV=N*(N-L+1)+(N-1-S),其中,0<L≤(N-S),
    其中,N>14;
    S为所述第一时域资源的起始符号的编号,S为大于或者等于零的整数,L为所述第一时域资源持续的符号个数,L和N为正整数。
  46. 根据权利要求25至44中任一项所述的方法,其特征在于,所述方法还包括:
    向所述所述终端设备发送第三指示信息,所述第三指示信息用于指示时域资源表格中的一行,所述时域资源表格的一行包含起始符号的编号S和所述第一时域资源持续的符号个数L,S为大于或者等于零的整数,L为正整数。
  47. 根据权利要求25至46中任一项所述的方法,其特征在于,所述方法还包括:
    向终端设备发送第四指示信息,所述第四指示信息用于指示所述第一时域资源横跨的时隙边界的个数X,X为非负整数;
    向终端设备发送第五指示信息,所述第五指示信息用于指示所述第一时域资源的起始符号的编号S和参考长度L;
    其中,所述第一时域资源的起始符号的编号为S,长度为L+(X-1)*14个符号。
  48. 根据权利要求25至47中任一项所述的方法,其特征在于,所述方法还包括:
    向终端设备发送第六指示信息,所述第六指示信息用于指示所述第一时域资源横跨的时隙的个数W,W为非负整数;
    向终端设备发送第五指示信息,所述第五指示信息用于指示所述第一时域资源的起始符号的编号S和参考长度L;
    其中,所述第一时域资源的起始符号的编号S,长度为L+W*14个符号。
  49. 一种通信装置,其特征在于,包括用于执行如权利要求1至24或25至48中任一项所述方法的各个步骤的单元。
  50. 一种通信装置,其特征在于,包括至少一个处理器和接口电路,所述至少一个处理器用于执行如权利要求1至24或25至48中任一项所述的方法。
  51. 一种终端设备,其特征在于,包括如权利要求49或50所述的通信装置。
  52. 一种网络设备,其特征在于,包括如权利要求49或50所述的通信装置。
  53. 一种存储介质,其特征在于,所述存储介质中存储有程序,当所述程序被处理器运行时,如权利要求1至48中任一项所述的方法被执行。
PCT/CN2019/116781 2018-11-09 2019-11-08 数据传输的方法和通信装置 WO2020094133A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
BR112021008666A BR112021008666A2 (pt) 2018-11-09 2019-11-08 Método de transmissão de dados, aparelho de comunicações e meio de armazenamento legível por computador
JP2021524305A JP7319363B2 (ja) 2018-11-09 2019-11-08 データ伝送方法及び通信装置
CA3118605A CA3118605A1 (en) 2018-11-09 2019-11-08 Data transmission method and communications apparatus
EP19881571.4A EP3869886A4 (en) 2018-11-09 2019-11-08 DATA TRANSFER PROCESS AND COMMUNICATION DEVICE
US17/313,903 US20210266912A1 (en) 2018-11-09 2021-05-06 Data transmission method and communications apparatus

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201811333734.6 2018-11-09
CN201811333734 2018-11-09
CN201910028765.9 2019-01-11
CN201910028765.9A CN111181707B (zh) 2018-11-09 2019-01-11 数据传输的方法和通信装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/313,903 Continuation US20210266912A1 (en) 2018-11-09 2021-05-06 Data transmission method and communications apparatus

Publications (1)

Publication Number Publication Date
WO2020094133A1 true WO2020094133A1 (zh) 2020-05-14

Family

ID=70610767

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/116781 WO2020094133A1 (zh) 2018-11-09 2019-11-08 数据传输的方法和通信装置

Country Status (1)

Country Link
WO (1) WO2020094133A1 (zh)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282274A (zh) * 2017-01-06 2018-07-13 中兴通讯股份有限公司 数据传输方法及装置,终端和基站
WO2018175596A1 (en) * 2017-03-23 2018-09-27 Sharp Laboratories Of America, Inc. Downlink control channel for uplink ultra-reliable and low-latency communications

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282274A (zh) * 2017-01-06 2018-07-13 中兴通讯股份有限公司 数据传输方法及装置,终端和基站
WO2018175596A1 (en) * 2017-03-23 2018-09-27 Sharp Laboratories Of America, Inc. Downlink control channel for uplink ultra-reliable and low-latency communications

