WO2021146968A1 - Procédé et dispositif de communication - Google Patents
Procédé et dispositif de communication Download PDFInfo
- Publication number
- WO2021146968A1 WO2021146968A1 PCT/CN2020/073655 CN2020073655W WO2021146968A1 WO 2021146968 A1 WO2021146968 A1 WO 2021146968A1 CN 2020073655 W CN2020073655 W CN 2020073655W WO 2021146968 A1 WO2021146968 A1 WO 2021146968A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- type
- configuration
- dci
- nominal
- value
- Prior art date
Links
- 238000004891 communication Methods 0.000 title claims abstract description 200
- 238000000034 method Methods 0.000 title claims abstract description 187
- 238000013475 authorization Methods 0.000 claims description 627
- 230000003252 repetitive effect Effects 0.000 claims description 358
- 238000013468 resource allocation Methods 0.000 claims description 356
- 238000012545 processing Methods 0.000 claims description 71
- 230000015654 memory Effects 0.000 claims description 55
- 238000004590 computer program Methods 0.000 claims description 10
- 238000010200 validation analysis Methods 0.000 abstract description 12
- 230000000694 effects Effects 0.000 abstract description 6
- 238000010295 mobile communication Methods 0.000 abstract description 3
- 230000006870 function Effects 0.000 description 64
- 238000013461 design Methods 0.000 description 57
- 230000005540 biological transmission Effects 0.000 description 50
- 230000004913 activation Effects 0.000 description 33
- 230000008569 process Effects 0.000 description 33
- 238000005516 engineering process Methods 0.000 description 20
- 238000012795 verification Methods 0.000 description 17
- 238000010586 diagram Methods 0.000 description 14
- 230000008054 signal transmission Effects 0.000 description 14
- 230000011664 signaling Effects 0.000 description 14
- 230000003213 activating effect Effects 0.000 description 6
- 230000008878 coupling Effects 0.000 description 5
- 238000010168 coupling process Methods 0.000 description 5
- 238000005859 coupling reaction Methods 0.000 description 5
- 230000001360 synchronised effect Effects 0.000 description 5
- 230000006399 behavior Effects 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 229920001690 polydopamine Polymers 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000010187 selection method Methods 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/30—Connection release
Definitions
- This application relates to the field of mobile communication technology, and in particular to a communication method and device.
- the current 5G NR supports uplink transmission with two types of configuration authorization (uplink transmission with configured grant).
- the authorization of these two types of configuration is the authorization of the first type of configuration (Type 1 configured grant, or configured grant Type 1) and the second type of authorization.
- Configured authorization (Type 2 configured grant, or configured grant Type 2).
- NR also supports the configuration of more than one set (for example, up to 12 sets) of authorization on the same bandwidth part.
- the base station An index or identification (ID) will be established for each set of configured authorization, and the index or identification information will be carried in the configured authorization configuration information and sent to the terminal.
- NR also supports the release of the configured authorization.
- NR supports the release of authorizations for the second configuration one by one (that is, one set of authorizations for the second configuration is released each time), and it also supports the simultaneous release of multiple sets of second configurations.
- the authorization of class configuration is to support joint release.
- the network side device configures a release state set through RRC signaling.
- the state set contains one or more states, and each state is associated with one or more sets of the second type.
- Configured authorization which set or sets of authorizations for the second type of configuration are specifically released is indicated by the downlink control information (DCI) issued by the network side device.
- DCI downlink control information
- the DCI includes a field for indicating the status.
- This domain is also called a release domain, and which set or sets of authorizations for the second type of configuration are released is determined by the value indicated by the release domain.
- the DCI also needs to meet the release verification (validation) condition, and the authorization associated with the second type of configuration in this state will be released.
- Release verification (validation) conditions include: for example, the redundancy version (RV) field in DCI is set to all 0s, the modulation and coding scheme (MCS) field is set to all 1s, and the frequency domain resource allocation (frequency domain)
- the resource assignment (FDRA) field satisfies a preset condition.
- the FDRA field is set to all 0s.
- the premise of using the FDRA domain to improve the validation performance of the released DCI is that the value set in the FDRA domain in the released DCI is an invalid value, that is, the value will not be used to activate the authorization of the second type of configuration, otherwise the terminal may not be able to follow
- the FDRA domain judges whether the received DCI is used for activation or release.
- a state is associated with multiple sets of authorizations for the second configuration, and the resource allocation types of the authorizations for the multiple second configurations may also be different.
- Use the FDRA domain to verify the validity of the DCI release At this time, misjudgment may occur, for example, the original DCI for other purposes is misjudged as the DCI for release, or the DCI for activation is misjudged as the DCI for release.
- the present application provides a communication method and device, which can improve the verification performance of the DCI used to release the authorization of the second type of configuration.
- a communication method is provided.
- the method can be executed by a first communication device.
- the first communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip system.
- the following description will be made by taking the communication device as a terminal device as an example.
- the method includes: receiving configuration information from a network device and DCI from the network device, where the configuration information is used to configure a release state set, the release state set includes at least one state, and each state of the at least one state is associated with at least one state.
- the terminal device releases at least one set of authorization of the second type configuration associated with the first state when the DCI meets the following first preset condition, where the first preset condition includes:
- the value of the first field in the DCI is the same as the index of the authorization of a set of second type configurations, and the resource allocation type of the authorization of the second type of configuration is 0, and the value of the FDRA field in the DCI is all 0; or,
- the value of the first field in the DCI is the same as the index of a set of authorizations for the second type of configuration, and the authorization resource allocation type of the set of second types of configuration is 1, and the value of the FDRA field in the DCI is all 1; or,
- the value of the first field in the DCI is the same as the index of a set of authorization of the second type of configuration, and the resource allocation type of the authorization of the set of second type of configuration is dynamic, and the value of the FDRA field in the DCI is All 0; or,
- the value of the first field in the DCI is the same as the index of a set of authorization of the second type of configuration, and the resource allocation type of the authorization of the set of second type of configuration is dynamic, and the value of the FDRA field in the DCI is All 1; or,
- the value of the first field in the DCI is different from the index of any set of authorizations of the second type configuration, and the value of the FDRA field in the DCI is all 0; or,
- the value of the first field in the DCI is different from the index of any set of authorization of the second type of configuration, and the value of the FDRA field in the DCI is all 1.
- the first RNTI may be, for example, a configured scheduling radio network temporary identity (CS-RNTI).
- CS-RNTI configured scheduling radio network temporary identity
- the aforementioned set of authorizations for the second type of configuration may be one set of authorizations for the second type of configuration among the multiple sets of authorizations for the second type of configuration configured by the network device for the terminal device; or, the aforementioned set of authorizations for the second type of configuration
- the authorization of the second type of configuration is a set of authorizations of the second type of configuration in the second type of configuration authorization associated with the first state.
- the aforementioned set of authorization for the second type of configuration may be authorization for a specific second type of configuration, for example, the index of the authorization for the set of second type of configuration is that the network device is configured for the terminal device.
- the authorized index of the set of second type configurations is the smallest index or the largest index among the authorized indexes of at least one set of the second type of configuration associated with the first state; or,
- the set of authorized indexes of the second type of configuration satisfies a preset rule among the multiple sets of authorized indexes of the second type of configuration configured for the terminal device by the network device; or,
- the set of authorized indexes of the second type of configuration satisfies a preset rule in the at least one set of authorized indexes of the second type of configuration associated with the first state.
- the aforementioned first preset condition may further include: the value of the MCS field in the DCI is all 1s, and the value of the RV field of the DCI is all 0s. That is, the aforementioned first preset condition may include:
- the value of the first field in the DCI is the same as the index of the authorization of a set of second type configurations, and the resource allocation type of the authorization of the second type of configuration is 0, and the value of the FDRA field in the DCI is all 0, and the value of the MCS field in the DCI is all 1, and the value of the RV field of the DCI is all 0; or,
- the value of the first field in the DCI is the same as the index of a set of authorizations for the second type of configuration, and the authorization resource allocation type of the set of second types of configuration is 1, and the value of the FDRA field in the DCI is all 1, and the value of the MCS field in the DCI is all 1, and the value of the RV field of the DCI is all 0; or,
- the value of the first field in the DCI is the same as the index of a set of authorization of the second type of configuration, and the resource allocation type of the authorization of the set of second type of configuration is dynamic, and the value of the FDRA field in the DCI is All 0, and the value of the MCS field in the DCI is all 1, and the value of the RV field of the DCI is all 0; or,
- the value of the first field in the DCI is the same as the index of a set of authorization of the second type of configuration, and the resource allocation type of the authorization of the set of second type of configuration is dynamic, and the value of the FDRA field in the DCI is All 1, and the value of the MCS field in the DCI is all 1, and the value of the RV field of the DCI is all 0; or,
- the value of the first field in the DCI is different from the index of any set of authorizations of the second type of configuration.
- the value of the FDRA field in the DCI is all 0, and the value of the MCS field in the DCI is all 1.
- the value of the RV field of the DCI is all 0; or,
- the value of the first field in the DCI is different from the index of any set of authorizations for the second type of configuration.
- the value of the FDRA field in the DCI is all 1, and the value of the MCS field in the DCI is all 1.
- the value of the RV field of this DCI is all 0s.
- the aforementioned preset condition may also include that the value of the uplink shared channel (UL-SCH) field in the DCI is all 0s.
- UL-SCH uplink shared channel
- the terminal device can determine that the DCI is not used to release the authorization of the second type of configuration.
- the following two designs may exist:
- the second preset condition when the value of the first field in the DCI is the same as a set of authorized indexes of the second type of configuration, the second preset condition includes:
- the authorized resource allocation type of the second type of configuration is type 0, and the value of the FDRA field is not all 0, or;
- the authorized resource allocation type of the second type of configuration is type 1, and the value of the FDRA field is not all 1, or;
- the authorized resource allocation type of the second type of configuration is a dynamic type, and the value of the FDRA field is not all 0; or,
- the authorized resource allocation type of the second type of configuration is a dynamic type, and the value of the FDRA field is not all ones.
- the authorization for the second type of configuration is one set of authorization for the second type of the multiple sets of authorization for the second type of configuration configured by the network device for the terminal.
- the second preset condition includes: the value of the FDRA field is not all 0 , Or, the value of the FDRA field is not all ones.
- a communication method is provided.
- the method can be executed by a second communication device.
- the second communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip system.
- the following describes an example in which the communication device is a network device.
- the method includes: sending configuration information to a terminal device, and sending DCI to the terminal device, where the configuration information is used to configure a release state set, the release state set includes at least one state, and each state in the at least one state is associated with at least one set
- the first field of the DCI indicates the first state of authorization of one or more sets of the second type of configuration associated with the state in the release state set;
- the value of the frequency domain resource allocation FDRA field in the DCI meets the following preset conditions:
- the authorized resource allocation type of the second type of configuration is type 0, and the value of the FDRA field is all 0, or;
- the authorized resource allocation type of the second type of configuration is type 1, and the value of the FDRA field is all 1, or;
- the authorized resource allocation type of the second type of configuration is a dynamic type, and the value of the FDRA field is all 0; or,
- the authorized resource allocation type of the second type of configuration is a dynamic type, and the value of the FDRA field is all 1.
- the authorization for the second type of configuration is one set of authorization for the second type of the multiple sets of authorization for the second type of configuration configured by the network device for the terminal.
- the value of the frequency domain resource allocation FDRA field in the DCI meets the following preset conditions:
- the value of the FDRA field is all 0; or,
- the value of the FDRA field is all ones.
- the aforementioned set of authorizations for the second type of configuration may be a set of authorizations for the second type of configuration among multiple sets of authorizations for the second type of configuration configured by the network device for the terminal device; or,
- the aforementioned set of authorizations for the second type of configuration is a set of authorizations for the second type of configuration in the second type of configuration authorization associated with the first state.
- the aforementioned set of authorization for the second type of configuration may be authorization for a specific second type of configuration, for example, the index of the authorization for the set of second type of configuration is that the network device is configured for the terminal device.
- the authorized index of the set of second type configurations is the smallest index or the largest index among the authorized indexes of at least one set of the second type of configuration associated with the first state; or,
- the set of authorized indexes of the second type of configuration satisfies a preset rule among the multiple sets of authorized indexes of the second type of configuration configured for the terminal device by the network device; or,
- the set of authorized indexes of the second type of configuration satisfies a preset rule in the at least one set of authorized indexes of the second type of configuration associated with the first state.
- the preset condition may further include:
- the value of the MCS field in the DCI is all 1 and the value of the RV field in the DCI is all 0.
- the preset condition may further include:
- the value of the MCS field in the DCI is all 1, the value of the RV field of the DCI is all 0, and the value of the UL-SCH field of the DCI is all 0.
- the above-mentioned embodiments of the first aspect and the second aspect provide a way to configure the DCI used to release the authorization of the second type of configuration, that is, the network device according to the first field in the DCI used to activate the authorization of the second type of configuration.
- the resource allocation type determines the value of the FDRA field in the DCI used to release the authorization of the second type of configuration.
- the value of the FDRA field is determined according to the resource allocation type of the authorization of the second type of the multiple sets of authorization of the second type configuration, which can ensure that the value of the FDRA field indicates that the activation of the DCI is invalid
- the time it can indicate that the release of the DCI is effective, so that the network device and the terminal device can distinguish the functions of the DCI, thereby improving the performance of the release of the DCI for verification.
- the embodiment of the present application provides another way of configuring the authorized DCI for releasing the second type of configuration, that is, the aforementioned second design.
- the second design can also be considered that the default value of the FDRA field is all 0 or all 1, which can ensure that when the value of the FDRA field indicates that the activation of DCI is invalid, it can indicate that the release of DCI is valid, so that network equipment and terminal equipment can distinguish the functions of DCI, thereby Improve the performance of releasing DCI for verification.
- a communication method is provided.
- the method can be executed by a first communication device.
- the first communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip system.
- the following description will be made by taking the communication device as a terminal device as an example.
- the method includes: receiving configuration information from a network device, and receiving DCI from the network device, where the configuration information is used to configure a release state set, the release state set includes at least one state, and each state of the at least one state is associated At least one set of authorization for the second type of configuration, the first field of the DCI indicates the first state, the DCI is scrambled by the first RNTI, and the value of the NDI field of the DCI is 0;
- the DCI When the value of the frequency domain resource allocation FDRA field in the DCI satisfies any one of the following preset conditions, it is determined that the DCI is not used to release the authorization of the second type of configuration, where the preset conditions include:
- the authorized resource allocation type of at least one set of the second type configuration associated with the first state includes at least type 0 and does not include type 1, and the value of the FDRA field is not all 0; or,
- the authorized resource allocation type of at least one set of the second type configuration associated with the first state includes at least type 1, and does not include type 0, and the value of the FDRA field is not all 1; or,
- the authorized resource allocation type of at least one set of second type configuration associated with the first state includes at least type 0 and type 1, and the specific authorized resource allocation type of the second type of configuration in the at least one set of second type configuration authorization is Type 0, the value of the FDRA domain is not all 0s, the authorized resource allocation type of the specific type 2 configuration is type 1, and the value of the FDRA domain is not all 1s; or,
- the authorized resource allocation types of at least one set of second type configurations associated with the first state include at least type 0 and type 1, and the value of the FDRA field is not all 0; or,
- the authorized resource allocation types of at least one set of second type configurations associated with the first state include at least type 0 and type 1, and the value of the FDRA field is not all 1; or,
- the authorized resource allocation types of at least one set of second type configurations associated with the first state are all dynamic types, and the value of the FDRA field is not all 0; or,
- At least one set of authorized resource allocation types of the second type configuration associated with the first state are all dynamic types, and the value of the FDRA field is not all 1.
- a communication method is provided, which can be executed by a second communication device, which may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip system.
- the following describes an example in which the communication device is a network device.
- the method includes: sending configuration information to a terminal device, and sending DCI to the terminal device, the configuration information is used to configure a release state set, the release state set includes at least one state, and each state in the at least one state is associated with at least one set of second Class configuration authorization, the first state of the first domain of the DCI, where:
- the value of the frequency domain resource allocation FDRA domain in the DCI satisfies any one of the following preset conditions:
- the authorized resource allocation type of at least one set of the second type configuration associated with the first state includes at least type 0 and does not include type 1, and the value of the FDRA field is all 0; or,
- the authorized resource allocation type of at least one set of the second type configuration associated with the first state includes at least type 1, and does not include type 0, and the value of the FDRA field is all 1; or,
- the authorized resource allocation type of at least one set of second type configuration associated with the first state includes at least type 0 and type 1, and the specific authorized resource allocation type of the second type of configuration in the at least one set of second type configuration authorization is Type 0, the value of the FDRA domain is all 0; the authorized resource allocation type of the specific type 2 configuration is type 1, and the value of the FDRA domain is all 1; or,
- the authorized resource allocation types of at least one set of second type configurations associated with the first state include at least type 0 and type 1, and the value of the FDRA field is all 0; or,
- the authorized resource allocation types of at least one set of second type configurations associated with the first state include at least type 0 and type 1, and the value of the FDRA field is all 1; or,
- At least one set of authorized resource allocation types of the second type configuration associated with the first state are all dynamic types, and the value of the FDRA domain is not all 0; or,
- At least one set of authorized resource allocation types of the second type configuration associated with the first state are all dynamic types, and the value of the FDRA field is not all 1.
- the foregoing embodiments of the third and fourth aspects provide yet another way to configure the authorized DCI for releasing the second type of configuration, that is, the network device can release at least one set of authorized resources of the second type of configuration to be released.
- the allocation type determines the value of the FDRA field in the DCI used to release the authorization of the second type of configuration. Compared with the current authorization involving multiple sets of the second type of configuration, the network device does not know which authorization of the second type of configuration is used.
- resource allocation type to configure the value of the FDRA field in the joint release scenario, the embodiment of this application clarifies how to configure the value of the FDRA field.
- the network equipment and the terminal equipment can distinguish the functions of the DCI, thereby improving the performance of releasing the DCI for verification.
- the specific authorized index of the second type of configuration is the smallest index or the largest index among the multiple sets of authorized indexes of the second type of configuration configured by the network device for the terminal device; or,
- the specific authorized index of the second type of configuration is the smallest index or the largest index among the at least one set of authorized indexes of the second type of configuration associated with the first state; or,
- the specific authorized index of the second type of configuration satisfies a preset rule among the multiple sets of authorized indexes of the second type of configuration configured for the terminal device by the network device; or,
- the specific authorized index of the second type configuration satisfies a preset rule among at least one set of authorized indexes of the second type configuration associated with the first state.
- the specific authorized resource allocation type configuration of the second type of configuration is specifically designated for release The value of the FDRA field in the authorized DCI of the second type of configuration.
- the specific authorization selection method of the second type configuration is based on, for example, the minimum index or the maximum index among the authorized indexes of the multiple second type configurations configured by the network device for the terminal device, or a preset rule, etc., which is not limited in the embodiment of the present application.
- the value of the first field in the DCI is different from any set of authorized indexes of the second type of configuration.
- the value of the first field in the DCI is different from any set of authorized indexes of the second type of configuration.
- this solution provides a configuration for releasing the FDRA field in the authorization of the second type of configuration.
- Value mode that is, the network device can determine the value of the FDRA field in the DCI used to release the authorization of the second type of configuration according to at least one set of authorized resource allocation types of the second type of configuration to be released.
- a communication method is provided.
- the method can be executed by a first communication device.
- the first communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip system.
- the following description will be made by taking the communication device as a terminal device as an example.
- the method includes: receiving configuration information from a network device, the configuration information is used to configure time domain resources, the configuration information includes a period parameter, and the period parameter is used to indicate the repetition period of a plurality of nominal repetitive resources in the time domain; and The period parameter determines the time domain position of the first nominal repeated resource, and determines the time domain position of the first actual repeated resource according to the time domain position of the first nominal repeated resource; and sends data on the first actual repeated resource.
- a possible application scenario allows a terminal device to repeatedly send the same data packet multiple times in a time slot.
- the multiple nominal repetition resources allocated to the terminal device by the network device for sending the same packet multiple times are continuous in the time domain, and because a nominal repetition resource used to send a repetition may contain Because of the unusable symbols or the time slot boundary, a nominal repetitive resource will be split into multiple actual repetitive resources. Therefore, the actual number of repeated transmissions of the terminal device may be greater than the number of nominal repetitive resources.
- the time domain position of the actual repeated resource can be determined according to the repetition period of multiple nominal repeated resources in the time domain, so as to send data on the actual repeated resource.
- determining the time domain position of the nominal repetitive resource according to the period of the time domain resource may include, but is not limited to, the following three methods:
- the starting time slot of the nth nominal repetitive resource in the mth period satisfies the formula: Among them, N is the number of symbols in each time slot, S is the number of the start symbol of the nth nominal repetitive resource, L is the number of symbols of a nominal repetitive resource, and K s is the start time slot of the first nominal repetitive resource Number.
- the number of the start symbol of the nth nominal repetitive resource in the start time slot in the mth period satisfies the formula: mod(S+n ⁇ L+m ⁇ p,N); where N is every The number of symbols in a time slot, S is the number of the start symbol of the nth nominal repetitive resource, and L is the number of symbols of a nominal repetitive resource.
- the ending time slot of the nth nominal repetitive resource in the mth period satisfies the formula: Where N is the number of symbols in each time slot, S is the number of the end symbol of the nth nominal repetitive resource, L is the number of symbols of a nominal repetitive resource, and K s is the start time slot of the first nominal repetitive resource. serial number.
