WO2020156180A1 - Procédé de communication, dispositif terminal, et dispositif de réseau d'accès - Google Patents

Procédé de communication, dispositif terminal, et dispositif de réseau d'accès Download PDF

Info

Publication number
WO2020156180A1
WO2020156180A1 PCT/CN2020/072295 CN2020072295W WO2020156180A1 WO 2020156180 A1 WO2020156180 A1 WO 2020156180A1 CN 2020072295 W CN2020072295 W CN 2020072295W WO 2020156180 A1 WO2020156180 A1 WO 2020156180A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
terminal device
cot
access network
network device
Prior art date
Application number
PCT/CN2020/072295
Other languages
English (en)
Chinese (zh)
Inventor
王俊伟
刘建琴
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020156180A1 publication Critical patent/WO2020156180A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/04Scheduled access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0808Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access

Definitions

  • This application relates to the field of communication technology, and in particular to a communication method, terminal equipment, and access network equipment.
  • MBB mobile broadband
  • Increasing spectrum resources can improve network performance.
  • unlicensed (unlicensed) frequency band resources Unlicensed frequency bands have a shared nature.
  • Multiple communication systems can receive and send data in this unlicensed frequency band, but they need to meet the legal constraints of the International Telecommunication Union (ITU). (Listen Before Talk, LBT) and other listening technologies access the channel.
  • ITU International Telecommunication Union
  • LBT Listen Before Talk
  • the embodiments of the present application provide a communication method, terminal equipment, and access network equipment, in order to improve the efficiency of successfully sending messages and reduce communication delay.
  • an embodiment of the present application provides a communication method, including:
  • the terminal device receives the first message sent by the access network device.
  • the first message is used to instruct the terminal device to send the configuration parameters of the second message, where the configuration parameters include the authorized time domain location of the second message;
  • the terminal device sends the second message until the first condition is met; when the authorized time domain position is not within the COT, or when the terminal device does not receive the COT, the terminal device Send the second message until the second condition is met.
  • the terminal device can send the second message multiple times within the COT indicated by the access network device and not within the COT, which can improve the efficiency of successfully sending the second message without waiting for the next message indicated by the access network device. COT, thereby reducing the transmission delay of the second message.
  • a possible first condition includes one of the following conditions: the second message is sent successfully; the number of times the second message is sent reaches the first threshold; the time domain location for sending the second message is not Within COT.
  • Another possible first condition includes one of the following conditions: the second message is sent successfully; the number of times the second message is sent reaches the first threshold.
  • the terminal device stops sending the second message.
  • the first threshold here refers to the number of times the second message is sent when the authorized time domain location is within the COT.
  • the first threshold may be 1 time or at least twice.
  • the terminal device obtains the first threshold.
  • the second condition includes one of the following conditions: the second message is sent successfully; the number of times the second message is sent reaches the second threshold. Specifically, when the authorized time domain location is not in the COT, if any one of the second conditions is met, the terminal device stops sending the second message.
  • the second threshold here refers to the number of times that the authorized time domain location does not send the second message within the COT.
  • the second threshold may be 1 time or at least twice.
  • the terminal device obtains the second threshold.
  • this application can determine the time domain of the next second message transmission based on the offset and the time domain position of the previous second message. position.
  • the offset is represented by the first offset.
  • the first offset is used to indicate the time offset between the authorized time domain position within the COT where the second message is sent twice.
  • the terminal device obtains the first offset.
  • the offset is represented by the second offset, and the second offset is used to indicate that the authorized time domain position is not in the COT or has not been received
  • the terminal device obtains the second offset.
  • the time offset between the time domain positions may specifically be the time offset between the time domain start positions; alternatively, it may be the time offset between the time domain end positions, or it may be the previous one
  • the time offset between the end position of the time domain position and the start position of the current time domain position does not limit this.
  • the terminal device also needs to obtain channel access parameters.
  • the channel access parameters used when the time domain position of the second message is sent are within the COT and the channel access parameters used when the time domain position of the second message is sent are not within the COT.
  • the channel access parameters used when the time domain position of the second message is sent are within the COT and the channel access parameters used when the time domain position of the second message is not within the COT.
  • the first parameter is used to indicate the channel access parameter used when the time domain position of sending the second message is within the COT
  • the second parameter is used to indicate the channel access parameter used when the time domain position of sending the second message is not within the COT.
  • This application does not limit the number of bits occupied by each channel access parameter, and does not limit the LBT situation indicated by each channel access parameter.
  • the embodiment of the present application also relates to an uplink sharing indication request and sharing COT information.
  • the terminal device obtains an uplink sharing indication request.
  • the uplink sharing indication request is used to instruct the terminal device to report shared COT information to the access network device. Sharing COT information is in response to a sharing instruction request.
  • the uplink sharing indication request can also be named in a manner such as the uplink sharing indication, and this application does not limit the naming method of the uplink sharing indication request and the shared COT information.
  • the terminal device sends shared COT information to the access network device.
  • Shared COT information is the COT obtained after the terminal device successfully executes the LBT process when the authorized time domain location is not within the COT indicated by the access network device.
  • the shared COT information includes the length of time information that can be shared with the access network device, for example, it may include the shared COT The start time position and end time position of the; or, it can include the start time position and duration of the shared COT.
  • the sharing time length information may be based on a time unit (for example, milliseconds), or a time slot as a unit, a symbol as a unit, or a subframe as a unit, which is not limited in this embodiment of the application.
  • a time unit for example, milliseconds
  • a time slot as a unit
  • a symbol as a unit
  • a subframe as a unit
  • the access network device notifies the terminal device of the uplink sharing indication request by sending, when the first message is msg2 and the second message is msg3, when the access network device determines that the terminal device is contention-based During random access, since the first message includes the CSI bit, this application may use the CSI bit in the first message to instruct the terminal device to report the shared COT information.
  • the embodiment of the present application may also involve at least one frequency domain location where the LBT process is performed in the frequency domain.
  • the terminal device obtains the at least one frequency domain location.
  • a frequency domain position here refers to the frequency domain position of the terminal device when the time domain position of sending the second message is within the COT and the time domain position of sending the second message is not within the COT.
  • the time domain position of sending the second message when the time domain position of sending the second message is within the COT, there is one frequency domain position for sending the second message, which is represented by the first frequency domain position; sent when the time domain position of sending the second message is not within the COT
  • the frequency domain position of the second message is at least one, represented by M second frequency domain positions, and M is a positive integer.
  • the terminal device in the embodiment of the present application needs to obtain at least one of the following information: a first threshold, a second threshold, a first offset, a second offset, an uplink sharing indication request, At least one frequency domain location, a first parameter, a second parameter, etc., the embodiment of the present application does not limit the manner in which the terminal device obtains the above information.
  • part of the above information may be sent to the terminal device, and part of the information may be directly determined by the terminal device in a pre-appointed or default manner, which is not limited in the embodiment of the present application.
  • all or part of the above information can be notified to the terminal device in the same sending message; or, the above messages can also be notified separately in different sending messages.
  • the first message is msg2, and the second message is msg3.
  • msg3 is a contention resolution message sent to the access network device by the terminal device after receiving msg2.
  • the first message is high-level signaling.
  • the high-level signaling is a configuration message of msg1 sent through a broadcast message, including: time/frequency domain position information, second threshold, channel access parameters, etc., and the second message is msg1.
  • the first message is a downlink control channel message and/or a high-level signaling configuration message
  • the second message is a hybrid automatic repeat request (HARQ) acknowledgement (ACK)/not acknowledgement (not acknowledgement) , NACK) data, etc.
  • HARQ hybrid automatic repeat request
  • an embodiment of the present application provides a communication method, including:
  • the access network device sends a first message to the terminal device.
  • the first message is used to instruct the terminal device to send the configuration parameters of the second message, where the configuration parameters include the authorized time domain location of the second message; the access network device receives the terminal device's transmission The second news.
  • the access network device sends the configuration parameters of the second message to the terminal device through the first message, so that the terminal device can send the second message multiple times within the COT indicated by the access network device or not in the COT ,
  • the efficiency of successfully sending the second message can be improved, and the efficiency of successfully receiving the second message by the access network device can be correspondingly improved, thereby reducing the transmission delay of the second message.
  • the access network device may send the first threshold to the terminal device.
  • the first threshold here refers to the number of times the second message is sent when the authorized time domain location is within the COT.
  • the first threshold may be 1 time or at least twice.
  • the access network device may send the second threshold to the terminal device.
  • the second threshold here refers to the number of times that the authorized time domain location does not send the second message within the COT.
  • the second threshold may be 1 time or at least twice.
  • this application can determine the time domain of the next second message transmission based on the offset and the time domain position of the previous second message. position.
  • the offset is represented by the first offset.
  • the first offset is used to indicate the time offset between the authorized time domain position within the COT where the second message is sent twice.
  • the access network device may send the first offset to the terminal device.
  • the offset is represented by the second offset, and the second offset is used to indicate that the authorized time domain position is not in the COT or has not been received
  • the access network device may send the second offset to the terminal device.
  • the time offset between the time domain positions may specifically be the time offset between the time domain start positions; alternatively, it may be the time offset between the time domain end positions, or it may be the previous one
  • the time offset between the end position of the time domain position and the start position of the current time domain position does not limit this.
  • the access network device may send channel access parameters to the terminal device.
  • the channel access parameters used when the time domain position of the second message is sent are within the COT and the channel access parameters used when the time domain position of the second message is sent are not within the COT.
  • the channel access parameters used when the time domain position of the second message is sent are within the COT and the channel access parameters used when the time domain position of the second message is not within the COT.
  • the first parameter is used to indicate the channel access parameter used when the time domain position of sending the second message is within the COT
  • the second parameter is used to indicate the channel access parameter used when the time domain position of sending the second message is not within the COT.
  • This application does not limit the number of bits occupied by each channel access parameter, and does not limit the LBT situation indicated by each channel access parameter.
  • the access network device may send an uplink sharing indication request to the terminal device.
  • the uplink sharing indication request is used to instruct the terminal device to report shared COT information to the access network device.
  • the uplink sharing indication request can also be named in a manner such as the uplink sharing indication, and this application does not limit the naming method of the uplink sharing indication request and the shared COT information.
  • the access network device receives the shared COT information sent by the terminal device.
  • the shared COT information is the COT obtained after the terminal device successfully executes the LBT process when the authorized time domain location is not within the COT indicated by the access network device.
  • the shared COT information includes the length of time information that can be shared with the access network device, for example It may include the start time position and end time position of the shared COT; or, may include the start time position and duration of the shared COT.
  • the sharing time length information may be based on a time unit (for example, milliseconds), or a time slot as a unit, a symbol as a unit, or a subframe as a unit, which is not limited in this embodiment of the application.
  • a time unit for example, milliseconds
  • a time slot as a unit
  • a symbol as a unit
  • a subframe as a unit
  • the access network device notifies the terminal device of the uplink sharing indication request by sending, when the first message is msg2 and the second message is msg3, when the access network device determines that the terminal device is contention-based During random access, since the first message includes the CSI bit, this application may use the CSI bit in the first message to instruct the terminal device to report the shared COT information.
