WO2020094133A1 - 数据传输的方法和通信装置 - Google Patents
数据传输的方法和通信装置 Download PDFInfo
- Publication number
- WO2020094133A1 WO2020094133A1 PCT/CN2019/116781 CN2019116781W WO2020094133A1 WO 2020094133 A1 WO2020094133 A1 WO 2020094133A1 CN 2019116781 W CN2019116781 W CN 2019116781W WO 2020094133 A1 WO2020094133 A1 WO 2020094133A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- time domain
- domain resource
- time
- domain resources
- resources
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
Definitions
- the present application relates to the field of communication, and more specifically, to a data transmission method and communication device.
- the fifth generation (5G) mobile communication system is dedicated to supporting higher system performance, supporting multiple service types, different deployment scenarios, and a wider spectrum range.
- multiple business types include enhanced mobile broadband (eMBB), massive machine type communication (mMTC), ultra-reliable and low-latency communication (URLLC), multimedia Broadcast and multicast services (multimedia broadcast service, MBMS) and positioning services.
- the business types of URLLC include many, and typical use cases include industrial control, industrial production process automation, human-computer interaction, and telemedicine.
- the specific requirements of the URLLC service include: the reliability of data transmission reaches 99.999%, the transmission delay is less than 1ms, and the signaling overhead is reduced as much as possible under the requirements of high reliability and low delay. Ensuring the reliability and delay of URLLC has become a very important issue in this field. In order to ensure the reliability of the data transmission of the URLLC service, at present, it is proposed to repeat the data transmission based on the slot level to improve the reliability of the data transmission of the URLLC service and reduce the delay, but it still cannot meet the requirements of the URLLC service.
- This application provides a data transmission method and device, which can realize the repeated transmission of data on multiple mini-slot level time domain resources, and further reduce the time of data transmission on the premise of improving the reliability of data transmission Delay.
- a data transmission method is provided.
- the execution subject of the transmission method may be either a terminal device or a chip applied to the terminal device.
- the method includes: the terminal device determines A time domain resource; the terminal device determines M second time domain resources according to the first time domain resource, M is an integer greater than 1; the terminal device sends M times the first time domain network resource to the network device on the M second time domain resources One data or M transmissions of the second data received from the network device.
- data is repeatedly transmitted on the M second time domain resources, and the M second time domain resources are determined according to the first time domain resources, and the M second time domain resources Can be the length of the mini-slot level.
- the repeated data transmission is realized, the time delay of data transmission is reduced, and the reliability of data transmission is also improved.
- the terminal device determining M second time domain resources according to the first time domain resource includes: the terminal device determining R third times according to the first time domain resource For the domain resource, R is an integer greater than 1.
- the terminal device determines the M second time domain resources according to whether the R third time domain resources cross the slot boundary.
- the terminal device determines the M second time domain resources according to whether the R third time domain resources cross a slot boundary, including: when the R third time domain resources Under the condition that none of the domain resources cross the slot boundary, the R third time domain resources are determined to be the second time domain resources of M, and M is equal to R.
- the terminal device determines the M second time-domain resources according to whether the R third time-domain resources cross a slot boundary, including: Among the three time-domain resources, the time-domain resources that cross the slot boundary are divided according to the slot boundary; the terminal device is divided according to the time-domain resources that do not cross the slot boundary and the slot boundary among the R third time-domain resources After the time domain resources, the M second time domain resources are determined.
- the terminal device determines the M second time-domain resources according to whether the R third time-domain resources cross a slot boundary, including: Among the three time-domain resources, the time-domain resources that cross the slot boundary are divided according to the slot boundary; the terminal device is divided according to the time domain resources that do not cross the slot boundary and the slot boundary among the R third time-domain resources After the time domain resource, the M second time domain resources are determined, where M is equal to R.
- the terminal device divides the time domain resources across the slot boundary from the R third time domain resources according to the slot boundary, including: The fourth time domain resource across the time slot boundary in the third time domain resource is divided into H + 1 second time domain resources, wherein the fourth time domain resource is the time across the R third time domain resources Any time-domain resource on the slot boundary, the fourth time-domain resource spans H time slot boundaries, and H is a positive integer.
- the H + 1 second time domain resources include: from the start symbol of the fourth time domain resource to the first time slot boundary of the H time slot boundaries
- the time domain resource is a second time domain resource
- the H-1 time slots in the middle are H-1 second time domain resources, from the last time slot boundary of the H time slot boundaries to the fourth time
- the time domain resource at the end of the domain resource is a second time domain resource.
- the M second time domain resources include a second time domain resource determined according to the fourth time domain resource and Q third time domain resources, and the Q third time domain resources
- the domain resource is a time domain resource that does not cross a slot boundary among the R third time domain resources
- the fourth time domain resource is any one of the time domain resources that spans a slot boundary among the R third time domain resources
- the fourth time domain resource spans H time slot boundaries
- the H + 1 second time domain resources determined according to the fourth time domain resource include: from the start symbol of the fourth time domain resource to the H time
- the time domain resource of the first time slot boundary in the slot boundary is a second time domain resource
- the middle H-1 time slots are H-1 second time domain resources. From the last of the H time slot boundaries
- the time domain resource from the slot boundary to the end symbol of the fourth time domain resource is a second time domain resource.
- R is greater than M.
- the terminal device divides the time domain resources across the slot boundary from the R third time domain resources according to the slot boundary, including: The fourth time domain resource across the slot boundary in the third time domain resource is divided into H + 1 fifth time domain resources, where the fourth time domain resource is the R third time domain resource across the time slot Any time domain resource on the boundary, the fourth time domain resource spans the boundary of H time slots, and H is a positive integer; the terminal device uses the first fifth time domain resource among the H + 1 fifth time domain resources Merge with the previous third time domain resource of the fourth time domain resource to form a second time domain resource; the last fifth time domain resource among the H + 1 fifth time domain resources and the fourth The third time-domain resources after the time-domain resources are combined to form a second time-domain resource.
- R is less than M.
- the terminal device determining R third time domain resources according to the first time domain resource includes: the terminal device according to the number of repetitions between R and R third time domain resources , The first time domain resource is repeated R times to obtain the R third time domain resources.
- the method further includes: the terminal device receives seventh indication information from the network device, where the seventh indication is used to indicate among the R third time-domain resources interval.
- the interval of the R third time-domain resources is 0, or the R third time-domain resources are continuous in the time domain.
- the terminal device determining R third time domain resources according to the first time domain resource includes: the terminal device divides the first time domain resource to obtain the R number The third time domain resource.
- the terminal device should divide the first time domain resource to obtain the R third time domain resources, including: the terminal device uses the first time
- the domain resource is divided into the R third time domain resources, wherein, among the R third time domain resources, there are R-1 third time domain resources, and the number of continuous symbols of each third time domain resource is L is the number of continuous symbols of the first time domain resource, and L is a positive integer.
- the dividing the first time domain resource to obtain the R third time domain resources includes: according to the first time domain resource at a first time slot boundary The number of the preceding symbol divides the first time-domain resource to obtain the R third time-domain resources, where the first time-domain resource spans X slot boundaries, and the first time-domain resource is in the first The number of symbols before a slot boundary is T, and the number of symbols of the last third time domain resource among the R third time domain resources is less than or equal to T.
- the dividing the first time domain resource to obtain the R third time domain resources includes: dividing the first time domain resource into X according to a slot boundary +1 time domain resource, the first time domain resource spans X time slot boundaries, and the number of symbols of the first time domain resource before the first time slot boundary is T; the X + 1 time domain resources The time-domain resources of each resource are divided according to the length of T symbols; if any of the X + 1 time-domain resources has K symbols remaining and K ⁇ T, the K symbols As a third time domain resource, or divide the K symbols into the previous third time domain resource.
- dividing the first time domain resource to obtain the R third time domain resources includes: according to the first time domain resource after the last time slot boundary The number of symbols, divide the first time-domain resource to obtain the R third time-domain resources, where the first time-domain resource spans X slot boundaries, and the first time-domain resource is in the last The number of symbols after the slot boundary is Y, and the number of symbols of the last third time domain resource among the R third time domain resources is less than or equal to Y.
- the dividing the first time domain resource to obtain the R third time domain resources includes: dividing the first time domain resource into X according to a slot boundary +1 time domain resource, the first time domain resource spans X slot boundaries, the number of symbols of the first time domain resource after the last slot boundary is Y; the X + 1 time domain resources The time-domain resources of each are divided according to the length of Y symbols; if any of the X + 1 time-domain resources have K symbols remaining in the time domain, and K ⁇ Y, the K symbols are used as a The third time domain resource, or divide the K symbols into the previous third time domain resource.
- the terminal device should divide the first time domain resource to obtain R third time domain resources, including: receiving first indication information from the network device, the first An indication information is used to indicate the first division method of the first time domain resource; according to the first division method, the first time domain resource is divided into R third time domain resources, wherein the first time domain resource Corresponding to multiple division modes, the first division mode is one of the multiple division modes.
- the method further includes: receiving second indication information from a network device, where the second indication information is used to indicate the value of the number R of repetitions.
- the terminal device determining the first time domain resource includes: receiving third indication information from the network device, where the third indication information is used to indicate the first time domain resource
- S is the number of the starting symbol of the first time-domain resource, S is an integer greater than or equal to zero, L is the number of symbols that the first time-domain resource continues, and L and N are positive integers.
- the terminal device determining the first time domain resource includes: the terminal device receives third indication information from the network device, and the third indication information is used to indicate a time domain resource table
- the row in the time-domain resource table contains the number S of the starting symbol and the number of symbols L that the first time-domain resource lasts. S is an integer greater than or equal to zero, and L is a positive integer; L. Determine the time domain position of the first time domain resource.
- the time domain resource table is configured for high-level signaling.
- the determining the first time domain resource includes: receiving fourth indication information from a network device, where the fourth indication information is used to indicate that the first time domain resource spans The number of timeslot boundaries X, X is a non-negative integer; receiving fifth indication information from the network device, the fifth indication information is used to indicate the number S and reference of the start symbol of the first time domain resource Length L; the number of the starting symbol of the first time domain resource is S, and the length is L + (X-1) * 14 symbols.
- the determining the first time domain resource includes: receiving sixth indication information from a network device, where the sixth indication information is used to indicate that the first time domain resource spans The number of time slots W, W is a non-negative integer; receiving fifth indication information from the network device, the fifth indication information is used to indicate the number S and the reference length of the starting symbol of the first time domain resource L; the number S of the starting symbol of the first time domain resource is L + W * 14 symbols.
- a data transmission method is provided.
- the execution subject of the transmission method may be either a network device or a chip applied to a network device.
- the method includes: A time domain resource; the network device determines M second time domain resources according to the first time domain resource, M is an integer greater than 1; the network device sends the M times to the terminal device on the M second time domain resources Two data or M transmissions of the first data received from the terminal device.
- the data transmission method provided in the second aspect because data is repeatedly transmitted on the M second time domain resources, and the M second time domain resources are determined according to the first time domain resources, and the M second time domain resources Can be the length of the mini-slot level.
- the repeated data transmission is realized, the time delay of data transmission is reduced, and the reliability of data transmission is also improved.
- the network device determining M second time domain resources according to the first time domain resource includes: the network device determining R third times according to the first time domain resource For the domain resource, R is an integer greater than 1.
- the network device determines the M second time domain resources according to whether the R third time domain resources cross the slot boundary.
- the network device determines the M second time-domain resources according to whether the R third time-domain resources cross the slot boundary, including: Under the condition that none of the domain resources cross the slot boundary, the R third time domain resources are determined to be the second time domain resources of M, and M is equal to R.
- the network device determines the M second time domain resources according to whether the R third time domain resources cross the slot boundary, including: the network device uses the R third time domain resources Among the three time-domain resources, the time-domain resources that cross the slot boundary are divided according to the slot boundary; the network device is divided according to the time-domain resources that do not cross the slot boundary and the slot boundary among the R third time-domain resources After the time domain resources, the M second time domain resources are determined.
- M is equal to R.
- the network device should divide the time domain resources across the slot boundary of the R third time domain resources according to the slot boundary, including: the network device divides the R The fourth time domain resource across the time slot boundary among the third time domain resources is divided into H + 1 second time domain resources, where the fourth time domain resource is across the R third time domain resources Any time domain resource on a slot boundary, the fourth time domain resource spans H slot boundaries, and H is a positive integer.
- the H + 1 second time domain resources include: from the start symbol of the fourth time domain resource to the first time slot boundary of the H time slot boundaries
- the time domain resource is a second time domain resource
- the H-1 time slots in the middle are H-1 second time domain resources, from the last time slot boundary of the H time slot boundaries to the fourth time
- the time domain resource at the end of the domain resource is a second time domain resource.
- the M second time domain resources include a second time domain resource determined according to the fourth time domain resource and Q third time domain resources, and the Q third time domain resources
- the domain resource is a time domain resource that does not cross a slot boundary among the R third time domain resources
- the fourth time domain resource is any one of the time domain resources that spans a slot boundary among the R third time domain resources
- the fourth time domain resource spans H time slot boundaries
- the H + 1 second time domain resources determined according to the fourth time domain resource include: from the start symbol of the fourth time domain resource to the H time
- the time domain resource of the first time slot boundary in the slot boundary is a second time domain resource
- the middle H-1 time slots are H-1 second time domain resources. From the last of the H time slot boundaries
- the time domain resource from the slot boundary to the end symbol of the fourth time domain resource is a second time domain resource.
- R is greater than M.
- the network device should divide the time domain resources across the slot boundary of the R third time domain resources according to the slot boundary, including: the network device divides the R The fourth time domain resource across the time slot boundary among the third time domain resources is divided into H + 1 fifth time domain resources, where the fourth time domain resource is the time across the R third time domain resources Any time domain resource on the slot boundary, the fourth time domain resource spans the boundary of H time slots, and H is a positive integer; the network device uses the first fifth time domain among the H + 1 fifth time domain resources The resource is merged with the previous third time domain resource of the fourth time domain resource to form a second time domain resource; the last time domain resource among the H + 1 fifth time domain resources is combined with the fourth time domain resource The third time domain resources after the domain resources are combined to form a second time domain resource.
- R is less than M.