- the number of the end symbol in the end time slot of the nth nominal repetitive resource in the mth period satisfies the formula: mod(S+(,+1) ⁇ L-1+m ⁇ p,N,; where, N is the number of symbols in each time slot, S is the number of the end symbol of the nth nominal repetitive resource, and L is the number of symbols of a nominal repetitive resource.
- K s is determined according to the time domain resource offset parameter in the configuration information.
- the configuration information is used to configure the authorization of the first type of configuration, and the K s satisfies:
- K s is equal to the time domain resource offset of the first nominal repeated resource
- K s is the number of the first time slot in the first frame, and the number of the first frame is The number of the first time slot is mod(M, M1), the M is determined by the time domain resource offset of the first nominal repetitive resource, and the M1 is the number of time slots included in a frame.
- the configuration information is used to configure the authorization of the second type of configuration, and the K s satisfies the formula:
- n 0 is the time slot where the received downlink control information DCI is located
- u pusch is the subcarrier spacing configuration of the physical uplink shared channel PUSCH
- u pdcch is the subcarrier spacing configuration of the physical downlink control channel PDCCH.
- the second determination method is to determine the start time slot where the start symbol of the nth nominal repetition resource in the mth period is located according to the number m of the period, and the nth nominal repetition resource is in the start time slot The starting symbol;
- the end time slot where the end symbol of the nth nominal repetitive resource in the mth period is located is determined according to the number m of the period, and the end symbol of the nth nominal repetitive resource in the end time slot is determined.
- the number of the starting time slot of the nth nominal repetitive resource in the mth period satisfies the formula: Among them, N is the number of symbols in each time slot, L is the number of symbols of a nominal repetitive resource, K ms is the number of the starting time slot of the first nominal repetitive resource in the m-th period, and S m is the m-th period.
- the number of the start symbol of the nth nominal repetitive resource in a period, S m satisfies the formula: mod(S+m ⁇ P, N), S is the number of the start symbol of the nth nominal repetitive resource, P is The period size of the repetition period of multiple nominal repetitive resources in the time domain.
- the number of the start symbol of the nth nominal repetitive resource in the start time slot in the mth period satisfies the formula: mod(S m +n ⁇ L, N);
- N is the number of symbols in each slot
- L is the number of symbols of a nominal repetitive resource
- S m is the number of the starting symbol of the nth nominal repetitive resource in the m-th period
- S m satisfies the formula: mod(S+m ⁇ P, N)
- S is the number of the start symbol of the nth nominal repetitive resource
- P is the period size of the repetition period of multiple nominal repetitive resources in the time domain.
- the number of the end time slot of the nth nominal repetitive resource in the mth period satisfies the formula: Among them, N is the number of symbols in each time slot, L is the number of symbols of a nominal repetitive resource, K ms is the number of the starting time slot of the first nominal repetitive resource in the m-th period, and S m is the m-th period.
- the number of the end symbol of the nth nominal repetitive resource in a period, S m satisfies the formula: mod(S+m ⁇ P,N), S is the number of the start symbol of the nth nominal repetitive resource, P is more The period size of the repetition period of a nominal repetition resource in the time domain.
- the end symbol of the nth nominal repetitive resource in the mth period in the end time slot satisfies the formula: MOD(S m +(n+1) ⁇ L-1,N ); where N is the number of symbols in each slot, L is the number of symbols of a nominal repetitive resource, S m is the number of the end symbol of the nth nominal repetitive resource in the m-th period, and S m satisfies the formula : Mod(S+m ⁇ P, N), S is the number of the start symbol of the nth nominal repetitive resource, and P is the period size of the repetition period of multiple nominal repetitive resources in the time domain.
- K ms is determined according to the time domain resource offset and the period size in the configuration information.
- the configuration information is used to configure the authorization of the first type of configuration, and K ms satisfies:
- K ms is the number of the first time slot in the first frame, and the frame number of the first frame is
- the M is determined by the time domain resource offset of the first nominal repetitive resource
- the M1 is the number of time slots included in a frame
- the N is the number of symbols included in a time slot.
- the configuration information is used to configure the authorization of the second type of configuration, and K ms satisfies:
- K ms is the number of the first time slot in the first frame, and the frame number of the first frame is
- the M is determined by the time domain resource offset of the first nominal repetitive resource
- the M1 is the number of time slots included in a frame
- the K s satisfies the formula:
- n 0 is the time slot where the received downlink control information DCI is located
- u pusch is the subcarrier spacing configuration of the physical uplink shared channel PUSCH
- u pdcch is the subcarrier spacing configuration of the physical downlink control channel PDCCH.
- Determination method 3 The authorization used to configure different types of configurations according to the configuration information is different, and the specifics are as follows:
- the configuration information is used to configure the authorization of the first type of configuration, the symbol index ssymbol index of the start symbol of the first nominal repeat resource, the frame number sSFN of the system frame where the start symbol is located, and the time when the start symbol is located.
- slot index gap sslot index satisfies:
- the symbol index esymbol index of the end symbol of the first nominal repeated resource, the frame number eSFN of the system frame where the end symbol is located, and the time slot index eslot index of the time slot where the end symbol is located satisfy
- the M is determined by the time domain resource offset of the first nominal repetitive resource
- the M1 is the number of time slots contained in a frame
- the N is the number of symbols in each time slot
- P is the number of multiple nominal repetitive resources.
- the size of the repetition period m is the number of the period
- S1 is the number of the start symbol of the nth nominal repetitive resource
- S2 is the number of the end symbol of the nth nominal repetitive resource
- L is the number of symbols of a nominal repetitive resource
- N is the number of the nominal duplicate resource.
- This configuration information is used to configure the authorization of the second type of configuration, the symbol index ssymbol index of the start symbol of the first nominal repeat resource, the frame number sSFN of the system frame where the start symbol is located, and the time when the start symbol is located.
- slot index gap sslot index satisfies:
- the symbol index esymbol index of the end symbol of the first nominal repeated resource, the frame number eSFN of the system frame where the end symbol is located, and the time slot index eslot index of the time slot where the end symbol is located satisfy:
- the M is determined by the time domain resource offset of the first nominal repetitive resource
- the M1 is the number of time slots included in a frame
- the N is the number of symbols in each time slot
- the downlink control information DCI received by SFN start is located
- P is the period size of the repetition period of multiple nominal repetitive resources
- m is the period number
- S1 is the number of the start symbol of the nth nominal repetitive resource
- S2 is the number of the nth nominal repetitive resource
- L is the number of symbols of a nominal repetitive resource
- n is the number of the nominal repetitive resource
- K s is the number of the start time slot of the first nominal repetitive resource.
- the above three determination methods respectively provide ways to determine the time domain position of the actual repeated resource according to the repetition period of multiple nominal repeated resources in the time domain, so as to send data on the actual repeated resource.
- an embodiment of the present application provides a communication device, including a transceiver unit and a processing unit, where:
- the transceiving unit is configured to receive configuration information and downlink control information DCI from a network device, the configuration information is used to configure a release state set, the release state set includes at least one state, each of the at least one state Associating with at least one set of authorization for the second type of configuration, the first field of the DCI indicates the first state, the DCI is scrambled by the first RNTI, and the new data of the DCI indicates that the value of the NDI field is 0;
- the processing unit is configured to release the authorization of at least one set of configuration of the second type associated with the first state when the DCI meets the following preset conditions, and the preset conditions include:
- the value of the first field in the DCI is the same as the index of a set of authorizations of the second type configuration, and the resource allocation type of the authorization of the set of second type configurations is 0, and the frequency domain in the DCI
- the value of the resource allocation FDRA field is all 0; or,
- the value of the first field in the DCI is the same as the index of the authorization of a set of second type configurations, and the resource allocation type of the authorization of the set of second type configurations is 1, and the FDRA field in the DCI
- the value of is all 1s; or,
- the value of the first field in the DCI is the same as the index of a set of authorization of the second type of configuration, and the resource allocation type of the authorization of the set of second type of configuration is a dynamic type, and the FDRA in the DCI
- the value of the domain is all 0; or,
- the value of the first field in the DCI is the same as the index of a set of authorization of the second type of configuration, and the resource allocation type of the authorization of the set of second type of configuration is a dynamic type, and the FDRA in the DCI
- the value of the domain is all 1s; or,
- the value of the first field in the DCI is different from the index of any set of authorization of the second type configuration, and the value of the FDRA field in the DCI is all 0; or,
- the value of the first field in the DCI is different from the index of any set of authorization of the second type configuration, and the value of the FDRA field in the DCI is all 1.
- the authorization for the second type of configuration is one of the authorizations for the second type of configuration configured by the network device for the terminal device; or, the foregoing
- a set of authorizations for a second type of configuration is a set of authorizations for a second type of configuration associated with the first state.
- the aforementioned set of authorization for the second type of configuration may be authorization for a specific second type of configuration, for example, the index of the authorization for the set of second type of configuration is that the network device is configured for the terminal device.
- the authorized index of the set of second type configurations is the smallest index or the largest index among the authorized indexes of at least one set of the second type of configuration associated with the first state; or,
- the set of authorized indexes of the second type of configuration satisfies a preset rule among the multiple sets of authorized indexes of the second type of configuration configured for the terminal device by the network device; or,
- the set of authorized indexes of the second type of configuration satisfies a preset rule in the at least one set of authorized indexes of the second type of configuration associated with the first state.
- the preset condition further includes:
- the value of the MCS field of the modulation and coding scheme in the DCI is all 1s, and the value of the RV field of the redundancy version of the DCI is all 0s.
- the preset condition further includes:
- the value of the UL-SCH field of the uplink shared channel in the DCI is all 0s.
- the first RNTI includes a configured scheduling radio network temporary identifier CS-RNTI.
- an embodiment of the present application provides a communication device, including a transceiver unit and a processing unit, wherein:
- the transceiving unit is configured to receive configuration information and downlink control information DCI from a network device, the configuration information is used to configure a release state set, the release state set includes at least one state, each of the at least one state The state is associated with at least one set of authorization of the second type of configuration, the first field of the DCI indicates the authorization of one or more sets of the second type of configuration associated with the state in the release state set, and the DCI is added by the first RNTI And the new data of the DCI indicates that the value of the NDI field is 0;
- the processing unit is configured to: in the case where the value of the first field in the DCI is the same as the index of a set of authorizations configured for the second type, and the frequency domain resource allocation in the DCI meets the value of the FDRA field
- the preset condition determines that the DCI is not used to release the authorization of the second type of configuration, where the preset condition includes:
- the authorized resource allocation type of the second type of configuration is type 0, and the value of the FDRA field is not all 0, or;
- the authorized resource allocation type of the second type configuration is type 1, and the value of the FDRA field is not all 1, or;
- the authorized resource allocation type of the second type of configuration is a dynamic type, and the value of the FDRA field is not all 0; or,
- the authorized resource allocation type of the second type of configuration is a dynamic type, and the value of the FDRA field is not all ones.
- the authorization for the second type of configuration is one of the authorizations for the second type of configuration configured by the network device for the terminal device; or, the aforementioned one
- the set of authorization for the second type of configuration is a set of authorization for the second type of configuration in the second type of configuration authorization associated with the first state.
- the aforementioned set of authorization for the second type of configuration may be authorization for a specific second type of configuration, for example, the index of the authorization for the set of second type of configuration is that the network device is configured for the terminal device.
- the authorized index of the set of second type configurations is the smallest index or the largest index among the authorized indexes of at least one set of the second type of configuration associated with the first state; or,
- the set of authorized indexes of the second type of configuration satisfies a preset rule among the multiple sets of authorized indexes of the second type of configuration configured for the terminal device by the network device; or,
- the set of authorized indexes of the second type of configuration satisfies a preset rule in the at least one set of authorized indexes of the second type of configuration associated with the first state.
- the first RNTI includes a configured scheduling radio network temporary identifier CS-RNTI.
- an embodiment of the present application provides a communication device, including a transceiver unit and a processing unit, where:
- the transceiving unit is configured to receive configuration information and downlink control information DCI from a network device, the configuration information is used to configure a release state set, the release state set includes at least one state, each of the at least one state The state is associated with at least one set of authorization of the second type of configuration, the first field of the DCI indicates the first state, the DCI is scrambled by the first RNTI, and the new data of the DCI indicates that the value of the NDI field is 0;
- the processing unit is configured to determine that the DCI is not used to release the authorization of the second type of configuration when the value of the frequency domain resource allocation FDRA field in the DCI satisfies any one of the following preset conditions.
- the conditions include:
- the authorized resource allocation type of at least one set of the second type configuration associated with the first state includes at least type 0 and does not include type 1, and the value of the FDRA field is not all 0; or,
- the authorized resource allocation type of at least one set of the second configuration associated with the first state includes at least type 1, and does not include type 0, and the value of the FDRA field is not all 1; or,
- the at least one set of authorized resource allocation types of the second type configuration associated with the first state includes at least type 0 and type 1, and the at least one set of authorized resource allocation types of the second type of configuration is authorized by the specific second type of configuration.
- the resource allocation type is type 0, the value of the FDRA field is not all 0, the authorized resource allocation type of the specific second type configuration is type 1, and the value of the FDRA field is not all 1; or,
- the authorized resource allocation types of at least one set of second type configurations associated with the first state include at least type 0 and type 1, and the value of the FDRA field is not all 0; or,
- the authorized resource allocation types of at least one set of second type configurations associated with the first state include at least type 0 and type 1, and the value of the FDRA field is not all 1; or,
- the authorized resource allocation types of at least one set of the second configuration associated with the first state are all dynamic types, and the value of the FDRA field is not all 0; or,
- the authorized resource allocation types of at least one set of the second configuration associated with the first state are all dynamic types, and the value of the FDRA field is not all ones.
- the specific authorized index of the second type of configuration is the smallest index or the largest index among the multiple sets of authorized indexes of the second type of configuration configured for the terminal device by the network device; or,
- the specific authorized index of the second type of configuration is the smallest index or the largest index among the at least one set of authorized indexes of the second type of configuration associated with the first state; or,
- the specific authorized index of the second type of configuration satisfies a preset rule among the multiple sets of authorized indexes of the second type of configuration configured for the terminal device by the network device; or,
- the specific authorized index of the second type configuration satisfies a preset rule among at least one set of authorized indexes of the second type configuration associated with the first state.
- the value of the first field in the DCI is different from any set of authorized indexes of the second type of configuration.
- the first RNTI includes a configured scheduling radio network temporary identifier CS-RNTI.
- an embodiment of the present application provides a communication device, including a transceiver unit and a processing unit, wherein:
- the transceiver unit is configured to send configuration information and downlink control information DCI to a terminal device, the configuration information is used to configure a release state set, the release state set includes at least one state, and each state of the at least one state is associated At least one set of authorization for the second type of configuration, and the DCI is used to release the authorization for the second type of configuration;
- the processing unit is configured to determine that the value of the frequency domain resource allocation FDRA domain in the DCI satisfies the following conditions when the value of the first domain in the DCI is the same as the index of a set of authorizations configured for the second type Pre-conditions:
- the authorized resource allocation type of the second type of configuration is type 0, and the value of the FDRA field is all 0, or;
- the authorized resource allocation type of the second set of configurations is type 1, and the value of the FDRA field is all 1, or;
- the authorized resource allocation type of the second type of configuration is a dynamic type, and the value of the FDRA field is all 0; or,
- the authorized resource allocation type of the second type of configuration is a dynamic type, and the value of the FDRA field is all 1.
- the authorization for the second type of configuration is one of the authorizations for the second type of configuration configured by the network device for the terminal device; or ,
- the aforementioned set of authorization for the second type of configuration is authorization for a set of second type of configuration in the second type of configuration authorization associated with the first state.
- the aforementioned set of authorization for the second type of configuration may be authorization for a specific second type of configuration, for example, the index of the authorization for the set of second type of configuration is that the network device is configured for the terminal device.
- the authorized index of the set of second type configurations is the smallest index or the largest index among the authorized indexes of at least one set of the second type of configuration associated with the first state; or,
- the set of authorized indexes of the second type of configuration satisfies a preset rule among the multiple sets of authorized indexes of the second type of configuration configured for the terminal device by the network device; or,
- the set of authorized indexes of the second type of configuration satisfies a preset rule in the at least one set of authorized indexes of the second type of configuration associated with the first state.
- the preset condition further includes:
- the value of the MCS field of the modulation and coding scheme in the DCI is all 1s, and the value of the RV field of the redundancy version of the DCI is all 0s.
- the preset condition further includes that the value of the UL-SCH field of the DCI is all 0s.
- an embodiment of the present application provides a communication device, including a transceiver unit and a processing unit, wherein:
- the transceiver unit is configured to send configuration information and downlink control information DCI to a terminal device, where the configuration information is used to configure a release state set, the release state set includes at least one state, and each state of the at least one state Associating at least one set of authorizations of the second type configuration, the first field of the DCI indicates the authorization of one or more sets of the second type configuration associated with the states in the release state set;
- the processing unit is configured to determine that the value of the frequency domain resource allocation FDRA domain in the DCI satisfies any one of the following preset conditions:
- the authorized resource allocation type of at least one set of second type configuration associated with the state indicated by the first field includes at least type 0 and does not include type 1, and the value of the FDRA field is all 0; or,
- the authorized resource allocation type of at least one set of second type configuration associated with the state indicated by the first field includes at least type 1, and does not include type 0, and the value of the FDRA field is all 1; or,
- the authorized resource allocation types of the at least one set of second-type configurations associated with the state indicated by the first domain include at least type 0 and type 1, and the specific second-type configuration in the authorization of the at least one set of second-type configurations
- the authorized resource allocation type of is type 0, the value of the FDRA field is all 0, the authorized resource allocation type of the specific second type configuration is type 1, and the value of the FDRA field is all 1; or,
- the authorized resource allocation type of at least one set of second-type configurations associated with the state indicated by the first field includes at least type 0 and type 1, and the value of the FDRA field is all 0; or,
- the authorized resource allocation types of at least one set of second-type configurations associated with the state indicated by the first field include at least type 0 and type 1, and the value of the FDRA field is all 1; or,
- At least one set of authorized resource allocation types of the second type configuration associated with the state indicated by the first field are all dynamic types, and the value of the FDRA field is not all 0; or,
- the authorized resource allocation types of at least one set of the second type of configuration associated with the state indicated by the first field are all dynamic types, and the value of the FDRA field is not all ones.
- the specific authorized index of the second type configuration is the smallest index or the largest index among the authorized indexes of the multiple sets of second type configuration configured by the network device for the terminal device; or,
- the specific authorized index of the second type of configuration is the smallest index or the largest index among the at least one set of authorized indexes of the second type of configuration associated with the first state; or,
- the specific authorized index of the second type of configuration satisfies a preset rule among the multiple sets of authorized indexes of the second type of configuration configured for the terminal device by the network device; or,
- the specific authorized index of the second type configuration satisfies a preset rule among at least one set of authorized indexes of the second type configuration associated with the first state.
- the value of the first field in the DCI is different from any set of authorized indexes of the second type of configuration.
- an embodiment of the present application provides a communication device, including a transceiver unit and a processing unit, wherein:
- the transceiving unit is configured to receive configuration information from a network device, the configuration information is used to configure time domain resources, the configuration information includes a period parameter, and the period parameter is used to indicate that multiple nominal repetitive resources are in the time domain Repetition period;
- the processing unit is configured to determine the time domain position of the first nominal repeated resource according to the configuration information, and determine the time domain position of the first actual repeated resource according to the time domain position of the first nominal repeated resource;
- the transceiving unit is further configured to send data on the first actual repetitive resource.
- the time domain location of the nominal repetitive resource is determined according to the period of the time domain resource, including:
- the period size P and the period number m determine the start time slot where the start symbol of the nth nominal repetition resource in the mth period is located, and the nth nominal repetition resource is in the start time slot The starting symbol;
- the end time slot of the nth nominal repetitive resource in the mth period and the end symbol of the nth nominal repetitive resource in the end time slot are determined according to the period size P and the period number m.
- the number of the starting time slot of the nth nominal repetitive resource in the mth period satisfies the formula:
- N is the number of symbols in each time slot
- S is the number of the start symbol of the nth nominal repetitive resource
- L is the number of symbols of a nominal repetitive resource
- K s is the start time slot of the first nominal repetitive resource Number.
- the number of the start symbol in the start time slot of the nth nominal repetitive resource in the mth period satisfies the formula: mod(S+n ⁇ L+m ⁇ P, N);
- N is the number of symbols in each slot
- S is the number of the start symbol of the nth nominal repetitive resource
- L is the number of symbols of a nominal repetitive resource.
- the number of the end time slot of the nth nominal repetitive resource in the mth period satisfies the formula:
- N is the number of symbols in each time slot
- S is the number of the end symbol of the nth nominal repetitive resource
- L is the number of symbols of a nominal repetitive resource
- K s is the start time slot of the first nominal repetitive resource. serial number.
- the number of the end symbol in the end time slot of the nth nominal repetitive resource in the mth period satisfies the formula: mod(S+(n+1) ⁇ L-1+m ⁇ P, N );
- N is the number of symbols in each time slot
- S is the number of the end symbol of the nth nominal repetitive resource
- L is the number of symbols of a nominal repetitive resource.
- K s is determined according to the time domain resource offset parameter in the configuration information.
- the configuration information is used to configure the authorization of the first type of configuration, and K s satisfies:
- K s is equal to the time domain resource offset of the first nominal repeated resource
- K s is the number of the first time slot in the first frame, and the number of the first frame is The first time slot is mod(M, M1), M is determined by the time domain resource offset of the first nominal repetitive resource, and M1 is the number of time slots included in a frame.