  • the embodiment of the present application may also involve at least one frequency domain location where the LBT process is performed in the frequency domain.
  • the access network device may send to the terminal device at least one frequency domain location for performing the LBT process in the frequency domain.
  • a frequency domain position here refers to the frequency domain position of the terminal device when the time domain position of sending the second message is within the COT and the time domain position of sending the second message is not within the COT.
  • the time domain position of sending the second message when the time domain position of sending the second message is within the COT, there is one frequency domain position for sending the second message, which is represented by the first frequency domain position; sent when the time domain position of sending the second message is not within the COT
  • the frequency domain position of the second message is at least one, represented by M second frequency domain positions, and M is a positive integer.
  • the embodiment of the present application requires at least one of the following information that the terminal device needs to obtain: a first threshold, a second threshold, a first offset, a second offset, and uplink sharing indication Request, at least one frequency domain location, first parameter, second parameter, etc.
  • the access network device may partially or completely notify the terminal device by sending, or partially or completely use a pre-appointed or default method for the terminal device to directly determine This embodiment of the application does not limit this.
  • all or part of the above information can be notified to the terminal device in the same sending message; or, the above messages can also be notified separately in different sending messages.
  • the first message is msg2, and the second message is msg3.
  • msg3 is a contention resolution message sent to the access network device by the terminal device after receiving msg2.
  • the first message is high-level signaling.
  • the high-level signaling is a msg1 configuration message sent through a broadcast message, including: time/frequency domain position information, second thresholds, channel access parameters, etc., and the second The message is msg1.
  • the first message is a downlink control channel message and or a high-level signaling configuration message
  • the second message is confirmation/non-confirmation data of the hybrid automatic repeat request.
  • the specific implementation for the access network device to receive the second message is: the access network device can determine that the terminal device sends the second message according to the indicated COT and the configured authorized time domain location for sending the second message Second, the time-frequency position of the message, and the second message is received according to the determined time-frequency position.
  • the access network device may also combine at least one of the first threshold, the second threshold, the first offset, the second offset, at least one frequency domain position in the frequency domain, an uplink sharing indication request, etc.
  • One piece of information is used to determine the time-frequency position of the terminal device to send the second message.
  • the access network device performs detection in turn until all the time and frequency positions of the second message are sent. The frequency position is detected or the second message is successfully received.
  • an embodiment of the present application provides a terminal device, including:
  • a receiving module configured to receive a first message sent by an access network device, the first message is used to instruct the terminal device to send a configuration parameter of the second message, where the configuration parameter includes the authorized time domain location of the second message;
  • the processing module is used to make the sending module send the second message when the authorized time domain position is within the channel occupation time COT indicated by the access network device until the first condition is met;
  • the terminal device may also implement the foregoing first aspect and the method executed in any one of the possible implementation manners of the first aspect.
  • an embodiment of the present application provides a network device, including:
  • a sending module configured to send a first message to a terminal device, the first message is used to instruct the terminal device to send a configuration parameter of the second message, where the configuration parameter includes the authorized time domain location of the second message;
  • the receiving module is used to receive the second message sent by the terminal device.
  • the network device may also implement the foregoing second aspect and the method performed by any one of the possible implementation manners of the second aspect.
  • an embodiment of the present application provides a communication device.
  • the communication device may be the terminal device in the above device design, or a chip set in the terminal device.
  • the communication device includes: a processor, a memory, and a transceiver;
  • the transceiver is used to receive and send messages
  • the memory is used to store instructions
  • the processor is configured to execute instructions stored in the memory.
  • the communication device executes the foregoing first aspect and the method executed by any one of the possible implementations of the first aspect.
  • an embodiment of the present application provides a communication device.
  • the communication device may be a network device in the above device design, or a chip set in the network device.
  • the communication device includes: a processor, a memory, and a transceiver;
  • the transceiver is used to receive and send messages
  • the memory is used to store instructions
  • the processor is configured to execute instructions stored in the memory.
  • the communication device executes the second aspect and the method executed by any one of the possible implementations of the second aspect.
  • a communication system for an embodiment of this application, and the communication system includes a terminal device and an access network device.
  • the terminal device is used to execute the method performed by the foregoing first aspect and any one of the possible implementation manners of the first aspect
  • the access network device is used to implement any one of the foregoing second aspect and any one of the second aspects. The method executed by the implementation.
  • embodiments of the present application provide a computer program product, the computer program product includes: computer program code, when the computer program code runs on a computer, the computer executes the first aspect and any possible implementation manners thereof In the method.
  • the embodiments of the present application provide a computer program product.
  • the computer program product includes: computer program code.
  • the computer program code runs on a computer, the computer executes the second aspect and any possible implementations thereof. In the method.
  • an embodiment of the present application provides a readable storage medium, where the readable storage medium is used to store instructions to implement the first aspect and any possible implementation manners thereof.
  • an embodiment of the present application provides a readable storage medium, where the readable storage medium is used to store instructions to implement the second aspect and any possible implementation manners thereof.
  • FIG. 1 is a schematic structural diagram of a possible communication system related to an embodiment of this application;
  • FIG. 2a is an example diagram of an existing message sending provided by an embodiment of this application.
  • FIG. 2b is an example diagram of another existing message sending provided by an embodiment of this application.
  • Figure 3a is an example diagram of a possible COT provided by an embodiment of the application.
  • FIG. 3b is an example diagram of another possible COT provided by an embodiment of this application.
  • FIG. 5 is an example diagram of a possible time domain position for sending a second message according to an embodiment of this application.
  • FIG. 6 is an example diagram of another possible time domain position for sending a second message according to an embodiment of this application.
  • FIG. 7 is an example diagram of another possible time domain position for sending a second message according to an embodiment of this application.
  • FIG. 8a is an example diagram of another possible time domain position for sending a second message according to an embodiment of this application.
  • FIG. 8b is an example diagram of another possible time domain position for sending a second message according to an embodiment of this application.
  • FIG. 9 is an example diagram of defining multiple sub-bands in a possible communication bandwidth provided by an embodiment of this application.
  • FIG. 10 is an example diagram of another possible time-frequency position for sending a second message according to an embodiment of this application.
  • FIG. 11 is a schematic structural diagram of a terminal device provided by an embodiment of this application.
  • FIG. 12 is a schematic structural diagram of another terminal device provided by an embodiment of this application.
  • FIG. 13 is a schematic structural diagram of an access network device provided by an embodiment of this application.
  • FIG. 14 is a schematic structural diagram of another access network device provided by an embodiment of this application.
  • FIG. 1 is a schematic structural diagram of a possible communication system involved in an embodiment of the present application.
  • the communication system includes an access network device 101 and a terminal device 102.
  • the access network device 101 and the terminal device 102 may communicate with each other, for example, the resources of an unlicensed frequency band may be used for communication.
  • the access network device 101 and the terminal device 102 need to perform an LBT process before transmitting data in an unlicensed frequency band.
  • the access network device 101 can send data on that channel; if the LBT process on the channel where the data is to be sent fails, Then the access network device 101 needs to continue to monitor. After the LBT process is successfully executed, the access network device 101 can obtain a channel occupancy time (COT), and the access network device can send channel data or signals in the COT.
  • COT channel occupancy time
  • the current standard stipulates that the maximum channel occupancy time (MCOT) is 3ms, 4ms, 8ms, or 10ms.
  • the access network device 101 After the access network device 101 obtains a COT, it can use the COT to send data by itself, or share the COT with the terminal device 102 so that the terminal device 102 can send uplink data on the COT shared by the access network device 101.
  • the access network device 101 may share the acquired COT with the terminal device 102, which will be introduced in conjunction with FIG. 2a and FIG. 2b.
  • the COT 201 is a COT obtained by the access network device 101.
  • the access network device 101 shares the COT 201 with the terminal device 102.
  • the terminal device 102 sends msg1 in the COT 201 during the random access process.
  • RAR-windows random access time window
  • the terminal device 102 needs to resend msg1.
  • the terminal device 102 needs another COT 202 shared by the access network device 101 to resend msg1, which increases the transmission delay of msg1 and reduces The efficiency of msg1 successfully sent.
  • COT 203 is a COT obtained by the access network device 101.
  • the access network device 101 shares the COT 203 with the terminal device 102.
  • the terminal device 102 receives msg2 in the COT 203 during the random access process. .
  • the terminal device 102 needs to send msg3 to the access network device 101. Since the remaining time in the COT 203 is all downlink symbols/slots, Msg2 cannot schedule Msg3 through the resources in the COT, that is, the terminal device 102 cannot be used in the COT.
  • the sending of msg3 is completed within 203.
  • the terminal device 102 since the channel occupancy time of COT 203 cannot be used to send msg3, the terminal device 102 needs another COT 204 shared by the access network device 101 to resend msg3, and because the access network device executes
  • the result of the LBT process is uncertain, resulting in the uncertain acquisition time of another COT 204, which increases the transmission delay of msg3 and reduces the efficiency of successful msg3 transmission.
  • the non-COT duration involved in Figures 2a and 2b and the embodiments of this application is the channel time that the access network device 101 cannot occupy. Therefore, the terminal device 102 cannot transmit the required transmission in the above two scenarios in this time period. News.
  • the messages shown in Figure 2a and Figure 2b are two messages involved in the random access process. After affecting the efficiency of the successful transmission of the above messages, it also increases the delay of the success of the random access process, and may even cause The random access process failed.
  • the message that the terminal device 102 needs to send is msg3 as an example.
  • the terminal device 102 Before the terminal device 102 arrives at the time domain location of msg3, if the time domain location of the terminal device 102 sending msg3 is within the COT, the terminal device 102 sends msg3 until the first condition is met; if the time domain location where the terminal device 102 sends msg3 is not within the COT, the terminal device 102 sends msg3 until the second condition is met.
  • the terminal device 102 can send msg3 without waiting for the next COT indicated by the access network device, which reduces the transmission delay of msg3 This improves the efficiency of successful msg3 transmission, thereby also reducing the delay in the random access process, which will improve the efficiency of the random access process.
  • the terminal device 102 can send msg3 without waiting for the next COT indicated by the access network device, which reduces the transmission delay of msg3 This improves the efficiency of successful msg3 transmission, thereby also reducing the delay in the random access process, which will improve the efficiency of the random access process.
  • FIG. 3a provides an example diagram of a possible COT in this embodiment of the application.
  • Figure 3a is an example diagram of a COT with a subcarrier spacing (SCS) of 15KHz, where one subframe is 1ms, one subframe includes one slot, and one slot includes 14 symbols.
  • the access network device 101 performs the LBT process on symbols 0, 1, and 2 of subframe 0 and subframe 1, and successfully obtains COT 301 on symbol 2 of subframe 1 after successfully performing the LBT process.
  • the COT 301 is occupied 8 subframes, ending at the end of subframe 8.
  • the access network device 101 obtains the COT 302 at the end of the subframe 11 by performing the LBT process, and the COT 302 occupies 8 subframes.
  • FIG. 3b provides an example diagram of another possible COT in this embodiment of the application.
  • Fig. 3b is an example diagram of COT with SCS of 60KHz, where one subframe is 1ms, one subframe includes 4 slots, and one slot includes 14 symbols.
  • the access network device 101 performs an LBT process on subframe 0, and obtains a COT 303 at the end of subframe 0 after successfully performing the LBT process.
  • the COT 303 occupies 8 subframes and ends at the end of subframe 8.
  • the access network device 101 obtains the COT 304 at the end of the subframe 11 by performing the LBT process, and the COT 304 occupies 6 subframes.
  • FIGS 3a and 3b are merely examples, and the COT involved in the embodiment of the present application may also be COT under other SCS.
  • the LBT process involved in this application includes the following parameters in the existing 3rd Generation Partnership Project (3GPP):
  • LBT CAT 1 No LBT, which means that data can be sent immediately without implementing the LBT mechanism on the unlicensed frequency band;
  • LBT CAT2 LBT without random backoff, also called one shot LBT, that is, only 25us LBT based on energy detection;
  • CCA Clear Channel Assessment
  • a frame structure with an unfixed frame period and a mode based on load changes.
  • the length of the contention window is fixed, and the extended CCA (Extended CCA) is used.
