WO2020143723A1 - 数据传输方法及装置 - Google Patents

数据传输方法及装置 Download PDF

Info

Publication number
WO2020143723A1
WO2020143723A1 PCT/CN2020/071244 CN2020071244W WO2020143723A1 WO 2020143723 A1 WO2020143723 A1 WO 2020143723A1 CN 2020071244 W CN2020071244 W CN 2020071244W WO 2020143723 A1 WO2020143723 A1 WO 2020143723A1
Authority
WO
WIPO (PCT)
Prior art keywords
time domain
domain resources
sets
symbol
resource
Prior art date
Application number
PCT/CN2020/071244
Other languages
English (en)
French (fr)
Inventor
徐修强
陈雁
吕永霞
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020143723A1 publication Critical patent/WO2020143723A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0078Timing of allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0446Resources in time domain, e.g. slots or frames

Definitions

  • This application relates to the field of communication technology, and in particular, to a data transmission method and device.
  • Unauthorized transmission is a "come and go" data sending method, that is, when the terminal needs to send data to the base station, the terminal directly uses the pre-configured transmission resources and transmission parameters of the base station to send data to the base station without first Send a scheduling request to the base station and wait for the dynamic authorization sent by the base station.
  • unlicensed transmission has the advantages of reducing signaling overhead, reducing transmission delay, and reducing terminal power consumption.
  • the base station can configure only one set of activated unauthorized transmission time domain resources for the terminal, and the terminal performs unauthorized transmission according to the set of unauthorized transmission time domain resources.
  • the set of unauthorized transmission time domain resources that is, unlicensed transmission period
  • the time-domain resources used include OFDM symbol #2 to OFDM symbol #9. If the terminal's data packet arrives at OFDM symbol #4 in the first unlicensed transmission cycle, the terminal can only be in the second unlicensed transmission cycle The OFDM symbol #2 starts to send the data packet, which will result in a longer waiting time for the data packet.
  • the existing configuration of time domain resources for unauthorized transmission cannot meet the requirement of the terminal to quickly send a data packet.
  • the present application provides a data transmission method and device, which are used to reduce the waiting delay of data packets.
  • a data transmission method which includes: a terminal receiving, from a network device, first resource configuration information for configuring a basic start symbol corresponding to N sets of time domain resources and a corresponding resource for configuring N sets of time domain resources
  • the second resource configuration information of the start symbol offset, and the start symbol of each set of time domain resources is determined according to the basic start symbol and the start symbol offset corresponding to each set of time domain resources in the N sets of time domain resources
  • the start symbols of N sets of time domain resources are different.
  • the terminal sends data on at least one set of time domain resources among the N sets of time domain resources.
  • the N sets of time domain resources are time domain resources used by the terminal for unauthorized transmission.
  • N is an integer greater than 1.
  • a data transmission method which includes: a network device sends first resource configuration information for configuring a basic start symbol corresponding to N sets of time domain resources to a terminal and a corresponding resource for configuring N sets of time domain resources
  • the second resource configuration information of the start symbol offset, the basic start symbol and the start symbol offset corresponding to the N sets of time domain resources are used to determine the start symbols of the N sets of time domain resources, and the N sets of time domain resources The starting symbols are different.
  • the network device detects data on N sets of time domain resources.
  • N sets of time domain resources are time domain resources used by the terminal for unauthorized transmission, and N is an integer greater than 1.
  • a data transmission apparatus including: a communication unit and a processing unit; the communication unit is configured to receive first resource configuration information and second resource configuration information from a network device, and the first resource configuration information It is used to configure the basic start symbols corresponding to N sets of time domain resources.
  • the second resource configuration information is used to configure the starting symbol offset corresponding to the N sets of time domain resources.
  • the N sets of time domain resources are all Time domain resources used by the data transmission device for unauthorized transmission, N is an integer greater than 1; the processing unit is configured to use a basic start symbol corresponding to each set of time domain resources in the N sets of time domain resources And the starting symbol offset determine the starting symbol of each set of time-domain resources, the starting symbols of the N sets of time-domain resources are all different; the communication unit is also used in the N sets of time-domain resources. Send data on at least one set of time domain resources.
  • a data transmission device including: a communication unit and a processing unit; the processing unit is configured to generate first resource configuration information and second resource configuration information, and the first resource configuration information is used for configuration A basic start symbol corresponding to N sets of time domain resources, the second resource configuration information is used to configure a starting symbol offset corresponding to the N sets of time domain resources, and a basic start corresponding to the N sets of time domain resources
  • the symbol and the starting symbol offset are used to determine the starting symbols of the N sets of time domain resources.
  • the starting symbols of the N sets of time domain resources are different.
  • the N sets of time domain resources are exempt for the terminal Time domain resources used for authorized transmission, N is an integer greater than 1; the communication unit is used to send the first resource configuration information and the second resource configuration information, and on the N sets of time domain resources Test data.
  • the network device configures multiple sets of time domain resources for the terminal, so that the terminal can select the closest set of time in time Domain resources send arriving data packets.
  • multiple sets of time-domain resources configured by the network device for the terminal can meet the requirement of the terminal to quickly send a data packet, thereby reducing the waiting delay of the data packet and improving the data transmission efficiency.
  • the first resource configuration information is also used for configuration
  • the symbol lengths of N sets of time domain resources are the same as the symbol lengths of N sets of time domain resources.
  • N sets of time domain resources have the same symbol length, which can enable N sets of time domain resources to achieve similar transmission performance, thereby serving data packets of the same service type and improving the transmission efficiency of data packets.
  • the N sets of time domain resources correspond to The start symbols are the same.
  • the second resource configuration information is carried in the wireless resource Control (radio resource control, RRC) signaling.
  • RRC radio resource control
  • the first resource configuration information includes a slot offset
  • the setting information and the start symbol indication information, the slot offset information and the start symbol indication information are used to configure the basic start symbol of N sets of time domain resources.
  • a data transmission method including: a terminal receiving first resource configuration information and second resource configuration information from a network device, where the first resource configuration information is used to configure N sets of basic symbols corresponding to time-domain resources Length, the second resource configuration information is used to configure the symbol length offset corresponding to the N sets of time domain resources.
  • the N sets of time domain resources are time domain resources used by the terminal for unauthorized transmission.
  • the starting symbols of the N sets of time domain resources are different, and N is an integer greater than 1; the terminal is determined according to the basic symbol length and the symbol length offset corresponding to each set of time domain resources in the N sets of time domain resources The symbol length of each set of time domain resources; the terminal sends data on at least one set of time domain resources among the N sets of time domain resources.
  • a data transmission method including: a network device sends first resource configuration information and second resource configuration information to a terminal, where the first resource configuration information is used to configure N sets of basic symbols corresponding to time-domain resources Length, the second resource configuration information is used to configure the symbol length offset corresponding to the N sets of time domain resources, and the basic symbol length and symbol length offset corresponding to the N sets of time domain resources are used to determine the The symbol lengths of N sets of time domain resources, the starting symbols of the N sets of time domain resources are all different, the N sets of time domain resources are time domain resources used by the terminal for unauthorized transmission, and N is greater than 1. Integer; the network device detects data on the N sets of time domain resources.
  • a data transmission apparatus including: a communication unit and a processing unit; the communication unit is configured to receive first resource configuration information and second resource configuration information from a network device, and the first resource configuration information It is used to configure the basic symbol length corresponding to N sets of time domain resources, the second resource configuration information is used to configure the symbol length offset corresponding to the N sets of time domain resources, and the N sets of time domain resources are the data
  • the basic symbol length and the symbol length offset corresponding to each set of time domain resources determine the symbol length of each set of time domain resources; the communication unit is also used to set at least one set of time domains among the N sets of time domain resources Send data on resources.
  • a data transmission device including: a communication unit and a processing unit; the processing unit is configured to generate first resource configuration information and second resource configuration information, and the first resource configuration information is used for configuration A basic symbol length corresponding to N sets of time domain resources, the second resource configuration information is used to configure a symbol length offset corresponding to the N sets of time domain resources, and a basic symbol length and a symbol corresponding to the N sets of time domain resources The length offset is used to determine the symbol length of the N sets of time domain resources.
  • the starting symbols of the N sets of time domain resources are all different.
  • the N sets of time domain resources are used by the terminal for unauthorized transmission.
  • Time domain resources, N is an integer greater than 1; the communication unit is configured to send the first resource configuration information and the second resource configuration information, and detect data on the N sets of time domain resources.
  • the network device configures multiple sets of time domain resources for the terminal, so that the terminal can select the closest set of time in time Domain resources send arriving data packets.
  • multiple sets of time-domain resources configured by the network device for the terminal can meet the requirement of the terminal to quickly send a data packet, thereby reducing the waiting delay of the data packet and improving the data transmission efficiency.
  • the first resource configuration information is also used To configure the starting symbols of the N sets of time domain resources.
  • the second resource configuration information is carried in RRC signaling.
  • the second resource configuration information is carried in RRC signaling, it is possible to avoid increasing DCI overhead.
  • the first resource configuration information includes Slot offset information, start symbol indication information and basic symbol length indication information
  • the slot offset information and the start symbol indication information are used to configure the start symbol of the N sets of time domain resources
  • the basic The symbol length indication information is used to configure the basic symbol length of the N sets of time domain resources.
  • the N sets of symbols of the time domain resources The length is the same.
  • N sets of time domain resources have the same symbol length, which can enable N sets of time domain resources to achieve similar transmission performance, thereby serving data packets of the same service type and improving the transmission efficiency of data packets.
  • a data transmission method which includes: a terminal receives resource configuration information and demodulation reference signal (DMRS) configuration information from a network device, and the resource configuration information is used to configure the first time A starting symbol and a symbol length of a domain resource, and the DMRS configuration information is used to configure a symbol occupied by the DMRS of the first time domain resource in the first time domain resource; the terminal according to the resource configuration information and The DMRS configuration information determines a second time domain resource, and a start symbol of the second time domain resource is a symbol occupied by the DMRS of the first time domain resource in the first time domain resource; wherein, The second time domain resource is a time domain resource used by the terminal for unauthorized transmission; the terminal sends data on the second time domain resource.
  • DMRS demodulation reference signal
  • a data transmission method including: a network device determining a second according to a symbol length of a first time domain resource and a symbol occupied by the DMRS of the first time domain resource in the first time domain resource Time domain resource; the starting symbol of the second time domain resource is the symbol occupied by the DMRS of the first time domain resource in the first time domain resource, and the second time domain resource is the terminal Time domain resources used for unauthorized transmission; the network device detects data on the second time domain resources.
  • a data transmission device including: a communication unit and a processing unit; the communication unit is configured to receive resource configuration information and DMRS configuration information from a network device, and the resource configuration information is used to configure the first The starting symbol and symbol length of the time domain resource, the DMRS configuration information is used to configure the symbol occupied by the DMRS of the first time domain resource in the first time domain resource; the processing unit is used for The resource configuration information and the DMRS configuration information determine a second time domain resource, and the start symbol of the second time domain resource is the DMRS occupied by the first time domain resource in the first time domain resource Symbol; wherein, the second time domain resource is a time domain resource used by the data transmission device for unauthorized transmission; the communication unit is also used to send data on the second time domain resource.
  • a data transmission device including: a communication unit and a processing unit; the processing unit is configured to determine whether a DMRS of the first time domain resource and The symbol occupied in the first time domain resource determines the second time domain resource; the starting symbol of the second time domain resource is the symbol occupied by the DMRS of the first time domain resource in the first time domain resource
  • the second time domain resource is a time domain resource used by the terminal for unauthorized transmission; the processing unit is also used to detect data on the second time domain resource by using the communication unit.
  • the network device configures multiple sets of time domain resources for the terminal, so that the terminal can select the closest one in time Set of time domain resources to send arriving data packets.
  • multiple sets of time-domain resources configured by the network device for the terminal can meet the requirement of the terminal to quickly send a data packet, thereby reducing the waiting delay of the data packet and improving the data transmission efficiency.
  • the second time domain resource The symbol length of is the same as the symbol length of the first time domain resource.
  • a data transmission device includes: a processor; optionally, one or more of a memory, at least one communication interface, and a communication bus; the memory is used to store computer execution Instructions, the processor, the memory and at least one communication interface are connected by a communication bus, the processor executes the computer-executed instructions stored in the memory, so that the data transmission device realizes the first aspect, second aspect, fifth aspect, sixth aspect, ninth Any one of the methods provided in any of the aspects and the tenth aspect.
  • the device can exist in the form of a chip product.
  • a communication system including: the data transmission apparatus provided in the third aspect and the fourth aspect; or, the data transmission apparatus provided in the seventh aspect and the eighth aspect; or, the eleventh aspect and the first aspect A data transmission device provided in the twelfth aspect.
  • a computer-readable storage medium including instructions, which when executed on a computer, causes the computer to execute the first aspect, second aspect, fifth aspect, sixth aspect, ninth aspect and Any one of the methods provided in any of the tenth aspects.
  • a computer program product containing instructions which, when executed on a computer, cause the computer to execute the first aspect, second aspect, fifth aspect, sixth aspect, ninth aspect and tenth Any one of the methods provided by any of the aspects.
  • FIG. 1 is a schematic diagram of a network application scenario provided by an embodiment of this application.
  • FIG. 2 is a schematic diagram of a time domain resource for unauthorized transmission provided by an embodiment of this application;
  • 2A is a schematic diagram of a location of an unauthorized transmission cycle and a time domain resource of an unauthorized transmission provided by an embodiment of the present application;
  • FIG. 3 is a schematic diagram of a time domain resource for unauthorized transmission provided by an embodiment of the present application.
  • FIG. 4, FIG. 6, FIG. 8 and FIG. 10 are flowcharts of a data transmission method provided by embodiments of the present application.
  • FIG. 7, FIG. 9, FIG. 11 and FIG. 12 are schematic diagrams of a time domain resource for unauthorized transmission provided by an embodiment of the present application.
  • FIG. 13 is a schematic diagram of the composition of a data transmission device according to an embodiment of the present application.
  • FIG. 14 is a schematic diagram of a hardware structure of a network device and a terminal provided by an embodiment of the present application.
  • LTE long term evolution
  • NR new radio
  • 5G 5th generation
  • future evolution future evolution
  • multiple communication fusion systems etc.
  • the technical solution provided by the embodiments of the present application may be applied to various communication scenarios.
  • M2M machine-to-machine
  • eMBB enhanced mobile broadband
  • URLLC ultra-reliable and ultra-low latency communication
  • mMTC massive Scenarios
  • SPS semi-persistent scheduling
  • authorization-free authorization-free
  • scheduling-free dynamic scheduling-free
  • dynamic authorization-free high-level configuration transmission scenarios.
  • the communication subjects in these communication scenarios and transmission scenarios may include, but are not limited to: communication devices and communication devices (for example, terminals and terminals), network devices and network devices (for example, base stations and base stations), network devices and communication devices (for example, Communication scenarios between base stations and terminals).
  • communication devices and communication devices for example, terminals and terminals
  • network devices and network devices for example, base stations and base stations
  • network devices and communication devices for example, Communication scenarios between base stations and terminals.
  • the network architecture and business scenarios described in the embodiments of the present application are for explaining the technical solutions of the embodiments of the present application more clearly, and do not constitute a limitation on the technical solutions provided by the embodiments of the present application. It can be known by those of ordinary skill in the art that with the evolution of the network architecture and the emergence of new business scenarios, the technical solutions provided by the embodiments of the present application are also applicable to similar technical problems.
  • FIG. 1 shows a schematic diagram of a communication system to which the technical solution provided by this application is applicable.
  • the communication system may include at least one network device (only 1 is shown in FIG. 1) and at least one terminal (6 are shown in FIG. 1, respectively terminal 1 to terminal 6).
  • One or more of the terminals 1 to 6 can communicate with the network device to transmit data (uplink data and/or downlink data) and/or configuration information.
  • the terminal 4 to the terminal 6 may also constitute another communication system to which the technical solution provided by the present application is applicable.
  • the configuration information for example, the first resource configuration information and/or the first resource configuration information in Embodiments 1 to 3 below
  • Resource configuration information for example, the first resource configuration information and/or the first resource configuration information in Embodiments 1 to 3 below
  • Resource configuration information for example, the first resource configuration information and/or the first resource configuration information in Embodiments 1 to 3 below