- the configuration information is used to configure the authorization of the second type of configuration, and K s satisfies the formula:
- n 0 is the time slot where the received downlink control information DCI is located
- u pusch is the subcarrier spacing configuration of the physical uplink shared channel PUSCH
- u pdcch is the subcarrier spacing configuration of the physical downlink control channel PDCCH.
- the time domain location of the nominal repetitive resource is determined according to the period of the time domain resource, including:
- the start time slot where the start symbol of the nth nominal repetition resource in the mth period is located, and the start symbol of the nth nominal repetition resource in the start time slot;
- the number m of the period determine the end time slot where the end symbol of the nth nominal repetitive resource in the mth period is located, and the end symbol of the nth nominal repetitive resource in the end time slot.
- the number of the starting time slot of the nth nominal repetitive resource in the mth period satisfies the formula:
- N is the number of symbols in each time slot
- L is the number of symbols of a nominal repetitive resource
- K ms is the number of the starting time slot of the first nominal repetitive resource in the m-th period
- S m is the m-th period.
- the number of the start symbol of the nth nominal repetitive resource in a period, S m satisfies the formula: mod(S+m ⁇ P, N)
- S is the number of the start symbol of the nth nominal repetitive resource
- P is The period size of the repetition period of multiple nominal repetitive resources in the time domain.
- the number of the start symbol in the start time slot of the nth nominal repetitive resource in the mth period satisfies the formula: mod(S m +n ⁇ L, N);
- N is the number of symbols in each slot
- L is the number of symbols of a nominal repetitive resource
- S m is the number of the starting symbol of the nth nominal repetitive resource in the m-th period
- S m satisfies the formula: mod(S+m ⁇ P, N)
- S is the number of the start symbol of the nth nominal repetitive resource
- P is the period size of the repetition period of multiple nominal repetitive resources in the time domain.
- the number of the end time slot of the nth nominal repetitive resource in the mth period satisfies the formula:
- N is the number of symbols in each time slot
- L is the number of symbols of a nominal repetitive resource
- K ms is the number of the starting time slot of the first nominal repetitive resource in the m-th period
- S m is the m-th period.
- the number of the end symbol of the nth nominal repetitive resource in a period, S m satisfies the formula: mod(S+m ⁇ P, N)
- S is the number of the start symbol of the nth nominal repetitive resource
- P is more The period size of the repetition period of a nominal repetition resource in the time domain.
- the number of the end symbol in the end time slot of the nth nominal repetitive resource in the mth period satisfies the formula: mod(S m +(n+1) ⁇ L-1, N);
- N is the number of symbols in each time slot
- L is the number of symbols of a nominal repetitive resource
- S m is the number of the end symbol of the nth nominal repetitive resource in the m-th period
- S m satisfies the formula: mod (S+m ⁇ p, N)
- S is the number of the start symbol of the nth nominal repetition resource
- P is the period size of the repetition period of multiple nominal repetition resources in the time domain.
- K ms is determined according to the time domain resource offset and the period size in the configuration information.
- the configuration information is used to configure the authorization of the first type of configuration, and K ms satisfies:
- K ms is the number of the first time slot in the first frame, where the frame number of the first frame is:
- M is determined by the time domain resource offset of the first nominal repetitive resource
- M1 is the number of time slots included in a frame
- N is the number of symbols included in a time slot.
- the configuration information is used to configure the authorization of the second type of configuration, and K ms satisfies:
- K ms is the number of the first time slot in the first frame, where the frame number of the first frame is:
- M is determined by the time domain resource offset of the first nominal repetitive resource
- M1 is the number of time slots contained in a frame
- K s satisfies the formula:
- n 0 is the time slot where the received downlink control information DCI is located
- u pusch is the subcarrier spacing configuration of the physical uplink shared channel PUSCH
- u pdcch is the subcarrier spacing configuration of the physical downlink control channel PDCCH.
- determining the time domain location of the first nominal repeated resource according to the configuration information includes:
- the symbol index ssymbol index of the start symbol of the first nominal repetitive resource, the frame number sSFN of the system frame where the start symbol is located, and the time slot index sslot index of the time slot where the start symbol is located satisfy:
- the symbol index esymbol index of the end symbol of the first nominal repetitive resource, the frame number eSFN of the system frame where the end symbol is located, and the time slot index eslot index of the time slot where the end symbol is located satisfy:
- the M is determined by the time domain resource offset of the first nominal repetition resource
- the M1 is the number of time slots included in a frame
- the N is the number of symbols in each time slot
- P is the number of nominal repetition resources.
- the period size of the repetition period of the repetitive resource m is the number of the period
- S1 is the number of the start symbol of the nth nominal repetitive resource
- S2 is the number of the end symbol of the nth nominal repetitive resource
- L is a nominal repetitive resource
- n is the number of the nominal repeated resource.
- determining the time domain location of the first nominal repeated resource according to the configuration information includes:
- the symbol index ssymbol index of the start symbol of the first nominal repetitive resource, the frame number sSFM of the system frame where the start symbol is located, and the time slot index sslot index of the time slot where the start symbol is located satisfy:
- the symbol index esymbol index of the end symbol of the first nominal repetitive resource, the frame number eSFN of the system frame where the end symbol is located, and the time slot index eslot index of the time slot where the end symbol is located satisfy:
- the M is determined by the time domain resource offset of the first nominal repetition resource
- the M1 is the number of time slots included in a frame
- the N is the number of symbols in each time slot
- the downlink control received by SFN start The number of the system frame where the information DCI is located
- P is the period size of the repetition period of multiple nominal repetitive resources
- m is the period number
- S1 is the number of the start symbol of the nth nominal repetitive resource
- S2 is the nth nominal repetition resource
- L is the number of symbols of a nominal repetitive resource
- n is the number of the nominal repetitive resource
- K s is the number of the start time slot of the first nominal repetitive resource.
- an embodiment of the present application provides a communication device, which includes a processor, configured to implement the terminal device in the first aspect, the third aspect, or the fifth aspect, or the terminal device in the second or fourth aspect.
- the method performed by the network device may also include a memory for storing program instructions and data.
- the memory is coupled with the processor, and the processor can call and execute the program instructions stored in the memory to implement the terminal device in the first aspect, the third aspect, or the fifth aspect, or the second aspect, or the terminal device in the fifth aspect. Any method performed by the network device in the fourth aspect.
- the communication device may also include a communication interface, which may be a transceiver in the communication device, for example, implemented by the antenna, feeder, and codec in the communication device, or if the fifth communication device To be a chip set in a network device, the communication interface may be an input/output interface of the chip, such as input/output pins.
- the transceiver is used for the communication device to communicate with other devices. Exemplarily, when the communication device is a terminal device, the other device is a network device; or, when the communication device is a network device, the other device is a terminal device.
- the embodiments of the present application provide a chip system.
- the chip system includes a processor and may also include a memory, which is used to implement the terminal device in the first aspect or the third aspect or the fifth aspect or the second aspect or The method implemented by the network device in the fourth aspect.
- the chip system can be composed of chips, or it can include chips and other discrete devices.
- an embodiment of the present application provides a communication system.
- the system includes the terminal device described in the first aspect and the network device described in the second aspect, or includes the terminal device described in the third aspect and the first aspect.
- the network device described in the fourth aspect may include two communication devices in the fifth aspect, wherein one communication device is used to implement the function of the terminal device, and the other communication device is used to implement the function of the network device.
- the embodiments of the present application also provide a computer-readable storage medium, including instructions, which when run on a terminal device or network device, cause the terminal device or network device to execute the first aspect or the third aspect or The method performed by the terminal device in the fifth aspect or the network device in the second or fourth aspect.
- the embodiments of the present application also provide a computer program product, including instructions, which when run on a computer, cause the computer to execute the terminal device or the second aspect in the first aspect or the third aspect or the fifth aspect Or the method performed by the network device in the fourth aspect.
- FIG. 1 is a schematic diagram of an uplink data transmission process based on dynamic type authorization by a network device according to an embodiment of the application;
- Figure 2 is a suitable network architecture provided by an embodiment of the application
- FIG. 3 is a schematic flowchart of a communication method provided by an embodiment of this application.
- FIG. 5 is a schematic diagram of the relationship between nominal repeated resources and actual repeated resources provided by an embodiment of the application
- FIG. 6 is a schematic flowchart of a communication method provided by an embodiment of this application.
- FIG. 7 is a schematic structural diagram of a communication device provided by an embodiment of this application.
- FIG. 8 is a schematic diagram of another structure of a communication device provided by an embodiment of this application.
- FIG. 9 is a schematic structural diagram of a communication device provided by an embodiment of this application.
- FIG. 10 is a schematic structural diagram of a communication device provided by an embodiment of this application.
- FIG. 11 is a schematic diagram of another structure of a communication device provided by an embodiment of this application.
- FIG. 12 is a schematic diagram of still another structure of a communication device provided by an embodiment of this application.
- Terminal devices including devices that provide users with voice and/or data connectivity, such as handheld devices with wireless connection functions, or processing devices connected to wireless modems.
- the terminal device can communicate with the core network via a radio access network (RAN), and exchange voice and/or data with the RAN.
- RAN radio access network
- the terminal equipment may include user equipment (UE), wireless terminal equipment, mobile terminal equipment, device-to-device communication (device-to-device, D2D) terminal equipment, vehicle-to-everything (V2X) Terminal equipment, machine-to-machine/machine-type communications (M2M/MTC) terminal equipment, Internet of things (IoT) terminal equipment, subscriber unit, subscriber station (subscriber station), mobile station (mobile station), remote station (remote station), access point (access point, AP), remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal) , User agent (user agent), or user equipment (user device), etc.
- UE user equipment
- UE user equipment
- D2D device-to-device communication
- V2X vehicle-to-everything
- M2M/MTC machine-to-machine/machine-type communications
- IoT Internet of things
- subscriber unit subscriber station (subscriber station), mobile station (mobile station), remote station (remote station
- it may include mobile phones (or “cellular” phones), computers with mobile terminal equipment, portable, pocket-sized, hand-held, mobile devices with built-in computers, and so on.
- PCS personal communication service
- PCS cordless phones
- SIP session initiation protocol
- WLL wireless local loop
- PDA personal digital assistants
- restricted devices such as devices with low power consumption, or devices with limited storage capabilities, or devices with limited computing capabilities. Examples include barcodes, radio frequency identification (RFID), sensors, global positioning system (GPS), laser scanners and other information sensing equipment.
- RFID radio frequency identification
- GPS global positioning system
- laser scanners and other information sensing equipment.
- the terminal device may also be a wearable device.
- Wearable devices can also be called wearable smart devices or smart wearable devices, etc. It is a general term for using wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes Wait.
- a wearable device is a portable device that is directly worn on the body or integrated into the user's clothes or accessories. Wearable devices are not only a kind of hardware device, but also realize powerful functions through software support, data interaction, and cloud interaction.
- wearable smart devices include full-featured, large-sized, complete or partial functions that can be implemented without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, and need to cooperate with other devices such as smart phones.
- Use such as all kinds of smart bracelets, smart helmets, smart jewelry, etc. for physical sign monitoring.
- the various terminal devices described above if they are located on the vehicle (for example, placed in the vehicle or installed in the vehicle), can be regarded as vehicle-mounted terminal equipment, for example, the vehicle-mounted terminal equipment is also called on-board unit (OBU). ).
- OBU on-board unit
- Network equipment including, for example, access network (AN) equipment, such as a base station (e.g., access point), which may refer to equipment that communicates with wireless terminal equipment through one or more cells on the air interface in the access network
- AN access network
- a base station e.g., access point
- IP Internet Protocol
- the base station can be used to convert received air frames and Internet Protocol (IP) packets to each other, and act as a router between the terminal device and the rest of the access network, where the rest of the access network may include an IP network.
- IP Internet Protocol
- the RSU can be a fixed infrastructure entity that supports V2X applications, and can exchange messages with other entities that support V2X applications.
- the network equipment can also coordinate the attribute management of the air interface.
- the network equipment may include a long term evolution (LTE) system or an evolved base station (NodeB or eNB or e-NodeB, evolutional Node B) in a long term evolution-advanced (LTE-A) system, Or it may also include the next generation node B (gNB) in the 5G NR system, or it may include the centralized unit (CU) in the cloud radio access network (Cloud RAN) system. And distributed unit (DU), the embodiment of the present application is not limited.
- LTE long term evolution
- NodeB or eNB or e-NodeB, evolutional Node B evolution-advanced
- LTE-A long term evolution-advanced
- gNB next generation node B
- CU centralized unit
- Cloud RAN cloud radio access network
- DU distributed unit
- Figure 1 it is a schematic diagram of data transmission based on dynamic type authorization.
- Figure 1 takes the terminal device sending a signal to the network device as an uplink signal transmission, while the network device sending a signal to the terminal device as a downlink signal transmission as an example.
- the terminal device when it has data transmission requirements, it usually sends a scheduling request (SR) to the network side device through the physical uplink control channel (physical uplink control channel, PUCCH) or through the physical uplink shared channel (physical uplink shared channel, PUSCH) reports a non-empty buffer state (BS) to the network side device, and the network side device receives the SR or non-empty buffer state report (buffer state report, BSR) sent by the terminal device , Send downlink control information (DCI) to the terminal device through the physical downlink control channel (PDCCH), and the DCI carries the uplink (UL) grant, and the UL grant is used to authorize the terminal
- the device uses specified configuration parameters, such as modulation and coding scheme (MCS), to send data on specified resources.
- MCS modulation and coding scheme
- the BSR is usually sent through media access control (MAC) layer signaling, and the BSR is carried in the MAC control element (CE) in the packet header of the data packet.
- MAC media access control
- CE MAC control element
- the process of sending data from a terminal device to a network-side device is referred to as data transmission based on dynamic type authorization (grant based, GB) or dynamic type scheduling.
- dynamic type scheduling the real-time channel information between the terminal device and the network side device can be used more efficiently, so that the location and size of the appropriate time-frequency resource, as well as the appropriate transmission parameters, can be specified for each transmission of the terminal device, which can be effective Improve the reliability of data transmission.
- the terminal device needs to send SR or BSR to the network side device before sending data, and then the network side device will authorize through DCI, so this process will introduce delay and PDCCH signaling Overhead.
- CCE control channel element
- A control channel element
- DCI formats formats
- RNTI radio network temporary identifiers
- SPS transmission technology and GF transmission technology are both network side equipment through high-level signaling and/or physical layer signaling in a semi-static manner to configure time-frequency resources and transmission parameters for terminal equipment to be used for data transmission.
- the terminal device When the terminal device has data transmission requirements, it directly uses the semi-statically configured time-frequency resources and transmission parameters to send data to the network-side device without sending SR or BSR to the network-side device (therefore, Figure 1 is shown with a dashed line). Need to wait for the process of uplink authorization, so as to achieve the purpose of reducing transmission delay, signaling overhead and terminal power consumption.
- Uplink authorization-free transmission NR supports two types of uplink authorization-free transmission. These two types of uplink authorization-free transmission are respectively the first type of configured grant (Type 1 configured grant, or configured grant Type 1) and the second type of configured grant (Type 2 configured grant, or configured grant Type 2).
- the network side device sends configured authorization configuration (configured grant configuration) information to the terminal device through radio resource control (radio resource control, RRC) signaling, and the configuration information is used to configure, for example, time domain resources Cycle, open-loop power control related parameters, waveform, redundancy version sequence, number of repetitions, frequency hopping mode, resource allocation type, hybrid automatic retransmission request (HARQ) process number, demodulation reference signal (demodulation) Reference signal, DMRS) related parameters, modulation and coding scheme (MCS) tables, resource block group (RBG) size, and all transmission resources and transmissions of time domain resources, frequency domain resources, MCS, etc. parameter.
- RRC radio resource control
- the difference between the authorization of the second type of configuration and the authorization of the first type of configuration is that the authorization of the second type of configuration is divided into two steps.
- the network side device sends the configured authorization configuration information through RRC signaling. Used to configure the period of time domain resources, open-loop power control related parameters, waveforms, redundancy version sequence, number of repetitions, frequency hopping mode, resource allocation type, HARQ process number, DMRS related parameters, MCS table, RBG size, etc.
- the DCI is a DCI scrambled using a first radio network temporary identity (RNTI), for example, a configured scheduling radio network temporary identity (CS-RNTI) is used. Scrambling DCI.
- RNTI radio network temporary identity
- the first RNTI may also be other possible RNTIs.
- the first RNTI is a CS-RNTI as an example.
- the terminal device receives the authorization configuration information, and can immediately use the transmission parameters configured by the authorization configuration information to transmit data on the configured resources; while in the authorization of the second type of configuration, the terminal After the device receives the authorization configuration information, it cannot immediately use the transmission parameters configured by the authorization configuration information to transmit data on the configured resources, but can only perform data transmission when the network-side device is activated.
- NR In order to support a variety of services with different requirements for delay and reliability, NR also supports the configuration of multiple sets of authorization configuration information on the same bandwidth part, and different sets of authorizations
- the configuration information is distinguished by index or identification.
- the network side device will create an index or identification for each set of configured authorization, and carry the index or identification in the configured authorization configuration information and send it to the terminal device. It should be understood that the index or identification can be numbered starting from 0 or starting from 1.
- the activation and release of the authorizations for the multiple second configurations will be involved.
- One way to activate the authorization of the second type of configuration is that the network side device sends the downlink control information (DCI) for activating the configuration authorization to the terminal device.
- the DCI may be scrambled by the first RNTI, such as CS-RNTI, and the new data indicator (NDI) field of the DCI is set to 0, and the DCI carries an index or an authorization for indicating the second type of configuration.
- this method can only activate one set of authorizations for the second configuration among multiple sets of authorizations for the second configuration.
- the authorized DCI used to activate the second type of configuration is also referred to as activated DCI.
- the domain of the index or identifier used to indicate the authorization of the second type of configuration in the activated DCI is called the activated domain.
- the activated domain For example, when the value indicated by the activation domain is 5, it means the authorization of the second type of configuration with the activation index or the identifier of 5; when the value indicated by the activation domain is 6, it means the authorization of the second type of configuration with the activation index or the identifier of 6 .
- the active field may reuse an existing field in the DCI, such as the HARQ process number (HARQ process number) field.
- the difference from the activation of the authorization of the second type of configuration is that the release of the authorization of the second type of configuration can support the release of multiple sets of authorization of the second type of configuration, and can also support the release of multiple authorizations of the second type of configuration.
- Part of the authorization of the second type of configuration in the authorization of the second type of configuration that is, supports joint release.
- the network side device sends the DCI used to release the authorization for the second type of configuration to the terminal device. Since the DCI is used to release the authorization for the second type of configuration, the DCI can also become a release DCI.
- the released DCI can be scrambled by CS-RNTI, and the NDI field of the released DCI is set to 0.
- the DCI carries an index or identifier for indicating the authorization of the second type of configuration to indicate the release of the index or identifier corresponding to the second Authorization for class configuration.
- this method can only release one set of authorization for the second configuration among multiple sets of authorization for the second configuration.
- the release field releasing the index or identifier field used to indicate the authorization of the second type of configuration in the DCI is called the release field.
- the release field in the release of the DCI may reuse the existing field in the DCI, for example, the HARQ process number (HARQ process number) field. For example, when the value indicated by the release field is 5, it means the authorization to release the second type of configuration with the index or identifier as 5; when the value indicated by the release field is 6, it means the authorization to release the second type of configuration with the index or identifier as 6 .
- the network side device can configure a release state set, which contains one or more states (state or entry), and each state is associated with one or more sets of the second type of configuration.
- Authorization which set or sets of authorizations for the second type of configuration are specifically released is indicated by the DCI issued by the network side device.
- the DCI may include a field for indicating status, which is also called a release field, which is determined by the value indicated by the release field. Which second type of configuration authorization should be released.
- the value indicated by the release field is 5, it means that all authorizations of the second type of configuration associated with the state of the release state are 5, or if the value indicated by the release field is 6, it means that the state of the release state is 6 Authorization for all second type configurations.
- the difference between the activation of the authorization of the second type of configuration is that the release of the authorization of the second type of configuration also needs to meet the release verification (validation) condition, for example, the condition may be the redundancy version (RV) in the DCI.
- the field is set to all 0, the modulation and coding scheme (MCS) field and the frequency domain resource assignment (FDRA) field are set to all 1.
- Resource allocation type There are two types of authorized resource allocation for the second type of configuration.
- the two resource allocation types are resource allocation type 0 (resource allocation type 0) and resource allocation type 1 (resource allocation type 1).
- the network-side device can configure the resource allocation type for authorization of the second type of configuration through RRC signaling.
- the network-side device can also use RRC signaling to configure the resource allocation type of the authorization configuration of the second type of configuration to be dynamic, that is, the specific resource allocation type used by the authorization of the second type of configuration ( Resource allocation type 0 or resource allocation type 1) is additionally indicated by the network side device through DCI.
- the network side device sends the authorized DCI used to activate the second type of configuration
- the DCI is scrambled by the CS-RNTI
- the NDI field of the DCI is set to 0, and the DCI needs to meet the activation validation conditions, such as the RV in the DCI
- the domain is set to all 0s.
- the value of the FDRA field in the DCI is used to indicate the resource allocation type.
- the most significant bit (MSB) of the FDRA field can be used to indicate the resource allocation type.
- the value of the MSB is 0, which indicates the resource allocation.
- the allocation type is type 0, and the value of the MSB is 1, indicating that the resource allocation type is type 1.
- the FDRA domain is a bitmap, where each bit represents one or more frequency domain resource blocks. If the bit value is 1, it means that the corresponding frequency domain resource block is allocated to the terminal device; if the bit value is 0, it means that the corresponding frequency domain resource block is not allocated to the terminal device, so each bit in the FDRA domain Both are 0, which can be considered as an invalid frequency domain resource configuration.