  • the channel is detected to be idle, the data transmission can start immediately, otherwise it will enter the contention window, that is, a fixed number of ECCA windows.
  • LBT CAT4 Random backoff LBT with non-fixed length competition window
  • the sender After detecting that the channel is occupied or the maximum transmission time is reached, the sender enters the contention window. Different from using a fixed-length contention window, the sender can change the length of the contention window in the LBT CAT4 mode. At the same time, the standard is divided into 4 priority levels according to different business types, and the 4 priority levels correspond to different COT lengths and competitions. The parameter of the window length (see Table 1).
  • the msg1, msg2, and msg3 involved in this application are messages in the random access (RA) process, which are specifically:
  • msg1 Random access preamble.
  • the terminal device can randomly select a preamble sequence and send it on a random access channel (RACH). After sending the preamble sequence, the terminal device receives msg2 from the access network device within a random access time window.
  • RACH random access channel
  • msg2 Random access response (RAR). After the access network device detects that a preamble sequence is sent, it sends a random access response in the downlink.
  • the random access response should at least contain the following information: the number of the received preamble sequence, timing adjustment information, and the allocation for the terminal device Uplink resource location indication information, temporarily allocated C-RNTI.
  • msg3 It is an uplink message. After receiving the random access response, the terminal device sends msg3 according to the uplink resource indicated by the random access response.
  • the terminal equipment involved in this application can refer to user equipment (UE), which can be a handheld terminal, a notebook computer, a subscriber unit, a cellular phone, a smart phone, and a personal digital device.
  • UE user equipment
  • PDA personal digital assistant
  • modem wireless modem
  • WLL cordless phone or wireless local loop (wireless local loop)
  • WLL wireless local loop
  • MTC machine type communication
  • the access network equipment involved in this application is mainly responsible for functions such as radio resource management, quality of service (QoS) management, data compression, and encryption on the air interface side.
  • the access network equipment may include various forms of base stations, such as macro base stations, micro base stations (also referred to as small stations), relay stations, and access points.
  • base stations such as macro base stations, micro base stations (also referred to as small stations), relay stations, and access points.
  • the names of devices with base station functions may be different.
  • 5G 5th generation
  • gNB in the fourth generation (4th generation, 5G) system
  • gNB In the generation (4G) system, it is called an evolved NodeB (evolved NodeB, eNB or eNodeB).
  • the embodiments of the present application can also be applied to other communication systems that need to send messages in an unlicensed frequency band.
  • system can be used interchangeably with "network”.
  • the system architecture described in the embodiments of this application is to facilitate the description of the technical solutions of the embodiments of this application, and does not constitute a limitation to the technical solutions provided by the embodiments of this application. Those of ordinary skill in the art will know that with the evolution of the network architecture, this The technical solutions provided in the application embodiments are equally applicable to similar technical problems.
  • “plurality” means two or more than two, and “at least two” means two or more than two.
  • FIG. 4 provides a schematic flowchart of a communication method according to an embodiment of the present application.
  • the method shown in FIG. 4 includes steps 401 to 403.
  • An access network device sends a first message to a terminal device.
  • the terminal device receives the first message.
  • the first message is used to instruct the terminal device to send the configuration parameter of the second message.
  • the configuration parameter includes the authorized time domain location of the second message.
  • the authorized time domain location can be described as the sending time domain opportunity.
  • the configuration parameter of msg1 includes the sending time domain opportunity of msg1.
  • the configuration parameters of msg3 include the authorized time domain location of msg3.
  • the naming method of the authorized time domain location of the second message in the embodiment of the present application is not limited.
  • each time domain position involved is used to indicate the position occupied in the time domain, for example, it can be indicated by the time domain start position and the time domain end position; or, the time domain start position and the time domain duration To instruct.
  • the terminal device When the authorized time domain location is within the channel occupation time COT indicated by the access network device, the terminal device sends a second message until the first condition is met.
  • a possible first condition includes one of the following conditions: the second message is sent successfully; the number of times the second message is sent reaches the first threshold; the time domain position of sending the second message is not within the COT.
  • the terminal device stops sending the second message.
  • the condition "the time domain position of sending the second message is not within the COT" means that when the second message is sent for at least two times, the time domain position of the second message is not in the COT for any number of times other than the first time. In this case, the second message will stop sending.
  • Another possible first condition includes one of the following conditions: the second message is sent successfully; the number of times the second message is sent reaches the first threshold. Specifically, when the authorized time domain location is within the COT indicated by the access network device, if any one of the first conditions is met, the terminal device stops sending the second message.
  • the first threshold here refers to the number of times the second message is sent when the authorized time domain location is within the COT.
  • the first threshold may be 1 time or at least twice.
  • the access network device notifies the terminal device of the first threshold in a sending manner, so that the terminal device can obtain the first threshold. For example, the access network device sends the first threshold or first indication information indicating the first threshold to the terminal device. Among them, if it is assumed that the first threshold can be selected from the set ⁇ 1, 2, 3, 4 ⁇ , if the selection is 4 times, the first threshold sent can be 4; or, the first indication information of the first threshold occupies Two bits, "11" can be used to indicate that the first threshold is 4 times.
  • the access network device may use a broadcast message to send the first threshold or the first indication information to the terminal device in a broadcast manner; or the access network device may use terminal dedicated high-level signaling or use a physical layer control channel or other messages Send the first threshold or the first indication information to the terminal device.
  • the embodiment of the present application does not limit the sending manner of the first threshold, the type of message carrying the first threshold, and the number of bits occupied by the first threshold.
  • the first threshold may be a predetermined or default value in the communication system, so that the access network device does not need to send the first threshold or does not need to send the first indication information indicating the first threshold.
  • the terminal device can directly determine the first threshold, which saves transmission overhead.
  • the terminal device When the authorized time domain location is not within the COT, or when the terminal device does not receive the COT, the terminal device sends a second message until the second condition is met.
  • the access network device receives the second message.
  • the access network device can determine the time-frequency position of the terminal device to send the second message according to the indicated COT and the configured authorized time-domain position for sending the second message, and compare the second message according to the determined time-frequency position. The message is received.
  • the access network device may also combine at least one of the first threshold, the second threshold, the first offset, the second offset, at least one frequency domain position in the frequency domain, an uplink sharing indication request, etc.
  • One piece of information is used to determine the time-frequency position of the terminal device to send the second message.
  • the access network device performs detection in turn until all the time and frequency positions of the second message are sent. The frequency position is detected or the second message is successfully received.
  • the difference between the access network device determining the time-frequency location of the terminal device to send the second message and the terminal device determining the time-frequency location of the second message is that the access network device does not need to perform the LBT process, so regardless of the terminal device If the LBT process succeeds or fails, the access network device will detect the second message at the determined time-frequency location; and the terminal device only sends the second message at the time-frequency location where the LBT process is successfully executed. Therefore, for the access network device to determine the time-frequency position of the terminal device to send the second message, reference may be made to the following description of the time-frequency position of the terminal device to send the second message, except for performing the LBT process, which will not be repeated here.
  • the second condition includes one of the following conditions: the second message is sent successfully; the number of times the second message is sent reaches the second threshold. Specifically, when the authorized time domain location is not in the COT, if any one of the second conditions is met, the terminal device stops sending the second message.
  • the second threshold here refers to the number of times that the authorized time domain location does not send the second message within the COT.
  • the second threshold may be 1 time or at least twice.
  • the access network device notifies the terminal device of the second threshold in a sending manner, so that the terminal device can obtain the second threshold.
  • the access network device sends the second threshold or second indication information indicating the second threshold to the terminal device.
  • the second threshold can be selected from the set ⁇ 2, 4, 6, 8 ⁇ , if the selection is 6 times, the sent second threshold can be 6; or, the second indication information of the second threshold is occupied Two bits, "10" can be used to indicate that the second threshold is 6 times.
  • the access network device sends third indication information to the terminal device, where the third indication information is used to indicate a multiple relationship or a difference relationship between the second threshold and the first threshold.
  • the sent third indication information may be 3, which means that the second threshold is 3 times the first threshold, or the sent third indication The information may be 4, which means that the difference between the second threshold and the first threshold is 4.
  • the access network device may send the second threshold, the second indication information, or the third indication information to the terminal device in a broadcast manner; or the access network device may send the second threshold, the second indication information, or the third indication information to the terminal device through high-level signaling or other messages. Threshold, second indication information or third indication information.
  • the embodiment of the present application does not limit the sending mode of the second threshold, the type of message carrying the second threshold, and the number of bits occupied by the second threshold.
  • the second threshold may be a predetermined or default value in the communication system, so that the access network device does not need to send the second threshold and does not need to send the second indication information indicating the second threshold and There is no need to send the third indication information, and the terminal device can directly determine the second threshold, which saves transmission overhead.
  • the access network device may notify the terminal device of the first threshold by sending, and the second threshold is a predetermined or default value.
  • the access network device may notify the terminal device of the second threshold by sending, and the first threshold is a predetermined or default value.
  • the access network device may notify the terminal device of the first threshold and the second threshold by sending. In this case, the access network device may notify the first threshold and the second threshold in the same sending message, or The first threshold and the second threshold are notified in different sending messages. Or, both the first threshold and the second threshold are predetermined or default values.
  • the embodiment of the present application does not limit the manner in which the terminal device determines the first threshold and the second threshold.
  • the second threshold is greater than or equal to the first threshold. In this way, the number of times that the second message is not sent in the COT is greater than the number of times the second message is sent in the COT, thereby increasing the chance of the terminal device to send the second message, increasing the probability of successfully sending the second message, and reducing the communication delay.
  • the COT in step 402 and step 403 is a COT obtained by the access network device by executing the LBT process, and the COT is shared with the terminal device.
  • the access network device sends the COT indication information to the terminal device, and the indication information may be a downlink COT indication or other messages containing COT length indications.
  • the COT indication information is used to indicate the channel occupation start time and channel occupation duration currently obtained by the access network device and shared with the terminal device; or, the COT indication information is used to indicate the access network device currently obtains and The channel occupancy start time and channel occupancy end time shared with the terminal device.
  • the COT indication information can be carried in the downlink control channel, or carried in the data block activation signal (a signal used to indicate the start of data transmission).
  • the terminal device determines whether the COT indicated by the access network device is received. If the COT is received, determine whether the authorized time domain location is within the COT; if the authorized time domain location is within the COT, send a second message until the first condition is met; if the authorized time domain location is not within the COT, then Send the second message until the second condition is met. If the COT is not received, the second message is sent until the second condition is met.
  • this application can determine the time domain position of the second message sent next time by using the offset and the time domain position of the previous second message sent.
  • the offset is represented by the first offset.
  • the first offset is used to indicate the time offset between the authorized time domain position within the COT where the second message is sent twice.
  • the offset is represented by the second offset, and the second offset is used to indicate that the authorized time domain position is not in the COT or has not been received The time offset between the time domain positions where the second message is sent to the COT twice.
  • the time offset between the time domain positions may specifically be the time offset between the time domain start positions; alternatively, it may be the time offset between the time domain end positions, or it may be the previous one
  • the time offset between the end position of the time domain position and the start position of the current time domain position does not limit this.
