WO2020198983A1 - 一种用于非授权频谱的无线通信方法及装置、通信设备 - Google Patents

一种用于非授权频谱的无线通信方法及装置、通信设备 Download PDF

Info

Publication number
WO2020198983A1
WO2020198983A1 PCT/CN2019/080550 CN2019080550W WO2020198983A1 WO 2020198983 A1 WO2020198983 A1 WO 2020198983A1 CN 2019080550 W CN2019080550 W CN 2019080550W WO 2020198983 A1 WO2020198983 A1 WO 2020198983A1
Authority
WO
WIPO (PCT)
Prior art keywords
transmission opportunity
channel access
information
access scheme
time
Prior art date
Application number
PCT/CN2019/080550
Other languages
English (en)
French (fr)
Inventor
吴作敏
贺传峰
Original Assignee
北京欧珀通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京欧珀通信有限公司 filed Critical 北京欧珀通信有限公司
Priority to CN201980079557.XA priority Critical patent/CN113678528A/zh
Priority to PCT/CN2019/080550 priority patent/WO2020198983A1/zh
Publication of WO2020198983A1 publication Critical patent/WO2020198983A1/zh
Priority to US17/488,704 priority patent/US20220022051A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0808Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks

Definitions

  • the embodiments of the present application relate to the field of wireless communication technology, and in particular to a wireless communication method and device for unlicensed spectrum, and communication equipment.
  • Unlicensed spectrum is the spectrum that can be used for radio equipment communication divided by the country and region. This spectrum is usually considered to be a shared spectrum, that is, the communication equipment in different communication systems can meet the regulatory requirements set by the country or region on the spectrum. To use this spectrum, there is no need to apply for a proprietary spectrum authorization from the government.
  • the prior art specifies channel access schemes applied in different transmission scenarios.
  • the channel access scheme specified in the prior art may cause serious interference on the unlicensed carrier when transmitting a certain transmission opportunity.
  • the embodiments of the present application provide a wireless communication method and device for unlicensed spectrum, and communication equipment.
  • the wireless communication method for unlicensed spectrum includes:
  • the first device sends the first information to the second device through the first transmission opportunity in the first COT, where,
  • the channel access scheme corresponding to the first transmission opportunity is determined according to the second transmission opportunity, and the second transmission opportunity is the most recent transmission opportunity in the first COT before the first transmission opportunity.
  • a COT is the COT obtained by the first device or the COT obtained by the second device.
  • the wireless communication method for unlicensed spectrum includes:
  • the terminal device sends uplink information to the network device through the first transmission opportunity, where:
  • the first transmission opportunity is the transmission opportunity in the first COT obtained by the network device
  • the second transmission opportunity is the most recent transmission opportunity in the first COT before the first transmission opportunity
  • the second transmission is less than or equal to the first threshold.
  • the wireless communication method for unlicensed spectrum includes:
  • the network device sends downlink information to the terminal device through the first transmission opportunity, where:
  • the first transmission opportunity is the transmission opportunity in the first COT obtained by the terminal device
  • the second transmission opportunity is the most recent transmission opportunity in the first COT before the first transmission opportunity
  • the second transmission opportunity The first time interval between the end moment of the opportunity and the start moment of the first transmission opportunity is less than or equal to the first threshold.
  • the wireless communication device for unlicensed spectrum provided by the embodiment of the present application is applied to the first device, and the device includes:
  • the sending unit is configured to send the first information to the second device through the first transmission opportunity in the first COT, where:
  • the channel access scheme corresponding to the first transmission opportunity is determined according to the second transmission opportunity, and the second transmission opportunity is the most recent transmission opportunity in the first COT before the first transmission opportunity.
  • a COT is the COT obtained by the first device or the COT obtained by the second device.
  • the wireless communication device for unlicensed spectrum provided by the embodiments of the present application is applied to terminal equipment, and the device includes:
  • the communication unit is configured to send uplink information to the network device through the first transmission opportunity, where:
  • the first transmission opportunity is the transmission opportunity within the first channel occupation time COT obtained by the network device, and the second transmission opportunity is the most recent transmission opportunity in the first COT before the first transmission opportunity, and The first time interval between the end time of the second transmission opportunity and the start time of the first transmission opportunity is less than or equal to the first threshold.
  • the wireless communication device for unlicensed spectrum provided by the embodiments of the present application is applied to network equipment, and the device includes:
  • the communication unit is configured to send downlink information to the terminal device through the first transmission opportunity, where:
  • the first transmission opportunity is the transmission opportunity in the first COT obtained by the terminal device
  • the second transmission opportunity is the most recent transmission opportunity in the first COT before the first transmission opportunity
  • the second transmission opportunity The first time interval between the end moment of the opportunity and the start moment of the first transmission opportunity is less than or equal to the first threshold.
  • the communication device provided by the embodiment of the present application includes a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the aforementioned wireless communication method for unlicensed spectrum.
  • the chip provided in the embodiment of the present application is used to implement the above-mentioned wireless communication method for unlicensed spectrum.
  • the chip includes: a processor, configured to call and run a computer program from the memory, so that the device installed with the chip executes the above-mentioned wireless communication method for unlicensed spectrum.
  • the computer-readable storage medium provided by the embodiments of the present application is used to store a computer program that enables a computer to execute the above-mentioned wireless communication method for unlicensed spectrum.
  • the computer program product provided by the embodiment of the present application includes computer program instructions that cause the computer to execute the above-mentioned wireless communication method for unlicensed spectrum.
  • the computer program provided in the embodiments of the present application when running on a computer, causes the computer to execute the aforementioned wireless communication method for unlicensed spectrum.
  • the channel access plan corresponding to the first transmission opportunity is determined according to the second transmission opportunity.
  • channel sharing can be realized, channel access opportunities can be improved, and other transmissions on unlicensed spectrum can be avoided. Interference occurs in the transmission of different systems.
  • FIG. 1 is a schematic diagram of a communication system architecture provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of UE performing uplink transmission after a base station initiates COT according to an embodiment of the present application
  • FIG. 3 is a schematic diagram of a transmission opportunity corresponding to question 1 provided by an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a transmission opportunity corresponding to question 2 provided by an embodiment of the present application.
  • FIG. 5 is a first schematic flowchart of a wireless communication method for unlicensed spectrum provided by an embodiment of this application;
  • FIG. 6 is a schematic diagram of transmission opportunities of application example one provided by an embodiment of the application.
  • FIG. 7 is a schematic diagram of transmission opportunities of application example 2 provided by an embodiment of this application.
  • FIG. 8 is a schematic diagram of transmission opportunities of application example three provided by an embodiment of this application.
  • FIG. 9 is a second schematic flowchart of a wireless communication method for unlicensed spectrum provided by an embodiment of the application.
  • FIG. 10 is a schematic diagram of transmission opportunities in the case of downlink receiving and uplink transmission conversion provided by an embodiment of the application.
  • FIG. 11 is a third schematic flowchart of a wireless communication method for unlicensed spectrum provided by an embodiment of this application.
  • FIG. 12 is a schematic diagram of a transmission opportunity in the case of uplink reception and downlink transmission conversion provided by an embodiment of the application;
  • FIG. 13 is a schematic diagram 1 of the structural composition of a wireless communication device for unlicensed spectrum provided by an embodiment of this application;
  • FIG. 14 is a schematic diagram 2 of the structural composition of a wireless communication device for unlicensed spectrum provided by an embodiment of the application;
  • 15 is a schematic diagram 3 of the structural composition of a wireless communication device for unlicensed spectrum provided by an embodiment of this application;
  • FIG. 16 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 17 is a schematic structural diagram of a chip of an embodiment of the present application.
  • FIG. 18 is a schematic block diagram of a communication system provided by an embodiment of the present application.
  • GSM Global System of Mobile Communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GSM Global System of Mobile Communication
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • LTE-A Advanced long term evolution
  • NR New Radio
  • NR NR system evolution system
  • LTE on unlicensed frequency bands LTE-based access to unlicensed spectrum, LTE-U
  • NR NR-based access to unlicensed spectrum, NR-U
  • UMTS Universal Mobile Telecommunication System
  • UMTS Universal Mobile Telecommunication System
  • WiMAX Worldwide Interoperability for Microwave Access
  • WiMAX Wireless Local Area Networks
  • WLAN Wireless Fidelity
  • WiFi next-generation communication systems or other communication systems, etc.
  • D2D Device to Device
  • M2M Machine to Machine
  • MTC machine type communication
  • V2V vehicle to vehicle
  • the communication system 100 applied in the embodiment of the present application is shown in FIG. 1.
  • the communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal device 120 (or called a communication terminal or terminal).
  • the network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminal devices located in the coverage area.
  • the network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system (Evolutional Node B, eNB or eNodeB), or the wireless controller in the Cloud Radio Access Network (CRAN), or the network equipment can be a mobile switching center, a relay station, an access point, a vehicle-mounted device, Wearable devices, hubs, switches, bridges, routers, network-side devices in 5G networks, or network devices in the future evolution of the Public Land Mobile Network (PLMN), etc.
  • BTS Base Transceiver Station
  • NodeB, NB base station
  • LTE Long Term Evolutional Node B
  • eNB evolved base station
  • CRAN Cloud Radio Access Network
  • the network equipment can be a mobile switching center, a relay station, an access point, a vehicle-mounted device, Wearable devices, hubs, switches
  • the communication system 100 also includes at least one terminal device 120 located within the coverage area of the network device 110.
  • the "terminal equipment” used here includes but is not limited to connection via wired lines, such as via public switched telephone networks (PSTN), digital subscriber lines (Digital Subscriber Line, DSL), digital cables, and direct cable connections ; And/or another data connection/network; and/or via a wireless interface, such as for cellular networks, wireless local area networks (WLAN), digital TV networks such as DVB-H networks, satellite networks, AM- FM broadcast transmitter; and/or another terminal device that is set to receive/send communication signals; and/or Internet of Things (IoT) equipment.
  • PSTN public switched telephone networks
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL Digital Subscriber Line
  • DSL
  • a terminal device set to communicate through a wireless interface may be referred to as a "wireless communication terminal", a “wireless terminal” or a “mobile terminal”.
  • mobile terminals include, but are not limited to, satellites or cellular phones; Personal Communications System (PCS) terminals that can combine cellular radio phones with data processing, fax, and data communication capabilities; can include radio phones, pagers, Internet/intranet PDA with internet access, web browser, memo pad, calendar, and/or Global Positioning System (GPS) receiver; and conventional laptop and/or palmtop receivers or others including radio phone transceivers Electronic device.
  • PCS Personal Communications System
  • GPS Global Positioning System
  • Terminal equipment can refer to access terminals, user equipment (UE), user units, user stations, mobile stations, mobile stations, remote stations, remote terminals, mobile equipment, user terminals, terminals, wireless communication equipment, user agents, or User device.
  • the access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital processing (Personal Digital Assistant, PDA), with wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in 5G networks, or terminal devices in the future evolution of PLMN, etc.
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • direct terminal connection (Device to Device, D2D) communication may be performed between the terminal devices 120.
  • the 5G system or 5G network may also be referred to as a New Radio (NR) system or NR network.
  • NR New Radio
  • Figure 1 exemplarily shows one network device and two terminal devices.
  • the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminal devices. The embodiment does not limit this.
  • the communication system 100 may also include other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
  • network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
  • the devices with communication functions in the network/system in the embodiments of the present application may be referred to as communication devices.
  • the communication device may include a network device 110 and a terminal device 120 with communication functions, and the network device 110 and the terminal device 120 may be the specific devices described above, which will not be repeated here.
  • the communication device may also include other devices in the communication system 100, such as other network entities such as a network controller and a mobility management entity, which are not limited in this embodiment of the application.
  • LBT Listen Before Talk
  • MCOT Maximum Channel Occupancy Time
  • the communication device may have the following four types of channel access schemes when performing LBT, where the bandwidth of the LBT may be 20 MHz, or an integer multiple of 20 MHz:
  • Cat-1LBT transfer immediately after the switching gap (switching gap) ends
  • the switching gap does not exceed a specific time, such as 16us
  • Cat-2LBT Single-slot detection, also known as LBT without random fallback
  • Signal transmission can be performed when the channel is idle within a single detection time, and signal transmission cannot be performed when the channel is occupied
  • the detection time length of a single time slot can be different under different handover gaps.
  • the detection time length of a single time slot can be greater than 16us and less than or equal to 25us
  • Cat-3LBT LBT with random fallback based on fixed contention window size (Contention Window Size, CWS)
  • ⁇ CW p is a fixed value
  • the communication device generates a random number N according to the value of CW p
  • the communication equipment performs channel detection on the unlicensed spectrum, and can perform communication after successful channel detection in N time slots.
  • Cat-4LBT LBT with random fallback based on variable CWS
  • ⁇ CW p is a variable value
  • the communication device generates a random number N according to the value of CW p
  • the communication equipment performs channel detection on the unlicensed spectrum, and can transmit signals after successful channel detection in N time slots
  • Cat-3LBT and Cat-4LBT further distinguish the priority of the channel access scheme according to the priority of the transmission service.
  • MCOT refers to the maximum length of time allowed to use unlicensed spectrum channels for signal transmission after LBT is successful, and different MCOTs are available under different channel access priorities.
  • the MCOT is the time occupied by signal transmission.
  • COT refers to the length of time for signal transmission using the channel of the unlicensed spectrum after the LBT is successful, and the signal-occupied channel may be discontinuous during this length of time.
  • one COT cannot exceed 20 ms at the longest, and the length of time occupied by signal transmission in the COT does not exceed MCOT.
  • the channel occupation time (gNB-initiated COT) of the base station is also referred to as the COT initiated by the base station, which refers to a channel occupation time obtained after the base station LBT succeeds.
  • the channel occupation time of the base station can not only be used for downlink transmission, but also can be used for UE for uplink transmission under certain conditions.
  • the UE-initiated COT is also referred to as UE-initiated COT, which refers to a channel occupation time obtained by the UE after successful LBT.
  • a downlink transmission opportunity refers to a group of downlink transmissions (that is, including one or more downlink transmissions) performed by a base station, and the group of downlink transmissions is continuous transmission (that is, multiple downlink transmissions). There is no gap, or the downlink time unit included in a downlink transmission opportunity is continuous). If there is a gap between two downlink transmissions performed by the base station, the two downlink transmissions are considered to be two downlink transmission opportunities.
  • one downlink transmission refers to one PDSCH.
  • the uplink transmission opportunity refers to a group of uplink transmissions (that is, including one or more uplink transmissions) performed by a UE, and the group of uplink transmissions is continuous transmission (that is, multiple uplink transmissions). There is no gap between transmissions, or the uplink time unit included in an uplink transmission opportunity is continuous). If there is a gap between the two uplink transmissions performed by the UE, the two uplink transmissions are considered to be two uplink transmission opportunities.
  • one uplink transmission refers to one PUSCH.
  • the channel access schemes applied in different transmission scenarios are different, and the channel access schemes applied to different signals or channels are also different.
  • Table 1 specifies channel access schemes in different situations:
  • Table 1 Channel access scheme of base station
  • the channel access priority is determined according to the lowest priority data among the multiple priorities.
  • the resources in the COT can be used for the UE for uplink transmission.
  • the UE can immediately perform the uplink transmission; if the COT of the base station If there is no downlink transmission opportunity after the uplink transmission opportunity, the UE can perform Cat-2LBT or single-slot detection before transmission; if in the COT of the base station, the gap between any two adjacent transmissions is less than or equal to 25 ⁇ s, UE can perform Cat-2LBT or single-slot detection.
  • Table 2 specifies channel access schemes in different situations:
  • Table 2 Channel access scheme of UE
  • the above technologies specify channel access schemes used in different transmission scenarios.
  • the existing channel access schemes have the following problems:
  • the COT initiated by the base station can include multiple uplink and downlink conversion points, and it is stipulated that in the COT initiated by the base station, if the end position of the previous transmission opportunity is different from the start position of the next transmission opportunity If the interval is less than or equal to 16us, then Cat-1LBT can be used for the next transmission opportunity, that is, the transmission of the next transmission opportunity is performed without channel detection. If the interval between the end position of the previous transmission opportunity and the start position of the next transmission opportunity is greater than 16us, then the next transmission opportunity can use Cat-2LBT.
  • the interval between the end position of the first transmission opportunity and the start position of the second transmission opportunity is greater than 16us
  • the interval between the end position of the second transmission opportunity and the start position of the third transmission opportunity is less than Or equal to 16us, as shown in Figure 3. Because Cat-2LBT is required before the second transmission opportunity starts, the second transmission opportunity may fail. In this case, the third transmission opportunity may be directly started. Transmission will cause serious interference on unlicensed carriers.
  • FIG. 5 is a schematic flowchart 1 of a wireless communication method for an unlicensed spectrum provided by an embodiment of the application. As shown in FIG. 5, the wireless communication method for an unlicensed spectrum includes some or all of the following steps:
  • Step 501 The first device sends first information to the second device through the first transmission opportunity in the first COT.
  • the channel access scheme corresponding to the first transmission opportunity is determined according to the second transmission opportunity.
  • the second transmission opportunity is the most recent transmission opportunity before the first transmission opportunity in the first COT, and the first COT is the COT obtained by the first device or the COT obtained by the second device.
  • the channel access scheme corresponding to the first transmission opportunity is determined according to the second transmission opportunity, and can be implemented in at least one of the following ways:
  • the first transmission opportunity is the Nth transmission opportunity in the first COT
  • the second transmission opportunity is the N-1th transmission opportunity in the first COT
  • N is a positive value greater than or equal to 2. Integer.
  • the following describes the channel access schemes corresponding to the first transmission opportunity in combination with the value of N.
  • the second transmission opportunity is the first transmission opportunity in the first COT
  • the first transmission opportunity is the second transmission opportunity in the first COT
  • Case 1 If the first time length is less than or equal to the first threshold, the channel access scheme corresponding to the first transmission opportunity is the first channel access scheme; in this way, the second transmission opportunity is performed within one COT It is not necessary to do LBT during the transmission, which can obtain the benefits of channel sharing and improve the channel access opportunities, and it will not interfere with other transmissions on the unlicensed spectrum.
  • Case 2 If the first time length is greater than the first threshold value, the channel access scheme corresponding to the first transmission opportunity is the second channel access scheme.
  • the first time length is the time length between the end time of the second transmission opportunity and the start time of the first transmission opportunity.
  • the first channel access scheme refers to that no channel detection is required before the transmission opportunity is sent, that is, Cat-1LBT.
  • the second channel access scheme refers to: single-slot channel detection is required before the transmission opportunity is sent, that is, Cat-2LBT.
  • the first threshold value is 16 us.
  • N is a positive integer greater than 2
  • the channel access scheme corresponding to at least one transmission opportunity from the second transmission opportunity to the N-1th transmission opportunity in the first COT is the second channel access scheme
  • the first transmission opportunity corresponds to The channel access scheme is the second channel access scheme. In this way, interference to other transmissions on the unlicensed spectrum can be avoided.
  • the second channel access scheme refers to: single-slot channel detection is required before the transmission opportunity is sent, that is, Cat-2LBT.
  • N is a positive integer greater than 2
  • Case 1 If the channel access schemes corresponding to the second transmission opportunity to the N-1th transmission opportunity in the first COT are all the first channel access scheme, and the first time length is less than or equal to the first gate Limit value, the channel access scheme corresponding to the first transmission opportunity is the first channel access scheme.
  • the channel access scheme corresponding to the first transmission opportunity is the first channel access scheme.
  • LBT can also be omitted, so that the benefits of channel sharing can be obtained, the channel access opportunity is improved, and other transmissions on the unlicensed spectrum will not be interfered.
  • Case 2 If the channel access schemes corresponding to the second transmission opportunity to the N-1th transmission opportunity in the first COT are all the first channel access scheme, and the first time length is greater than the first gate Limit, the channel access scheme corresponding to the first transmission opportunity is the second channel access scheme.
  • the channel access schemes corresponding to the second transmission opportunity to the N-1th transmission opportunity in the first COT are all the first channel access schemes, if the second transmission in the first COT From the opportunity to the N-1th transmission opportunity, there is at least one transmission opportunity.
  • the channel transmitted only includes the hybrid automatic retransmission request-response HARQ-ACK information corresponding to the PDSCH (for example, PUCCH or PUSCH that only includes uplink control information is used to transmit HARQ -ACK information), the channel access scheme corresponding to the first transmission opportunity is the second channel access scheme.
  • the terminal device does not detect the PDCCH sent to it by the network device, it will not receive the PDSCH scheduled by the PDCCH, and will not transmit HARQ-ACK information on the corresponding uplink channel. Therefore, even in a COT, if all the transmission opportunities between the second to the N-1th transmission opportunity do not perform LBT before transmission, as long as the second to the N-1th transmission opportunity includes one An uplink transmission opportunity that is only used to transmit HARQ-ACK information. This uplink transmission opportunity also has a certain probability that it cannot be transmitted because the downlink authorization sent by the network device is lost. In this case, single-slot channel detection can be performed during the Nth transmission opportunity transmission to prevent interference with other transmissions on the unlicensed spectrum.
  • the first time length is the time length between the end time of the second transmission opportunity and the start time of the first transmission opportunity.
  • the first channel access scheme refers to that no channel detection is required before the transmission opportunity is sent, that is, Cat-1LBT.
  • the second channel access scheme refers to: single-slot channel detection is required before the transmission opportunity is sent, that is, Cat-2LBT.
  • the first threshold value is 16 us.
  • the channel access scheme corresponding to the second transmission opportunity is the second channel access scheme
  • the channel access scheme corresponding to the first transmission opportunity is the second channel access scheme. In this way, interference to other transmissions on the unlicensed spectrum can be avoided.
  • the second channel access scheme refers to: single-slot channel detection is required before the transmission opportunity is sent, that is, Cat-2LBT.
  • Case 1 If the first device receives the second information on the second transmission opportunity before the first transmission opportunity is sent, and the first time length is less than or equal to the first threshold, then the first device The channel access scheme corresponding to a transmission opportunity is the first channel access scheme. Specifically, if the information transmitted on the second transmission opportunity is received in a COT, it means that the second transmission opportunity includes the signal transmission in the system. Therefore, the first transmission opportunity can also be transmitted without LBT. The benefits of channel sharing increase channel access opportunities and will not interfere with other transmissions on unlicensed spectrum.
  • Case 2 If the first device receives the second information on the second transmission opportunity before the first transmission opportunity is sent, and the first time length is greater than the first threshold, then the first device The channel access scheme corresponding to a transmission opportunity is the second channel access scheme.
  • Case 3 If the first device does not receive the second information on the second transmission opportunity before the first transmission opportunity is sent, the channel access scheme corresponding to the first transmission opportunity is the second channel Access plan.
  • the first time length is the time length between the end time of the second transmission opportunity and the start time of the first transmission opportunity.
  • the first channel access scheme refers to that no channel detection is required before the transmission opportunity is sent, that is, Cat-1LBT.
  • the second channel access scheme refers to: single-slot channel detection is required before the transmission opportunity is sent, that is, Cat-2LBT.
  • the first device is a network device
  • the channel access schemes corresponding to the second transmission opportunity to the N-1th transmission opportunity in the first COT are all the first channel access schemes, where the N-1th transmission
  • the channel transmitted on the opportunity only includes the hybrid automatic retransmission request-response HARQ-ACK information corresponding to the PDSCH.
  • the first transmission opportunity corresponds to The channel access scheme is the second channel access scheme; if the network device receives the HARQ-ACK information on the N-1th transmission opportunity, and the first time length is less than or equal to the first threshold, then the first The channel access scheme corresponding to a transmission opportunity is the first channel access scheme; if the network device receives the HARQ-ACK information on the N-1th transmission opportunity, and the first time length is greater than the first threshold, then The channel access scheme corresponding to the first transmission opportunity is the second channel access scheme.
  • the first threshold value is 16 us.
  • the second information includes at least one of the following information: Hybrid Automatic Repeat-reQuest Acknowledgement (HARQ-ACK) feedback information, transport block decoding Information, control channels, reference signals.
  • HARQ-ACK Hybrid Automatic Repeat-reQuest Acknowledgement
  • the first device and the second device may have different implementation manners.
  • the specific content of the above-mentioned second information will be described below in conjunction with different implementation manners of the first device and the second device.
  • the first device is a network device
  • the second device is a terminal device.
  • the first device receives second information on the second transmission opportunity before the first transmission opportunity is sent, and the second information includes the uplink transmission sent by the terminal device on the second transmission opportunity Block decoding correct information and/or uplink control information sent by the terminal device on the second transmission opportunity.
  • receiving the information that the uplink transport block is decoded correctly may mean that the network device receives at least one PUSCH sent on the second transmission opportunity, and correctly decodes the transport block on the PUSCH.
  • receiving uplink control information may refer to: the network device detects PUCCH or HARQ-ACK information on the second transmission opportunity.
  • the first device is a terminal device
  • the second device is a network device.
  • the first device received the second information on the second transmission opportunity before the first transmission opportunity was sent, and the second information includes the downlink transmission sent by the network device on the second transmission opportunity Block decoding correct information and/or the PDCCH sent by the network device on the second transmission opportunity.
  • receiving the information that the downlink transport block is decoded correctly may mean that the terminal device receives at least one PDSCH sent on the second transmission opportunity and correctly decodes the transport block on the PDSCH.
  • receiving the PDCCH may mean that the terminal device detects the PDCCH on the second transmission opportunity (for example, the cyclic redundancy check of the PDCCH is successful).
  • the first device is a first terminal device
  • the second device is a second terminal device.
  • the first device receives the second information on the second transmission opportunity before the first transmission opportunity is sent, and the second information includes that the second terminal device sends the second information on the second transmission opportunity to The scheduling information of the first terminal device and/or the decoding information of the transmission block.
  • receiving the scheduling information of the second terminal device may refer to: the first terminal device receives the indication information of data transmission sent by the second terminal device on the second transmission opportunity.
  • receiving the decoding information of the transmission block of the second terminal device may refer to: the first terminal device receives the transmission block sent by the second terminal device on the second transmission opportunity and completes the decoding of the transmission block.
  • the first device is a network device
  • the second device is a terminal device. As an example and not a limitation, it is shown in FIG. 6.
  • the channel occupancy time obtained by the network device includes 3 transmission opportunities.
  • the first transmission opportunity includes the PDSCH sent by the network device to the terminal device, and the second transmission opportunity includes the terminal device's decoding of the PDSCH sent to the network device.
  • HARQ-ACK information If before the third transmission opportunity, the network device obtains the HARQ-ACK information transmitted by the terminal device on the second transmission opportunity, and the end position of the second transmission opportunity and the start position of the third transmission opportunity If the gap between the two is less than or equal to the first preset value, then the network device may directly perform the third transmission opportunity transmission without LBT.
  • the first device is a terminal device
  • the second device is a network device.
  • the channel occupation time obtained by the terminal device includes 3 transmission opportunities.
  • the first transmission opportunity includes the PUSCH sent by the terminal device to the network device
  • the second transmission opportunity includes the uplink authorization information sent by the network device to the terminal device.
  • the information is used to schedule the terminal device or another terminal device to transmit PUSCH through the third transmission opportunity.
  • the terminal device receives the uplink authorization, if the gap between the end position of the second transmission opportunity and the start position of the third transmission opportunity is less than or equal to the first preset value, then the terminal device or the other The terminal device can directly perform the third transmission opportunity transmission without LBT.
  • the first device is a first terminal device
  • the second device is a second terminal device.
  • the channel occupation time obtained by the first terminal device includes 3 transmission opportunities.
  • the first transmission opportunity includes the PSSCH sent by the first terminal device to the second terminal device, and the second transmission opportunity includes the second terminal device’s PSSCH transmission opportunity.
  • the HARQ-ACK information sent to the first terminal device in the decoding situation for example, the decoding error feeds back NACK to the first terminal device.
  • the first terminal device obtains the NACK information transmitted by the second terminal device on the second transmission opportunity, and the end position of the second transmission opportunity and the start of the third transmission opportunity The gap between the positions is less than or equal to the first preset value, then the first terminal device may directly transmit the third transmission opportunity without LBT, and the transmission on the third transmission opportunity includes the repetition of the PSSCH corresponding to the NACK information. pass.
  • FIG. 9 is a schematic diagram of the second flow of a wireless communication method for an unlicensed spectrum provided by an embodiment of the application. As shown in FIG. 9, the wireless communication method for an unlicensed spectrum includes some or all of the following steps:
  • Step 901 The terminal device sends uplink information to the network device through the first transmission opportunity, where the first transmission opportunity is the transmission opportunity in the first COT obtained by the network device, and the second transmission opportunity is the first COT.
  • the first time interval between the end time of the second transmission opportunity and the start time of the first transmission opportunity is less than or equal to a first threshold.
  • the second transmission opportunity is a transmission opportunity for the network device to perform downlink transmission
  • the first transmission opportunity is a transmission opportunity for the terminal device to perform uplink transmission
  • the second transmission opportunity includes a resource for the network device to transmit a downlink channel or a downlink signal to a terminal device
  • the first transmission opportunity includes a resource for the terminal device to transmit an uplink channel or an uplink signal to the network device.
  • the terminal device does not expect to receive a signal in the first time period at the end of the second transmission opportunity. Further, the first time period includes the last symbol in the second transmission opportunity.
  • the downlink channel or downlink signal sent by the network device to the terminal device is not included in the first time period.
  • the first time period does not include a synchronization signal block (Synchronizing Signal/PBCH Block, SSB), and/or a physical downlink control channel (Physical Downlink Control Channel, PDCCH) that carries public information, and/or carries Physical Downlink Shared Channel (PDSCH) for public information.
  • the terminal device does not expect to receive the PDCCH on the last symbol in the second transmission opportunity.
  • the terminal device does not expect to receive the PDSCH on the last symbol in the second transmission opportunity, where the PDSCH includes a dedicated PDSCH, or the PDSCH includes a PDSCH carrying common information such as SIB information.
  • the terminal device does not expect to receive the PBCH or the synchronization signal block SSB on the last symbol in the second transmission opportunity.
  • the terminal device does not expect to receive a reference signal, such as CSI-RS, on the last symbol in the second transmission opportunity.
  • a reference signal such as CSI-RS
  • the terminal device does not expect to perform measurement on the last symbol in the second transmission opportunity, such as Radio Resource Management (RRM) measurement, Radio Link Management (RLM) measurement, and signal reception Strength indication (Received Signal Strength Indication, RSSI), etc.
  • RRM Radio Resource Management
  • RLM Radio Link Management
  • RSSI Signal reception Strength indication
  • the time interval for the terminal device to switch from receiving a signal to sending a signal is a second time interval, and the second time interval is greater than the first time interval.
  • the first threshold value is 16 us.
  • the terminal device starts to send uplink information to the network device at the first moment after the end of the second transmission opportunity, wherein the end of the second transmission opportunity
  • the time interval between the time and the first time is the second time interval for the terminal device to switch from receiving a signal to sending a signal.
  • the second time interval is smaller than the first time interval, and the terminal device sends the first transmission opportunity on the time resource between the first time and the start time of the first transmission opportunity
  • start moment of the first transmission opportunity herein refers to the start moment of the first valid symbol in the first transmission opportunity.
  • the first valid symbol in the first transmission opportunity refers to the first complete symbol in the first transmission opportunity.
  • the terminal device receives the channel access plan indication information sent by the network device.
  • the indication information is used to indicate that the corresponding channel access plan when the terminal device transmits the first transmission opportunity is Cat-1LBT. Therefore, the terminal The device immediately performs the conversion from downlink reception to uplink transmission after the end of downlink reception, and starts the transmission of uplink signals after the end of the conversion.
  • the time interval between the end of downlink reception and the time of uplink transmission is the second time interval for the terminal device to switch from receiving a signal to sending a signal.
  • L in FIG. 7 represents the first time interval
  • S represents the second time interval (ie, DL-UL GAP).
  • L is greater than or equal to S.
  • L is greater than or equal to (S+TA), where TA is the round trip delay between the network device and the terminal device indicated by the network device to the terminal device.
  • the first threshold value is 16 us.
  • the first threshold is the length of time corresponding to one symbol.
  • the terminal device before the terminal device sends uplink information to the network device through the first transmission opportunity, the terminal device reports instruction information to the network device, and the instruction information is used to determine The second time interval for the terminal device to switch from receiving a signal to a sending signal or a range to which the second time interval belongs, or the indication information is used to indicate the ability of the terminal device to switch from receiving a signal to sending a signal.
  • the first time interval is determined by the network device according to the indication information. Further, the second time interval is less than or equal to the first time interval.
  • the terminal device reports the second time interval or the range to which the second time interval belongs to the network device for reference, so that the network device can integrate various factors to perform downlink scheduling and transmission on the terminal device.
  • the network device may determine a suitable first time interval for the terminal device, for example, the first time interval is greater than or equal to the second time interval.
  • the first threshold value is 16 us.
  • FIG. 11 is a third schematic flowchart of a wireless communication method for unlicensed spectrum provided by an embodiment of the application. As shown in FIG. 11, the wireless communication method for unlicensed spectrum includes some or all of the following steps:
  • Step 1101 The network device sends downlink information to the terminal device through the first transmission opportunity, where the first transmission opportunity is the transmission opportunity in the first COT obtained by the terminal device, and the second transmission opportunity is the first COT.
  • the first time interval between the end time of the second transmission opportunity and the start time of the first transmission opportunity is less than or equal to a first threshold.
  • the second transmission opportunity is a transmission opportunity for the terminal device to perform uplink transmission
  • the first transmission opportunity is a transmission opportunity for the network device to perform downlink transmission
  • the second transmission opportunity includes resources for the terminal device to transmit uplink channels or uplink signals to the network device
  • the first transmission opportunity includes resources for the network device to transmit downlink channels or downlink signals to the terminal device.