- the FDRA field indicates the starting position of the frequency domain resource block allocated to the terminal device and the number of resource blocks. Therefore, each bit in the FDRA field has a value of 1, which can be considered as an invalid frequency domain resource. Configuration. For the dynamic resource allocation type, when the MSB of the FDRA domain is 0, it represents the resource allocation type 0.
- the bits of the FDRA domain are all 0, which is considered an invalid frequency domain resource configuration. Therefore, the bits of the FDRA domain All 0s indicate an invalid frequency domain resource allocation; when the MSB of the FDRA domain is 1, it represents the resource allocation type. At this time, the remaining bits of the FDRA domain are all 1s, which is considered an invalid frequency domain resource configuration. Therefore, FDRA The bits of the field are all 1, indicating invalid frequency domain resource allocation.
- “Multiple” refers to two or more than two. In view of this, “multiple” may also be understood as “at least two” in the embodiments of the present application. "At least one” can be understood as one or more, for example, one, two or more. For example, including at least one refers to including one, two or more, and does not limit which ones are included. For example, including at least one of A, B, and C, then the included can be A, B, C, A and B, A and C, B and C, or A and B and C.
- ordinal numbers such as “first” and “second” mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the order, timing, priority, or importance of multiple objects.
- the NDI field in the DCI sent by the network side device is set to 0, and the DCI is scrambled by the CS-RNTI. Therefore, for the terminal device, when the terminal device receives DCI and determines that the DCI is scrambled by CS-RNTI, and the NDI field in the DCI is set to 0, the terminal device needs to determine whether the DCI is a released DCI, that is, determine the DCI Whether to release the authorization of the second type of configuration. Refer to Table 1.
- the current judgment method is that when the terminal device receives the DCI scrambled by CS-RNTI format 0_0/0_1/0_2 and the NDI field is set to 0, the terminal device validates the DCI judge. If the RV field in the DCI is set to all 0, the MCS field is set to all 1, and the FDRA field is set to meet Table 1, the terminal device considers the DCI to be a valid release of the DCI.
- the FDRA domain is used to determine the effectiveness of DCI release. This can reduce the probability of false alarms, that is, reduce the probability of misjudging a certain DCI as the release of DCI, and increase Validate reliability.
- the premise of using the FDRA domain to improve the validation performance of the released DCI is that the value set in the FDRA domain in the released DCI is an invalid value, that is, the value will not be used to activate the DCI, otherwise the terminal may not be able to judge the reception according to the FDRA domain Is the DCI used for activation or release?
- the value of the released FDRA field in the DCI is determined according to the authorized resource allocation type of the released second type of configuration. Since the resource allocation type is configured separately for each authorization of the second type configuration, different authorizations of the second type configuration may be configured to different resource allocation types.
- the network side device simultaneously configures and activates 3 sets of authorizations of the second type configuration on an activated BWP for the terminal device. Assume that the corresponding indexes of the 3 sets of authorizations of the second type configuration are 3, 4, and 5 respectively, and The authorized resource allocation type of the second type configuration with index 3 is type 0, the authorized resource allocation type of the second type configuration with index 4 is type 1, and the authorized resource allocation type of the second type configuration with index 5 It is a dynamic type.
- the network side device configures the release state set through RRC signaling, for example, a certain state of the configuration is associated with the index of the authorization of the aforementioned three sets of second type of configurations
- the release field in the release DCI indicates this state, it means that the network side releases the authorizations of the three second-type configurations with indexes 3, 4, and 5 at the same time.
- the released three sets of authorizations of the second type of configuration correspond to different resource allocation types.
- the network side cannot determine the value of the FDRA domain according to the authorized resource allocation types of the released second type of configuration, that is, It is currently determined that the value of the FDRA field in the released DCI cannot be used in the scenario of joint release.
- the value of the released FDRA field in the DCI determined according to the authorized resource allocation type of the second type of configuration to be released may be a valid value for frequency domain resource allocation.
- the value of the HPN field in a certain DCI is 2, indicating the state of an authorization that is associated with multiple sets of second configuration (for example, two sets of second For authorization of class configuration, the resource allocation types are all type 1).
- the value of the FDRA field is determined according to the authorized resource allocation type of the released second type of configuration, and the determined value should be all 1s, because all 1s are for the two sets of second type configurations with indexes 6 and 7 In terms of authorization, they are all invalid frequency domain resource allocations.
- the value of the HPN field in the DCI may also be 2.
- the HPN field indicates the index of the authorization of the second type of configuration to be activated (for example, the authorization of the second type of configuration with an index of 2, which The resource allocation type is type 0), and the authorized resource allocation type of the second type of configuration with an index of 2 is type 0, so all 1s are effective frequency domain resource allocation.
- the HPN field and the FDRA field may have the following combinations: the HPN field takes a value of 2, and the bits of the FDRA field are all ones.
- the terminal device cannot distinguish whether the received DCI is used for activation or release according to the FDRA domain, and thus cannot use the FDRA domain to improve the verification performance of the released DCI.
- the embodiments of this application consider that in order to support the application of the authorized joint release of the second type of configuration and use the FDRA field to improve the reliability of authentication, it is necessary to make it clear that the value of the FDRA field used for release is not an active valid value. . Therefore, in the embodiment of the present application, in the DCI used for joint release, the value of the FDRA field is determined according to the authorized resource allocation type of the second configuration whose index is the same as the value of the HPN field, for example, the network side device sets it In this way, the terminal device can distinguish whether the received DCI is used for activation or release according to the FDRA field, so that the FDRA field can be used to improve the verification performance of DCI release.
- the technical solutions provided by the embodiments of the present application may be applied to 5G systems, or applied to future communication systems or other similar communication systems.
- the technical solutions provided by the embodiments of the present application can be applied to a cellular link, a PLMN network, a machine to machine (M2M) network, an Internet of things (IoT) network, or other networks. It can also be applied to links between devices, such as device-to-device (D2D) links.
- the D2D link can also be called a sidelink, and the side link can also be called a side link or a secondary link.
- the aforementioned terms all refer to links established between devices of the same type, and have the same meaning.
- the so-called devices of the same type can be the link between the terminal device and the terminal device, the link between the base station and the base station, and the link between the relay node and the relay node.
- This application The embodiment does not limit this.
- D2D links defined by the third generation partnership project (Rel)-12/13 of the third generation partnership project (3GPP), and there are also cars defined by 3GPP for the Internet of Vehicles.
- V2X link to car, car to mobile phone, or car to any entity, including Rel-14/15. It also includes the V2X link based on the NR system of Rel-16 and subsequent versions that are currently being studied by 3GPP.
- FIG. 2 is an application scenario applied by the embodiment of this application, or a network architecture applied by the embodiment of this application.
- Figure 2 includes network equipment and 6 terminal equipment. It should be understood that the number of terminal equipment in Figure 2 is only an example, and may be more or less.
- the network architecture may also include other network equipment, such as The wireless relay device and the wireless backhaul device are not shown in FIG. 2.
- a network device is an access device that a terminal device accesses to the network via wireless, and may be a base station.
- network equipment corresponds to different equipment in different systems, for example, in the fourth-generation mobile communication technology (4th-generation, 4G) system, it can correspond to eNB, and in 5G system, it can correspond to gNB; these 6 terminal devices can be cellular phones. , Smart phones, portable computers, handheld communication devices, handheld computing devices, satellite radios, global positioning systems, PDAs, and/or any other suitable devices for communicating on wireless communication systems, and all of them can be connected to network devices. These six terminal devices can all communicate with network devices. Of course, the number of terminal devices in FIG. 2 is just an example, and it may be less or more.
- the terminal device in the embodiment of the present application may be a terminal device in a connected state, or a terminal device in a non-connected state (such as an inactive INACTIVE state).
- the embodiments of the present application can be applied to uplink signal transmission, can also be applied to downlink signal transmission, and can also be applied to D2D signal transmission.
- the sending device is a network device, and the corresponding receiving device is a terminal device;
- the sending device is a terminal device and the corresponding receiving device is a network device;
- D2D signal transmission the sending device is a terminal device.
- the receiving device is also a terminal device. For example, three terminal devices as indicated by the dashed area in FIG.
- the embodiment of the present application may be suitable for D2D signal transmission, and the embodiment of the present application does not limit the direction of signal transmission.
- the embodiment of the present application may use the SPS mechanism, and for the uplink signal transmission, the embodiment of the present application may use configured authorized transmission.
- the uplink signal transmission by the terminal equipment is taken as an example, and the downlink signal transmission is similar.
- the network device may send configuration information to the terminal device, and the configuration information carries the uplink authorization, which is used to authorize the terminal to use the specified parameters on the specified time-frequency resource.
- the MCS sends the uplink data to the terminal device, and the network device receives the uplink data from the terminal device. The data of the terminal device.
- the embodiment of the present application provides a communication method. Please refer to FIG. 3, which is a flowchart of the method.
- the application of this method to the network architecture shown in FIG. 2 is taken as an example.
- the method can be executed by two communication devices, for example, the first communication device and the second communication device.
- the method is executed by a network device and a terminal device as an example, that is, an example is that the first communication device is a terminal device and the second communication device is a network device.
- the terminal device in the following may be any one of the six terminal devices in FIG. 2, and the network device in the following may be the network device in FIG. 2.
- the embodiments of the present application only take execution through network equipment and terminal equipment as an example, and are not limited to this scenario.
- the network device sends configuration information to the terminal device, and the terminal device receives the configuration information.
- the configuration information is used to configure a release state set.
- the release state set includes one or more states, and each state is associated with one or more sets of first states. Authorization of the second type of configuration.
- the network device configures the value of the FDRA field in the DCI according to the value of the first field in the DCI used for activation.
- the network device sends the DCI to the terminal device, and the terminal device receives the DCI, and the first field of the DCI indicates the first state.
- the first state is a state in the release state collection, and the first state is associated with one or more sets of authorizations of the second type of configuration.
- the first field can be considered as a field of DCI.
- the first field can be considered as the activation field, which is used to indicate the authorization of the activated second type of configuration; when the DCI is used to release the authorization of the second type of configuration.
- the first domain can be regarded as the release domain, which is used to indicate the authorization of the released second type of configuration.
- the first domain can be used for Indicates the state in the release state set.
- the first domain may be the HPN domain in the DCI or the HARQ process number domain.
- the first domain is the HPN domain as an example. It should be noted that in the embodiments of the present application, the value of a domain may also be understood as the value carried by the domain in some embodiments.
- the terminal device receives the DCI, and before performing verification, it needs to determine whether the DCI is used to activate the authorization of the second type of configuration or to release the authorization of the second type of configuration, so as to further improve the verification performance of releasing the DCI.
- the network device can send configuration information to the terminal device, and the configuration information can be used to configure the authorization to release multiple sets of the second type of configuration.
- the configuration information is used to configure a release state set.
- the release state set includes one state or multiple states, and each state can be associated with a set of authorizations for the second type of configuration or multiple sets of authorizations for the second type of configuration.
- the network device can additionally indicate through the DCI. For example, the value indicated by the first field in the DCI is 5, which means that all authorizations of the second type of configuration associated with the state of the 5 state are released.
- the resource allocation types of authorizations for multiple sets of type 2 configurations associated with the same state may be the same. If according to the prior art, the value of the FDRA field in the activated DCI is determined according to the authorization of the released type 2 configuration, the determined FDRA is The value of the domain may be valid for both the authorization to activate the second type of configuration and the authorization to release the second type of configuration. For example, two sets of authorizations of the second type configuration with the status association index of 6 and 7 in the status 5, and the resource allocation types of the authorizations of the two second types of configurations are both 1, then the FDRA for releasing the DCI is all 1.
- FDRA all 1 is effective for the activation of the authorization of the second type of configuration, which causes the network equipment or terminal equipment to be unable to distinguish whether the DCI is used for activation or release. .
- the resource allocation types of authorizations for multiple sets of second-type configurations associated with the same state may also be different. If according to the prior art, the value of the FDRA field in the activated DCI is determined according to the released authorization of the second-type configuration, because there are multiple sets of authorizations. The resource allocation types of authorizations of the second type of configuration are different, and it is impossible to determine which set of authorizations of the second type of configuration to be used. That is, the current method of determining the value of the FDRA domain is not applicable to the scenario of joint release.
- the value set in the FDRA field in the release of the DCI is an invalid value, that is, the value will not be used to activate the DCI.
- how to configure the value of the FDRA field in the release of the DCI is not defined yet .
- the embodiment of the present application may specify the value of the FDRA field in the DCI to be released, so that when the value of FDRA indicates activation, it may indicate invalid release, or when the value of FDRA indicates invalid activation When the time, it can indicate the effective release. In this way, it is possible to distinguish whether the received DCI is used for activation or release according to the FDRA domain, so that the FDRA domain can be used to improve the validation performance of the DCI release.
- the network device may configure the value of the FDRA field in the DCI according to the value of the HPN field in the DCI used to release the authorization of the second type of configuration.
- the authorized DCI used to activate the second type of configuration is referred to as activated DCI
- the authorized DCI used to release the second type of configuration is referred to as released DCI.
- the HPN domain is used to indicate the authorization of the activated second type of configuration when activating the DCI, and is used to indicate the authorization of the released second type of configuration in the release of the DCI, but the HPN domain is different in specific indication methods.
- the HPN field directly indicates a specific set of authorization of the second type of configuration to be activated, for example, indicates the index of the authorization of the second type of configuration to be activated.
- the authorization index of the second type of configuration configured by the higher layer is 1-16
- the HPN field can occupy 4 bits
- the value of the HPN field is 0-15
- a value in 0-15 corresponds to a set of authorization of the second type of configuration index of.
- the value of the HPN domain is 0, which corresponds to the authorization indicating the second type of configuration with an index of 1; the value of the HPN domain is 1, which corresponds to the authorization indicating the second type of configuration with the index of 2, and so on.
- the index of the authorization of the second type of configuration at a higher level can also be 0-15.
- the value of the HPN field is 0, which corresponds to the authorization of the second type of configuration with an index of 0; the HPN field The value of is 1, corresponding to the authorization indicating the second type of configuration with index 1, and so on.
- the HPN field can directly indicate a state in the release state set configured by the higher layer, and the authorization of one or more sets of the second type of configuration associated with the state is the authorization of the second type of configuration to be released.
- the HPN field is used to indicate a state. Specifically, if the network device does not configure the release state set for the terminal device, the HPN field in the release DCI indicates the authorized index of the second type of configuration; if the network device configures the release state set for the terminal device, release the HPN in the DCI
- the domain indicates the status, not the authorized index of a certain set of second type configuration. In the case that the HPN domain indicates a status, although the function of the HPN domain is not used to indicate a specific set of authorization for the second type of configuration, there may also be a specific set of authorization for the second type of configuration and HPN.
- the value of the domain corresponds, or the value of the HPN domain will also correspond to a specific set of authorization for the second type of configuration.
- the value of the HPN field corresponds to one.
- a set of authorizations of the second type of configuration whose index is the same as the value of the HPN, or when the index of the authorization of the second type of configuration is numbered starting from 1, the value of the HPN field corresponds to the first set of indexes that are the same as the value of HPN after subtracting 1.
- Authorization of the second type of configuration is numbered from 0
- the terminal when the terminal receives DCI and the DCI is scrambled by CS-RNTI, and the NDI value is 0, the terminal cannot determine that the DCI is an authorization for activating a certain set of type 2 configurations based on this information. It is still used to release a certain set or multiple sets of authorization for the second type of configuration, that is, the terminal cannot determine whether the HPN field in the DCI is used to indicate a certain set of authorization for the second type of configuration to be activated at this time, or for Indicates a status.
- the authorization of a specific type 2 configuration corresponding to the value of the HPN domain can also be understood as assuming that when the DCI is used to activate the authorization of the second type configuration, the value of the HPN domain is Authorization of the second type of configuration indicated.
- the HPN field is used to indicate a state.
- the authorization index of the second type of configuration is numbered from 0
- the value of the HPN field is different from the index of any set of authorization of the second type of configuration, or when the authorization of the second type of configuration is indexed
- the index number starts from 1, the value of the HPN field plus 1 is different from the authorized index of any set of the second type of configuration.
- the value of the HPN field does not indicate any set of authorization for the second type of configuration, or the value of the HPN field indicates that the authorization of the second type of configuration does not Configured by the network side device.
- the embodiment of this application aims at how to configure the value of the FDRA field used to release the DCI to be applicable to the scene of joint release. Regarding whether the value of the HPN field in the released DCI is the same as the authorized index of a certain set of second type configuration, the value of the FDRA field in the released DCI of the network device is different.
- the following respectively describes how the network device configures the release of the value of the FDRA field in the DCI when there is a certain set of authorization for the second type of configuration corresponding to the value of the HPN field in the release of the DCI; and there is no set of second type of configuration
- the authorization corresponds to the value of the HPN field in the release of the DCI
- how the network device configures the value of the FDRA field in the release of the DCI.
- a certain set of authorizations for the second type of configuration may be one set of authorizations for the second type of configuration among multiple sets of authorizations for the second type of configuration configured by the network device for the terminal device.
- the value of the HPN field in the released DCI is the same as the index of the authorization of a certain second type of configuration.
- the network device can configure to release the value of the FDRA field in the DCI according to the authorized resource allocation type of the second type of configuration whose index is the same as the value of the HPN field in the released DCI, and the authorized resource allocation type of the second type of configuration is different.
- the value of the FDRA field in the configured DCI is also different, and the following examples are introduced.
- the network device may configure the value of the FDRA field to be all 0s.
- the value of the HPN field in the released DCI is 5, and there is an authorization of the second type of configuration with an index of, for example, 5, and the resource allocation type of the authorization of the second type of configuration is 0.
- the network device configures the release state set.
- the configured release state set includes state 5, and state 5 is associated with two sets of authorizations of the second type of configuration.
- the indexes of the authorizations of the two sets of second type of configuration are 7 and 8, and the two sets of authorizations
- the authorized resource allocation type of the second type of configuration is 1. If according to the prior art, the network device determines the value of the FDRA field according to the authorized resource allocation type of the second type of configuration to be released, then the determined value of the FDRA field is all ones.
- the value of the FDRA domain is all 1, which is an effective frequency domain resource allocation for the authorization of the second type of configuration with an index of 5. Therefore, it is used to activate the DCI of the authorization of the second type of configuration with the index of 5. , It may happen that the value of the HPN field is 5 and the value of the FDRA field is all 1. In this case, in both the activated DCI and the released DCI with the HPN field value of 5, the value of FDRA may be all 1, so the terminal device cannot distinguish the function of the DCI according to the FDRA field.
- the network device can configure the value of the FDRA field in the released DCI to be all 0 according to the authorized resource allocation type of the second configuration with the index of 5, that is, 0. It should be understood that the network device configures the DCI to release the authorization of the second type of configuration.
- the value of the FDRA field in the DCI for example, the value of the MCS field and the value of the RV field in the DCI may also be configured.
- the network device configuration can configure the value of the MCS field in the DCI to be all 1s and the value of the RV field to all 0s.
- the terminal device when it is determined that the received DCI is scrambled by CS-RNTI, and the value of the NDI field of the DCI is 0, if the terminal device determines that the network device is the authorized index of a certain set of second type configuration configured by the terminal device When the value of the HPN field is the same as the value of the HPN field in the DCI, and the authorized resource allocation type of the certain set of second type configuration is 0, and the value of the FDRA field is not all 0, then the terminal device can determine that the DCI is not used to release the second Authorization for class configuration.
- the terminal device determines that the authorized index of a certain set of second configuration configured by the network device for the terminal device is the same as the value of the HPN field in the DCI, and the authorized resource allocation type of the certain set of second configuration is 0 , And it is determined that the value of the FDRA field is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration.
- the terminal device determines that the received DCI is scrambled by CS-RNTI and the value of the NDI field of the DCI is 0, if the terminal device determines that the network device is the authorized index of a certain set of second type configuration configured by the terminal device The value of the HPN field in the DCI is the same.
- the authorized resource allocation type of the second type of configuration is 0, and the terminal device determines that the value of the FDRA field in the DCI is all 0, and the value of the MCS field in the DCI is All 1, the value of the RV field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release all the second types associated with the status indicated by the HPN field in the DCI.
- Authorization for class configuration is 0, and the terminal device determines that the value of the FDRA field in the DCI is all 0, and the value of the MCS field in the DCI is All 1, the value of the RV field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release all the second types associated with the status indicated by the HPN field in the DCI.
- the network device may also configure the value of the UL-SCH field in the DCI.
- the network device configuration can configure the value of the MCS field in the DCI to be all 1s, the value of the RV field to all 0s, and the value of the UL-SCH field in the DCI to all 0s.
- the terminal device For the terminal device, if it is determined that the received DCI is scrambled by CS-RNTI, and the value of the NDI field of the DCI is 0, if the terminal device determines that the network device is a certain set of second type configuration configured by the terminal device The index of the authorization is the same as the value of the HPN field in the DCI, the authorized resource allocation type of this certain set of second configuration is 0, and the terminal device determines that the value of the FDRA field in the DCI is all 0, and the MCS in the DCI The value of the field is all 1, the value of the RV field in the DCI is all 0, and the value of the UL-SCH field in the DCI is all 0.
- the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device It is possible to release all authorizations of the second type of configuration associated with the status indicated by the HPN field in the DCI. It can be seen that this solution can be applied to the scenario of joint release, that is, the value of the FDRA field in the released DCI is explicitly configured according to the value of the HPN field in the released DCI. At the same time, the solution enables network equipment and terminal equipment to distinguish the functions of DCI, thereby improving the validation performance of DCI release.