  • Resource configuration information for example, the first resource configuration information and/or the first resource configuration information in Embodiments 1 to 3 below
  • the network device is an entity on the network side for sending or receiving signals.
  • the network device may be a device deployed in a radio access network (RAN) to provide wireless communication functions for the terminal, for example, may be a base station.
  • RAN radio access network
  • the network equipment may be various forms of macro base stations, micro base stations (also called small stations), relay stations, access points (APs), etc., and may also include various forms of control nodes, such as network controllers.
  • the control node may connect multiple base stations and configure resources for multiple terminals covered by the multiple base stations.
  • the names of devices with base station functions may be different.
  • a global mobile communication system global system for mobile communication (GSM) or code division multiple access (CDMA) network can be called a base transceiver station (BTS), wideband code division multiple access (wideband code division multiple access, WCDMA) can be called base station (NodeB), LTE system can be called evolved base station (evolved NodeB, eNB or eNodeB), 5G communication system or NR communication system can be called next-generation base station Node (next generation node, base station, gNB), the specific name of the base station is not limited in this application.
  • GSM global system for mobile communication
  • CDMA code division multiple access
  • BTS base transceiver station
  • WCDMA wideband code division multiple access
  • NodeB LTE system
  • 5G communication system or NR communication system can be called next-generation base station Node (next generation node, base station, gNB), the specific name of the base station is not limited in
  • the network device may also be a wireless controller in a cloud radio access network (cloud) access network (CRAN) scenario, a network device in a future public land mobile network (PLMN) network, and a transmission and reception node ( transmission and reception point (TRP) etc.
  • cloud cloud radio access network
  • PLMN public land mobile network
  • TRP transmission and reception point
  • the terminal is used to provide voice and/or data connectivity services to the user.
  • the terminal is an entity on the user side for receiving or sending signals.
  • a terminal may also be called a user equipment (UE), terminal equipment, access terminal, subscriber unit, user station, mobile station, remote station, remote terminal, mobile device, user terminal, wireless communication device, user agent, or user Device.
  • UE user equipment
  • the terminal may be a mobile station (MS), a subscriber unit (subscriber unit), a drone, an Internet of Things (IoT) device, a wireless local area network (wireless local area networks, WLAN) station (station, ST), cellular phone, smart phone, cordless phone, wireless data card, tablet computer, session initiation protocol (SIP) phone, wireless local loop (wireless local loop, WLL) ) Station, personal digital processing (personal digital assistant, PDA) device, laptop computer (laptop computer), machine type communication (machine type communication (MTC) terminal, handheld device with wireless communication function, computing device or connected to wireless Other processing devices for modems, in-vehicle devices, and wearable devices (also called wearable smart devices).
  • the terminal may also be a terminal in a next-generation communication system, for example, a terminal in a 5G communication system or a terminal in a PLMN that evolves in the future, or a terminal in an NR communication system.
  • IoT Internet of Things
  • WLAN wireless local area network
  • NR for a normal (cyclic prefix) (CP), one slot contains 14 OFDM symbols.
  • CP cyclic prefix
  • 1 slot For an extended CP, 1 slot contains 12 OFDM symbols.
  • one slot includes 14 OFDM symbols.
  • the starting symbol in the embodiment of the present application is the first OFDM symbol in a physical uplink shared channel (physical uplink shared channel, PUSCH).
  • time slot #j 14 OFDM symbols are sequentially numbered in ascending order, with the smallest number being 0 and the largest number being 13.
  • the OFDM symbol with index (i.e., number) i is denoted as OFDM symbol #i
  • one slot contains OFDM symbol #0 to OFDM symbol #13.
  • time slot #j the time slot with index (ie, number) j is referred to as time slot #j.
  • j is an integer greater than or equal to 0
  • i is an integer greater than or equal to 0 and less than or equal to 13.
  • Unauthorized transmission means that the uplink transmission of the terminal does not need to be completed by the scheduling of the network equipment. Specifically, when the uplink data arrives (the data packet arrival in the embodiment of the present application means that the data has been processed and can be sent), the terminal does not need to send a scheduling request (SR) to the network device and wait for the network device's Dynamic grant (dynamic grant), but you can directly use the pre-allocated transmission resources and designated transmission parameters of the network device to send uplink data to the network device.
  • SR scheduling request
  • Dynamic grant dynamic grant
  • Unauthorized transmission is divided into two categories: PUSCH transmission based on the first type of configuration authorization (type 1 PUSCH transmission with with a configured grant, or, type 1 configured configured grant, or type 1 configured with PUSCH transmission), and based on the second type of configuration authorization PUSCH transmission (type 2 PUSCH transmission with a configured grant, or, type 2 configured grant configuration, or type 2 configured grant PUSCH transmission).
  • first type of configuration authorization type 1 PUSCH transmission with with a configured grant, or, type 1 configured configured grant, or type 1 configured with PUSCH transmission
  • second type of configuration authorization PUSCH transmission type 2 PUSCH transmission with a configured grant, or, type 2 configured grant configuration, or type 2 configured grant PUSCH transmission.
  • the configuration method of PUSCH transmission based on the first type of configuration authorization is: the network device configures all transmission resources and transmission parameters for the terminal through high-level parameters (such as ConfiguredGrantConfig). For example: time domain resource period, open loop power control related parameters, waveform, redundancy version (redundancy version) sequence, repetition number, frequency hopping pattern, resource allocation type, hybrid automatic repeat request (hybrid automatic repeat request, HARQ) process number, DMRS related parameters, modulation and coding scheme (MCS) table, resource block group (RBG) size, and all transmissions including time domain resources, frequency domain resources, MCS, etc. Resources and transmission parameters.
  • high-level parameters such as ConfiguredGrantConfig. For example: time domain resource period, open loop power control related parameters, waveform, redundancy version (redundancy version) sequence, repetition number, frequency hopping pattern, resource allocation type, hybrid automatic repeat request (hybrid automatic repeat request, HARQ) process number, DMRS related parameters, modulation and coding scheme (MCS) table
  • the configuration method of PUSCH transmission based on the second type of configuration authorization is divided into the following two steps: First, the network device configures some transmission resources and transmission parameters to the terminal through high-level parameters (such as ConfiguredGrantConfig). For example: time domain resource period, open loop power control related parameters, waveform, RV sequence, repetitions, frequency hopping pattern, resource allocation type, number of HARQ processes, DMRS related parameters, MCS table, RBG size. After that, the network device sends DCI (such as configuration-specific DCI) to the terminal, so that the terminal activates the PUSCH transmission based on the second type of configuration authorization, and simultaneously configures the time domain resources, frequency domain resources, DMRS related parameters, MCS, etc. Transmission resources and transmission parameters. It should be noted that the PUSCH transmission authorized by the second type of configuration can be used only after being activated.
  • high-level parameters such as ConfiguredGrantConfig
  • the configuration parameters of the first type of authorized PUSCH transmission and the configuration parameters of the second type of authorized PUSCH transmission can refer to the relevant parts of the standard 3GPP TS38.331, which will not be repeated here.
  • Flexible start is a concept defined in the examples of this application. If the terminal is enabled to start flexibly, in an unlicensed transmission period, multiple OFDM symbols in the time domain resource of unlicensed transmission can be used as the starting symbol of the PUSCH time domain resource. If the terminal is not enabled for flexible start, in a period of unlicensed transmission, the first OFDM symbol in the time-domain resource of unlicensed transmission is used as the start symbol of the time-domain resource of PUSCH.
  • the terminal when the terminal is enabled to start flexibly, if the arrival time of the terminal's data packet misses the first OFDM symbol of the unlicensed transmission time domain resource in the current unlicensed transmission cycle, the terminal's data The packet does not need to wait until the first OFDM symbol of the unauthorized transmission time domain resource in the next unlicensed transmission cycle, but can start sending the data on other OFDM symbols of the unlicensed transmission time domain resource in the current unlicensed transmission cycle .
  • the time domain resource of the unlicensed transmission includes OFDM symbol #2 to OFDM symbol #9 in the time slot #1.
  • the time domain resources of the unlicensed transmission include OFDM symbol #10 to OFDM symbol #13 in slot #1, and OFDM symbol #0 to OFDM symbol #3 in slot #2.
  • the OFDM symbol #2, OFDM symbol #5, and OFDM symbol #7 in the unlicensed transmission period 1 can be used as the starting symbol of the PUSCH time domain resource.
  • the terminal may start to transmit the data packet at OFDM symbol #5, instead of waiting until OFDM symbol #10 to send the data packet.
  • the latency of the data packet is reduced from 6 OFDM symbols to 1 OFDM symbol. It can be seen that the terminal is enabled to start flexibly, which can effectively reduce the waiting delay of data packets.
  • DMRS is used to demodulate PUSCH.
  • DMRS is carried on some OFDM symbols in PUSCH.
  • the network device will configure the front-loaded DMRS of the OFDM symbol in the PUSCH.
  • PUSCH includes two types of mapping (Mapping Type), namely: Mapping Type A and Mapping Type B.
  • Front-load DMRS is located in the third OFDM symbol in the time slot, or in the third OFDM symbol and the fourth OFDM symbol in the time slot.
  • Front-load DMRS is located in the first OFDM symbol in the PUSCH, or the first OFDM symbol and the second OFDM symbol in the PUSCH. For example, if the PUSCH time domain resource contains OFDM symbol #5 to OFDM symbol #12 in the time slot, then Front-load DMRS is located in OFDM symbol #5 in the time slot, or OFDM symbol #5 and OFDM symbol # in the time slot 6.
  • Front-load DMRS can support multiple methods by means of comb frequency division, different time-domain orthogonal cover codes (OCC), different frequency-domain OCC, and different cyclic shifts (CS).
  • Orthogonal DMRS ports for example, 3GPP R15 protocol can support up to 4, 8, 6, or 12 orthogonal DMRS ports. It can be understood that, for multiple terminals sharing the same time-frequency resource, the network device may configure orthogonal DMRS (eg, configure different orthogonal DMRS ports) for these terminals, and the network device identifies different terminals by detecting the DMRS.
  • additional DMRS can also be configured on the basis of Front-load DMRS.
  • Additional The configuration of DMRS (for example, comb frequency division used, time domain OCC, frequency domain OCC, CS, etc.) is the same as Front-load DMRS.
  • Additional DMRS is generally located behind Front-load DMRS and can be used to improve the performance of channel estimation. For example, in R15, when Front-load DMRS is a single symbol, you can configure Additional DMRS of 1 to 3 OFDM symbols; when Front-load DMRS is two symbols, you can configure Additional DMRS of 2 OFDM symbols. Additional Which OFDM symbols the DMRS is located on the time slot or PUSCH can be configured by the network device or agreed on by the protocol.
  • Front-load DMRS and Additional DMRS are used for user detection and channel estimation of network equipment.
  • the unauthorized transmission period is used to characterize the regularity of unauthorized transmission of time-domain resources in the time domain.
  • the length of the unlicensed transmission cycle is in units of OFDM symbols or time slots.
  • the length of one unauthorized transmission period refers to the number of OFDM symbols included in one unlicensed transmission period, or the number of time slots included in one unlicensed transmission period.
  • the length of the unauthorized transmission period is greater than or equal to the time length of the unauthorized transmission time domain resource.
  • the start symbol of an unauthorized transmission period is the start symbol of the unauthorized transmission time domain resource in the unauthorized transmission period.
  • the time domain resource of the unauthorized transmission in the unauthorized transmission cycle 1 is the time domain resource 1 of the unauthorized transmission
  • the time domain resource of the unauthorized transmission in the unauthorized transmission cycle 2 is the unauthorized transmission Of time domain resources 2.
  • the time domain resource of unauthorized transmission configured by a set of configuration parameters of unauthorized transmission may be called a set of time domain resources of unauthorized transmission.
  • a set of configuration parameters for unlicensed transmission includes period parameters, time domain resource allocation parameters, and time domain offset parameters.
  • the period parameter is used to configure the unauthorized transmission period.
  • Time domain resource allocation parameters are used to configure the start symbol, symbol length, and PUSCH Mapping type of unauthorized transmission time domain resources.
  • the time domain offset parameter is used to configure the time slot in which the time domain resource for unauthorized transmission is located, which can be specifically configured through the timeDomainOffset parameter.
  • the symbol length in the embodiment of the present application may also be referred to as the number of symbols, which is the time-domain length of the time-domain resource used to transmit one PUSCH.
  • a set of configuration parameters for unauthorized transmission includes period parameters and time domain resource allocation parameters.
  • the period parameter is used to configure the unauthorized transmission period.
  • Start symbol time domain time domain resource allocation resource parameters for configuring unlicensed transmission symbol lengths, the PUSCH and the Mapping Type slot offset i.e., K 2, K 2 may be a detailed explanation see below).
  • the network device configures the terminal with up to 16 combinations of time-domain resource allocation parameters for unauthorized transmission (hereinafter referred to as combinations) through RRC signaling, and one set of time-domain resources for unlicensed transmission uses one combination.
  • Each combination includes the following parameter configurations: PUSCH mapping type, K 2 , start and length indicator value (SLIV).
  • PUSCH mapping type is mapping typeA or mapping typeB.
  • K 2 is used to configure the offset of the time slot where the PUSCH is located compared to the time slot where the DCI scheduling the PUSCH is located. For example, if the time slot where the DCI scheduling the PUSCH is located is n, the time slot where the PUSCH transmission is n+K 2 .
  • SLIV is used to configure the starting symbol S and the symbol length L of the PUSCH, and S and L satisfy the following table 1 restrictions.
  • the terminal uses the default 16 combinations shown in Table 2 below.
  • the value of j in Table 2 is 1, 2, or 3.
  • the network device On the basis of the terminal learning the 16 combinations configured by RRC signaling or the default, for Type 1 configured grant, the network device indicates the terminal of the 16 combinations to the terminal through RRC signaling (for example, the timeDomainAllocation parameter in RRC signaling).
  • RRC signaling for example, the timeDomainAllocation parameter in RRC signaling.
  • a combination because Type 1 configured grant has special RRC parameters (for example, timeDomainOffset) to indicate the time slot offset, in this case, the terminal determines the starting time slot of the unlicensed transmission resource according to timeDomainOffset, for example, when timeDomainOffset indicates When the value of is 100, the terminal determines that the unauthorized transmission resource starts in slot #100. Therefore, for Type 1 configured grant, the terminal does not use K 2 in the combination.
  • the network device For Type 2 configured grant, the network device indicates one of the 16 combinations to the terminal through DCI (for example, the Time domain resource assignment field in DCI). In this case, the terminal determines the unauthorized transmission according to K 2 in the combination
  • the starting time slot of the resource for example, if the value indicated by K 2 is 16, the terminal determines that the unlicensed transmission resource starts at time slot #(n+K 2 ), where n is the time slot at which the terminal receives DCI index.
  • the PUSCH starts from the OFDM symbol #2 of the time slot and ends at the OFDM symbol #10 of the same time slot.
  • Embodiments 1 to 4 provide the data transmission methods shown in Embodiments 1 to 4. The methods provided in the first embodiment to the fourth embodiment are respectively described below.
  • This embodiment provides a data transmission method. As shown in FIG. 4, the method includes:
  • the network device sends the first resource configuration information and the second resource configuration information to the terminal.
  • the terminal receives the first resource configuration information and the second resource configuration information from the network device.
  • the first resource configuration information is used to configure basic start symbols corresponding to N sets of time domain resources
  • the second resource configuration information is used to configure start symbol offsets corresponding to N sets of time domain resources
  • N sets of time domain resources correspond to The basic start symbol and the start symbol offset are used to determine the start symbol of N sets of time domain resources.
  • the start symbols of N sets of time domain resources are different.
  • N sets of time domain resources are used by the terminal for unauthorized transmission.
  • Time domain resource, N is an integer greater than 1.
  • the N sets of time domain resources may be time domain resources used for PUSCH transmission.
  • the first resource configuration information includes slot offset information and start symbol indication information, and the slot offset information and start symbol indication information are used to configure a basic start symbol for N sets of time domain resources.
  • the first resource configuration information may include time slot offset information corresponding to N sets of time domain resources and start symbol indication information corresponding to N sets of time domain resources.
  • the time slot offset information corresponding to a time domain resource is used to configure the time slot where the basic start symbol of the time domain resource is located, and the start symbol indication information corresponding to a time domain resource is used to configure the basic start of the time domain resource The index of the symbol.
  • S 0 be the index of the basic start symbol of the first time domain resource among the N sets of time domain resources.
  • S 0 may be indicated by SLIV or by a resource index, and the resource corresponding to the resource index includes information of S 0 .
  • the resource index may be Row index in Table 2, and S 0 may be S in Table 2.
  • the first time domain resource may be any set of time domain resources among the N sets of time domain resources.
  • the resource index may be specifically indicated by the timeDomainAllocation parameter in RRC signaling or the Time domain resource assignment field in DCI.
  • the time slot offset information and the start symbol indication information corresponding to the first time domain resource may be used by the terminal to determine the basic start symbol of the first time domain resource.
  • the basic starting symbol of the first time domain resource may be the OFDM symbol #S 0 in the time slot #(n+K 2 ), in which case, K 2 is the time slot offset, and n is the For the index of the time slot where the DCI configuring the first time domain resource is located, in this case, the time slot offset information may be carried in the DCI.
  • the basic start symbol of the first time domain resource may be located in the OFDM symbol #S 0 in the time slot whose index is the index indicated by timeDomainOffset. In this case, timeDomainOffset is the time slot offset, in this case ,
  • the time slot offset information can be carried in RRC signaling.
  • the basic start symbols corresponding to the N sets of time domain resources are the same.
  • the time slot offsets corresponding to the N sets of time domain resources indicated by the time slot offset information are the same, and the indexes of the start symbols corresponding to the N sets of time domain resources indicated by the start symbol indication information are the same.
  • the first resource configuration information may include a slot offset information and a start symbol indication information.
  • the starting symbols of the N sets of time domain resources are different by starting symbol offsets.
  • the value of the start symbol offset is an integer, which can be greater than 0, equal to 0, or less than 0, which is not specifically limited in the embodiments of the present application.
  • the first resource configuration information and/or the second resource configuration information may be carried in RRC signaling or medium access control (MAC) control element (MAC control element (MAC) CE) signaling or DCI.
  • MAC medium access control
  • MAC control element MAC control element