- the network device determining R third time domain resources according to the first time domain resource includes: the network device according to the number of repetitions between R and R third time domain resources , The first time domain resource is repeated R times to obtain the R third time domain resources.
- the method further includes: the network device sends seventh indication information to the terminal device, where the seventh indication is used to indicate an interval between the R third time-domain resources.
- the interval of the R third time-domain resources is 0, or the R third time-domain resources are continuous in the time domain.
- the network device determining R third time domain resources according to the first time domain resource includes: the network device divides the first time domain resource to obtain the R third Three time domain resources.
- the network device should divide the first time domain resource to obtain the R third time domain resources, including: the network device uses the first time
- the domain resource is divided into the R third time domain resources, wherein, among the R third time domain resources, there are R-1 third time domain resources, and the number of continuous symbols of each third time domain resource is L is the number of continuous symbols of the first time domain resource, and L is a positive integer.
- the dividing the first time domain resource to obtain the R third time domain resources includes: according to the first time domain resource at a first time slot boundary The number of the preceding symbol divides the first time-domain resource to obtain the R third time-domain resources, where the first time-domain resource spans X slot boundaries, and the first time-domain resource is in the first The number of symbols before a slot boundary is T, and the number of symbols of the last third time domain resource among the R third time domain resources is less than or equal to T.
- dividing the first time domain resource to obtain the R third time domain resources includes: dividing the first time domain resource into X according to a slot boundary +1 time domain resource, the first time domain resource spans X time slot boundaries, and the number of symbols of the first time domain resource before the first time slot boundary is T; the X + 1 time domain resources The time-domain resources of each resource are divided according to the length of T symbols; if any of the X + 1 time-domain resources has K symbols remaining and K ⁇ T, the K symbols As a third time domain resource, or divide the K symbols into the previous third time domain resource.
- dividing the first time domain resource to obtain the R third time domain resources includes: according to the first time domain resource after the last time slot boundary The number of symbols, divide the first time-domain resource to obtain the R third time-domain resources, where the first time-domain resource crosses X slot boundaries, and the first time-domain resource is in the last The number of symbols after the slot boundary is Y, and the number of symbols of the last third time domain resource among the R third time domain resources is less than or equal to Y.
- dividing the first time domain resource to obtain the R third time domain resources includes: dividing the first time domain resource into X according to a slot boundary +1 time domain resource, the first time domain resource spans X slot boundaries, the number of symbols of the first time domain resource after the last slot boundary is Y; the X + 1 time domain resources The time-domain resources of each are divided according to the length of Y symbols; if any of the X + 1 time-domain resources have K symbols remaining in the time domain, and K ⁇ Y, the K symbols are used as a The third time domain resource, or divide the K symbols into the previous third time domain resource.
- the network device should divide the first time domain resource to obtain the R third time domain resources, including: the network device sends the first indication information to the terminal device, the The first indication information is used to indicate a first division method of the first time domain resource, and the network device divides the first time domain resource into the R third time domain resources according to the first division method, wherein the first A time domain resource corresponds to multiple division modes, and the first division mode is one of the multiple division modes.
- the method further includes: the network device sends second indication information to the terminal device, where the second indication information is used to indicate the value of the number R of repetitions.
- the method further includes: the network device sends third indication information to the terminal device, where the third indication information is used to indicate the start of the first time domain resource and the length indication value SLIV , Where SLIV and S and L satisfy the following mapping relationship:
- S is the number of the starting symbol of the first time-domain resource, S is an integer greater than or equal to zero, L is the number of symbols that the first time-domain resource continues, and L and N are positive integers.
- the method further includes: the network device sends third indication information to the terminal device, where the third indication information is used to indicate a row in the time domain resource table, and the time domain resource table
- the line of contains the number S of the starting symbol and the number of symbols L that the first time-domain resource continues. S is an integer greater than or equal to zero, and L is a positive integer.
- the time domain resource table is configured for high-level signaling.
- the method further includes: sending fourth indication information to the terminal device, where the fourth indication information is used to indicate the number of time slot boundaries crossed by the first time domain resource X and X are non-negative integers; send fifth indication information to the terminal device, where the fifth indication information is used to indicate the number S and reference length L of the start symbol of the first time domain resource;
- the number of the starting symbol of the first time domain resource is S, and the length is L + (X-1) * 14 symbols.
- the method further includes: sending sixth indication information to the terminal device, where the sixth indication information is used to indicate the number of time slots spanned by the first time domain resource W , W is a non-negative integer; send fifth indication information to the terminal device, the fifth indication information is used to indicate the number S and length L of the start symbol of the first time domain resource; wherein, the The number S of the starting symbol is L + W * 14 symbols in length.
- a communication device which includes a unit for performing each step in the above first aspect or any possible implementation manner of the first aspect.
- a communication device including a unit for performing each step in the above second aspect or any possible implementation manner of the second aspect.
- a communication device including at least one processor and a memory, the at least one processor configured to execute the method in the above first aspect or any possible implementation manner of the first aspect.
- a communication device includes at least one processor and a memory, and the at least one processor is configured to execute the method in the second aspect or any possible implementation manner of the second aspect.
- a communication device includes at least one processor and an interface circuit, and the at least one processor is configured to execute the method in the above first aspect or any possible implementation manner of the first aspect.
- a communication device includes at least one processor and an interface circuit, and the at least one processor is configured to execute the method in the second aspect or any possible implementation manner of the second aspect.
- a terminal device in a ninth aspect, includes the communication device provided in the third aspect above, or the terminal includes the communication device provided in the fifth aspect above, or the terminal includes the communication provided in the seventh aspect above Device.
- a network device including the communication device provided in the fourth aspect above, or the network device includes the communication device provided in the sixth aspect above, or the network device includes the eighth aspect provided above Communication device.
- a computer program product includes a computer program, which when executed by a processor, is used to execute the method in the first aspect or any possible implementation manner of the first aspect Or execute the method in the second aspect or any possible implementation manner of the second aspect.
- a computer-readable storage medium in which a computer program is stored, and when the computer program is executed, it is used to execute the first aspect or any possible implementation manner of the first aspect In the second aspect or any possible implementation of the second aspect.
- FIG. 2 is a schematic interaction diagram of an example of a data transmission method provided by an embodiment of the present application.
- FIG. 3 is a schematic interaction diagram of another example of a data transmission method provided by an embodiment of the present application.
- FIG. 4 is a schematic interaction diagram of another example of a data transmission method provided by an embodiment of the present application.
- FIG. 5 is a schematic diagram of a third time domain resource according to an embodiment of the present application.
- FIG. 6 is a schematic interaction diagram of an example of a data transmission method provided by an embodiment of the present application.
- FIG. 7 is a schematic diagram of a third time domain resource according to an embodiment of the present application.
- FIG. 8 is a schematic diagram of second time domain resources according to an embodiment of the present application.
- FIG. 9 is a schematic diagram of a second time domain resource according to another embodiment of the present application.
- FIG. 10 is a schematic diagram of second time domain resources according to another embodiment of the present application.
- FIG. 11 is a schematic interaction diagram of another example of a data transmission method provided by an embodiment of the present application.
- FIG. 12 is a schematic interaction diagram of another example of a data transmission method provided by an embodiment of the present application.
- FIG. 13 is a schematic diagram of a first time-domain resource division manner in which the length of a symbol is 8 symbols according to an embodiment of the present application.
- FIG. 14 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to an embodiment of the present application.
- 15 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to another embodiment of the present application.
- 16 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to another embodiment of the present application.
- FIG. 17 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to another embodiment of the present application.
- FIG. 18 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to another embodiment of the present application.
- FIG. 19 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to another embodiment of the present application.
- 20 is a schematic interaction diagram of another example of a data transmission method provided by an embodiment of the present application.
- 21 is a schematic diagram of a communication device provided by an embodiment of the present application.
- FIG. 22 is a schematic diagram of yet another example of a communication device provided by an embodiment of the present application.
- FIG. 23 is a schematic diagram of a communication device provided by an embodiment of the present application.
- 24 is a schematic diagram of yet another example of a communication device provided by an embodiment of the present application.
- FIG. 25 is a schematic diagram of a terminal device provided by an embodiment of the present application.
- FIG. 26 is a schematic diagram of a network device provided by an embodiment of the present application.
- LTE Long Term Evolution
- 5G 5th Generation
- NR new radio
- FIG. 1 is a schematic structural diagram of a mobile communication system applicable to an embodiment of the present application.
- the mobile communication system 100 may include a core network device 110, a radio access network device 120, and at least one terminal device (terminal device 130 and terminal device 140 shown in FIG. 1).
- the terminal device is connected to the wireless access network device in a wireless manner
- the wireless access network device is connected to the core network device in a wireless or wired manner.
- the core network device and the wireless access network device may be independent and different physical devices, or they may integrate the functions of the core network device and the logical function of the wireless access network device on the same physical device, or may be a physical device It integrates the functions of some core network devices and some of the wireless access network devices.
- the terminal device may be fixed or mobile.
- FIG. 1 is only a schematic diagram, and the communication system may also include other network devices, such as wireless relay devices and wireless backhaul devices, which are not shown in FIG. 1.
- the embodiments of the present application do not limit the number of core network devices, radio access network devices, and terminal devices included in the mobile communication system.
- the terminal device in the mobile communication system 100 may also be called a terminal, a user equipment (UE), a mobile station (MS), a mobile terminal (MT), and so on.
- Terminal devices can be mobile phones, tablets, computers with wireless transceiver functions, virtual reality (Virtual Reality, VR) terminal devices, augmented reality (Augmented Reality, AR) terminal devices, industrial control (industrial control) ), Wireless terminals in self-driving (self-driving), wireless terminals in remote surgery (remote medical), wireless terminals in smart grid (smart grid), wireless in transportation safety (transportation safety) Terminals, wireless terminals in smart cities (smart cities), wireless terminals in smart homes (smart homes), etc.
- the aforementioned terminal devices and chips applicable to the aforementioned terminal devices are collectively referred to as terminal devices. It should be understood that the embodiments of the present application do not limit the specific technology and the specific device form adopted by the terminal device.
- the wireless access network device 120 is an access device in which the terminal device wirelessly accesses the mobile communication system.
- the wireless access network device 120 may be: a base station, an evolved base station (evolved node B, base station), a home base station, an access point (AP) in a wireless fidelity (WIFI) system, a wireless Relay nodes, wireless backhaul nodes, transmission points (transmission points, TP) or transmission reception points (transmission reception points, TRP), etc., can also be gNB in the NR system, or can also be a component or part of a base station Equipment, such as centralized unit (CU), distributed unit (DU) or baseband unit (BBU), etc.
- CU centralized unit
- DU distributed unit
- BBU baseband unit
- the specific technology and the specific device form adopted by the wireless access network device are not limited.
- the wireless access network equipment is referred to as network equipment for short.
- network equipment refers to wireless access network equipment.
- the network device may refer to the network device itself, or may be a chip applied in the network device to complete the wireless communication processing function.
- the terminal device or the network device includes a hardware layer, an operating system layer running on the hardware layer, and an application layer running on the operating system layer.
- the hardware layer includes hardware such as a central processing unit (CPU), memory management unit (MMU), and memory.
- the operating system may be any one or more computer operating systems that implement business processes through processes, for example, a Linux operating system, a Unix operating system, an Android operating system, an iOS operating system, or a windows operating system.
- the application layer includes browser, address book, word processing software, instant messaging software and other applications.
- the embodiment of the present application does not specifically limit the specific structure of the execution body of the method provided in the embodiment of the present application, as long as it can run the program that records the code of the method provided by the embodiment of the present application to provide according to the embodiment of the present application
- the method may be used for communication.
- the execution body of the method provided in the embodiments of the present application may be a terminal device or a network device, or a functional module in the terminal device or network device that can call a program and execute the program.
- various storage media described herein may represent one or more devices and / or other machine-readable media for storing information.
- machine-readable medium may include, but is not limited to, wireless channels and various other media capable of storing, containing, and / or carrying instructions and / or data.
- Time domain resources or time units
- time domain symbols
- one time domain resource is not limited.
- one time domain resource may be one or more subframes; alternatively, it may be one or more time slots; or, it may be one or more symbols.
- multiple time-domain resources have a time-series relationship in the time domain, and the time lengths corresponding to any two time-domain resources may be the same or different.
- a major feature of the 5G system compared with the 4G communication system is the increased support for URLLC services.
- the business types of URLLC include many, and typical use cases include industrial control, industrial production process automation, human-computer interaction, and telemedicine.
- the performance indicators of URLLC services are currently defined as follows:
- Delay is defined as the transmission required by the user application layer data packets from the service data unit (SDU) at the sending end wireless protocol stack 2 or 3 layer to the receiving end wireless protocol stack 2 or 3 layer SDU time.
- the user plane delay requirement of URLLC service is 0.5ms for both uplink and downlink.
- the performance requirement of 0.5ms here only applies to both the sending end (such as a base station) and the receiving end (such as a terminal) being in a discontinuous reception state (discontinuous reception (DRX)).
- DRX discontinuous reception
- the performance requirement of 0.5ms refers to the average delay of the data packet, and is not tied to the reliability requirements described below.
- the process of the terminal device determining the time domain resource for sending data to the network device (ie, uplink transmission) or determining the time domain resource for receiving data sent by the network device (ie, downlink transmission) mainly includes:
- the terminal device first determines a time domain resource table.
- the time domain resource table may include an S parameter and an L parameter.
- S is a start symbol (number of the start symbol) indicating a data channel.
- L length is the number of symbols occupied by the data channel.
- the terminal device receives the indication information sent by the network device, the indication information is used to indicate a certain row of the time domain resource table, or the indication information can also be used to indicate the result of joint coding based on S and L in the time domain resource table A start and length indicator (SLIV), which may be included in the time domain resource table.
- the terminal device can determine the time domain resource according to a row or SLIV of the time domain resource table indicated by the network device,
- the process of the terminal device determining the time domain resource for sending data to the network device or determining the time domain resource for receiving data sent by the network device will be specifically described below.
- the terminal device determines a time domain resource table.
- the time domain resource table may be a time domain resource table specified in the protocol or a time domain resource table configured for high-level signaling.