  • the network device does not expect to receive a signal in the first time period at the end of the second transmission opportunity. Further, the first time period includes the last symbol in the second transmission opportunity. Further, the second transmission opportunity is a transmission opportunity for the terminal device to perform uplink transmission, and the effective uplink channel or effective uplink signal of the terminal device is not included in the first time period.
  • the effective uplink channel includes: an uplink channel that carries useful information.
  • the effective uplink signal includes: a reference signal used for channel demodulation or measurement.
  • the network device does not expect to receive the Physical Uplink Control Channel (PUCCH) on the last symbol in the second transmission opportunity.
  • PUCCH Physical Uplink Control Channel
  • the network device does not expect to receive the Physical Uplink Shared Channel (PUSCH) on the last symbol in the second transmission opportunity.
  • PUSCH Physical Uplink Shared Channel
  • the network device does not expect to receive a Physical Random Access Channel (PRACH) on the last symbol in the second transmission opportunity.
  • PRACH Physical Random Access Channel
  • the network device does not expect to receive a reference signal, such as a sounding reference signal (SRS) on the last symbol in the second transmission opportunity.
  • a reference signal such as a sounding reference signal (SRS)
  • the time interval for the network device to switch from receiving a signal to sending a signal is a second time interval, and the second time interval is greater than the first time interval.
  • the first threshold value is 16 us.
  • the network device starts to send downlink information to the terminal device at the first moment after the end of the second transmission opportunity, wherein the end of the second transmission opportunity
  • the time interval between the time and the first time is the second time interval for the network device to switch from receiving a signal to sending a signal.
  • the second time interval is smaller than the first time interval, and the network device sends the first transmission opportunity on the time resource between the first time and the start time of the first transmission opportunity
  • start moment of the first transmission opportunity herein refers to the start moment of the first valid symbol in the first transmission opportunity.
  • the first valid symbol in the first transmission opportunity refers to the first complete symbol in the first transmission opportunity.
  • the corresponding channel access scheme when the network device determines to transmit the first transmission opportunity is Cat-1LBT (for example, the network device receives the channel sharing indication information sent by the terminal device, and the indication information includes instructing the network device to transmit the first transmission opportunity).
  • the corresponding channel access scheme is Cat-1LBT information, or the network equipment instructs the terminal equipment to share COT according to Cat-1LBT. Therefore, the network equipment immediately receives from the uplink to the downlink after the uplink reception is completed. Send the conversion, and start the downlink signal transmission after the conversion.
  • the time interval between the end of uplink reception and the time of downlink transmission is the second time interval (indicated by S in the figure) when the network device switches from receiving a signal to sending a signal.
  • the network device can send the CP extension of the symbol before the start time of the first symbol carrying valid data.
  • the network device may send instruction information to the terminal device, and the instruction information is used by the terminal device to determine that when the first COT obtained by the terminal device is shared with the network device, in the second transmission opportunity Information about whether padding (i.e. sending a placeholder signal) is performed in the first time period at the tail, and/or the length information of the first time period, and/or the end position of the effective information transmission in the second transmission opportunity, and /Or, the end position of the second transmission opportunity, and/or the channel access scheme corresponding to the first transmission opportunity (for example, Cat-1LBT or Cat-2LBT).
  • padding i.e. sending a placeholder signal
  • the first threshold value is 16 us.
  • the first threshold is the length of time corresponding to one symbol.
  • FIG. 13 is a schematic diagram 1 of the structural composition of a wireless communication device for unlicensed spectrum provided by an embodiment of the application, which is applied to a first device.
  • the wireless communication device for unlicensed spectrum includes:
  • the sending unit 1301 is configured to send first information to the second device through the first transmission opportunity in the first COT, where:
  • the channel access scheme corresponding to the first transmission opportunity is determined according to the second transmission opportunity, and the second transmission opportunity is the most recent transmission opportunity in the first COT before the first transmission opportunity.
  • a COT is the COT obtained by the first device or the COT obtained by the second device.
  • the first transmission opportunity is the Nth transmission opportunity in the first COT
  • the second transmission opportunity is the N-1th transmission opportunity in the first COT
  • N is A positive integer greater than or equal to 2.
  • the N is a positive integer greater than 2
  • the channel access scheme corresponding to the first transmission opportunity is determined according to the second transmission opportunity, including:
  • the channel access scheme corresponding to at least one transmission opportunity from the second transmission opportunity to the N-1th transmission opportunity in the first COT is the second channel access scheme
  • the first transmission opportunity corresponds to The channel access scheme is the second channel access scheme
  • the channel access scheme corresponding to the first transmission opportunity is determined according to the second transmission opportunity, and includes:
  • the channel access scheme corresponding to the second transmission opportunity is the second channel access scheme
  • the channel access scheme corresponding to the first transmission opportunity is the second channel access scheme
  • the N is a positive integer greater than 2
  • the channel access scheme corresponding to the first transmission opportunity is determined according to the second transmission opportunity, including one of the following situations:
  • the channel access schemes corresponding to the second transmission opportunity to the N-1th transmission opportunity in the first COT are all the first channel access scheme, and the first time length is less than or equal to the first threshold, Then the channel access scheme corresponding to the first transmission opportunity is the first channel access scheme;
  • the channel access schemes corresponding to the second transmission opportunity to the N-1th transmission opportunity in the first COT are all the first channel access scheme, and the first time length is greater than the first threshold, Then the channel access scheme corresponding to the first transmission opportunity is the second channel access scheme;
  • the first time length is the time length between the end time of the second transmission opportunity and the start time of the first transmission opportunity.
  • the channel access scheme corresponding to the first transmission opportunity is determined according to the second transmission opportunity, and includes one of the following situations:
  • the first transmission opportunity is the first channel access scheme
  • the first device receives the second information on the second transmission opportunity before the first transmission opportunity is sent, and the first time length is greater than the first threshold, then the first transmission opportunity
  • the corresponding channel access scheme is the second channel access scheme
  • the channel access scheme corresponding to the first transmission opportunity is the second channel access scheme ;
  • the first time length is the time length between the end time of the second transmission opportunity and the start time of the first transmission opportunity.
  • the second information includes at least one of the following information: HARQ-ACK feedback information, transport block decoding information, control channel, and reference signal.
  • the first channel access scheme refers to that channel detection is not required before the transmission opportunity is sent.
  • the second channel access scheme refers to: single-slot channel detection is required before transmission opportunities are sent.
  • the first device is a network device
  • the second device is a terminal device
  • the device further includes:
  • the receiving unit 1302 is configured to receive second information on the second transmission opportunity before the first transmission opportunity is sent, and the second information includes the uplink information sent by the terminal device on the second transmission opportunity Information that the transmission block is decoded correctly and/or the uplink control information sent by the terminal device on the second transmission opportunity.
  • the first device is a terminal device
  • the second device is a network device
  • the device further includes:
  • the receiving unit 1302 is configured to receive second information on the second transmission opportunity before the first transmission opportunity is sent, and the second information includes the downlink sent by the network device on the second transmission opportunity Information that the transport block is decoded correctly and/or the PDCCH sent by the network device on the second transmission opportunity.
  • the first device is a first terminal device
  • the second device is a second terminal device.
  • the device further includes:
  • the receiving unit 1302 is configured to receive second information on the second transmission opportunity before the first transmission opportunity is sent, and the second information includes the second information sent by the second terminal device on the second transmission opportunity The scheduling information and/or the decoding information of the transmission block for the first terminal device.
  • Fig. 14 is a schematic diagram 2 of the structural composition of a wireless communication device for unlicensed spectrum provided by an embodiment of the application, which is applied to terminal equipment.
  • the wireless communication device for unlicensed spectrum includes:
  • the communication unit 1401 is configured to send uplink information to the network device through the first transmission opportunity, where:
  • the first transmission opportunity is the transmission opportunity in the first COT obtained by the network device
  • the second transmission opportunity is the most recent transmission opportunity in the first COT before the first transmission opportunity
  • the second transmission is less than or equal to the first threshold.
  • the communication unit 1401 does not expect to receive a signal in the first time period that is at the end of the second transmission opportunity.
  • the first time period includes the last symbol in the second transmission opportunity.
  • the second transmission opportunity is a transmission opportunity for the network device to perform downlink transmission, and the first time period does not include a downlink channel or a downlink signal sent by the network device to the terminal device.
  • the second transmission opportunity is a transmission opportunity for the network device to perform downlink transmission, and the first time period does not include SSB, and/or PDCCH carrying public information, and/or carrying public information PDSCH.
  • the time interval for the communication unit to switch from receiving a signal to sending a signal is a second time interval, and the second time interval is greater than the first time interval.
  • the second transmission opportunity is a transmission opportunity for the network device to perform a downlink transmission
  • the communication unit 1401 is configured to start sending to the network at the first moment after the second transmission opportunity ends.
  • the device sends uplink information, where the time interval between the end time of the second transmission opportunity and the first time is a second time interval for the terminal device to switch from receiving a signal to sending a signal.
  • the second time interval is smaller than the first time interval
  • the communication unit is further used for the time resource between the first time and the start time of the first transmission opportunity
  • the extended cyclic prefix of the first symbol in the first transmission opportunity is sent up.
  • the communication unit 1401 is further configured to report instruction information to the network device, and the instruction information is used to determine the second time interval for the terminal device to switch from receiving a signal to sending a signal or the The range to which the second time interval belongs.
  • the first time interval is determined by the network device according to the indication information.
  • the second time interval is less than or equal to the first time interval.
  • FIG. 15 is a schematic diagram of the third structural composition of a wireless communication device for unlicensed spectrum provided by an embodiment of the application, which is applied to network equipment.
  • the wireless communication device for unlicensed spectrum includes:
  • the communication unit 1501 is configured to send downlink information to the terminal device through the first transmission opportunity, where:
  • the first transmission opportunity is the transmission opportunity in the first COT obtained by the terminal device
  • the second transmission opportunity is the most recent transmission opportunity in the first COT before the first transmission opportunity
  • the second transmission opportunity The first time interval between the end moment of the opportunity and the start moment of the first transmission opportunity is less than or equal to the first threshold.
  • the communication unit 1501 does not expect to receive a signal in the first time period at the end of the second transmission opportunity.
  • the first time period includes the last symbol in the second transmission opportunity.
  • the second transmission opportunity is a transmission opportunity for the terminal device to perform uplink transmission, and the first time period does not include an effective uplink channel or a valid uplink signal of the terminal device.
  • the time interval for the communication unit 1501 to switch from receiving a signal to sending a signal is a second time interval, and the second time interval is greater than the first time interval.
  • the second transmission opportunity is a transmission opportunity for the terminal device to perform uplink transmission
  • the communication unit 1501 is configured to start sending to the terminal at a first moment after the second transmission opportunity ends.
  • the device sends downlink information, where the time interval between the end time of the second transmission opportunity and the first time is a second time interval for the network device to switch from receiving a signal to sending a signal.
  • the second time interval is smaller than the first time interval
  • the communication unit 1501 is further configured to be the time between the first time and the start time of the first transmission opportunity
  • the extended cyclic prefix of the first symbol in the first transmission opportunity is sent on the resource.
  • FIG. 16 is a schematic structural diagram of a communication device 600 according to an embodiment of the present application.
  • the communication device may be a terminal device or a network device.
  • the communication device 600 shown in FIG. 16 includes a processor 610.
  • the processor 610 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
  • the communication device 600 may further include a memory 620.
  • the processor 610 may call and run a computer program from the memory 620 to implement the method in the embodiment of the present application.
  • the memory 620 may be a separate device independent of the processor 610, or may be integrated in the processor 610.
  • the communication device 600 may further include a transceiver 630, and the processor 610 may control the transceiver 630 to communicate with other devices. Specifically, it may send information or data to other devices, or receive other devices. Information or data sent by the device.
  • the transceiver 630 may include a transmitter and a receiver.
  • the transceiver 630 may further include an antenna, and the number of antennas may be one or more.
  • the communication device 600 may specifically be a network device in an embodiment of the present application, and the communication device 600 may implement the corresponding process implemented by the network device in each method of the embodiment of the present application. For brevity, details are not repeated here. .
  • the communication device 600 may specifically be a mobile terminal/terminal device of an embodiment of the application, and the communication device 600 may implement the corresponding processes implemented by the mobile terminal/terminal device in each method of the embodiment of the application.
  • I won’t repeat it here.
  • FIG. 17 is a schematic structural diagram of a chip of an embodiment of the present application.
  • the chip 700 shown in FIG. 17 includes a processor 710, and the processor 710 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
  • the chip 700 may further include a memory 720.
  • the processor 710 may call and run a computer program from the memory 720 to implement the method in the embodiment of the present application.
  • the memory 720 may be a separate device independent of the processor 710, or may be integrated in the processor 710.
  • the chip 700 may further include an input interface 730.
  • the processor 710 may control the input interface 730 to communicate with other devices or chips, and specifically, may obtain information or data sent by other devices or chips.
  • the chip 700 may further include an output interface 740.
  • the processor 710 can control the output interface 740 to communicate with other devices or chips, and specifically, can output information or data to other devices or chips.
  • the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the network device in the various methods of the embodiment of the present application.
  • the chip can implement the corresponding process implemented by the network device in the various methods of the embodiment of the present application.
  • the chip can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application.
  • the chip can implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application.
  • the chip can implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application.
  • the chip can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application.
  • the chip can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application.
  • the chip can implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application.
  • the chip mentioned in the embodiment of the present application may also be referred to as a system-level chip, a system-on-chip, a system-on-chip, or a system-on-chip, etc.
  • FIG. 18 is a schematic block diagram of a communication system 900 according to an embodiment of the present application. As shown in FIG. 18, the communication system 900 includes a terminal device 910 and a network device 920.
  • the terminal device 910 can be used to implement the corresponding function implemented by the terminal device in the above method
  • the network device 920 can be used to implement the corresponding function implemented by the network device in the above method. For brevity, it will not be repeated here. .
  • the processor of the embodiment of the present application may be an integrated circuit chip with signal processing capability.
  • the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the aforementioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC application specific integrated circuit
  • FPGA ready-made programmable gate array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
  • RAM random access memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDR SDRAM
  • ESDRAM enhanced synchronous dynamic random access memory
  • Synchlink DRAM SLDRAM
  • DR RAM Direct Rambus RAM
  • the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM), etc. That is to say, the memory in the embodiment of the present application is intended to include but not limited to these and any other suitable types of memory.
  • the embodiment of the present application also provides a computer-readable storage medium for storing computer programs.
  • the computer-readable storage medium may be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer-readable storage medium can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the computer program enables the computer to execute the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application ,
  • the computer program enables the computer to execute the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application ,
  • I will not repeat it here.
  • the embodiments of the present application also provide a computer program product, including computer program instructions.
  • the computer program product may be applied to the network device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the computer program product can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application, For brevity, I won't repeat them here.
  • the embodiment of the present application also provides a computer program.
  • the computer program can be applied to the network device in the embodiment of the present application.
  • the computer program runs on the computer, the computer is caused to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • I won’t repeat it here.
  • the computer program can be applied to the mobile terminal/terminal device in the embodiment of the present application.
  • the computer program runs on the computer, the computer executes each method in the embodiment of the present application. For the sake of brevity, the corresponding process will not be repeated here.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • each unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of this application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory,) ROM, random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供一种用于非授权频谱的无线通信方法及装置、通信设备,该方法包括:第一设备通过第一信道占用时间COT内的第一传输机会,向第二设备发送第一信息,其中,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,所述第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第一COT是所述第一设备获得的COT或所述第二设备获得的COT。

