WO2021197043A1 - 一种被用于无线通信的节点中的方法和装置 - Google Patents
一种被用于无线通信的节点中的方法和装置 Download PDFInfo
- Publication number
- WO2021197043A1 WO2021197043A1 PCT/CN2021/080962 CN2021080962W WO2021197043A1 WO 2021197043 A1 WO2021197043 A1 WO 2021197043A1 CN 2021080962 W CN2021080962 W CN 2021080962W WO 2021197043 A1 WO2021197043 A1 WO 2021197043A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- block
- bit
- sub
- time
- value
- Prior art date
Links
- 238000004891 communication Methods 0.000 title claims abstract description 115
- 238000000034 method Methods 0.000 title claims abstract description 59
- 239000002245 particle Substances 0.000 claims abstract description 81
- 230000011664 signaling Effects 0.000 claims description 256
- 230000005540 biological transmission Effects 0.000 description 167
- 238000010586 diagram Methods 0.000 description 32
- 238000013507 mapping Methods 0.000 description 31
- 238000012545 processing Methods 0.000 description 25
- 238000004364 calculation method Methods 0.000 description 23
- 230000006870 function Effects 0.000 description 15
- 230000011218 segmentation Effects 0.000 description 13
- 238000003780 insertion Methods 0.000 description 10
- 230000037431 insertion Effects 0.000 description 10
- 230000009471 action Effects 0.000 description 8
- 238000004590 computer program Methods 0.000 description 8
- 230000008901 benefit Effects 0.000 description 7
- 238000006243 chemical reaction Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 230000001413 cellular effect Effects 0.000 description 5
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 description 5
- 230000008054 signal transmission Effects 0.000 description 5
- 230000006835 compression Effects 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000013468 resource allocation Methods 0.000 description 3
- 230000006837 decompression Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000010363 phase shift Effects 0.000 description 2
- 241000169170 Boreogadus saida Species 0.000 description 1
- 102220622101 Collagen alpha-1(XXII) chain_S72A_mutation Human genes 0.000 description 1
- 102220622104 Collagen alpha-1(XXII) chain_S73A_mutation Human genes 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- IBIKHMZPHNKTHM-RDTXWAMCSA-N merck compound 25 Chemical compound C1C[C@@H](C(O)=O)[C@H](O)CN1C(C1=C(F)C=CC=C11)=NN1C(=O)C1=C(Cl)C=CC=C1C1CC1 IBIKHMZPHNKTHM-RDTXWAMCSA-N 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 102220077574 rs201561286 Human genes 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/56—Allocation or scheduling criteria for wireless resources based on priority criteria
- H04W72/566—Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
- H04W72/569—Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient of the traffic information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/0001—Arrangements for dividing the transmission path
- H04L5/0003—Two-dimensional division
- H04L5/0005—Time-frequency
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0053—Allocation of signaling, i.e. of overhead other than pilot signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0058—Allocation criteria
- H04L5/0064—Rate requirement of the data, e.g. scalable bandwidth, data priority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/56—Allocation or scheduling criteria for wireless resources based on priority criteria
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
- H04W72/21—Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
Definitions
- This application relates to a transmission method and device in a wireless communication system, in particular to a wireless signal transmission method and device in a wireless communication system supporting a cellular network.
- eMBB Enhanced Mobile Broadband
- URLLC Ultra Reliable and Low Latency Communication
- 3GPP 3rd Generation Partner Project
- NR New Radio
- MCS Modulation and Coding Scheme
- DCI signaling can indicate Whether the scheduled PDSCH is low priority (Low Priority) or high priority (High Priority), where the low priority corresponds to the URLLC service, and the high priority corresponds to the eMBB service.
- Low Priority Low Priority
- High Priority High Priority
- the high-priority transmission is executed, and the low-priority transmission is abandoned.
- the URLLC enhanced WI Work Item of NR Release 17 was passed.
- the multiplexing of services with different priorities in the UE (User Equipment) (Intra-UE) is an important point to be studied.
- HARQ-ACK Hybrid Automatic Repeat reQuest Acknowledgement
- PUSCH Physical Uplink Shared CHannel
- Hybrid Automatic Repeat Request Confirmation Codebook transmission
- PUSCH Physical Uplink Shared CHannel
- PUCCH Physical Uplink Control CHannel, physical uplink control channel
- UCI Uplink Control Information, uplink control information
- this application discloses a solution.
- the uplink is used as an example; this application is also applicable to the downlink transmission scenario and the sidelink transmission scenario, and achieves similar technical effects in the accompanying link.
- adopting a unified solution for different scenarios can also help reduce hardware complexity and cost.
- the embodiments in the user equipment of the present application and the features in the embodiments can be applied to the base station, and vice versa.
- the embodiments of the present application and the features in the embodiments can be combined with each other arbitrarily.
- the explanation of the term (Terminology) in this application refers to the definition of the TS36 series of 3GPP specifications.
- the explanation of the terms in this application refers to the definition of the IEEE (Institute of Electrical and Electronics Engineers, Institute of Electrical and Electronics Engineers) specification protocol.
- This application discloses a method used in a first node of wireless communication, which is characterized in that it includes:
- the first bit block is used to generate the second bit block; the first bit block includes a first bit sub-block and a second bit sub-block, and the priority corresponding to the first bit sub-block is higher than that of the first bit sub-block.
- the priority corresponding to the second bit sub-block; the number of resource particles used to transmit the second bit block in the first time-frequency resource block is not greater than a first value, and the first bit sub-block includes The number of bits is used to determine the first value; the number of bits included in the first bit sub-block and the first information are both used to determine the second value; the first time-frequency resource block is used to determine the second value;
- the number of the resource particles used to transmit the bits related to the first bit sub-block included in the second bit block is equal to the minimum value of the first value and the second value.
- the problem to be solved by this application is: when control information of different priorities is multiplexed onto a channel for transmitting service data, how to allocate resources between the control information and the service data.
- the problem to be solved by this application is: how to multiplex UCI (Uplink Control Information, uplink control information) of different priorities on one PUSCH.
- UCI Uplink Control Information, uplink control information
- the problem to be solved in this application is: UCIs with different priorities (for example, HARQ-ACK codebooks with different priorities) are configured with different scaling parameters; when the UCI codes with different priorities are multiplexed Using a PUSCH, how to rationally use multiple scaling parameters configured to limit the transmission resources occupied by UCI.
- priorities for example, HARQ-ACK codebooks with different priorities
- the essence of the above method is that UCIs of different priorities (for example, HARQ-ACK codebooks of different priorities) are respectively configured with different scaling parameters; the payload size of the UCI of high priority is used To determine which of the different scaling parameters is used to determine the upper limit of the transmission resources occupied by the UCI.
- priorities for example, HARQ-ACK codebooks of different priorities
- the essence of the above method is that the scaling parameters corresponding to UCIs of different priorities (for example, HARQ-ACK codebooks of different priorities) are respectively used to determine the upper limit of different occupable resources;
- the scaling parameter corresponding to the high-priority UCI is used to determine the transmission resources occupied by the UCI Upper limit; otherwise, the scaling parameter corresponding to the low-priority UCI is used to determine the upper limit of the transmission resources occupied by the UCI.
- the essence of the above method is that UCIs of different priorities (for example, HARQ-ACK codebooks of different priorities) are configured with different scaling parameters;
- the payload size of the priority UCI is jointly used to determine which of the different scaling parameters is used to determine the upper limit of the transmission resource occupied by the UCI.
- the advantage of the above method is that when UCIs of different priorities (for example, HARQ-ACK codebooks of different priorities) are multiplexed onto the same PUSCH, the priority information is carried on UCI and PUSCH
- the transmission resources are allocated more rationally between the business data of the two, ensuring the reliability of high-priority control control information or high-priority business data.
- the advantage of the above method is that when control information of different priorities is multiplexed onto the same channel, a more reasonable transmission resource allocation is performed between the control information and the service data according to the priority information, which ensures High priority controls the reliability of control information or high priority business data.