- the network device may configure the value of the FDRA field to be all 1.
- the value of the HPN field in the release DCI is 5, and there is an authorization of the second type of configuration with an index of 5, and the resource allocation type of the authorization of the second type of configuration is 1.
- the network device configures the release state set.
- the configured release state set includes state 5, and state 5 is associated with two sets of authorizations of the second type of configuration.
- the indexes of the authorizations of the two sets of second type of configuration are 7 and 8, and the two sets of authorizations
- the authorized resource allocation type of the second type of configuration is 0. If according to the prior art, the network device determines the value of the FDRA field according to the authorized resource allocation type of the second type of configuration to be released, then the determined value of the FDRA field is all 0s.
- the value of the FDRA domain is all 0, which is an effective frequency domain resource allocation for the authorization of the second type of configuration with an index of 5. Therefore, it is used to activate the DCI of the authorization of the second type of configuration with an index of 5. , It may also happen that the value of the HPN field is 5 and the value of the FDRA field is all 0. In this case, in both the activated DCI and the released DCI with the HPN field value of 5, the value of FDRA may be all 0s, so the terminal device cannot distinguish the function of the DCI according to the FDRA field.
- the network device can configure the release of the value of the FDRA field in the DCI to be all 1s according to the authorized resource allocation type of the second configuration with the index of 5, that is, 1.
- the terminal device when it is determined that the received DCI is scrambled by CS-RNTI, and the value of the NDI field of the DCI is 0, if the terminal device determines that the network device is authorized for a certain set of type 2 configurations configured by the terminal device The index is the same as the value of the HPN field in the DCI.
- the authorized resource allocation type of the second type of configuration is 1. If it is determined that the value of the FDRA field is not all 1, the terminal device can determine that the DCI is not used to release the first configuration. Authorization of the second type of configuration.
- the terminal device determines that the authorized index of a certain set of second type configuration configured by the network device for the terminal device is the same as the value of the HPN field in the DCI, the authorized resource allocation type of the certain set of second type configuration is 1, and If it is determined that the value of the FDRA field is all 1, the terminal device can determine that the DCI is used to release the authorization of the second type of configuration.
- the terminal device determines that the received DCI is scrambled by CS-RNTI and the value of the NDI field of the DCI is 0, if the terminal device determines that the network device is the authorized index of a certain set of second type configuration configured by the terminal device The value of the HPN field in the DCI is the same.
- the authorized resource allocation type of the second type of configuration is 1, and the terminal device determines that the value of the FDRA field in the DCI is all 1, and the value of the MCS field in the DCI is all 1.
- the value of the RV field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release all the second type associated with the status indicated by the HPN field in the DCI Configured authorization. Or, for another example, when the terminal device determines that the received DCI is scrambled by CS-RNTI, and the value of the NDI field of the DCI is 0, if the terminal device determines that the network device is a certain set of second type configuration configured by the terminal device The authorized index is the same as the value of the HPN field in the DCI.
- the authorized resource allocation type of the second type of configuration is 1, and the terminal device determines that the value of the FDRA field in the DCI is all 1, and the MCS field in the DCI The value of is all 1, the value of the RV field in the DCI is all 0, and the value of the UL-SCH field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can Release all authorizations of the second type of configuration associated with the status indicated by the HPN field in the DCI. It can be seen that this solution can be applied to the scenario of joint release, that is, the value of the FDRA field in the released DCI is explicitly configured according to the value of the HPN field in the released DCI. At the same time, the solution enables network equipment and terminal equipment to distinguish the functions of DCI, thereby improving the validation performance of DCI release.
- the network device may configure the value of the FDRA field to be non-all zeros.
- the value of the HPN field in the released DCI is 5, and there is an authorization of a second type of configuration with an index of, for example, 5, and the resource allocation type of the authorization of the second type of configuration is a dynamic type.
- the network device configuration release state set includes state 5, and state 5 is associated with two sets of authorizations of the second type of configuration, and the indexes of the authorizations of the two sets of second type of configuration are 7 and 8.
- the activated DCI used to activate the authorization of the second type of configuration with the activation index of 5 the value of the FDRA field cannot be all 0s. Therefore, it is used to release the authorization of the second type of configuration associated with the release state 5.
- the FDRA field can be set to all 0s.
- the authorized index of the second type of configuration is the same as the value of the HPN field in the DCI.
- the authorized resource allocation type of the second type of configuration is dynamic.
- the terminal device can determine that the DCI is not used to release the authorization of the second type of configuration; on the contrary, if the terminal device determines that the authorization index of a certain set of second type of configuration configured by the network device for the terminal device is the same as the value of the HPN field in the DCI, The resource allocation type of the authorization of the certain set of second type configuration is dynamic. If it is determined that the value of the FDRA field in the received DCI is all 0, the terminal device can determine that the DCI is used to release the authorization of the second type configuration.
- the terminal device when it is determined that the received DCI is scrambled by CS-RNTI and the value of the NDI field of the DCI is 0, if the terminal device determines that the network device is a certain configuration of the terminal device
- the authorization index of the second type of configuration is the same as the value of the HPN field in DCI.
- the authorized resource allocation type of the second type of configuration is dynamic.
- the terminal device determines that the value of the FDRA field in the DCI is all 0, And the value of the MCS field in the DCI is all 1, and the value of the RV field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release the HPN field in the DCI. Authorization of all second-type configurations associated with the indicated state.
- the terminal device when it is determined that the received DCI is scrambled by CS-RNTI and the value of the NDI field of the DCI is 0, if the terminal device determines that the network device is a certain set of the terminal device configuration
- the authorized index of the second type of configuration is the same as the value of the HPN field in the DCI.
- the authorized resource allocation type of the second type of configuration is dynamic.
- the terminal device determines that the value of the FDRA field in the DCI is all 0, and the DCI The value of the MCS field in the DCI is all 1, the value of the RV field in the DCI is all 0, and the value of the UL-SCH field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration , The terminal device can release all authorizations of the second type of configuration associated with the status indicated by the HPN field in the DCI. It can be seen that this solution can be applied to the scenario of joint release, that is, the value of the FDRA field in the released DCI is explicitly configured according to the value of the HPN field in the activated DCI. At the same time, the solution enables network equipment and terminal equipment to distinguish the functions of DCI, thereby improving the verification performance of DCI release.
- the network device may configure the value of the FDRA field to be all ones.
- the value of the HPN field in the released DCI is 5, and there is an authorization of a second type of configuration with an index of, for example, 5, and the resource allocation type of the authorization of the second type of configuration is a dynamic type.
- the network device configuration release state set includes state 5, and state 5 is associated with two sets of authorizations of the second type of configuration, and the indexes of the authorizations of the two sets of second type of configuration are 7 and 8.
- the activated DCI used to activate the authorization of the second type of configuration with the activation index of 5 the value of the FDRA field cannot be all 1s. Therefore, it is used to release the authorization of the second type of configuration associated with the release state 5.
- the FDRA field can be set to all 1s.
- the terminal device determines that the received DCI is scrambled by CS-RNTI and the value of the NDI field of the DCI is 0, if the terminal device determines that the network device is a set of configuration for the terminal device
- the authorized index of the second type of configuration is the same as the value of the HPN field in the DCI.
- the authorized resource allocation type of the second type of configuration is dynamic. If it is determined that the value of the FDRA field in the received DCI is not all 1, Then the terminal device can determine that the DCI is not used to release the authorization of the second type of configuration; on the contrary, if it is determined that the value of the FDRA field in the received DCI is all 1, the terminal device can determine that the DCI is used to release the authorization of the second type of configuration.
- the terminal device when it is determined that the received DCI is scrambled by CS-RNTI and the value of the NDI field of the DCI is 0, if the terminal device determines that the network device is a certain configuration of the terminal device
- the authorization index of the second type of configuration is the same as the value of the HPN field in DCI.
- the authorized resource allocation type of the second type of configuration is dynamic.
- the terminal device determines that the value of the FDRA field in the DCI is all 1, And the value of the MCS field in the DCI is all 1, and the value of the RV field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release the HPN field in the DCI. Authorization of all second-type configurations associated with the indicated state.
- the terminal device when it is determined that the received DCI is scrambled by CS-RNTI and the value of the NDI field of the DCI is 0, if the terminal device determines that the network device is a certain set of the terminal device configuration
- the authorized index of the second type of configuration is the same as the value of the HPN field in the DCI.
- the authorized resource allocation type of the second type of configuration is dynamic.
- the terminal device determines that the value of the FDRA field in the DCI is all 1, and the DCI The value of the MCS field in the DCI is all 1, the value of the RV field in the DCI is all 0, and the value of the UL-SCH field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration , The terminal device can release all authorizations of the second type of configuration associated with the status indicated by the HPN field in the DCI. It can be seen that this solution can be applied to the scenario of joint release, that is, the value of the FDRA field in the released DCI is explicitly configured according to the value of the HPN field in the activated DCI. At the same time, the solution enables network equipment and terminal equipment to distinguish the functions of DCI, thereby improving the validation performance of DCI release.
- the system or standard may define the value of the FDRA field in the release DCI to be all 0s or all 1s. , Or release the value of the FDRA field in the DCI by default, all 0s or all 1s.
- the second case there is no authorization for a certain set of second type configuration that corresponds to the value of the HPN field in the released DCI.
- the value of the HPN field in the released DCI is different from the index of any set of authorization for the second type of configuration. same.
- the network device may be configured to release the value of the FDRA field in the DCI to all 0s.
- the terminal device determines that the received DCI is scrambled by CS-RNTI, and the value of the NDI field of the DCI is 0, if it is determined that the value of the FDRA field in the DCI is not all 0, then the terminal device It can be determined that the DCI is not used to release the authorization of the second type of configuration; on the contrary, if it is determined that the value of the FDRA field in the received DCI is all 0, the terminal device can determine that the DCI is used to release the authorization of the second type of configuration.
- the terminal device when it is determined that the received DCI is scrambled by the CS-RNTI, and the value of the NDI field of the DCI is 0, the value of the HPN field in the DCI is released with any set of values.
- the authorized indexes of the second type of configuration are different. If the terminal device determines that the value of the FDRA field in the DCI is all 0, and the value of the MCS field in the DCI is all 1, and the value of the RV field in the DCI is all 0, then The terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release all the authorizations of the second type of configuration associated with the state indicated by the HPN field in the DCI.
- the terminal device when it is determined that the received DCI is scrambled by the CS-RNTI, and the value of the NDI field of the DCI is 0, the value of the HPN field in the DCI is released with any set of second The authorized indexes of the class configuration are different. If the terminal device determines that the value of the FDRA field in the DCI is all 0, and the value of the MCS field in the DCI is all 1, the value of the RV field in the DCI is all 0, and the value of the RV field in the DCI is all 0.
- the value of the UL-SCH field is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release all the authorizations of the second type of configuration associated with the state indicated by the HPN field in the DCI .
- the network device may configure the value of the FDRA domain to be all ones.
- the terminal device determines that the received DCI is scrambled by the CS-RNTI, and the value of the NDI field of the DCI is 0, the value of the HPN field in the DCI and any set of authorization of the second type configuration are released If it is determined that the value of the FDRA field in the DCI is not all 1, then the terminal device can determine that the DCI is not used to release the authorization of the second type of configuration; on the contrary, if the value of the FDRA field in the received DCI is determined If it is all 1, the terminal device can determine that the DCI is used to release the authorization of the second type of configuration.
- the terminal device when it is determined that the received DCI is scrambled by the CS-RNTI and the value of the NDI field of the DCI is 0, the value of the HPN field in the DCI is released and any one The authorization indexes of the second set of configurations are not the same. If the terminal device determines that the value of the FDRA field in the DCI is all 1, and the value of the MCS field in the DCI is all 1, and the value of the RV field in the DCI is all 0, Then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release all the authorizations of the second type of configuration associated with the state indicated by the HPN field in the DCI.
- the terminal device can determine that the DCI is used to release the second type With the authorization of configuration, the terminal device can release all authorizations of the second type of configuration associated with the status indicated by the HPN field in the DCI.
- the value of the HPN field in the released DCI is not the same as the authorized index of any set of the second type of configuration, for the network side, the value of the FDRA field in the released DCI can be defaulted or defined by the system or standards. All 0, relatively speaking, for the terminal side, if the value of the FDRA field in the received DCI is not all 0, then the DCI is not used to release the authorization of the second type of configuration.
- the default or system-defined or standard-defined release of the DCI can be The value of the FDRA field is all 1, relatively speaking, for the terminal side, if the value of the FDRA field in the received DCI is not all 1, then the DCI is not used to release the authorization of the second type of configuration.
- the embodiment of the present application provides a first Two communication methods, this method is applied to the network architecture shown in FIG. 2 as an example.
- the method can be executed by two communication devices, for example, the first communication device and the second communication device.
- the method is executed by a network device and a terminal device as an example, that is, an example is that the first communication device is a terminal device and the second communication device is a network device.
- the terminal device in the following may be any one of the six terminal devices in FIG. 2, and the network device in the following may be the network device in FIG. 2.
- the embodiments of the present application only take execution through network equipment and terminal equipment as an example, and are not limited to this scenario.
- the network device can release the value of the FDRA field in the DCI according to at least one set of authorized resource allocation types associated with the state indicated by the HPN in the release DCI.
- the specific process is described as follows.
- the network device sends configuration information to the terminal device, and the terminal device receives the configuration information.
- the configuration information is used to configure a release state set.
- the release state set includes one or more states, and each state is associated with one or more sets of first states. Authorization of the second type of configuration.
- the network device configures the value of the FDRA field in the DCI to be sent to the terminal device according to at least one set of authorized resource allocation types configured in the second type.
- the network device sends the DCI to the terminal device, and the terminal device receives the DCI, and the first field of the DCI indicates the first state.
- the first state is a state in the release state set, and the first state is associated with one or more sets of authorizations of the second type of configuration.
- the release of DCI is used to release multiple sets of authorizations for the second configuration, in a possible scenario, among the authorizations for the multiple second configurations, at least two sets of authorizations for the second configuration have different resource allocation types.
- the network device and the terminal device cannot configure the value of the FDRA field according to the authorized resource allocation type of the released second configuration. That is, for the joint release scenario, there is currently no solution how to configure the FDRA field for releasing the DCI.
- the network device releases the value of the FDRA field in the DCI according to at least one set of authorized resource allocation types associated with the state indicated by the HPN field in the DCI, that is, determines how to configure Release the value of the FDRA field in the DCI to apply to the joint release scenario, so that when a state in the release state set is associated with the authorization of the second type of configuration with different resource allocation types, the FDRA field can be used for verification, thereby improving utilization The performance of the FDRA domain for validation.
- Resource allocation types include type 0, type 1, and dynamic type. According to the different types of authorized resource allocation associated with at least one set of second-type configurations associated with the status indicated by the HPN field in the DCI, the network device configuration releases the FDRA field in the DCI. The value is also different. It is assumed here that at least one set of authorization of the second type of configuration associated with the status indicated by the HPN field in the DCI includes authorizations of the second type of configuration with indexes of 6, 7, and 8, for example. The following is an example of how the network device configures and releases the value of the FDRA field in the DCI according to the different types of authorized resource allocation of this at least one set of the second type of configuration, which may include the following situations:
- the value of the FDRA field configured by the network device is all 0.
- the authorized resource allocation type of the second type of configuration with index 6 is 0, and the authorized resource allocation type of the second type of configuration with indexes of 7 and 8 is the dynamic type, and the network device can be configured to release the value of the FDRA field in the DCI.
- the authorized resource allocation type of the second type of configuration with index 6 is 0, and the authorized resource allocation type of the second type of configuration with indexes of 7 and 8 is both 1, and the network device can be configured to release the FDRA domain in the DCI The value is all 0s.
- the authorized resource allocation types of the second type of configurations with indexes of 6, 7 and 8 are all 0, and the network device may be configured to release the value of the FDRA field in the DCI to all 0s.
- the network device can configure the value of the FDRA domain to be all 0s.
- the terminal device when it is determined that the received DCI is scrambled by CS-RNTI and the value of the NDI field of the DCI is 0, if it is determined that the value of the FDRA field in the DCI is not all 0, the terminal device can determine The DCI is not used to release the authorization of the second type of configuration; on the contrary, if it is determined that the value of the FDRA field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration.
- the network device configures the DCI to release the authorization of the second type of configuration.
- the value of the FDRA field in the DCI for example, the value of the MCS field and the value of the RV field in the DCI may also be configured.
- the network device configuration can configure the value of the MCS field in the DCI to be all 1s and the value of the RV field to all 0s.
- the terminal device For the terminal device, if it is determined that the received DCI is scrambled by the CS-RNTI, and the value of the NDI field of the DCI is 0, if the first field of the DCI indicates at least one set of authorization for the second type of configuration
- the resource allocation type of includes at least type 0 and does not include type 1, and the terminal device determines that the value of the FDRA field in the DCI is all 0, the value of the MCS field in the DCI is all 1, and the value of the RV field in the DCI is All 0s, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release all the authorizations of the second type of configuration associated with the state indicated by the HPN field in the DCI.
- the terminal device determines that the value of the FDRA field in the DCI is all 0, And the value of the MCS field in the DCI is all 1, the value of the RV field in the DCI is all 0, and the value of the UL-SCH field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the second type of configuration The terminal device can release all the authorizations of the second type of configuration associated with the status indicated by the HPN field in the DCI.
- the value of the FDRA field is determined according to which resource allocation type in the authorization of multiple sets of second configurations, which can enable network equipment and terminal equipment to distinguish the function of DCI, thereby improving the release of DCI Verify performance.
- the authorized resource allocation types of the second type of configurations with indexes 6, 7 and 8 are all 0, and it can also be considered that the network device will not be the second type of configuration with the authorized configuration type of 1 or the dynamic type of resource allocation type.
- the network device can be configured to release the value of the FDRA field in the DCI to all 0s.
- the terminal device when it is determined that the value of the FDRA field in the DCI is not all 0s, the terminal device can determine that the DCI is not used to release the authorization of the second type of configuration.
- the network device configures the value of the FDRA field to be all 1.
- the authorized resource allocation type of the second type of configuration with index 6 is 1, and the authorized resource allocation type of the second type of configuration with indexes of 7 and 8 is dynamic type.
- the authorized resource allocation type of the second type of configuration with an index of 6 is 1, and the authorized resource allocation types of the second type of configuration with indexes of 7 and 8 are both 1.
- the authorized resource allocation types of the second type of configurations with indexes of 6, 7, and 8 are all 1.
- the network device can all configure the value of the FDRA domain to be all ones.
- the terminal device determines that the received DCI is scrambled by CS-RNTI and the value of the NDI field of the DCI is 0, if it is determined that the value of the FDRA field in the received DCI is not all 1, then the terminal device can determine that the DCI is not used To release the authorization of the second type of configuration.
- the value of the FDRA field in the DCI is determined to be released according to which resource allocation type in the authorizations of multiple sets of second configurations, so that the network equipment and the terminal equipment can distinguish the functions of the DCI, so that the function of the DCI can be distinguished. Improve the verification performance of the release of DCI.
- the authorized resource allocation type of the second type of configuration with indexes 6, 7 and 8 is all 1, and it can also be considered that the network device will not be the second type of configuration.
- the authorized configuration type is 0 or the dynamic type of resource allocation type.
- the network device can be configured to release the value of the FDRA field in the DCI to all 1s.
- the terminal device when it is determined that the value of the FDRA field in the DCI is not all 0s, the terminal device can determine that the DCI is not used to release the authorization of the second type of configuration; on the contrary, if it is determined that the value of the FDRA field in the DCI is All 0s, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration.
- the terminal device when it is determined that the received DCI is scrambled by the CS-RNTI and the value of the NDI field of the DCI is 0, if the first field of the DCI indicates at least one set of first
- the authorized resource allocation type of the second configuration includes at least type 1, and does not include type 0, and the terminal device determines that the value of the FDRA field in the DCI is all 0, and the value of the MCS field in the DCI is all 1, and the value of the MCS field in the DCI is all 1.
- the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release all the authorizations of the second type of configuration associated with the state indicated by the HPN field in the DCI.
- the authorized resource allocation type of at least one set of type 2 configurations indicated by the first field of the DCI includes at least type 1, and does not include type 0, and the terminal device determines that the value of the FDRA field in the DCI is all 0, and The value of the MCS field in the DCI is all 1, the value of the RV field in the DCI is all 0, and the value of the UL-SCH field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the second type of configuration Authorization, the terminal device can release all authorizations of the second type of configuration associated with the status indicated by the HPN field in the DCI.
- the network device can allocate authorized resources according to the specific second type of configuration
- the allocation type determines the value of the FDRA field.
- the resource allocation type of at least one set of authorization of the second type of configuration includes at least type 0 and type 1
- a set of authorization of the second type of configuration is specified, and the network device adopts the second type of authorization by default.
- the configured authorized resource allocation type is configured to release the value of the FDRA field in the DCI.
- the network device does not know which type of authorized resource allocation type of the second type of configuration is used to configure the value of the FDRA field. Through this scheme, it is specified to configure the FDRA Authorization of the second type of configuration of the value of the domain.
- the authorized resource allocation type of the second type of configuration with index 6 is 0, and the authorized resource allocation type of the second type of configuration with indexes of 7 and 8 is 1.
- the authorized resource allocation type of the second type configuration with index 6 is 0, the authorized resource allocation type of the second type configuration with index 7 is dynamic type, and the authorized resource allocation type of the second type configuration with index 8 is 0.
- the type is 1.
- the network device can configure to release the value of the FDRA field in the DCI to all 0.