  • the terminal determines the start symbol of each set of time domain resources according to the basic start symbol and the start symbol offset corresponding to each set of time domain resources in the N sets of time domain resources.
  • the first resource configuration information is also used to configure the symbol length of N sets of time domain resources.
  • the first resource configuration information further includes symbol length indication information, and the symbol length indication information is used to configure the symbol length of N sets of time domain resources.
  • the terminal may determine the symbol length of N sets of time domain resources according to the symbol length indication information.
  • the symbol length of the first time domain resource is denoted as L.
  • L can be indicated by SLIV or by a resource index, and the resource corresponding to the resource index includes information of L.
  • the resource index may be Row index in Table 2, and L may be L in Table 2.
  • the symbol lengths of the N sets of time domain resources are all the same, and the first resource configuration information may include a symbol length indication information.
  • N sets of time-domain resources have the same symbol length, which can enable N sets of time-domain resources to achieve similar transmission performance, thereby serving data packets of the same service type and improving the transmission efficiency of data packets.
  • time slot #m the time slot where the basic start symbol of the first time domain resource is located. If the sum of the S 0 corresponding to the first time domain resource and the S offset corresponding to the first time domain resource is greater than or equal to 0 and less than or equal to 14, the first time domain resource starts from the OFDM symbol #S′ in the time slot #m. In this case, if S'+L is less than or equal to 14, the first time domain resource ends in OFDM symbol #(S'+L-1) in slot #m, and if S'+L is greater than 14, the first The time domain resource ends in OFDM symbol #((S'+L)mod15) of time slot #(m+1).
  • the first time domain resource starts from the OFDM symbol #((S' of slot #(m+1) +L)mod15). In this case, if (S'+L) mod15+L is less than or equal to 14, the first time domain resource ends in OFDM symbol #((S'+L)mod15+L- in slot #(m+1) 1). If (S'+L)mod15+L is greater than 14, the first time domain resource ends at OFDM symbol #(((S'+L)mod15+L)mod15) in slot #(m+2).
  • the terminal sends data on at least one set of time domain resources among the N sets of time domain resources.
  • the terminal may select a set of time domain resources that is closest in time to data transmission among N sets of time domain resources, thereby reducing the waiting delay of the data packet To improve data transmission efficiency.
  • the network device detects data on N sets of time domain resources.
  • the network device configures multiple sets of time domain resources for the terminal, so that the terminal can select a set of time domain resources closest in time to send the arriving data packet.
  • multiple sets of time-domain resources configured by the network device for the terminal can meet the requirement of the terminal to quickly send a data packet, thereby reducing the waiting delay of the data packet and improving the data transmission efficiency.
  • the method provided in the first embodiment is exemplarily described below with a specific example.
  • the first resource configuration information configures 4 sets of time domain resources corresponding to SLIV respectively
  • the second resource configuration information configures 4 The start symbol offset corresponding to the set of time domain resources respectively
  • the terminal determines S'and L of the 4 sets of time domain resources according to the SLIV and the start symbol offset. Exemplarily, as shown in FIG.
  • the index S 0 of the basic start symbols of the 4 sets of time domain resources indicated by SLIV are 2
  • the corresponding L of the 4 sets of time domain resources indicated by SLIV are 8, and the first set The start symbol offset corresponding to the time domain resource is -2
  • the first set of time domain resources includes OFDM symbol #0 to OFDM symbol #7 in slot #m
  • the start symbol corresponding to the second set of time domain resources If the offset is 0, the second set of time-domain resources includes OFDM symbol #2 to OFDM symbol #9 in slot #m, and the starting symbol offset corresponding to the third set of time-domain resources is 2, then the third The set of time domain resources includes OFDM symbol #4 to OFDM symbol #11 in time slot #m, and the starting symbol offset corresponding to the fourth set of time domain resources is 4, then the fourth set of time domain resources includes time slot #m OFDM symbol #6 to OFDM symbol #13 in.
  • This embodiment provides a data transmission method, as shown in FIG. 6, including:
  • the network device sends the first resource configuration information and the second resource configuration information to the terminal.
  • the terminal receives the first resource configuration information and the second resource configuration information from the network device.
  • the first resource configuration information is used to configure the basic symbol length corresponding to the N sets of time domain resources
  • the second resource configuration information is used to configure the symbol length offset corresponding to the N sets of time domain resources
  • the basic set corresponding to the N sets of time domain resources The symbol length and the symbol length offset are used to determine the symbol length of N sets of time-domain resources.
  • the starting symbols of N sets of time-domain resources are different.
  • N sets of time-domain resources are time-domain resources used by the terminal for unauthorized transmission.
  • N is an integer greater than 1.
  • the N sets of time domain resources may be time domain resources used for PUSCH transmission.
  • the first resource configuration information is also used to configure N sets of start symbols of time domain resources.
  • the first resource configuration information includes slot offset information, start symbol indication information and basic symbol length indication information, and the slot offset information and start symbol indication information are used to configure the start of N sets of time domain resources Symbol, basic symbol length indication information is used to configure the basic symbol length of N sets of time domain resources.
  • the first resource configuration information may include time slot offset information corresponding to N sets of time domain resources and start symbol indication information corresponding to N sets of time domain resources.
  • the time slot offset information corresponding to a time domain resource is used to configure the time slot in which the start symbol of the time domain resource is located, and the start symbol indication information corresponding to a time domain resource is used to configure the start symbol of the time domain resource index.
  • the index of the start symbol of the first time domain resource in the N sets of time domain resources be S, and the length of the basic symbol be L, then S and L can be indicated by SLIV or by the resource index, which corresponds to the resource index
  • the resources include S and L information.
  • the resource index may be Row index in Table 2
  • S may be S in Table 2
  • L may be L in Table 2.
  • the first time domain resource may be any set of time domain resources among the N sets of time domain resources.
  • the resource index can be specifically indicated by the timeDomainAllocation parameter in RRC signaling or the Time domain assignment resource field in DCI.
  • the time slot offset information and the start symbol indication information corresponding to the first time domain resource may be used by the terminal to determine the start symbol of the first time domain resource.
  • the starting symbol of the first time domain resource may be the OFDM symbol #S in the time slot #(n+K 2 ), in this case, K 2 is the time slot offset, and n is used for configuration The index of the time slot where the DCI of the first time domain resource is located.
  • the time slot offset information may be carried in the DCI.
  • the start symbol of the first time domain resource may be located in the OFDM symbol #S in the time slot with the index indicated by timeDomainOffset. In this case, timeDomainOffset is the time slot offset.
  • the time The slot offset information may be carried in RRC signaling.
  • the first resource configuration information and/or the second resource configuration information may be carried in RRC signaling or MAC CE signaling or DCI.
  • RRC signaling When the second resource configuration information is carried in RRC signaling, it is possible to avoid increasing DCI overhead.
  • the second resource configuration information and the first resource configuration information may be in the same signaling or different signaling.
  • the terminal determines the symbol length of each set of time domain resources according to the basic symbol length and the symbol length offset corresponding to each set of time domain resources in the N sets of time domain resources.
  • the symbol lengths of N sets of time domain resources are the same.
  • N sets of time-domain resources have the same symbol length, which can enable N sets of time-domain resources to achieve similar transmission performance, thereby serving data packets of the same service type and improving the transmission efficiency of data packets.
  • the symbol length offset corresponding to the first time domain resource is denoted by L offLet .
  • L' L+L offLet .
  • this embodiment only provides a method for calculating the symbol length of the first time-domain resource. In specific implementation, other calculation methods (for example, subtraction operations) can also be applied to this embodiment. The examples will not be illustrated one by one.
  • the time slot where the start symbol of the first time domain resource is located is time slot #m. Then the first time domain resource starts from the OFDM symbol #S in the time slot #m. In this case, if S+L' is less than or equal to 14, the first time domain resource ends in OFDM symbol #(S+L'-1) in slot #m, and if S+L' is greater than 14, the first The time domain resource ends in OFDM symbol #((S+L')mod15) of time slot #(m+1).
  • the terminal may also determine the start symbol of N sets of time domain resources according to the first resource configuration information, thereby determining N sets of time domain resources.
  • the terminal sends data on at least one set of time domain resources among the N sets of time domain resources.
  • step 603 when a data packet arrives, the terminal may select a set of time domain resources that are closest in time to data transmission among N sets of time domain resources, thereby reducing the waiting delay of the data packet To improve data transmission efficiency.
  • the network device detects data on N sets of time domain resources.
  • the network device configures multiple sets of time-domain resources for the terminal, so that the terminal can select a set of time-domain resources closest in time to send the arriving data packet.
  • multiple sets of time-domain resources configured by the network device for the terminal can meet the requirement of the terminal to quickly send a data packet, thereby reducing the waiting delay of the data packet and improving the data transmission efficiency.
  • the method provided in the second embodiment is exemplarily described below with a specific example.
  • the first resource configuration information configures 4 sets of SLIV corresponding to the time domain resources
  • the second resource configuration information configures 4 sets L Offset corresponding to time domain resources respectively
  • the terminal determines S and L′ of 4 sets of time domain resources according to SLIV corresponding to 4 sets of time domain resources and L Offset corresponding to 4 sets of time domain resources respectively.
  • the index S of the start symbols of the first to fourth sets of time domain resources indicated by SLIV are: 0, 2, 4, and 6, respectively.
  • the L corresponding to the first to fourth sets of time domain resources indicated by SLIV are: 4, 5, 8, and 4, respectively.
  • the first set of time domain resources corresponds to L Offset of 4, then the first set of time domain resources includes OFDM symbol #0 to OFDM symbol #7 in slot #m, and the second set of time domain resources corresponds to L Offset of 3.
  • the second set of time domain resources includes OFDM symbol #2 to OFDM symbol #9 in time slot #m
  • the third set of time domain resources corresponding to L Offset is 0, and the third set of time domain resources includes time slot #m OFDM symbol #4 to OFDM symbol #11, the fourth set of time domain resources corresponding to L Offset is 4, then the fourth set of time domain resources includes OFDM symbol #6 to OFDM symbol #13 in slot #m.
  • This embodiment provides a data transmission method. As shown in FIG. 8, the method includes:
  • the network device sends the first resource configuration information and the second resource configuration information to the terminal.
  • the terminal receives the first resource configuration information and the second resource configuration information from the network device.
  • the first resource configuration information is used to configure N sets of time domain resource start symbols
  • the second resource configuration information is used to configure N sets of time domain resource symbol lengths.
  • the first resource configuration information is used to configure the symbol length of N sets of time domain resources
  • the second resource configuration information is used to configure the starting symbol of N sets of time domain resources.
  • N sets of time domain resources have different starting symbols.
  • N sets of time domain resources are time domain resources used by the terminal for unauthorized transmission, and N is an integer greater than 1.
  • the N sets of time domain resources may be time domain resources used for PUSCH transmission.
  • the symbol lengths of the N sets of time domain resources are all the same, then in case 1, the second resource configuration information may include a symbol length indication information, and in case 2, the first resource configuration information may include a symbol Length instructions.
  • N sets of time-domain resources have the same symbol length, which can enable N sets of time-domain resources to achieve similar transmission performance, thereby serving data packets of the same service type and improving the transmission efficiency of data packets.
  • the first resource configuration information is indicated by SLIV.
  • the symbol length indicated by SLIV is invalid
  • the start symbol indicated by SLIV is valid
  • the symbol length of N sets of time domain resources is indicated by second resource configuration information .
  • the first resource configuration information is indicated by SLIV.
  • the start symbol indicated by SLIV is invalid, the symbol length indicated by SLIV is valid, and the start symbol of N sets of time domain resources is indicated by the second resource configuration information Instructions.
  • the index of the starting symbol of the first time domain resource in the N sets of time domain resources be S and the symbol length be L.
  • S and L can be indicated by SLIV or by a resource index, and the resources corresponding to the resource index include information of S and L.
  • the resource index may be Row index in Table 2
  • S may be S in Table 2
  • L may be L in Table 2.
  • the first time domain resource may be any set of time domain resources among the N sets of time domain resources.
  • the resource index can be specifically indicated by the timeDomainAllocation parameter in RRC signaling or the Time domain assignment resource field in DCI.
  • the first resource configuration information and/or the second resource configuration information may be carried in RRC signaling or MAC CE signaling or DCI.
  • RRC signaling When the second resource configuration information is carried in RRC signaling, it is possible to avoid increasing DCI overhead.
  • the second resource configuration information and the first resource configuration information may be in the same signaling or different signaling.
  • the terminal determines each set of time domain resources according to the start symbol and the symbol length corresponding to each set of time domain resources in the N sets of time domain resources.
  • the time slot in which the start symbol of the first time domain resource is located is time slot #m, and m can be indicated by the time slot offset.
  • the first time domain resource starts from the OFDM symbol #S in the time slot #m.
  • S+L is less than or equal to 14
  • the first time domain resource ends at OFDM symbol #(S+L-1) in slot #m
  • S+L is greater than 14
  • the terminal sends data on at least one set of time domain resources among the N sets of time domain resources.
  • the terminal may select a set of time domain resources closest in time to data transmission among N sets of time domain resources, thereby reducing the waiting delay of the data packet To improve data transmission efficiency.
  • the network device detects data on N sets of time domain resources.
  • the network device configures multiple sets of time-domain resources for the terminal, so that the terminal can select a set of time-domain resources closest in time to send the arriving data packet.
  • multiple sets of time-domain resources configured by the network device for the terminal can meet the requirement of the terminal to quickly send a data packet, thereby reducing the waiting delay of the data packet and improving the data transmission efficiency.
  • the method provided in the third embodiment is exemplarily described below with a specific example in case 1.
  • the first resource configuration information configures the start symbols corresponding to the 4 sets of time domain resources respectively
  • the second resource configuration information configures The symbol lengths corresponding to the 4 sets of time domain resources respectively
  • the terminal determines 4 sets of time domain resources according to the first resource configuration information and the second resource configuration information.
  • the index S of the start symbols of the first to fourth sets of time domain resources indicated by SLIV are: 0, 2, 4, and 6, respectively.
  • the L corresponding to the first to fourth sets of time domain resources indicated by the second resource configuration information are all 8.
  • the first set of time domain resources includes OFDM symbol #0 to OFDM symbol #7 in slot #m
  • the second set of time domain resources includes OFDM symbol #2 to OFDM symbol #9 in slot #m
  • the third set The time domain resources include OFDM symbol #4 to OFDM symbol #11 in slot #m
  • the fourth set of time domain resources includes OFDM symbol #6 to OFDM symbol #13 in slot #m.
  • This embodiment provides a data transmission method, as shown in FIG. 10, including:
  • the terminal receives resource configuration information and DMRS configuration information from a network device.
  • the resource configuration information is used to configure the starting symbol and symbol length of the first time domain resource, and the DMRS configuration information is used to configure the symbol occupied by the DMRS of the first time domain resource in the first time domain resource.
  • the DMRS of the first time domain resource may be the Front-load DMRS of the first time domain resource, or it may be the Additional DMRS of the first time domain resource.
  • the start symbol of the first time domain resource is denoted as S, and the symbol length is denoted as L.
  • S and L can be indicated by SLIV or by a resource index, and the resources corresponding to the resource index include information of S and L.
  • the resource index may be Row index in Table 2, S may be S in Table 2, and L may be L in Table 2.
  • the resource index can be specifically indicated by the timeDomainAllocation parameter in RRC signaling or the Time domain assignment resource field in DCI.
  • Resource configuration information and/or DMRS configuration information may be carried in RRC signaling or MAC CE signaling or DCI.
  • the method further includes: the network device sends resource configuration information and DMRS configuration information to the terminal.
  • the terminal determines the second time domain resource according to the resource configuration information and the DMRS configuration information.
  • the starting symbol of the second time domain resource is an OFDM symbol occupied by the DMRS of the first time domain resource in the first time domain resource.
  • the second time domain resource is the time domain resource used by the terminal for unauthorized transmission.
  • the symbol length of the second time domain resource is the same as the symbol length of the first time domain resource.
  • step 1002 may include: the terminal determines the symbol length of the first time domain resource according to the resource configuration information, and determines the DMRS occupied by the first time domain resource in the first time domain resource according to the DMRS configuration information OFDM symbol, the terminal determines that the starting symbol of the second time domain resource is the OFDM symbol occupied by the DMRS of the first time domain resource in the first time domain resource, and determines that the symbol length of the second time domain resource is the first time domain resource Symbol length.
  • the terminal may determine one second time domain resource or multiple second time domain resources according to the resource configuration information and the DMRS configuration information.
  • the starting symbols of multiple second time domain resources are different.
  • the symbol lengths of multiple second time domain resources are the same.
  • Multiple second time domain resources have the same symbol length, which can enable multiple second time domain resources to achieve similar transmission performance, thereby serving data packets of the same service type and improving the transmission efficiency of the data packets.
  • the terminal determines, according to SLIV, that the starting symbol of the first time domain resource is OFDM symbol #2 in slot #1 and the symbol length is 8, then the first time domain resource includes slot # In OFDM symbol #2 to OFDM symbol #9 in 1, the terminal determines that OFDM symbol #2 and OFDM symbol #6 are OFDM symbols occupied by the DMRS of the first time domain resource according to the DMRS configuration information. Then, the terminal determines that the starting symbol of the second time domain resource is OFDM symbol #2, the symbol length of the second time domain resource is 8, and the symbol length can be determined according to SLIV, then the second time domain resource starts in slot #1 OFDM symbol #2, which ends in OFDM symbol #9 in slot #1 (ie, second time domain resource 1 in FIG.