- the above method is characterized in that:
- the first value has nothing to do with the first information.
- the above method is characterized in that:
- the first value is not greater than the first candidate value and not less than the second candidate value; the first parameter is used to determine the first candidate value, and the second parameter is used to determine the second candidate value; the first parameter is used to determine the second candidate value; A parameter and the second parameter respectively correspond to a first priority and a second priority; the priority of the first bit sub-block is the first priority, and the priority of the second bit sub-block is the priority. The second priority.
- the above method is characterized in that:
- the target parameter is used to determine the first value; the target parameter is the first parameter or the second parameter, and the first parameter and the second parameter respectively correspond to the first priority and the second priority; the The priority of the first bit sub-block is the first priority, the priority of the second bit sub-block is the second priority; the number of bits included in the first bit sub-block and the first priority The number of bits included in the two-bit sub-block is collectively used to determine the target parameter.
- the above method is characterized in that:
- the first value is the first candidate value; when the second value is not greater than the second candidate value, the first value is the second Candidate value.
- the above method is characterized in that it includes:
- the first signaling indicates a first air interface resource block
- the second signaling indicates a second air interface resource block
- at least one of the first air interface resource block and the second air interface resource block is The first time-frequency resource block overlaps in the time domain.
- the above method is characterized in that:
- the first signal carries a third bit block; the first time-frequency resource block is a time-frequency resource block configured to the third bit block; the third bit block is a first-type bit block and a second bit block The first type of bit block of the two type of bit blocks.
- This application discloses a method used in a second node of wireless communication, which is characterized in that it includes:
- the first bit block is used to generate the second bit block; the first bit block includes a first bit sub-block and a second bit sub-block, and the priority corresponding to the first bit sub-block is higher than that of the first bit sub-block.
- the priority corresponding to the second bit sub-block; the number of resource particles used to transmit the second bit block in the first time-frequency resource block is not greater than a first value, and the first bit sub-block includes The number of bits is used to determine the first value; the number of bits included in the first bit sub-block and the first information are both used to determine the second value; the first time-frequency resource block is used to determine the second value;
- the number of the resource particles used to transmit the bits related to the first bit sub-block included in the second bit block is equal to the minimum value of the first value and the second value.
- the above method is characterized in that:
- the first value has nothing to do with the first information.
- the above method is characterized in that:
- the first value is not greater than the first candidate value and not less than the second candidate value; the first parameter is used to determine the first candidate value, and the second parameter is used to determine the second candidate value; the first parameter is used to determine the second candidate value; A parameter and the second parameter respectively correspond to a first priority and a second priority; the priority of the first bit sub-block is the first priority, and the priority of the second bit sub-block is the priority. The second priority.
- the above method is characterized in that:
- the target parameter is used to determine the first value; the target parameter is the first parameter or the second parameter, and the first parameter and the second parameter respectively correspond to the first priority and the second priority; the The priority of the first bit sub-block is the first priority, the priority of the second bit sub-block is the second priority; the number of bits included in the first bit sub-block and the first priority The number of bits included in the two-bit sub-block is collectively used to determine the target parameter.
- the above method is characterized in that:
- the first value is the first candidate value; when the second value is not greater than the second candidate value, the first value is the second Candidate value.
- the above method is characterized in that it includes:
- the first signaling indicates a first air interface resource block
- the second signaling indicates a second air interface resource block
- at least one of the first air interface resource block and the second air interface resource block is The first time-frequency resource block overlaps in the time domain.
- the above method is characterized in that:
- the first signal carries a third bit block; the first time-frequency resource block is a time-frequency resource block configured to the third bit block; the third bit block is a first-type bit block and a second bit block The first type of bit block of the two type of bit blocks.
- This application discloses a first node device used for wireless communication, which is characterized in that it includes:
- the first receiver receives the first information
- a first transmitter sending a first signal in a first time-frequency resource block, the first signal carrying a second bit block;
- the first bit block is used to generate the second bit block; the first bit block includes a first bit sub-block and a second bit sub-block, and the priority corresponding to the first bit sub-block is higher than that of the first bit sub-block.
- the priority corresponding to the second bit sub-block; the number of resource particles used to transmit the second bit block in the first time-frequency resource block is not greater than a first value, and the first bit sub-block includes The number of bits is used to determine the first value; the number of bits included in the first bit sub-block and the first information are both used to determine the second value; the first time-frequency resource block is used to determine the second value;
- the number of the resource particles used to transmit the bits related to the first bit sub-block included in the second bit block is equal to the minimum value of the first value and the second value.
- This application discloses a second node device used for wireless communication, which is characterized in that it includes:
- the second transmitter sends the first information
- a second receiver receiving a first signal in a first time-frequency resource block, the first signal carrying a second bit block;
- the first bit block is used to generate the second bit block; the first bit block includes a first bit sub-block and a second bit sub-block, and the priority corresponding to the first bit sub-block is higher than that of the first bit sub-block.
- the priority corresponding to the second bit sub-block; the number of resource particles used to transmit the second bit block in the first time-frequency resource block is not greater than a first value, and the first bit sub-block includes The number of bits is used to determine the first value; the number of bits included in the first bit sub-block and the first information are both used to determine the second value; the first time-frequency resource block is used to determine the second value;
- the number of the resource particles used to transmit the bits related to the first bit sub-block included in the second bit block is equal to the minimum value of the first value and the second value.
- the method in this application has the following advantages:
- control information of different priorities is multiplexed onto the same channel, a more reasonable allocation of transmission resources between control information and service data is performed according to the priority information;
- This application discloses a method used in a first node of wireless communication, which is characterized in that it includes:
- first signaling and second signaling where the first signaling and the second signaling are respectively used to determine a first air interface resource block and a second air interface resource block;
- the first air interface resource block is reserved for the transmission of the first bit block
- the second air interface resource block is reserved for the transmission of the second bit block
- the first air interface resource block is occupied Time domain resources and time domain resources occupied by the second air interface resource block overlap
- the first bit block is used to generate the target signal
- the target air interface resource block is the first air interface resource block
- the target air interface resource block is the second air interface resource block
- the expiration time of the first air interface resource block in the time domain is the first time
- the number of bits included in the first bit block is used to determine The second moment; the second moment is not earlier than the first moment in the time domain; the time interval between the second moment and the first moment is used to determine the second bit block Whether bits are used to generate the target signal; the first bit block and the second bit block respectively correspond to different types.
- the problem to be solved by this application includes: when the high-priority PUCCH and the low-priority PUSCH overlap in the time domain, how to rationally multiplex the high-priority UCI onto the low-priority PUSCH .
- the problem to be solved by this application includes: how to optimize the UE's uplink transmission under the constraints of meeting the delay requirements of high priority information when dealing with the collision of sending information of different priority information ( Optimization).
- the essence of the above method is that when the high-priority PUCCH and the low-priority PUSCH overlap in the time domain: if the high-priority UCI is multiplexed onto the low-priority PUSCH for transmission, there is no With additional delay, the UE determines to multiplex the high-priority UCI on the low-priority PUSCH for transmission; otherwise, the UE determines to transmit the high-priority UCI on the high-priority PUCCH.
- the essence of the above method is that when the high-priority PUCCH and the low-priority PUSCH overlap in the time domain: if the high-priority UCI is multiplexed onto the low-priority PUSCH for transmission If the additional delay is within an acceptable range, the UE determines to multiplex the high-priority UCI on the low-priority PUSCH for transmission; otherwise, the UE determines to transmit the high-priority PUCCH on the high-priority PUCCH.