- the terminal device determines that the received DCI is scrambled by CS-RNTI, and the value of the NDI field of the DCI is 0, if it is determined that the value of the FDRA field in the DCI is not all 0, the terminal device can determine The DCI is not used to release the authorization of the second type of configuration; on the contrary, if it is determined that the value of the FDRA field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration.
- the terminal device when it is determined that the received DCI is scrambled by the CS-RNTI and the value of the NDI field of the DCI is 0, if the first field of the DCI indicates at least one set of first
- the authorized resource allocation types of the second configuration include at least type 1 and type 0, and the terminal device determines that the value of the FDRA field in the DCI is all 0, and the value of the MCS field in the DCI is all 1, and the value of the RV field in the DCI is all 1. If the value is all 0, the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release all the authorizations of the second type of configuration associated with the state indicated by the HPN field in the DCI.
- the terminal device determines that the value of the FDRA field in the DCI is all 0, and the value in the DCI is The value of the MCS field is all 1, the value of the RV field in the DCI is all 0, and the value of the UL-SCH field in the DCI is all 0. Then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal The device can release all authorizations of the second type of configuration associated with the status indicated by the HPN field in the DCI.
- the network device can configure the value of the FDRA domain to be all 1. .
- the terminal device determines that the received DCI is scrambled by CS-RNTI and the value of the NDI field of the DCI is 0, if it is determined that the value of the FDRA field in the DCI is not all 1, then the terminal device can determine that the DCI is not used for Release the authorization of the second type of configuration; on the contrary, if it is determined that the value of the FDRA field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration.
- the authorized index of the second type of configuration specified above may be selected according to a predefined rule.
- the specified authorized index of the second type of configuration may be the smallest index among the multiple sets of authorized indexes of the second type of configuration configured by the network device for the terminal device, or it may be the multiple sets of second type configured by the network device for the terminal device.
- the specified authorized index of the second type of configuration is the smallest index or the largest index in at least one set of authorized indexes of the second type of configuration associated with the state indicated by the HPN field of the DCI.
- the authorized index of the specified second type of configuration satisfies the preset rule among the multiple sets of authorized indexes of the second type of configuration configured by the network device for the terminal device; another example is the authorized index of the specified second type of configuration.
- the index satisfies the preset rule in at least one set of authorized indexes of the second type configuration associated with the status indicated by the HPN field of the DCI.
- the preset rule may be, for example, the smallest index or the largest index, or other possible preset rules, as long as the FDRA domain in the DCI is released according to the authorized resource allocation type of the second type of configuration determined according to the preset rule When the value of is valid for activating DCI, it is invalid for releasing DCI. On the contrary, when activating DCI is invalid, it is valid for releasing DCI.
- the terminal device when it is determined that the received DCI is scrambled by the CS-RNTI and the value of the NDI field of the DCI is 0, if the first field of the DCI indicates at least one set of first
- the authorized resource allocation types of the second configuration include at least type 1 and type 0, and the terminal device determines that the value of the FDRA field in the DCI is all 0, and the value of the MCS field in the DCI is all 1, and the value of the RV field in the DCI is all 1. If the value is all 0, the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release all the authorizations of the second type of configuration associated with the state indicated by the HPN field in the DCI.
- the terminal device determines that the value of the FDRA field in the DCI is all 0, and the value in the DCI is The value of the MCS field is all 1, the value of the RV field in the DCI is all 0, and the value of the UL-SCH field in the DCI is all 0. Then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal The device can release all authorizations of the second type of configuration associated with the status indicated by the HPN field in the DCI.
- the network device may also be based on a specific second type.
- the configured authorized resource allocation type determines the value of the FDRA domain.
- the network device may determine that the value of the FDRA field in the DCI is released. 0, it can also be understood that the network device releases the value of the FDRA field in the DCI by default to all 0s.
- the terminal device when the terminal device determines that the received DCI is scrambled by CS-RNTI, and the value of the NDI field of the DCI is 0, at least one set of the second type of configuration associated with the status indicated by the HPN field in the DCI
- the authorized resource allocation types include at least type 0 and type 1.
- the terminal device determines that the value of the FDRA field in the DCI is not all 0, the terminal device can determine that the DCI is not used to release the authorization of the second type of configuration; on the contrary, if If it is determined that the value of the FDRA field in the DCI is all 0, the terminal device can determine that the DCI is used to release the authorization of the second type of configuration.
- the terminal device when it is determined that the received DCI is scrambled by the CS-RNTI and the value of the NDI field of the DCI is 0, if the first field of the DCI indicates at least one set of first
- the authorized resource allocation types of the second configuration include at least type 1 and type 0, and the terminal device determines that the value of the FDRA field in the DCI is all 0, and the value of the MCS field in the DCI is all 1, and the value of the RV field in the DCI is all 1. If the value is all 0, the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release all the authorizations of the second type of configuration associated with the state indicated by the HPN field in the DCI.
- the terminal device determines that the value of the FDRA field in the DCI is all 0, and the value in the DCI is The value of the MCS field is all 1, the value of the RV field in the DCI is all 0, and the value of the UL-SCH field in the DCI is all 0. Then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal The device can release all authorizations of the second type of configuration associated with the status indicated by the HPN field in the DCI.
- the network device may determine to release the value of the FDRA field in the DCI to all 1. It can also be understood that the network device releases the value of the FDRA field in the DCI by default with all 1s.
- the terminal device when the terminal device determines that the received DCI is scrambled by CS-RNTI, and the value of the NDI field of the DCI is 0, at least one set of the second type of configuration associated with the status indicated by the HPN field in the DCI
- the authorized resource allocation types include at least type 0 and type 1.
- the terminal device can determine that the DCI is not used to release the authorization of the second type of configuration; on the contrary, if it is determined that this The value of the FDRA field in the DCI is all 1, and the terminal device can determine that the DCI is used to release the authorization of the second type of configuration.
- the terminal device when it is determined that the received DCI is scrambled by the CS-RNTI and the value of the NDI field of the DCI is 0, if the first field of the DCI indicates at least one set of first
- the authorized resource allocation types of the second configuration include at least type 1 and type 0, and the terminal device determines that the value of the FDRA field in the DCI is all 1, and the value of the MCS field in the DCI is all 1, and the value of the RV field in the DCI is all 1. If the value is all 0, the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release all the authorizations of the second type of configuration associated with the state indicated by the HPN field in the DCI.
- At least one set of authorized resource allocation types of the second configuration indicated by the first field of the DCI includes at least type 1 and type 0, and the terminal device determines that the value of the FDRA field in the DCI is all 1, and the value of the FDRA field in the DCI is all 1.
- the value of the MCS field is all 1
- the value of the RV field in the DCI is all 0
- the value of the UL-SCH field in the DCI is all 0.
- the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal The device can release all authorizations of the second type of configuration associated with the status indicated by the HPN field in the DCI.
- the foregoing fourth example and fifth example can be considered for the case where the authorized resource allocation type for at least one set of second type configuration includes at least type 0 and type 1, and the network device releases the value of the FDRA field in the DCI by default. 0.
- the terminal device defaults that when the value of the FDRA field in the DCI is not all 0s, the DCI is not used to release the authorization of the second type of configuration; or, the above fourth and fifth examples can also be considered for at least one set of second
- the authorized resource allocation type of the class configuration includes at least type 0 and type 1.
- the network device releases the value of the FDRA field in the DCI by default to all 1, and the terminal device defaults when the value of the FDRA field in the DCI is not all 1.
- the DCI is not used to release the authorization of the second type of configuration.
- the network device may configure to release the value of the FDRA field in the DCI to all 0s.
- the terminal device determines that the received DCI is scrambled by CS-RNTI, and the value of the NDI field of the DCI is 0, and the status indicated by the HPN field in the DCI is associated with at least one set of authorization for the second type of configuration
- the resource allocation types of are all dynamic types, if it is determined that the value of the FDRA field in the DCI is not all 0s, then the terminal device can determine that the DCI is not used to release the authorization of the second type of configuration; on the contrary, if the DCI is determined to be The value of the FDRA field is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration.
- the terminal device when it is determined that the received DCI is scrambled by the CS-RNTI and the value of the NDI field of the DCI is 0, the status indicated by the HPN field in the DCI is at least When the authorized resource allocation types of a set of type 2 configurations are all dynamic types, and the terminal device determines that the value of the FDRA field in the DCI is all 0, and the value of the MCS field in the DCI is all 1, and the RV field in the DCI is If the value of is all 0, the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release all the authorizations of the second type of configuration associated with the state indicated by the HPN field in the DCI.
- the terminal device determines that the value of the FDRA field in the DCI is all 0, and the DCI The value of the MCS field in the DCI is all 1, the value of the RV field in the DCI is all 0, and the value of the UL-SCH field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, The terminal device can release all authorizations of the second type of configuration associated with the status indicated by the HPN field in the DCI.
- the network device may configure to release the value of the FDRA field in the DCI to all 1s.
- the terminal device when the terminal device determines that the received DCI is scrambled by CS-RNTI, and the value of the NDI field of the DCI is 0, at least one set of the second type of configuration associated with the status indicated by the HPN field in the DCI
- the authorized resource allocation types are all dynamic types, if it is determined that the value of the FDRA field in the DCI is not all 1, then the terminal device can determine that the DCI is not used to release the authorization of the second type of configuration; on the contrary, if it is determined that the DCI is If the value of the FDRA field is all 1, the terminal device can determine that the DCI is used to release the authorization of the second type of configuration.
- the terminal device when it is determined that the received DCI is scrambled by CS-RNTI and the value of the NDI field of the DCI is 0, if at least one set of authorized resources configured in the second type is The allocation types are all dynamic types, and the terminal device determines that the value of the FDRA field in the DCI is all 1, and the value of the MCS field in the DCI is all 1, and the value of the RV field in the DCI is all 0, then the terminal device can determine The DCI is used to release the authorization of the second type of configuration, and the terminal device can release all the authorizations of the second type of configuration associated with the state indicated by the HPN field in the DCI.
- the terminal device determines that the value of the FDRA field in the DCI is all 1, and the value of the MCS field in the DCI is all 1, the value of the MCS field in the DCI is all 1.
- the value of the RV field in the DCI is all 0, and the value of the UL-SCH field in the DCI is all 0, then the terminal device can determine that the DCI is used to release the authorization of the second type of configuration, and the terminal device can release the indication of the HPN field in the DCI
- the sixth example and the seventh example above can be considered that when the authorized resource allocation types for at least one set of the second type of configuration are all dynamic types, the network device is configured to release the value of the FDRA field in the DCI to all 0s, and the DCI Used to release the authorization of the second type of configuration.
- the network device is configured to release the value of the FDRA field in the DCI to all 1, and the DCI is used to release the authorization of the second configuration.
- the network device is configured to release the value of the FDRA field in the DCI to all 1, and the DCI is used to release the authorization of the second configuration.
- the value of the FDRA field in the DCI is not all 1, it is determined that the DCI is not used to release the authorization of the second type of configuration.
- the network device can also The value of the FDRA field in the DCI to be released is determined according to the authorized resource allocation type of at least one set of the second type of configuration associated with the release of the DCI.
- the value of the FDRA field in the DCI to be released is determined according to the authorized resource allocation type of at least one set of the second type of configuration associated with the release of the DCI.
- the value of the FDRA field can be determined according to the authorized resource allocation type of a specific set of second configuration corresponding to the value of the HPN field in the released DCI, so that the received data can be distinguished according to the FDRA field. Whether the DCI is used for activation or release, so as to use the FDRA domain to improve the verification performance of releasing the DCI.
- the embodiment of the present application can also determine the value of the FDRA field according to one or some resource allocation types of multiple sets of authorizations associated with the state indicated by the HPN field in the DCI. It is applicable to the way to clarify the value of FDRA in the joint release scenario.
- the NR system supports a repeated transmission method based on mini time slots, that is, in a time slot, a terminal device is allowed to repeatedly send the same data packet multiple times.
- This repeated transmission method can reduce the cost of the data packet. Transmission delay.
- this repetitive transmission method may also be referred to as PUSCH repetition Type B.
- multiple repetitive nominal repetitive resources allocated to the terminal device by the network device for sending the same data packet multiple times are continuous in the time domain.
- a nominal repetition resource used to send a repetition may contain unusable symbols (such as downlink symbols, etc.), or contain slot boundaries, a nominal repetition resource will be split into multiple actuals (actual) Repeated resources, where each actual repeated resource is used for one repeated transmission.
- the actual number of repeated transmissions of the terminal device may be greater than the number of nominal repeated resources.
- Figure 5 is a schematic diagram of the relationship between a nominal duplicate resource and an actual duplicate resource.
- Figure 5 takes 4 nominal repetitive resources as an example. Since the nominal repetitive resource 2 contains the time slot boundary, the nominal repetitive resource 2 is split into two actual repetitive resources, that is, the actual repetitive resource 2 and Actually repeat resource 3. Since a nominal repetitive resource will be split into multiple actual (actual) repetitive resources, the actual number of repetitive transmissions of the terminal device may be greater than the number of nominal repetitive resources, which requires the determination of the nominal repetitive resource and based on the determined nominal repetitive resource. The actual duplicate resources are used to transmit data.
- the embodiment of the present application provides a method for determining the time domain position of a nominal repetitive resource.
- the method can determine the time domain position of a nominal repetitive resource according to the repetition period of multiple nominal repetitive resources in the time domain, and then can determine the time domain position of the nominal repetitive resource according to the time domain.
- the location determines the time domain location of the actual repeated resource, that is, determines the actual repeated resource for data transmission.
- FIG. 6 is a schematic flow chart of a data sending method provided by an embodiment of this application. The flow of the method is described as follows:
- the network device sends configuration information to the terminal device, where the configuration information can be used to configure time domain resources, and the configuration information includes a period parameter, and the period parameter is used to indicate the repetition period of multiple nominal repetitive resources in the time domain.
- the terminal device determines the time domain location of the first nominal repeated resource according to the configuration information.
- S603 The terminal device determines the time domain position of the first actual repeated resource according to the time domain position of the first nominal repeated resource.
- S604 The terminal device sends data on the first actual repeated resource.
- the terminal device When the terminal device sends data, it needs to determine the actual repetitive resource, which needs to determine the time domain position of the nominal repetitive resource.
- the system can predefine the starting time slot and nominal repetition where the start symbol of the nominal repetitive resource is located. The start symbol of the resource in the start time slot, the end time slot where the end symbol of the nominal repetitive resource is located, and the condition that the end symbol of the nominal repetitive resource in the end time slot satisfies, so that the terminal device determines the nominal value based on the condition The time domain location of the duplicate resource.
- n 0,...,K-1
- K is the number of nominal repetitive resources
- K can be determined according to the number of repetitions parameter repK
- It can also be determined according to time domain allocation parameters.
- a network device configures a time domain resource allocation table through high-level signaling. Each row in the table contains the number of repetitions. The time domain resource allocation parameter indicates the used The row number in the table.
- the terminal device can determine the start symbol of the nth nominal repetitive resource in the mth period according to the period size p and the period number m The start time slot where the nth nominal repetitive resource is located, the start symbol of the nth nominal repetitive resource in the start time slot, and the end time slot where the end symbol of the nth nominal repetitive resource in the mth period is determined, And the end symbol of the nth nominal repeat resource in the end time slot.
- the method of determining the time domain position of the nominal repeated resource according to the time domain resource configured by the network device for the terminal device may include several methods:
- Manner 1 In some embodiments, the number of the start time slot of the nth nominal repetition resource satisfies formula (1), and the number of the start symbol of the nth nominal repetition resource in the start time slot satisfies Formula (2), the number of the end time slot of the nth nominal repetitive resource satisfies formula (3), and the end symbol of the number of the nth nominal repetitive resource in the end time slot satisfies the formula (4):
- P is the period indicated by the period parameter included in the configuration information
- m is the number of the period or repetitive bundling
- m ⁇ 0 L is the number of symbols of a nominal repetitive resource
- N is every The number of symbols in a time slot
- n is the number of the nominal repetitive resource
- K s is determined according to the time domain resource offset parameter in the configuration information.
- S is the number of the start symbol of the nth nominal repeating resource
- S is the end symbol of the nth nominal repeating resource serial number.
- S and L can be determined by time-domain resource allocation parameters.
- a network device configures a time-domain resource allocation table through high-level signaling. Each row in the table contains S and L.
- the time-domain resource allocation parameter indicates the used table According to the line number, S and L can be determined.
- N is the number of symbols in each slot. In some embodiments, N can also be used To represent.
- a variation of formula (1) can be:
- a variation of formula (2) can be: mod(S+n ⁇ L, N);
- a variation of formula (3) can be:
- a variation of formula (4) can be: mod(S+(n+1) ⁇ L-1, N).
- K s is also different.
- the following introduces K s in two different scenarios.
- the configuration information is used to configure the authorization of the first type of configuration
- K s is one of the following:
- K s is equal to the time domain resource offset indicated by the time domain resource offset parameter in the configuration information.
- K s is the number of the first time slot in the first frame, and the frame number of the first frame is The number of the first time slot is mod(M, M1), where M is determined by the time domain resource offset indicated by the time domain resource offset parameter in the configuration information, and M1 is the number of time slots included in one frame.
- M can be represented by timeDomainOffset, and M1 can be represented by To represent. That is, the frame number of the first frame is The number of the first time slot is
- the configuration information is used to configure the authorization of the second type of configuration. It should be understood that if the configuration information is used to configure the authorization of the second type of configuration, the network device can send DCI to the terminal device to indicate which authorization of the second type of configuration is configured. , K s satisfies formula (5) at this time:
- n 0 slot to receive a downlink control information where, u pusch PUSCH sub-carrier spacing is disposed, u pdcch is the subcarrier spacing PDCCH configuration.
- DCI downlink control information
- u pusch and u pdcch can be located in [0, 4].
- Manner 2 In some embodiments, the number of the start time slot of the nth nominal repetition resource satisfies formula (6), and the number of the start symbol of the nth nominal repetition resource in the start time slot satisfies Formula (7), the number of the end time slot of the nth nominal repetitive resource satisfies formula (8), and the number of the end symbol of the nth nominal repetitive resource in the end time slot satisfies the formula (9):
- the start time slot of the nth nominal repetitive resource is related to the start time slot of the mth periodic nominal repetitive resource.
- K ms is the number of the starting time slot of the nominal repetitive resource in the m-th period.
- S m is the number of the start symbol of the nth nominal repetitive resource in the m-th period, and S m satisfies the formula: mod(S+m ⁇ P, N)
- S m is the number of the end symbol of the n-th nominal repetitive resource in the m-th period, and S m satisfies the formula: mod(S+m ⁇ P, N).
- K ms is also different.
- the following two different scenarios introduce K ms .
- the configuration information is used to configure the authorization of the first type of configuration, and K ms satisfies any of the following formulas:
- K ms is the first time slot in the first frame, the frame number of the first frame satisfies formula (12), and the number of the first time slot satisfies formula (13):
- the configuration information is used to configure the authorization of the second type of configuration, and K ms satisfies any of the following formulas:
- K ms is the first time slot in the first frame, the frame number of the first frame satisfies formula (16), and the number of the first time slot satisfies formula (17):
- K s satisfies K s n 0 is the time slot where the terminal device receives DCI, u pusch and u pdcch are the sub-carrier spacing configuration of PUSCH and PDCCH respectively, and the definitions of S, P, N, M and M1 are the same as in the first way, so I won’t repeat them here. .
- Mode 3 is different from Mode 1 and Mode 2.
- the terminal device can determine the start symbol of the first nominal repetitive resource, the system frame number and time slot symbol where the start symbol is located, and determine the first nominal repetitive resource Change the end symbol, the system frame number and time slot symbol where the end symbol is located, and then determine the time domain position of the first nominal repetitive resource.
- the configuration information is used to configure the authorization of the first type of configuration, the symbol index ssymbol index of the start symbol of the first nominal repetitive resource, and the frame number sSFN of the system frame where the start symbol is located and the start
- the time slot index sslot index of the time slot in which the symbol is located satisfies the formula:
- the symbol index esymbol index of the end symbol of the first nominal repeated resource, the frame number eSFN of the system frame where the end symbol is located, and the time slot index eslot index of the time slot where the end symbol is located satisfy the following formula:
- M is determined by the time domain resource offset of the first nominal repetitive resource
- M1 is the number of time slots in a frame
- N is the number of symbols in each time slot
- P is the repetition period of multiple nominal repetitive resources.
- Cycle size m is the number of the cycle
- S1 is the number of the start symbol of the nth nominal repetitive resource
- S2 is the number of the end symbol of the nth nominal repetitive resource
- L is the number of symbols of a nominal repetitive resource
- n is The number of the nominal duplicate resource.
- the configuration information is used to configure the authorization of the second type of configuration, the symbol index ssymbol index of the start symbol of the first nominal repetitive resource, and the frame number sSFN of the system frame where the start symbol is located and the start symbol the slot index where symbols beginning slot sslot index satisfies:
- the symbol index esymbol index of the end symbol of the first nominal repetitive resource, the frame number eSFN of the system frame where the end symbol is located, and the time slot index eslot index of the time slot where the end symbol is located satisfy:
- M is determined by the time domain resource offset of the first nominal repetitive resource
- the M1 is the number of time slots included in a frame
- N is the number of symbols in each time slot
- the downlink control information DCI received by SFN start is located
- P is the period size of the repetition period of multiple nominal repetitive resources
- m is the period number
- S1 is the number of the start symbol of the nth nominal repetitive resource
- S2 is the end of the nth nominal repetitive resource
- L is the number of symbols of a nominal repetitive resource
- n is the number of the nominal repetitive resource
- K s is the number of the starting time slot of the first nominal repetitive resource.