  • the terminal determines that the starting symbol of the second time domain resource is an OFDM symbol #6, the symbol length of the second time domain resource is 8, and the symbol length can be determined according to SLIV, then the second time domain resource starts from OFDM symbol #6 in slot #1 and ends in OFDM in slot #1 Symbol #13 (ie, the second time-domain resource 2 in FIG. 11).
  • the OFDM symbol occupied by another first time domain resource includes OFDM symbol #10 to OFDM symbol #13 of slot #1 and OFDM symbol #0 to OFDM symbol # of slot #2 3. Then, the OFDM symbol occupied by the DMRS of the other first time domain resource may be the OFDM symbol #10 of slot #1 and the OFDM symbol #0 of slot #2.
  • the network device determines the second time domain resource according to the symbol length of the first time domain resource and the OFDM symbol occupied by the DMRS of the first time domain resource in the first time domain resource.
  • the way in which the network device determines the second time domain resource is the same as the way in which the terminal determines the second time domain resource.
  • the terminal sends data on the second time domain resource.
  • the first time domain resource is the time domain resource of the first resource
  • the second time domain resource is the time domain resource of the second resource
  • the frequency domain resource of the first resource and the frequency domain resource of the second resource may be the same. Both the first resource and the second resource are unauthorized transmission resources of the terminal.
  • the terminal may select a second time domain resource that is closest in time to a plurality of second time domain resources for data transmission, thereby reducing the waiting time of the data packet Delay, improve data transmission efficiency.
  • the network device detects data on the second time domain resource.
  • the terminal may determine a plurality of second time-domain resources according to the resource configuration information and the DMRS configuration information, so that the terminal may select the second time-domain resource closest in time to send the arriving data packet.
  • the multiple second time domain resources configured by the network device for the terminal can meet the requirement of the terminal to quickly send the data packet, thereby reducing the waiting delay of the data packet and improving the data transmission efficiency.
  • the fourth embodiment can use a lower signaling overhead to implement the configuration of multiple unauthorized transmission time domain resources.
  • the frequency domain resources of multiple sets of unlicensed transmission resources configured by the network device for the same terminal may be completely the same, or may be partially the same.
  • the network device can configure different DMRS ports for different unauthorized transmission resources, and distinguish the unauthorized transmission resources through the DMRS ports.
  • the network equipment is configured with two sets of unauthorized transmission resources for the terminal, namely unauthorized transmission resources 1 and unauthorized transmission resources 2, the two sets of unauthorized transmission resources use the same frequency domain resources, and the network equipment is unauthorized transmission resources 1 Configure DMRS port 1, and configure DMRS port 2 for unauthorized transmission resources 2.
  • network devices can share the same time-frequency resources for unauthorized transmission to reduce resource overhead and improve resource utilization.
  • the DMRS symbol of one terminal (that is, the OFDM symbol occupied by the DMRS) may collide with the data symbol of the other terminal (that is, the OFDM symbol occupied by the data), resulting in a decrease in DMRS detection performance and affecting data.
  • Demodulation performance For example, referring to FIG. 12, the network device configures terminal 1 with two sets of unauthorized transmission resources, which are unauthorized transmission resources 1 and unauthorized transmission resources 2, respectively.
  • the frequency domain resources of the two sets of unauthorized transmission resources are identical.
  • the network equipment configures two sets of unauthorized transmission resources for terminal 2 at the same time, namely unauthorized transmission resources 3 and unauthorized transmission resources 4.
  • the unauthorized transmission resource 3 of the terminal 2 and the unauthorized transmission resource 1 of the terminal 1 occupy the same time domain resource (for example, the OFDM symbol #2 to the OFDM symbol #9 in the time slot #1), and the exemption of the terminal 2
  • the authorized transmission resource 4 and the unlicensed transmission resource 2 of the terminal 1 occupy the same time-domain resources (for example, OFDM symbol #4 to OFDM symbol #11 in slot #1).
  • the network equipment configures terminal 1 and terminal 2 with a single-symbol front-loaded DMRS, that is, the DMRS is located only on the first OFDM symbol in the PUSCH.
  • terminal 1 uses unlicensed transmission resource 1 to send PUSCH and terminal 2 uses unlicensed transmission resource 4 to send PUSCH
  • the data of terminal 1 on OFDM symbol #4 and terminal 2 on OFDM symbol #4 DMRS collides, resulting in that the network device cannot detect the PUSCH sent by terminal 2, and at the same time reduces the data decoding performance of terminal 1.
  • different terminals use the method provided in Embodiment 4 to determine the second time domain resource for unauthorized transmission, the problem of DMRS and data collision between different terminals can be avoided.
  • the network device can also directly configure multiple sets of time-domain resources for unlicensed transmission for the terminal. Multiple sets of time-domain resources for unlicensed transmission are staggered in time so that data packets arrive After that, it can be sent using the time domain resource of the nearest unauthorized transmission in time, which significantly reduces the transmission delay.
  • multiple sets of unauthorized transmission time domain resources need to achieve similar transmission performance, that is, S is different, L is the same or similar.
  • the methods provided in the first to fourth embodiments of the present application do not depend on the SLIV configuration of the high-level configuration, and realize that multiple sets of unauthorized transmission resources are staggered in the time slot to achieve the purpose of reducing the delay of data packet waiting.
  • each network element for example, a network device and a terminal includes a hardware structure and/or a software module corresponding to each function.
  • each network element for example, a network device and a terminal includes a hardware structure and/or a software module corresponding to each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is performed by hardware or computer software driven hardware depends on the specific application of the technical solution and design constraints. Professional technicians can use different methods to implement the described functions for each specific application, but such implementation should not be considered beyond the scope of this application.
  • the embodiments of the present application may divide the functional unit of the network device and the terminal according to the above method example.
  • each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit.
  • the above integrated unit can be implemented in the form of hardware or software function unit. It should be noted that the division of the units in the embodiments of the present application is schematic, and is only a division of logical functions. In actual implementation, there may be another division manner.
  • FIG. 13 shows a possible structural schematic diagram of the data transmission device (referred to as the data transmission device 130) involved in the above embodiment.
  • the data transmission device 130 includes a processing unit 1301 and
  • the communication unit 1302 may further include a storage unit 1303.
  • the structural schematic diagram shown in FIG. 13 can be used to illustrate the structure of the network device or terminal involved in the foregoing embodiment.
  • the processing unit 1301 is used to control and manage the actions of the network device.
  • the processing unit 1301 is used to support the network device to perform steps 401 and 404 in FIG. 4, step 601 and step 604 in FIG. 6, step 801 and step 804 in FIG. 8, step 1001 and step 1003 in FIG. And step 1005, and/or actions performed by the network device in other processes described in the embodiments of the present application.
  • the processing unit 1301 may communicate with other network entities through the communication unit 1302, for example, communication with the terminal shown in FIG. 4.
  • the processing unit 1301 may control the communication unit 1302 to perform sending and/or receiving actions.
  • the storage unit 1303 is used to store program codes and data of network devices.
  • the data transmission device 130 may be a network device or a chip in the network device.
  • the processing unit 1301 may be a processor or a processor core, and the communication unit 1302 is a communication interface of the chip.
  • the processing unit 1301 may be used to perform step 404 in FIG. 4, step 604 in FIG. 6, step 804 in FIG. 8, step 1003 and step 1005 in FIG. 10; the communication unit 1302 may be used for Step 401, step 601 in FIG. 6, step 801 in FIG. 8, or step 1001 in FIG.
  • the unit 1302 may also be used to receive the detected bearer after the determination by the processing unit 1301 after step 404 in FIG. 4, step 604 in FIG. 6, step 804 in FIG. 8, or step 1005 in FIG. 10 Data on domain resources.
  • the processing unit 1301 is used to control and manage the operation of the terminal.
  • the processing unit 1301 is used to support the terminal to perform steps 401 to 403 in FIG. 4, step 601 to step 603 in FIG. 6, step 801 to step 803 in FIG. 8, step 1001 in step 10, and step 1002 in FIG. Step 1004, and/or actions performed by the terminal in other processes described in the embodiments of the present application.
  • the processing unit 1301 may communicate with other network entities through the communication unit 1302, for example, communication with the network device shown in FIG. Specifically, the processing unit 1301 may control the communication unit 1302 to perform sending and/or receiving actions.
  • the storage unit 1303 is used to store program codes and data of the terminal.
  • the data transmission device 130 may be a terminal or a chip in the terminal.
  • the processing unit 1301 may be a processor or a processor core, and the communication unit 1302 is a communication interface of the chip.
  • the processing unit 1301 may be used to perform step 402 in FIG. 4, or step 602 in FIG. 6, or step 802 in FIG. 8, or step 1002 in FIG. 10; the communication unit 1302 may be used for Step 401, step 601 in FIG. 6, step 801 in FIG. 8, or step 1001 in FIG.
  • the communication unit 1302 can also be used to output the load determined by the processing unit 1301 in step 403 in FIG. 4, step 603 in FIG. 6, step 803 in FIG. 8, or step 1004 in FIG. 10. Data on time domain resources.
  • the processing unit 1301 may be a processor or a controller
  • the communication unit 1302 may be a communication interface, transceiver, transceiver, transceiver circuit, transceiver device, etc., wherein the communication interface It is a collective term and can include one or more interfaces.
  • the storage unit 1303 may be a memory.
  • the processing unit 1301 may be a processor or a controller, and the communication unit 1302 may be an input/output interface, pins, or circuits.
  • the storage unit 1303 may be a storage unit within the chip (eg, registers, cache, etc.), or a storage unit (eg, read-only memory, random access memory, etc.) located outside the chip in the terminal or network device.
  • the communication unit may also be called a transceiver unit.
  • the antenna and control circuit with the transceiver function in the data transmission device 130 can be regarded as the communication unit 1302 of the data transmission device 130, and the processor with the processing function can be regarded as the processing unit 1301 of the data transmission device 130.
  • the device for realizing the receiving function in the communication unit 1302 may be regarded as a receiving unit.
  • the receiving unit is used to perform the receiving step in the embodiment of the present application.
  • the receiving unit may be a receiver, a receiver, a receiving circuit, and the like.
  • the device used to implement the transmission function in the communication unit 1302 may be regarded as a transmission unit.
  • the transmission unit is used to perform the transmission steps in the embodiments of the present application.
  • the transmission unit may be a transmitter, a transmitter, a transmission circuit, or the like.
  • the integrated unit in FIG. 13 is implemented in the form of a software function module and sold or used as an independent product, it may be stored in a computer-readable storage medium.
  • the technical solutions of the embodiments of the present application may essentially be a part that contributes to the existing technology or all or part of the technical solutions may be embodied in the form of software products, and the computer software products are stored in a storage
  • the medium includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to execute all or part of the steps of the methods described in the embodiments of the present application.
  • Storage media for storing computer software products include: U disk, mobile hard disk, read-only memory (ROM), random access memory (random access memory, RAM), magnetic disk or optical disk, etc. can store program codes Medium.
  • the unit in the embodiment of the present application may also be called a module, for example, the processing unit may also be called a processing module.
  • the embodiment of the present application also provides a schematic diagram of the hardware structure of a terminal (denoted as terminal 140) and a network device (denoted as network device 150). See Figure 14 for details.
  • the terminal 140 includes at least one processor 1401 and at least one transceiver 1403. Optionally, at least one memory 1402 is also included. Optionally, the terminal 140 further includes at least one antenna 1404. Optionally, the terminal 140 further includes an output device 1405 and/or an input device 1406.
  • the processor 1401 is used to control and manage the operation of the terminal.
  • the processor 1401 is used to support the terminal to perform steps 401 to 403 in FIG. 4, step 601 to step 603 in FIG. 6, step 801 to step 803 in FIG. 8, step 1001 in FIG. 10, and step 1002 and Step 1004, and/or actions performed by the terminal in other processes described in the embodiments of the present application.
  • the processor 1401 may communicate with other network entities through the transceiver 1403, for example, with the network device shown in FIG. Specifically, the processor 1401 may control the transceiver 1403 to perform sending and/or receiving actions.
  • the memory 1402 is used to store program codes and data of the terminal.
  • the processor 1401, the memory 1402, and the transceiver 1403 are connected through a bus.
  • the processor 1401 may be a general-purpose central processing unit (central processing unit, CPU), microprocessor, application-specific integrated circuit (ASIC), or one or more used to control the execution of the program program of the application integrated circuit.
  • the processor 1401 may also include multiple CPUs, and the processor 1401 may be a single-CPU processor or a multi-CPU processor.
  • the processor here may refer to one or more devices, circuits, or processing cores for processing data (eg, computer program instructions).
  • the memory 1402 may be ROM or other types of static storage devices that can store static information and instructions, RAM, or other types of dynamic storage devices that can store information and instructions, or electrically erasable programmable read-only memory (electrically erasable programmable memory) read-only memory (EEPROM), read-only disc (compact disc read-only memory, CD-ROM) or other disc storage, disc storage (including compact discs, laser discs, discs, digital versatile discs, Blu-ray discs, etc.), magnetic disks
  • EEPROM electrically erasable programmable read-only memory
  • CD-ROM compact disc read-only memory
  • disc storage including compact discs, laser discs, discs, digital versatile discs, Blu-ray discs, etc.
  • magnetic disks The storage medium or other magnetic storage device, or any other medium that can be used to carry or store the desired program code in the form of instructions or data structures and can be accessed by the computer, is not limited in this embodiment of the present application.
  • the memory 1402 may exist independently, and is connected to the processor 1401 through a bus.
  • the memory 1402 may also be integrated with the processor 1401.
  • the memory 1402 may contain computer program code.
  • the processor 1401 is configured to execute the computer program code stored in the memory 1402, so as to implement the method provided in the embodiments of the present application.
  • the transceiver 1403 can use any device such as a transceiver for communicating with other devices or communication networks, such as Ethernet, RAN, WLAN, and so on.
  • the output device 1405 communicates with the processor 1401 and can display information in various ways.
  • the output device 1405 may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector. Wait.
  • the input device 1406 communicates with the processor 1401 and can receive user input in various ways.
  • the input device 1406 may be a mouse, keyboard, touch screen device, or sensor device.
  • the transceiver 1403 may include a transmitter 14031 and a receiver 14032.
  • the device used to implement the receiving function in the transceiver 1403 can be regarded as a receiver 14032, and the receiver 14032 is used to perform the terminal receiving step in the embodiment of the present application.
  • the device in the transceiver 1403 for implementing the transmission function may be regarded as a transmitter 14031, and the transmitter 14031 is used to perform the terminal transmission step in the embodiment of the present application.
  • the network device 150 includes at least one processor 1501 and at least one transceiver 1503. Optionally, at least one memory 1502 is also included. Optionally, the network device 150 further includes at least one antenna 1504.
  • the processor 1501 is used to control and manage the operation of the network device.
  • the processor 1501 is used to support the network device to perform steps 401 and 404 in FIG. 4, step 601 and step 604 in FIG. 6, step 801 and step 804 in FIG. 8, step 1001 and step 1003 in FIG. And step 1005, and/or actions performed by the network device in other processes described in the embodiments of the present application.
  • the processor 1501 may communicate with other network entities through the transceiver 1503, for example, with the terminal shown in FIG. 4. Specifically, the processor 1501 may control the transceiver 1503 to perform sending and/or receiving actions.
  • the memory 1502 is used to store program codes and data of network devices.
  • the processor 1501, the memory 1502, and the transceiver 1503 are connected through a bus.
  • the processor 1501, the memory 1502, and the transceiver 1503 reference may be made to the descriptions of the processor 1401, the memory 1402, and the transceiver 1403 in the terminal 140, and details are not described herein again.
  • the transceiver 1503 may include a transmitter 15031 and a receiver 15032.
  • the device used to implement the receiving function in the transceiver 1503 may be regarded as a receiver 15032, and the receiver 15032 is used to perform the steps of network device reception in the embodiments of the present application.
  • the device in the transceiver 1503 for implementing the transmission function may be regarded as a transmitter 15031, and the transmitter 15031 is used to perform the steps of network device transmission in the embodiments of the present application.
  • the processor may include a baseband processor and a central processor.
  • the baseband processor is mainly used to process communication protocols and communication data
  • the central processor is mainly used to process the entire
  • the device controls, executes the software program, and processes the data of the software program.
  • the processor integrates the functions of the baseband processor and the central processor.
  • the baseband processor and the central processor can also be separate processors, which are interconnected through a bus and other technologies.
  • the baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip.
  • the central processor can also be expressed as a central processing circuit or a central processing chip.
  • the function of processing the communication protocol and the communication data may be built in the processor, or may be stored in the storage unit in the form of a software program, and the processor executes the software program to realize the baseband processing function.
  • An embodiment of the present application also provides a computer-readable storage medium, including instructions, which when executed on a computer, causes the computer to perform any of the above methods.
  • Embodiments of the present application also provide a computer program product containing instructions, which when run on a computer, causes the computer to execute any of the above methods.
  • An embodiment of the present application also provides an apparatus, which exists in the form of a chip product.
  • the apparatus includes a processor, a memory, and a transceiver component.
  • the transceiver component includes an input and output circuit.
  • the memory is used to store computer-executed instructions.
  • the computer executes instructions stored in the memory to implement any of the above methods.
  • the execution subject that executes the method provided by the embodiments of the present application may be a chip.
  • An embodiment of the present application also provides a communication system, including: the above network device and a terminal.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a dedicated computer, a computer network, or other programmable devices.
  • Computer instructions can be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions can be transmitted from a website, computer, server, or data center via a wired (e.g.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more servers and data centers that can be integrated with the medium.
  • Usable media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, solid state disk (SSD)), etc.