- Priority UCI is that when the high-priority PUCCH and the low-priority PUSCH overlap in the time domain: if the high-priority UCI is multiplexed onto the low-priority PUSCH for transmission If the additional delay is within an acceptable range, the UE determines to multiplex the high-priority UCI on the low-priority PUSCH for transmission; otherwise, the UE determines to transmit the high-priority PUCCH on the high-priority
- the essence of the above method is that when the high-priority channel and the low-priority channel overlap in the time domain: if high-priority information is multiplexed onto the low-priority channel for transmission If the additional delay is within an acceptable range, the UE determines to multiplex the high priority information on the low priority channel for transmission; otherwise, the UE determines to transmit the high priority information on the high priority channel. Priority information, UE judges to discard low priority information.
- the essence of the above method is that when the high-priority channel and the low-priority channel overlap in the time domain: if high-priority information is multiplexed onto the low-priority channel for transmission, there is no For additional delay, the UE determines to multiplex the high-priority information on the low-priority channel for transmission; otherwise, the UE determines to transmit the high-priority information on the high-priority channel, and the UE determines to discard Low priority information.
- the advantage of the above method is to ensure the delay requirement of high-priority control information (such as UCI).
- the advantage of the above method is that under the condition that the delay requirement of high priority control information (such as UCI) is met, low priority service data/control information is also transmitted on the low priority channel; and
- the direct drop (Drop) of low-priority service data/control information improves the transmission efficiency compared with the above method.
- the above method is characterized in that:
- the second time is located after the first time in the time domain.
- the above method is characterized in that:
- the target air interface resource block is The second air interface resource block; when the time interval between the second time and the first time is greater than the first threshold, the bits in the second bit block are not used to generate the target signal ,
- the target air interface resource block is the first air interface resource block.
- the above method is characterized in that:
- the first threshold is greater than zero.
- the above method is characterized in that:
- the second time is the cut-off time of the time domain resources occupied by the modulation symbols generated by the first bit block;
- the second time is before the expiration time of the second air interface resource block in the time domain.
- the above method is characterized in that it includes:
- the first signal carries a third bit block
- the first signaling includes scheduling information of the third bit block
- the first bit block includes information indicating whether the third bit block is correctly received .
- the above method is characterized in that:
- the time domain resources before the time domain resources occupied by the earliest reference signal in the time domain in the target air interface resource block are used for transmission Bits related to the first bit block.
- This application discloses a method used in a second node of wireless communication, which is characterized in that it includes:
- the first air interface resource block is reserved for the transmission of the first bit block
- the second air interface resource block is reserved for the transmission of the second bit block
- the first air interface resource block is occupied Time domain resources and time domain resources occupied by the second air interface resource block overlap
- the first bit block is used to generate the target signal
- the target air interface resource block is the first air interface resource block
- the target air interface resource block is the second air interface resource block
- the expiration time of the first air interface resource block in the time domain is the first time
- the number of bits included in the first bit block is used to determine The second moment; the second moment is not earlier than the first moment in the time domain; the time interval between the second moment and the first moment is used to determine the second bit block Whether bits are used to generate the target signal; the first bit block and the second bit block respectively correspond to different types.
- the above method is characterized in that:
- the second time is located after the first time in the time domain.
- the above method is characterized in that:
- the target air interface resource block is The second air interface resource block; when the time interval between the second time and the first time is greater than the first threshold, the bits in the second bit block are not used to generate the target signal ,
- the target air interface resource block is the first air interface resource block.
- the above method is characterized in that:
- the first threshold is greater than zero.
- the above method is characterized in that:
- the second time is the cut-off time of the time domain resources occupied by the modulation symbols generated by the first bit block;
- the second time is before the expiration time of the second air interface resource block in the time domain.
- the above method is characterized in that it includes:
- the first signal carries a third bit block
- the first signaling includes scheduling information of the third bit block
- the first bit block includes information indicating whether the third bit block is correctly received .
- the above method is characterized in that:
- the time domain resources before the time domain resources occupied by the earliest reference signal in the time domain in the target air interface resource block are used for transmission Bits related to the first bit block.
- This application discloses a first node device used for wireless communication, which is characterized in that it includes:
- the first receiver receives first signaling and second signaling, where the first signaling and the second signaling are respectively used to determine a first air interface resource block and a second air interface resource block;
- the first transmitter sends the target signal in the target air interface resource block
- the first air interface resource block is reserved for the transmission of the first bit block
- the second air interface resource block is reserved for the transmission of the second bit block
- the first air interface resource block is occupied Time domain resources and time domain resources occupied by the second air interface resource block overlap
- the first bit block is used to generate the target signal
- the target air interface resource block is the first air interface resource block
- the target air interface resource block is the second air interface resource block
- the expiration time of the first air interface resource block in the time domain is the first time
- the number of bits included in the first bit block is used to determine The second moment; the second moment is not earlier than the first moment in the time domain; the time interval between the second moment and the first moment is used to determine the second bit block Whether bits are used to generate the target signal; the first bit block and the second bit block respectively correspond to different types.
- This application discloses a second node device used for wireless communication, which is characterized in that it includes:
- a second transmitter sending first signaling and second signaling, where the first signaling and the second signaling are respectively used to determine a first air interface resource block and a second air interface resource block;
- the second receiver receives the target signal in the target air interface resource block
- the first air interface resource block is reserved for the transmission of the first bit block
- the second air interface resource block is reserved for the transmission of the second bit block
- the first air interface resource block is occupied Time domain resources and time domain resources occupied by the second air interface resource block overlap
- the first bit block is used to generate the target signal
- the target air interface resource block is the first air interface resource block
- the target air interface resource block is the second air interface resource block
- the expiration time of the first air interface resource block in the time domain is the first time
- the number of bits included in the first bit block is used to determine The second moment; the second moment is not earlier than the first moment in the time domain; the time interval between the second moment and the first moment is used to determine the second bit block Whether bits are used to generate the target signal; the first bit block and the second bit block respectively correspond to different types.
- the method in this application has the following advantages:
- the UE's uplink transmission is optimized under the constraint of meeting the delay requirements of high priority information
- low priority service data/control information can be transmitted on the low priority channel; and directly discard the low priority channel. Compared with priority service data/control information, the transmission efficiency is improved.
- Fig. 1A shows a processing flowchart of a first node according to an embodiment of the present application
- FIG. 1B shows a processing flowchart of the first node according to an embodiment of the present application
- Figure 2 shows a schematic diagram of a network architecture according to an embodiment of the present application
- Fig. 3 shows a schematic diagram of a wireless protocol architecture of a user plane and a control plane according to an embodiment of the present application
- Fig. 4 shows a schematic diagram of a first communication device and a second communication device according to an embodiment of the present application
- FIG. 5A shows a flow chart of signal transmission according to an embodiment of the present application
- FIG. 5B shows a flow chart of signal transmission according to an embodiment of the present application
- 6A shows a schematic diagram of the relationship between the number of bits included in the first bit sub-block, the number of bits included in the second bit sub-block, the target parameter and the first value according to an embodiment of the present application;
- 6B shows a schematic diagram of the relationship between the number of bits included in the first bit block and the second time according to an embodiment of the present application
- FIG. 7A shows a flowchart of judging whether the first value is the first candidate value or the second candidate value according to an embodiment of the present application
- FIG. 7B shows a flowchart of judging whether the bits in the second bit block are used to generate the target signal according to an embodiment of the present application
- FIG. 8A shows a schematic diagram of the relationship between the number of bits included in the first bit sub-block, the first information and the second value according to an embodiment of the present application
- FIG. 8B shows a schematic diagram of the relationship between the first bit block, the first signaling and the third bit block according to an embodiment of the present application
- FIG. 9A shows a schematic diagram of the relationship among the first parameter, the first candidate value, the second parameter, and the second candidate value according to an embodiment of the present application
- FIG. 9B shows a schematic diagram of the relationship between the first air interface resource block, the first time, the second time, and the first threshold according to an embodiment of the present application
- FIG. 10A shows a schematic diagram of the relationship among the first signal, the first bit block, the second bit block, the third bit block, the first bit sub-block and the second bit sub-block according to an embodiment of the present application;
- FIG. 10B shows a schematic diagram of the relationship between the first air interface resource block, the first time, the second time, and the first threshold according to another embodiment of the present application;
- Fig. 11A shows a structural block diagram of a processing device in a first node device according to an embodiment of the present application
- Fig. 11B shows a structural block diagram of a processing device in a first node device according to an embodiment of the present application
- Fig. 12A shows a structural block diagram of a processing device in a second node device according to an embodiment of the present application
- Fig. 12B shows a structural block diagram of a processing device in a second node device according to an embodiment of the present application.