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CATT: "Discussion on Potential Enhancements to PUSCH", 3GPP TSG RAN WG1 MEETING #95 R1-1812630, 3 November 2018 (2018-11-03), XP051478871 *
NOKIA ET AL.: "On Scheduled PUSCH (& PDSCH) Repetition Enhancements for NR URLLC", 3GPP TSG RAN WGI MEETING #95 R1-1813115, 2 November 2018 (2018-11-02), XP051479380 *

Similar Documents

Publication Publication Date Title
JP7319363B2 (ja) データ伝送方法及び通信装置
WO2020200078A1 (zh) 传输上行信息的方法和通信装置
WO2018205687A1 (zh) 数据处理方法及装置
WO2020233420A1 (zh) 时隙格式指示的方法和通信装置
WO2020221271A1 (zh) 传输混合自动重传请求harq反馈信息的方法和通信装置
WO2021031939A1 (zh) 一种数据传输方法及装置
CN111770572A (zh) 确定反馈信息的方法和通信装置
WO2018137700A1 (zh) 一种通信方法,装置及系统
WO2021017611A1 (zh) 数据传输方法和装置
WO2020220253A1 (zh) 一种信息传输方法和通信设备
WO2021072689A1 (zh) 一种信息处理方法和终端设备以及网络设备
WO2021008416A1 (zh) 确定资源分配的方法和装置
WO2019158039A1 (zh) 通信方法和通信装置
WO2021031906A1 (zh) 配置时域资源的方法和装置
US11770833B2 (en) Communication method, terminal device, and network device
JP7448567B2 (ja) サウンディング信号リソースをアクティブ化または非アクティブ化するための方法、および装置
WO2020073991A1 (zh) 数据传输方法和通信装置
WO2018201919A1 (zh) 一种数据传输的方法和装置
WO2021163890A1 (zh) 通信方法、通信装置及计算机可读存储介质
WO2020143812A1 (zh) 数据传输方法和通信装置
WO2021068259A1 (zh) 联合调度的方法和装置
WO2020094133A1 (zh) 数据传输的方法和通信装置
WO2022141601A1 (zh) 发送和接收解调参考信号的方法以及通信装置
TWI801667B (zh) 資料傳輸方法和設備
WO2021088062A1 (zh) 一种通信方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19881571

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 3118605

Country of ref document: CA

ENP Entry into the national phase

Ref document number: 2021524305

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112021008666

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 2019881571

Country of ref document: EP

Effective date: 20210520

REG Reference to national code

Ref country code: BR

Ref legal event code: B01E

Ref document number: 112021008666

Country of ref document: BR

Free format text: APRESENTAR, EM ATE 60 (SESSENTA) DIAS, NOVAS PAGINAS DAS REIVINDICACOES EMENDADAS UMA VEZ QUE O CONTEUDO ENVIADO NA PETICAO NO 870210040563 DE 04/05/2021 ENCONTRA-SE FORA DA NORMA. A PAGINA DEVE SER IDENTIFICADA SOMENTE POR REIVINDICACOES.

REG Reference to national code

Ref country code: BR

Ref legal event code: B01Y

Ref document number: 112021008666

Country of ref document: BR

Kind code of ref document: A2

Free format text: ANULADA A PUBLICACAO CODIGO 1.5 NA RPI NO 2640 DE 10/08/2021 POR TER SIDO INDEVIDA.

REG Reference to national code

Ref country code: BR

Ref legal event code: B01E

Ref document number: 112021008666

Country of ref document: BR

Free format text: REAPRESENTAR, EM ATE 60 (SESSENTA) DIAS, O RELATORIO DESCRITIVO CONTENDO 121 PAGINAS CONFORME INFORMADO NA PETICAO NA PETICAO NO 870210068073 DE 27/07/2021 OU NOVA FOLHA COM O NOVO TITULO E A NUMERACAO COMPATIVEL COM O CONTEUDO DO RELATORIO DESCRITIVO DA PETICAO NO 870210060441 DE 05/07/2021 COM 123 PAGINAS

ENP Entry into the national phase

Ref document number: 112021008666

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20210504