- the time domain resource table includes 16 rows, and for uplink transmission, each row includes:
- One S parameter one L parameter, K2 parameter or K0 parameter, physical downlink shared channel (physical downlink shared channel, PDSCH) mapping type (mapping) type or physical uplink shared channel (physical uplink link shared channel, PUSCH) mapping type (mapping type) ).
- physical downlink shared channel physical downlink shared channel, PDSCH
- mapping type mapping
- physical uplink shared channel physical uplink link shared channel, PUSCH
- S is the number representing the start symbol of the data channel, and S is referenced to the boundary of the slot.
- L is the number of symbols occupied by the data channel, and may also be called the number of continuous symbols of the data channel, or may be called the time-domain length of the data channel. L is the number of consecutive symbols starting from S.
- the time domain resources determined by S and L must be in a slot, and a certain time domain resource will not cross the slot boundary.
- K2 is the number of slots indicating the transmission interval of the physical uplink shared channel (physical uplink link shared channel, PUSCH) received from the physical downlink control channel (physical downlink control channel, PDCCH), and K0 refers to the physical downlink link shared channel received from the PDCCH.
- PUSCH physical uplink shared channel
- PDCCH physical downlink control channel
- PDSCH physical downlink link shared channel
- the PDSCH mapping type mainly determines the time domain symbol position of the demodulation reference signal (DMRS) of the PDSCH, and can also be used to determine all reasonable start positions and durations of the PDSCH.
- the PDSCH mapping includes two types: type A (type A) or type B (type B). type A indicates that the position of the first DMRS is in the third or fourth symbol of the slot, and type B indicates that the position of the first DMRS is the first symbol in the beginning of the data.
- the PUSCH mapping type mainly determines the time-domain symbol position of the demodulation reference signal (DMRS) of the PUSCH, and can also be used to determine all reasonable starting positions and durations of the PUSCH.
- PUSCH mapping includes two types: type A (type A) or type B (type B). type A indicates that the position of the first DMRS is the third symbol or the fourth symbol of the slot, and type B indicates that the position of the first DMRS is the first symbol at the beginning of the data.
- the SLIV value is the result obtained by jointly coding S and L.
- SLIV and S and L satisfy the following mapping relationship:
- mapping relationship (1) the above mapping relationship is referred to as a mapping relationship (1).
- the value range of S is 0 to 13, combined with the above mapping relationship (1), it can be seen that the time domain resources determined by S and L will not cross the boundary of the slot.
- a SLIV value can uniquely determine a combination of the value of S and the value of L, and a combination of the value of S and the value of L can also uniquely determine a SLIV value.
- K2 parameter The definition of the K2 parameter, K0 parameter, PDSCH mapping type and PUSCH mapping type is similar to the definition of the time domain resource table specified in the protocol, and will not be described here.
- Table 1 and Table 2 further restrict the combination of the values of S and L for different mapping types.
- Table 1 is a combination table of effective S and L in the time domain resource for downlink transmission
- Table 2 is a combination table of S and L in the time domain resource for uplink transmission.
- the start symbol S can only be equal to 0, and the length L can be any value from 4 to 14, but it must not exceed 14 to satisfy S + L. Because once it is exceeded, since the length of a slot is 14 symbols, if the value of S + L exceeds 14, it means that the time domain resource crosses the slot boundary, that is, exceeds the boundary of one slot, and crosses to the next slot went. Since the start position of a certain time slot is generally placed on the control channel, not used to carry data, if a certain time domain resource crosses into the next slot, it will affect the scheduling of network equipment and data transmission. Therefore, S + L cannot exceed 14, and the value of S is less than or equal to 13.
- the terminal device After the terminal device determines a certain time-domain resource table, for example, after adopting the time-domain resource table specified in the protocol, and then receives the PDCCH sent by the network device, the PDCCH carries control information downlink control information (downlink control information, DCI), The DCI contains a field with a length of X bits. This field is used to indicate a row in the time domain resource table, thereby indicating the start symbol S and the length L of the data channel.
- the terminal device may also receive high-level signaling sent by the network device. The high-level signaling indicates a row in the time-domain resource table, that is, the start symbol S and the length L of the data channel.
- the terminal device After the terminal device receives the time domain resource table configured by the higher layer, it also receives the PDCCH sent by the network device or the higher layer signaling sent by the network device.
- the PDCCH or higher layer signaling is used to indicate the time domain configured by the higher layer
- SLIV can be determined according to the above mapping relationship (1).
- the values of S and L should meet the conditions of Table 1 and Table 2 above.
- the terminal device determines S and L according to the SLIV value, and then determines the location of the time domain resource according to S and L.
- the terminal device can determine the start symbol and the number of symbols of the time domain resource of the data channel. Then send data to the network device or receive data sent by the network device on the time domain resource.
- the method for the network device to determine the start symbol and the number of symbols of the time domain resource of the data channel is similar to the above method,
- the network device may also send high-level signaling to the terminal device.
- the high-level signaling is used to configure an aggregation factor (aggregation factor).
- the aggregation factor is denoted as K, and K represents data transmission in several consecutive slots.
- the terminal device determines that the start symbol of the data channel is at symbol 2, the length is 4, and the aggregation factor is 2, meaning that data is transmitted in 2 consecutive slots, and the start symbol of the data in each slot is 2 , The length is 4.
- the network device may also indicate the format of each slot of the terminal device through high-level signaling or through DCI.
- the format of the slot refers to which symbols in the slot are upstream symbols, which symbols are downstream symbols, and which symbols are flexible symbols.
- Mini-slots are shorter than a slot.
- the duration of a mini-slot can be 2 symbols, 4 symbols, or 7 symbols.
- Mini-slot-level repetition can be understood as: the interval between the start symbols of any two consecutive mini-slot time-domain resources is less than 14 symbols, or the interval between end symbols is less than 14 symbols.
- the delay of mini-slot data transmission is shorter, which can further reduce the delay under the premise of ensuring multiple repetitions to improve reliability.
- the start symbol of a time-domain resource for transmitting data is 2 and the length is 4 symbols. If mini-slot-level transmission is supported, assuming that the number of repetitions is 2, the data can be transmitted in symbols 2 to 5 and symbols 6 to 9. This means that the data can be transmitted twice in a slot. If mini-slot-level transmission is not supported, you need to wait until the symbols 2 to 5 of the next slot before repeating the transmission.
- the present application provides a data transmission method and communication device, which can support repeated transmission of data at the mini-slot level, which solves the problem of data transmission when multiple mini-slots cross the time slot boundary, further Reduce the delay of data transmission and improve the reliability of data transmission.
- FIG. 2 is a schematic interaction diagram of a feedback information transmission method 200 according to an embodiment of the present application.
- the method 200 may be applied in the scenario shown in FIG. 1 Of course, it can also be applied to other communication scenarios, and the embodiments of the present application are not limited herein.
- the data transmission method provided in this application first determines M second time-domain resources that do not cross the time slot boundary according to the first time-domain resources, and then performs a mini on the M second time-domain resources -Slot level data is repeatedly transmitted. This method further reduces the time delay of data transmission on the premise of improving the reliability of data transmission.
- the terminal device and the network device are used as the execution bodies for executing the steps in the method 200 as an example to describe the method 200.
- the main body for executing each step in the method 200 may also be a chip applied to a terminal device and a chip applied to a network device.
- the method 200 includes:
- the terminal device and the network device determine the first time domain resource.
- the terminal device and the network device determine M second time domain resources according to the first time domain resource, where M is an integer greater than 1.
- the terminal device For uplink data transmission, the terminal device sends the first data to the network device M times on the M second time domain resources. Correspondingly, the network device receives from the terminal device on the M second time domain resources M transmissions of the first data. Or, for downlink data transmission, the network device sends the second data to the terminal device M times on the M second time domain resources. Correspondingly, the terminal device receives from the network device on the M second time domain resources M times transmission of the second data.
- the terminal device or the network device needs to determine the time domain resource for sending the data.
- the data may be data of URLLC services or may be data of other service types. That is, in S210, the terminal device or the network device determines the first time domain resource for sending the data.
- the first time domain resource is a time domain resource used when the terminal device sends data or control information to the network device, and the first time domain resource has a determined time domain boundary.
- the length of time occupied by the first time domain resource may be fixed, that is, the first time domain resource may be a block of time domain resources.
- the terminal device may send data or control information to the network device on all symbols or part of symbols included in the first time domain resource.
- the time domain length of the first time domain resource may be greater than one time slot or less than one time slot.
- the first time domain resource may or may not cross the slot boundary.
- the first time domain resource may be a time unit, and the time slots or symbols included in the first time domain resource may all be used for uplink transmission, may also be used for downlink transmission, or may be included for uplink simultaneously. Transmission and symbols used for downstream transmission.
- the first time domain resource includes symbol 4 to symbol 10.
- Symbol 4 to symbol 10 may be all symbols used for uplink transmission, or may be all symbols used for downlink transmission, or symbol 4 to symbol 6 are symbols used for uplink transmission, and symbol 7 to symbol 10 are used for Downlink transmission symbol.
- the embodiments of the present application are not limited herein.
- the terminal device or the network device determines M second time domain resources according to the first time domain resource, where M is an integer greater than 1. For example, for the data of the URLLC service, it is necessary to ensure the reliability of data transmission and reduce the delay of data transmission. Therefore, after determining the first time domain resource, the terminal device or the network device will determine the first time domain resource M second time domain resources. M is an integer greater than 1.
- the length of any one or more second time domain resources may be less than one time slot, for example, the M second time domain resources may all be mini-slot-level lengths.
- each second time-domain resource does not cross the slot boundary.
- the M second time domain resources may be continuous, that is, there is no time interval between two adjacent second time domain resources, or the time interval between two adjacent second time domain resources is 0.
- the M second time domain resources may also be discontinuous, for example, separated by two symbols.
- the M second time domain resources may be time domain resources used for uplink data transmission, or may be time domain resources used for downlink data transmission.
- the terminal device sends the network to the network on the M second time domain resources
- the device sends the first data M times, that is, each second time-domain resource is used to transmit the first data once, thereby achieving M repeated transmissions of the first data. That is to say, the M second time domain resources are used to repeatedly send the same data packet or transmission block.
- the network device receives M transmissions of the first data from the terminal device on the M second time domain resources. If the M second time domain resources are time domain resources used for downlink data transmission, the network device sends the second data to the terminal device M times on the M second time domain resources.
- the terminal device The second time domain resource receives M transmissions of the second data from the network device.
- the M second time domain resources can be The length of the mini-slot level. The repeated data transmission is realized, the time delay of data transmission is reduced, and the reliability of data transmission is also improved.
- FIG. 3 is a schematic interaction diagram of a data transmission method according to another embodiment of the present application.
- the terminal device and the network device determine M second time domain resources according to the first time domain resources, including:
- the terminal device or the network device determines R third time-domain resources according to the first time-domain resource, and R is an integer greater than 1;
- the terminal device or the network device determines the M second time-domain resources according to whether the R third time-domain resources cross the slot boundary.
- the length of the first time domain resource may be greater than one time slot, it may also be less than one time slot.
- the length of the first time domain resource may be greater than one time slot, it may also be less than one time slot.
- a certain time-domain resource used to transmit data crosses into the next slot, it will affect the scheduling of network devices and the transmission of data. Therefore, it is necessary to ensure that none of the M second time domain resources can cross the slot boundary, that is, each second time domain resource cannot include the slot boundary from the start position to the end position. For example, suppose a slot includes 14 symbols, numbered 0 to 13, and a certain second time domain resource is symbol 8 to symbol 13, then this second time domain resource does not cross the slot boundary.
- a certain second time domain resource is symbol 12 to symbol 2, that is, symbol 0, symbol 1, and symbol 2 extending to the next time slot, then this second time domain resource crosses the time slot boundary.
- the first time domain resource may or may not cross the slot boundary. Therefore, in step S221, the terminal device or the network device first determines R third time-domain resources according to the first time-domain resource, and R is an integer greater than 1. In this application, if there is no special explanation, it is assumed that there are 14 symbols in a time slot, the numbers are 0 to 13, respectively.
- the length of any one third time-domain resource may be greater than one time slot or less than one time slot. That is, any third time-domain resource may or may not cross the slot boundary.
- the R third time-domain resources may be the length of the mini-slot level.
- the R third time domain resources may be continuous, that is, there is no time interval between two adjacent third time domain resources, or the time interval is 0.
- the R third time-domain resources may also be discontinuous, for example, separated by two symbols.
- the R third time domain resources may all be time domain resources used for uplink data transmission, or may be all time domain resources used for downlink data transmission.
- the included symbols are all symbols used for uplink data transmission, or the included symbols are all symbols used for downlink data transmission. That is, all symbols included in a third time domain resource have the same transmission direction.
- two adjacent time-domain resources are used to transmit data in the same direction. For example, for transmitting data in the upstream direction or for transmitting data in the downstream direction, that is, the R third time domain resources are time domain resources for uplink data transmission, or the R third time domain resources are for downlink Time domain resources for data transmission.
- step S222 after determining that the R third time domain resources are determined, the terminal device or the network device determines M second time domain resources according to whether the R third time domain resources cross the slot boundary. Since it is necessary to ensure that none of the M second time domain resources can cross the time slot boundary, the M second time domain resources are determined according to whether the R third time domain resources cross the time slot boundary, and M second time resources can be guaranteed None of the domain resources cross the time slot boundary, thereby further ensuring the reliability of data transmission on the M second time domain resources on the premise of reducing the time delay of data transmission, and improving the efficiency of data transmission.
- FIG. 4 is a schematic interaction diagram of a data transmission method according to another embodiment of the present application.
- the terminal device or the network device determines the M second time-domain resources according to whether the R third time-domain resources cross the slot boundary, including:
- the R third time domain resources are M second time domain resources.
- FIG. 5 is a schematic diagram of a third time domain resource according to an embodiment of the present application.
- the R value is 4, that is, there are 4 third time domain resources
- the first third time domain resource is symbol 10 to symbol 11
- the second third time domain resource is symbol 12 to symbol 13
- the first The three third time domain resources are symbols 0 to 1 of the next time slot
- the fourth third time domain resources are symbols 2 to 3. It can be seen that none of the four third time-domain resources crosses the time slot boundary.
- the four third time-domain resources are determined to be the second time-domain resources, that is, the M value is 4.