- Embodiment 1A illustrates a processing flowchart of the first node according to an embodiment of the present application, as shown in FIG. 1A.
- the first node in this application receives the first information in step 101A; in step 102A, sends the first signal in the first time-frequency resource block, and the first signal carries the second bit Piece;
- the first bit block is used to generate the second bit block; the first bit block includes a first bit sub-block and a second bit sub-block, and the first bit sub-block corresponds to the priority
- the priority is higher than the priority corresponding to the second bit sub-block; the number of resource particles used to transmit the second bit block in the first time-frequency resource block is not greater than a first value, and the first bit
- the number of bits included in the sub-block is used to determine the first value; the number of bits included in the first-bit sub-block and the first information are used together to determine the second value; the first time-frequency
- the number of resource particles in the resource block used to transmit the bits related to the first bit sub-block included in the second bit block is equal to the first value and the second value. The minimum value.
- the first signal is a wireless signal.
- the first signal is a baseband signal.
- the first signal is a radio frequency signal.
- the first time-frequency resource block is PUSCH.
- the first time-frequency resource block includes one PUSCH.
- the first time-frequency resource block includes one sPUSCH (shortPUSCH, short PUSCH).
- the first time-frequency resource block includes one NB-PUSCH (Narrow Band PUSCH, Narrow Band PUSCH).
- the first time-frequency resource block is a resource configured for service data transmission.
- the first time-frequency resource block includes a positive integer number of REs (Resource Elements, resource particles).
- one RE occupies one multi-carrier symbol in the time domain and one sub-carrier in the frequency domain.
- the multi-carrier symbol is an OFDM (Orthogonal Frequency Division Multiplexing, Orthogonal Frequency Division Multiplexing) symbol.
- the multi-carrier symbol is an SC-FDMA (Single Carrier-Frequency Division Multiple Access, single-carrier frequency division multiple access) symbol.
- SC-FDMA Single Carrier-Frequency Division Multiple Access, single-carrier frequency division multiple access
- the multi-carrier symbol is a DFT-S-OFDM (Discrete Fourier Transform Spread OFDM, Discrete Fourier Transform Orthogonal Frequency Division Multiplexing) symbol.
- DFT-S-OFDM Discrete Fourier Transform Spread OFDM, Discrete Fourier Transform Orthogonal Frequency Division Multiplexing
- the first time-frequency resource block includes a positive integer number of subcarriers in the frequency domain.
- the first time-frequency resource block includes a positive integer number of PRBs (Physical Resource Block, physical resource block) in the frequency domain.
- PRBs Physical Resource Block, physical resource block
- the first time-frequency resource block includes a positive integer number of RBs (Resource blocks, resource blocks) in the frequency domain.
- the first time-frequency resource block includes a positive integer number of multi-carrier symbols in the time domain.
- the first time-frequency resource block includes a positive integer number of slots in the time domain.
- the first time-frequency resource block includes a positive integer number of sub-slots in the time domain.
- the first time-frequency resource block includes a positive integer number of sub-milliseconds (ms) in the time domain.
- the first time-frequency resource block includes a positive integer number of discontinuous time slots in the time domain.
- the first time-frequency resource block includes a positive integer number of consecutive time slots in the time domain.
- the first time-frequency resource block includes a positive integer number of sub-frames in the time domain.
- the first time-frequency resource block is configured by higher layer signaling.
- the first time-frequency resource block is configured by RRC (Radio Resource Control, radio resource control) signaling.
- RRC Radio Resource Control, radio resource control
- the first time-frequency resource block is configured by MAC CE (Medium Access Control Layer Control Element) signaling.
- MAC CE Medium Access Control Layer Control Element
- the first time-frequency resource block is pre-configured.
- the number of multi-carrier symbols included in the first time-frequency resource block in the time domain is configured by higher layer signaling.
- the number of multi-carrier symbols included in the first time-frequency resource block in the time domain is configured by RRC signaling.
- the number of multi-carrier symbols included in the time domain of the first time-frequency resource block is configured by MAC CE signaling.
- the resource particle is RE.
- the resource particle includes an RE.
- the resource particle includes one RB.
- the resource particle includes one subcarrier in the frequency domain.
- the resource particle includes one multi-carrier symbol in the time domain.
- the second bit block includes control information.
- the second bit block includes UCI.
- the second bit block includes a HARQ-ACK codebook.
- the second bit block includes a CSI (Channel State Information) report.
- CSI Channel State Information
- the second bit block includes a positive integer number of bits.
- the first bit block includes control information.
- the first bit block includes UCI.
- the first bit block includes a HARQ-ACK codebook.
- the first bit block includes a positive integer number of bits.
- the first bit block includes CSI report.
- the first bit sub-block includes UCI.
- the second bit sub-block includes UCI.
- the priority corresponding to the first bit sub-block is high priority
- the priority corresponding to the second bit sub-block is low priority
- the first bit sub-block includes a high-priority HARQ-ACK codebook
- the second bit sub-block includes a low-priority HARQ-ACK codebook
- the second bit sub-block includes CSI report.
- the first bit sub-block and the second bit sub-block respectively include HARQ-ACK codebooks with different priorities.
- the first bit sub-block includes the HARQ-ACK codebook of the URLLC service type
- the second bit sub-block includes the HARQ-ACK codebook of the eMBB service type.
- the first bit sub-block and the second bit sub-block respectively include HARQ-ACK codebooks of different service types.
- the first bit sub-block and the second bit sub-block are respectively used in different communication modes.
- the number of bits included in the first bit sub-block is used to select the first value from a plurality of candidate values.
- the first node receives third signaling; the third signaling indicates the first information.
- the first node receives third signaling; the third signaling includes a first field, and the first field indicates the first information.
- the first node receives third signaling; the beta_offset indicator field in the third signaling indicates the first information.
- the first node receives third signaling; the third signaling indicates second information, and the second information and the number of bits in the second sub-bit block are jointly used to determine the second sub-bit block. Three values.
- the beta_offset indicator field in the third signaling indicates the second information.
- the second value, the third value, and the first value are used together to determine that the first time-frequency resource block is used to transmit the second bit The number of resource particles of bits related to the second sub-bit block included in the block.
- the first bit sub-block includes high-priority UCI information.
- the second bit sub-block includes low-priority UCI information.
- the first bit sub-block includes a high priority SR (Scheduling Request, scheduling request).
- the number of bits included in the first bit sub-block is equal to the payload size of the high-priority UCI information.
- the payload of the high-priority UCI information is a payload including CRC.
- the payload of the high-priority UCI information is a payload that does not include CRC.
- the high-priority UCI information includes a high-priority HACQ-ACK codebook.
- the number of bits included in the second bit sub-block is equal to the payload size of the low-priority UCI information.
- the payload of the low-priority UCI information is a payload including CRC.
- the payload of the low-priority UCI information is a payload that does not include CRC.
- the low-priority UCI information includes a low-priority HACQ-ACK codebook.
- Embodiment 1B illustrates a processing flowchart of the first node according to an embodiment of the present application, as shown in FIG. 1B.
- the first node in this application receives the first signaling and the second signaling in step 101B; and sends the target signal in the target air interface resource block in step 102B.