Description

一种用于非授权频谱的无线通信方法及装置、通信设备 技术领域
本申请实施例涉及无线通信技术领域,具体涉及一种用于非授权频谱的无线通信方法及装置、通信设备。
背景技术
非授权频谱是国家和地区划分的可用于无线电设备通信的频谱,该频谱通常被认为是共享频谱,即不同通信系统中的通信设备只要满足国家或地区在该频谱上设置的法规要求,就可以使用该频谱,不需要向政府申请专有的频谱授权。
针对非授权频谱,现有技术中规定了不同传输场景下应用的信道接入方案。现有技术规定的信道接入方案,在传输某个传输机会时,可能会造成非授权载波上的严重干扰。
发明内容
本申请实施例提供一种用于非授权频谱的无线通信方法及装置、通信设备。
本申请实施例提供的用于非授权频谱的无线通信方法,包括:
第一方面,本申请实施例提供的用于非授权频谱的无线通信方法,包括:
第一设备通过第一COT内的第一传输机会,向第二设备发送第一信息,其中,
所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,所述第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第一COT是所述第一设备获得的COT或所述第二设备获得的COT。
第二方面,本申请实施例提供的用于非授权频谱的无线通信方法,包括:
终端设备通过第一传输机会向网络设备发送上行信息,其中,
所述第一传输机会为所述网络设备获得的第一COT内的传输机会,第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的第一时间间隔小于或等于第一门限值。
第三方面,本申请实施例提供的用于非授权频谱的无线通信方法,包括:
网络设备通过第一传输机会向终端设备发送下行信息,其中,
所述第一传输机会为所述终端设备获得的第一COT内的传输机会,第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的第一时间间隔小于或等于第一门限值。
第四方面,本申请实施例提供的用于非授权频谱的无线通信装置,应用于第一设备,所述装置包括:
发送单元,用于通过第一COT内的第一传输机会,向第二设备发送第一信息,其中,
所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,所述第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第一COT是所述第一设备获得的COT或所述第二设备获得的COT。
第五方面,本申请实施例提供的用于非授权频谱的无线通信装置,应用于终端设备,所述装置包括:
通信单元,用于通过第一传输机会向网络设备发送上行信息,其中,
所述第一传输机会为所述网络设备获得的第一信道占用时间COT内的传输机会,第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的第一时间间隔小于或等于第一门限值。
第六方面,本申请实施例提供的用于非授权频谱的无线通信装置,应用于网络设备,所述装 置包括:
通信单元,用于通过第一传输机会向终端设备发送下行信息,其中,
所述第一传输机会为所述终端设备获得的第一COT内的传输机会,第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的第一时间间隔小于或等于第一门限值。
第七方面,本申请实施例提供的通信设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述的用于非授权频谱的无线通信方法。
第八方面,本申请实施例提供的芯片,用于实现上述的用于非授权频谱的无线通信方法。
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行上述的用于非授权频谱的无线通信方法。
第九方面,本申请实施例提供的计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述的用于非授权频谱的无线通信方法。
第十方面,本申请实施例提供的计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述的用于非授权频谱的无线通信方法。
第十一方面,本申请实施例提供的计算机程序,当其在计算机上运行时,使得计算机执行上述的用于非授权频谱的无线通信方法。
通过上述技术方案,第一传输机会对应的信道接入方案是根据第二传输机会确定的,如此,可以实现信道共享,提升信道接入机会,同时也可以避免对非授权频谱上的其他传输例如异系统的传输产生干扰。
附图说明
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:
图1是本申请实施例提供的一种通信系统架构的示意性图;
图2是本申请实施例提供的基站发起COT后UE进行上行传输的示意图;
图3是本申请实施例提供的问题1对应的传输机会示意图;
图4是本申请实施例提供的问题2对应的传输机会示意图;
图5为本申请实施例提供的用于非授权频谱的无线通信方法的流程示意图一;
图6为本申请实施例提供的应用示例一的传输机会示意图;
图7为本申请实施例提供的应用示例二的传输机会示意图;
图8为本申请实施例提供的应用示例三的传输机会示意图;
图9为本申请实施例提供的用于非授权频谱的无线通信方法的流程示意图二;
图10为本申请实施例提供的下行接收到上行发送转换情况下的传输机会示意图;
图11为本申请实施例提供的用于非授权频谱的无线通信方法的流程示意图三;
图12为本申请实施例提供的上行接收到下行发送转换情况下的传输机会示意图;
图13为本申请实施例提供的用于非授权频谱的无线通信装置的结构组成示意图一;
图14为本申请实施例提供的用于非授权频谱的无线通信装置的结构组成示意图二;
图15为本申请实施例提供的用于非授权频谱的无线通信装置的结构组成示意图三;
图16是本申请实施例提供的一种通信设备示意性结构图;
图17是本申请实施例的芯片的示意性结构图;
图18是本申请实施例提供的一种通信系统的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽 带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)系统、先进的长期演进(Advanced long term evolution,LTE-A)系统、新无线(New Radio,NR)系统、NR系统的演进系统、非授权频段上的LTE(LTE-based access to unlicensed spectrum,LTE-U)系统、非授权频段上的NR(NR-based access to unlicensed spectrum,NR-U)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、全球互联微波接入(Worldwide Interoperability for Microwave Access,WiMAX)通信系统、无线局域网(Wireless Local Area Networks,WLAN)、无线保真(Wireless Fidelity,WiFi)、下一代通信系统或其他通信系统等。
通常来说,传统的通信系统支持的连接数有限,也易于实现,然而,随着通信技术的发展,移动通信系统将不仅支持传统的通信,还将支持例如,设备到设备(Device to Device,D2D)通信,机器到机器(Machine to Machine,M2M)通信,机器类型通信(Machine Type Communication,MTC),以及车辆间(Vehicle to Vehicle,V2V)通信等,本申请实施例也可以应用于这些通信系统。
示例性的,本申请实施例应用的通信系统100如图1所示。该通信系统100可以包括网络设备110,网络设备110可以是与终端设备120(或称为通信终端、终端)通信的设备。网络设备110可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端设备进行通信。可选地,该网络设备110可以是GSM系统或CDMA系统中的基站(Base Transceiver Station,BTS),也可以是WCDMA系统中的基站(NodeB,NB),还可以是LTE系统中的演进型基站(Evolutional Node B,eNB或eNodeB),或者是云无线接入网络(Cloud Radio Access Network,CRAN)中的无线控制器,或者该网络设备可以为移动交换中心、中继站、接入点、车载设备、可穿戴设备、集线器、交换机、网桥、路由器、5G网络中的网络侧设备或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)中的网络设备等。
该通信系统100还包括位于网络设备110覆盖范围内的至少一个终端设备120。作为在此使用的“终端设备”包括但不限于经由有线线路连接,如经由公共交换电话网络(Public Switched Telephone Networks,PSTN)、数字用户线路(Digital Subscriber Line,DSL)、数字电缆、直接电缆连接;和/或另一数据连接/网络;和/或经由无线接口,如,针对蜂窝网络、无线局域网(Wireless Local Area Network,WLAN)、诸如DVB-H网络的数字电视网络、卫星网络、AM-FM广播发送器;和/或另一终端设备的被设置成接收/发送通信信号的装置;和/或物联网(Internet of Things,IoT)设备。被设置成通过无线接口通信的终端设备可以被称为“无线通信终端”、“无线终端”或“移动终端”。移动终端的示例包括但不限于卫星或蜂窝电话;可以组合蜂窝无线电电话与数据处理、传真以及数据通信能力的个人通信系统(Personal Communications System,PCS)终端;可以包括无线电电话、寻呼机、因特网/内联网接入、Web浏览器、记事簿、日历以及/或全球定位系统(Global Positioning System,GPS)接收器的PDA;以及常规膝上型和/或掌上型接收器或包括无线电电话收发器的其它电子装置。终端设备可以指接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、5G网络中的终端设备或者未来演进的PLMN中的终端设备等。
可选地,终端设备120之间可以进行终端直连(Device to Device,D2D)通信。
可选地,5G系统或5G网络还可以称为新无线(New Radio,NR)系统或NR网络。
图1示例性地示出了一个网络设备和两个终端设备,可选地,该通信系统100可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端设备,本申请实施例对此不做限定。
可选地,该通信系统100还可以包括网络控制器、移动管理实体等其他网络实体,本申请实施例对此不作限定。
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1示出的通信系统100为例,通信设备可包括具有通信功能的网络设备110和终端设备120,网络设备110和终端设备120可以为上文所述的具体设备,此处不再赘述;通信设备还可包括通信系统100中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A, 同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
为便于理解本申请实施例的技术方案,以下对本申请实施例的相关技术进行说明,以下相关技术与本申请实施例的技术方案的任意结合均属于本申请实施例的保护范围。
为了让使用非授权频谱进行无线通信的各个通信系统在该频谱上能够友好共存,一些国家或地区规定了使用非授权频谱必须满足的法规要求。例如,通信设备遵循“先听后说(Listen Before Talk,LBT)”原则,即通信设备在非授权频谱的信道上进行信号发送前,需要先进行信道侦听,只有当信道侦听结果为信道空闲时,该通信设备才能进行信号发送;如果通信设备在非授权频谱的信道上的信道侦听结果为信道忙,该通信设备不能进行信号发送。为了保证公平性,在一次传输中,通信设备使用非授权频谱的信道进行信号传输的时长不能超过最大信道占用时间(Maximum Channel Occupancy Time,MCOT)。
可选地,在本申请实施例中,通信设备进行LBT时可以有以下四种类型的信道接入方案,其中LBT的带宽可以为20MHz,或为20MHz的整数倍:
-Category 1(Cat-1LBT):切换空隙(switching gap)结束后立即传输
o适用于一个信道占用时间(Channel Occupancy Time,COT)内的传输切换
o切换空隙不超过特定时长例如16us
-Category 2(Cat-2LBT):单时隙检测,也称为没有随机回退的LBT
o单次检测时间内信道空闲则可以进行信号发送,信道被占用则不能进行信号发送
o不同时长的切换空隙下单时隙检测时间长度可以不同,例如单时隙检测时间长度取值可以大于16us且小于或等于25us
-Category 3(Cat-3LBT):基于固定竞争窗口大小(Contention Window Size,CWS)的随机回退的LBT
o通信设备确定CWS为CW p
■CW p为固定值
o通信设备根据CW p取值生成随机数N
o通信设备在非授权频谱上进行信道检测,并在N个时隙都信道检测成功后可以进行信
号发送
-Category 4(Cat-4LBT):基于可变CWS的随机回退的LBT
o通信设备确定CWS为CW p
■CW p为可变值
o通信设备根据CW p取值生成随机数N
o通信设备在非授权频谱上进行信道检测,并在N个时隙都信道检测成功后可以进行信号发送
可选地,Cat-3LBT和Cat-4LBT根据传输业务的优先级进一步区分信道接入方案的优先级。
可选地,在本申请实施例中,MCOT指LBT成功后允许使用非授权频谱的信道进行信号传输的最大时间长度,不同信道接入优先级下有不同的MCOT。可选地,该MCOT为信号传输占用的时间。
可选地,在本申请实施例中,COT指LBT成功后使用非授权频谱的信道进行信号传输的时间长度,该时间长度内信号占用信道可以是不连续的。可选地,一次COT最长不能超过20ms,并且,该COT内的信号传输占用的时间长度不超过MCOT。
可选地,在本申请实施例中,基站的信道占用时间(gNB-initiated COT)也称为基站发起的COT,指基站LBT成功后获得的一次信道占用时间。基站的信道占用时间内除了可以用于下行传输,也可以在满足一定条件下用于UE进行上行传输。
可选地,在本申请实施例中,UE的信道占用时间(UE-initiated COT)也称为UE发起的COT,指UE LBT成功后获得的一次信道占用时间。
可选地,在本申请实施例中,下行传输机会(DL burst)指基站进行的一组下行传输(即包括一个或多个下行传输),该组下行传输为连续传输(即多个下行传输之间没有空隙,或者说一次下行传输机会中包括的下行时间单元是连续的)。如果基站进行的两个下行传输之间的有空隙,那么认为该两个下行传输属于两次下行传输机会。可选地,一个下行传输指一个PDSCH。
可选地,在本申请实施例中,上行传输机会(UL burst)指一个UE进行的一组上行传输(即包括一个或多个上行传输),该组上行传输为连续传输(即多个上行传输之间没有空隙,或者说一次上行传输机会中包括的上行时间单元是连续的)。如果该UE进行的两个上行传输之间的有空隙,那么 认为该两个上行传输属于两次上行传输机会。可选地,一个上行传输指一个PUSCH。
可选地,在本申请实施例中,不同传输场景下应用的信道接入方案不同,不同信号或信道应用的信道接入方案也不同。
例如,当基站发起COT时,表1规定了不同情况下的信道接入方案:
Figure PCTCN2019080550-appb-000001
表1:基站的信道接入方案
应理解,当业务中包括多种优先级的数据复用传输时,信道接入优先级按该多种优先级中最低优先级的数据确定。
又例如,参照图2,当基站发起COT后,可以将该COT内的资源用于UE进行上行传输。在基站的COT内发生的上行传输机会,如果该上行传输机会的起始位置和下行传输机会的结束位置之间的空隙小于或等于16us,UE可以立即进行该上行传输;如果在该基站的COT内,该上行传输机会后面没有下行传输机会,UE在传输前可以进行Cat-2LBT或者说单时隙检测;如果在该基站的COT内,任意两次相邻的传输之间的空隙小于或等于25μs,UE可以进行Cat-2LBT或者说单时隙检测。
又例如,当UE发起COT时,表2规定了不同情况下的信道接入方案:
Figure PCTCN2019080550-appb-000002
表2:UE的信道接入方案
上述技术中规定了不同传输场景下应用的信道接入方案,现有的信道接入方案存在如下问题:
问题1:现有技术中,基站发起的COT内可以包括多个上下行转换点,并规定,在基站发起的COT内,如果前一次传输机会的结束位置和后一次传输机会的起始位置之间的间隔小于或等于16us,那么后一次传输机会可以使用Cat-1LBT,即不做信道检测就进行后一次传输机会的传输。如果前一次传输机会的结束位置和后一次传输机会的起始位置之间的间隔大于16us,那么后一次传输机会可以使用Cat-2LBT。然而如果第一次传输机会的结束位置和第二次传输机会的起始位置之间的间隔大于16us,第二次传输机会的结束位置和第三次传输机会的起始位置之间的间隔小于或等于16us,如图3所示,由于第二次传输机会开始前要做Cat-2LBT,可能会出现第二次传输机会失败的情况,在这种情况下,直接开始第三次传输机会的传输,会造成非授权载波上的严重干扰。