  • the access network device may notify the terminal device of the first offset in a sending manner, and the second offset is a predetermined or default value.
  • the access network device may notify the terminal device of the second offset in a sending manner, and the first offset is a predetermined or default value.
  • the access network device may notify the terminal device of the first offset and the second offset in a sending manner. In this case, the access network device may notify the first offset and the second offset in the same transmission message.
  • the second offset may also be separately notified of the first offset and the second offset in different sent messages.
  • the first offset and the second offset are both pre-appointed or default values, and the terminal device can directly determine the first offset and the second offset, which saves transmission overhead.
  • the first offset and/or the second offset may be carried in the high-layer signaling.
  • the embodiment of the present application does not limit the manner in which the terminal device determines the first offset and/or the second offset. If the terminal device is notified by sending, the embodiment of this application does not limit the message carrying the first offset and/or the second offset.
  • the time offset may be based on a time unit (eg, milliseconds), or may be based on a time slot as a unit, a symbol as a unit, or a subframe as a unit, which is not limited in the embodiment of the present application.
  • the offset can be 0.5 time slots, 1 time slot, 3 time slots, and so on.
  • the offset when the time offset is represented by the time offset between the end position of the previous time domain position and the start position of the current time domain position, the offset can be 0 time slots and 1 time slot. Slot, 3 slots, etc., or the offset can be 0 symbols, 1 symbol, 3 symbols.
  • SCS subcarrier spacing
  • the terminal device also needs to obtain channel access parameters, which are described in detail through the following (1-1) to (1-4).
  • the channel access parameter used when the time domain position of the second message is sent is within the COT and the channel access parameter used when the time domain position of the second message is sent is not within the COT
  • the parameters are the same.
  • the access network device notifies the terminal device of the channel access parameters by sending, so that the terminal device determines the channel access parameters used in the COT.
  • the channel access parameters are carried in the first message.
  • the embodiment of the application does not limit the message carrying channel access parameters.
  • the channel access parameters are pre-appointed or default parameters.
  • the terminal device can directly determine the channel access parameters, saving transmission overhead.
  • the channel access parameter used when the time domain position of the second message is sent is within the COT and the channel access parameter used when the time domain position of the second message is sent is not within the COT
  • the parameters are different.
  • the first parameter is used to indicate the channel access parameter used when the time domain position of sending the second message is within the COT
  • the second parameter is used to indicate the channel access parameter used when the time domain position of sending the second message is not within the COT.
  • the access network device may notify the terminal device of the first parameter in a sending manner, and the second parameter is a preset or default value.
  • the access network device may notify the terminal device of the second parameter in a sending manner, and the first parameter is a predetermined or default value.
  • the access network device may notify the terminal device of the first parameter and the second parameter in a sending manner. In this case, the access network device may notify the first parameter and the second parameter in the same sending message, or The first parameter and the second parameter are notified separately in different sending messages.
  • both the first parameter and the second parameter are predetermined or default values, and the terminal device can directly determine the first parameter and the second parameter, which saves transmission overhead.
  • the first parameter and/or the second parameter may be carried in the high-layer signaling.
  • the embodiment of the present application does not limit the manner in which the terminal device determines the first parameter and/or the second parameter.
  • the channel access parameter, the first parameter or the second parameter in the same manner involved can be any of the following methods:
  • the parameters can be any of all or part of the LBT conditions formulated by the future standard protocol; or, as the network architecture evolves, the channel access parameters can include any of the part of the LBT conditions formulated by the future standard protocol and the newly configured parameters .
  • all the LBT conditions included in the existing 3GPP are shown in the text part of Figure 3b "2.
  • the LBT process involved in this application includes the following in the existing 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) The detailed introduction in "parameter situation" will not be repeated here.
  • the terminal device determines that the channel access parameter is a certain priority of the newly defined LBT CAT 4, it can also determine the corresponding channel access parameter value.
  • the third parameter can occupy 3 bits.
  • the third parameter in Table 3 may be the same channel access parameter used when the time domain position of sending the second message is within the COT and when the time domain position of sending the second message is not within the COT, or the first parameter .
  • 5 types of channel access parameters can be indicated by 3 bits, which enriches the choice of channel access parameters used by the terminal equipment.
  • the third parameter can occupy 2 bits.
  • the third parameter in Table 4 may be the same channel access parameter used when the time domain position of sending the second message is within the COT and when the time domain position of sending the second message is not within the COT, or the first parameter .
  • the third parameter may indicate LBT CAT 1, LBT CAT 2, the first level of LBT CAT 4, and the second level of LBT CAT 4.
  • Table 4 uses fewer bits, which can reduce transmission overhead.
  • the first level of LBT CAT 4 can be any priority in the existing 3GPP or future protocol standards with the channel access type being LBT CAT 4; or the first level of LBT CAT 4 can be different from 3GPP and different from Any redefined level of LBT CAT 4 of the future protocol standard.
  • the second level of LBT CAT 4 can be any priority of the channel access type LBT CAT 4 in the existing 3GPP or future protocol standards; or the second level of LBT CAT 4 can be different from 3GPP and different Any one of the redefined levels of LBT CAT 4 of the future protocol standard.
  • the access parameter values corresponding to the first level LBT CAT 4 and the second level LBT CAT 4 are different.
  • the redefined level can be any one of the levels defined in Table 2.
  • the third parameter can occupy 2 bits.
  • the third parameter in Table 5 may be the second parameter.
  • the third parameter can indicate four levels of LBT CAT 4.
  • the four levels of LBT CAT4 are the four levels in the existing 3GPP.
  • each level of LBT CAT4 in Table 5 is not limited to be included in the four levels of the existing 3GPP or future protocol standards, and it can also be any one of LBT CAT4 that is different from 3GPP and different from future protocol standards. Redefined level.
  • this application does not limit the number of bits occupied by each parameter, and does not limit the LBT situation indicated by each parameter.
  • the embodiments of this application may also involve uplink sharing indication request and sharing COT information.
  • the uplink sharing indication request is used to instruct the terminal device to report shared COT information to the access network device. Sharing COT information is in response to a sharing instruction request.
  • the uplink sharing indication request can also be named in a manner such as the uplink sharing indication, and this application does not limit the naming method of the uplink sharing indication request and the shared COT information.
  • the access network device notifies the terminal device of the uplink sharing indication request by sending, so that the terminal device can obtain the uplink sharing indication request.
  • the access network device may send an uplink sharing indication request to the terminal device through high-level signaling or other messages.
  • the embodiment of the present application does not limit the sending manner of the uplink sharing indication request, and does not limit the message type that carries the uplink sharing indication request.
  • the access network device does not send an uplink sharing instruction request
  • reporting shared COT information can be a pre-appointed or default method in the communication system, so that the access network device does not need to send an uplink sharing instruction request.
  • the terminal device can directly feed back the shared COT information, which saves the transmission overhead of the uplink sharing indication request.
  • the uplink sharing indication request may be carried in the first message.
  • this application may use the channel state information (channel state information, CSI) bit in the first message to instruct the terminal device to report the shared COT information.
  • CSI channel state information
  • the shared COT information is the COT obtained after the terminal device successfully executes the LBT process when the authorized time domain location is not within the COT indicated by the access network device.
  • the shared COT information includes the length of time information that can be shared with the access network device. For example, the start time position and the end time position of the shared COT may be included; or, the start time position and the duration of the shared COT may be included.
  • the sharing time length information may be based on a time unit (for example, milliseconds), or a time slot as a unit, a symbol as a unit, or a subframe as a unit, which is not limited in this embodiment of the application.
  • a time unit for example, milliseconds
  • a time slot as a unit
  • a symbol as a unit
  • a subframe as a unit
  • the second message includes shared COT information, so that the terminal device can share the shared COT information with the access network device in the process of sending the second message.
  • the shared COT information is carried in the uplink control information to be sent to the access network device, for example, the shared COT information is carried by the medium access control-control element (MAC-CE) in the second message .
  • the shared COT information is included in other messages to be reported to the access network device, which is not limited in this application.
  • the shared COT information is reported based on the uplink control message, that is, relevant information elements are set in the uplink control message. For example: 00 means no COT sharing; 01 means shared COT length is 1ms; 10 means shared COT length is 2ms; 11 means shared COT length is 4ms.
  • the embodiment of the present application may also involve at least one frequency domain position where the LBT process is performed in the frequency domain, which is introduced through the following (2-1) and (2-2).
  • the frequency domain position is one.
  • a frequency domain position here refers to the frequency domain position of the terminal device when the time domain position of sending the second message is within the COT and the time domain position of sending the second message is not within the COT.
  • the frequency domain position may be carried in the configuration parameters of the second message, and named as an authorized frequency domain position or named as a transmission frequency domain position.
  • the configuration parameter of msg1 in the first message includes the transmission frequency domain position of msg1.
  • the configuration parameter of msg3 in the first message includes the authorized frequency domain position of msg3.
  • the manner in which the terminal device in the embodiment of the present application determines the frequency domain position is not limited. If the frequency domain position of the terminal device is notified by the sending method, the embodiment of the present application does not limit the message carrying the frequency domain position.
  • the access network device may notify the terminal device of the first frequency domain position in a sending manner, and the M second frequency domain positions are predetermined or default values.
  • the access network device may notify the terminal device of the M second frequency domain positions in a sending manner, where the first frequency domain position is a predetermined or default value.
  • the access network device may notify the terminal device of the first frequency domain location and M second frequency domain locations by sending. In this case, the access network device may notify the first frequency domain in the same sending message
  • the position and the M second frequency domain positions may also be notified of the first frequency domain position and the M second frequency domain positions in different sending messages.
  • the first frequency domain position and the M second frequency domain positions are both pre-appointed or default values, and the terminal device can directly determine the first frequency domain position and M second frequency domain positions, which saves transmission overhead.
  • the terminal device is notified of the first frequency domain position and/or M second frequency domain positions in a sending manner, the first frequency domain position and/or M second frequency domain positions may be carried in the high layer signaling.
  • the embodiment of the present application does not limit the manner in which the terminal device determines the first frequency domain position and/or the M second frequency domain positions. If the terminal device is notified of the first frequency domain position and/or M second frequency domain positions in a sending manner, the embodiment of the present application does not treat the message carrying the first frequency domain position and/or M second frequency domain positions. Make a limit.
  • the embodiment of this application does not limit the manner in which the terminal device determines each of the following information: the first threshold, the second threshold, the first offset, the second offset, the uplink sharing indication request, at least one frequency Domain location.
  • part of the above information may be sent to the terminal device, and part of the information may be directly determined by the terminal device in a pre-appointed or default manner, which is not limited in the embodiment of the present application.
  • all or part of the above information can be notified to the terminal device in the same sending message; or, each of the above messages can also be notified separately in different sending messages.
  • the access network device carries the first parameter and the second parameter in the same high-level signaling, and sends the high-level signaling to the terminal device.
  • the channel access parameter occupies 2 bits, and one bit is allocated to the first parameter and the second parameter. The different values of each bit represent the channel access parameters used in different LBT processes.
  • the access network device carries the fourth parameter in the same high-level signaling, and sends the high-level signaling to the terminal device.
  • the fourth parameter is used to indicate the first parameter, the second parameter, the second threshold, and the second offset.
  • the terminal device selects the first parameter to execute the LBT process and executes sending the second message; if the authorized time domain location is not in the access network device Within the indicated COT or if the COT indicated by the access network device is not received, the second parameter is selected, the LBT process is executed, and the second message is sent.
  • the fourth parameter is carried in the first message.
  • the mapping relationship between the fourth parameter and the indicated parameter can be found in Table 7.