- the first signaling and the second signaling are respectively used to determine a first air interface resource block and a second air interface resource block; the first air interface resource block is reserved for the first air interface resource block; Bit block transmission, the second air interface resource block is reserved for transmission of the second bit block, the time domain resources occupied by the first air interface resource block and the time domain occupied by the second air interface resource block Resources overlap; the first bit block is used to generate the target signal; the target air interface resource block is the first air interface resource block, or the target air interface resource block is the second air interface resource Block; the expiration time of the first air interface resource block in the time domain is the first time, and the number of bits included in the first bit block is used to determine the second time; the second time is no earlier than in the time domain The first moment; the time interval between the second moment and the first moment is used to determine whether the bits in the second bit block are used to generate the target signal; the first bit The block and the second bit block respectively correspond to different types.
- the target signal is a wireless signal.
- the target signal is a baseband signal.
- the target signal is a radio frequency signal.
- all the bits in the first bit block are used to generate the target signal.
- some bits in the first bit block are used to generate the target signal.
- all or part of the bits in the first bit block are used to generate the target signal after a bundling operation.
- all or part of the bits in the first bit block are used to generate the target signal after undergoing a logical AND operation.
- all or part of the bits in the first bit block are used to generate the target signal after undergoing a logical OR operation.
- all or part of the bits in the first bit block are used to generate the target signal after undergoing a logical exclusive OR operation.
- the target signal is that all or part of the bits in the first bit block are sequentially subjected to CRC insertion (CRC Insertion), segmentation, coding block level CRC insertion (CRC Insertion), and channel coding ( Channel Coding, Rate Matching, Concatenation, Scrambling, Modulation, Layer Mapping, Precoding, Mapping to Resource Element , Multi-carrier symbol generation (Generation), modulation and upconversion (Modulation and Upconversion) part or all of the output after.
- CRC Insertion CRC Insertion
- segmentation coding block level CRC insertion
- CRC Insertion CRC Insertion
- channel coding Channel Coding, Rate Matching, Concatenation, Scrambling, Modulation, Layer Mapping, Precoding, Mapping to Resource Element , Multi-carrier symbol generation (Generation), modulation and upconversion (Modulation and Upconversion) part or all of the output after.
- the target signal includes a first sub-signal; the first sub-signal is that all or part of the bits in the first bit block are sequentially added by CRC, segmented, coded block-level CRC added, and channel coding , Rate matching, concatenation, scrambling, modulation, layer mapping, precoding, mapping to resource particles, multi-carrier symbol generation, modulating some or all of the output after upconversion.
- the target signal is that all or part of the bits in the first bit block undergo CRC addition, segmentation, coding block-level CRC addition, channel coding, rate matching, concatenation, and addition after bundling operation. Scrambling, modulation, layer mapping, precoding, mapping to resource particles, multi-carrier symbol generation, modulating part or all of the output after up-conversion.
- the target signal includes a first sub-signal; the first sub-signal is that all or part of the bits in the first bit block are sequentially added by CRC after bundling operation, segmented, and coded at the block level.
- CRC addition channel coding, rate matching, concatenation, scrambling, modulation, layer mapping, precoding, mapping to resource particles, multi-carrier symbol generation, modulating part or all of the output after up-conversion.
- the target signal is that the bits generated by all or part of the bits in the first bit block undergo CRC addition, segmentation, coding block-level CRC addition, channel coding, rate matching, concatenation, and scrambling in sequence. , Modulation, layer mapping, precoding, mapping to resource particles, multi-carrier symbol generation, modulating part or all of the output after up-conversion.
- the target signal includes a first sub-signal; the first sub-signal is that the bits generated by all or part of the bits in the first bit block are added, segmented, and coded block-level CRC in sequence. Adding, channel coding, rate matching, concatenation, scrambling, modulation, layer mapping, precoding, mapping to resource particles, multi-carrier symbol generation, modulating part or all of the output after upconversion.
- the bits related to the second bit block carried by the target signal and the bits carried by the target signal are related to the target signal.
- the bits related to the first bit block adopt independent channel coding respectively.
- the bits related to the first bit block carried by the target signal are channel-encoded using Polar codes.
- the bits related to the first bit block carried by the target signal are channel-encoded using a block code.
- the bits related to the second bit block carried by the target signal are channel-encoded using an LDPC code.
- the first signaling display indicates the first air interface resource block.
- the second signaling display indicates the second air interface resource block.
- a field in the first signaling indicates the first air interface resource block.
- a field in the second signaling indicates the second air interface resource block.
- the first signaling set includes a positive integer number of signaling
- the first signaling is the last signaling in the first signaling set
- the first bit block includes the first signaling.
- the first signaling includes scheduling information of the first bit block, and the scheduling information indicates the first air interface resource block.
- the first signaling indicates the first air interface resource block in a first air interface resource set, and the number of bits included in the first bit block is used to determine the first air interface resource set.
- the second signaling includes scheduling information of the second bit block, and the scheduling information indicates the second air interface resource block.
- the first signaling is dynamically configured.
- the first signaling is physical layer (Physical layer) signaling.
- the first signaling is a downlink grant (DL Grant).
- DL Grant downlink grant
- the first signaling is DCI (Downlink Control Information, Downlink Control Information) signaling.
- DCI Downlink Control Information, Downlink Control Information
- the first signaling includes one or more fields in one DCI.
- the first signaling is transmitted on a downlink physical layer control channel (that is, a downlink channel that can only be used to carry physical layer signaling).
- a downlink physical layer control channel that is, a downlink channel that can only be used to carry physical layer signaling.
- the first signaling is DCI format 1_0, and the specific definition of the DCI format 1_0 can be found in section 7.3.1.2 of 3GPP TS38.212.
- the first signaling is DCI format 1_1, and the specific definition of the DCI format 1_1 can be found in section 7.3.1.2 of 3GPP TS38.212.
- the first signaling is DCI format 1_2, and the specific definition of the DCI format 1_2 can be found in section 7.3.1.2 of 3GPP TS38.212.
- the first signaling includes signaling used to indicate SPS (Semi-Persistent Scheduling, quasi-static scheduling) release (Release).
- SPS Semi-Persistent Scheduling, quasi-static scheduling
- the first signaling includes signaling used to indicate configuration information of a downlink physical layer data channel.
- the first signaling includes signaling used to indicate PDSCH (Physical Downlink Shared Channel, physical downlink shared channel) configuration information.
- PDSCH Physical Downlink Shared Channel, physical downlink shared channel
- the first signaling includes signaling used for downlink physical layer data channel scheduling.
- the first signaling includes signaling used for PDSCH scheduling.
- the downlink physical layer control channel is PDCCH (Physical Downlink Control Channel, Physical Downlink Control Channel).
- the downlink physical layer control channel is sPDCCH (short PDCCH, short PDCCH).
- the downlink physical layer control channel is NB-PDCCH (Narrow Band PDCCH, Narrow Band PDCCH).
- the downlink physical layer data channel is PDSCH.
- the downlink physical layer data channel is sPDSCH (short PDSCH, short PDSCH).
- the downlink physical layer data channel is NB-PDSCH (Narrow Band PDSCH, narrowband PDSCH).
- the second signaling is dynamically configured.
- the second signaling is physical layer signaling.
- the second signaling is a downlink grant.
- the second signaling is DCI.
- the second signaling includes one or more domains in one DCI.
- the second signaling is transmitted on a downlink physical layer control channel (that is, a downlink channel that can only be used to carry physical layer signaling).
- a downlink physical layer control channel that is, a downlink channel that can only be used to carry physical layer signaling.
- the second signaling is DCI format 1_0, and the specific definition of the DCI format 1_0 can be found in section 7.3.1.2 of 3GPP TS38.212.
- the second signaling is DCI format 1_1, and the specific definition of DCI format 1_1 can be found in section 7.3.1.2 of 3GPP TS38.212.
- the second signaling is DCI format 1_2, and the specific definition of DCI format 1_2 can be found in section 7.3.1.2 of 3GPP TS38.212.
- the second signaling includes signaling used to indicate SPS release.