- the first second time domain resource is symbol 10 to symbol 11, the second second time domain resource is symbol 12 to symbol 13, and the third second time domain resource is symbol 0 to symbol of the next time slot 1.
- the fourth second time domain resource is symbol 2 to symbol 3.
- FIG. 6 is a schematic interaction diagram of a data transmission method according to another embodiment of the present application.
- the terminal device or the network device determines the M second time-domain resources according to whether the R third time-domain resources cross the slot boundary, including:
- S222b The terminal device or the network device divides the time domain resource across the slot boundary among the R third time domain resources according to the slot boundary.
- S222c The terminal device or the network device determines the M second time domain resources according to the time domain resources that do not cross the slot boundary and the time domain resources divided according to the slot boundary among the R third time domain resources.
- step S222b since it is necessary to ensure that none of the M second time domain resources cross the slot boundary, and the M second time domain resources are determined according to the R third time domain resources. Therefore, in step S222b, if there is a third time domain resource across the slot boundary among the R third time domain resources, it is also necessary to The time domain resources are divided according to time slot boundaries to ensure that the divided time domain resources do not cross the time slot boundaries. In step S222c, the terminal device or the network device determines the M second time domains according to the time domain resources that do not cross the slot boundary and the time domain resources divided according to the slot boundary among the R third time domain resources Resources.
- FIG. 7 is a schematic diagram of a third time domain resource according to an embodiment of the present application.
- the R value is 3, that is, there are three third time domain resources
- the first third time domain resource is symbol 8 to symbol 11
- the second third time domain resource is symbol 12 to the next time slot Symbol 1
- the third and third time domain resources are symbols 2 to 5 of the next time slot. It can be seen that the second and third time domain resources are across the time slot boundary. In this case, the The second and third time domain resources are divided according to time slot boundaries. Then, the M second time domain resources are determined according to the time domain resources obtained after the division and the time domain resources that are not divided.
- the fourth time domain resource across the slot boundary among the R third time domain resources is divided into H + 1 second time domain resources, where the fourth time domain resource is R In the third time domain resource, any one of the time domain resources crossing the slot boundary.
- the fourth time domain resource spans H time slot boundaries, H is a positive integer. That is, if one of the third time-domain resources crosses H slot boundaries, the third time-domain resource is divided into H + 1 second time-domain resources by slot boundaries.
- the same data packet or transmission block is transmitted on each second time domain resource.
- the M second time domain resources include the H + 1 second time domain resources, and further include a third time domain resource that does not cross a boundary among the R third time domain resources.
- FIG. 8 is a schematic diagram of a second time domain resource according to an embodiment of the present application.
- the start and end symbols of the four second time domain resources are: symbol 8 to symbol 11, symbol 12 to symbol 13, symbol 0 to symbol 1 of the next time slot, symbol 2 to symbol 5 of the next time slot.
- the fourth time-domain resource that spans the slot boundary is divided into H + 1 fifth time-domain resources, where the fourth time-domain resource is Any one of the time domain resources across the slot boundary among the R third time domain resources, the fourth time domain resource spans the boundary of H time slots, H is a positive integer; the H + 1 fifth time domain resource
- the first fifth time domain resource in is combined with the previous third time domain resource of the fourth time domain resource to form a second time domain resource.
- the last fifth time domain resource among the H + 1 time domain resources and the third time domain resource following the fourth time domain resource are combined to form a second time domain resource. That is, if among the R third time domain resources, a certain third time domain resource crosses H slot boundaries, the third time domain resource is the fourth time domain resource crossing the slot boundary. In this division, R is less than M.
- first and last fifth time domain resources are excluded from the above H + 1 fifth time domain resources, and the middle H-1 fifth time domain resources may be used as H-1 second time domain resources .
- the fourth time domain resource is the first third time domain resource
- the above first fifth time domain resource is directly regarded as the first second time domain resource; similarly, when the fourth time domain resource When the domain resource is the last third time domain resource, the last fifth time domain resource is directly used as the last second time domain resource.
- the finally determined M second time domain resources include the merged and reorganized second time domain resources, and also include the third time domain resources that do not cross the boundary among the R third time domain resources, and The aforementioned H-1 second time-frequency resources.
- FIG. 9 is a schematic diagram of a second time domain resource according to an embodiment of the present application.
- a certain third time domain resource across the slot boundary is called a fourth time domain resource. If the fourth time domain resource crosses the boundary of H time slots, the fourth time domain resource may determine H + 1 second time domain resources.
- the H + 1 second time domain resources include, from the fourth time The time domain resource from the start symbol of the domain resource to the first time slot boundary is a second time domain resource, and the middle H-1 time slots are H-1 second time domain resources, from the last time slot boundary to The time domain resource at the end of the fourth time domain resource is determined to be a second time domain resource.
- the M second time domain resources include Q second time domain resources and the H + 1 second time domain resources. According to method 1, R is finally greater than M.
- FIG. 7 is a schematic diagram of a third time domain resource according to an embodiment of the present application.
- the R value is 3, that is, there are three third time domain resources, the first third time domain resource is symbol 8 to symbol 11, and the second third time domain resource is symbol 12 to the next time slot Symbol 1, the third and third time-domain resources are symbols 2 to 5 of the next time slot.
- M second time domain resources determined according to R third time domain resources may be as shown in FIG. 8.
- FIG. 8 is a schematic diagram of second time domain resources according to an embodiment of the present application.
- the fourth time domain resource determines two second time domain resources, which are symbol 12 to symbol 13, and symbol 0 to symbol 1 in the next time slot. In this way, a total of 4 second time domain resources can be obtained. As shown in FIG. 8, each second time domain resource does not cross the time domain boundary.
- the start and end symbols of the four second time domain resources are: symbol 8 to symbol 11, symbol 12 to symbol 13, symbol 0 to symbol 1 of the next time slot, symbol 2 to symbol 5 of the next time slot.
- a third time domain resource across the slot boundary is called a fourth time domain resource. If the fourth time domain resource crosses the boundary of H time slots, then H + 1 second time domain resources can be determined according to the fourth time domain resource, including: the third time domain resource preceding the fourth time domain resource
- the time domain resource from the start symbol to the first slot boundary is a second time domain resource, and the H-1 slots in the middle are H-1 second time domain resources, from the last slot boundary to the fourth
- the time domain resource of an end symbol of a third time domain resource behind the time domain resource is determined to be a second time domain resource.
- the H + 1 time domain resources include: from the start symbol of the fourth time domain resource to the first time slot boundary
- the time domain resource is a second time domain resource
- the middle H-1 time slots are H-1 second time domain resources, from the last time slot boundary to a third time domain resource behind the fourth time domain resource
- the time-domain resource of the ending symbol of is determined as a second time-domain resource
- the H + 1 time-domain resources include: from the fourth time-domain resource
- the time domain resource from the start symbol of the previous third time domain resource to the first time slot boundary is a second time domain resource
- the middle H-1 time slots are H-1 second time domain resources, from the last The time domain resource from a slot boundary to the end symbol of the fourth time domain resource is determined as a second time domain resource.
- the fifth time domain resource is any one of the R third time domain resources that does not cross the slot boundary, and a third time domain resource in front of the fifth time domain resource and a third None of the time domain resources cross the time slot boundary, then the fifth time domain resource is a second time domain resource;
- the M second time domain resources include: a second time domain resource determined by the fourth time domain resource and a second time domain resource determined according to the fifth time domain resource.
- FIG. 9 is a schematic diagram of a second time domain resource according to an embodiment of the present application.
- the first part is merged into the third time domain resource before the fourth time domain resource, and the first second time domain resource becomes symbol 8 to symbol 13 after the merge.
- the second part is merged into the third time domain resource after the fourth time domain resource, that is, into the third third time domain resource, and the second second time domain resource is Symbol 0 to symbol 5 of the next time slot.
- there is no fifth time domain resource that is, there is no third time domain resource that neither crosses the slot boundary, nor there is no third time domain resource that crosses the boundary, such as the first third
- the time domain resource does not cross the boundary
- the following third time domain resource crosses the boundary
- the front third time domain resource crosses the boundary. Therefore, a total of 2 second time domain resources are obtained.
- the M second time domain resources are determined according to the time domain resources that do not cross the slot boundary and the time domain resources after dividing the fourth time domain resource among the R third time domain resources, where R and M The values are equal.
- the first P third time domain resources of the R third time domain resources do not cross the boundary, the first P third time domain resources are the first P third time domain resources of the M second time domain resources Second time domain resources.
- the P + 1 third time domain resource among the R third time domain resources crosses the slot boundary
- the P + 1 second time domain resource among the M second time domain resources is the P + th
- the start symbol of a third time domain resource reaches the slot boundary.
- the M second time domain resources include the P + 1 second time domain resources
- P + 1 ⁇ R then the P + 2 second time domain resource among the M second time domain resources is the end symbol from the slot boundary to the P + 1 third time domain resource
- FIG. 10 is a schematic diagram of second time domain resources according to an embodiment of the present application.
- the second time domain resource shown in FIG. 10 may be determined by the three third time domain resources shown in FIG. 7. According to the method described in way three,
- the M second time-domain resources include the first three of the four sixth time-domain resources, respectively: symbol 8 to symbol 11, symbol 12 to symbol 13, and symbol 0 to symbol 1 in the next time slot. So M equals 3 and R equals 3. M is equal to R, all equal to 3.
- FIG. 11 is a schematic interaction diagram of a data transmission method according to another embodiment of the present application. As shown in FIG. 11, in step S221, the terminal device or the network device determines R third time domain resources according to the first time domain resources, including:
- the terminal device or the network device repeats the first time domain resource R times according to the interval between the repetition times R and the R third time domain resources to obtain R third time domain resources.
- R third time domain resources need to be determined according to the first time domain resource.
- One possible manner is: repeating the first time domain resource R times according to the interval between the repetition times R and the R third time domain resources to obtain R third time domain resources.
- the number of repetitions R may be predefined by the protocol, or the network device may send second indication information to the terminal device, where the second indication information is used to indicate the value of the number of repetitions R.
- the second indication information may also be used to indicate the interval between R third time-domain resources.
- the second indication information may be carried in DCI or high layer signaling.
- high-level signaling may refer to signaling sent by a high-level protocol layer, and the high-level protocol layer is at least one protocol layer above the physical layer.
- the high-level protocol layer may specifically include at least one of the following protocol layers: a medium access control (MAC) layer, a radio link control (RLC) layer, and a packet data convergence protocol (packet data convergence) protocol (PDCP) layer, radio resource control (radio resource control (RRC) layer and non-access layer (NAS).
- MAC medium access control
- RLC radio link control
- PDCP packet data convergence protocol
- RRC radio resource control
- NAS non-access layer
- the position of the first time-domain resource is symbol 9 to symbol 12
- the number of symbols that determine the interval of the R third time-domain resources are all 0, the first time-domain resource Repeat 4 times, you will get 4 third time domain resources.
- the start and end symbols of the four third time domain resources are: symbol 9 to symbol 12, symbol 13 to symbol 2, symbol 3 to symbol 6, symbol 7 to symbol 10.
- the interval between two adjacent third time-domain resources may be the same or different.
- the interval of the R third time-domain resources may be predefined, for example, as specified in the protocol.
- the R third time domain resources are continuous, that is, the interval between the R third time domain resources is 0; or the network device may send seventh indication information to the terminal device, and the seventh indication information is used to indicate R The interval between the third time domain resources.
- the seventh indication information may directly indicate the interval between every two adjacent third time domain resources in the R third time domain resources, or may indirectly indicate R number by indicating a mode of the first time domain resource The interval between resources in the third time domain.
- the seventh indication information may be carried in DCI or high layer signaling.
- the seventh indication information and the second indication information may carry the same DCI or higher layer signaling.
- the network device may directly notify the terminal device of the number of repetitions R and the interval of R third time-domain resources through the indication information. Alternatively, the network device may also notify the terminal device that the R third time domain resources are continuous. If the R third time domain resources are determined to be continuous, the interval between the R third time domain resources may be determined to be 0, that is, It is an implicit instruction method. Alternatively, the correspondence between the two parameters of the length of the first time domain resource and R and the interval of the R third time domain resources may be defined in advance. For example, a table can be stored, as shown in Table 3. Table 3 shows a case where the interval between two adjacent third time-domain resources is the same, that is, the intervals between the R third time-domain resources are determined to be the same. After determining the two parameters of the length of the first time domain resource and the number of repetitions R, the interval of the R third time domain resources can be determined. It is a predetermined pattern.
- Table 3 is only exemplary and should not cause any limitation to the embodiments of the present application.
- the intervals between the R third time-domain resources may be partially the same or all different.
- the interval of the R third time-domain resources may also be determined in other ways.
- the embodiments of the present application are not limited herein.
- FIG. 12 is a schematic interaction diagram of a data transmission method according to another embodiment of the present application.
- the terminal device or the network device determines R third time domain resources according to the first time domain resources, including:
- S221b The terminal device or the network device divides the first time domain resource to obtain R third time domain resources.
- R third time domain resources need to be determined according to the first time domain resource.
- Another possible way is to divide the first time domain resource to obtain R third time domain resources, that is, the number of continuous symbols of each third time domain resource in the R third time domain resources is less than or It is equal to the number of symbols in the first time-domain resource.
- the terminal device or the network device divides the first time domain resource to obtain R third time domain resources, including:
- the first time domain resource is divided into R third time domain resources, wherein, among the R third time domain resources, there are R-1 third time domain resources, each third time
- the number of continuous symbols of domain resources is L is the number of continuous symbols of the first time domain resource, and L is a positive integer. Means round down.
- This implementation manner can also be expressed as: the terminal device or the network device determines the R third time domain resources according to the number of repetitions R and the first time domain resource, where R-1 of the R third time domain resources The number of symbols in each third time domain resource in the third time domain resource is There is a third time-domain resource that lasts for a number of symbols L is the number of continuous symbols of the first time domain resource, and L is a positive integer. Means round down.
- the first time domain resource may be divided according to the number of repetitions R to obtain R third time domain resources.
- the number of repetitions R may be notified by the network device to the terminal device through indication information, which may be carried in DCI or higher layer signaling, or may be pre-defined by the protocol.
- the R third time-domain resources there are R-1 third time-domain resources.
- the first time domain resource is symbol 10 of the first time slot to symbol 4 of the second time slot.