Abstract

本申请提供了一种数据传输方法及装置,涉及通信技术领域。该方法包括:终端从网络设备接收用于配置多套时域资源对应的基础起始符号的第一资源配置信息和用于配置多套时域资源对应的起始符号偏移量的第二资源配置信息,并根据多套时域资源中的每套时域资源对应的基础起始符号和起始符号偏移量确定每套时域资源的起始符号,终端在多套时域资源中的至少一套时域资源上发送数据。多套时域资源为起始符号均不同的用于免授权传输的多套时域资源,从而使得终端可以选择时间上距离最近的一套时域资源发送到达的数据包,从而降低数据包的等待时延,提高数据传输效率。

Description

数据传输方法及装置
本申请要求于2019年01月11日提交国家知识产权局、申请号为201910028860.9、申请名称为“数据传输方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种数据传输方法及装置。
背景技术
免授权传输是一种“即来即走”的数据发送方法,也即,当终端需要向基站发送数据时,终端直接使用基站预先配置的传输资源以及传输参数向基站发送数据,而不需要先向基站发送调度请求以及等待基站发送的动态授权。相比于传统的基于“请求-授权”的上行传输方法,免授权传输具有降低信令开销、降低传输时延以及降低终端功耗等好处。
目前,基站针对每个服务小区为终端仅可以配置一套激活的免授权传输的时域资源,终端根据该套免授权传输的时域资源进行免授权传输。假设该套免授权传输的时域资源的周期(即免授权传输周期)为14个正交频分复用(orthogonal frequency division multiplexing,OFDM)符号,且终端在第1个免授权传输周期内所采用的时域资源包括OFDM符号#2至OFDM符号#9,若终端的数据包在第1个免授权传输周期中的OFDM符号#4到达,则终端只能在第2个免授权传输周期内的OFDM符号#2开始发送该数据包,会导致数据包的等待时延较长。现有的免授权传输的时域资源的配置无法满足终端快速发送数据包的要求。
发明内容
本申请提供了一种数据传输方法及装置,用于降低数据包的等待时延。
为达到上述目的,本申请提供了以下技术方案:
第一方面,提供了一种数据传输方法,包括:终端从网络设备接收用于配置N套时域资源对应的基础起始符号的第一资源配置信息和用于配置N套时域资源对应的起始符号偏移量的第二资源配置信息,并根据N套时域资源中的每套时域资源对应的基础起始符号和起始符号偏移量确定每套时域资源的起始符号,N套时域资源的起始符号均不同,终端在N套时域资源中的至少一套时域资源上发送数据,N套时域资源为终端进行免授权传输所采用的时域资源,N为大于1的整数。
第二方面,提供了一种数据传输方法,包括:网络设备向终端发送用于配置N套时域资源对应的基础起始符号的第一资源配置信息和用于配置N套时域资源对应的起始符号偏移量的第二资源配置信息,N套时域资源对应的基础起始符号和起始符号偏移量用于确定N套时域资源的起始符号,N套时域资源的起始符号均不同,网络设备在N套时域资源上检测数据,N套时域资源为终端进行免授权传输所采用的时域资源,N为大于1的整数。
第三方面,提供了一种数据传输装置,包括:通信单元和处理单元;所述通信单元,用于从网络设备接收第一资源配置信息和第二资源配置信息,所述第一资源配置信息用于配置N套时域资源对应的基础起始符号,所述第二资源配置信息用于配置所述N套时域资源对应的起始符号偏移量,所述N套时域资源为所述数据传输装置进行 免授权传输所采用的时域资源,N为大于1的整数;所述处理单元,用于根据所述N套时域资源中的每套时域资源对应的基础起始符号和起始符号偏移量确定每套时域资源的起始符号,所述N套时域资源的起始符号均不同;所述通信单元,还用于在所述N套时域资源中的至少一套时域资源上发送数据。
第四方面,提供了一种数据传输装置,包括:通信单元和处理单元;所述处理单元,用于生成第一资源配置信息和第二资源配置信息,所述第一资源配置信息用于配置N套时域资源对应的基础起始符号,所述第二资源配置信息用于配置所述N套时域资源对应的起始符号偏移量,所述N套时域资源对应的基础起始符号和起始符号偏移量用于确定所述N套时域资源的起始符号,所述N套时域资源的起始符号均不同,所述N套时域资源为所述终端进行免授权传输所采用的时域资源,N为大于1的整数;所述通信单元,用于发送所述第一资源配置信息和所述第二资源配置信息,并在所述N套时域资源上检测数据。
第一方面和第二方面提供的方法,或者,第三方面和第四方面提供的装置中,网络设备为终端配置了多套时域资源,从而使得终端可以选择时间上距离最近的一套时域资源发送到达的数据包。该实施例中网络设备为终端配置的多套时域资源可以满足终端快速发送数据包的要求,从而降低数据包的等待时延,提高数据传输效率。
结合第一方面和/或第二方面提供的方法,和/或,结合第三方面和/或第四方面提供的装置,在一种可能的实现方式中,第一资源配置信息还用于配置N套时域资源的符号长度,N套时域资源的符号长度均相同。该种可能的实现方式,N套时域资源的符号长度相同,可以使得N套时域资源实现相似的传输性能,从而服务同一种业务类型的数据包,提高数据包的传输效率。
结合第一方面和/或第二方面提供的方法,和/或,结合第三方面和/或第四方面提供的装置,在一种可能的实现方式中,N套时域资源对应的基础起始符号均相同。
结合第一方面和/或第二方面提供的方法,和/或,结合第三方面和/或第四方面提供的装置,在一种可能的实现方式中,第二资源配置信息携带在无线资源控制(radio resource control,RRC)信令中。该种可能的实现方式,在第二资源配置信息携带在RRC信令中时,可以避免增加下行控制信息(downlink control information,DCI)的开销。
结合第一方面和/或第二方面提供的方法,和/或,结合第三方面和/或第四方面提供的装置,在一种可能的实现方式中,第一资源配置信息包括时隙偏置信息和起始符号指示信息,时隙偏置信息和起始符号指示信息用于配置N套时域资源的基础起始符号。
第五方面,提供了一种数据传输方法,包括:终端从网络设备接收第一资源配置信息和第二资源配置信息,所述第一资源配置信息用于配置N套时域资源对应的基础符号长度,所述第二资源配置信息用于配置所述N套时域资源对应的符号长度偏移量,所述N套时域资源为所述终端进行免授权传输所采用的时域资源,所述N套时域资源的起始符号均不同,N为大于1的整数;所述终端根据所述N套时域资源中的每套时域资源对应的基础符号长度和符号长度偏移量确定每套时域资源的符号长度;所述终端在所述N套时域资源中的至少一套时域资源上发送数据。
第六方面,提供了一种数据传输方法,包括:网络设备向终端发送第一资源配置 信息和第二资源配置信息,所述第一资源配置信息用于配置N套时域资源对应的基础符号长度,所述第二资源配置信息用于配置所述N套时域资源对应的符号长度偏移量,所述N套时域资源对应的基础符号长度和符号长度偏移量用于确定所述N套时域资源的符号长度,所述N套时域资源的起始符号均不同,所述N套时域资源为所述终端进行免授权传输所采用的时域资源,N为大于1的整数;所述网络设备在所述N套时域资源上检测数据。
第七方面,提供了一种数据传输装置,包括:通信单元和处理单元;所述通信单元,用于从网络设备接收第一资源配置信息和第二资源配置信息,所述第一资源配置信息用于配置N套时域资源对应的基础符号长度,所述第二资源配置信息用于配置所述N套时域资源对应的符号长度偏移量,所述N套时域资源为所述数据传输装置进行免授权传输所采用的时域资源,所述N套时域资源的起始符号均不同,N为大于1的整数;所述处理单元,用于根据所述N套时域资源中的每套时域资源对应的基础符号长度和符号长度偏移量确定每套时域资源的符号长度;所述通信单元,还用于在所述N套时域资源中的至少一套时域资源上发送数据。
第八方面,提供了一种数据传输装置,包括:通信单元和处理单元;所述处理单元,用于生成第一资源配置信息和第二资源配置信息,所述第一资源配置信息用于配置N套时域资源对应的基础符号长度,所述第二资源配置信息用于配置所述N套时域资源对应的符号长度偏移量,所述N套时域资源对应的基础符号长度和符号长度偏移量用于确定所述N套时域资源的符号长度,所述N套时域资源的起始符号均不同,所述N套时域资源为所述终端进行免授权传输所采用的时域资源,N为大于1的整数;所述通信单元,用于发送所述第一资源配置信息和所述第二资源配置信息,并在所述N套时域资源上检测数据。
第五方面和第六方面提供的方法,或者,第七方面和第八方面提供的装置中,网络设备为终端配置了多套时域资源,从而使得终端可以选择时间上距离最近的一套时域资源发送到达的数据包。该实施例中网络设备为终端配置的多套时域资源可以满足终端快速发送数据包的要求,从而降低数据包的等待时延,提高数据传输效率。
结合第五方面和/或第六方面提供的方法,和/或,结合第七方面和/或第八方面提供的装置,在一种可能的实现方式中,所述第一资源配置信息还用于配置所述N套时域资源的起始符号。
结合第五方面和/或第六方面提供的方法,和/或,结合第七方面和/或第八方面提供的装置,在一种可能的实现方式中,所述第二资源配置信息携带在RRC信令中。该种可能的实现方式,在第二资源配置信息携带在RRC信令中时,可以避免增加DCI的开销。
结合第五方面和/或第六方面提供的方法,和/或,结合第七方面和/或第八方面提供的装置,在一种可能的实现方式中,所述第一资源配置信息包括时隙偏置信息、起始符号指示信息和基础符号长度指示信息,所述时隙偏置信息和所述起始符号指示信息用于配置所述N套时域资源的起始符号,所述基础符号长度指示信息用于配置所述N套时域资源的基础符号长度。
结合第五方面和/或第六方面提供的方法,和/或,结合第七方面和/或第八方面提 供的装置,在一种可能的实现方式中,所述N套时域资源的符号长度均相同。该种可能的实现方式,N套时域资源的符号长度相同,可以使得N套时域资源实现相似的传输性能,从而服务同一种业务类型的数据包,提高数据包的传输效率。
第九方面,提供了一种数据传输方法,包括:终端从网络设备接收资源配置信息和解调参考信号(de-modulation reference signal,DMRS)配置信息,所述资源配置信息用于配置第一时域资源的起始符号和符号长度,所述DMRS配置信息用于配置所述第一时域资源的DMRS在所述第一时域资源中占用的符号;所述终端根据所述资源配置信息和所述DMRS配置信息确定第二时域资源,所述第二时域资源的起始符号为所述第一时域资源的DMRS在所述第一时域资源中所占用的符号;其中,所述第二时域资源为所述终端进行免授权传输所采用的时域资源;所述终端在所述第二时域资源上发送数据。
第十方面,提供了一种数据传输方法,包括:网络设备根据第一时域资源的符号长度和所述第一时域资源的DMRS在所述第一时域资源中占用的符号确定第二时域资源;所述第二时域资源的起始符号为所述第一时域资源的DMRS在所述第一时域资源中所占用的符号,所述第二时域资源为所述终端进行免授权传输所采用的时域资源;所述网络设备在所述第二时域资源上检测数据。
第十一方面,提供了一种数据传输装置,包括:通信单元和处理单元;所述通信单元,用于从网络设备接收资源配置信息和DMRS配置信息,所述资源配置信息用于配置第一时域资源的起始符号和符号长度,所述DMRS配置信息用于配置所述第一时域资源的DMRS在所述第一时域资源中占用的符号;所述处理单元,用于根据所述资源配置信息和所述DMRS配置信息确定第二时域资源,所述第二时域资源的起始符号为所述第一时域资源的DMRS在所述第一时域资源中所占用的符号;其中,所述第二时域资源为所述数据传输装置进行免授权传输所采用的时域资源;所述通信单元,还用于在所述第二时域资源上发送数据。
第十二方面,提供了一种数据传输装置,包括:通信单元和处理单元;所述处理单元,用于根据第一时域资源的符号长度和所述第一时域资源的DMRS在所述第一时域资源中占用的符号确定第二时域资源;所述第二时域资源的起始符号为所述第一时域资源的DMRS在所述第一时域资源中所占用的符号,所述第二时域资源为所述终端进行免授权传输所采用的时域资源;所述处理单元,还用于采用所述通信单元在所述第二时域资源上检测数据。
第九方面和第十方面提供的方法,或者,第十一方面和第十二方面提供的装置中,网络设备为终端配置了多套时域资源,从而使得终端可以选择时间上距离最近的一套时域资源发送到达的数据包。该实施例中网络设备为终端配置的多套时域资源可以满足终端快速发送数据包的要求,从而降低数据包的等待时延,提高数据传输效率。
结合第九方面和/或第十方面提供的方法,和/或,结合第十一方面和/或第十二方面提供的装置,在一种可能的实现方式中,所述第二时域资源的符号长度与所述第一时域资源的符号长度相同。
第十三方面,提供了一种数据传输装置,该数据传输装置包括:处理器;可选的,还包括存储器、至少一个通信接口和通信总线中的一个或多个;存储器用于存储计算 机执行指令,处理器、存储器和至少一个通信接口通过通信总线连接,处理器执行存储器存储的计算机执行指令,以使数据传输装置实现第一方面、第二方面、第五方面、第六方面、第九方面和第十方面中的任一方面提供的任意一种方法。该装置可以以芯片的产品形态存在。
第十四方面,提供了一种通信系统,包括:第三方面和第四方面提供的数据传输装置;或者,第七方面和第八方面提供的数据传输装置;或者,第十一方面和第十二方面提供的数据传输装置。
第十五方面,提供了一种计算机可读存储介质,包括指令,当该指令在计算机上运行时,使得计算机执行第一方面、第二方面、第五方面、第六方面、第九方面和第十方面中的任一方面提供的任意一种方法。
第十六方面,提供了一种包含指令的计算机程序产品,当该指令在计算机上运行时,使得计算机执行第一方面、第二方面、第五方面、第六方面、第九方面和第十方面中的任一方面提供的任意一种方法。
第十三方面至第十六方面中的任一种设计方式所带来的技术效果可参见第一方面至第十二方面中对应设计方式所带来的技术效果,此处不再赘述。
其中,需要说明的是,上述各个方面中的任意一个方面的各种可能的实现方式,在方案不矛盾的前提下,均可以进行组合。
附图说明
图1为本申请实施例提供的一种网络应用场景示意图;
图2为本申请实施例提供的一种免授权传输的时域资源的示意图;
图2A为本申请实施例提供的一种免授权传输周期与免授权传输的时域资源的位置示意图;
图3为本申请实施例提供的一种免授权传输的时域资源的示意图;
图4、图6、图8和图10分别为本申请实施例提供的一种数据传输方法的流程图;
图5、图7、图9、图11和图12分别为本申请实施例提供的一种免授权传输的时域资源的示意图;
图13为本申请实施例提供的一种数据传输装置的组成示意图;
图14为本申请实施例提供的一种网络设备和终端的硬件结构示意图。
具体实施方式
在本申请的描述中,除非另有说明,“/”表示“或”的意思,例如,A/B可以表示A或B。本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。此外,“至少一个”是指一个或多个,“多个”是指两个或两个以上。“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。
需要说明的是,本申请中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其他实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。
本申请实施例提供的技术方案可以应用于各种通信系统。例如,长期演进(long  term evolution,LTE)通信系统,采用第五代(5th generation,5G)通信技术的新空口(new radio,NR)通信系统,未来演进系统或者多种通信融合系统等等。
本申请实施例提供的技术方案可以应用于多种通信场景。例如,机器对机器(machine to machine,M2M)、宏微通信、增强型移动宽带(enhanced mobile broadband,eMBB)、超高可靠超低时延通信(ultra-reliable & low latency communication,URLLC)以及海量物联网通信(massive machine type communication,mMTC)等场景。本申请实施例提供的技术方案应用的传输场景包括但不限于半静态调度(semi-persistent scheduling,SPS)、免授权、免调度、免动态调度、免动态授权以及高层配置等传输场景。这些通信场景和传输场景中的通信主体可以包括但不限于:通信设备与通信设备(例如,终端与终端),网络设备与网络设备(例如,基站与基站),网络设备与通信设备(例如,基站与终端)之间的通信场景等。
本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定。本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
图1给出了本申请提供的技术方案所适用的一种通信系统示意图。该通信系统可以包括至少一个网络设备(图1中仅示出了1个)和至少一个终端(图1中示出了6个,分别为终端1至终端6)。终端1至终端6中的一个或多个终端可以与网络设备通信,从而传输数据(上行数据和/或下行数据)和/或配置信息。此外,终端4至终端6也可以组成一个本申请提供的技术方案所适用的另一个通信系统,此时配置信息(例如,下文实施例一至实施例三中的第一资源配置信息和/或第二资源配置信息,或者,下文实施例四中的资源配置信息和DMRS配置信息)。该情况下,发送实体和接收实体都是终端。例如,在车联网系统中,终端1向终端2发送配置信息,并且接收终端2发送的数据,而终端2接收终端1发送的配置信息,并向终端1发送数据。
为了方便描述,下文中均是以本申请实施例提供的技术方案应用于网络设备和终端之间为例进行说明的。可以理解的是,当本申请实施例提供的技术方案应用于两个终端(记为终端A和终端B)之间时,下文中实施例一至实施例四中的网络设备替换为终端A,终端替换为终端B即可。
网络设备为网络侧的一种用于发送或接收信号的实体。网络设备可以为部署在无线接入网(radio access network,RAN)中为终端提供无线通信功能的装置,例如可以为基站。网络设备可以为各种形式的宏基站,微基站(也称为小站),中继站,接入点(access point,AP)等,也可以包括各种形式的控制节点,如网络控制器。所述控制节点可以连接多个基站,并为所述多个基站覆盖下的多个终端配置资源。在采用不同的无线接入技术的系统中,具备基站功能的设备的名称可能会有所不同。例如,全球移动通信系统(global system for mobile communication,GSM)或码分多址(code division multiple access,CDMA)网络中可以称为基站收发信台(base transceiver station,BTS),宽带码分多址(wideband code division multiple access,WCDMA)中可以称为基站(NodeB),LTE系统中可以称为演进型基站(evolved NodeB,eNB或eNodeB),5G通信系统或NR通信系统中可以称为下一代基站节点(next generation node base  station,gNB),本申请对基站的具体名称不作限定。网络设备还可以是云无线接入网络(cloud radio access network,CRAN)场景下的无线控制器、未来演进的公共陆地移动网络(public land mobile network,PLMN)网络中的网络设备、传输接收节点(transmission and reception point,TRP)等。
终端用于向用户提供语音和/或数据连通性服务,终端是用户侧的一种用于接收或发送信号的实体。终端还可以称为用户设备(user equipment,UE)、终端设备、接入终端、用户单元、用户站、移动站、远方站、远程终端、移动设备、用户终端、无线通信设备、用户代理或用户装置。终端可以是移动站(mobile station,MS)、用户单元(subscriber unit)、无人机、物联网(internet of things,IoT)设备、无线局域网(wireless local area networks,WLAN)中的站点(station,ST)、蜂窝电话(cellular phone)、智能电话(smart phone)、无绳电话、无线数据卡、平板型电脑、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)设备、膝上型电脑(laptop computer)、机器类型通信(machine type communication,MTC)终端、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备(也可以称为穿戴式智能设备)。终端还可以为下一代通信系统中的终端,例如,5G通信系统中的终端或者未来演进的PLMN中的终端,NR通信系统中的终端等。
为了便于理解本申请,此处对本申请实施例涉及到的部分概念作简单介绍。
1、时隙
在NR中,对于常规(normal)循环前缀(cyclic prefix,CP),1个时隙包含14个OFDM符号。对于扩展(extended)CP,1个时隙包含12个OFDM符号。
为了便于描述,在本申请实施例中,若未作出特别说明,1个时隙包含14个OFDM符号。本申请实施例中的起始符号即物理上行共享信道(physical uplink shared channel,PUSCH)中第一个OFDM符号。
在时隙中,14个OFDM符号按照从小到大的顺序依次编号,最小的编号为0,最大的编号为13。本申请实施例中将索引(即编号)为i的OFDM符号记为OFDM符号#i,则一个时隙包含OFDM符号#0至OFDM符号#13。另外,本申请下文中将索引(即编号)为j的时隙记为时隙#j。j为大于等于0的整数,i为大于等于0小于等于13的整数。
2、免授权传输
免授权传输是指:终端的上行传输不需要通过网络设备的调度完成。具体地,当上行数据到达(本申请实施例中的数据包到达是指数据已经处理好,可以进行发送)时,终端不需要向网络设备发送调度请求(scheduling request,SR)并等待网络设备的动态授权(dynamic grant),而是可以直接使用网络设备预先分配的传输资源和指定的传输参数向网络设备发送上行数据。
免授权传输分为两类:基于第一类配置授权的PUSCH传输(type 1PUSCH transmission with a configured grant,或,type 1 configured grant configuration,或type 1 configured grant PUSCH transmission)和基于第二类配置授权的PUSCH传输(type 2 PUSCH transmission with a configured grant,或,type 2configured grant configuration, 或,type 2 configured grant PUSCH transmission)。
基于第一类配置授权的PUSCH传输的配置方式为:网络设备通过高层参数(例如ConfiguredGrantConfig)为终端配置全部的传输资源和传输参数。例如:时域资源的周期、开环功控相关参数、波形、冗余版本(redundancy version,RV)序列、重复次数、跳频模式、资源分配类型、混合自动重传请求(hybrid automatic repeat request,HARQ)进程数、DMRS相关参数、调制编码方案(modulation and coding scheme,MCS)表格、资源块组(resource block group,RBG)大小、以及时域资源、频域资源、MCS等在内的全部传输资源和传输参数。