  • the configuration index set of the fourth parameter is ⁇ Msg3-0, Msg3-1, Msg3-2, Msg3-3 ⁇ , where each configuration index has The corresponding first parameter, second parameter, second threshold, and second offset.
  • the fourth parameter occupies 2 bits in the first message, 2 bits are used to indicate the configuration index of the fourth parameter, for example, 00: configure Msg3-0; 01: configure Msg3-1; 10: configure Msg3-2; 11: Configure Msg3-3.
  • the fourth parameter is carried in the first message.
  • the first message further includes a service indication, which is used to indicate a service type of high priority, for example, the service indication is an indication of a high priority random process, which is used to indicate that it belongs to high priority. Random access process.
  • the set of high priority random processes can be ⁇ h0, h0 and h1, h0 and h1 and h2 ⁇ . among them:
  • the indication of the high-priority random process is "h0 and h1" it means that the high-priority random access process is the random access process of out-of-synchronization recovery and the random access process triggered by the access network device. If the indication of msg1 high-priority random process is "h0 and h1 and h2", it means that the high-priority random access process is the random access process of out-of-synchronization recovery, the random access process triggered by the access network equipment and the beam recovery Random access process. In this way, the indication of the high-priority random process can indicate at least one kind of high-priority random access process, thereby increasing the probability of successful access of the high-priority service and reducing the access delay. For the terminal device, it can determine the current service type by itself, and then can determine whether the current service type is a high priority service type according to the high priority service type indicated by the access network device.
  • the configuration index set of the fourth parameter is ⁇ Msg3-0, Msg3-1, Msg3-2, Msg3-3 ⁇ , where each parameter configuration index has a corresponding first parameter, second parameter, second threshold, and second offset.
  • the configuration index of the access network device for the fourth parameter is Msg1-2, and the service indication is h0.
  • the second threshold of the second condition is and
  • the configuration index is 6 times corresponding to Msg1-2, and the second offset can also be determined according to the SCS of the authorized frequency domain position. Since the service with the configuration index Msg1-2 distinguishes high and low priority, the terminal device does not need to determine whether the current service is a high priority service in this case.
  • the terminal device determines whether the authorized time domain location of msg1 is within the COT indicated by the access network device or not. If it is in the COT, the LBT process is executed according to the LBT CAT1 corresponding to the configuration index MSG1-0, and msg1 is sent after the LBT process is successful.
  • the terminal device is required to determine the type of the current random access process to determine whether the current random access process is initiated by a high-priority service. For example, if the current random access process type is "access network device trigger “Random access process” means that the current random access process is not initiated by high priority services; if the type of the current random access process is “random access process for out-of-step recovery”, it means that the current random access process is high Priority business initiated.
  • the configuration index of the fourth parameter is Msg3-3 and Msg1-2
  • the terminal device may not feed back the shared COT information.
  • the access network device receives the second message, it defaults to the terminal device to report the COT shared information.
  • the embodiment of the present application does not limit the configuration index of the fourth parameter indicating that the shared COT information is reported by default.
  • the possible situations of the first message and the second message are introduced.
  • the first message is msg2 and the second message is msg3.
  • msg3 is a contention resolution message sent to the access network device by the terminal device after receiving the msg2.
  • the first message is high-level signaling.
  • the high-level signaling is a configuration message of msg1 sent through a broadcast message, including: time/frequency domain position information, second threshold, channel access parameters, etc.
  • the second message is msg1.
  • the first message is a downlink control channel message and or high-level signaling configuration message
  • the second message is a hybrid automatic repeat request (HARQ) acknowledgement (acknowledge, ACK)/non Acknowledge (not acknowledge, NACK) data, etc.
  • HARQ hybrid automatic repeat request
  • the first message is high-level signaling, such as a broadcast message, a radio link control message, or a MAC layer control message, which is used to configure the transmission signal or data.
  • the second message is a periodic uplink transmission signal or data.
  • the periodic uplink transmission signal may be: sounding reference signal (SRS), CSI, etc.
  • the periodic uplink transmission data has a physical uplink shared channel (physical uplink). shared channel (PUSCH) data, periodic PUSCH data sent by the terminal, etc.
  • SRS sounding reference signal
  • CSI CSI
  • PUSCH physical uplink shared channel
  • the above are only examples of the first message and the second message.
  • the second message in the embodiment of the present application is a message scheduled by the access network device and needs to be sent by the terminal device.
  • the first message is configuration information about the second message sent by the access network device.
  • the configuration information is authorization information.
  • the embodiments of this application do not limit the possible situations of the first message and the second message.
  • the first threshold is once, and the second threshold is once.
  • the configuration parameter of the second message may include an authorized frequency domain position in addition to an authorized time domain position, and the frequency domain positions in the COT and where the second message is not sent in the COT are authorized frequency domain positions.
  • the authorized frequency domain location and the authorized time domain location are the time-frequency location for sending the second message.
  • the first threshold is once.
  • the specific implementation process of step 402 may be: before the terminal device executes step 402 to send the second message, when the authorized time domain location is within the COT indicated by the access network device, The terminal device executes the LBT process in the COT. Wherein, the time domain position for executing the LBT process is earlier than the authorized time domain position, and the frequency domain position for executing the LBT process is the authorized frequency domain position.
  • the terminal device sends the second message at the time-frequency position where the second message is sent.
  • the terminal device stops sending the second message in the COT.
  • the second threshold is one time. Combined with the second condition, before the terminal device executes step 403 to send the second message, when the authorized time domain location is not within the COT indicated by the access network device or when the terminal device does not receive the access network When the COT indicated by the device, the terminal device executes the LBT process. Wherein, the time domain position for executing the LBT process is earlier than the authorized time domain position, and the frequency domain position for executing the LBT process is the authorized frequency domain position.
  • the terminal device sends the second message at the time-frequency position where the second message is sent.
  • the terminal device stops sending the second message in the COT.
  • the terminal device since the first threshold is once and the second threshold is once, the terminal device does not need to obtain the first offset and the second offset.
  • the channel access parameters used when the time domain position for sending the second message is within the COT and when the time domain position for sending the second message is not within the COT can refer to the detailed descriptions in A1 to A6, which will not be repeated here. Repeat.
  • the first threshold is once, and the second threshold is at least twice.
  • the configuration parameter of the second message may include an authorized frequency domain position in addition to the authorized time domain position, and the frequency domain position at which the second message is sent when in the COT and when not in the COT is the authorized frequency domain position.
  • the time-frequency location of the second message sent for the first time is the authorized frequency domain location and the authorized time domain location.
  • the first threshold value is once.
  • the specific implementation process of step 402 can be referred to the description in B1, which will not be repeated here.
  • the second threshold is at least twice.
  • the specific implementation process of step 403 can be:
  • the terminal device Before the terminal device sends the second message in step 403, when the authorized time domain location is not within the COT indicated by the access network device or when the terminal device does not receive the COT indicated by the access network device, the terminal device executes the first In the second LBT process, the time domain position of the first LBT process is earlier than the authorized time domain position, and the frequency domain position of the first LBT process is the authorized frequency domain position;
  • the terminal device sends the second message according to the time-frequency position of the first sending of the second message;
  • the terminal device will send the second message according to the time domain location and the The second offset, determine the time domain position of the jth sending of the second message, and execute the jth LBT process, where j is a positive integer greater than 1 and less than the second threshold from 2, and execute the jth LBT
  • the time domain position of the process is earlier than the time domain position of sending the second message for the jth time, and the frequency domain position for executing the jth LBT process is the authorized frequency domain position;
  • the terminal device sends the second message according to the time-frequency position of the j-th sending of the second message, and the time-frequency position of the j-th sending of the second message includes the above determined The time domain position and the authorized frequency domain position of the jth sending of the second message;
  • the terminal device sends the second message according to the j-th time domain position and the second offset , The step of determining the time domain position of sending the second message for the (j+1)th time, and the subsequent steps performed according to the time domain position of sending the second message.
  • the terminal device needs to obtain the second offset.
  • the terminal device needs to obtain the second offset.
  • the channel access parameters used when the time domain position for sending the second message is within the COT and when the time domain position for sending the second message is not within the COT can refer to the detailed descriptions in A1 to A6, which will not be repeated here. Repeat.
  • the terminal device can improve the efficiency of successfully sending the second message by sending the second message multiple times when the authorized time domain location is not in the COT or the COT is not received, because there is no need to wait for the second message to be sent.
  • the next COT indicated by the access network device further reduces the transmission delay of the second message.
  • the preset second threshold when the authorized time domain location is not in the COT or the COT is not received may be one of the set A1, and the second offset may be set to one of the set A2.
  • s2 represents two sending opportunities
  • s3 represents 3 sending opportunities
  • s4 represents 4 sending opportunities
  • s6 has 6 sending opportunities.
  • o0dot5 indicates that the second offset is 0.5 slot
  • o1 indicates that the second offset is 1 slot
  • o2 indicates that the second offset is 2 slots
  • o4 indicates that the second offset is 4 slots.
  • the high-level signaling sent by the access network device to the terminal device may include s3 and o1, it means that the second threshold is 3 times and the second offset is 1 slot.
  • the first message is msg2 and the second message is msg3 as examples for description.
  • the first message is msg2 and the second message is msg3 as examples for description.
  • msg2 indicates the authorized time domain position and authorized frequency domain position of msg3, and when the time domain position of sending msg3 is within COT 501 and when sending msg3
  • the channel access parameters for performing the LBT process are the same, and the channel access parameters are LBT CAT2.
  • the LBT process (parameter LBT CAT2) is executed in COT 502, and msg3 is sent according to the time-frequency location of sending msg3.
  • the LBT process is executed according to (parameter LBT CAT2), according to the sending msg3 Send msg3 at the time-frequency position until the sending is successful or the number of times reaches the second threshold. It is assumed here that the second threshold is S2 and the second offset is O2.
  • FIG. 5 provides an example diagram of a possible time domain position of sending msg3 in an embodiment of this application.
  • the authorized time domain position of msg3 is in slot(k+1)
  • the initial symbol is the second symbol
  • the duration of msg3 is 7 symbols.
  • the authorized time domain position of msg3 is in COT 502, so the terminal device can execute the LBT process according to LBT CAT2 on the first symbol of slot(k+1);
  • the LBT process is successful, and the terminal device sends msg3 on the second to eighth symbols of slot(k+1) and the authorized frequency domain position; if the LBT process fails, the current msg3 sending is stopped.
  • FIG. 6 provides an example diagram of a possible time domain position of sending msg3 for this embodiment of the application. Assuming that the authorized time domain position of msg3 is in slot(k+1), the symbol is the second symbol, and the duration of msg3 is 7 symbols.
  • the terminal device can perform the first LBT process according to LBT CAT2 on the first symbol of slot(k+1). If the first LBT process is successful, the terminal device sends msg3 on the second to eighth symbols of slot(k+1) and the authorized frequency domain position; if the first LBT process fails, the second The offset determines that the time domain position of msg3 sent for the second time is slot(k+3), and the symbol is the second symbol.
  • the terminal device can send the second message multiple times when the authorized time domain location is not in the COT and when the COT indicated by the access network device is not received, the efficiency of successfully sending the second message can be improved. Since the sending of the second message does not need to wait for the next COT indicated by the access network device, the sending delay of the second message is reduced.
  • the first threshold is at least twice
  • the second threshold is at least twice.
  • the configuration parameter of the second message may include an authorized frequency domain position in addition to the authorized time domain position, and the frequency domain position at which the second message is sent when in the COT and when not in the COT is the authorized frequency domain position.
  • the time-frequency location of the second message sent for the first time is the authorized frequency domain location and the authorized time domain location.
  • the first threshold is at least twice.
  • the first condition adopted here includes one of the following conditions: the second message is sent successfully; the number of times the second message is sent reaches the first threshold; the time domain location of the second message is not within the COT.
  • the specific implementation process of step 402 can be:
  • the terminal device When the authorized time domain location is in the COT indicated by the access network device, the terminal device performs the first LBT process in the COT. Wherein, the time domain position where the first LBT process is executed is earlier than the authorized time domain position, and the frequency domain position where the first LBT process is executed is the authorized frequency domain position.
  • the terminal device sends the second message at the time-frequency position where the second message was sent for the first time.
  • the terminal device will send the second message according to the (i-1)th time domain position and the first An offset, which determines the time domain position of the i-th sending of the second message, i is a positive integer from 2 that is greater than 1 and less than the first threshold;
  • the terminal device performs the i-th LBT process in the COT according to the time domain of the i-th LBT process
  • the position is earlier than the time domain position of the i-th sending the second message, and the frequency domain position where the i-th LBT process is executed is the authorized frequency domain position;
  • the terminal device sends the second message according to the time-frequency position of the i-th sending the second message, and the time-frequency position of the i-th sending the second message is the i-th time The time domain position and authorized frequency domain position of sending the second message;
  • the terminal device sends the second message according to the i-th time-frequency position and the first offset, The step of determining the time domain position of sending the second message for the (i+1)th time, and the subsequent steps performed according to the time domain position of sending the second message.
  • the second threshold is at least twice.
  • the specific implementation process of step 403 can be referred to the description in B2, which will not be repeated here.
  • the terminal device needs to obtain the first offset and the second offset.
  • the terminal device needs to obtain the first offset and the second offset.
  • the channel access parameters used when the time domain position of sending the second message is within the COT and the time domain position of sending the second message is not within the COT can refer to the detailed descriptions in A1 to A5, which will not be repeated here. Repeat.
  • the preset first threshold when the authorized time domain position is in the COT may be one of the set B1
  • the first offset when the authorized time domain position is set in the COT may be one of the set A2 One.
  • s2 represents two sending opportunities
  • s3 represents 3 sending opportunities
  • s4 represents 4 sending opportunities
  • s5 has 5 sending opportunities.
  • o0dot5 indicates that the first offset is 0.5 slot
  • o1 indicates that the first offset is 1 slot
  • o2 indicates that the first offset is 2 slots
  • o3 indicates that the first offset is 3 slots.
  • the high-level signaling sent by the access network device to the terminal device may include s2 and 0.5 slot, it means that the first threshold is 2 times and the first offset is 0.5 slot.
  • the first message is msg2 and the second message is msg3 as examples for description, and the second threshold is at least two
  • the first message is msg2 and the second message is msg3 as examples for description
  • the second threshold is at least two
  • the first threshold is at least twice.
  • step 403 refer to the description of FIG. 7.
  • msg2 indicates the authorized time domain position and authorized frequency domain position of msg3, and when the time domain position of sending msg3 is within COT 501 and the time domain position of sending msg3 is not
  • the channel access parameters for performing the LBT process in COT 501 are the same, and the channel access parameters are LBT CAT2.
  • msg3 is sent at the time-frequency location for sending the second message within the COT.
  • FIG. 7 provides another example diagram of a possible time domain position for sending the second message in this embodiment of the application. Assuming that the authorized time domain position of msg3 is in slot(k+1), the initial symbol is the second symbol, and the duration of msg3 is 7 symbols.
  • the first threshold is s2 and the first offset is o1.
  • the authorized time domain position of msg3 is within COT 702 indicated by the access network device, so the terminal device can use LBT CAT2 on the first symbol of slot(k+1) Perform the first LBT process. If the first LBT process is successful, the terminal device sends msg3 on the second to eighth symbols of slot(k+1) and the authorized frequency domain position; if the first LBT process fails, it will be executed according to the first An offset determines that the time domain position of msg3 sent for the second time is slot(k+2), and the symbols are from the second symbol to the seventh symbol.
  • the terminal device Since the time domain position of sending msg3 for the second time is within COT 702 indicated by the access network device, the terminal device performs the second LBT process according to LBT CAT2 on the first symbol of slot(k+2); The second LBT process is successful, and the terminal device sends msg3 on the second to eighth symbols of slot(k+2) and the authorized frequency domain position; if the second LBT process fails, because the number of times reaches the first threshold, The terminal device stops sending the second message.
  • the first condition adopted in the solution described in Embodiment B3 includes one of the following conditions: the second message is sent successfully; the number of times the second message is sent reaches the first threshold; the time domain for sending the second message The location is not in the COT.
  • the first condition includes one of the following conditions: the second message is sent successfully; the number of times the second message is sent reaches the first threshold.
  • the solution described in Embodiment B3 can remove the limitation of the condition that the time domain position of sending the second message is not in the COT. The other content is the same, and will not be repeated here.
  • the terminal device can send the second message multiple times both in the COT and not in the COT, which can improve the efficiency of successfully sending the second message without waiting for the next COT indicated by the access network device, thereby reducing Delay in sending the second message.
  • the first parameter is also used here to indicate that the second message is sent.
  • the channel access parameter used when the time domain position of the message is in the COT, and the second parameter is used to indicate the channel access parameter used when the time domain position of the second message is sent is not in the COT.
  • the optional first condition includes one of the following conditions: the second message is sent successfully; when the number of times the second message is sent reaches the first threshold: in step 402 During the execution, it is necessary to determine whether the time domain position of the kth second message is sent within the COT. If yes, the channel access parameter used by the terminal device to execute the kth LBT process is the first parameter, and the second message is sent at the time-frequency position of the kth sending of the second message. If not, the channel access parameter used by the terminal device to execute the k-th LBT process is the second parameter, and the second message is sent at the time-frequency position of the k-th sending of the second message, and k is a positive value greater than 1. An integer, and k is less than or equal to the first threshold.
  • FIG. 8a provides another possible example diagram of the time domain position for sending the second message for this embodiment of the application.
  • msg2 indicates the authorized time domain position and authorized frequency domain position of msg3, as well as the first parameter, the second parameter, the second threshold, and the second offset.
  • the authorized time domain position is the second to eighth symbols of slot(k+1)
  • the first parameter is LBT CAT2
  • the second threshold is S2
  • the second offset is o2
  • the second parameter is LBT CAT4
  • COT 801 and COT 802 are two COTs indicated by the access network equipment.
  • the authorized time domain position of msg3 is within COT 802 indicated by the access network device, so the terminal device can execute the first time according to LBT CAT2 on the first symbol of slot(k+1) The LBT process. If the first LBT process is successful, the terminal device sends msg3 on the second to eighth symbols of slot(k+1) and the authorized frequency domain position; if the first LBT process fails, it will be executed according to the first
  • the second offset determines that the time domain position of the second message sent for the second time is slot(k+3), and the symbol is the second to eighth symbols.
  • the terminal device uses the LBT CAT4 (priority priority) on the first symbol of slot(k+3).
  • step 403 For step 403, during the execution of step 403, if the terminal device receives the COT indicated by the access network device again, it needs to determine whether the p-th time domain position of the second message is sent Within the COT indicated again. If yes, the channel access parameter used by the terminal device to execute the p-th LBT process is the first parameter, and the second message is sent at the time-frequency position of the p-th sending of the second message. If not, the channel access parameter used by the terminal device to perform the p-th LBT process is the second parameter, and the second message is sent at the time-frequency position of the p-th sending of the second message, and p is a positive value greater than 1. An integer, and p is less than or equal to the second threshold.
  • FIG. 8b provides another possible example diagram of the time domain position for sending the second message for this embodiment of the application.
  • msg2 indicates the authorized time domain position and authorized frequency domain position of msg3, as well as the first parameter, the second parameter, the second threshold, and the second offset.
  • the authorized time domain position is the second to eighth symbols of slot(k+1)
  • the first parameter is LBT CAT2
  • the second threshold is S2
  • the second offset is o2
  • the second parameter is LBT CAT4
  • COT 801 is a COT indicated by the access network equipment.
  • the second offset determines that the time domain position of the second message sent for the second time is slot(k+3), and the symbol is the second to eighth symbols.
  • the time domain position of sending msg3 for the second time is within COT 803, so the terminal equipment is in slot(k +3) Perform the second LBT process according to LBT CAT2 on the first symbol; if the second LBT process is successful, the terminal device will be in the second to eighth symbols of slot (k+3) and authorized frequency domain Send msg3 at the location; if the second LBT process fails, the terminal device stops sending the second message because the number of times reaches the second threshold.
  • the terminal device cannot directly send the message in the manner of LBT CAT1, but in this embodiment B4, it can be configured to configure the first parameter as LBT CAT1 when the authorized time domain position is in the COT. In this way, direct transmission improves the efficiency of the successful transmission of the second message in the COT, and also reduces the transmission delay of the second message.
  • the frequency domain location for sending the second message is at least one, and the second threshold is at least once .
  • the configuration parameters of the second message may include the authorized frequency domain location in addition to the authorized time domain location.
  • the time-frequency location of the first message sent It is the authorized frequency domain location and the authorized time domain location.
  • the first threshold value is once or at least twice.
  • step 402 refer to the description in Embodiment B1 and Embodiment B3, which will not be repeated here.
  • the frequency domain location for sending the second message is at least one (represented by M frequency domain locations), and the second threshold is at least once
  • the specific implementation process of the terminal device sending the second message in step 403 may be:
  • the terminal device executes the qth LBT process before sending the second message at the time-frequency position of the qth sending of the second message, and the time domain position of the qth LBT process is earlier than the qth sending of the second message.
  • the time domain position of the message, and the frequency domain position where the qth LBT process is executed are M frequency domain positions.
  • the second message sent for the qth time is any time within the second threshold, and q is a positive integer;
  • the terminal device If the terminal device successfully performs the qth LBT process, the terminal device sends the second message according to the frequency domain position where the LBT process was successfully executed and the time domain position where the second message was sent for the qth time.
  • the time domain position of the first sending of the second message is the authorized time domain position
  • the time domain position of sending the second message for the qth time except the first time is based on the (q-1)th time
  • the time domain location and the second offset for sending the second message are determined.
  • the terminal device may send the second message at the multiple frequency domain locations where the LBT process is successfully executed and the time domain location where the second message is sent for the qth time. news.
  • the terminal device can select one of the multiple frequency domain locations where the LBT process is successfully executed, and according to the selected frequency domain location and the qth transmission The second message is sent at the time domain position of the second message.
  • the authorized time domain position of msg3 is not at least one frequency in the COT indicated by the access network device
  • all-sub indicates that the frequency domain position for sending Msg3 is configured on all sub-bands
  • sb1&2 indicates that the frequency domain position of sending Msg3 is configured on sub-band1 and sub-band2;
  • sb1&2&3 Indicates the frequency domain position for configuring and sending Msg3 on sub-band1, sub-band2, and sub-band3.
  • FIG. 9 provides an example diagram of defining multiple sub-bands in a possible communication bandwidth for this embodiment of the application.
  • the communication bandwidth is 80MHz, it is divided into 4 sub-bands, namely sub-band1, sub-band2, sub-band3, and sub-band4.
  • Each sub-band here includes multiple physical resource blocks (Physical Resource Block, PRB).
  • PRB Physical Resource Block
  • the multiple frequency domain positions acquired by the terminal device are sb1&2, that is, msg3 needs to be sent on both sub-band1 and sub-band2.
  • the terminal device executes the LBT process on sub-band 1 and 2 sub-band before sending msg3. If sub-band1 listens successfully, msg3 is sent on sub-band1. If sub-band2 listens successfully, msg3 is sent on sub-band2. If the listening is successful on sub-band1 and sub-band2, then send msg3 on both sub-band1 and sub-band2; or send msg3 only on sub-band1; or send msg3 only on sub-band2; or -Send msg3 on the low-energy sub-band detected in band1 and sub-band2, which can reduce interference to other systems and increase the probability of the access network equipment correctly detecting msg3.
  • the energy it hears can be a received signal strength indication (RSSI), or it can be an energy-related value based on LBT detection.
  • RSSI received signal strength indication
  • FIG. 10 provides another example diagram of a possible time domain location for sending the second message for this embodiment of the application.
  • the premise is: after the terminal device receives msg2 in COT 1001, msg2 indicates the authorized time domain position and authorized frequency domain position of msg3, and the terminal device obtains the first parameter of the LBT process in COT, and the terminal device obtains A second threshold, a second offset, a second parameter, and at least one frequency domain position.
  • the authorized time domain position is the second to eighth symbols of slot(k+1), the second threshold is S2, the second offset is O2, the first parameter is LBT CAT2, and the second parameter is LBT CAT4 priority