- the value of the sustained L of the first time domain resource is 9, and it is determined that R is equal to 5, calculate The calculation result is 1, then.
- the 5 third time-domain resources there are 4 third time-domain resources, each of which has a symbol number of 1, and one third time-domain resource has 5 symbols.
- the number of these four continuous symbols all being 1 may be the first 4 third time domain resources, the last 4 third time domain resources, or any 4 third time domain resources.
- the four third time-domain resources may be continuous or discontinuous.
- the number of continuous symbols of the first time-domain resource is just divisible by R, then the number of continuous symbols of each third time-domain resource in the R third time-domain resources may be equal, which is L / R. That is, the first time domain resource is divided into R third time domain resources on average.
- the number of symbols L that the first time-domain resource lasts is just divisible by R, among the R third time-domain resources, the number of symbols that each third time-domain resource continues may not be equal.
- the L symbols of the first time domain resource include symbols in different directions, for example, the first time domain resource is an uplink transmission resource, but L contains a downlink symbol or a reserved symbol (for example, DMRS symbol reserved). Then, when calculating the number of symbols occupied by each third time domain resource in the R third time domain resources, L should be replaced by L ', L' is the remaining symbol after removing the downlink symbols and reserved symbols in L Number.
- the start position of the first time domain resource is the 10th symbol
- the length L is 8
- the first time domain resource is the symbol 10 of the first time slot to the symbol 3 of the second time slot
- R is determined that R is equal to 4
- the number of symbols occupied by each third time domain resource is 1.
- R third time domain resources are all used for uplink transmission, or all symbols included in the R third time domain resources are used for downlink transmission.
- the start position of the first time domain resource is the 10th symbol and the length L is 8, and the first time domain resource is the symbol 10 of the first time slot to the symbol 3 of the second time slot .
- the first time domain resource contains 4 downlink symbols (symbol 12 in the first slot to symbol 1 in the second slot), and each third time domain resource in the 4 third time domain resources The number of symbols is 1, and the four third time-domain resources are the first slot symbol 10, the symbol 11, the second slot symbol 2, and the symbol 3.
- the four third time-domain resources are all used For upstream transmission.
- step S221b the terminal device or the network device divides the first time domain resource to obtain R third time domain resources, including:
- the first division mode of the first time domain resource divide the first time domain resource into the R third time domain resources, where the first time domain resource corresponds to multiple division modes, and the first division mode It is one of the multiple divisions.
- This implementation manner can also be expressed as: the terminal device or the network device determines the R third time-domain resources according to the first division method of the first time-domain resources.
- the first time-domain resource of each length L can be predefined or configured with fixed divisions.
- FIG. 13 is a schematic diagram of a first time domain resource division method with a length of 8 according to an embodiment of the present application. It is assumed that there are 4 division methods of the first time-domain resource with a length L of 8.
- the division method 1 divides the first time domain resource into a third time domain resource.
- the division manner 2 divides the first time domain resource into two third time domain resources, the first four symbols are a third time domain resource, and the last four symbols are a third time domain resource.
- the division method 3 divides the first time domain resource into three third time domain resources, the first two symbols are a third time domain resource, the last four symbols are a third time domain resource, and the remaining middle two are A third time domain resource.
- the division manner 4 divides the first time domain resource into four third time domain resources, and every two symbols are one third time domain resource.
- the corresponding division mode of a first time-domain resource may only be related to the number of symbols L that the first time-domain resource continues.
- L is determined
- the corresponding multiple division modes are also determined.
- the terminal device or the network device may divide the first time domain resource into the R third time domain resources according to the first time domain resource, and the first time domain resource corresponds to multiple division modes, and the first division mode It is one of the multiple divisions. Assuming that the number L of continuous symbols of the first time domain resource is 8, and the first division mode is division mode 3, it can be determined that the first time domain resource is divided into the three third time domain resources.
- FIG. 13 is only exemplary and should not cause any limitation to the embodiments of the present application. For example, there may be more different division methods for a corresponding division method of a first time domain resource. The embodiments of the present application are not limited herein.
- the network device may send first indication information to the terminal device, where the first indication information is used to indicate the first division manner of the first time domain resource.
- the terminal device may determine the first division manner of the first time domain resource through the first indication information.
- the first indication information may be carried in DCI or high-layer signaling and sent to the terminal device.
- the first time-domain resources are divided to obtain R third time-domain resources. Since the network device does not need to notify the terminal device of the number of repetitions R, the signaling overhead can be reduced.
- step S221b the terminal device or the network device divides the first time domain resource to obtain R third time domain resources, including:
- the first time domain resource may be divided into the first time domain resource according to the time slot boundary in the first time domain resource
- the R third time-domain resources can also be expressed as: the terminal device or the network device determines the R third time-domain resources according to the first time-domain resources and time slot boundaries.
- FIG. 14 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to an embodiment of the present application.
- the start symbol of the first time domain resource is symbol 9, and the length is 14 symbols.
- the first time domain resource is symbol 9 of the first time slot to symbol 8 of the second time slot.
- a third time domain resource can be divided every 5 symbols, and finally the remaining 4 symbols form a single
- the first time domain resource can be divided into three third time domain resources, that is, the value of R is 3.
- a more general description of this division method is: if the first time domain resource crosses X slot boundaries, the first time domain resource can be carried out according to the number of symbols of the first time domain resource before the first slot boundary Divided to obtain R third time domain resources, the number of symbols of the first time domain resource before the first slot boundary is T symbols.
- the first time domain resource spans X time slots, the number of symbols of the first time domain resource before the first time slot boundary is T, and the last third time domain resource among the R third time domain resources The number of symbols is less than or equal to T.
- the first and third time domain resources are symbols 9 to 13 of the first time slot
- the second and third time domain resources are symbols 0 to 4 of the second time slot
- the third and third time domain resources It is symbol 5 to symbol 9 of the first time slot
- the fourth third time domain resource is the symbol 10 of the second time slot to the symbol 0 of the third time slot
- the fifth third time domain resource is the first
- the sixth and third time domain resources are symbols 6 to 8 of the third time slot.
- X + 1 time-domain resources may be determined according to the X time slot boundaries according to the first time-domain resource (or it may be Called "X + 1 time domain resources"), and then divide the time domain resources of each segment of the X + 1 time domain resources according to the number of symbols of the first time domain resources before the first slot boundary, the The number of symbols of the first time domain resource before the first slot boundary is T symbols. If the remaining K symbols in a time-domain resource among the X + 1 time-domain resources, K ⁇ T, then use the K symbols as a third time-domain resource, or assign the K symbols to the previous first Three time domain resources.
- FIG. 16 is a schematic diagram of dividing the first time-domain resource according to slot boundaries according to an embodiment of the present application.
- the start symbol of the first time domain resource is symbol 9, and the length is 28 symbols.
- After the slot boundary is divided, it is divided into 3 time domain resources, that is, X 2, the first time domain resource is divided into 3 time domain resources, and the first time domain resource is 5 before the first slot boundary Symbols, the second time domain resource is the second slot, and the third time domain resource is the remaining 9 symbols after the slot boundary.
- every 5 symbols of the second time domain resource are divided into a third time domain resource, and the remaining 4 symbols in the second time domain resource constitute a single third time domain resource.
- the first and third time domain resources are symbols 9 to 13 of the first time slot
- the second and third time domain resources are symbols 0 to 4 of the second time slot
- the third and third time domain resources Symbols 5 to 9 of the first time slot
- symbols 4 to 3 of the third time domain are symbols 10 to 13 of the second time slot
- symbols 5 to the third resource of the third time domain are symbol 0 of the third time slot
- the sixth and third time domain resources are symbols 5 to 8 of the third time slot.
- Fig. 15 shows that the remaining 4 symbols of the second time domain resource are used as a third time domain resource alone.
- the remaining 4 symbols in the second time domain resource may also be incorporated into the third third time domain resource, or into the fifth third time domain resource.
- Division method 2 Divide the first time domain resource into R third time domain resources according to the number of symbols after the slot boundary.
- FIG. 17 is a schematic diagram of dividing a first time domain resource according to a slot boundary according to another embodiment of the present application.
- the start symbol of the first time domain resource is symbol 9, and the length is 14 symbols.
- the first time domain resource is symbol 9 of the first time slot to symbol 8 of the second time slot.
- the first third time domain resource is symbol 9 to symbol 13 of the first time slot
- the second third time domain resource is symbol 0 to symbol 8 of the second time slot.
- a more general description of this division method is: if the first time domain resource crosses X slot boundaries, the first time domain resource can be divided according to the number of symbols of the first time domain resource after the last slot boundary , Get R third time domain resources, the number of symbols of the first time domain resource after the last slot boundary is Y symbols, and the number of symbols of the last third time domain resource in R third time domain resources Less than or equal to Y.
- the first time domain resource may be first divided into X + 1 time domain resources according to X slot boundaries (or it may be It is called "X + 1 time domain resource"), and then the time domain resource of each segment of the X + 1 time domain resource is divided according to the number of symbols of the first time domain resource after the last slot boundary.
- the number of symbols in a time-domain resource after the last slot boundary is Y symbols. If the remaining K symbols in a time-domain resource in X + 1 time-domain resources, K ⁇ Y, then the K symbols are regarded as A third time domain resource, or the K symbols are grouped into the previous third time domain resource.
- the process of dividing the first time domain resource to obtain R third time domain resources it may also be divided from the end to the front from the end of the first time domain resource.
- FIG. 18 is a schematic diagram of dividing the first time domain resource according to the slot boundary according to an embodiment of the present application.
- the start symbol of the first time domain resource is symbol 9, and the length is 28 symbols.
- the first time domain resource is symbol 9 of the first time slot to symbol 8 of the third time slot, and the value of Y is equal to 9 symbols.
- the first time domain resource is divided into 3 time domain resources, the first time domain resource is the 5 symbols before the first slot boundary, and the second time domain resource is the second slot, the third time domain resource is 9 symbols after the slot boundary.
- the first time domain resource When dividing from the end of the first time domain resource from back to front, first divide the second time domain resource into a third for every 9 symbols In the time domain resource, the first 5 symbols in the second time domain resource constitute a single third time domain resource, and the first time domain resource can be divided into 4 third time domain resources, that is, the value of R is 4.
- the first and third time domain resources are symbols 9 to 13 of the first time slot
- the second and third time domain resources are symbols 0 to 4 of the second time slot
- the third and third time domain resources It is symbol 5 to symbol 13 of the first time slot
- the fourth third time domain resource is symbol 0 to 8 of the third time slot.
- FIG. 18 shows that the remaining five symbols in the second-stage time domain resource are used as a third time-domain resource alone.
- the remaining 5 symbols in the second-stage time domain resource may also be incorporated into the first third time domain resource, or into the third third time domain resource.
- the first time domain resource is divided into R third time domain resources according to the smaller value of the number of symbols before the slot boundary and the number of symbols at the slot boundary.
- the first time domain resource is divided into R third time domain resources according to the larger value of the number of symbols before the slot boundary and the number of symbols after the slot boundary.
- a more general description of this division method is: if the first time domain resource crosses X slot boundaries, then the number of symbols of the first time domain resource before the first slot boundary and the first time domain resource at the end The smaller the number of symbols in the number of symbols after a slot boundary, that is, the first time-domain resource is divided according to the smaller of T and Y to obtain R third time-domain resources.
- the first time domain resource may be first divided into H + 1 time domain resources according to H slot boundaries, and then the H + 1 time resources The time-domain resources of each domain resource are divided according to W symbols. If the remaining K symbols in a certain time-domain resource, K ⁇ W, then K symbols are regarded as a third time-domain resource alone, or the K The symbols are grouped into the previous third time domain resource, or the K symbols are grouped into the latter third time domain resource.
- the value of W may be predefined or configured by the network device, and the value of W may also be the smaller of T and Y. For a specific division method, reference may be made to the description of the division method 1 or the description of the division method 2, which will not be repeated here.
- step S221b the terminal device or the network device divides the first time domain resource to obtain R third time domain resources, including:
- the first time-domain resource is divided into the R third time-domain resources according to the time-domain segmentation position in the first time-domain resource, and the time-domain segmentation position is independent of the starting point of the first time-domain resource.
- R third time-domain resources are determined according to the time-domain segmentation position in the first time-domain resource and the first time-domain resource.
- a fixed time-domain segmentation position in each slot may be predefined or configured, and the segmentation location is fixed, and has no relationship with the length of the first time-domain resource and the starting point. That is, regardless of the location of the first time domain resource, the first time domain resource is divided according to the fixed time domain segmentation position within the first time domain resource, thereby obtaining the R third time domain resources.
- FIG. 19 is a schematic diagram of dividing a first time-domain resource according to a time-domain segmentation position according to an embodiment of the present application.
- the start symbol of the first time domain resource is symbol 9, and the length is 14 symbols.
- the first time domain resource is symbol 9 of the first time slot to symbol 8 of the second time slot.
- the fixed time-domain segmentation positions in each slot are: the end time of the third symbol, the end time of the seventh symbol, the end time of the eleventh symbol, and the end time of the thirteenth symbol.
- the start symbol of the first time domain resource is symbol 9 and the length is 14 symbols.
- the first time domain resource can be segmented into 5
- the third time domain resource that is, R is equal to 5.
- the first and third time domain resources are symbols 9 to 11 of the first time slot
- the second and third time domain resources are symbols 12 to 13 of the first time slot
- the third and third time domain resources Symbols 0 to 3 for the second time slot, symbols 4 to 7 for the second third time domain resource, symbols for the second third time domain resource, and symbols for the second time slot 8.
- the terminal device and the network device may also directly determine M second time domain resources according to the first time domain resource, that is, there is no need to first determine the R number Three time domain resources, and then M second time domain resources are determined according to whether the R third time domain resources cross the slot boundary. There is no need to perform steps S221 and S222.
- the terminal device or the network device may also divide the first time domain resource into M second time domain resources according to whether the first time domain resource crosses the slot boundary. For example, in the case where the first time domain resource does not cross the slot boundary, according to the value of M, the first time domain resource can be evenly divided into M second time domain resources, or each second time domain resource The number of continuous symbols may also be unequal.