基于第二类配置授权的PUSCH传输的配置方式分为以下两步:首先,网络设备通过高层参数(例如ConfiguredGrantConfig)向终端配置部分传输资源和传输参数。例如:时域资源的周期、开环功控相关参数、波形、RV序列、重复次数、跳频模式、资源分配类型、HARQ进程数、DMRS相关参数、MCS表格、RBG大小。之后,网络设备向终端发送DCI(例如configuration-specific DCI),以使得终端激活基于第二类配置授权的PUSCH传输,并同时配置包括时域资源、频域资源、DMRS相关参数、MCS等在内的传输资源和传输参数。需要说明的是,该第二类配置授权的PUSCH传输在被激活后才能使用。
在一实施方式中,第一类配置授权的PUSCH传输的配置参数和第二类配置授权的PUSCH传输的配置参数可以参考标准3GPP TS38.331中的相关部分,此处不再赘述。
3、灵活起始
灵活起始是本申请实施例定义的一个概念。若终端被使能灵活起始,则在一个免授权传输周期中,免授权传输的时域资源中的多个OFDM符号可以作为PUSCH的时域资源的起始符号。若终端未被使能灵活起始,则在一个免授权传输周期中,免授权传输的时域资源中的第一个OFDM符号作为PUSCH的时域资源的起始符号。
可以理解的是,在终端被使能灵活起始的情况下,若终端的数据包的到达时刻错过当前免授权传输周期中免授权传输的时域资源的第一个OFDM符号,则终端的数据包无需等到下一个免授权传输周期中免授权传输的时域资源的第一个OFDM符号,而是可以在当前免授权传输周期中免授权传输的时域资源的其他OFDM符号上开始发送该数据。
以图2为例进行说明,假设在免授权传输周期1中,免授权传输的时域资源包含时隙#1中的OFDM符号#2至OFDM符号#9。在免授权传输周期2中,免授权传输的时域资源包含时隙#1中的OFDM符号#10至OFDM符号#13,以及时隙#2中的OFDM符号#0至OFDM符号#3。在终端被使能灵活起始的情况下,免授权传输周期1中的OFDM符号#2、OFDM符号#5以及OFDM符号#7可作为PUSCH的时域资源的起始符号。若终端的数据包在OFDM符号#4到达,则终端可以在OFDM符号#5开始发送该数据包,而不是等待到OFDM符号#10再发送该数据包。这样一来,数据包的等待时延从6个OFDM符号减少到1个OFDM符号。可见,终端被使能灵活起始,可以有效降低数据包的等待时延。
4、DMRS
DMRS用于实现PUSCH的解调。DMRS承载于PUSCH中的部分OFDM符号上。 另外,网络设备会配置PUSCH中靠前位置的OFDM符号承载前置(Front-load)DMRS。
PUSCH包括两种映射类型(Mapping Type),分别为:Mapping Type A和Mapping Type B。
其中,对于Mapping Type A,Front-load DMRS位于时隙中第3个OFDM符号,或者位于时隙中第3个OFDM符号和第4个OFDM符号。
对于Mapping Type B,Front-load DMRS位于PUSCH中的第1个OFDM符号,或者PUSCH中的第1个OFDM符号和第2个OFDM符号。例如,PUSCH的时域资源包含时隙中的OFDM符号#5至OFDM符号#12,则Front-load DMRS位于时隙中的OFDM符号#5,或者时隙中的OFDM符号#5和OFDM符号#6。
Front-load DMRS可以借助梳状频分、不同的时域正交覆盖码(orthogonal cover code,OCC)、不同的频域OCC,不同的循环移位(Cyclic Shift,CS)等方式,支持多个正交DMRS端口,例如3GPP R15协议中最多可以支持4个、8个、6个或12个正交DMRS端口。可以理解的是,对于共用相同时频资源的多个终端,网络设备可以为这些终端配置正交的DMRS(例如配置不同的正交DMRS端口),网络设备通过检测DMRS来识别不同的终端。
另外,为了支持高速场景,还可以在Front-load DMRS基础上配置附加(Additional)DMRS。Additional DMRS的配置(例如,使用的梳状频分、时域OCC、频域OCC,CS等)与Front-load DMRS相同。Additional DMRS一般位于Front-load DMRS的后面,可以用来提高信道估计的性能。例如,R15中,当Front-load DMRS为单符号时,可以配置1至3个OFDM符号的Additional DMRS;当Front-load DMRS为两符号时,可以配置2个OFDM符号的Additional DMRS。Additional DMRS具体位于时隙或PUSCH的哪些OFDM符号上,可以由网络设备配置或协议约定。
其中,Front-load DMRS和Additional DMRS均用于网络设备的用户检测和信道估计等。
5、免授权传输周期
免授权传输周期用于表征免授权传输的时域资源在时域上重复出现的规律。免授权传输周期的时间长度以OFDM符号或者时隙为单位。其中,一个免授权传输周期的时间长度是指一个免授权传输周期包括的OFDM符号的数目,或者,一个免授权传输周期包括的时隙的数目。
免授权传输周期的时间长度大于或等于免授权传输的时域资源的时间长度,一个免授权传输周期的起始符号为该免授权传输周期中的免授权传输的时域资源的起始符号。示例性的,参见图2A,免授权传输周期1中的免授权传输的时域资源为免授权传输的时域资源1,免授权传输周期2中的免授权传输的时域资源为免授权传输的时域资源2。
6、一套免授权传输的时域资源
通过一套免授权传输的配置参数配置的免授权传输的时域资源可以称为一套免授权传输的时域资源。
针对Type 1configured grant(即基于第一类配置授权的PUSCH传输),一套免授权传输的配置参数包括周期参数,时域资源分配参数和时域偏置参数。其中,周期 参数用于配置免授权传输周期。时域资源分配参数用于配置免授权传输的时域资源的起始符号、符号长度和PUSCH的Mapping Type。时域偏置参数用于配置免授权传输的时域资源所在的时隙,具体可以通过timeDomainOffset参数配置。其中,本申请实施例中的符号长度也可以称为符号数量,为用于发送一个PUSCH的时域资源的时域长度。
针对Type 2configured grant(即基于第二类配置授权的PUSCH传输),一套免授权传输的配置参数包括周期参数和时域资源分配参数。其中,周期参数用于配置免授权传输周期。时域资源分配参数用于配置免授权传输的时域资源的起始符号、符号长度、PUSCH的Mapping Type和时隙偏置(即K 2,K 2的具体解释可参见下文)。
为了使得本申请实施例更加的清楚,首先对现有技术中的免授权传输的时域资源的配置作简单介绍:
目前,网络设备通过RRC信令为终端配置至多16种免授权传输的时域资源分配参数的组合(以下简称组合),一套免授权传输的时域资源使用其中一种组合。每种组合包括如下参数配置:PUSCH mapping type、K 2、起始和长度指示值(start and length indicator value,SLIV)。
其中,PUSCH mapping type为mapping typeA或者mapping typeB。K 2用于配置PUSCH所在的时隙相比调度该PUSCH的DCI所在时隙的偏置,例如,调度PUSCH的DCI所在的时隙为n,则PUSCH传输的时隙为n+K 2。SLIV用于配置PUSCH的起始符号S和符号长度L,S和L满足如下表1的限定。
表1
Figure PCTCN2020071244-appb-000001
如果网络设备没有通过RRC信令配置任何组合,则终端使用如下表2所示的默认的16种组合。表2中的j的值为1、2或3。
表2
Figure PCTCN2020071244-appb-000002
Figure PCTCN2020071244-appb-000003
在终端获知通过RRC信令配置的或默认的16种组合的基础上,对于Type 1 configured grant,网络设备通过RRC信令(例如,RRC信令中的timeDomainAllocation参数)向终端指示16种组合中的一种组合,由于Type 1 configured grant有专门的RRC参数(例如,timeDomainOffset)指示时隙偏置,这种情况下,终端根据timeDomainOffset确定免授权传输资源的起始时隙,例如,当timeDomainOffset所指示的值为100时,终端确定免授权传输资源起始于时隙#100。因此,对于Type 1 configured grant,终端不使用组合中的K 2。对于Type 2 configured grant,网络设备通过DCI(例如,DCI中的Time domain resource assignment字段)向终端指示16种组合中的一种组合,这种情况下,终端根据组合中的K 2确定免授权传输资源的起始时隙,例如,若K 2所指示的值为16时,终端确定免授权传输资源起始于时隙#(n+K 2),其中,n为终端收到DCI的时隙索引。
示例性的,若网络设备通过SLIV向终端指示S=2、L=9时,如图3所示,PUSCH起始于时隙的OFDM符号#2,终止于同一时隙的OFDM符号#10。
考虑到数据包的随机到达特点,为减少数据包到达后的等待时延。本申请实施例提供了实施例一至实施例四所示的数据传输方法。以下对实施例一至实施例四所提供的方法分别进行说明。
实施例一
该实施例提供了一种数据传输方法,如图4所示,该方法包括:
401、网络设备向终端发送第一资源配置信息和第二资源配置信息,相应的,终端从网络设备接收第一资源配置信息和第二资源配置信息。
其中,第一资源配置信息用于配置N套时域资源对应的基础起始符号,第二资源配置信息用于配置N套时域资源对应的起始符号偏移量,N套时域资源对应的基础起始符号和起始符号偏移量用于确定N套时域资源的起始符号,N套时域资源的起始符号均不同,N套时域资源为终端进行免授权传输所采用的时域资源,N为大于1的整数。
其中,N套时域资源可以是用于PUSCH传输的时域资源。
可选的,第一资源配置信息包括时隙偏置信息和起始符号指示信息,时隙偏置信息和起始符号指示信息用于配置N套时域资源的基础起始符号。
其中,第一资源配置信息中可以包括N套时域资源对应的时隙偏置信息和N套时域资源对应的起始符号指示信息。一个时域资源对应的时隙偏置信息用于配置该时域资源的基础起始符号所在的时隙,一个时域资源对应的起始符号指示信息用于配置该时域资源的基础起始符号的索引。
将N套时域资源中的第一时域资源的基础起始符号的索引记为S 0。具体的,S 0可以通过SLIV指示,也可以通过资源索引指示,该资源索引对应的资源中包括S 0的信息。示例性的,该资源索引可以为表2中的Row index,S 0可以为表2中的S。第一时域资源可以为N套时域资源中的任意一套时域资源。其中,资源索引具体可以通过RRC信令中的timeDomainAllocation参数或DCI中的Time domain resource assignment字段指示。
第一时域资源对应的时隙偏置信息和起始符号指示信息可以用于终端确定第一时域资源的基础起始符号。一种可能的实现方式,第一时域资源的基础起始符号可以为时隙#(n+K 2)中的OFDM符号#S 0,此时,K 2为时隙偏置,n为用于配置第一时域资源的DCI所在的时隙的索引,该情况下,时隙偏置信息可以携带在DCI中。另一种可能的实现方式,第一时域资源的基础起始符号可以位于索引为timeDomainOffset指示的索引的时隙中的OFDM符号#S 0,此时,timeDomainOffset为时隙偏置,该情况下,时隙偏置信息可以携带在RRC信令中。
可选的,N套时域资源对应的基础起始符号均相同。该情况下,时隙偏置信息指示的N套时域资源对应的时隙偏置均相同,起始符号指示信息指示的N套时域资源对应的起始符号的索引均相同。则第一资源配置信息中可以包括一个时隙偏置信息和一个起始符号指示信息。则在该可选的方法下,实施例一中是通过起始符号偏移量使得N套时域资源的起始符号均不同的。起始符号偏移量的值为整数,可以大于0、等于0或小于0,本申请实施例对此不作具体限定。
第一资源配置信息和/或第二资源配置信息可以携带在RRC信令或介质接入控制(medium access control,MAC)控制元素(MAC control element,MAC CE)信令或DCI中。在第二资源配置信息携带在RRC信令中时,可以避免增加DCI的开销。第二资源配置信息与第一资源配置信息可以在同一条信令中,也可以在不同的信令中。
402、终端根据N套时域资源中的每套时域资源对应的基础起始符号和起始符号偏移量确定每套时域资源的起始符号。
若将第一时域资源的起始符号的索引记为S',将第一时域资源对应的起始符号偏移量记为S offset,则在一种可能的实现方式中,S'=S 0+S offset。需要说明的是,该实施例仅仅提供了一种确定第一时域资源的起始符号的方法,在具体实现时,其他计算方法(例如,减法运算)也可以应用到该实施方式中,该实施例中不再一一举例说明。
可选的,第一资源配置信息还用于配置N套时域资源的符号长度。该情况下,第一资源配置信息还包括符号长度指示信息,符号长度指示信息用于配置N套时域资源的符号长度。终端可以根据符号长度指示信息确定N套时域资源的符号长度。
其中,将第一时域资源的符号长度记为L。L可以通过SLIV指示,也可以通过资源索引指示,该资源索引对应的资源中包括L的信息。示例性的,该资源索引可以为表2中的Row index,L可以为表2中的L。
可选的,N套时域资源的符号长度均相同,则第一资源配置信息中可以包括一个符号长度指示信息。N套时域资源的符号长度相同,可以使得N套时域资源实现相似的传输性能,从而服务同一种业务类型的数据包,提高数据包的传输效率。
假设第一时域资源的基础起始符号所在的时隙为时隙#m。若第一时域资源对应的 S 0和第一时域资源对应的S offset的和大于等于0小于等于14,则第一时域资源起始于时隙#m中的OFDM符号#S’。该情况下,若S’+L小于等于14,则第一时域资源结束于时隙#m中的OFDM符号#(S’+L-1),若S’+L大于14,则第一时域资源结束于时隙#(m+1)的OFDM符号#((S’+L)mod15)。若第一时域资源对应的S 0和第一时域资源对应的S offset的和大于14,则第一时域资源起始于时隙#(m+1)的OFDM符号#((S’+L)mod15)。该情况下,若(S’+L)mod15+L小于等于14,则第一时域资源结束于时隙#(m+1)中的OFDM符号#((S’+L)mod15+L-1)。若(S’+L)mod15+L大于14,则第一时域资源结束于时隙#(m+2)中的OFDM符号#(((S’+L)mod15+L)mod15)。
403、终端在N套时域资源中的至少一套时域资源上发送数据。
步骤403在具体实现时,示例性的,当数据包到达时,终端可以在N套时域资源中选择时间上距离最近的一套时域资源进行数据传输,从而可以降低数据包的等待时延,提高数据传输效率。
404、网络设备在N套时域资源上检测数据。
实施例一提供的方法,网络设备为终端配置了多套时域资源,从而使得终端可以选择时间上距离最近的一套时域资源发送到达的数据包。该实施例中网络设备为终端配置的多套时域资源可以满足终端快速发送数据包的要求,从而降低数据包的等待时延,提高数据传输效率。
以下以一个具体的示例对实施例一提供的方法作示例性说明。假设N=4、且4套时域资源的基础起始符号所在的时隙均为时隙#m,第一资源配置信息配置4套时域资源分别对应的SLIV,第二资源配置信息配置4套时域资源分别对应的起始符号偏移量,终端根据SLIV和起始符号偏移量确定4套时域资源的S'和L。示例性的,如图5所示,假设SLIV指示的4套时域资源的基础起始符号的索引S 0均为2,SLIV指示的4套时域资源对应的L均为8,第1套时域资源对应的起始符号偏移量为-2,则第1套时域资源包括时隙#m中的OFDM符号#0至OFDM符号#7,第2套时域资源对应的起始符号偏移量为0,则第2套时域资源包括时隙#m中的OFDM符号#2至OFDM符号#9,第3套时域资源对应的起始符号偏移量为2,则第3套时域资源包括时隙#m中的OFDM符号#4至OFDM符号#11,第4套时域资源对应的起始符号偏移量为4,则第4套时域资源包括时隙#m中的OFDM符号#6至OFDM符号#13。
实施例二
该实施例提供了一种数据传输方法,如图6所示,包括:
601、网络设备向终端发送第一资源配置信息和第二资源配置信息,相应的,终端从网络设备接收第一资源配置信息和第二资源配置信息。
其中,第一资源配置信息用于配置N套时域资源对应的基础符号长度,第二资源配置信息用于配置N套时域资源对应的符号长度偏移量,N套时域资源对应的基础符号长度和符号长度偏移量用于确定N套时域资源的符号长度,N套时域资源的起始符号均不同,N套时域资源为终端进行免授权传输所采用的时域资源,N为大于1的整数。
其中,N套时域资源可以是用于PUSCH传输的时域资源。
可选的,第一资源配置信息还用于配置N套时域资源的起始符号。
可选的,第一资源配置信息包括时隙偏置信息、起始符号指示信息和基础符号长度指示信息,时隙偏置信息和起始符号指示信息用于配置N套时域资源的起始符号,基础符号长度指示信息用于配置N套时域资源的基础符号长度。
其中,第一资源配置信息中可以包括N套时域资源对应的时隙偏置信息和N套时域资源对应的起始符号指示信息。一个时域资源对应的时隙偏置信息用于配置该时域资源的起始符号所在的时隙,一个时域资源对应的起始符号指示信息用于配置该时域资源的起始符号的索引。
将N套时域资源中的第一时域资源的起始符号的索引记为S,基础符号长度记为L,则S和L可以通过SLIV指示,也可以通过资源索引指示,该资源索引对应的资源中包括S和L的信息。示例性的,该资源索引可以为表2中的Row index,S可以为表2中的S,L为表2中的L。第一时域资源可以为N套时域资源中的任意一套时域资源。其中,资源索引具体可以通过RRC信令中的timeDomainAllocation参数或DCI中的Time domain resource assignment字段指示。
第一时域资源对应的时隙偏置信息和起始符号指示信息可以用于终端确定第一时域资源的起始符号。一种可能的实现方式,第一时域资源的起始符号可以为时隙#(n+K 2)中的OFDM符号#S,此时,K 2为时隙偏置,n为用于配置第一时域资源的DCI所在的时隙的索引,该情况下,时隙偏置信息可以携带在DCI中。另一种可能的实现方式,第一时域资源的起始符号可以位于索引为timeDomainOffset指示的索引的时隙中的OFDM符号#S,此时,timeDomainOffset为时隙偏置,该情况下,时隙偏置信息可以携带在RRC信令中。
第一资源配置信息和/或第二资源配置信息可以携带在RRC信令或MAC CE信令或DCI中。在第二资源配置信息携带在RRC信令中时,可以避免增加DCI的开销。第二资源配置信息与第一资源配置信息可以在同一条信令中,也可以在不同的信令中。
602、终端根据N套时域资源中的每套时域资源对应的基础符号长度和符号长度偏移量确定每套时域资源的符号长度。
可选的,N套时域资源的符号长度均相同。N套时域资源的符号长度相同,可以使得N套时域资源实现相似的传输性能,从而服务同一种业务类型的数据包,提高数据包的传输效率。
若将第一时域资源的符号长度记为L',将第一时域资源对应的符号长度偏移量记为L offLet。则在一种可能的实现方式中,L'=L+L offLet。需要说明的是,该实施例仅仅提供了一种计算第一时域资源的符号长度的方法,在具体实现时,其他计算方法(例如,减法运算)也可以应用到该实施方式中,该实施例中不再一一举例说明。
假设第一时域资源的起始符号所在的时隙为时隙#m。则第一时域资源起始于时隙#m中的OFDM符号#S。该情况下,若S+L'小于等于14,则第一时域资源结束于时隙#m中的OFDM符号#(S+L'-1),若S+L'大于14,则第一时域资源结束于时隙#(m+1)的OFDM符号#((S+L')mod15)。
在步骤602之后,终端还可以根据第一资源配置信息确定N套时域资源的起始符号,从而确定N套时域资源。
603、终端在N套时域资源中的至少一套时域资源上发送数据。
步骤603在具体实现时,示例性的,当数据包到达时,终端可以在N套时域资源中选择时间上距离最近的一套时域资源进行数据传输,从而可以降低数据包的等待时延,提高数据传输效率。
604、网络设备在N套时域资源上检测数据。
实施例二提供的方法,网络设备为终端配置了多套时域资源,从而使得终端可以选择时间上距离最近的一套时域资源发送到达的数据包。该实施例中网络设备为终端配置的多套时域资源可以满足终端快速发送数据包的要求,从而降低数据包的等待时延,提高数据传输效率。
以下以一个具体的示例对实施例二提供的方法作示例性说明。假设N=4、且4套时域资源的起始符号所在的时隙均为时隙#m,第一资源配置信息配置4套时域资源分别对应的SLIV,第二资源配置信息配置4套时域资源分别对应的L Offset,终端根据4套时域资源分别对应的SLIV和4套时域资源分别对应的L Offset确定4套时域资源的S和L'。示例性的,如图7所示,假设SLIV指示的第1至第4套时域资源的起始符号的索引S分别为:0,2,4,6。SLIV指示的第1至第4套时域资源对应的L分别为:4,5,8,4。第1套时域资源对应的L Offset为4,则第1套时域资源包括时隙#m中的OFDM符号#0至OFDM符号#7,第2套时域资源对应的L Offset为3,则第2套时域资源包括时隙#m中的OFDM符号#2至OFDM符号#9,第3套时域资源对应的L Offset为0,则第3套时域资源包括时隙#m中的OFDM符号#4至OFDM符号#11,第4套时域资源对应的L Offset为4,则第4套时域资源包括时隙#m中的OFDM符号#6至OFDM符号#13。
实施例三
该实施例提供了一种数据传输方法,如图8所示,该方法包括:
801、网络设备向终端发送第一资源配置信息和第二资源配置信息,相应的,终端从网络设备接收第一资源配置信息和第二资源配置信息。
在一种情况(记为情况1)下,第一资源配置信息用于配置N套时域资源的起始符号,第二资源配置信息用于配置N套时域资源的符号长度。在另一种情况(记为情况2)下,第一资源配置信息用于配置N套时域资源的符号长度,第二资源配置信息用于配置N套时域资源的起始符号。
其中,N套时域资源的起始符号均不同,N套时域资源为终端进行免授权传输所采用的时域资源,N为大于1的整数。N套时域资源可以是用于PUSCH传输的时域资源。
可选的,N套时域资源的符号长度均相同,则在情况1下,第二资源配置信息中可以包括一个符号长度指示信息,在情况2下,第一资源配置信息中可以包括一个符号长度指示信息。N套时域资源的符号长度相同,可以使得N套时域资源实现相似的传输性能,从而服务同一种业务类型的数据包,提高数据包的传输效率。
第一资源配置信息和第二资源配置信息在具体实现时,
在一种实施方式中,第一资源配置信息通过SLIV指示,此时,SLIV指示的符号长度无效,SLIV指示的起始符号有效,而N套时域资源的符号长度通过第二资源配置信息指示。
在另一实施方式中,第一资源配置信息通过SLIV指示,此时,SLIV指示的起始 符号无效,SLIV指示的符号长度有效,而N套时域资源的起始符号通过第二资源配置信息指示。