问题2:现有技术中,在基站发起的COT内,如果想共享基站的COT不做LBT进行传输,那么需要前一次传输机会的结束位置和后一次传输机会的起始位置之间的间隔小于或等于16us。然而对于终端设备来说,通常从下行接收切换到上行发送的切换时间大于16us,例如为20us。如图4所示,如果终端设备在接收完下行信道后再进行下行到上行的切换,将会错过上行传输的起始时刻。如果考虑到下行接收时延和上行发送的时间提前(Timing Advance,TA),那么该上行传输延迟的问题更加严重。
为解决上述问题,提出了本申请实施例的以下技术方案。
图5为本申请实施例提供的用于非授权频谱的无线通信方法的流程示意图一,如图5所示,所述用于非授权频谱的无线通信方法包括以下步骤中的部分或全部:
步骤501:第一设备通过第一COT内的第一传输机会,向第二设备发送第一信息,其中,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,所述第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第一COT是所述第一设备获得的COT或所述第二设备获得的COT。
本申请实施例中,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,可以通过以下方式中的至少一种来实现:
方式一:
所述第一传输机会为所述第一COT内的第N次传输机会,所述第二传输机会为所述第一COT内的第N-1次传输机会,N为大于或等于2的正整数。以下结合N的取值对第一传输机会对应的信道接入方案分情况进行说明。
1)N的取值为2
N的取值为2时,第二传输机会为第一COT内的第1次传输机会,第一传输机会为第一COT内的第2次传输机会。
情况一:若第一时间长度小于或等于第一门限值,则所述第一传输机会对应的信道接入方案为第一信道接入方案;如此,在一个COT内进行第二次传输机会的传输时可以不做LBT,既可以获得信道共享的好处,提升信道接入机会,也不会对非授权频谱上的其他传输产生干扰。
情况二:若第一时间长度大于第一门限值,则所述第一传输机会对应的信道接入方案为第二信道接入方案。
这里,所述第一时间长度为所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的时间长度。
这里,所述第一信道接入方案是指:传输机会发送之前不需要信道检测,即Cat-1LBT。所述第二信道接入方案是指:传输机会发送之前需要进行单时隙信道检测,即Cat-2LBT。
在本申请的一种实施方式中,所述第一门限值为16us。
2)N的取值为大于2的正整数
若所述第一COT内的第2次传输机会至第N-1次传输机会中至少有一次传输机会对应的信道接入方案为第二信道接入方案,则所述第一传输机会对应的信道接入方案为第二信道接入方案。如此,可以避免对非授权频谱上的其他传输产生干扰。
这里,所述第二信道接入方案是指:传输机会发送之前需要进行单时隙信道检测,即Cat-2LBT。
3)N的取值为大于2的正整数
情况一:若所述第一COT内的第2次传输机会至第N-1次传输机会对应的信道接入方案均为第一信道接入方案,且第一时间长度小于或等于第一门限值,则所述第一传输机会对应的信道接入方案为第一信道接入方案。具体地,在一个COT内如果第2次至第N-1次传输机会之间的所有传输机会在进行传输之前都不做LBT,说明第2次至第N-1次传输机会都能传输,因此,第N次传输机会传输时也可以不做LBT,这样既可以获得信道共享的好处,提升信道接入机会,也不会对非授权频谱上的其他传输产生干扰。
情况二:若所述第一COT内的第2次传输机会至第N-1次传输机会对应的信道接入方案均为第一信道接入方案,且所述第一时间长度大于第一门限值,则所述第一传输机会对应的信道接入方案为第二信道接入方案。
情况三:所述第一COT内的第2次传输机会至第N-1次传输机会对应的信道接入方案均为第一信道接入方案,若所述第一COT内的第2次传输机会至第N-1次传输机会中至少有一次传输机会上传输的信道只包括PDSCH对应的混合自动请求重传-应答HARQ-ACK信息(例如PUCCH或仅包括上行控制信息的PUSCH用于传输HARQ-ACK信息),则所述第一传输机会对应的信道接入方案为第二信道接入方案。这主要是因为,如果终端设备没有检测到网络设备发送给它的PDCCH,就不会接收该PDCCH调度的PDSCH,也就不会在对应的上行信道上传输HARQ-ACK信息。因此,即使在一个COT内如果第2次至第N-1次传输机会之间的所有传输机会在进行传输之前都不做LBT,只要该第2次至第N-1次传输机会中包括一次只用于传输HARQ-ACK信息的上行传输机会,该次上行传输机会也有一定的概率因为丢失网络设备发送的下行授权而不能传输。在这种情况下,第N次传输机会传输时可以做单时隙信道检测,以防对非授权频谱上的其他传输产生干扰。
这里,所述第一时间长度为所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间 的时间长度。
这里,所述第一信道接入方案是指:传输机会发送之前不需要信道检测,即Cat-1LBT。所述第二信道接入方案是指:传输机会发送之前需要进行单时隙信道检测,即Cat-2LBT。
在本申请的一种实施方式中,所述第一门限值为16us。
方式二:
若所述第二传输机会对应的信道接入方案为第二信道接入方案,则所述第一传输机会对应的信道接入方案为第二信道接入方案。如此,可以避免对非授权频谱上的其他传输产生干扰。
这里,所述第二信道接入方案是指:传输机会发送之前需要进行单时隙信道检测,即Cat-2LBT。
方式三:
情况一:若所述第一设备在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,且第一时间长度小于或等于第一门限值,则所述第一传输机会对应的信道接入方案为第一信道接入方案。具体地,在一个COT内如果收到第二传输机会上传输的信息,说明第二传输机会上包括系统内的信号传输,因此,第一传输机会传输时也可以不做LBT,这样既可以获得信道共享的好处,提升信道接入机会,也不会对非授权频谱上的其他传输产生干扰。
情况二:若所述第一设备在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,且所述第一时间长度大于第一门限值,则所述第一传输机会对应的信道接入方案为第二信道接入方案。
情况三:若所述第一设备在所述第一传输机会发送前没有收到所述第二传输机会上的第二信息,则所述第一传输机会对应的信道接入方案为第二信道接入方案。
这里,所述第一时间长度为所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的时间长度。
这里,所述第一信道接入方案是指:传输机会发送之前不需要信道检测,即Cat-1LBT。所述第二信道接入方案是指:传输机会发送之前需要进行单时隙信道检测,即Cat-2LBT。
应理解,上述方式也可以结合使用。例如,第一设备为网络设备,第一COT内的第2次传输机会至第N-1次传输机会对应的信道接入方案均为第一信道接入方案,其中,第N-1次传输机会上传输的信道只包括PDSCH对应的混合自动请求重传-应答HARQ-ACK信息,若网络设备没有收到第N-1次传输机会上的HARQ-ACK信息,则所述第一传输机会对应的信道接入方案为第二信道接入方案;若网络设备收到了第N-1次传输机会上的HARQ-ACK信息,且第一时间长度小于或等于第一门限值,则所述第一传输机会对应的信道接入方案为第一信道接入方案;若网络设备收到了第N-1次传输机会上的HARQ-ACK信息,且第一时间长度大于第一门限值,则所述第一传输机会对应的信道接入方案为第二信道接入方案。
在本申请的一种实施方式中,所述第一门限值为16us。
在本申请的一种实施方式中,所述第二信息包括以下信息中的至少一种:混合自动重传请求-应答(Hybrid Automatic Repeat-reQuest Acknowledgement,HARQ-ACK)反馈信息、传输块译码的信息、控制信道、参考信号。
可选地,所述第一设备和所述第二设备可以有不同的实现方式,以下结合所述第一设备和所述第二设备的不同实现方式对上述第二信息的具体内容进行说明。
实现方式一:
所述第一设备为网络设备,所述第二设备为终端设备。
所述第一设备在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,所述第二信息包括所述终端设备在所述第二传输机会上发送的上行传输块译码正确的信息和/或所述终端设备在所述第二传输机会上发送的上行控制信息。
可选地,接收到上行传输块译码正确的信息,可以指:网络设备接收第二传输机会上发送的至少一个PUSCH,并对该PUSCH上的传输块正确译码。
可选地,接收到上行控制信息,可以指:网络设备在第二传输机会上检测到PUCCH或HARQ-ACK信息。
实现方式二:
所述第一设备为终端设备,所述第二设备为网络设备。
所述第一设备在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,所述第二信息包括所述网络设备在所述第二传输机会上发送的下行传输块译码正确的信息和/或所述网络设备在所述第二传输机会上发送的PDCCH。
可选地,接收到下行传输块译码正确的信息,可以指:终端设备接收第二传输机会上发送的至少一个PDSCH,并对该PDSCH上的传输块正确译码。
可选地,接收到PDCCH,可以指:终端设备在第二传输机会上检测到PDCCH(例如PDCCH的循环冗余校验成功)。
实现方式三:
所述第一设备为第一终端设备,所述第二设备为第二终端设备。
所述第一设备在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,所述第二信息包括所述第二终端设备在所述第二传输机会上发送给所述第一终端设备的调度信息和/或传输块的译码信息。
可选地,接收到第二终端设备的调度信息,可以指:第一终端设备接收第二传输机会上第二终端设备发送的数据传输的指示信息。
可选地,接收到第二终端设备的传输块的译码信息,可以指:第一终端设备接收第二传输机会上第二终端设备发送的传输块,并对该传输块完成译码。
以下结合具体应用示例对本申请实施例的上述技术方案进行举例说明。
应用示例一
第一设备为网络设备,第二设备为终端设备。作为示例而非限定,如图6所示。在网络设备获得的信道占用时间内包括3次传输机会,第1次传输机会包括网络设备向终端设备发送的PDSCH,第2次传输机会包括终端设备针对该PDSCH的译码情况向网络设备发送的HARQ-ACK信息。如果在第3次传输机会前,网络设备获得了终端设备在第2次传输机会上传输的HARQ-ACK信息,且,第2次传输机会的结束位置和第3次传输机会的起始位置之间的空隙小于或等于第一预设值,那么网络设备可以不做LBT直接进行第3次传输机会的传输。
应用示例二
第一设备为终端设备,第二设备为网络设备。作为示例而非限定,如图7所示。在终端设备获得的信道占用时间内包括3次传输机会,第1次传输机会包括终端设备向网络设备发送的PUSCH,第2次传输机会包括网络设备向终端设备发送的上行授权信息,该上行授权信息用于调度该终端设备或另一终端设备通过第3次传输机会传输PUSCH。终端设备在收到该上行授权后,如果第2次传输机会的结束位置和第3次传输机会的起始位置之间的空隙小于或等于第一预设值,那么该终端设备或该另一终端设备可以不做LBT直接进行第3次传输机会的传输。
应用示例三
第一设备为第一终端设备,第二设备为第二终端设备。作为示例而非限定,如图8所示。在第一终端设备获得的信道占用时间内包括3次传输机会,第1次传输机会包括第一终端设备向第二终端设备发送的PSSCH,第2次传输机会包括第二终端设备针对该PSSCH的译码情况向第一终端设备发送的HARQ-ACK信息,例如译码错误向第一终端设备反馈NACK。如果在第3次传输机会前,第一终端设备获得了第二终端设备在第2次传输机会上传输的NACK信息,且,第2次传输机会的结束位置和第3次传输机会的起始位置之间的空隙小于或等于第一预设值,那么第一终端设备可以不做LBT直接进行第3次传输机会的传输,且第3次传输机会上的传输包括NACK信息对应的PSSCH的重传。
图9为本申请实施例提供的用于非授权频谱的无线通信方法的流程示意图二,如图9所示,所述用于非授权频谱的无线通信方法包括以下步骤中的部分或全部:
步骤901:终端设备通过第一传输机会向网络设备发送上行信息,其中,所述第一传输机会为所述网络设备获得的第一COT内的传输机会,第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的第一时间间隔小于或等于第一门限值。
本申请实施例中,所述第二传输机会为所述网络设备进行下行发送的传输机会,所述第一传输机会为所述终端设备进行上行发送的传输机会。具体地,第二传输机会包括网络设备向终端设备传输下行信道或下行信号的资源,第一传输机会包括终端设备向网络设备进行上行信道或上行信号传输的资源。
1)在本申请的一种实施方式中,所述终端设备不期望在所述第二传输机会中位于尾部的第一时间段上接收信号。进一步,所述第一时间段包括所述第二传输机会中的最后一个符号。可选地,所述第一时间段中不包括所述网络设备发送给所述终端设备的下行信道或下行信号。可选地,所述第一时间段中不包括同步信号块(Synchronizing Signal/PBCH Block,SSB)、和/或携带公共 信息的物理下行控制信道(Physical Downlink Control Channel,PDCCH)、和/或携带公共信息的物理下行共享信道(Physical Downlink Shared Channel,PDSCH)。
举个例子:终端设备不期望在第二传输机会中的最后一个符号上接收PDCCH。
举个例子:终端设备不期望在第二传输机会中的最后一个符号上接收PDSCH,其中,该PDSCH包括专有PDSCH,或该PDSCH包括携带公共信息例如SIB信息的PDSCH。
举个例子:终端设备不期望在第二传输机会中的最后一个符号上接收PBCH或同步信号块SSB。
举个例子:终端设备不期望在第二传输机会中的最后一个符号上接收参考信号,例如CSI-RS。
举个例子:终端设备不期望在第二传输机会中的最后一个符号上进行测量,例如无线资源管理(Radio Resource Management,RRM)测量、无线链路管理(Radio Link Management,RLM)测量、接收信号强度指示(Received Signal Strength Indication,RSSI)等。
上述方案中,所述终端设备从接收信号转换到发送信号的时间间隔为第二时间间隔,所述第二时间间隔大于所述第一时间间隔。
可选地,本实施方式中,第一门限值为16us。
2)在本申请的另一种实施方式中,所述终端设备在所述第二传输机会结束后的第一时刻开始向所述网络设备发送上行信息,其中,所述第二传输机会的结束时刻与所述第一时刻之间的时间间隔为所述终端设备从接收信号转换到发送信号的第二时间间隔。
进一步,所述第二时间间隔小于所述第一时间间隔,所述终端设备在所述第一时刻与所述第一传输机会的起始时刻之间的时间资源上发送所述第一传输机会中的第一个符号的延长循环前缀。
应理解,这里的所述第一传输机会的起始时刻指的是第一传输机会中第一个有效符号的起始时刻。
可选地,第一传输机会中第一个有效符号指第一传输机会中的第一个完整符号。
举个例子:参照图10,终端设备接收网络设备发送的信道接入方案指示信息,该指示信息用于指示终端设备传输第一传输机会时对应的信道接入方案为Cat-1LBT,因此,终端设备在下行接收结束后立即进行从下行接收到上行发送的转换,并在转换结束后开始上行信号的传输。其中,下行接收结束时刻到上行发送时刻之间的时间间隔为终端设备从接收信号转换到发送信号的第二时间间隔,如果上行传输的起始时刻位于第一传输机会中第一个携带有效数据的符号的起始时刻前,那么终端设备可以在该第一个携带有效数据的符号的起始时刻前发送该符号的CP延长部分。图7中的L代表所述第一时间间隔,S代表所述第二时间间隔(即DL-UL GAP),可选地,L大于或等于S。可选地,考虑TA的情况下,L大于或等于(S+TA),其中TA为网络设备指示给终端设备的网络设备和终端设备之间的往返时延。
可选地,本实施方式中,第一门限值为16us。
可选地,本实施方式中,第一门限值为一个符号对应的时间长度。
3)在本申请的又一实施方式中,所述终端设备通过第一传输机会向网络设备发送上行信息前,所述终端设备向所述网络设备上报指示信息,所述指示信息用于确定所述终端设备从接收信号转换到发送信号的第二时间间隔或所述第二时间间隔所属的范围,或者说,所述指示信息用于指示所述终端设备从接收信号转换到发送信号的能力。
这里,所述第一时间间隔是所述网络设备根据所述指示信息确定的。进一步,所述第二时间间隔小于或等于所述第一时间间隔。
具体地,终端设备将第二时间间隔或所述第二时间间隔所属的范围上报给网络设备用作参考,可以使网络设备综合各种因素对该终端设备进行下行调度和传输。比如网络设备可以为终端设备确定合适的第一时间间隔,如第一时间间隔大于或等于所述第二时间间隔。
可选地,本实施方式中,第一门限值为16us。
图11为本申请实施例提供的用于非授权频谱的无线通信方法的流程示意图三,如图11所示,所述用于非授权频谱的无线通信方法包括以下步骤中的部分或全部:
步骤1101:网络设备通过第一传输机会向终端设备发送下行信息,其中,所述第一传输机会为所述终端设备获得的第一COT内的传输机会,第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的第一时间间隔小于或等于第一门限值。
本申请实施例中,所述第二传输机会为所述终端设备进行上行发送的传输机会,所述第一传输机会为所述网络设备进行下行发送的传输机会。具体地,第二传输机会包括终端设备向网络设备传 输上行信道或上行信号的资源,第一传输机会包括网络设备向终端设备进行下行信道或下行信号传输的资源。
1)在本申请的一种实施方式中,所述网络设备不期望在所述第二传输机会中位于尾部的第一时间段上接收信号。进一步,所述第一时间段包括所述第二传输机会中的最后一个符号。进一步,所述第二传输机会为所述终端设备进行上行发送的传输机会,所述第一时间段中不包括所述终端设备的有效上行信道或有效上行信号。
可选地,有效上行信道包括:承载有用信息的上行信道。
可选地,有效上行信号包括:用于信道解调或测量的参考信号。
举个例子:网络设备不期望在第二传输机会中的最后一个符号上接收物理上行控制信道(Physical Uplink Control Channel,PUCCH)。
举个例子:网络设备不期望在第二传输机会中的最后一个符号上接收物理上行共享信道(Physical Uplink Shared Channel,PUSCH)。
举个例子:网络设备不期望在第二传输机会中的最后一个符号上接收物理随机接入信道(Physical Random Access Channel,PRACH)。
举个例子:网络设备不期望在第二传输机会中的最后一个符号上接收参考信号,例如探测参考信号(Sounding Reference Signal,SRS)。
上述方案中,所述网络设备从接收信号转换到发送信号的时间间隔为第二时间间隔,所述第二时间间隔大于所述第一时间间隔。
可选地,本实施方式中,第一门限值为16us。
2)在本申请的另一种实施方式中,所述网络设备在所述第二传输机会结束后的第一时刻开始向所述终端设备发送下行信息,其中,所述第二传输机会的结束时刻与所述第一时刻之间的时间间隔为所述网络设备从接收信号转换到发送信号的第二时间间隔。
进一步,所述第二时间间隔小于所述第一时间间隔,所述网络设备在所述第一时刻与所述第一传输机会的起始时刻之间的时间资源上发送所述第一传输机会中的第一个符号的延长循环前缀。
应理解,这里的所述第一传输机会的起始时刻指的是第一传输机会中第一个有效符号的起始时刻。
可选地,第一传输机会中第一个有效符号指第一传输机会中的第一个完整符号。
举个例子:参照图12,网络设备确定传输第一传输机会时对应的信道接入方案为Cat-1LBT(例如网络设备接收终端设备发送的信道共享指示信息,该指示信息包括指示网络设备传输第一传输机会时对应的信道接入方案为Cat-1LBT的信息,或者,网络设备指示终端设备按Cat-1LBT的方式共享COT),因此,网络设备在上行接收结束后立即进行从上行接收到下行发送的转换,并在转换结束后开始下行信号的传输。其中,上行接收结束时刻到下行发送时刻之间的时间间隔为网络设备从接收信号转换到发送信号的第二时间间隔(图中以S表示),如果下行传输的起始时刻位于第一传输机会中第一个携带有效数据的符号的起始时刻前,那么网络设备可以在该第一个携带有效数据的符号的起始时刻前发送该符号的CP延长部分。
可选地,在一实施方式中,网络设备可以向终端设备发送指示信息,该指示信息用于终端设备确定当将该终端设备获得的第一COT共享给网络设备时,在第二传输机会中位于尾部的第一时间段上是否进行padding(即发送占位信号)的信息、和/或、第一时间段的长度信息、和/或、第二传输机会中有效信息传输的结束位置、和/或、第二传输机会的结束位置、和/或、第一传输机会对应的信道接入方案(例如Cat-1LBT或Cat-2LBT)。
可选地,本实施方式中,第一门限值为16us。
可选地,本实施方式中,第一门限值为一个符号对应的时间长度。
图13为本申请实施例提供的用于非授权频谱的无线通信装置的结构组成示意图一,应用于第一设备,如图13所示,所述用于非授权频谱的无线通信装置,包括:
发送单元1301,用于通过第一COT内的第一传输机会,向第二设备发送第一信息,其中,
所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,所述第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第一COT是所述第一设备获得的COT或所述第二设备获得的COT。
在一实施方式中,所述第一传输机会为所述第一COT内的第N次传输机会,所述第二传输机会为所述第一COT内的第N-1次传输机会,N为大于或等于2的正整数。
在一实施方式中,所述N为大于2的正整数,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,包括:
若所述第一COT内的第2次传输机会至第N-1次传输机会中至少有一次传输机会对应的信道接入方案为第二信道接入方案,则所述第一传输机会对应的信道接入方案为第二信道接入方案。
在一实施方式中,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,包括:
若所述第二传输机会对应的信道接入方案为第二信道接入方案,则所述第一传输机会对应的信道接入方案为第二信道接入方案。
在一实施方式中,所述N为大于2的正整数,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,包括以下情况中的一种:
若所述第一COT内的第2次传输机会至第N-1次传输机会对应的信道接入方案均为第一信道接入方案,且第一时间长度小于或等于第一门限值,则所述第一传输机会对应的信道接入方案为第一信道接入方案;
若所述第一COT内的第2次传输机会至第N-1次传输机会对应的信道接入方案均为第一信道接入方案,且所述第一时间长度大于第一门限值,则所述第一传输机会对应的信道接入方案为第二信道接入方案;
其中,所述第一时间长度为所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的时间长度。
在一实施方式中,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,包括以下情况中的一种:
若所述第一设备在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,且第一时间长度小于或等于第一门限值,则所述第一传输机会对应的信道接入方案为第一信道接入方案;
若所述第一设备在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,且所述第一时间长度大于第一门限值,则所述第一传输机会对应的信道接入方案为第二信道接入方案;
若所述第一设备在所述第一传输机会发送前没有收到所述第二传输机会上的第二信息,则所述第一传输机会对应的信道接入方案为第二信道接入方案;
其中,所述第一时间长度为所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的时间长度。
在一实施方式中,所述第二信息包括以下信息中的至少一种:HARQ-ACK反馈信息、传输块译码的信息、控制信道、参考信号。
在一实施方式中,述第一信道接入方案是指:传输机会发送之前不需要信道检测。
在一实施方式中,所述第二信道接入方案是指:传输机会发送之前需要进行单时隙信道检测。
在一实施方式中,所述第一设备为网络设备,所述第二设备为终端设备。
在一实施方式中,所述装置还包括:
接收单元1302,用于在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,所述第二信息包括所述终端设备在所述第二传输机会上发送的上行传输块译码正确的信息和/或所述终端设备在所述第二传输机会上发送的上行控制信息。
在一实施方式中,所述第一设备为终端设备,所述第二设备为网络设备。
在一实施方式中,所述装置还包括:
接收单元1302,用于在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,所述第二信息包括所述网络设备在所述第二传输机会上发送的下行传输块译码正确的信息和/或所述网络设备在所述第二传输机会上发送的PDCCH。
在一实施方式中,所述第一设备为第一终端设备,所述第二设备为第二终端设备。
在一实施方式中,所述装置还包括:
接收单元1302,用于在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,所述第二信息包括所述第二终端设备在所述第二传输机会上发送给所述第一终端设备的调度信息和/或传输块的译码信息。
本领域技术人员应当理解,本申请实施例的上述用于非授权频谱的无线通信装置的相关描述可以参照本申请实施例的用于非授权频谱的无线通信方法的相关描述进行理解。
图14为本申请实施例提供的用于非授权频谱的无线通信装置的结构组成示意图二,应用于 终端设备,如图14所示,所述用于非授权频谱的无线通信装置,包括:
通信单元1401,用于通过第一传输机会向网络设备发送上行信息,其中,
所述第一传输机会为所述网络设备获得的第一COT内的传输机会,第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的第一时间间隔小于或等于第一门限值。
在一实施方式中,所述通信单元1401不期望在所述第二传输机会中位于尾部的第一时间段上接收信号。
在一实施方式中,所述第一时间段包括所述第二传输机会中的最后一个符号。
在一实施方式中,所述第二传输机会为所述网络设备进行下行发送的传输机会,所述第一时间段中不包括所述网络设备发送给所述终端设备的下行信道或下行信号。
在一实施方式中,所述第二传输机会为所述网络设备进行下行发送的传输机会,所述第一时间段中不包括SSB、和/或携带公共信息的PDCCH、和/或携带公共信息的PDSCH。
在一实施方式中,所述通信单元从接收信号转换到发送信号的时间间隔为第二时间间隔,所述第二时间间隔大于所述第一时间间隔。
在一实施方式中,所述第二传输机会为所述网络设备进行下行发送的传输机会,所述通信单元1401,用于在所述第二传输机会结束后的第一时刻开始向所述网络设备发送上行信息,其中,所述第二传输机会的结束时刻与所述第一时刻之间的时间间隔为所述终端设备从接收信号转换到发送信号的第二时间间隔。
在一实施方式中,所述第二时间间隔小于所述第一时间间隔,所述通信单元,还用于在所述第一时刻与所述第一传输机会的起始时刻之间的时间资源上发送所述第一传输机会中的第一个符号的延长循环前缀。
在一实施方式中,所述通信单元1401,还用于向所述网络设备上报指示信息,所述指示信息用于确定所述终端设备从接收信号转换到发送信号的第二时间间隔或所述第二时间间隔所属的范围。
在一实施方式中,所述第一时间间隔是所述网络设备根据所述指示信息确定的。
在一实施方式中,所述第二时间间隔小于或等于所述第一时间间隔。
本领域技术人员应当理解,本申请实施例的上述用于非授权频谱的无线通信装置的相关描述可以参照本申请实施例的用于非授权频谱的无线通信方法的相关描述进行理解。
图15为本申请实施例提供的用于非授权频谱的无线通信装置的结构组成示意图三,应用于网络设备,如图15所示,所述用于非授权频谱的无线通信装置,包括:
通信单元1501,用于通过第一传输机会向终端设备发送下行信息,其中,
所述第一传输机会为所述终端设备获得的第一COT内的传输机会,第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的第一时间间隔小于或等于第一门限值。
在一实施方式中,所述通信单元1501不期望在所述第二传输机会中位于尾部的第一时间段上接收信号。
在一实施方式中,所述第一时间段包括所述第二传输机会中的最后一个符号。
在一实施方式中,所述第二传输机会为所述终端设备进行上行发送的传输机会,所述第一时间段中不包括所述终端设备的有效上行信道或有效上行信号。
在一实施方式中,所述通信单元1501从接收信号转换到发送信号的时间间隔为第二时间间隔,所述第二时间间隔大于所述第一时间间隔。
在一实施方式中,所述第二传输机会为所述终端设备进行上行发送的传输机会,所述通信单元1501,用于在所述第二传输机会结束后的第一时刻开始向所述终端设备发送下行信息,其中,所述第二传输机会的结束时刻与所述第一时刻之间的时间间隔为所述网络设备从接收信号转换到发送信号的第二时间间隔。
在一实施方式中,所述第二时间间隔小于所述第一时间间隔,所述通信单元1501,还用于在所述第一时刻与所述第一传输机会的起始时刻之间的时间资源上发送所述第一传输机会中的第一个符号的延长循环前缀。
本领域技术人员应当理解,本申请实施例的上述用于非授权频谱的无线通信装置的相关描述可以参照本申请实施例的用于非授权频谱的无线通信方法的相关描述进行理解。
图16是本申请实施例提供的一种通信设备600示意性结构图。该通信设备可以是终端设备,也 可以是网络设备,图16所示的通信设备600包括处理器610,处理器610可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图16所示,通信设备600还可以包括存储器620。其中,处理器610可以从存储器620中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器620可以是独立于处理器610的一个单独的器件,也可以集成在处理器610中。
可选地,如图16所示,通信设备600还可以包括收发器630,处理器610可以控制该收发器630与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器630可以包括发射机和接收机。收发器630还可以进一步包括天线,天线的数量可以为一个或多个。
可选地,该通信设备600具体可为本申请实施例的网络设备,并且该通信设备600可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备600具体可为本申请实施例的移动终端/终端设备,并且该通信设备600可以实现本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
图17是本申请实施例的芯片的示意性结构图。图17所示的芯片700包括处理器710,处理器710可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图17所示,芯片700还可以包括存储器720。其中,处理器710可以从存储器720中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器720可以是独立于处理器710的一个单独的器件,也可以集成在处理器710中。
可选地,该芯片700还可以包括输入接口730。其中,处理器710可以控制该输入接口730与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该芯片700还可以包括输出接口740。其中,处理器710可以控制该输出接口740与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
可选地,该芯片可应用于本申请实施例中的网络设备,并且该芯片可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该芯片可应用于本申请实施例中的移动终端/终端设备,并且该芯片可以实现本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
图18是本申请实施例提供的一种通信系统900的示意性框图。如图18所示,该通信系统900包括终端设备910和网络设备920。
其中,该终端设备910可以用于实现上述方法中由终端设备实现的相应的功能,以及该网络设备920可以用于实现上述方法中由网络设备实现的相应的功能为了简洁,在此不再赘述。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动 态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。
可选的,该计算机可读存储介质可应用于本申请实施例中的网络设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机可读存储介质可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。
可选的,该计算机程序产品可应用于本申请实施例中的网络设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序产品可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序。
可选的,该计算机程序可应用于本申请实施例中的网络设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序可应用于本申请实施例中的移动终端/终端设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读 存储器(Read-Only Memory,)ROM、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (71)