- the specific division method is similar to the process of determining R third time-domain resources according to the first time-domain resource in step S221. Specifically, refer to the A method for dividing a time domain resource into R third time domain resources, dividing the first time domain resource into M second time domain resources; or referring to the utilization and first time domain resources described in FIG.
- the method of dividing the first time domain resource into R third time domain resources using a certain division method corresponding to the first time domain resource, dividing the first time domain resource into M third 2.
- Time domain resources For brevity, I will not repeat them here.
- the value of M may be notified by the network device to the terminal device through the indication information or predefined by the protocol. For details, reference may be made to the determination method of the number of repetitions R, which will not be described in detail.
- the first time domain resource when the first time domain resource crosses the slot boundary, the first time domain resource may be divided into M second time domain resources by using the slot boundary.
- the specific dividing method may be similar to the process of dividing the first time-domain resources to obtain R third time-domain resources as shown in FIG. 13 to FIG. 17.
- the first time domain resource may be divided into M second time domain resources by using a certain division method corresponding to the first time domain resource as shown in FIG. 12.
- the first time domain resource may be divided into M second time domain resources according to the time domain segmentation position in the first time domain resource as shown in FIG. 15. For brevity, I will not repeat them here.
- FIG. 20 is a schematic interaction diagram of a data transmission method according to another embodiment of the present application. As shown in FIG. 20, the method 200 further includes:
- the terminal device receives third indication information from the network device, where the third indication information is used to indicate the start and length indication value SLIV of the first time domain resource, where SLIV and S and L satisfy the following mapping relationship:
- mapping relationship (2) the above mapping relationship is referred to as a mapping relationship (2).
- S is the number of the starting symbol of the first time domain resource
- S is an integer greater than or equal to zero
- L is the number of symbols that the first time domain resource continues
- L and N are positive integers.
- N can be a value stipulated in the protocol or notified by the network device to the terminal device through signaling.
- N M * 14
- M is an integer greater than or equal to 2
- N 28.
- the signaling may be physical layer signaling or higher layer signaling
- the above mapping relationship is called a mapping relationship (2).
- a SLIV value can uniquely determine a combination of the value of S and the value of L, and a combination of the value of S and the value of L can also uniquely determine a SLIV value.
- SLIV, S, and L satisfy the mapping relationship described in the foregoing mapping relationship (1).
- the terminal device determines the first time domain resource according to the third indication information.
- the terminal device may receive third indication information sent by the network device, where the third indication information is used to indicate a row in a time domain resource table, and the time domain resource table may Predefined for the protocol or configured by higher layers.
- each row of the time domain resource table may include the following parameters:
- a SLIV, K2 parameter or K0 parameter, PUSCH or PDSCH mapping type For a detailed description of these parameters, please refer to the previous introduction, which will not be repeated here.
- time domain resources determined according to S and L may cross the boundary of the slot.
- the value range of S, L, and S + L in the above mapping relationship (2) can be further restricted.
- the following is a table to illustrate the limitation of the value range of S, L, and S + L.
- Table 4 is a combination table of S and L valid for downlink
- Table 5 is a combination table of S and L valid for uplink
- the mapping relationship satisfied by SLIV and S and L and the limits of the value range of S, L and S + L may be defined by the protocol.
- SLIV is determined by joint coding of S and L according to the above mapping relationship (2), and S and L should meet the limitations of Table 4 and Table 5.
- the network device determines the time-domain position of the first time-domain resource. Specifically, the position of the first time-domain resource may be determined according to a scheduling algorithm or the like, which is not limited in this application. And the start symbols S and L of the first time domain resource must meet the restrictions in Table 4 and Table 5.
- the network device After the network device determines the S and L of the first time domain resource, it can determine the SLIV by jointly coding S and L according to the above mapping relationship (2), and use the third indication information to SLIV informs the terminal equipment. Therefore, after the terminal device receives the third indication information for indicating the SLIV of the first time domain resource, the terminal device can determine the time domain position of the first time domain resource according to the above-mentioned mapping relationship (2).
- the first time domain resource may cross the slot boundary.
- the third indication information may be carried in DCI or high-layer signaling and sent to the terminal device.
- each row of the time domain resource table includes a start symbol S And length L.
- the value of the start symbol S and the length L must meet certain restrictions. That is, the values of the start symbol S and the length L of the first time domain resource determined by the network device must meet certain restrictions.
- the description is in the form of a limited form. For example, the values of the start symbol S and the length L must meet the limits of Table 6 and Table 7.
- Table 6 is a combination table of valid S and L in the downlink
- Table 7 is a combination table of valid S and L in the uplink.
- the candidate value of S is 0 to 13
- the candidate value of L is 1 to P, where P can be specified by the protocol.
- P can be specified by the protocol.
- P can be 14.
- P can be 12.
- the terminal device determines S and L according to a certain row of the table indicated by the third indication information, and then according to S and L, the time domain position of the first time domain resource can be determined.
- the terminal device when the terminal device determines the first time domain resource, it can receive the third indication information sent by the network device.
- the third indication information directly indicates the values of the start symbol S and the length L, and the values of the start symbol S and the length L are Satisfying the restrictions of Table 6 and Table 7 above, the terminal device determines S and L according to the third indication information, and then according to S and L, the time domain position of the first time domain resource can be determined.
- the first time domain resource may cross the slot boundary.
- the third indication information is used to indicate a row in a time domain resource table
- each row of the time domain resource table may include the following parameters:
- a SLIV, K2 parameter or K0 parameter, PUSCH or PDSCH mapping type For a detailed description of these parameters, please refer to the previous introduction, which will not be repeated here.
- each row of the time domain resource table includes S and L, as described above.
- the third indication information is also used to indicate the start symbol S and the reference length L of the first time domain resource.
- the reference length is a parameter that needs to be used when calculating the length of the first time domain resource, not the actual length of the first time domain resource.
- the terminal device also receives fourth indication information sent by the network device, and the fourth indication information indicates an X value.
- X is the number of timeslot boundaries crossed by the first time domain resource.
- the network device sends fourth indication information, and the fourth indication information is carried in DCI or in higher layer signaling.
- the terminal device also receives fifth indication information sent by the network device, where the fifth indication information is used to indicate the start symbol S and the reference length L of the first time domain resource. That is, the fifth indication information may be used to indicate a row in a time domain resource table, where the time domain resource table is a time domain resource table configured by higher layer signaling or a resource table pre-defined by the protocol.
- the fifth indication information and the third indication information may be the same piece of indication information, or may also be different indication information.
- the terminal device determines S and L according to the above-mentioned fifth indication information, and determines the start symbol of the first time domain resource as S and the length as L + (X-1) * 14 in combination with the fourth indication information.
- the terminal device further receives sixth indication information sent by the network device, where the sixth indication information is used to indicate the number W of time slots spanned by the first time domain resource, where W is a non-negative integer.
- the network device sends sixth indication information, and the sixth indication information is carried in DCI or in higher layer signaling.
- the terminal device also receives fifth indication information sent by the network device, where the fifth indication information is used to indicate the start symbol S and the reference length L of the first time domain resource. That is, the fifth indication information may be used to indicate a row in a time domain resource table, where the time domain resource table is a time domain resource table configured by higher layer signaling or a resource table pre-defined by the protocol.
- sixth indication information and the third indication information may be the same piece of indication information, or may also be different indication information.
- the terminal device determines S and L according to the above-mentioned sixth indication information, and determines the number S of the starting symbol of the first time-domain resource in combination with the fourth indication information, and the length is L + W * 14 symbols.
- M second time domain resources can be determined according to the first time domain resource in combination with the method described above to ensure that the M second time domain resources do not cross the slot boundary, M
- the second time-domain resource is used for M repeated transmissions of data, which reduces the transmission delay while ensuring the reliability of data transmission.
- the terminal device or the network device may also use the method in the prior art to determine the first time domain resource. Specifically, there are several possible implementation methods as follows:
- the network device determines the first time domain resource by using the value ranges of S, L, and S + L in Table 1 and Table 2. After determining the S and L of the first time domain resource, then use the mapping relationship (1) to jointly encode S and L to determine the SLIV, and notify the terminal device of the SLIV of the first time domain resource through the third indication information. After the terminal device receives the third indication information for indicating the SLIV of the first time domain resource, the terminal device can combine S, L, and S + in Table 1 and Table 2 according to the above mapping relationship (1) The value range of L determines the time domain position of the first time domain resource. The first time domain resource does not cross the slot boundary.
- the third indication information may be carried in DCI or higher layer signaling and sent to the terminal device.
- the network device may determine the first time domain resource by using S and L in Table 1 and Table 2.
- the terminal device may receive third indication information sent by the network device, where the third indication information is used to indicate a row in a time domain resource table, and each row of the time domain resource table contains Start symbol S and length L. Among them, the value of the start symbol S and the length L should meet the restrictions of Table 1 and Table 2.
- the terminal device determines S and L according to the third instruction information, and then determines the time domain position of the first time domain resource according to the S and L, and the first time domain resource does not cross the slot boundary.
- predefined may be implemented by pre-storing corresponding codes, tables, or other methods that can be used to indicate relevant information in devices (for example, including terminal devices and network devices). There is no limitation on its specific implementation.
- the device 300 may correspond to the terminal device described in the above method 200, or may be a chip or a component applied to the terminal device, and the device 300 Each module or unit is used to perform each action or processing performed by the terminal device in the above method 200.
- the communication device 300 may include a processing unit 310 and a communication unit 320.
- the processing unit 310 is used to determine the first time domain resource.
- the communication unit 320 is configured to send M times of first data to the network device or receive M times of transmission of second data from the network device on the M second time domain resources.
- the communication unit 320 may include a receiving unit (module) and a sending unit (module) for performing the method 200 and the terminal devices in FIGS. 2 to 4, 6, 6, 10, 11 and 20 to receive information and Steps to send information.
- the communication device 300 may further include a storage unit 330, which is used to store instructions executed by the communication unit 320 and the processing unit 310.
- the communication unit 320, the processing unit 310, and the storage unit 330 are coupled to each other.
- the storage unit 330 stores instructions.
- the processing unit 310 is used to execute the instructions stored by the storage unit 330.
- the communication unit 320 is used to perform specific signal transmission and reception under the drive of the processing unit 310. .
- the processing unit 310 may be a processor, and the communication unit 320 may be a transceiver, an input / output interface, or an interface circuit.
- the storage unit 330 may be a memory. As shown in FIG. 22, the communication device 400 may include a processor 410, a memory 420, and a transceiver 430. When the communication device is a chip in a communication device, the storage unit 330 may be a storage unit in the chip (for example, registers, cache, etc.), or may be a storage unit in the communication device outside the chip (for example , Read only memory, random access memory, etc.).
- the device 500 may correspond to the network device described in the above method 200, or may be a chip or a component applied to the network device, and the device 500 Each module or unit is used to perform each action or processing performed by the network device in the above method 200.
- the communication apparatus 500 may include a processing unit 510 and a communication unit 520.
- the processing unit 510 is used to: determine the first time domain resource
- the processing unit 510 is further configured to determine M second time-domain resources according to the first time-domain resources, where M is an integer greater than 1;
- the communication unit 520 is used to send M times of second data to the terminal device or receive M times of transmission of the first data from the terminal device on the M second time domain resources.
- the communication unit 520 may include a receiving unit (module) and a sending unit (module) for performing the method 200 and the network devices in FIGS. 2 to 4, 6, 6, 10, 11 and 20 to receive information and Steps to send information.
- the communication device 500 may further store a unit 550, which is used to store instructions executed by the communication unit 520 and the processing unit 510.
- the communication unit 520, the processing unit 510 and the storage unit 550 are coupled to each other.
- the storage unit 550 stores instructions.
- the processing unit 510 is used to execute the instructions stored by the storage unit 550. .
- the processing unit 510 may be implemented by a processor, and the communication unit 520 may be implemented by a transceiver.
- the storage unit may be realized by a memory.
- the communication device 600 may include a processor 610, a memory 620, and a transceiver 630.
- each unit in the device can be implemented in the form of software calling through processing elements; they can also be implemented in the form of hardware; some units can also be implemented in software through processing elements, and some units can be implemented in hardware.
- each unit can be a separate processing element, or it can be integrated in a chip of the device.
- it can also be stored in the memory in the form of a program, which is called and executed by a processing element of the device.
- the processing element may also be called a processor, and may be an integrated circuit with signal processing capability.
- each step of the above method or each unit above may be implemented by an integrated logic circuit of hardware in a processor element or in the form of software invoking through a processing element.
- the unit in any of the above devices may be one or more integrated circuits configured to implement the above method, for example: one or more application specific integrated circuits (application specific integrated circuits, ASIC), or, one or Multiple digital signal processors (DSPs), or one or more field programmable gate arrays (FPGAs), or a combination of at least two of these integrated circuit forms.
- ASIC application specific integrated circuits
- DSPs Multiple digital signal processors
- FPGAs field programmable gate arrays
- the unit in the device can be implemented in the form of a processing element scheduling program
- the processing element may be a general-purpose processor, such as a central processing unit (CPU) or other processor that can call a program.
- CPU central processing unit
- these units can be integrated together and implemented in the form of a system-on-a-chip (SOC).
- SOC system-on-a-chip
- FIG. 25 shows a schematic structural diagram of a terminal device provided by an embodiment of the present application. It may be the terminal device in the above embodiment, and is used to implement the operation of the terminal device in the above embodiment.
- the terminal device includes an antenna 710, a radio frequency device 720, and a baseband device 730.
- the antenna 710 is connected to the radio frequency device 720.
- the radio frequency device 720 receives the information sent by the network device through the antenna 710, and sends the information sent by the network device to the baseband device 730 for processing.
- the baseband device 730 processes the information of the terminal device and sends it to the radio frequency device 720.
- the radio frequency device 720 processes the information of the terminal device and sends it to the network device through the antenna 710.
- the baseband device 730 may include a modulation and demodulation subsystem to implement processing of each communication protocol layer of data; it may also include a central processing subsystem to implement processing of the terminal operating system and application layer; in addition, it may include other Subsystems, such as multimedia subsystems, peripheral subsystems, etc., where the multimedia subsystem is used to control the terminal device camera, screen display, etc., and the peripheral subsystem is used to connect with other devices.
- the modem subsystem can be an independent chip.
- the above device for the terminal may be located in the modem subsystem.