- the foregoing embodiment provides three ways for the terminal device to determine the actual repetitive resources, so as to send data on the actual repetitive resources, and try to ensure the reliability of data transmission.
- the methods provided in the embodiments of the present application are respectively introduced from the perspective of interaction between the network device and the terminal device.
- the network device and the terminal device may include a hardware structure and/or software module, and the above functions are implemented in the form of a hardware structure, a software module, or a hardware structure plus a software module . Whether a certain function among the above-mentioned functions is executed by a hardware structure, a software module, or a hardware structure plus a software module depends on the specific application and design constraint conditions of the technical solution.
- FIG. 7 is a schematic block diagram of a communication device 700 according to an embodiment of the application.
- the communication apparatus 700 can correspondingly implement the functions or steps implemented by the network device or the terminal device in the foregoing method embodiments.
- the communication device may include a transceiving unit 710 and a processing unit 720.
- a storage unit may also be included, and the storage unit may be used to store instructions (code or program) and/or data.
- the transceiving unit 710 and the processing unit 720 may be coupled with the storage unit.
- the processing unit 720 may read instructions (codes or programs) and/or data in the storage unit to implement corresponding methods.
- the above-mentioned units can be set independently, or partly or fully integrated.
- the communication apparatus 700 can correspondingly implement the behaviors and functions of the terminal device in the foregoing method embodiments.
- the communication apparatus 700 may be a terminal device, or a component (such as a chip or a circuit) applied to the terminal device.
- the transceiving unit 710 and the processing unit 720 can be used to perform all the receiving or sending operations performed by the terminal device in the embodiment shown in FIG. 3.
- the transceiving unit 710 is used to perform S301 and S302 in the embodiment shown in FIG. 3 , And/or other processes used to support the technology described herein.
- the processing unit 720 is configured to perform all operations performed by the terminal device in the embodiment shown in FIG. 3 except for the transceiving operation, and/or other processes used to support the technology described herein.
- the transceiver unit 710 is configured to receive configuration information from the network device, the configuration information is used to configure a release state set, the release state set includes at least one state, and each state in the at least one state is associated with at least one set of first states. Authorization of the second type of configuration;
- the transceiver unit 710 is configured to receive downlink control information DCI from a network device, the first field of the DCI indicates the first state, the DCI is scrambled by the first RNTI, and the new data of the DCI indicates that the value of the NDI field is 0;
- the processing unit 720 is configured to release at least one set of authorization of the second type configuration associated with the first state when the DCI meets the following preset conditions, where the preset conditions include:
- the value of the first field in the DCI is the same as the index of the authorization of a set of second type configurations, and the authorized resource allocation type of the second type of configuration is 0, and the frequency domain resource allocation FDRA field in the DCI The value of is all 0; or,
- the value of the first field in the DCI is the same as the index of a set of authorizations for the second type of configuration, and the authorization resource allocation type of the set of second types of configuration is 1, and the value of the FDRA field in the DCI is all 1; or,
- the value of the first field in the DCI is the same as the index of the authorization of a set of second type configurations, and the resource allocation type of the authorization of the second type of configuration is dynamic, and the value of the FDRA field in the DCI Is all 0; or,
- the value of the first field in the DCI is the same as the index of a set of authorization of the second type of configuration, and the resource allocation type of the authorization of the set of second type of configuration is dynamic, and the value of the FDRA field in the DCI is All 1; or,
- the value of the first field in the DCI is different from the index of any set of authorizations of the second type configuration, and the value of the FDRA field in the DCI is all 0; or,
- the value of the first field in the DCI is different from the index of any set of authorization of the second type of configuration, and the value of the FDRA field in the DCI is all 1.
- the authorization for the second type of configuration is one of the authorizations for the second type of configuration configured by the network device for the terminal device; or,
- the authorization of the second type of configuration is a set of authorization of the second type of configuration in the second type of configuration authorization associated with the first state.
- the authorization of the second type of configuration may be a specific authorization of the second type of configuration, for example, the index of the authorization of the second type of configuration is multiple sets of configurations configured by the network device for the terminal device. The smallest index or the largest index among the authorized indexes of the second type of configuration; or,
- the authorized index of the second type of configuration is the smallest index or the largest index among the at least one authorized index of the second type of configuration associated with the first state; or,
- the authorized index of the second type configuration satisfies the preset rule among the multiple authorized indexes of the second type configuration configured by the network device for the terminal device; or,
- the authorized index of the second type configuration satisfies a preset rule in the at least one authorized index of the second type configuration associated with the first state.
- the preset condition further includes:
- the value of the MCS field in the DCI is all 1s, and the value of the RV field of the DCI is all 0s.
- the preset condition further includes:
- the value of the UL-SCH field in the DCI is all 0s.
- the first RNTI includes CS-RNTI.
- the transceiver unit 710 is configured to receive configuration information from the network device, the configuration information is used to configure a release state set, the release state set includes at least one state, and each state in the at least one state is associated with at least one set Authorization of the second type of configuration;
- the transceiver unit 710 is configured to receive downlink control information DCI from a network device.
- the first field of the DCI indicates the authorization of one or more sets of type 2 configurations associated with the state in the release state set.
- the DCI is scrambled by the first RNTI, And the new data of DCI indicates that the value of the NDI field is 0;
- the processing unit 720 is configured to: when the value of the first field in the DCI is the same as the index of a set of authorizations of the second type of configuration, and the value of the frequency domain resource allocation FDRA field in the DCI meets the preset condition , It is determined that DCI is not used to release the authorization of the second type of configuration, where the preset conditions include:
- the authorized resource allocation type of the second type of configuration is type 0, and the value of the FDRA field is not all 0, or;
- the authorized resource allocation type of the second type of configuration is type 1, and the value of the FDRA field is not all 1, or;
- the authorized resource allocation type of the second type of configuration is dynamic, and the value of the FDRA field is not all 0; or,
- the authorized resource allocation type of this second type of configuration is the dynamic type, and the value of the FDRA field is not all 1s;
- the authorization for the second type of configuration is one of the authorizations for the second type of configuration configured by the network device for the terminal device; or,
- the authorization of the second type of configuration is a set of authorization of the second type of configuration in the second type of configuration authorization associated with the first state.
- the authorization of the second type of configuration may be a specific authorization of the second type of configuration, for example, the index of the authorization of the second type of configuration is multiple sets of configurations configured by the network device for the terminal device. The smallest index or the largest index among the authorized indexes of the second type of configuration; or,
- the authorized index of the second type configuration is the smallest index or the largest index among the at least one authorized index of the second type configuration associated with the first state; or,
- the authorized index of the second type configuration satisfies the preset rule among the multiple authorized indexes of the second type configuration configured by the network device for the terminal device; or,
- the authorized index of the second type configuration satisfies a preset rule in the at least one authorized index of the second type configuration associated with the first state.
- the first RNTI includes CS-RNTI.
- the processing unit 720 is configured to: when the value of the first field in the DCI is different from the index of any set of authorizations of the second type of configuration, and the value of the FDRA field in the frequency domain resource allocation in the DCI meets the predetermined Set conditions to determine that DCI is not used to release the authorization of the second type of configuration.
- the preset conditions include:
- the value of the FDRA field is not all 0s, or the value of the FDRA field is not all 1s.
- the transceiver unit 710 is configured to receive configuration information and DCI from the network device.
- the configuration information is used to configure a release state set.
- the release state set includes at least one state, and each state in the at least one state is associated with at least A set of authorization for the second type of configuration; the first field of the DCI indicates the first state, the DCI is scrambled by the first RNTI, and the value of the NDI field of the DCI is 0;
- the processing unit 720 is configured to determine that the DCI is not used to release the authorization of the second type of configuration when the value of the frequency domain resource allocation FDRA field in the DCI meets any one of the following preset conditions, where the preset conditions include:
- the authorized resource allocation type of at least one set of the second type configuration associated with the first state includes at least type 0 and does not include type 1, and the value of the FDRA field is not all 0; or,
- the authorized resource allocation type of at least one set of the second type configuration associated with the first state includes at least type 1, and does not include type 0, and the value of the FDRA field is not all 1; or,
- At least one set of authorized resource allocation types of the second type configuration associated with the first state includes at least type 0 and type 1, and at least one set of authorizations associated with the first state of the second type configuration is authorized for a specific second type configuration
- the resource allocation type of is type 0, the value of the FDRA field is not all 0, the authorized resource allocation type of the specific type 2 configuration is type 1, and the value of the FDRA field is not all 1; or,
- the authorized resource allocation types of at least one set of the second type configuration associated with the first state include at least type 0 and type 1, and the value of the FDRA field is not all 0; or,
- the authorized resource allocation types of at least one set of second type configurations associated with the first state include at least type 0 and type 1, and the value of the FDRA field is not all 1; or,
- At least one set of authorized resource allocation types associated with the second type of configuration associated with the first state are all dynamic types, and the value of the FDRA field is not all 0; or,
- the authorized resource allocation types of at least one set of the second configuration associated with the first state are all dynamic types, and the value of the FDRA field is not all 1.
- the specific authorized index of the second type of configuration is the smallest index or the largest index among the multiple sets of authorized indexes of the second type of configuration configured by the network device for the terminal device; or,
- the specific authorized index of the second type of configuration is the smallest index or the largest index among at least one set of authorized indexes of the second type of configuration associated with the first state; or,
- the specific authorized index of the second type of configuration satisfies the preset rule among the multiple sets of authorized indexes of the second type of configuration configured by the network device for the terminal device; or,
- the specific authorized index of the second type of configuration satisfies the preset rule in the at least one set of authorized index of the second type of configuration associated with the first state.
- the value of the first field in the DCI is different from any set of authorized indexes of the second type of configuration.
- the first RNTI includes a CS-RNTI.
- processing unit 720 in the embodiment of the present application may be implemented by a processor or a processor-related circuit component
- transceiver unit 710 may be implemented by a transceiver or a transceiver-related circuit component.
- the communication apparatus 700 can correspondingly implement the behaviors and functions of the network equipment in the foregoing method embodiments.
- the communication apparatus 700 may be a network device, or a component (such as a chip or a circuit) applied to the network device.
- the transceiving unit 710 may be used to perform all receiving or sending operations performed by the network device in the embodiment shown in FIG. 4, such as S401 and S402 in the embodiment shown in FIG. 4, and/or used to support this text Other processes of the described technique.
- the processing unit 720 is configured to perform all operations other than the transceiving operations performed by the network device in the embodiment shown in FIG. 4, such as S403, and/or other processes for supporting the technology described herein.
- the transceiver unit 710 is configured to send configuration information to the terminal device.
- the configuration information is used to configure a release state set.
- the release state set includes at least one state, and each state in the at least one state is associated with at least one set of the second type. Configured authorization;
- the transceiver unit 710 is configured to send downlink control information DCI to the terminal device, and the DCI is used to release the authorization of the second type of configuration;
- the processing unit 720 is configured to determine that the value of the frequency domain resource allocation FDRA domain in the DCI satisfies the following preset conditions when the value of the first field in the DCI is the same as the index of a set of authorizations of the second type of configuration:
- the authorized resource allocation type of the second type of configuration is type 0, and the value of the FDRA field is all 0, or;
- the authorized resource allocation type of the second type of configuration is type 1, and the value of the FDRA field is all 1, or;
- the authorized resource allocation type of this second type of configuration is dynamic, and the value of the FDRA field is all 0; or,
- the authorized resource allocation type of this second type of configuration is the dynamic type, and the value of the FDRA field is all 1.
- the set of authorizations for the second type configuration is a set of authorizations for the second type configuration among the plurality of authorizations for the second type configuration configured by the network device for the terminal device; or,
- the authorization of the second type of configuration is a set of authorization of the second type of configuration in the second type of configuration authorization associated with the first state.
- the authorization of the second type of configuration may be a specific authorization of the second type of configuration, for example, the index of the authorization of the second type of configuration is multiple sets of configurations configured by the network device for the terminal device. The smallest index or the largest index among the authorized indexes of the second type of configuration; or,
- the authorized index of the second type configuration is the smallest index or the largest index among the at least one authorized index of the second type configuration associated with the first state; or,
- the authorized index of the second type configuration satisfies the preset rule among the multiple authorized indexes of the second type configuration configured by the network device for the terminal device; or,
- the authorized index of the second type configuration satisfies a preset rule in the at least one authorized index of the second type configuration associated with the first state.
- the preset conditions also include:
- the value of the MCS field in the DCI is all 1 and the value of the RV field in the DCI is all 0.
- the preset condition further includes that the value of the UL-SCH field of the DCI is all 0s.
- the transceiver unit 710 is configured to send configuration information to the terminal device.
- the configuration information is used to configure a release state set.
- the release state set includes at least one state, and each state in the at least one state is associated with at least one set of second states.
- the transceiver unit 710 is configured to send downlink control information DCI to the terminal device, and the first field of the DCI indicates to release one or more sets of authorizations for the second type of configuration associated with the states in the state set.
- the processing unit 720 is configured to determine that the value of the frequency domain resource allocation FDRA field in the DCI satisfies any one of the following preset conditions:
- the authorized resource allocation type of at least one set of the second type of configuration associated with the state indicated by the first field includes at least type 0 and does not include type 1, and the value of the FDRA field is all 0; or,
- the authorized resource allocation type of at least one set of second type configuration associated with the state indicated by the first field includes at least type 1, and does not include type 0, and the value of the FDRA field is all 1; or,
- At least one set of authorized resource allocation types of the second type configuration associated with the status indicated by the first domain includes at least type 0 and type 1.
- the value of FDRA is determined according to the authorized resource allocation type of the specific second type configuration, Wherein, the authorized resource allocation type of the specific second type configuration is type 0, the value of the FDRA field is all 0, the authorized resource allocation type of the specific second type configuration is type 1, and the value of the FDRA field is all 1; or,
- the authorized resource allocation type of at least one set of second type configuration associated with the state indicated by the first field includes at least type 0 and type 1, and the value of the FDRA field is all 0; or,
- the authorized resource allocation types of at least one set of second-type configurations associated with the state indicated by the first field include at least type 0 and type 1, and the value of the FDRA field is all 1; or,
- At least one set of authorized resource allocation types of the second type configuration associated with the state indicated by the first field are all dynamic types, and the value of the FDRA field is not all 0; or,
- the authorized resource allocation types of at least one set of the second type of configuration associated with the status indicated by the first field are all dynamic types, and the value of the FDRA field is not all 1.
- the specific authorized index of the second type of configuration is the smallest index or the largest index among the multiple sets of authorized indexes of the second type of configuration configured by the network device for the terminal device; or,
- the specific authorized index of the second type of configuration is the smallest index or the largest index among at least one set of authorized indexes of the second type of configuration associated with the first state; or,
- the specific authorized index of the second type of configuration satisfies the preset rule among the multiple sets of authorized indexes of the second type of configuration configured by the network device for the terminal device; or,
- the specific authorized index of the second type of configuration satisfies the preset rule in the at least one set of authorized index of the second type of configuration associated with the first state.
- the value of the first field in the DCI is different from any set of authorized indexes of the second type of configuration.
- the communication apparatus 700 can correspondingly implement the behaviors and functions of the network equipment in the foregoing method embodiments.
- the communication apparatus 700 may be a terminal device, or a component (such as a chip or a circuit) applied to the terminal device.
- the transceiving unit 710 may be used to perform all receiving or sending operations performed by the terminal device in the embodiment shown in FIG. 6, such as S601 in the embodiment shown in FIG. 6, and/or used to support the descriptions described herein. Other processes of the technology.
- the processing unit 720 is configured to perform all operations other than the transceiving operations performed by the terminal device in the embodiment shown in FIG. 6, such as S602, S603, and S604, and/or other operations used to support the technology described herein. Process.
- the transceiver unit 710 is configured to receive configuration information from a network device, the configuration information is used to configure time domain resources, the configuration information includes a period parameter, and the period parameter is used to indicate a plurality of nominal repetitive resources The repetition period in the time domain;
- the processing unit 720 is configured to determine the time domain position of the first nominal repeated resource according to the configuration information, and determine the time domain position of the first actual repeated resource according to the time domain position of the first nominal repeated resource;
- the transceiver unit 710 is configured to send data on the first actual repeated resource.
- the processing unit 720 is configured to:
- the period size P and the period number m determine the start time slot where the start symbol of the nth nominal repetition resource in the mth period is located, and the nth nominal repetition resource is in the start time slot The starting symbol;
- the period size P and the period number m determine the end time slot where the end symbol of the nth nominal repetitive resource in the mth period is located, and the end symbol of the nth nominal repetitive resource in the end time slot .
- the number of the starting time slot of the nth nominal repetitive resource in the mth period satisfies the formula:
- N is the number of symbols in each time slot
- S is the number of the start symbol of the nth nominal repetitive resource
- L is the number of symbols of a nominal repetitive resource
- K s is the start time slot of the first nominal repetitive resource Number.
- the number of the start symbol in the start time slot of the nth nominal repetitive resource in the mth period satisfies the formula: mod(S+n ⁇ L+m ⁇ P, N) ;
- N is the number of symbols in each slot
- S is the number of the start symbol of the nth nominal repetitive resource
- L is the number of symbols of a nominal repetitive resource.
- the number of the end time slot of the nth nominal repetitive resource in the mth period satisfies the formula:
- N is the number of symbols in each time slot
- S is the number of the end symbol of the nth nominal repetitive resource
- L is the number of symbols of a nominal repetitive resource
- K s is the start time slot of the first nominal repetitive resource. serial number.
- the number of the end symbol in the end time slot of the nth nominal repetitive resource in the mth period satisfies the formula: mod(S+(n+1) ⁇ L-1+m ⁇ P , N);
- N is the number of symbols in each time slot
- S is the number of the end symbol of the nth nominal repetitive resource
- L is the number of symbols of a nominal repetitive resource.
- K s is determined according to the time domain resource offset parameter in the configuration information.
- the configuration information is used to configure the authorization of the first type of configuration, and K s satisfies:
- K s is equal to the time domain resource offset of the first nominal repeated resource
- K s is the number of the first time slot in the first frame, and the number of the first frame is The number of the first time slot is mod(M, M1), M is determined by the time domain resource offset of the first nominal repetitive resource, and M1 is the number of time slots included in a frame.
- the configuration information is used to configure the authorization of the second type of configuration, and K s satisfies the formula:
- n 0 is the time slot where the received DCI, u pusch PUSCH sub-carrier spacing is disposed, u pdcch is the subcarrier spacing PDCCH configuration.
- determining the time domain location of the nominal repetitive resource according to the period of the time domain resource includes:
- the start time slot where the start symbol of the nth nominal repetition resource in the mth period is located, and the start symbol of the nth nominal repetition resource in the start time slot;
- the number m of the period determine the end time slot where the end symbol of the nth nominal repetitive resource in the mth period is located, and the end symbol of the nth nominal repetitive resource in the end time slot.
- the number of the starting time slot of the nth nominal repetitive resource in the mth period satisfies the formula:
- N is the number of symbols in each time slot
- L is the number of symbols of a nominal repetitive resource
- K ms is the number of the starting time slot of the first nominal repetitive resource in the m-th period
- S m is the m-th period.
- the number of the start symbol of the nth nominal repetitive resource in a period, S m satisfies the formula: mod(S+m ⁇ P, N)
- S is the number of the start symbol of the nth nominal repetitive resource
- P is The period size of the repetition period of multiple nominal repetitive resources in the time domain.
- the number of the start symbol of the nth nominal repetitive resource in the start time slot in the mth period satisfies the formula: mod(S m + m ⁇ L, N);
- N is the number of symbols in each slot
- L is the number of symbols of a nominal repetitive resource
- S m is the number of the starting symbol of the nth nominal repetitive resource in the m-th period
- S m satisfies the formula: mod(s+M ⁇ P,N)
- S is the number of the start symbol of the nth nominal repetitive resource
- P is the period size of the repetition period of multiple nominal repetitive resources in the time domain.
- the number of the end time slot of the nth nominal repetitive resource in the mth period satisfies the formula:
- N is the number of symbols in each time slot
- L is the number of symbols of a nominal repetitive resource
- K ms is the number of the starting time slot of the first nominal repetitive resource in the m-th period
- S m is the m-th period.
- the number of the end symbol of the nth nominal repetitive resource in a period, S m satisfies the formula: mod(S+m ⁇ P, N)
- S is the number of the start symbol of the nth nominal repetitive resource
- P is more The period size of the repetition period of a nominal repetition resource in the time domain.
- the number of the end symbol in the end time slot of the nth nominal repetitive resource in the mth period satisfies the formula: mod(S m +(n+1) ⁇ L-1, N );
- N is the number of symbols in each time slot
- L is the number of symbols of a nominal repetitive resource
- S m is the number of the end symbol of the nth nominal repetitive resource in the m-th period
- S m satisfies the formula: mod (S+m ⁇ P, N)
- S is the number of the start symbol of the nth nominal repetitive resource
- P is the period size of the repetition period of multiple nominal repetitive resources in the time domain.
- K ms is determined according to the time domain resource offset and period size of the first nominal repetitive resource.
- the configuration information is used to configure the authorization of the first type of configuration, and K ms satisfies:
- K ms is the number of the first time slot in the first frame, where the frame number of the first frame is:
- M is determined by the time domain resource offset of the first nominal repetitive resource
- M1 is the number of time slots included in a frame
- N is the number of symbols included in a time slot.