  • the terminal device sends msg3 on the second to eighth symbols of sb1; if the first LBT process fails on both sb1 and sb2, it will be executed according to the second The offset determines that the time domain position of the second message sent for the second time is slot(k+3), and the symbol is the second symbol to the eighth symbol.
  • the terminal device needs to feedback for each sub-band.
  • the shared COT information is used to indicate the length of time information that the terminal device can share with the access network device at each frequency domain location.
  • the communication bandwidth is divided into 4 sub-bands, and each sub-band uses 2bit feedback.
  • the feedback content is as follows:
  • the terminal device can send the second message at multiple frequency domain positions when the authorized time domain position is not within the COT, which further improves the efficiency of the successful transmission of the second message. There is no need to wait for the next COT indicated by the access network device, which reduces the transmission delay of the second message.
  • the terminal equipment and the network equipment include hardware structures and/or software modules corresponding to the respective functions.
  • the embodiments of the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Those skilled in the art can use different devices for each specific application to implement the described functions, but such implementation should not be considered as going beyond the scope of the technical solutions of the embodiments of the present application.
  • the embodiments of the present application can divide terminal devices and network devices into functional modules or functional units based on the above device examples.
  • each functional module or functional unit can be divided corresponding to each function, or two or more functions can be integrated In a processing module or processing unit.
  • the above-mentioned integrated modules or units can be implemented in the form of hardware or software functional modules. It should be noted that the division of modules or units in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
  • FIG. 11 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
  • the terminal device 1100 is used to implement the method embodiments in FIGS. 4 to 10.
  • the terminal device 1100 includes a receiving module 1101, a processing module 1102, and a sending module 1103.
  • the receiving module 1101 is configured to receive a first message sent by an access network device, where the first message is used to instruct the terminal device to send a configuration parameter of a second message, wherein the configuration parameter includes the configuration parameter of the second message Authorized time domain location;
  • the processing module 1102 is configured to enable the sending module 1103 to send the second message until the first condition is met when the authorized time domain position is within the channel occupation time COT indicated by the access network device; and When the authorized time domain location is not in the COT, or when the receiving module 1101 does not receive the COT, the sending module 1103 is caused to send the second message until the second condition is satisfied.
  • the first condition includes one of the following conditions:
  • the second message is sent successfully
  • the number of times the second message is sent reaches the first threshold
  • the time domain position of sending the second message is not within the COT.
  • the second condition includes one of the following conditions:
  • the second message is sent successfully
  • the number of times the second message is sent reaches the second threshold.
  • the first message is msg2, and the second message is msg3.
  • the first message is high-layer signaling
  • the second message is msg1.
  • processing module 1102 is further configured to obtain at least one of the following before the sending module 1103 sends the second message:
  • the first threshold is the first threshold
  • the channel access parameters in the COT are the channel access parameters in the COT.
  • processing module 1102 is further configured to obtain at least one of the following before the sending module 1103 sends the second message:
  • the first message includes an uplink sharing indication request, and the uplink sharing indication request is used to instruct the terminal device to report shared COT information to the access network device; the second message includes the sharing The COT information or the shared COT information is carried in the uplink control information.
  • the first message further includes channel state information CSI bits, and the CSI bits are used to instruct the terminal device to report the shared COT information.
  • the terminal device 1100 is used to implement the steps performed by the terminal device in the embodiments of FIG. 4 to FIG. 10.
  • the terminal device 1100 is used to implement the steps performed by the terminal device in the embodiments of FIG. 4 to FIG. 10.
  • the terminal device 1100 is used to implement the steps performed by the terminal device in the embodiments of FIG. 4 to FIG. 10.
  • the terminal device 1100 is used to implement the steps performed by the terminal device in the embodiments of FIG. 4 to FIG. 10.
  • the terminal device 1100 is used to implement the steps performed by the terminal device in the embodiments of FIG. 4 to FIG. 10.
  • the receiving module 1101 may be a receiver or a receiving circuit
  • the sending module 1103 may be a transmitter or a transmitting circuit.
  • the receiving module 1101 and the sending module 1103 may also be communication interfaces of the terminal device.
  • the processing module 1102 may be a processor.
  • the terminal device 1100 in the embodiment shown in FIG. 11 may be implemented by the terminal device 1200 shown in FIG. 12. As shown in FIG. 12, a schematic structural diagram of another terminal device is provided for this embodiment of the application.
  • the terminal device 1200 shown in FIG. 12 includes a processor 1201 and a transceiver 1202.
  • the transceiver 1202 is used to support information transmission between the terminal device 1200 and the network device involved in the foregoing embodiment.
  • the processor 1201 is used to control and manage the actions of the terminal device.
  • the transceiver 1202 is used for receiving the message in step 401 and sending the message in step 402 and step 403 in the embodiment shown in FIG. 4; the processing unit 1201 is used for sending Before the message, determine whether the authorized time domain location is within the COT indicated by the access network device.
  • the processor 1201 and the transceiver 1202 are in communication connection, for example, connected via a bus 1204.
  • the bus 1204 may be a PCI bus or an EISA bus.
  • the bus 1204 can be divided into an address bus, a data bus, and a control bus. For ease of representation, only one thick line is used to represent in FIG. 12, but it does not mean that there is only one bus or one type of bus.
  • the terminal device 1200 may further include a memory 1203.
  • the memory 1203 is used to store program codes and data for the terminal device 1200 to execute, and the processor 1201 is used to execute the application program codes stored in the memory 1203 to implement the actions of the terminal device provided in any of the embodiments shown in FIGS. 4 to 10 .
  • the terminal device may include one or more processors, and the structure of the terminal device 1200 does not constitute a limitation to the embodiment of the present application.
  • the processor 1201 may be a central processing unit (CPU), a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application-specific integrated circuit (ASIC), a field programmable gate array Field programmable gate array (FPGA) or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It can implement or execute various exemplary logical blocks, modules and circuits described in conjunction with the disclosure of this application.
  • the processor may also be a combination for realizing computing functions, for example, a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and so on.
  • the transceiver 1204 may be a communication interface or a transceiver circuit, etc., where the transceiver is a general term. In a specific implementation, the transceiver may include multiple interfaces.
  • the memory 1203 may include a volatile memory (volatile memory), such as a random access memory (random access memory, RAM); the memory 1203 may also include a non-volatile memory (non-volatile memory), such as a read-only memory (read-only memory). Only memory (ROM), flash memory (flash memory), hard disk drive (HDD), or solid-state drive (SSD); the memory 1203 may also include a combination of the foregoing types of memories.
  • volatile memory such as a random access memory (random access memory, RAM
  • non-volatile memory such as a read-only memory (read-only memory).
  • SSD solid-state drive
  • a readable storage medium is also provided, which can be used to store computer software instructions used by the terminal device in the embodiment shown in FIG. 4 to FIG. 10, so that the embodiment shown in FIG. 4 to FIG. Any possible implementation of is implemented.
  • the storage medium includes but is not limited to flash memory, hard disk, and solid state hard disk.
  • a computer program product is also provided.
  • the computer product When the computer product is run by a computing device, it can execute the communication method designed for the terminal device in the foregoing embodiment.
  • FIG. 13 is a schematic structural diagram of another network device provided by an embodiment of the present application.
  • the network device 1300 includes a sending module 1301 and a receiving module 1302.
  • the sending module 1301 is configured to send a first message to a terminal device, where the first message is used to instruct the terminal device to send a configuration parameter of a second message, wherein the configuration parameter includes the authorized time domain of the second message position;
  • the receiving module 1302 is configured to receive the second message sent by the terminal device.
  • the sending module 1301 is further configured to send at least one of the following to the terminal device:
  • the first message is msg2, and the second message is msg3.
  • the first message is high-layer signaling
  • the second message is msg1.
  • the first message includes an uplink sharing indication request, and the uplink sharing indication request is used to instruct the terminal device to report shared COT information to the access network device; the second message includes the sharing The COT information or the shared COT information is carried in the uplink control information.
  • the first message further includes channel state information CSI bits, and the CSI bits are used to instruct the terminal device to report the shared COT information.
  • the network device 1300 is used to implement the steps performed by the network device in the embodiments of FIG. 4 to FIG. 10.
  • the network device 1300 is used to implement the steps performed by the network device in the embodiments of FIG. 4 to FIG. 10.
  • the specific implementation manners and corresponding beneficial effects of the functional blocks included in the network device of FIG. 13 reference may be made to the specific introduction of the foregoing embodiments in FIG. 4 to FIG. 10, which will not be repeated here.
  • the receiving module 1302 may be a receiver or a receiving circuit
  • the sending module 1301 may be a transmitter or a transmitting circuit.
  • the receiving module 1302 and the sending module 1301 may also be communication interfaces of the terminal device.
  • the aforementioned network device 1300 shown in FIG. 13 may be implemented as the network device 1400 shown in FIG. 14.
  • FIG. 14 a schematic structural diagram of another network device is provided for this embodiment of the present application.
  • the network device 1400 shown in FIG. 14 includes a processor 1401 and a transceiver 1402.
  • the transceiver 1402 is used to support information transmission between the network device 1400 and the terminal devices involved in the foregoing embodiments, and the processor 1401 is used to control and manage the actions of the network device 1400.
  • the transceiver 1402 is used to send the message in step 401 and to receive the message in steps 402 and 403 in the embodiment shown in FIG. 4; the processing unit 1401 is used to support all The transceiver 1402 performs the above steps.
  • the processor 1401 and the transceiver 1402 are communicatively connected, for example, connected via a bus.
  • the network device 1400 may further include a memory 1403.
  • the memory 1403 is used to store program codes and data for the network device 1400 to execute, and the processor 1401 is used to execute the application code stored in the memory 1403 to implement the actions of the network device provided by any of the embodiments shown in FIGS. 4 to 10 .
  • the network device may include one or more processors, and the structure of the network device 1400 does not constitute a limitation to the embodiment of the present application.
  • the processor 1401 may be a CPU, an NP, a hardware chip, or any combination thereof.
  • the above hardware chip may be ASIC, PLD or a combination thereof.
  • the above PLD can be CPLD, FPGA, GAL or any combination thereof.
  • the memory 1403 may include a volatile memory, such as RAM; the memory 1403 may also include a non-volatile memory, such as ROM, flash memory, a hard disk, or a solid state hard disk; the memory 1403 may also include a combination of the foregoing types of memories.
  • a volatile memory such as RAM
  • the memory 1403 may also include a non-volatile memory, such as ROM, flash memory, a hard disk, or a solid state hard disk
  • the memory 1403 may also include a combination of the foregoing types of memories.
  • An embodiment of the present application also provides a readable storage medium that can be used to store computer software instructions used by the network device in the embodiment shown in FIG. 4 to FIG. 10, so that the embodiment shown in FIG. 4 to FIG. Any possible implementation of is implemented.
  • the storage medium includes but is not limited to flash memory, hard disk, and solid state hard disk.
  • An embodiment of the present application also provides a computer program product.
  • the computer product When the computer product is run by a computing device, it can execute the communication method designed for the network device in the foregoing embodiment.
  • a and/or B refers to one of the following situations: A, B, A, and B.
  • At least one of refers to the listed items or any combination of any number of listed items.
  • at least one of A, B, and C refers to one of the following situations: A, B, C, A and B, B and C, A and C, A, B and C in any of the seven cases.
  • the size of the sequence number of each process does not mean the order of execution.
  • the execution order of each process should be determined by its function and internal logic.
  • the implementation process of the embodiments of this application should constitute any limitation.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé de communication, un dispositif terminal, et un dispositif de réseau d'accès. Le procédé comporte les étapes suivantes: un dispositif de réseau d'accès envoie un premier message à un dispositif terminal, le premier message étant utilisé pour indiquer au dispositif terminal qu'un paramètre de configuration d'un second message est émis, et le paramètre de configuration comportant un emplacement autorisé en domaine temporel du second message; lorsque l'emplacement autorisé en domaine temporel se situe dans un temps d'occupation de canal (COT) indiqué par le dispositif de réseau d'accès, le dispositif terminal émet le second message jusqu'à ce qu'une première condition soit satisfaite; et lorsque l'emplacement autorisé en domaine temporel ne se situe pas dans le COT ou lorsqu'aucun COT n'est reçu par le dispositif terminal, le dispositif terminal émet le second message jusqu'à ce qu'une seconde condition soit satisfaite. Au moyen de la présente invention, le rendement d'émission réussie du second message peut être amélioré, et le retard de communication peut être réduit.
PCT/CN2020/072295 2019-01-29 2020-01-15 Procédé de communication, dispositif terminal, et dispositif de réseau d'accès WO2020156180A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910086573.3A CN111491392B (zh) 2019-01-29 2019-01-29 通信方法及终端设备、接入网设备
CN201910086573.3 2019-01-29