- the modem subsystem may include one or more processing elements 731, for example, including a master CPU and other integrated circuits.
- the modem subsystem may also include a storage element 732 and an interface circuit 733.
- the storage element 732 is used to store data and programs, but the program used to execute the method performed by the terminal device in the above method may not be stored in the storage element 732, but stored in a memory other than the modem subsystem.
- the interface circuit 733 is used to communicate with other subsystems.
- the above device for a terminal device may be located in a modulation and demodulation subsystem.
- the modulation and demodulation subsystem may be implemented by a chip.
- the chip includes at least one processing element and an interface circuit, where the processing element is used to perform any of the above terminal devices.
- the interface circuit is used to communicate with other devices.
- the unit of the terminal device that implements the steps in the above method may be implemented in the form of a processing element scheduler, for example, the device for the terminal device includes a processing element and a storage element, and the processing element calls the program stored by the storage element to Perform the method performed by the terminal in the above method embodiments.
- the storage element may be a storage element whose processing element is on the same chip, that is, an on-chip storage element.
- the program for executing the method executed by the terminal device in the above method may be in a storage element on a different chip from the processing element, that is, an off-chip storage element.
- the processing element calls or loads the program from the off-chip storage element on the on-chip storage element to call and execute the method executed by the terminal in the above method embodiments.
- the unit of the terminal device that implements the steps of the above method may be configured as one or more processing elements, and these processing elements are disposed on the modem subsystem, where the processing elements may be integrated circuits, For example: one or more ASICs, or one or more DSPs, or one or more FPGAs, or a combination of these integrated circuits. These integrated circuits can be integrated together to form a chip.
- the unit of the terminal device that implements each step in the above method may be integrated together and implemented in the form of a system-on-a-chip (SOC).
- SOC system-on-a-chip
- FIG. 26 is a schematic structural diagram of a network device according to an embodiment of the present application. It is used to realize the operation of the network device in the above embodiments.
- the network device includes an antenna 801, a radio frequency device 802, and a baseband device 803.
- the antenna 801 is connected to the radio frequency device 802.
- the radio frequency device 802 receives the information sent by the terminal through the antenna 801, and sends the information sent by the terminal device to the baseband device 803 for processing.
- the baseband device 803 processes the information of the terminal and sends it to the radio frequency device 802.
- the radio frequency device 802 processes the information of the terminal device and sends it to the terminal through the antenna 801.
- the baseband device 803 may include one or more processing elements 8031, for example, including a main control CPU and other integrated circuits.
- the baseband device 803 may further include a storage element 8032 and an interface 8033.
- the storage element 8032 is used to store programs and data; the interface 8033 is used to exchange information with the radio frequency device 802, and the interface is, for example, a common public radio interface (common public radio interface) , CPRI).
- the above apparatus for network equipment may be located in the baseband apparatus 803, for example, the above apparatus for network equipment may be a chip on the baseband apparatus 803, the chip includes at least one processing element and an interface circuit, wherein the processing element is used to perform the above network Each step of any method performed by the device, the interface circuit is used to communicate with other devices.
- the unit of the network device that implements the steps of the above method may be implemented in the form of a processing element scheduler.
- an apparatus for a network device includes a processing element and a storage element, and the processing element calls the program stored by the storage element to Perform the method performed by the network device in the above method embodiments.
- the storage element may be a storage element on the same chip as the processing element, that is, an on-chip storage element, or a storage element on a different chip from the processing element, that is, an off-chip storage element.
- the unit that the network device implements the steps in the above method may be configured as one or more processing elements, which are disposed on the baseband device, where the processing element may be an integrated circuit, such as: Or multiple ASICs, or, one or more DSPs, or, one or more FPGAs, or a combination of these integrated circuits. These integrated circuits can be integrated together to form a chip.
- the units of the network device that implement the various steps in the above method may be integrated together and implemented in the form of a system on chip.
- the baseband device includes the SOC chip, which is used to implement the above method.
- the terminal device and the network device in each of the above device embodiments can completely correspond to the terminal device or the network device in the method embodiment, and the corresponding steps are executed by corresponding modules or units, for example, when the device is implemented in the form of a chip,
- the receiving unit may be an interface circuit of the chip for receiving signals from other chips or devices.
- the above unit for sending is an interface circuit of the device for sending signals to other devices, for example, when the device is implemented in the form of a chip, the sending unit is the chip for sending signals to other chips or devices Interface circuit.
- An embodiment of the present application further provides a communication system.
- the communication system includes the foregoing terminal device and the foregoing network device.
- An embodiment of the present application further provides a computer-readable medium for storing computer program code, the computer program including instructions for executing the data transmission method of the embodiment of the present application in the above method 200.
- the readable medium may be a read-only memory (read-only memory, ROM) or a random access memory (random access memory, RAM), which is not limited in the embodiments of the present application.
- the present application also provides a computer program product, the computer program product including instructions, when the instructions are executed, so that the terminal device and the network device perform the operations of the terminal device and the network device corresponding to the above method.
- An embodiment of the present application further provides a system chip.
- the system chip includes a processing unit and a communication unit.
- the processing unit may be, for example, a processor, and the communication unit may be, for example, an input / output interface, a pin, or a circuit.
- the processing unit can execute computer instructions to cause the chip in the communication device to execute any of the data transmission methods provided in the embodiments of the present application.
- the computer instructions are stored in the storage unit.
- the storage unit is a storage unit within the chip, such as a register, a cache, etc.
- the storage unit may also be a storage unit located outside the chip within the terminal, such as a read-only memory (read-only memory, ROM) ) Or other types of static storage devices that can store static information and instructions, random access memory (random access memory, RAM), etc.
- the processor mentioned in any one of the above may be a CPU, a microprocessor, an ASIC, or one or more integrated circuits for executing the program for controlling the above-mentioned feedback information transmission method.
- the processing unit and the storage unit can be decoupled, respectively set on different physical devices, and connected by wired or wireless means to realize the respective functions of the processing unit and the storage unit, so as to support the system chip to implement the above embodiments Various functions in.
- the processing unit and the memory may also be coupled on the same device.
- RAM random access memory
- static RAM static random access memory
- dynamic RAM dynamic RAM
- DRAM dynamic random access memory
- synchronous dynamic random access memory synchronous RAM, SDRAM
- double data rate Synchronous dynamic random access memory double data SDRAM, DDR SDRAM
- enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
- synchronous connection dynamic random access memory direct RAMbus, DR, RAM
- system and "network” are often used interchangeably in this document.
- the term “and / or” in this article is just an association relationship that describes an associated object, indicating that there can be three relationships, for example, A and / or B, which can mean: A exists alone, A and B exist at the same time, exist alone B these three cases.
- the character "/" in this article generally indicates that the related objects before and after are in an "or” relationship.
- upstream and downstream appearing in this application are used to describe the direction of data / information transmission in specific scenarios.
- the "upstream” direction generally refers to the direction or distribution of data / information transmission from the terminal to the network side
- the “downlink” direction generally refers to the direction of data / information transmission from the network side to the terminal, or the transmission direction of the centralized unit to the distributed unit. It can be understood that “uplink” and “downlink” “It is only used to describe the direction of data / information transmission, and the specific starting and ending devices of the data / information transmission are not limited.
- the methods in the embodiments of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
- software When implemented using software, it can be implemented in whole or in part in the form of a computer program product.
- the computer program product includes one or more computer programs or instructions. When the computer program or instructions are loaded and executed on a computer, the processes or functions described in the embodiments of the present application are fully or partially executed.
- the computer may be a general-purpose computer, a dedicated computer, a computer network, or other programmable devices.
- the computer program or instructions may be stored in a computer-readable storage medium or transmitted through the computer-readable storage medium.
- the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server integrating one or more available media.
- the disclosed system, device, and method may be implemented in other ways.
- the device embodiments described above are only schematic.