  1. 一种用于非授权频谱的无线通信方法,所述方法包括:
    第一设备通过第一信道占用时间COT内的第一传输机会,向第二设备发送第一信息,其中,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,所述第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第一COT是所述第一设备获得的COT或所述第二设备获得的COT。
  2. 根据权利要求1所述的方法,其中,所述第一传输机会为所述第一COT内的第N次传输机会,所述第二传输机会为所述第一COT内的第N-1次传输机会,N为大于或等于2的正整数。
  3. 根据权利要求2所述的方法,其中,所述N为大于2的正整数,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,包括:
    若所述第一COT内的第2次传输机会至第N-1次传输机会中至少有一次传输机会对应的信道接入方案为第二信道接入方案,则所述第一传输机会对应的信道接入方案为第二信道接入方案。
  4. 根据权利要求1至3中任一项所述的方法,其中,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,包括:
    若所述第二传输机会对应的信道接入方案为第二信道接入方案,则所述第一传输机会对应的信道接入方案为第二信道接入方案。
  5. 根据权利要求2所述的方法,其中,所述N为大于2的正整数,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,包括以下情况中的一种:
    若所述第一COT内的第2次传输机会至第N-1次传输机会对应的信道接入方案均为第一信道接入方案,且第一时间长度小于或等于第一门限值,则所述第一传输机会对应的信道接入方案为第一信道接入方案;
    若所述第一COT内的第2次传输机会至第N-1次传输机会对应的信道接入方案均为第一信道接入方案,且所述第一时间长度大于第一门限值,则所述第一传输机会对应的信道接入方案为第二信道接入方案;
    其中,所述第一时间长度为所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的时间长度。
  6. 根据权利要求1或2所述的方法,其中,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,包括以下情况中的一种:
    若所述第一设备在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,且第一时间长度小于或等于第一门限值,则所述第一传输机会对应的信道接入方案为第一信道接入方案;
    若所述第一设备在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,且所述第一时间长度大于第一门限值,则所述第一传输机会对应的信道接入方案为第二信道接入方案;
    若所述第一设备在所述第一传输机会发送前没有收到所述第二传输机会上的第二信息,则所述第一传输机会对应的信道接入方案为第二信道接入方案;
    其中,所述第一时间长度为所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的时间长度。
  7. 根据权利要求6所述的方法,其中,所述第二信息包括以下信息中的至少一种:混合自动重传请求-应答HARQ-ACK反馈信息、传输块译码的信息、控制信道、参考信号。
  8. 根据权利要求5或6所述的方法,其中,所述第一信道接入方案是指:传输机会发送之前不需要信道检测。
  9. 根据权利要求3至6中任一项所述的方法,其中,所述第二信道接入方案是指:传输机会发送之前需要进行单时隙信道检测。
  10. 根据权利要求1至9中任一项所述的方法,其中,所述第一设备为网络设备,所述第二设备为终端设备。
  11. 根据权利要求10所述的方法,其中,所述第一设备在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,所述第二信息包括所述终端设备在所述第二传输机会上发送的 上行传输块译码正确的信息和/或所述终端设备在所述第二传输机会上发送的上行控制信息。
  12. 根据权利要求1至9中任一项所述的方法,其中,所述第一设备为终端设备,所述第二设备为网络设备。
  13. 根据权利要求12所述的方法,其中,所述第一设备在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,所述第二信息包括所述网络设备在所述第二传输机会上发送的下行传输块译码正确的信息和/或所述网络设备在所述第二传输机会上发送的PDCCH。
  14. 根据权利要求1至9中任一项所述的方法,其中,所述第一设备为第一终端设备,所述第二设备为第二终端设备。
  15. 根据权利要求14所述的方法,其中,所述第一设备在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,所述第二信息包括所述第二终端设备在所述第二传输机会上发送给所述第一终端设备的调度信息和/或传输块的译码信息。
  16. 一种用于非授权频谱的无线通信方法,所述方法包括:
    终端设备通过第一传输机会向网络设备发送上行信息,其中,
    所述第一传输机会为所述网络设备获得的第一信道占用时间COT内的传输机会,第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的第一时间间隔小于或等于第一门限值。
  17. 根据权利要求16所述的方法,其中,所述终端设备不期望在所述第二传输机会中位于尾部的第一时间段上接收信号。
  18. 根据权利要求17所述的方法,其中,所述第一时间段包括所述第二传输机会中的最后一个符号。
  19. 根据权利要求17或18所述的方法,其中,所述第二传输机会为所述网络设备进行下行发送的传输机会,所述第一时间段中不包括所述网络设备发送给所述终端设备的下行信道或下行信号。
  20. 根据权利要求17至19中任一项所述的方法,其中,所述第二传输机会为所述网络设备进行下行发送的传输机会,所述第一时间段中不包括同步信号块SSB、和/或携带公共信息的物理下行控制信道PDCCH、和/或携带公共信息的物理下行共享信道PDSCH。
  21. 根据权利要求17至20中任一项所述的方法,其中,所述终端设备从接收信号转换到发送信号的时间间隔为第二时间间隔,所述第二时间间隔大于所述第一时间间隔。
  22. 根据权利要求16所述的方法,其中,所述第二传输机会为所述网络设备进行下行发送的传输机会,所述终端设备通过第一传输机会向网络设备发送上行信息,包括:
    所述终端设备在所述第二传输机会结束后的第一时刻开始向所述网络设备发送上行信息,其中,所述第二传输机会的结束时刻与所述第一时刻之间的时间间隔为所述终端设备从接收信号转换到发送信号的第二时间间隔。
  23. 根据权利要求22所述的方法,其中,所述第二时间间隔小于所述第一时间间隔,所述方法还包括:
    所述终端设备在所述第一时刻与所述第一传输机会的起始时刻之间的时间资源上发送所述第一传输机会中的第一个符号的延长循环前缀。
  24. 根据权利要求16所述的方法,其中,所述终端设备通过第一传输机会向网络设备发送上行信息前,所述方法还包括:
    所述终端设备向所述网络设备上报指示信息,所述指示信息用于确定所述终端设备从接收信号转换到发送信号的第二时间间隔或所述第二时间间隔所属的范围。
  25. 根据权利要求24所述的方法,其中,所述第一时间间隔是所述网络设备根据所述指示信息确定的。
  26. 根据权利要求24或25所述的方法,其中,所述第二时间间隔小于或等于所述第一时间间隔。
  27. 一种用于非授权频谱的无线通信方法,所述方法包括:
    网络设备通过第一传输机会向终端设备发送下行信息,其中,
    所述第一传输机会为所述终端设备获得的第一信道占用时间COT内的传输机会,第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的第一时间间隔小于或等于第一门限值。
  28. 根据权利要求27所述的方法,其中,所述网络设备不期望在所述第二传输机会中位于 尾部的第一时间段上接收信号。
  29. 根据权利要求28所述的方法,其中,所述第一时间段包括所述第二传输机会中的最后一个符号。
  30. 根据权利要求28或29所述的方法,其中,所述第二传输机会为所述终端设备进行上行发送的传输机会,所述第一时间段中不包括所述终端设备的有效上行信道或有效上行信号。
  31. 根据权利要求28至30中任一项所述的方法,其中,所述网络设备从接收信号转换到发送信号的时间间隔为第二时间间隔,所述第二时间间隔大于所述第一时间间隔。
  32. 根据权利要求27所述的方法,其中,所述第二传输机会为所述终端设备进行上行发送的传输机会,所述网络设备通过第一传输机会向终端设备发送下行信息,包括:
    所述网络设备在所述第二传输机会结束后的第一时刻开始向所述终端设备发送下行信息,其中,所述第二传输机会的结束时刻与所述第一时刻之间的时间间隔为所述网络设备从接收信号转换到发送信号的第二时间间隔。
  33. 根据权利要求32所述的方法,其中,所述第二时间间隔小于所述第一时间间隔,所述方法还包括:
    所述网络设备在所述第一时刻与所述第一传输机会的起始时刻之间的时间资源上发送所述第一传输机会中的第一个符号的延长循环前缀。
  34. 一种用于非授权频谱的无线通信装置,应用于第一设备,所述装置包括:
    发送单元,用于通过第一信道占用时间COT内的第一传输机会,向第二设备发送第一信息,其中,
    所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,所述第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第一COT是所述第一设备获得的COT或所述第二设备获得的COT。
  35. 根据权利要求34所述的装置,其中,所述第一传输机会为所述第一COT内的第N次传输机会,所述第二传输机会为所述第一COT内的第N-1次传输机会,N为大于或等于2的正整数。
  36. 根据权利要求35所述的装置,其中,所述N为大于2的正整数,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,包括:
    若所述第一COT内的第2次传输机会至第N-1次传输机会中至少有一次传输机会对应的信道接入方案为第二信道接入方案,则所述第一传输机会对应的信道接入方案为第二信道接入方案。
  37. 根据权利要求34至36中任一项所述的装置,其中,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,包括:
    若所述第二传输机会对应的信道接入方案为第二信道接入方案,则所述第一传输机会对应的信道接入方案为第二信道接入方案。
  38. 根据权利要求35所述的装置,其中,所述N为大于2的正整数,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,包括以下情况中的一种:
    若所述第一COT内的第2次传输机会至第N-1次传输机会对应的信道接入方案均为第一信道接入方案,且第一时间长度小于或等于第一门限值,则所述第一传输机会对应的信道接入方案为第一信道接入方案;
    若所述第一COT内的第2次传输机会至第N-1次传输机会对应的信道接入方案均为第一信道接入方案,且所述第一时间长度大于第一门限值,则所述第一传输机会对应的信道接入方案为第二信道接入方案;
    其中,所述第一时间长度为所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的时间长度。
  39. 根据权利要求34或35所述的装置,其中,所述第一传输机会对应的信道接入方案是根据第二传输机会确定的,包括以下情况中的一种:
    若所述第一设备在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,且第一时间长度小于或等于第一门限值,则所述第一传输机会对应的信道接入方案为第一信道接入方案;
    若所述第一设备在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,且所述第一时间长度大于第一门限值,则所述第一传输机会对应的信道接入方案为第二信道接入方案;
    若所述第一设备在所述第一传输机会发送前没有收到所述第二传输机会上的第二信息,则所述第一传输机会对应的信道接入方案为第二信道接入方案;
    其中,所述第一时间长度为所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的时间长度。
  40. 根据权利要求39所述的装置,其中,所述第二信息包括以下信息中的至少一种:混合自动重传请求-应答HARQ-ACK反馈信息、传输块译码的信息、控制信道、参考信号。
  41. 根据权利要求38或39所述的装置,其中,述第一信道接入方案是指:传输机会发送之前不需要信道检测。
  42. 根据权利要求36至39中任一项所述的装置,其中,所述第二信道接入方案是指:传输机会发送之前需要进行单时隙信道检测。
  43. 根据权利要求34至42中任一项所述的装置,其中,所述第一设备为网络设备,所述第二设备为终端设备。
  44. 根据权利要求43所述的装置,其中,所述装置还包括:
    接收单元,用于在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,所述第二信息包括所述终端设备在所述第二传输机会上发送的上行传输块译码正确的信息和/或所述终端设备在所述第二传输机会上发送的上行控制信息。
  45. 根据权利要求34至42中任一项所述的装置,其中,所述第一设备为终端设备,所述第二设备为网络设备。
  46. 根据权利要求45所述的装置,其中,所述装置还包括:
    接收单元,用于在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,所述第二信息包括所述网络设备在所述第二传输机会上发送的下行传输块译码正确的信息和/或所述网络设备在所述第二传输机会上发送的PDCCH。
  47. 根据权利要求34至42中任一项所述的装置,其中,所述第一设备为第一终端设备,所述第二设备为第二终端设备。
  48. 根据权利要求47所述的装置,其中,所述装置还包括:
    接收单元,用于在所述第一传输机会发送前收到了所述第二传输机会上的第二信息,所述第二信息包括所述第二终端设备在所述第二传输机会上发送给所述第一终端设备的调度信息和/或传输块的译码信息。
  49. 一种用于非授权频谱的无线通信装置,应用于终端设备,所述装置包括:
    通信单元,用于通过第一传输机会向网络设备发送上行信息,其中,
    所述第一传输机会为所述网络设备获得的第一信道占用时间COT内的传输机会,第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的第一时间间隔小于或等于第一门限值。
  50. 根据权利要求49所述的装置,其中,所述通信单元不期望在所述第二传输机会中位于尾部的第一时间段上接收信号。
  51. 根据权利要求50所述的装置,其中,所述第一时间段包括所述第二传输机会中的最后一个符号。
  52. 根据权利要求50或51所述的装置,其中,所述第二传输机会为所述网络设备进行下行发送的传输机会,所述第一时间段中不包括所述网络设备发送给所述终端设备的下行信道或下行信号。
  53. 根据权利要求50至52中任一项所述的装置,其中,所述第二传输机会为所述网络设备进行下行发送的传输机会,所述第一时间段中不包括同步信号块SSB、和/或携带公共信息的物理下行控制信道PDCCH、和/或携带公共信息的物理下行共享信道PDSCH。
  54. 根据权利要求50至53中任一项所述的装置,其中,所述通信单元从接收信号转换到发送信号的时间间隔为第二时间间隔,所述第二时间间隔大于所述第一时间间隔。
  55. 根据权利要求49所述的装置,其中,所述第二传输机会为所述网络设备进行下行发送的传输机会,所述通信单元,用于在所述第二传输机会结束后的第一时刻开始向所述网络设备发送上行信息,其中,所述第二传输机会的结束时刻与所述第一时刻之间的时间间隔为所述终端设备从接收信号转换到发送信号的第二时间间隔。
  56. 根据权利要求55所述的装置,其中,所述第二时间间隔小于所述第一时间间隔,所述通信单元,还用于在所述第一时刻与所述第一传输机会的起始时刻之间的时间资源上发送所述第 一传输机会中的第一个符号的延长循环前缀。
  57. 根据权利要求49所述的装置,其中,所述通信单元,还用于向所述网络设备上报指示信息,所述指示信息用于确定所述终端设备从接收信号转换到发送信号的第二时间间隔或所述第二时间间隔所属的范围。
  58. 根据权利要求57所述的装置,其中,所述第一时间间隔是所述网络设备根据所述指示信息确定的。
  59. 根据权利要求57或58所述的装置,其中,所述第二时间间隔小于或等于所述第一时间间隔。
  60. 一种用于非授权频谱的无线通信装置,应用于网络设备,所述装置包括:
    通信单元,用于通过第一传输机会向终端设备发送下行信息,其中,
    所述第一传输机会为所述终端设备获得的第一信道占用时间COT内的传输机会,第二传输机会为所述第一COT内所述第一传输机会之前的最近一次传输机会,所述第二传输机会的结束时刻与所述第一传输机会的起始时刻之间的第一时间间隔小于或等于第一门限值。
  61. 根据权利要求60所述的装置,其中,所述通信单元不期望在所述第二传输机会中位于尾部的第一时间段上接收信号。
  62. 根据权利要求61所述的装置,其中,所述第一时间段包括所述第二传输机会中的最后一个符号。
  63. 根据权利要求61或62所述的装置,其中,所述第二传输机会为所述终端设备进行上行发送的传输机会,所述第一时间段中不包括所述终端设备的有效上行信道或有效上行信号。
  64. 根据权利要求61至63中任一项所述的装置,其中,所述通信单元从接收信号转换到发送信号的时间间隔为第二时间间隔,所述第二时间间隔大于所述第一时间间隔。
  65. 根据权利要求60所述的装置,其中,所述第二传输机会为所述终端设备进行上行发送的传输机会,所述通信单元,用于在所述第二传输机会结束后的第一时刻开始向所述终端设备发送下行信息,其中,所述第二传输机会的结束时刻与所述第一时刻之间的时间间隔为所述网络设备从接收信号转换到发送信号的第二时间间隔。
  66. 根据权利要求65所述的装置,其中,所述第二时间间隔小于所述第一时间间隔,所述通信单元,还用于在所述第一时刻与所述第一传输机会的起始时刻之间的时间资源上发送所述第一传输机会中的第一个符号的延长循环前缀。
  67. 一种通信设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至15中任一项所述的方法,或者权利要求16至26中任一项所述的方法,或者权利要求27至33中任一项所述的方法。
  68. 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至15中任一项所述的方法,或者权利要求16至26中任一项所述的方法,或者权利要求27至33中任一项所述的方法。
  69. 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至15中任一项所述的方法,或者权利要求16至26中任一项所述的方法,或者权利要求27至33中任一项所述的方法。
  70. 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至15中任一项所述的方法,或者权利要求16至26中任一项所述的方法,或者权利要求27至33中任一项所述的方法。
  71. 一种计算机程序,所述计算机程序使得计算机执行如权利要求1至15中任一项所述的方法,或者权利要求16至26中任一项所述的方法,或者权利要求27至33中任一项所述的方法。
PCT/CN2019/080550 2019-03-29 2019-03-29 一种用于非授权频谱的无线通信方法及装置、通信设备 WO2020198983A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201980079557.XA CN113678528A (zh) 2019-03-29 2019-03-29 一种用于非授权频谱的无线通信方法及装置、通信设备
PCT/CN2019/080550 WO2020198983A1 (zh) 2019-03-29 2019-03-29 一种用于非授权频谱的无线通信方法及装置、通信设备
US17/488,704 US20220022051A1 (en) 2019-03-29 2021-09-29 Wireless communication method and apparatus for unlicensed frequency spectrum, and communication device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/080550 WO2020198983A1 (zh) 2019-03-29 2019-03-29 一种用于非授权频谱的无线通信方法及装置、通信设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/488,704 Continuation US20220022051A1 (en) 2019-03-29 2021-09-29 Wireless communication method and apparatus for unlicensed frequency spectrum, and communication device