将N套时域资源中的第一时域资源的起始符号的索引记为S,符号长度记为L。S和L可以通过SLIV指示,也可以通过资源索引指示,该资源索引对应的资源中包括S和L的信息。示例性的,该资源索引可以为表2中的Row index,S可以为表2中的S,L为表2中的L。
其中,第一时域资源可以为N套时域资源中的任意一套时域资源。其中,资源索引具体可以通过RRC信令中的timeDomainAllocation参数或DCI中的Time domain resource assignment字段指示。
第一资源配置信息和/或第二资源配置信息可以携带在RRC信令或MAC CE信令或DCI中。在第二资源配置信息携带在RRC信令中时,可以避免增加DCI的开销。第二资源配置信息与第一资源配置信息可以在同一条信令中,也可以在不同的信令中。
802、终端根据N套时域资源中的每套时域资源对应的起始符号和符号长度确定每套时域资源。
假设第一时域资源的起始符号所在的时隙为时隙#m,m可以通过时隙偏置指示,具体可参见实施例一或实施例二中的相关部分的描述。则第一时域资源起始于时隙#m中的OFDM符号#S。该情况下,若S+L小于等于14,则第一时域资源结束于时隙#m中的OFDM符号#(S+L-1),若S+L大于14,则第一时域资源结束于时隙#(m+1)的OFDM符号#((S+L)mod15)。
803、终端在N套时域资源中的至少一套时域资源上发送数据。
步骤803在具体实现时,示例性的,当数据包到达时,终端可以在N套时域资源中选择时间上距离最近的一套时域资源进行数据传输,从而可以降低数据包的等待时延,提高数据传输效率。
804、网络设备在N套时域资源上检测数据。
实施例三提供的方法,网络设备为终端配置了多套时域资源,从而使得终端可以选择时间上距离最近的一套时域资源发送到达的数据包。该实施例中网络设备为终端配置的多套时域资源可以满足终端快速发送数据包的要求,从而降低数据包的等待时延,提高数据传输效率。
以下以情况1下的一个具体的示例对实施例三提供的方法作示例性说明。假设N=4、且4套时域资源的起始符号所在的时隙均为时隙#m,第一资源配置信息配置4套时域资源分别对应的起始符号,第二资源配置信息配置4套时域资源分别对应的符号长度,终端根据第一资源配置信息和第二资源配置信息确定4套时域资源。示例性的,如图9所示,假设SLIV指示的第1至第4套时域资源的起始符号的索引S分别为:0,2,4,6。第二资源配置信息指示的第1至第4套时域资源对应的L均8。则第1套时域资源包括时隙#m中的OFDM符号#0至OFDM符号#7,第2套时域资源包括时隙#m中的OFDM符号#2至OFDM符号#9,第3套时域资源包括时隙#m中的OFDM符号#4至OFDM符号#11,第4套时域资源包括时隙#m中的OFDM符号#6至OFDM符号#13。
实施例四
该实施例提供了一种数据传输方法,如图10所示,包括:
1001、终端从网络设备接收资源配置信息和DMRS配置信息。
其中,资源配置信息用于配置第一时域资源的起始符号和符号长度,DMRS配置信息用于配置第一时域资源的DMRS在第一时域资源中占用的符号。第一时域资源的DMRS可以为第一时域资源的Front-load DMRS,也可以为第一时域资源的Additional DMRS。
该实施例中,将第一时域资源的起始符号记为S,符号长度记为L。S和L可以通过SLIV指示,也可以通过资源索引指示,该资源索引对应的资源中包括S和L的信息。示例性的,该资源索引可以为表2中的Row index,S可以为表2中的S,L可以为表2中的L。其中,资源索引具体可以通过RRC信令中的timeDomainAllocation参数或DCI中的Time domain resource assignment字段指示。
资源配置信息和/或DMRS配置信息可以携带在RRC信令或MAC CE信令或DCI中。
可选的,在步骤1001之前,该方法还包括:网络设备向终端发送资源配置信息和DMRS配置信息。
1002、终端根据资源配置信息和DMRS配置信息确定第二时域资源。
其中,第二时域资源的起始符号为第一时域资源的DMRS在第一时域资源中所占用的OFDM符号。第二时域资源为终端进行免授权传输所采用的时域资源。
可选的,第二时域资源的符号长度与第一时域资源的符号长度相同。
该情况下,步骤1002在具体实现时,可以包括:终端根据资源配置信息确定第一时域资源的符号长度,根据DMRS配置信息确定第一时域资源的DMRS在第一时域资源中占用的OFDM符号,终端确定第二时域资源的起始符号为第一时域资源的DMRS在第一时域资源中所占用的OFDM符号,确定第二时域资源的符号长度为第一时域资源的符号长度。
终端根据资源配置信息和DMRS配置信息可以确定一个第二时域资源,也可以确定多个第二时域资源。多个第二时域资源的起始符号不同。可选的,多个第二时域资源的符号长度相同。多个第二时域资源的符号长度相同,可以使得多个第二时域资源实现相似的传输性能,从而服务同一种业务类型的数据包,提高数据包的传输效率。
示例性的,如图11所示,终端根据SLIV确定第一时域资源的起始符号为时隙#1中的OFDM符号#2,符号长度为8,则第一时域资源包括时隙#1中的OFDM符号#2至OFDM符号#9,终端根据DMRS配置信息确定OFDM符号#2和OFDM符号#6为第一时域资源的DMRS所占用的OFDM符号。则终端确定第二时域资源的起始符号为OFDM符号#2,第二时域资源的符号长度为8,符号长度可以根据SLIV确定,则第二时域资源起始于时隙#1中的OFDM符号#2,结束于时隙#1中的OFDM符号#9(即图11中的第二时域资源1),和/或,终端确定第二时域资源的起始符号为OFDM符号#6,第二时域资源的符号长度为8,符号长度可以根据SLIV确定,则第二时域资源起始于时隙#1中的OFDM符号#6,结束于时隙#1中的OFDM符号#13(即图11中的第二时域资源2)。
基于图11所示的示例,若另一个第一时域资源所占用的OFDM符号包括时隙#1 的OFDM符号#10至OFDM符号#13和时隙#2的OFDM符号#0至OFDM符号#3,则该另一个第一时域资源的DMRS占用的OFDM符号可以为时隙#1的OFDM符号#10和时隙#2的OFDM符号#0。
1003、网络设备根据第一时域资源的符号长度和第一时域资源的DMRS在第一时域资源中占用的OFDM符号确定第二时域资源。
其中,网络设备确定第二时域资源的方式与终端确定第二时域资源的方式相同。
1004、终端在第二时域资源上发送数据。
其中,第一时域资源为第一资源的时域资源,第二时域资源为第二资源的时域资源,第一资源的频域资源和第二资源的频域资源可以相同。第一资源和第二资源均为终端的免授权传输资源。
步骤1004在具体实现时,示例性的,当数据包到达时,终端可以在多个第二时域资源中选择时间上距离最近的第二时域资源进行数据传输,从而可以降低数据包的等待时延,提高数据传输效率。
1005、网络设备在第二时域资源上检测数据。
实施例四提供的方法,终端可以根据资源配置信息和DMRS配置信息确定多个第二时域资源,从而使得终端可以选择时间上距离最近的第二时域资源发送到达的数据包。该实施例中网络设备为终端配置的多个第二时域资源可以满足终端快速发送数据包的要求,从而降低数据包的等待时延,提高数据传输效率。同时,实施例四可以使用较低的信令开销实现多个免授权传输的时域资源的配置。
需要说明的是,为降低频域资源开销,一方面,网络设备为同一个终端配置的多套免授权传输资源的频域资源可以完全相同,也可以部分相同。这种情况下,网络设备可以为不同的免授权传输资源配置不同的DMRS端口,通过DMRS端口来区分免授权传输资源。例如,网络设备为终端配置了两套免授权传输资源,分别为免授权传输资源1和免授权传输资源2,两套免授权传输资源使用完全相同的频域资源,网络设备为免授权传输资源1配置DMRS端口1,为免授权传输资源2配置DMRS端口2。当网络设备检测到DMRS端口1时,网络设备判断终端使用了免授权传输资源1发送了数据;如果网络设备检测到DMRS端口2,则网络设备判断终端使用了免授权传输资源2发送了数据。
另一方面,网络设备可以通过多个终端共享相同的时频资源进行免授权传输来达到降低资源开销,提升资源利用率的目的。这种情况下,可能会出现一个终端的DMRS符号(即DMRS占用的OFDM符号)与另一个终端的数据符号(即数据占用的OFDM符号)碰撞的情形,从而导致DMRS检测性能下降,同时影响数据解调性能。例如,参见图12,网络设备为终端1配置了两套免授权传输资源,分别为免授权传输资源1和免授权传输资源2,这两套免授权传输资源的频域资源完全相同。为提升资源利用率,网络设备同时为终端2配置两套免授权传输资源,分别为免授权传输资源3和免授权传输资源4。其中,终端2的免授权传输资源3与终端1的免授权传输资源1占用完全相同的时域资源(例如,时隙#1中的OFDM符号#2至OFDM符号#9),终端2的免授权传输资源4与终端1的免授权传输资源2占用完全相同的时域资源(例如,时隙#1中的OFDM符号#4至OFDM符号#11)。为降低DMRS开销,网络设备为终 端1和终端2配置了单个符号的front-loaded DMRS,即DMRS仅位于PUSCH中的第一个OFDM符号上。
该情况下,当终端1使用免授权传输资源1发送PUSCH、终端2使用免授权传输资源4发送PUSCH时,终端1的位于OFDM符号#4上的数据将会与终端2位于OFDM符号#4上的DMRS发生碰撞,导致网络设备检测不到终端2发送的PUSCH,同时降低终端1的数据译码性能。而在不同的终端均采用实施例四提供的方法确定第二时域资源进行免授权传输的情况下,可以避免不同的终端之间的DMRS和数据碰撞的问题。
除了上述实施例一至实施例四提供的方法之外,网络设备也可以直接为终端配置多套免授权传输的时域资源,多套免授权传输的时域资源在时间上错开,这样数据包到达后可以使用时间上距离最近的免授权传输的时域资源发送,显著降低传输时延。为了使得多套免授权传输的时域资源服务同一种业务类型的数据包,多套免授权传输的时域资源需要实现相似的传输性能,即S不同,L相同或相近。由于现有技术中,某一时刻可以使用的SLIV至多只有16种,而这16种SLIV要兼顾系统中各种调度需求,因此很难同时存在S不同、L相同或相近的多个SLIV组合(例如L=8、S分别为2、4、6、8的4种SLIV组合),也就不能达到降低传输时延的目的,或时延降低效果不明显。而本申请上述实施例一至实施例四提供的方法在不依赖于高层配置的SLIV前提下,实现多套免授权传输资源在时隙内错开,以达到减少数据包等待时延的目的。
上述主要从各个网元之间交互的角度对本申请实施例的方案进行了介绍。可以理解的是,各个网元,例如,网络设备和终端为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法示例对网络设备和终端进行功能单元的划分,例如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的功能集成在一个处理单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。需要说明的是,本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
在采用集成的单元的情况下,图13示出了上述实施例中所涉及的数据传输装置(记为数据传输装置130)的一种可能的结构示意图,该数据传输装置130包括处理单元1301和通信单元1302,还可以包括存储单元1303。图13所示的结构示意图可以用于示意上述实施例中所涉及的网络设备或终端的结构。
当图13所示的结构示意图用于示意上述实施例中所涉及的网络设备的结构时,处理单元1301用于对网络设备的动作进行控制管理。例如,处理单元1301用于支持网络设备执行图4中的步骤401和步骤404,图6中的步骤601和步骤604,图8中的步骤801和步骤804,图10中的步骤1001、步骤1003和步骤1005,和/或本申请实施例中所描述的其他过程中的网络设备执行的动作。处理单元1301可以通过通信单元1302与其他网络实体通信,例如,与图4中示出的终端之间的通信。具体的,处理单元1301 可以控制通信单元1302执行发送和/或接收的动作。存储单元1303用于存储网络设备的程序代码和数据。
当图13所示的结构示意图用于示意上述实施例中所涉及的网络设备的结构时,数据传输装置130可以是网络设备,也可以是网络设备内的芯片。数据传输装置130是网络设备内的芯片时,处理单元1301可以是处理器或者处理器内核,通信单元1302是芯片的通信接口。具体地,处理单元1301可用于执行图4中的步骤404、图6中的步骤604、图8中的步骤804,图10中的步骤1003和步骤1005;通信单元1302可用于在图4中的步骤401、图6中的步骤601、图8中的步骤801、或图10中的步骤1001中输出第一资源配置信息和第二资源配置信息,或者,输出资源配置信息和DMRS配置信息;通信单元1302还可用于在图4中的步骤404、图6中的步骤604、图8中的步骤804、或图10中的步骤1005之后接收检测到的承载在所述处理单元1301所确定的时域资源上的数据。
当图13所示的结构示意图用于示意上述实施例中所涉及的终端的结构时,处理单元1301用于对终端的动作进行控制管理。例如,处理单元1301用于支持终端执行图4中的步骤401至步骤403,图6中的步骤601至步骤603,图8中的步骤801至步骤803,图10中的步骤1001、步骤1002和步骤1004,和/或本申请实施例中所描述的其他过程中的终端执行的动作。处理单元1301可以通过通信单元1302与其他网络实体通信,例如,与图4中示出的网络设备之间的通信。具体的,处理单元1301可以控制通信单元1302执行发送和/或接收的动作。存储单元1303用于存储终端的程序代码和数据。
当图13所示的结构示意图用于示意上述实施例中所涉及的终端的结构时,数据传输装置130可以是终端,也可以是终端内的芯片。数据传输装置130是终端内的芯片时,处理单元1301可以是处理器或者处理器内核,通信单元1302是芯片的通信接口。具体地,处理单元1301可用于执行图4中的步骤402,或者图6中的步骤602,或者图8中的步骤802,或者图10中的步骤1002;通信单元1302可用于在图4中的步骤401、图6中的步骤601、图8中的步骤801、或图10中的步骤1001中接收输入的第一资源配置信息和第二资源配置信息,或者,接收输入的资源配置信息和DMRS配置信息;通信单元1302还可用于在图4中的步骤403、图6中的步骤603、图8中的步骤803、或图10中的步骤1004中输出承载在所述处理单元1301所确定的时域资源上的数据。其中,当数据传输装置130为终端或网络设备时,处理单元1301可以是处理器或控制器,通信单元1302可以是通信接口、收发器、收发机、收发电路、收发装置等,其中,通信接口是统称,可以包括一个或多个接口。存储单元1303可以是存储器。当数据传输装置130为终端或网络设备内的芯片时,处理单元1301可以是处理器或控制器,通信单元1302可以是输入/输出接口、管脚或电路等。存储单元1303可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是终端或网络设备内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
其中,通信单元也可以称为收发单元。数据传输装置130中的具有收发功能的天线和控制电路可以视为数据传输装置130的通信单元1302,具有处理功能的处理器可以视为数据传输装置130的处理单元1301。可选的,通信单元1302中用于实现接收功能的器件可以 视为接收单元,接收单元用于执行本申请实施例中的接收的步骤,接收单元可以为接收机、接收器、接收电路等。通信单元1302中用于实现发送功能的器件可以视为发送单元,发送单元用于执行本申请实施例中的发送的步骤,发送单元可以为发送机、发送器、发送电路等。
图13中的集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。存储计算机软件产品的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
本申请实施例中的单元也可以称为模块,例如,处理单元也可以称为处理模块。
本申请实施例还提供了一种终端(记为终端140)和网络设备(记为网络设备150)的硬件结构示意图。具体可参见图14。
终端140包括至少一个处理器1401和至少一个收发器1403。可选的,还包括至少一个存储器1402。可选的,终端140还包括至少一个天线1404。可选的,终端140还包括输出设备1405和/或输入设备1406。
处理器1401用于对终端的动作进行控制管理。例如,处理器1401用于支持终端执行图4中的步骤401至步骤403,图6中的步骤601至步骤603,图8中的步骤801至步骤803,图10中的步骤1001、步骤1002和步骤1004,和/或本申请实施例中所描述的其他过程中的终端执行的动作。处理器1401可以通过收发器1403与其他网络实体通信,例如,与图4中示出的网络设备之间的通信。具体的,处理器1401可以控制收发器1403执行发送和/或接收的动作。存储器1402用于存储终端的程序代码和数据。
处理器1401、存储器1402和收发器1403通过总线相连接。处理器1401可以是一个通用中央处理器(central processing unit,CPU)、微处理器、特定应用集成电路(application-specific integrated circuit,ASIC),或者一个或多个用于控制本申请方案程序执行的集成电路。处理器1401也可以包括多个CPU,并且处理器1401可以是一个单核(single-CPU)处理器,也可以是多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路或用于处理数据(例如计算机程序指令)的处理核。
存储器1402可以是ROM或可存储静态信息和指令的其他类型的静态存储设备、RAM或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,本申请实施例对此不作任何限制。存储器1402可以是独立存在,通过总线与处理器1401相连接。存储器1402也可以和处理器1401集成在一 起。其中,存储器1402中可以包含计算机程序代码。处理器1401用于执行存储器1402中存储的计算机程序代码,从而实现本申请实施例提供的方法。
收发器1403可以使用任何收发器一类的装置,用于与其他设备或通信网络通信,如以太网、RAN、WLAN等。
输出设备1405和处理器1401通信,可以以多种方式来显示信息。例如,输出设备1405可以是液晶显示器(liquid crystal display,LCD),发光二级管(light emitting diode,LED)显示设备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。输入设备1406和处理器1401通信,可以以多种方式接收用户的输入。例如,输入设备1406可以是鼠标、键盘、触摸屏设备或传感设备等。
可选的,收发器1403可以包括发射机14031和接收机14032。收发器1403中用于实现接收功能的器件可以视为接收机14032,接收机14032用于执行本申请实施例中的终端接收的步骤。收发器1403中用于实现发送功能的器件可以视为发射机14031,发射机14031用于执行本申请实施例中的终端发送的步骤。
网络设备150包括至少一个处理器1501和至少一个收发器1503。可选的,还包括至少一个存储器1502。可选的,网络设备150还包括至少一个天线1504。
处理器1501用于对网络设备的动作进行控制管理。例如,处理器1501用于支持网络设备执行图4中的步骤401和步骤404,图6中的步骤601和步骤604,图8中的步骤801和步骤804,图10中的步骤1001、步骤1003和步骤1005,和/或本申请实施例中所描述的其他过程中的网络设备执行的动作。处理器1501可以通过收发器1503与其他网络实体通信,例如,与图4中示出的终端之间的通信。具体的,处理器1501可以控制收发器1503执行发送和/或接收的动作。存储器1502用于存储网络设备的程序代码和数据。
处理器1501、存储器1502和收发器1503通过总线相连接。处理器1501、存储器1502和收发器1503的相关描述可参考终端140中处理器1401、存储器1402和收发器1403的描述,在此不再赘述。
可选的,收发器1503可以包括发射机15031和接收机15032。收发器1503中用于实现接收功能的器件可以视为接收机15032,接收机15032用于执行本申请实施例中的网络设备接收的步骤。收发器1503中用于实现发送功能的器件可以视为发射机15031,发射机15031用于执行本申请实施例中的网络设备发送的步骤。
可选的,处理器(例如,处理器1501或处理器1401)可以包括基带处理器和中央处理器,基带处理器主要用于对通信协议以及通信数据进行处理,中央处理器主要用于对整个设备进行控制,执行软件程序,处理软件程序的数据。处理器集成了基带处理器和中央处理器的功能,本领域技术人员可以理解,基带处理器和中央处理器也可以是各自独立的处理器,通过总线等技术互联。基带处理器也可以表述为基带处理电路或者基带处理芯片。该中央处理器也可以表述为中央处理电路或者中央处理芯片。对通信协议以及通信数据进行处理的功能可以内置在处理器中,也可以以软件程序的形式存储在存储单元中,由处理器执行软件程序以实现基带处理功能。
本申请实施例还提供了一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行上述任一方法。
本申请实施例还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述任一方法。
本申请实施例还提供了一种装置,该装置以芯片的产品形态存在,该装置包括处理器、存储器和收发组件,收发组件包括输入输出电路,存储器用于存储计算机执行指令,处理器通过执行存储器中存储的计算机执行指令实现上述任一方法。该情况下,执行本申请实施例提供的方法的执行主体可以为芯片。
本申请实施例还提供了一种通信系统,包括:上述网络设备和终端。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件程序实现时,可以全部或部分地以计算机程序产品的形式来实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,计算机指令可以从一个网站站点、计算机、服务器或者数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可以用介质集成的服务器、数据中心等数据存储设备。可用介质可以是磁性介质(例如,软盘、硬盘、磁带),光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。
尽管在此结合各实施例对本申请进行了描述,然而,在实施所要求保护的本申请过程中,本领域技术人员通过查看附图、公开内容、以及所附权利要求书,可理解并实现公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。
尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。