- the division of the units is only a division of logical functions.
- there may be other divisions for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (53)
- 一种数据传输的方法,其特征在于,包括:确定第一时域资源;根据所述第一时域资源,确定M个第二时域资源,M为大于1的整数;在所述M个第二时域资源上向网络设备发送M次第一数据或者接收来自于所述网络设备的第二数据的M次传输。
- 根据权利要求1所述的方法,其特征在于,所述根据所述第一时域资源,确定M个第二时域资源,包括:根据所述第一时域资源,确定R个第三时域资源,R为大于1的整数;根据所述R个第三时域资源是否横跨时隙边界,确定所述M个第二时域资源。
- 根据权利要求2所述的方法,其特征在于,所述根据所述R个第三时域资源是否横跨时隙边界,确定所述M个第二时域资源,包括:在所述R个第三时域资源均不跨时隙边界的条件下,将所述R个第三时域资源确定为所述M第二个时域资源,M等于R。
- 根据权利要求2所述的方法,其特征在于,所述根据所述R个第三时域资源是否横跨时隙边界,确定所述M个第二时域资源,包括:将所述R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分;根据所述R个第三时域资源中不跨时隙边界的时域资源和按照时隙边界进行划分后的时域资源,确定所述M个第二时域资源。
- 根据权利要求4所述的方法,其特征在于,M等于R。
- 根据权利要求4所述的方法,其特征在于,所述将所述R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分,包括:将所述R个第三时域资源中横跨时隙边界的第四时域资源划分为H+1个所述第二时域资源,其中,所述第四时域资源横跨H个时隙边界,H为正整数。
- 根据权利要求6所述的方法,其特征在于,所述H+1个第二时域资源包括:从所述第四时域资源的开始符号到所述H个时隙边界中的第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从所述H个时隙边界中的最后一个时隙边界到所述第四时域资源的结束的时域资源为一个第二时域资源。
- 根据权利要求2所述的方法,其特征在于:所述M个第二时域资源包括根据第四时域资源确定的第二时域资源和Q个第三时域资源,所述Q个第三时域资源为所述所述R个第三时域资源中不跨时隙边界的时域资源,所述第四时域资源为所述R个第三时域资源中横跨时隙边界的任意一个时域资源,所述第四时域资源横跨H个时隙边界,根据所述第四时域资源确定出的H+1个第二时域资源包括:从所述第四时域资源的开始符号到所述H个时隙边界中第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从所述H个时隙边界中最后一个时隙边界到所述第四时域资源的结束符号的时域资源为一个第二时域资源。
- 根据权利要求7或8所述的方法,其特征在于,R大于M。
- 根据权利要求4所述的方法,其特征在于,所述将所述R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分,包括:将所述R个第三时域资源中横跨时隙边界的第四时域资源划分为H+1第五个时域资源,其中,所述第四时域资源横跨H个时隙边界,H为正整数;将所述H+1个第五时域资源中的第一个第五时域资源与所述第四时域资源的前一个第三时域资源合并,共同构成一个第二时域资源;将所述H+1第五个时域资源中的最后一个第五时域资源与所述第四时域资源的后一个第三时域资源合并,共同构成一个第二时域资源。
- 根据权利要求9所示的方法,其特征在于,R小于M。
- 根据权利要求2至11中任一项所述的方法,其特征在于,所述根据所述第一时域资源,确定R个第三时域资源,包括:根据重复次数R和R个第三时域资源之间的间隔,将所述第一时域资源重复R次,得到所述R个第三时域资源。
- 根据权利要求12所述的方法其特征在于,所述方法还包括:接收来自于所述网络设备的第七指示信息,所述第七指示用于指示所述R个第三时域资源之间的间隔。
- 根据权利要求12或13所述的方法,其特征在于,所述R个第三时域资源的间隔为0,或者,所述R个第三时域资源在时域上是连续的。
- 根据权利要求2至11中任一项所述的方法,其特征在于,所述根据所述第一时域资源,确定R个第三时域资源,包括:将所述第一时域资源进行划分,得到所述R个第三时域资源。
- 根据权利要求15所述的方法,其特征在于,所述将所述第一时域资源进行划分,得到所述R个第三时域资源,包括:根据所述第一时域资源在第一个时隙边界前的符号个数,将所述第一时域资源进行划分,得到所述R个第三时域资源,其中,所述第一时域资源横跨X个时隙边界,所述第一时域资源在第一个时隙边界前的符号个数为T,所述R个第三时域资源中的最后一个第三时域资源的符号个数小于或者等于T。
- 根据权利要求15所述的方法,其特征在于,所述将所述第一时域资源进行划分,得到所述R个第三时域资源,包括:将所述第一时域资源按照时隙边界划分为X+1个时域资源,所述第一时域资源横跨X个时隙边界,所述第一时域资源在第一个时隙边界前的符号个数为T;将所述X+1个时域资源的每一个的时域资源按照T个符号的长度进行划分;如果所述X+1个时域资源中的任意一个时域资源中剩余K个符号,并且,K<T,将 所述K个符号作为一个第三时域资源,或者将所述K个符号划入到前一个第三时域资源中。
- 根据权利要求15所述的方法,其特征在于,所述将所述第一时域资源进行划分,得到所述R个第三时域资源,包括:接收来自于网络设备的第一指示信息,所述第一指示信息用于指示所述第一时域资源的第一划分方式;根据所述第一划分方式,将所述第一时域资源划分为所述R个第三时域资源,其中,所述第一时域资源对应多种划分方式,所述第一划分方式为所述多种划分方式中的一种。
- 根据权利要求2至19任一项所述的方法,其特征在于,所述方法还包括:接收来自于网络设备的第二指示信息,所述第二指示信息用于指示所述重复次数R的值。
- 根据权利要求1至20中任一项所述的方法,其特征在于,所述确定第一时域资源,包括:接收来自于所述网络设备的第三指示信息,所述第三指示信息用于指示时域资源表格中的一行,所述时域资源表格的一行包含起始符号的编号S和所述第一时域资源持续的符号个数L,S为大于或者等于零的整数,L为正整数;根据S和L,确定所述第一时域资源的时域位置。
- 根据权利要求1至22中任一项所述的方法,其特征在于,所述确定第一时域资源,包括:接收来自于网络设备的第四指示信息,所述第四指示信息用于指示所述第一时域资源横跨的时隙边界的个数X,X为非负整数;接收来自于所述网络设备的第五指示信息,所述第五指示信息用于指示所述第一时域资源的起始符号的编号S和参考长度L;所述第一时域资源的起始符号的编号为S,长度为L+(X-1)*14个符号。
- 根据权利要求1至22中任一项所述的方法,其特征在于,所述确定第一时域资源,包括:接收来自于网络设备的第六指示信息,所述第六指示信息用于指示所述第一时域资源横跨的时隙的个数W,W为非负整数;接收来自于所述网络设备的第五指示信息,所述第五指示信息用于指示所述第一时域资源的起始符号的编号S和参考长度L;所述第一时域资源的起始符号的编号S,长度为L+W*14个符号。
- 一种数据传输的方法,其特征在于,包括:确定第一时域资源;根据所述第一时域资源,确定M个第二时域资源,M为大于1的整数;在所述M个第二时域资源上向终端设备发送M次第二数据或者接收来自于所述终端设备的第一数据的M次传输。
- 根据权利要求25所述的方法,其特征在于,所述根据所述第一时域资源,确定M个第二时域资源,包括:根据所述第一时域资源,确定R个第三时域资源,R为大于1的整数;根据所述R个第三时域资源是否横跨时隙边界,确定所述M个第二时域资源。
- 根据权利要求26所述的方法,其特征在于,所述根据所述R个第三时域资源是否横跨时隙边界,确定所述M个第二时域资源,包括:在所述R个第三时域资源均不跨时隙边界的条件下,将所述R个第三时域资源确定为所述M个第二时域资源,M等于R。
- 根据权利要求26所述的方法,其特征在于,所述根据所述R个第三时域资源是否横跨时隙边界,确定所述M个第二时域资源,包括:将所述R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分;根据所述R个第三时域资源中不跨时隙边界的时域资源和按照时隙边界进行划分后的时域资源,确定所述M个第二时域资源。
- 根据权利要求28所述的方法,其特征在于,M等于R。
- 根据权利要求28所述的方法,其特征在于,所述将所述R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分,包括:将所述R个第三时域资源中横跨时隙边界的第四时域资源划分为H+1个所述第二时域资源,其中,所述第四时域资源横跨H个时隙边界,H为正整数。
- 根据权利要求28所述的方法,其特征在于,所述H+1个第二时域资源包括:从所述第四时域资源的开始符号到所述H个时隙边界中的第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从所述H个时隙边界中的最后一个时隙边界到所述第四时域资源的结束的时域资源为一个第二时域资源。
- 根据权利要求26所述的方法,其特征在于,所述M个第二时域资源包括根据第四时域资源确定的第二时域资源和Q个第三时域资源,所述Q个第三时域资源为所述所述R个第三时域资源中不跨时隙边界的时域资源,所述第四时域资源为所述R个第三时域资源中横跨时隙边界的任意一个时域资源,所述第四时域资源横跨H个时隙边界,根据所述第四时域资源确定出的H+1个第二时域资源包括:从所述第四时域资源的开始符号到所述H个时隙边界中第一个时隙边界的时域资源为一个第二时域资源,中间的H-1个时隙为H-1个第二时域资源,从所述H个时隙边界中最后一个时隙边界到所述第四时域资源的结束符号的时域资源为一个第二时域资源。
- 根据权利要求31或32所述的方法,其特征在于,R大于M。
- 根据权利要求28所述的方法,其特征在于,所述将所述R个第三时域资源中的横跨时隙边界的时域资源按照时隙边界进行划分,包括:将所述R个第三时域资源中横跨时隙边界的第四时域资源划分为H+1个第五时域资 源,其中,所述第四时域资源横跨H个时隙边界,H为正整数;将所述H+1个第五时域资源中的第一个第五时域资源与所述四时域资源的前一个第三时域资源合并,共同构成一个第二时域资源;将所述H+1个第五时域资源中的最后一个第五时域资源与所述四时域资源的后一个第三时域资源合并,共同构成一个第二时域资源。
- 根据权利要求34所述的方法,其特征在于,R小于M。
- 根据权利要求26至35中任一项所述的方法,其特征在于,所述根据所述第一时域资源,确定R个第三时域资源,包括:根据重复次数R和R个第三时域资源之间的间隔,将所述第一时域资源重复R次,得到所述R个第三时域资源。
- 根据权利要求36所述的方法其特征在于,所述方法还包括:向所述终端设备发送第七指示信息,所述第七指示用于指示所述R个第三时域资源之间的间隔。
- 根据权利要求36或37所述的方法,其特征在于,所述R个第三时域资源的间隔为0,或者,所述R个第三时域资源在时域上是连续的。
- 根据权利要求36至35中任一项所述的方法,其特征在于,所述根据所述第一时域资源,确定R个第三时域资源,包括:将所述第一时域资源进行划分,得到所述R个第三时域资源。
- 根据权利要求39所述的方法,其特征在于,所述将所述第一时域资源进行划分,得到所述R个第三时域资源,包括:根据所述第一时域资源在第一个时隙边界前的符号个数,将所述第一时域资源进行划分,得到所述R个第三时域资源,其中,所述第一时域资源横跨X个时隙边界,所述第一时域资源在第一个时隙边界前的符号个数为T,所述R个第三时域资源中的最后一个第三时域资源的符号个数小于或者等于T。
- 根据权利要求39所述的方法,其特征在于,所述将所述第一时域资源进行划分,得到所述R个第三时域资源,包括:将所述第一时域资源按照时隙边界划分为X+1个时域资源,所述第一时域资源横跨X个时隙边界,所述第一时域资源在第一个时隙边界前的符号个数为T;将所述X+1个时域资源的每一个的时域资源按照T个符号个数的长度进行划分;如果所述X+1个时域资源中的任意一个时域中剩余K个符号,K<T,将所述K个符号作为一个第三时域资源,或者将所述K个符号归到前一个第三时域资源中。
- 根据权利要求39所述的方法,其特征在于,所述将所述第一时域资源进行划分,得到所述R个第三时域资源,包括:向终端设备发送第一指示信息,所述第一指示信息用于指示所述第一时域资源的第一划分方式;根据所述第一划分方式,将所述第一时域资源划分为所述R个第三时域资源,其中,所述第一时域资源对应多种划分方式,所述第一划分方式为所述多种划分方式中的一种。
- 根据权利要求26至43中任一项所述的方法,其特征在于,所述方法还包括:向终端设备发送第二指示信息,所述第二指示信息用于指示所述重复次数R的值。
- 根据权利要求25至44中任一项所述的方法,其特征在于,所述方法还包括:向所述所述终端设备发送第三指示信息,所述第三指示信息用于指示时域资源表格中的一行,所述时域资源表格的一行包含起始符号的编号S和所述第一时域资源持续的符号个数L,S为大于或者等于零的整数,L为正整数。
- 根据权利要求25至46中任一项所述的方法,其特征在于,所述方法还包括:向终端设备发送第四指示信息,所述第四指示信息用于指示所述第一时域资源横跨的时隙边界的个数X,X为非负整数;向终端设备发送第五指示信息,所述第五指示信息用于指示所述第一时域资源的起始符号的编号S和参考长度L;其中,所述第一时域资源的起始符号的编号为S,长度为L+(X-1)*14个符号。
- 根据权利要求25至47中任一项所述的方法,其特征在于,所述方法还包括:向终端设备发送第六指示信息,所述第六指示信息用于指示所述第一时域资源横跨的时隙的个数W,W为非负整数;向终端设备发送第五指示信息,所述第五指示信息用于指示所述第一时域资源的起始符号的编号S和参考长度L;其中,所述第一时域资源的起始符号的编号S,长度为L+W*14个符号。
- 一种通信装置,其特征在于,包括用于执行如权利要求1至24或25至48中任一项所述方法的各个步骤的单元。
- 一种通信装置,其特征在于,包括至少一个处理器和接口电路,所述至少一个处理器用于执行如权利要求1至24或25至48中任一项所述的方法。
- 一种终端设备,其特征在于,包括如权利要求49或50所述的通信装置。
- 一种网络设备,其特征在于,包括如权利要求49或50所述的通信装置。
- 一种存储介质,其特征在于,所述存储介质中存储有程序,当所述程序被处理器运行时,如权利要求1至48中任一项所述的方法被执行。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BR112021008666A BR112021008666A2 (pt) | 2018-11-09 | 2019-11-08 | Método de transmissão de dados, aparelho de comunicações e meio de armazenamento legível por computador |
JP2021524305A JP7319363B2 (ja) | 2018-11-09 | 2019-11-08 | データ伝送方法及び通信装置 |
CA3118605A CA3118605A1 (en) | 2018-11-09 | 2019-11-08 | Data transmission method and communications apparatus |
EP19881571.4A EP3869886A4 (en) | 2018-11-09 | 2019-11-08 | DATA TRANSFER PROCESS AND COMMUNICATION DEVICE |
US17/313,903 US20210266912A1 (en) | 2018-11-09 | 2021-05-06 | Data transmission method and communications apparatus |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811333734.6 | 2018-11-09 | ||
CN201811333734 | 2018-11-09 | ||
CN201910028765.9 | 2019-01-11 | ||
CN201910028765.9A CN111181707B (zh) | 2018-11-09 | 2019-01-11 | 数据传输的方法和通信装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/313,903 Continuation US20210266912A1 (en) | 2018-11-09 | 2021-05-06 | Data transmission method and communications apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020094133A1 true WO2020094133A1 (zh) | 2020-05-14 |
Family
ID=70610767
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/116781 WO2020094133A1 (zh) | 2018-11-09 | 2019-11-08 | 数据传输的方法和通信装置 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2020094133A1 (zh) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108282274A (zh) * | 2017-01-06 | 2018-07-13 | 中兴通讯股份有限公司 | 数据传输方法及装置,终端和基站 |
WO2018175596A1 (en) * | 2017-03-23 | 2018-09-27 | Sharp Laboratories Of America, Inc. | Downlink control channel for uplink ultra-reliable and low-latency communications |
-
2019
- 2019-11-08 WO PCT/CN2019/116781 patent/WO2020094133A1/zh unknown
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108282274A (zh) * | 2017-01-06 | 2018-07-13 | 中兴通讯股份有限公司 | 数据传输方法及装置,终端和基站 |
WO2018175596A1 (en) * | 2017-03-23 | 2018-09-27 | Sharp Laboratories Of America, Inc. | Downlink control channel for uplink ultra-reliable and low-latency communications |
Non-Patent Citations (2)
Title |
---|
CATT: "Discussion on Potential Enhancements to PUSCH", 3GPP TSG RAN WG1 MEETING #95 R1-1812630, 3 November 2018 (2018-11-03), XP051478871 * |
NOKIA ET AL.: "On Scheduled PUSCH (& PDSCH) Repetition Enhancements for NR URLLC", 3GPP TSG RAN WGI MEETING #95 R1-1813115, 2 November 2018 (2018-11-02), XP051479380 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7319363B2 (ja) | データ伝送方法及び通信装置 | |
WO2020200078A1 (zh) | 传输上行信息的方法和通信装置 | |
WO2018205687A1 (zh) | 数据处理方法及装置 | |
WO2020233420A1 (zh) | 时隙格式指示的方法和通信装置 | |
WO2020221271A1 (zh) | 传输混合自动重传请求harq反馈信息的方法和通信装置 | |
WO2021031939A1 (zh) | 一种数据传输方法及装置 | |
CN111770572A (zh) | 确定反馈信息的方法和通信装置 | |
WO2018137700A1 (zh) | 一种通信方法,装置及系统 | |
WO2021017611A1 (zh) | 数据传输方法和装置 | |
WO2020220253A1 (zh) | 一种信息传输方法和通信设备 | |
WO2021072689A1 (zh) | 一种信息处理方法和终端设备以及网络设备 | |
WO2021008416A1 (zh) | 确定资源分配的方法和装置 | |
WO2019158039A1 (zh) | 通信方法和通信装置 | |
WO2021031906A1 (zh) | 配置时域资源的方法和装置 | |
US11770833B2 (en) | Communication method, terminal device, and network device | |
JP7448567B2 (ja) | サウンディング信号リソースをアクティブ化または非アクティブ化するための方法、および装置 | |
WO2020073991A1 (zh) | 数据传输方法和通信装置 | |
WO2018201919A1 (zh) | 一种数据传输的方法和装置 | |
WO2021163890A1 (zh) | 通信方法、通信装置及计算机可读存储介质 | |
WO2020143812A1 (zh) | 数据传输方法和通信装置 | |
WO2021068259A1 (zh) | 联合调度的方法和装置 | |
WO2020094133A1 (zh) | 数据传输的方法和通信装置 | |
WO2022141601A1 (zh) | 发送和接收解调参考信号的方法以及通信装置 | |
TWI801667B (zh) | 資料傳輸方法和設備 | |
WO2021088062A1 (zh) | 一种通信方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19881571 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 3118605 Country of ref document: CA |
|
ENP | Entry into the national phase |
Ref document number: 2021524305 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112021008666 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 2019881571 Country of ref document: EP Effective date: 20210520 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01E Ref document number: 112021008666 Country of ref document: BR Free format text: APRESENTAR, EM ATE 60 (SESSENTA) DIAS, NOVAS PAGINAS DAS REIVINDICACOES EMENDADAS UMA VEZ QUE O CONTEUDO ENVIADO NA PETICAO NO 870210040563 DE 04/05/2021 ENCONTRA-SE FORA DA NORMA. A PAGINA DEVE SER IDENTIFICADA SOMENTE POR REIVINDICACOES. |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01Y Ref document number: 112021008666 Country of ref document: BR Kind code of ref document: A2 Free format text: ANULADA A PUBLICACAO CODIGO 1.5 NA RPI NO 2640 DE 10/08/2021 POR TER SIDO INDEVIDA. |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01E Ref document number: 112021008666 Country of ref document: BR Free format text: REAPRESENTAR, EM ATE 60 (SESSENTA) DIAS, O RELATORIO DESCRITIVO CONTENDO 121 PAGINAS CONFORME INFORMADO NA PETICAO NA PETICAO NO 870210068073 DE 27/07/2021 OU NOVA FOLHA COM O NOVO TITULO E A NUMERACAO COMPATIVEL COM O CONTEUDO DO RELATORIO DESCRITIVO DA PETICAO NO 870210060441 DE 05/07/2021 COM 123 PAGINAS |
|
ENP | Entry into the national phase |
Ref document number: 112021008666 Country of ref document: BR Kind code of ref document: A2 Effective date: 20210504 |