Publications (1)

Publication Number Publication Date
WO2020198983A1 true WO2020198983A1 (zh) 2020-10-08

Family

ID=72664834

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/080550 WO2020198983A1 (zh) 2019-03-29 2019-03-29 一种用于非授权频谱的无线通信方法及装置、通信设备

Country Status (3)

Country Link
US (1) US20220022051A1 (zh)
CN (1) CN113678528A (zh)
WO (1) WO2020198983A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023130322A1 (zh) * 2022-01-06 2023-07-13 北京小米移动软件有限公司 确定共享信道占用时间的方法及其装置

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4017199A4 (en) * 2019-11-08 2022-07-27 Guangdong Oppo Mobile Telecommunications Corp., Ltd. METHOD AND DEVICE FOR DATA TRANSMISSION ON AN UNLICENSED SPECTRUM, DEVICE AND STORAGE MEDIA
CN115066959A (zh) * 2022-03-28 2022-09-16 北京小米移动软件有限公司 一种传输下行控制信息的方法、装置及可读存储介质
CN115299008A (zh) * 2022-06-30 2022-11-04 北京小米移动软件有限公司 一种非授权频段中占用信道的方法及其装置
WO2024098346A1 (zh) * 2022-11-10 2024-05-16 Oppo广东移动通信有限公司 Sl通信方法、装置、设备及存储介质

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017185998A1 (zh) * 2016-04-26 2017-11-02 北京佰才邦技术有限公司 一种上行传输方法、装置、用户终端及基站
CN108464051A (zh) * 2015-11-17 2018-08-28 诺基亚通信公司 上行链路调度分配的两步信令

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108464051A (zh) * 2015-11-17 2018-08-28 诺基亚通信公司 上行链路调度分配的两步信令
WO2017185998A1 (zh) * 2016-04-26 2017-11-02 北京佰才邦技术有限公司 一种上行传输方法、装置、用户终端及基站

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
WILUS INC.: "Discussion on Initial Access and Mobility for NR-U Operation", 3GPP TSG RAN WG1 MEETING #94 R1-1809326, 24 August 2018 (2018-08-24), XP051516690, DOI: 20191203160400A *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023130322A1 (zh) * 2022-01-06 2023-07-13 北京小米移动软件有限公司 确定共享信道占用时间的方法及其装置

Also Published As

Publication number Publication date
CN113678528A (zh) 2021-11-19
US20220022051A1 (en) 2022-01-20

Similar Documents

Publication Publication Date Title
WO2020147115A1 (zh) 用于非授权频谱的无线通信方法和设备
WO2020143057A1 (zh) 信道接入方案的确定方法及装置、终端设备、网络设备
CN112655262B (zh) 资源分配的方法、终端设备和网络设备
WO2020198983A1 (zh) 一种用于非授权频谱的无线通信方法及装置、通信设备
US12003450B2 (en) Signal transmission method and device and terminal
US11758541B2 (en) Information transmission method, terminal device and network device
WO2020191636A1 (zh) 通信方法、终端设备和网络设备
US11510067B2 (en) Uplink signal transmission method, terminal device, and network device
WO2020150957A1 (zh) 用于非授权频谱的无线通信方法和设备
WO2021003682A1 (zh) 传输控制信息的方法、终端设备和网络设备
WO2020220358A1 (zh) 一种用于非授权频谱的功率调整方法及装置
AU2018441184B2 (en) Methods and apparatuses for determining and allocating resources, and terminal and network device
WO2020061776A9 (zh) 一种反馈资源的复用方法、终端设备及网络设备
WO2021088262A1 (zh) 确定时隙格式的方法及装置
CN111971917A (zh) 一种反馈信息长度的确定方法及装置、通信设备
WO2020034220A1 (zh) 无线通信方法和通信设备
US11800546B2 (en) Method and apparatus for determining number of uplink control information transmission resources, and program
WO2021031011A1 (zh) 一种harq码本确定方法及装置、终端设备、网络设备
WO2020155168A1 (zh) 用于非授权频谱的无线通信方法、网络设备和终端设备
CN112740800A (zh) 通信方法、终端设备和网络设备
US11956666B2 (en) HARQ process determination method, network device and terminal
WO2021142636A1 (zh) 上行传输的方法和终端设备
WO2021179133A1 (zh) 信道的处理方法、装置、存储介质、处理器及电子装置
WO2021012286A1 (zh) 一种随机接入方法及装置、终端
WO2020199171A1 (zh) 一种传输参数确定方法及装置、用户设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19922921

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19922921

Country of ref document: EP

Kind code of ref document: A1