Claims (60)

  1. 一种数据传输方法,其特征在于,包括:
    终端从网络设备接收第一资源配置信息和第二资源配置信息,所述第一资源配置信息用于配置N套时域资源对应的基础起始符号,所述第二资源配置信息用于配置所述N套时域资源对应的起始符号偏移量,所述N套时域资源为所述终端进行免授权传输所采用的时域资源,N为大于1的整数;
    所述终端根据所述N套时域资源中的每套时域资源对应的基础起始符号和起始符号偏移量确定每套时域资源的起始符号,所述N套时域资源的起始符号均不同;
    所述终端在所述N套时域资源中的至少一套时域资源上发送数据。
  2. 根据权利要求1所述的方法,其特征在于,所述第一资源配置信息还用于配置所述N套时域资源的符号长度,所述N套时域资源的符号长度均相同。
  3. 根据权利要求1或2所述的方法,其特征在于,所述N套时域资源对应的基础起始符号均相同。
  4. 根据权利要求1至3任一项所述的方法,其特征在于,所述第二资源配置信息携带在无线资源控制RRC信令中。
  5. 根据权利要求1至4任一项所述的方法,其特征在于,所述第一资源配置信息包括时隙偏置信息和起始符号指示信息,所述时隙偏置信息和所述起始符号指示信息用于配置所述N套时域资源的基础起始符号。
  6. 一种数据传输方法,其特征在于,包括:
    网络设备向终端发送第一资源配置信息和第二资源配置信息,所述第一资源配置信息用于配置N套时域资源对应的基础起始符号,所述第二资源配置信息用于配置所述N套时域资源对应的起始符号偏移量,所述N套时域资源对应的基础起始符号和起始符号偏移量用于确定所述N套时域资源的起始符号,所述N套时域资源的起始符号均不同,所述N套时域资源为所述终端进行免授权传输所采用的时域资源,N为大于1的整数;
    所述网络设备在所述N套时域资源上检测数据。
  7. 根据权利要求6所述的方法,其特征在于,所述第一资源配置信息还用于配置所述N套时域资源的符号长度,所述N套时域资源的符号长度均相同。
  8. 根据权利要求6或7所述的方法,其特征在于,所述N套时域资源对应的基础起始符号均相同。
  9. 根据权利要求6至8任一项所述的方法,其特征在于,所述第二资源配置信息携带在无线资源控制RRC信令中。
  10. 根据权利要求6至9任一项所述的方法,其特征在于,所述第一资源配置信息包括时隙偏置信息和起始符号指示信息,所述时隙偏置信息和所述起始符号指示信息用于配置所述N套时域资源的基础起始符号。
  11. 一种数据传输装置,其特征在于,包括:通信单元和处理单元;
    所述通信单元,用于从网络设备接收第一资源配置信息和第二资源配置信息,所述第一资源配置信息用于配置N套时域资源对应的基础起始符号,所述第二资源配置信息用于配置所述N套时域资源对应的起始符号偏移量,所述N套时域资源为所述数 据传输装置进行免授权传输所采用的时域资源,N为大于1的整数;
    所述处理单元,用于根据所述N套时域资源中的每套时域资源对应的基础起始符号和起始符号偏移量确定每套时域资源的起始符号,所述N套时域资源的起始符号均不同;
    所述通信单元,还用于在所述N套时域资源中的至少一套时域资源上发送数据。
  12. 根据权利要求11所述的装置,其特征在于,所述第一资源配置信息还用于配置所述N套时域资源的符号长度,所述N套时域资源的符号长度均相同。
  13. 根据权利要求11或12所述的装置,其特征在于,所述N套时域资源对应的基础起始符号均相同。
  14. 根据权利要求11至13任一项所述的装置,其特征在于,所述第二资源配置信息携带在无线资源控制RRC信令中。
  15. 根据权利要求11至14任一项所述的装置,其特征在于,所述第一资源配置信息包括时隙偏置信息和起始符号指示信息,所述时隙偏置信息和所述起始符号指示信息用于配置所述N套时域资源的基础起始符号。
  16. 一种数据传输装置,其特征在于,包括:通信单元和处理单元;
    所述处理单元,用于生成第一资源配置信息和第二资源配置信息,所述第一资源配置信息用于配置N套时域资源对应的基础起始符号,所述第二资源配置信息用于配置所述N套时域资源对应的起始符号偏移量,所述N套时域资源对应的基础起始符号和起始符号偏移量用于确定所述N套时域资源的起始符号,所述N套时域资源的起始符号均不同,所述N套时域资源为终端进行免授权传输所采用的时域资源,N为大于1的整数;
    所述通信单元,用于发送所述第一资源配置信息和所述第二资源配置信息,并在所述N套时域资源上检测数据。
  17. 根据权利要求16所述的装置,其特征在于,所述第一资源配置信息还用于配置所述N套时域资源的符号长度,所述N套时域资源的符号长度均相同。
  18. 根据权利要求16或17所述的装置,其特征在于,所述N套时域资源对应的基础起始符号均相同。
  19. 根据权利要求16至18任一项所述的装置,其特征在于,所述第二资源配置信息携带在无线资源控制RRC信令中。
  20. 根据权利要求16至19任一项所述的装置,其特征在于,所述第一资源配置信息包括时隙偏置信息和起始符号指示信息,所述时隙偏置信息和所述起始符号指示信息用于配置所述N套时域资源的基础起始符号。
  21. 一种数据传输方法,其特征在于,包括:
    终端从网络设备接收第一资源配置信息和第二资源配置信息,所述第一资源配置信息用于配置N套时域资源对应的基础符号长度,所述第二资源配置信息用于配置所述N套时域资源对应的符号长度偏移量,所述N套时域资源为所述终端进行免授权传输所采用的时域资源,所述N套时域资源的起始符号均不同,N为大于1的整数;
    所述终端根据所述N套时域资源中的每套时域资源对应的基础符号长度和符号长度偏移量确定每套时域资源的符号长度;所述终端在所述N套时域资源中的至少一套 时域资源上发送数据。
  22. 根据权利要求21所述的方法,其特征在于,所述第一资源配置信息还用于配置所述N套时域资源的起始符号。
  23. 根据权利要求21或22所述的方法,其特征在于,所述第二资源配置信息携带在无线资源控制RRC信令中。
  24. 根据权利要求21至23任一项所述的方法,其特征在于,所述第一资源配置信息包括时隙偏置信息、起始符号指示信息和基础符号长度指示信息,所述时隙偏置信息和所述起始符号指示信息用于配置所述N套时域资源的起始符号,所述基础符号长度指示信息用于配置所述N套时域资源的基础符号长度。
  25. 根据权利要求21至24任一项所述的方法,其特征在于,所述N套时域资源的符号长度均相同。
  26. 一种数据传输方法,其特征在于,包括:
    网络设备向终端发送第一资源配置信息和第二资源配置信息,所述第一资源配置信息用于配置N套时域资源对应的基础符号长度,所述第二资源配置信息用于配置所述N套时域资源对应的符号长度偏移量,所述N套时域资源对应的基础符号长度和符号长度偏移量用于确定所述N套时域资源的符号长度,所述N套时域资源的起始符号均不同,所述N套时域资源为所述终端进行免授权传输所采用的时域资源,N为大于1的整数;
    所述网络设备在所述N套时域资源上检测数据。
  27. 根据权利要求26所述的方法,其特征在于,所述第一资源配置信息还用于配置所述N套时域资源的起始符号。
  28. 根据权利要求26或27所述的方法,其特征在于,所述第二资源配置信息携带在无线资源控制RRC信令中。
  29. 根据权利要求26至28任一项所述的方法,其特征在于,所述第一资源配置信息包括时隙偏置信息、起始符号指示信息和基础符号长度指示信息,所述时隙偏置信息和所述起始符号指示信息用于配置所述N套时域资源的起始符号,所述基础符号长度指示信息用于配置所述N套时域资源的基础符号长度。
  30. 根据权利要求26至29任一项所述的方法,其特征在于,所述N套时域资源的符号长度均相同。
  31. 一种数据传输装置,其特征在于,包括:通信单元和处理单元;
    所述通信单元,用于从网络设备接收第一资源配置信息和第二资源配置信息,所述第一资源配置信息用于配置N套时域资源对应的基础符号长度,所述第二资源配置信息用于配置所述N套时域资源对应的符号长度偏移量,所述N套时域资源为所述数据传输装置进行免授权传输所采用的时域资源,所述N套时域资源的起始符号均不同,N为大于1的整数;
    所述处理单元,用于根据所述N套时域资源中的每套时域资源对应的基础符号长度和符号长度偏移量确定每套时域资源的符号长度;所述通信单元,还用于在所述N套时域资源中的至少一套时域资源上发送数据。
  32. 根据权利要求31所述的装置,其特征在于,所述第一资源配置信息还用于配 置所述N套时域资源的起始符号。
  33. 根据权利要求31或32所述的装置,其特征在于,所述第二资源配置信息携带在无线资源控制RRC信令中。
  34. 根据权利要求31至33任一项所述的装置,其特征在于,所述第一资源配置信息包括时隙偏置信息、起始符号指示信息和基础符号长度指示信息,所述时隙偏置信息和所述起始符号指示信息用于配置所述N套时域资源的起始符号,所述基础符号长度指示信息用于配置所述N套时域资源的基础符号长度。
  35. 根据权利要求31至34任一项所述的装置,其特征在于,所述N套时域资源的符号长度均相同。
  36. 一种数据传输装置,其特征在于,包括:通信单元和处理单元;
    所述处理单元,用于生成第一资源配置信息和第二资源配置信息,所述第一资源配置信息用于配置N套时域资源对应的基础符号长度,所述第二资源配置信息用于配置所述N套时域资源对应的符号长度偏移量,所述N套时域资源对应的基础符号长度和符号长度偏移量用于确定所述N套时域资源的符号长度,所述N套时域资源的起始符号均不同,所述N套时域资源为终端进行免授权传输所采用的时域资源,N为大于1的整数;
    所述通信单元,用于发送所述第一资源配置信息和所述第二资源配置信息,并在所述N套时域资源上检测数据。
  37. 根据权利要求36所述的装置,其特征在于,所述第一资源配置信息还用于配置所述N套时域资源的起始符号。
  38. 根据权利要求36或37所述的装置,其特征在于,所述第二资源配置信息携带在无线资源控制RRC信令中。
  39. 根据权利要求36至38任一项所述的装置,其特征在于,所述第一资源配置信息包括时隙偏置信息、起始符号指示信息和基础符号长度指示信息,所述时隙偏置信息和所述起始符号指示信息用于配置所述N套时域资源的起始符号,所述基础符号长度指示信息用于配置所述N套时域资源的基础符号长度。
  40. 根据权利要求36至39任一项所述的装置,其特征在于,所述N套时域资源的符号长度均相同。
  41. 一种数据传输方法,其特征在于,包括:
    终端从网络设备接收资源配置信息和解调参考信号DMRS配置信息,所述资源配置信息用于配置第一时域资源的起始符号和符号长度,所述DMRS配置信息用于配置所述第一时域资源的DMRS在所述第一时域资源中占用的符号;
    所述终端根据所述资源配置信息和所述DMRS配置信息确定第二时域资源,所述第二时域资源的起始符号为所述第一时域资源的DMRS在所述第一时域资源中所占用的符号;其中,所述第二时域资源为所述终端进行免授权传输所采用的时域资源;所述终端在所述第二时域资源上发送数据。
  42. 根据权利要求41所述的方法,其特征在于,所述第二时域资源的符号长度与所述第一时域资源的符号长度相同。
  43. 一种数据传输方法,其特征在于,包括:
    网络设备根据第一时域资源的符号长度和所述第一时域资源的解调参考信号DMRS在所述第一时域资源中占用的符号确定第二时域资源;所述第二时域资源的起始符号为所述第一时域资源的DMRS在所述第一时域资源中所占用的符号,所述第二时域资源为终端进行免授权传输所采用的时域资源;
    所述网络设备在所述第二时域资源上检测数据。
  44. 根据权利要求43所述的方法,其特征在于,所述第二时域资源的符号长度与所述第一时域资源的符号长度相同。
  45. 一种数据传输装置,其特征在于,包括:通信单元和处理单元;
    所述通信单元,用于从网络设备接收资源配置信息和解调参考信号DMRS配置信息,所述资源配置信息用于配置第一时域资源的起始符号和符号长度,所述DMRS配置信息用于配置所述第一时域资源的DMRS在所述第一时域资源中占用的符号;
    所述处理单元,用于根据所述资源配置信息和所述DMRS配置信息确定第二时域资源,所述第二时域资源的起始符号为所述第一时域资源的DMRS在所述第一时域资源中所占用的符号;其中,所述第二时域资源为所述数据传输装置进行免授权传输所采用的时域资源;所述通信单元,还用于在所述第二时域资源上发送数据。
  46. 根据权利要求45所述的装置,其特征在于,所述第二时域资源的符号长度与所述第一时域资源的符号长度相同。
  47. 一种数据传输装置,其特征在于,包括:通信单元和处理单元;
    所述处理单元,用于根据第一时域资源的符号长度和所述第一时域资源的解调参考信号DMRS在所述第一时域资源中占用的符号确定第二时域资源;所述第二时域资源的起始符号为所述第一时域资源的DMRS在所述第一时域资源中所占用的符号,所述第二时域资源为终端进行免授权传输所采用的时域资源;
    所述处理单元,还用于采用所述通信单元在所述第二时域资源上检测数据。
  48. 根据权利要求47所述的装置,其特征在于,所述第二时域资源的符号长度与所述第一时域资源的符号长度相同。
  49. 一种数据传输装置,其特征在于,包括:存储器和处理器;
    所述存储器用于存储计算机执行指令,所述处理器执行所述存储器存储的所述计算机执行指令,以使所述数据传输装置实现如权利要求1至5中的任一项所述的方法;或者,实现如权利要求6至10中的任一项所述的方法。
  50. 一种计算机可读存储介质,其特征在于,包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求1至5中的任一项所述的方法;或者,实现如权利要求6至10中的任一项所述的方法。
  51. 一种计算机程序产品,其特征在于,包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求1至5中的任一项所述的方法;或者,实现如权利要求6至10中的任一项所述的方法。
  52. 一种通信系统,其特征在于,包括:权利要求11至15中的任一项所述的数据传输装置,和/或,权利要求16至20中的任一项所述的数据传输装置。
  53. 一种数据传输装置,其特征在于,包括:存储器和处理器;
    所述存储器用于存储计算机执行指令,所述处理器执行所述存储器存储的所述计 算机执行指令,以使所述数据传输装置实现如权利要求21至25中的任一项所述的方法;或者,实现如权利要求26至30中的任一项所述的方法。
  54. 一种计算机可读存储介质,其特征在于,包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求21至25中的任一项所述的方法;或者,实现如权利要求26至30中的任一项所述的方法。
  55. 一种计算机程序产品,其特征在于,包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求21至25中的任一项所述的方法;或者,实现如权利要求26至30中的任一项所述的方法。
  56. 一种通信系统,其特征在于,包括:权利要求31至35中的任一项所述的数据传输装置,和/或,权利要求36至40中的任一项所述的数据传输装置。
  57. 一种数据传输装置,其特征在于,包括:存储器和处理器;
    所述存储器用于存储计算机执行指令,所述处理器执行所述存储器存储的所述计算机执行指令,以使所述数据传输装置实现如权利要求41或42所述的方法;或者,实现如权利要求43或44所述的方法。
  58. 一种计算机可读存储介质,其特征在于,包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求41或42所述的方法;或者,实现如权利要求43或44所述的方法。
  59. 一种计算机程序产品,其特征在于,包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求41或42所述的方法;或者,实现如权利要求43或44所述的方法。
  60. 一种通信系统,其特征在于,包括:权利要求45或46所述的数据传输装置,和/或,权利要求47或48所述的数据传输装置。
PCT/CN2020/071244 2019-01-11 2020-01-09 数据传输方法及装置 WO2020143723A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910028860.9A CN111436135A (zh) 2019-01-11 2019-01-11 数据传输方法及装置
CN201910028860.9 2019-01-11

Publications (1)

Publication Number Publication Date
WO2020143723A1 true WO2020143723A1 (zh) 2020-07-16

Family

ID=71521773

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/071244 WO2020143723A1 (zh) 2019-01-11 2020-01-09 数据传输方法及装置

Country Status (2)

Country Link
CN (1) CN111436135A (zh)
WO (1) WO2020143723A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022147834A1 (zh) * 2021-01-11 2022-07-14 北京小米移动软件有限公司 一种传输方法、传输装置及存储介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022193254A1 (zh) * 2021-03-18 2022-09-22 华为技术有限公司 一种通信方法、装置和系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108631920A (zh) * 2017-03-24 2018-10-09 华为技术有限公司 一种数据传输方法及装置
WO2018184435A1 (en) * 2017-04-03 2018-10-11 Huawei Technologies Co., Ltd. Methods and systems for resource configuration of wireless communication systems
CN108882371A (zh) * 2017-05-15 2018-11-23 华为技术有限公司 一种资源配置方法、设备及系统
WO2020019982A1 (zh) * 2018-07-24 2020-01-30 华为技术有限公司 传输信息的方法、网络设备和终端设备

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108668367B (zh) * 2017-04-01 2020-06-02 华为技术有限公司 一种数据传输方法、网络设备和终端
CN109121166A (zh) * 2017-06-22 2019-01-01 维沃移动通信有限公司 一种数据传输方法、基站和用户终端
WO2020073203A1 (zh) * 2018-10-09 2020-04-16 Oppo广东移动通信有限公司 一种资源配置方法及装置、通信设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108631920A (zh) * 2017-03-24 2018-10-09 华为技术有限公司 一种数据传输方法及装置
WO2018184435A1 (en) * 2017-04-03 2018-10-11 Huawei Technologies Co., Ltd. Methods and systems for resource configuration of wireless communication systems
CN108882371A (zh) * 2017-05-15 2018-11-23 华为技术有限公司 一种资源配置方法、设备及系统
WO2020019982A1 (zh) * 2018-07-24 2020-01-30 华为技术有限公司 传输信息的方法、网络设备和终端设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022147834A1 (zh) * 2021-01-11 2022-07-14 北京小米移动软件有限公司 一种传输方法、传输装置及存储介质

Also Published As

Publication number Publication date
CN111436135A (zh) 2020-07-21

Similar Documents

Publication Publication Date Title
CN111770577B (zh) 确定传输资源的方法及装置
WO2020199854A1 (zh) 确定传输资源的方法及装置
WO2020143808A1 (zh) 免授权传输的方法及装置
WO2020063909A1 (zh) 上行免动态授权传输的方法及装置
WO2022028311A1 (zh) 一种物理下行控制信道增强方法、通信装置及系统
CN111614434B (zh) 搜索空间的盲检方法及通信装置
WO2019096030A1 (zh) 跳频处理方法及设备
WO2020200176A1 (zh) 确定传输资源的方法及装置
WO2020034740A1 (zh) 一种调度请求资源确定及配置方法、设备及存储介质
WO2020143723A1 (zh) 数据传输方法及装置
WO2021098355A1 (zh) Csi测量方法及装置
WO2021031906A1 (zh) 配置时域资源的方法和装置
US20230088374A1 (en) Buffer determining method and apparatus
WO2020200177A1 (zh) 通信方法、装置、设备及存储介质
WO2020030025A1 (zh) 用于上报csi的方法和装置
JP6910483B2 (ja) 通信方法、ネットワークデバイス、およびユーザ機器
WO2022068177A1 (zh) 用于资源调度的通信方法及装置
WO2019191971A1 (zh) 数据传输方法、终端设备及网络设备
WO2020063266A1 (zh) 一种harq进程id的确定方法、装置、终端及介质
WO2020221070A1 (zh) 拥塞控制方法及设备
WO2020156471A1 (zh) 信号传输方法及装置
WO2021030943A1 (zh) 一种确定重复传输资源的方法及装置
WO2021088062A1 (zh) 一种通信方法及装置
WO2019062789A1 (zh) 一种时域信息的确定方法及装置
WO2022082461A1 (zh) 通信方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20737918

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20737918

Country of ref document: EP

Kind code of ref document: A1