- the configuration information is used to configure the authorization of the second type of configuration, and K ms satisfies:
- K ms is the number of the first time slot in the first frame, where the frame number of the first frame is:
- M is determined by the time domain resource offset of the first nominal repetitive resource
- M1 is the number of time slots contained in a frame
- K s satisfies the formula:
- n 0 is the time slot where the received DCI, u pusch PUSCH sub-carrier spacing is disposed, u pdcch is the subcarrier spacing PDCCH configuration.
- the configuration information is used to configure the authorization of the first type of configuration, where:
- the symbol index esymbol index of the end symbol of the first nominal repeated resource, the frame number eSFN of the system frame where the end symbol is located, and the slot index eslot index of the time slot where the end symbol is located satisfy:
- M is determined by the time domain resource offset of the first nominal repetitive resource
- M1 is the number of time slots in a frame
- N is the number of symbols in each time slot
- P is the repetition period of multiple nominal repetitive resources.
- Cycle size m is the number of the cycle
- S1 is the number of the start symbol of the nth nominal repetitive resource
- S2 is the number of the end symbol of the nth nominal repetitive resource
- L is the number of symbols of a nominal repetitive resource
- n is The number of the nominal duplicate resource.
- the configuration information is used to configure the authorization of the second type of configuration, where:
- the symbol index esymbol index of the end symbol of the first nominal repeated resource, the frame number eSFN of the system frame where the end symbol is located, and the slot index eslot index of the time slot where the end symbol is located satisfy:
- M is determined by the time domain resource offset of the first nominal repetitive resource
- M1 is the number of time slots in a frame
- N is the number of symbols in each time slot
- P is the period size of the repetition period of multiple nominal repetitive resources
- m is the number of the period
- S1 is the number of the start symbol of the nth nominal repetitive resource
- S2 is the number of the end symbol of the nth nominal repetitive resource
- L Is the number of symbols of a nominal repetitive resource
- n is the number of the nominal repetitive resource
- K s is the number of the start time slot of the first nominal repetitive resource.
- FIG. 8 shows a communication device 800 provided by an embodiment of this application, where the communication device 800 may be a terminal device, which can implement the function of the terminal device in the method provided in the embodiment of this application, or the communication device 800 may be a network device , Can realize the function of the network device in the method provided in the embodiment of this application; the communication device 800 can also be a device that can support the terminal device to realize the corresponding function in the method provided in the embodiment of this application, or can support the network device to realize the implementation of this application The corresponding function device in the method provided in the example.
- the communication device 800 may be a chip system. In the embodiments of the present application, the chip system may be composed of chips, or may include chips and other discrete devices.
- the foregoing transceiver unit 710 may be a transceiver, and the transceiver is integrated in the communication device 800 to form a communication interface 810.
- the communication device 800 includes at least one processor 820, which is configured to implement or support the communication device 800 to implement the functions of the network device or the terminal device in the method provided in the embodiments of the present application. For details, please refer to the detailed description in the method example, which will not be repeated here.
- the communication device 800 may further include at least one memory 830 for storing program instructions and/or data.
- the memory 830 and the processor 820 are coupled.
- the coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units or modules, and may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules.
- the processor 820 may cooperate with the memory 830 to operate.
- the processor 820 may execute program instructions and/or data stored in the memory 830, so that the communication device 800 implements a corresponding method. At least one of the at least one memory may be included in the processor.
- the communication device 800 may further include a communication interface 810 for communicating with other devices through a transmission medium, so that the device used in the communication device 800 can communicate with other devices.
- a communication interface 810 for communicating with other devices through a transmission medium, so that the device used in the communication device 800 can communicate with other devices.
- the communication device is a terminal device
- the other device is a network device; or, when the communication device is a network device, the other device is a terminal device.
- the processor 820 may use the communication interface 810 to send and receive data.
- the communication interface 810 may specifically be a transceiver.
- the specific connection medium between the aforementioned communication interface 810, the processor 820, and the memory 830 is not limited in the embodiment of the present application.
- the memory 830, the processor 820, and the communication interface 810 are connected by a bus 840 in FIG. 8.
- the bus is represented by a thick line in FIG. , Is not limited.
- the bus can be divided into an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used in FIG. 8, but it does not mean that there is only one bus or one type of bus.
- the processor 820 may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, which can implement Or execute the methods, steps, and logical block diagrams disclosed in the embodiments of the present application.
- the general-purpose processor may be a microprocessor or any conventional processor or the like.
- the steps of the method disclosed in combination with the embodiments of the present application may be directly embodied as being executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
- the memory 830 may be a non-volatile memory, such as a hard disk drive (HDD) or a solid-state drive (SSD), etc., or a volatile memory (volatile memory).
- a non-volatile memory such as a hard disk drive (HDD) or a solid-state drive (SSD), etc.
- a volatile memory volatile memory
- RAM random-access memory
- the memory is any other medium that can be used to carry or store desired program codes in the form of instructions or data structures and that can be accessed by a computer, but is not limited to this.
- the memory in the embodiments of the present application may also be a circuit or any other device capable of realizing a storage function for storing program instructions and/or data.
- the communication device in the foregoing embodiment may be a terminal device or a circuit, and may also be a chip applied to a terminal device or other combination devices or components having the functions of the foregoing terminal device.
- the transceiver unit may be a transceiver, which may include an antenna and a radio frequency circuit, etc.
- the processing module may be a processor, such as a central processing unit (CPU).
- the transceiver unit may be a radio frequency unit
- the processing module may be a processor.
- the transceiver unit may be an input and output interface of the chip system
- the processing module may be a processor of the chip system.
- Fig. 9 shows a schematic structural diagram of a simplified communication device. It is easy to understand and easy to illustrate.
- the communication device takes the network device as a base station as an example.
- the network device 900 may include one or more radio frequency units, such as a remote radio unit (RRU) 910 and one or more baseband units (BBU) (also referred to as digital units, digital units, DU). )920.
- RRU 910 may be called a communication module, which corresponds to the transceiver 710 in FIG. 7.
- the communication module may also be called a transceiver, a transceiver circuit, or a transceiver, etc., which may include at least one antenna 911 and Radio frequency unit 912.
- the RRU 910 part is mainly used for sending and receiving of radio frequency signals and conversion of radio frequency signals and baseband signals, for example, for sending instruction information to terminal equipment.
- the BBU 920 part is mainly used for baseband processing, control of the base station, and so on.
- the RRU 910 and the BBU 920 may be physically set together, or may be physically separated, that is, a distributed base station.
- the BBU 920 is the control center of the base station, and may also be called a processing module, which may correspond to the processing unit 720 in FIG. 7, and is mainly used to complete baseband processing functions, such as channel coding, multiplexing, modulation, and spreading.
- the BBU processing module
- the BBU may be used to control the base station to execute the operation procedure of the network device in the foregoing method embodiment, for example, to generate the foregoing indication information.
- the BBU 920 may be composed of one or more single boards, and multiple single boards may jointly support a wireless access network (such as an LTE network) of a single access standard, or can support different access standards. Wireless access network (such as LTE network, 5G network or other networks).
- the BBU 920 further includes a memory 921 and a processor 922.
- the memory 921 is used to store necessary instructions and data.
- the processor 922 is configured to control the base station to perform necessary actions, for example, to control the base station to execute the operation procedure of the network device in the foregoing method embodiment.
- the memory 921 and the processor 922 may serve one or more single boards. In other words, the memory and the processor can be set separately on each board. It can also be that multiple boards share the same memory and processor. In addition, necessary circuits can be provided on each board.
- the embodiment of the present application also provides a communication device, and the communication device may be a terminal device or a circuit.
- the communication device can be used to perform the actions performed by the terminal device in the foregoing method embodiments.
- Figure 10 shows a simplified schematic diagram of the structure of the terminal device. It is easy to understand and easy to illustrate.
- the terminal device uses a mobile phone as an example.
- the terminal equipment includes a processor, a memory, a radio frequency circuit, an antenna, and an input and output device.
- the processor is mainly used to process the communication protocol and communication data, and to control the vehicle-mounted unit, execute the software program, and process the data of the software program.
- the memory is mainly used to store software programs and data.
- the radio frequency circuit is mainly used for the conversion of baseband signals and radio frequency signals and the processing of radio frequency signals.
- the antenna is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
- Input and output devices such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by users and output data to users. It should be noted that some types of equipment may not have input and output devices.
- the processor When data needs to be sent, the processor performs baseband processing on the data to be sent, and then outputs the baseband signal to the radio frequency circuit.
- the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna.
- the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
- FIG. 10 only one memory and processor are shown in FIG. 10. In an actual device product, there may be one or more processors and one or more memories.
- the memory may also be referred to as a storage medium or storage device.
- the memory may be set independently of the processor, or may be integrated with the processor, which is not limited in the embodiment of the present application.
- the antenna and radio frequency circuit with the transceiving function can be regarded as the transceiving unit of the device, and the processor with the processing function can be regarded as the processing unit of the device.
- the device includes a transceiver unit 1010 and a processing unit 1020.
- the transceiving unit 1010 may also be referred to as a transceiver, a transceiver, a transceiving device, and so on.
- the processing unit 1020 may also be referred to as a processor, a processing board, a processing module, a processing device, and the like.
- the device for implementing the receiving function in the transceiver unit 1010 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiver unit 1010 as the sending unit, that is, the transceiver unit 1010 includes a receiving unit and a sending unit.
- the transceiving unit 1010 may also be called a transceiver, a transceiver, or a transceiving circuit or the like.
- the receiving unit may sometimes be called a receiver, a receiver, or a receiving circuit.
- the transmitting unit may sometimes be called a transmitter, a transmitter, or a transmitting circuit.
- transceiving unit 1010 is used to perform the sending and receiving operations on the terminal device side in the foregoing method embodiment, and the processing unit 1020 is used to perform other operations on the terminal device in the foregoing method embodiment except for the transceiving operation.
- the transceiver unit 1010 may be used to perform S301 and S302 in the embodiment shown in FIG. 3, and/or other processes used to support the technology described herein.
- the processing unit 1020 may be used to perform S303 in the embodiment shown in FIG. 3, and/or used to support other processes of the technology described herein.
- the transceiver unit 1010 may be used to execute S401 and S402 in the embodiment shown in FIG. 4, and/or other processes used to support the technology described herein.
- the transceiver unit 1020 may be used to perform S403 in the embodiment shown in FIG. 4 and/or to support other processes of the technology described herein.
- the transceiver unit 1010 may be used to execute S601 and S604 in the embodiment shown in FIG. 6 and/or other processes used to support the technology described herein.
- the transceiver unit 1020 may be used to perform S602 and S603 in the embodiment shown in FIG. 6 and/or other processes used to support the technology described herein.
- the device may include a transceiver unit and a processing unit.
- the transceiving unit may be an input/output circuit and/or a communication interface;
- the processing unit is an integrated processor or microprocessor or integrated circuit.
- the device shown in FIG. 11 can be referred to.
- the device can perform functions similar to the processing unit 720 in FIG. 7.
- the device includes a processor 1110, a data sending processor 1120, and a data receiving processor 1130.
- the processing unit 720 in the foregoing embodiment may be the processor 1110 in FIG. 11, and completes corresponding functions.
- the processing unit 720 in the foregoing embodiment may be the sending data processor 1120 and/or the receiving data processor 1130 in FIG. 11.
- the channel encoder and the channel decoder are shown in FIG. 11, it can be understood that these modules do not constitute a restrictive description of this embodiment, and are only illustrative.
- the communication device 1200 includes modules such as a modulation subsystem, a central processing subsystem, and a peripheral subsystem.
- the communication device in this embodiment can be used as the modulation subsystem therein.
- the modulation subsystem may include a processor 1203 and an interface 1204.
- the processor 1203 completes the function of the aforementioned processing unit 730
- the interface 1204 completes the function of the aforementioned transceiver unit 710.
- the modulation subsystem includes a memory 1206, a processor 1203, and a program stored in the memory 1206 and running on the processor.
- the terminal device in the above method embodiment is implemented. method.
- the memory 1206 can be non-volatile or volatile, and its location can be located inside the modulation subsystem or in the processing device 1200, as long as the memory 1206 can be connected to the The processor 1203 is sufficient.
- the embodiments of the present application also provide a communication system.
- the communication system includes a network device and a terminal device, or may also include more network devices and multiple terminal devices.
- the communication system includes network equipment and terminal equipment for implementing the above-mentioned related functions of FIG. 3, or the communication system includes network equipment and terminal equipment for implementing the above-mentioned related functions of FIG. 4, or the communication system includes The network device and terminal device for realizing the related functions of FIG. 6, or the communication system includes the network device and terminal device for realizing the related functions of the embodiments of at least two of the above-mentioned FIG. 3, FIG. 4, or FIG. 6.
- the network devices are respectively used to implement the functions of the relevant network parts of FIG. 3, FIG. 4, and FIG. 6 described above.
- the terminal device is used to implement the functions of the above-mentioned terminal related to FIG. 3, FIG. 4, and FIG. 6.
- FIG. 3 For details, please refer to the relevant description in the foregoing method embodiment, which is not repeated here.
- the embodiment of the present application also provides a computer-readable storage medium, including instructions, which when run on a computer, cause the computer to execute the method executed by the network device in FIG. 3, FIG. 4, or FIG. 6; or when it is on the computer When running, the computer is caused to execute the method executed by the terminal device in FIG. 3, FIG. 4, or FIG. 6.
- the embodiment of the present application also provides a computer program product, including instructions, when it runs on a computer, causes the computer to execute the method executed by the network device in FIG. 3, FIG. 4, or FIG. 6; or when it runs on the computer , So that the computer executes the method executed by the terminal device in FIG. 3, FIG. 4, or FIG. 6.
- the embodiment of the present application provides a chip system, which includes a processor and may also include a memory, which is used to implement the function of the network device in the foregoing method; or is used to implement the function of the terminal device in the foregoing method.
- the chip system can be composed of chips, or it can include chips and other discrete devices.
- An embodiment of the present application also provides a computer-readable storage medium, including instructions, which when run on a computer, cause the computer to execute the method executed by the terminal device or network device in FIG. 3, FIG. 4, or FIG. 6.
- An embodiment of the present application also provides a computer program product, including instructions, which when run on a computer, cause the computer to execute the method executed by the terminal device or network device in FIG. 3, FIG. 4, or FIG. 6.
- the embodiment of the present application provides a chip system.
- the chip system includes a processor and may also include a memory, which is used to implement the functions of the terminal device or the network device in the foregoing method.
- the chip system can be composed of chips, or it can include chips and other discrete devices.
- At least one means one or more
- plural means two or more.
- And/or describes the association relationship of the associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
- the character “/” generally indicates that the associated objects are in an “or” relationship.
- the following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
- At least one of a, b, or c can mean: a, b, c, a-b, a-c, b-c or a-b-c, where a, b, and c can be single or multiple.
- processors mentioned in the embodiments of this application may be a CPU, or other general-purpose processors, digital signal processors (digital signal processors, DSP), application specific integrated circuits (ASICs), ready-made Field programmable gate array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the memory mentioned in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
- the volatile memory may be random access memory (RAM), which is used as an external cache.
- RAM random access memory
- static random access memory static random access memory
- dynamic RAM dynamic RAM
- DRAM dynamic random access memory
- synchronous dynamic random access memory synchronous dynamic random access memory
- DRAM static random access memory
- SDRAM double data rate synchronous dynamic type random access memory
- double data rate SDRAM double data rate SDRAM
- DDR SDRAM enhanced synchronous dynamic type random access memory
- ESDRAM enhanced synchronous dynamic type random access memory
- serial link DRAM SLDRAM
- direct memory bus random access memory direct rambus RAM, DR RAM
- the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, or discrete hardware component
- the memory storage module
- the size of the sequence number of the above-mentioned processes does not mean the order of execution, and the execution order of each process should be determined by its function and internal logic, and should not correspond to the embodiments of the present application.
- the implementation process constitutes any limitation.
- the disclosed system, device, and method can be implemented in other ways.
- the device embodiments described above are merely illustrative.
- the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
- the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program code .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente invention concerne un procédé, un procédé et un appareil de communication pour une utilisation dans le domaine des communications mobiles. Le procédé comprend les étapes suivantes : des DCI et des informations de configuration en provenance d'un dispositif de réseau sont reçues, et si une valeur obtenue d'un premier champ dans les DCI est identique à un indice d'une autorisation configurée de type 2, et une valeur d'un champ FDRA au sein des DCI satisfait des conditions préétablies, il est déterminé que les DCI n'ont pas besoin de libérer une autorisation configurée de type 2, les conditions prédéfinies comprenant : un type d'attribution de ressources de l'autorisation configurée de type 2 est de type 0 et tous les chiffres de la valeur du champ FDRA ne sont pas à zéro, ou le type d'attribution de ressources de l'autorisation configurée de type 2 est de type 1 et tous les chiffres de la valeur du champ FDRA ne sont pas à un. Dans un scénario de libération combiné, la présente solution peut garantir que lorsqu'une valeur d'un champ FDRA Indique qu'une DCI d'activation n'est pas en vigueur, il est indiqué qu'une DCI de libération est en vigueur, c'est-à-dire que des fonctions DCI peuvent être distinguées, ce qui améliore les performances des DCI de libération en validation.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/073655 WO2021146968A1 (fr) | 2020-01-21 | 2020-01-21 | Procédé et dispositif de communication |
CN202080086825.3A CN114830816A (zh) | 2020-01-21 | 2020-01-21 | 一种通信方法及装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/073655 WO2021146968A1 (fr) | 2020-01-21 | 2020-01-21 | Procédé et dispositif de communication |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021146968A1 true WO2021146968A1 (fr) | 2021-07-29 |
Family
ID=76992810
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/073655 WO2021146968A1 (fr) | 2020-01-21 | 2020-01-21 | Procédé et dispositif de communication |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN114830816A (fr) |
WO (1) | WO2021146968A1 (fr) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019215888A1 (fr) * | 2018-05-10 | 2019-11-14 | 株式会社Nttドコモ | Terminal utilisateur et procédé de communication sans fil |
CN110475374A (zh) * | 2018-05-11 | 2019-11-19 | 华为技术有限公司 | 一种通信方法和通信装置 |
-
2020
- 2020-01-21 CN CN202080086825.3A patent/CN114830816A/zh active Pending
- 2020-01-21 WO PCT/CN2020/073655 patent/WO2021146968A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019215888A1 (fr) * | 2018-05-10 | 2019-11-14 | 株式会社Nttドコモ | Terminal utilisateur et procédé de communication sans fil |
CN110475374A (zh) * | 2018-05-11 | 2019-11-19 | 华为技术有限公司 | 一种通信方法和通信装置 |
Non-Patent Citations (3)
Title |
---|
NTT DOCOMO, INC: "Summary of 7.2.6.6 Enhanced UL configured grant transmission", 3GPP DRAFT; R1-1907662, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG1, 17 May 2019 (2019-05-17), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, pages 1 - 38, XP051739950 * |
QUALCOMM INCORPORATED: "Enhanced Grant-Free Transmissions for eURLLC", 3GPP DRAFT; R1-1912964, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG1, no. Reno, Nevada, USA; 20191118 - 20191122, 9 November 2019 (2019-11-09), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051823726 * |
QUALCOMM INCORPORATED: "PUSCH Enhancements for eURLLC", 3GPP DRAFT; R1-1907283 PUSCH ENHANCEMENTS FOR EURLLC, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG1, no. Reno, Nevada, USA; 20190513 - 20190517, 13 May 2019 (2019-05-13), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051728723 * |
Also Published As
Publication number | Publication date |
---|---|
CN114830816A (zh) | 2022-07-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI713402B (zh) | 業務傳輸的方法和裝置 | |
CN109392152B (zh) | 通信方法和通信装置 | |
US11032778B2 (en) | Uplink channel power allocation method and apparatus | |
CN108029120B (zh) | 用于为低复杂度窄带终端指示对随机接入过程中的harq消息分配的资源的方法 | |
WO2020087365A1 (fr) | Procédés et dispositifs d'envoi et de configuration de données de liaison latérale | |
EP4184969A1 (fr) | Procédé d'amélioration de canal physique de commande de liaison descendante, dispositif de communication et système | |
US20220304059A1 (en) | Method and Apparatus for Sharing Channel Occupancy Time on Unlicensed Spectrum | |
CN111770577B (zh) | 确定传输资源的方法及装置 | |
WO2016049890A1 (fr) | Procédé et dispositif de transmission de données | |
CN109428680B (zh) | 发送或接收上行数据的方法和装置 | |
CN113068259B (zh) | 无线通信方法和设备 | |
CN109996334B (zh) | 信息指示方法、终端设备及网络设备 | |
WO2021017765A1 (fr) | Procédé de communication et dispositif de communication | |
CN109672506A (zh) | 数据传输的确认方法及设备 | |
US20220256557A1 (en) | Communication apparatuses and communication methods for dci for v2x communication apparatuses | |
WO2020200176A1 (fr) | Procédé et appareil de détermination de ressources de transmission | |
WO2019137011A1 (fr) | Procédé de communication, et procédé de détermination de ressource de liaison montante | |
WO2020233370A1 (fr) | Procédé et dispositif de communication | |
CN114223165B (zh) | 一种确定重复传输资源的方法及装置 | |
WO2022077396A1 (fr) | Procédé d'envoi et procédé de réception d'informations de commande de liaison montante, et appareil de communication | |
WO2021146968A1 (fr) | Procédé et dispositif de communication | |
WO2020221344A1 (fr) | Procédé de transmission de canal et dispositif associé | |
CN115707118A (zh) | 一种资源共享方法及通信装置 | |
CN114390698A (zh) | 一种数据传输的方法、装置、介质以及程序产品 | |
CN113939019A (zh) | 通信方法及通信设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20915517 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20915517 Country of ref document: EP Kind code of ref document: A1 |