- the second signaling includes signaling used to indicate configuration information of a downlink physical layer data channel.
- the second signaling includes signaling used to indicate PDSCH configuration information.
- the second signaling includes signaling used for downlink physical layer data channel scheduling.
- the second signaling includes signaling used for PDSCH scheduling.
- the downlink physical layer control channel is PDCCH.
- the downlink physical layer control channel is sPDCCH.
- the downlink physical layer control channel is NB-PDCCH.
- the downlink physical layer data channel is PDSCH.
- the downlink physical layer data channel is sPDSCH.
- the downlink physical layer data channel is NB-PDSCH.
- the first air interface resource block includes a positive integer number of REs (Resource Elements, resource particles).
- one RE occupies one multi-carrier symbol in the time domain and one sub-carrier in the frequency domain.
- the multi-carrier symbol is an OFDM (Orthogonal Frequency Division Multiplexing, Orthogonal Frequency Division Multiplexing) symbol.
- the multi-carrier symbol is an SC-FDMA (Single Carrier-Frequency Division Multiple Access, single-carrier frequency division multiple access) symbol.
- SC-FDMA Single Carrier-Frequency Division Multiple Access, single-carrier frequency division multiple access
- the multi-carrier symbol is a DFT-S-OFDM (Discrete Fourier Transform Spread OFDM, Discrete Fourier Transform Orthogonal Frequency Division Multiplexing) symbol.
- DFT-S-OFDM Discrete Fourier Transform Spread OFDM, Discrete Fourier Transform Orthogonal Frequency Division Multiplexing
- the first air interface resource block includes a positive integer number of subcarriers in the frequency domain.
- the first air interface resource block includes a positive integer number of PRBs (Physical Resource Block, physical resource block) in the frequency domain.
- PRBs Physical Resource Block, physical resource block
- the first air interface resource block includes a positive integer number of RBs (Resource blocks, resource blocks) in the frequency domain.
- the first air interface resource block includes a positive integer number of multi-carrier symbols in the time domain.
- the first air interface resource block includes a positive integer number of slots in the time domain.
- the first air interface resource block includes a positive integer number of sub-slots in the time domain.
- the first air interface resource block includes a positive integer number of sub-milliseconds (ms) in the time domain.
- the first air interface resource block includes a positive integer number of discontinuous time slots in the time domain.
- the first air interface resource block includes a positive integer number of consecutive time slots in the time domain.
- the first air interface resource block includes a positive integer number of sub-frames in the time domain.
- the first air interface resource block is configured by higher layer signaling.
- the first air interface resource block is configured by RRC (Radio Resource Control, radio resource control) signaling.
- RRC Radio Resource Control, radio resource control
- the first air interface resource block is configured by MAC CE (Medium Access Control Layer Control Element) signaling.
- MAC CE Medium Access Control Layer Control Element
- the second air interface resource block includes a positive integer number of REs.
- the second air interface resource block includes a positive integer number of subcarriers in the frequency domain.
- the second air interface resource block includes a positive integer number of PRBs in the frequency domain.
- the second air interface resource block includes a positive integer number of RBs in the frequency domain.
- the second air interface resource block includes a positive integer number of multi-carrier symbols in the time domain.
- the second air interface resource block includes a positive integer number of time slots in the time domain.
- the second air interface resource block includes a positive integer number of sub-slots in the time domain.
- the second air interface resource block includes a positive integer number of sub-milliseconds in the time domain.
- the second air interface resource block includes a positive integer number of discontinuous time slots in the time domain.
- the second air interface resource block includes a positive integer number of consecutive time slots in the time domain.
- the second air interface resource block includes a positive integer number of subframes in the time domain.
- the second air interface resource block is configured by higher layer signaling.
- the second air interface resource block is configured by RRC signaling.
- the second air interface resource block is configured by MAC CE signaling.
- the first air interface resource block is PUCCH.
- the first air interface resource block includes one PUSCH.
- the first air interface resource block includes one PUCCH.
- the PUCCH is configured for transmission of a high-priority HARQ-ACK codebook.
- the PUCCH is configured for transmission of the HARQ-ACK codebook of the URLLC service type.
- the PUCCH is a slot-based PUCCH.
- the PUCCH is a sub-slot-based PUCCH.
- the first air interface resource block includes one sPUSCH (short PUSCH, short PUSCH).
- the first air interface resource block includes an NB-PUSCH (Narrow Band PUSCH, Narrow Band PUSCH).
- the second air interface resource block is PUSCH.
- the second air interface resource block includes one PUSCH.
- the PUSCH is configured for transmission of low-priority service data.
- the PUSCH is configured for the transmission of service data of the eMBB service type.
- the PUSCH is a slot-based PUSCH.
- the PUSCH is a sub-slot-based PUSCH.
- the second air interface resource block includes one sPUSCH.
- the second air interface resource block includes one NB-PUSCH.
- the second air interface resource block is a resource configured for service data transmission.
- the configuration information of the first air interface resource block includes occupied time domain resources, frequency domain resources, code domain resources, modulation methods, and low PAPR (Peak-to-Average Power Ratio, peak-to-average ratio) sequence , Pseudo-random sequence, cyclic shift, OCC (Orthogonal Cover Code, orthogonal mask), orthogonal sequence, maximum code rate, maximum payload size, or PUCCH format (format) One or more.
- PAPR Peak-to-Average Power Ratio, peak-to-average ratio
- OCC Orthogonal Cover Code, orthogonal mask
- orthogonal sequence maximum code rate
- maximum payload size or PUCCH format (format) One or more.
- the meaning that the first bit block and the second bit block of the sentence correspond to different types respectively includes: the first bit block is used to generate UCI, and the second bit block is used To generate data channels.
- the meaning that the first bit block and the second bit block respectively correspond to different types in the sentence includes: the physical layer channel generated by the first bit block is PUCCH, and the second bit block The generated physical layer channel is PUSCH.
- the meaning that the first bit block and the second bit block of the sentence correspond to different types respectively respectively includes: the logical channel generated by the first bit block is CCCH, and the second bit block is generated The logical channel is DTCH.
- the meaning that the first bit block and the second bit block of the sentence correspond to different types respectively includes: the first bit block is used for URLLC services, and the second bit block is used eMBB business.
- the meaning that the first bit block and the second bit block respectively correspond to different types of the sentence includes: the first bit block is used for eMBB services, and the second bit block is used URLLC business.
- the meaning that the first bit block and the second bit block of the sentence correspond to different types respectively includes: the priority of the first bit block and the priority of the second bit block The priority is different.
- the meaning that the first bit block and the second bit block respectively correspond to different types in the sentence includes: the priority of the first bit block is higher than the priority of the second bit block .
- the meaning that the first bit block and the second bit block of the sentence respectively correspond to different types include: the first bit block includes URLLC service type control signaling, and the second bit The block includes user data of the eMBB service type.
- the meaning that the first bit block and the second bit block of the sentence correspond to different types respectively includes: the first bit block includes a HARQ-ACK codebook (Codebook) of the URLLC service type,
- the second bit block includes user service data of the eMBB service type.
- the meaning that the first bit block and the second bit block respectively correspond to different types in the sentence includes: the service type of the first bit block and the service type of the second bit block are different .
- the first bit block includes service data/control signaling of the URLLC service type.
- the second bit block includes service data/control signaling of the eMBB service type.
- the first bit block includes UCI.
- the first bit block includes high priority UCI.
- the first bit block includes UCI for the URLLC service type.
- the first bit block includes a HARQ-ACK codebook.
- the first bit block includes a high-priority HARQ-ACK codebook.
- the first bit block includes a HARQ-ACK codebook for the URLLC service type.
- the second bit block includes low priority service data.
- the second bit block includes service data.
- the time domain resources occupied by the first air interface resource block and the time domain resources occupied by the second air interface resource block overlap in the sentence includes: there is a given OFDM symbol, so The time domain resources occupied by the first air interface resource block and the time domain resources occupied by the second air interface resource block both include the given OFDM symbol.