Publications (1)

Publication Number Publication Date
WO2020156180A1 true WO2020156180A1 (fr) 2020-08-06

Family

ID=71811457

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/072295 WO2020156180A1 (fr) 2019-01-29 2020-01-15 Procédé de communication, dispositif terminal, et dispositif de réseau d'accès

Country Status (2)

Country Link
CN (1) CN111491392B (fr)
WO (1) WO2020156180A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210378011A1 (en) * 2020-05-26 2021-12-02 Qualcomm Incorporated Sharing channel occupancy time across nodes of an integrated access backhaul network
CN116097872A (zh) * 2020-09-03 2023-05-09 高通股份有限公司 基于帧的设备(fbe)模式中的基于pdcch的用户设备(ue)信道占用时间(cot)触发

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114389721A (zh) * 2020-10-16 2022-04-22 北京紫光展锐通信技术有限公司 信道占用时长共享方法、设备、系统和存储介质
CN114389722A (zh) * 2020-10-16 2022-04-22 北京紫光展锐通信技术有限公司 信道占用时长共享方法、设备、系统和存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106922032A (zh) * 2017-02-27 2017-07-04 北京佰才邦技术有限公司 数据时域传输方法及控制方法、终端、基站和基带芯片
US20170231011A1 (en) * 2016-02-04 2017-08-10 Samsung Electronics Co., Ltd. Method and apparatus for ue signal transmission in 5g cellular communications
CN107431591A (zh) * 2015-01-28 2017-12-01 交互数字专利控股公司 用于无授权频带中的lte的上行链路操作
CN107889114A (zh) * 2016-09-30 2018-04-06 华为技术有限公司 一种非授权频谱信道占用的方法及设备
CN107948988A (zh) * 2017-11-16 2018-04-20 宇龙计算机通信科技(深圳)有限公司 一种资源控制方法及相关设备
CN108352956A (zh) * 2015-12-29 2018-07-31 韩国电子通信研究院 用于在非授权频带的无线通信系统中发送探测参考信号的方法和装置以及用于触发探测参考信号传输的方法和装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107431591A (zh) * 2015-01-28 2017-12-01 交互数字专利控股公司 用于无授权频带中的lte的上行链路操作
CN108352956A (zh) * 2015-12-29 2018-07-31 韩国电子通信研究院 用于在非授权频带的无线通信系统中发送探测参考信号的方法和装置以及用于触发探测参考信号传输的方法和装置
US20170231011A1 (en) * 2016-02-04 2017-08-10 Samsung Electronics Co., Ltd. Method and apparatus for ue signal transmission in 5g cellular communications
CN107889114A (zh) * 2016-09-30 2018-04-06 华为技术有限公司 一种非授权频谱信道占用的方法及设备
CN106922032A (zh) * 2017-02-27 2017-07-04 北京佰才邦技术有限公司 数据时域传输方法及控制方法、终端、基站和基带芯片
CN107948988A (zh) * 2017-11-16 2018-04-20 宇龙计算机通信科技(深圳)有限公司 一种资源控制方法及相关设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI ET AL.: "Initial Access in NR Unlicensed", 3GPP TSG RAN WG1 MEETING #94 R1-1808062, 24 August 2018 (2018-08-24), XP051515466, DOI: 20200325132418X *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210378011A1 (en) * 2020-05-26 2021-12-02 Qualcomm Incorporated Sharing channel occupancy time across nodes of an integrated access backhaul network
CN116097872A (zh) * 2020-09-03 2023-05-09 高通股份有限公司 基于帧的设备(fbe)模式中的基于pdcch的用户设备(ue)信道占用时间(cot)触发

Also Published As

Publication number Publication date
CN111491392A (zh) 2020-08-04
CN111491392B (zh) 2022-05-24

Similar Documents

Publication Publication Date Title
US11979907B2 (en) Methods and apparatuses for COT sharing in unlicensed spectrum
CN110166182B (zh) 一种竞争窗管理的方法及发送设备
CN109863708B (zh) 针对未调度的上行链路的harq反馈的方法和装置
KR102573803B1 (ko) Laa의 경쟁 윈도우의 적응 제어 방법 및 장치
WO2020156180A1 (fr) Procédé de communication, dispositif terminal, et dispositif de réseau d'accès
US20190335496A1 (en) Channel listening method and apparatus
US20180288625A1 (en) Uplink channel access, reservation and data transmission for licensed assist access long term evolution (laa-lte)
JP7030213B2 (ja) コンテンションウィンドウサイズを決定する方法及び装置
US11589384B2 (en) Data transmission method, terminal device, and network device
US9113478B2 (en) Methods and apparatus for requesting and allocating resources in multiple transmission opportunities
CN114499803B (zh) 发送数据的方法、通信装置、计算机存储介质
WO2020200092A1 (fr) Procédé et appareil de transmission d'informations de liaison montante
WO2021097590A1 (fr) Systèmes et procédés de détermination d'informations indiquant une annulation
WO2021056209A1 (fr) Procédé de communication sans fil et dispositif associé
JP2022550411A (ja) 繰返しを伴う設定済みul
WO2017049906A1 (fr) Procédé et dispositif d'envoi et de réception avec multiplexage de signal de découverte et de canal physique partagé de liaison descendante
US11528714B2 (en) Data transmission method and apparatus
US20220046696A1 (en) Method and apparatus for uplink data information transmission in wireless communication system
WO2019157919A1 (fr) Procédé de gestion de fenêtre de contention et dispositif d'envoi
US20240015711A1 (en) Communication method, terminal apparatus, and system
WO2018201584A1 (fr) Procédé et dispositif de transmission par concurrence
WO2014047918A1 (fr) Procédés et appareils destinés à une transmission à base de gestion de collision
WO2023165468A1 (fr) Procédé et dispositif de détermination de ressources
WO2019037733A1 (fr) Procédé et appareil pour envoyer et recevoir des données de liaison montante
CN117769047A (zh) 数据传输方法、装置、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20748331

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20748331

Country of ref document: EP

Kind code of ref document: A1