- the time domain resources occupied by the first air interface resource block of the sentence and the time domain resources occupied by the second air interface resource block overlap meaning that there is a given multi-carrier symbol
- the time domain resources occupied by the first air interface resource block and the time domain resources occupied by the second air interface resource block both include the given multi-carrier symbol.
- the time domain resources occupied by the first air interface resource block and the time domain resources occupied by the second air interface resource block overlap includes: The occupied time domain resources belong to the time domain resources occupied by the second air interface resource block.
- the sentence meaning that the time domain resources occupied by the first air interface resource block and the time domain resources occupied by the second air interface resource block overlap include: The occupied time domain resources belong to the time domain resources occupied by the first air interface resource block.
- both the first signaling and the second signaling include a first domain; the first domain included in the first signaling and the first domain included in the second signaling
- the fields respectively indicate the type corresponding to the first bit block and the type corresponding to the second bit block.
- the type corresponding to the first bit block is the priority indicated by the first field included in the first signaling.
- the type corresponding to the second bit block is the priority indicated by the first field included in the second signaling.
- the first field is a Priority Indicator field.
- the time interval between the second moment and the first moment is used by the first node to determine the bits in the second bit block Whether it is used to generate the target signal.
- the phrase that the first condition set is satisfied includes that all the conditions in the first condition set are satisfied.
- the first condition set includes a positive integer number of conditions.
- the conditions in the first set of conditions include: a third value is not greater than a first threshold; the number of bits included in the first bit block and the second bit block include The number of bits in is jointly used to determine the third value; the first threshold is related to the number of time-frequency resource particles included in the second air interface resource block.
- the conditions in the first set of conditions include: a third value is not greater than a first threshold; the number of bits included in the first bit block and the second bit block include The ratio of the number of bits is used to determine the third value; the first threshold is related to the number of time-frequency resource particles included in the second air interface resource block.
- the time-frequency resource particle is RE.
- the first node determines that the bits in the second bit block are not used to generate the target Signal.
- the first node determines that the target air interface resource block is the first air interface resource block.
- the first set of conditions includes a timeline condition (Timeline condition), and a specific description of the timeline condition can be found in section 9.2.5 of 3GPP TS38.213.
- a condition in the first set of conditions is or Timeline condition related to at least one of the Said Said And said
- a condition in the first set of conditions is or Timeline condition related to at least one of the Said Said
- a condition in the first set of conditions is or Timeline condition related to at least one of the Said Said
- a condition in the first set of conditions is or Timeline condition related to at least one of the Said Said
- TS38.213 for the specific definition, please refer to section 9.2.5 in 3GPP TS38.213.
- the first set of conditions includes a condition indicating that the second air interface resource block can support the transmission of the first bit block.
- the first set of conditions includes a timeline condition.
- the timeline condition refers to section 9.2.5 of 3GPP TS38.213; the first condition
- the timeline condition in the set is related to the earliest multi-carrier symbol in the first time domain resource set, and the first time domain resource set includes the time domain resources occupied by the first air interface resource block and the Time domain resources occupied by the second air interface resource block.
- whether the time interval between the second time and the first time is greater than a threshold is used to determine whether the bits in the second bit block are used to generate the target signal.
- the first air interface resource block and the second air interface resource block overlap in the frequency domain.
- the first air interface resource block and the second air interface resource block have no overlap in the frequency domain.
- the first time interval is equal to the time interval between the second time and the first time; when the ratio of the first time interval to the time domain resources occupied by the first air interface resource block is different When the ratio is greater than the first ratio, the bits in the second bit block are used to generate the target signal, and the target air interface resource block is the second air interface resource block; when the first time interval is compared with the first time interval When the ratio of time domain resources occupied by an air interface resource block is greater than the first ratio, the bits in the second bit block are not used to generate the target signal, and the target air interface resource block is the first air interface resource block .
- the first time interval is equal to the duration of a positive integer number of consecutive multi-carrier symbols
- the time domain resource occupied by the first air interface resource block is equal to a positive integer number of consecutive multi-carrier symbols Duration.
- the first ratio is configured at a higher layer.
- the first ratio is a dynamically indicated value.
- Embodiment 2 illustrates a schematic diagram of a network architecture according to the present application, as shown in FIG. 2.
- FIG. 2 illustrates a diagram of a network architecture 200 of 5G NR, LTE (Long-Term Evolution) and LTE-A (Long-Term Evolution Advanced) systems.
- the 5G NR or LTE network architecture 200 may be referred to as EPS (Evolved Packet System, evolved packet system) 200 with some other suitable terminology.
- EPS 200 may include one or more UE (User Equipment) 201, NG-RAN (Next Generation Radio Access Network) 202, EPC (Evolved Packet Core, Evolved Packet Core)/5G-CN (5G-Core Network) , 5G core network) 210, HSS (Home Subscriber Server, home subscriber server) 220 and Internet service 230.
- UE User Equipment
- NG-RAN Next Generation Radio Access Network
- EPC Evolved Packet Core, Evolved Packet Core
- 5G-CN 5G-Core Network
- HSS Home Subscriber Server, home subscriber server
- Internet service 230 Internet
- EPS can be interconnected with other access networks, but these entities/interfaces are not shown for simplicity. As shown in the figure, EPS provides packet switching services. However, those skilled in the art will readily understand that various concepts presented throughout this application can be extended to networks that provide circuit-switched services or other cellular networks.
- NG-RAN includes NR Node B (gNB) 203 and other gNB 204.
- gNB203 provides user and control plane protocol termination towards UE201.
- the gNB203 can be connected to other gNB204 via an Xn interface (for example, backhaul).
- the gNB203 may also be called a base station, base transceiver station, radio base station, radio transceiver, transceiver function, basic service set (BSS), extended service set (ESS), TRP (transmit and receive node), or some other suitable terminology.
- gNB203 provides UE201 with an access point to EPC/5G-CN 210.
- Examples of UE201 include cellular phones, smart phones, Session Initiation Protocol (SIP) phones, laptop computers, personal digital assistants (PDAs), satellite radios, non-terrestrial base station communications, satellite mobile communications, global positioning systems, multimedia devices , Video devices, digital audio players (for example, MP3 players), cameras, game consoles, drones, aircraft, narrowband IoT devices, machine-type communication devices, land vehicles, automobiles, wearable devices, or any Other similar functional devices.
- SIP Session Initiation Protocol
- PDAs personal digital assistants
- satellite radios non-terrestrial base station communications
- satellite mobile communications global positioning systems
- multimedia devices Video devices
- digital audio players for example, MP3 players
- cameras game consoles
- drones aircraft
- narrowband IoT devices machine-type communication devices
- machine-type communication devices land vehicles, automobiles, wearable devices, or any Other similar functional devices.
- EPC/5G-CN 210 includes MME (Mobility Management Entity)/AMF (Authentication Management Field)/UPF (User Plane Function, user plane function) 211, other MME/AMF/UPF214, S-GW (Service Gateway) 212 and P-GW (Packet Date Network Gateway) 213.
- MME Mobility Management Entity
- AMF Authentication Management Field
- UPF User Plane Function, user plane function
- S-GW Service Gateway
- P-GW Packet Date Network Gateway
- MME/AMF/UPF211 is a control node that processes the signaling between UE201 and EPC/5G-CN 210.
- MME/AMF/UPF211 provides bearer and connection management. All user IP (Internet Protocol, Internet Protocol) packets are transmitted through the S-GW212, and the S-GW212 itself is connected to the P-GW213.
- P-GW213 provides UE IP address allocation and other functions.
- the P-GW 213 is connected to the Internet service 230.
- the Internet service 230 includes the operator's corresponding Internet protocol service, which may specifically include the Internet, Intranet, IMS (IP Multimedia Subsystem, IP Multimedia Subsystem), and packet switching streaming service.
- the UE201 corresponds to the first node in this application.
- the UE 241 corresponds to the second node in this application.
- the gNB203 corresponds to the second node in this application.
- the UE 241 corresponds to the first node in this application.
- the UE201 corresponds to the second node in this application.
- Embodiment 3 shows a schematic diagram of an embodiment of a wireless protocol architecture of a user plane and a control plane according to the present application, as shown in FIG. 3.
- Figure 3 is a schematic diagram illustrating an embodiment of the radio protocol architecture for the user plane 350 and the control plane 300.
- Figure 3 shows three layers for the first communication node device (UE, gNB or RSU in V2X) and the second Communication node equipment (gNB, UE or RSU in V2X), or the radio protocol architecture of the control plane 300 between two UEs: layer 1, layer 2, and layer 3.
- Layer 1 (L1 layer) is the lowest layer and implements various PHY (physical layer) signal processing functions.
- the L1 layer will be referred to as PHY301 herein.
- Layer 2 (L2 layer) 305 is above PHY301 and is responsible for the link between the first communication node device and the second communication node device and the two UEs through PHY301.
- L2 layer 305 includes MAC (Medium Access Control) sublayer 302, RLC (Radio Link Control, radio link layer control protocol) sublayer 303, and PDCP (Packet Data Convergence Protocol, packet data convergence protocol) sublayer 304. These sublayers terminate at the second communication node device.
- the PDCP sublayer 304 provides multiplexing between different radio bearers and logical channels.
- the PDCP sublayer 304 also provides security by encrypting data packets, as well as providing support for cross-zone movement between the second communication node devices and the first communication node device.
- the RLC sublayer 303 provides segmentation and reassembly of upper layer data packets, retransmission of lost data packets, and reordering of data packets to compensate for out-of-order reception due to HARQ.
- the MAC sublayer 302 provides multiplexing between logic and transport channels.
- the MAC sublayer 302 is also responsible for allocating various radio resources (for example, resource blocks) in a cell among the first communication node devices.
- the MAC sublayer 302 is also responsible for HARQ operations.
- the RRC (Radio Resource Control) sublayer 306 in layer 3 (L3 layer) of the control plane 300 is responsible for obtaining radio resources (ie, radio bearers) and using the second communication node device and the first communication node device.
- the radio protocol architecture of the user plane 350 includes layer 1 (L1 layer) and layer 2 (L2 layer).
- the radio protocol architecture used for the first communication node device and the second communication node device is for the physical layer 351, L2
- the PDCP sublayer 354 in the layer 355, the RLC sublayer 353 in the L2 layer 355, and the MAC sublayer 352 in the L2 layer 355 are substantially the same as the corresponding layers and sublayers in the control plane 300, but the PDCP sublayer 354 is also Provides header compression for upper layer data packets to reduce radio transmission overhead.
- the L2 layer 355 in the user plane 350 also includes the SDAP (Service Data Adaptation Protocol) sublayer 356.
- SDAP Service Data Adaptation Protocol
- the SDAP sublayer 356 is responsible for the mapping between the QoS flow and the data radio bearer (DRB, Data Radio Bearer). To support business diversity.
- the first communication node device may have several upper layers above the L2 layer 355, including a network layer (for example, an IP layer) terminating at the P-GW on the network side and another terminating at the connection.
- Application layer at one end for example, remote UE, server, etc.).
- the wireless protocol architecture in FIG. 3 is applicable to the first node in this application.
- the wireless protocol architecture in FIG. 3 is applicable to the second node in this application.
- the first bit block in this application is generated in the RRC sublayer 306.
- the first bit block in this application is generated in the MAC sublayer 302.
- the first bit block in this application is generated in the MAC sublayer 352.
- the first bit block in this application is generated in the PHY301.
- the first bit block in this application is generated in the PHY351.
- the second bit block in this application is generated in the RRC sublayer 306.
- the second bit block in this application is generated in the MAC sublayer 302.
- the second bit block in this application is generated in the MAC sublayer 352.
- the second bit block in this application is generated in the PHY301.
- the second bit block in this application is generated from the PHY351.
- the first information in this application is generated in the RRC sublayer 306.
- the first information in this application is generated in the MAC sublayer 302.
- the first information in this application is generated in the MAC sublayer 352.
- the first information in this application is generated in the PHY301.
- the first information in this application is generated in the PHY351.
- the third bit block in this application is generated in the RRC sublayer 356.
- the third bit block in this application is generated in the MAC sublayer 302.
- the third bit block in this application is generated in the MAC sublayer 352.
- the third bit block in this application is generated in the PHY301.
- the third bit block in this application is generated from the PHY351.
- the first signaling in this application is generated in the PHY301.
- the first signaling in this application is generated in the PHY351.
- the second signaling in this application is generated in the PHY301.
- the second signaling in this application is generated in the PHY351.
- the first bit block in this application is generated in the RRC sublayer 306.
- the first bit block in this application is generated in the MAC sublayer 302.
- the first bit block in this application is generated in the MAC sublayer 352.
- the first bit block in this application is generated in the PHY301.
- the first bit block in this application is generated in the PHY351.
- the second bit block in this application is generated in the RRC sublayer 356.
- the second bit block in this application is generated in the MAC sublayer 302.
- the second bit block in this application is generated in the MAC sublayer 352.
- the second bit block in this application is generated in the PHY301.
- the second bit block in this application is generated from the PHY351.
- the third bit block in this application is generated in the RRC sublayer 356.
- the third bit block in this application is generated in the MAC sublayer 302.
- the third bit block in this application is generated in the MAC sublayer 352.
- the third bit block in this application is generated in the PHY301.
- the third bit block in this application is generated from the PHY351.
- the first signaling in this application is generated in the PHY301.
- the first signaling in this application is generated in the PHY351.
- the second signaling in this application is generated in the PHY301.
- the second signaling in this application is generated in the PHY351.
- Embodiment 4 shows a schematic diagram of the first communication device and the second communication device according to the present application, as shown in FIG. 4.
- FIG. 4 is a block diagram of a first communication device 410 and a second communication device 450 that communicate with each other in an access network.
- the first communication device 410 includes a controller/processor 475, a memory 476, a receiving processor 470, a transmitting processor 416, a multi-antenna receiving processor 472, a multi-antenna transmitting processor 471, a transmitter/receiver 418, and an antenna 420.
- the second communication device 450 includes a controller/processor 459, a memory 460, a data source 467, a transmitting processor 468, a receiving processor 456, a multi-antenna transmitting processor 457, a multi-antenna receiving processor 458, and a transmitter/receiver 454 And antenna 452.
- the upper layer data packet from the core network is provided to the controller/processor 475.
- the controller/processor 475 implements the functionality of the L2 layer.
- the controller/processor 475 provides header compression, encryption, packet segmentation and reordering, and multiplexing between logic and transport channels. Multiplexing, and allocation of radio resources to the second communication device 450 based on various priority measures.
- the controller/processor 475 is also responsible for retransmission of lost packets and signaling to the second communication device 450.
- the transmission processor 416 and the multi-antenna transmission processor 471 implement various signal processing functions for the L1 layer (ie, physical layer).
- the transmit processor 416 implements encoding and interleaving to facilitate forward error correction (FEC) at the second communication device 450, and based on various modulation schemes (e.g., binary phase shift keying (BPSK), quadrature phase shift Mapping of signal clusters for keying (QPSK), M phase shift keying (M-PSK), and M quadrature amplitude modulation (M-QAM)).
- FEC forward error correction
- BPSK binary phase shift keying
- QPSK quadrature phase shift Mapping of signal clusters for keying
- M-PSK M phase shift keying
- M-QAM M quadrature amplitude modulation
- the multi-antenna transmission processor 471 performs digital spatial precoding on the coded and modulated symbols, including codebook-based precoding and non-codebook-based precoding, and beamforming processing to generate one or more
- the transmit processor 416 maps each spatial stream to subcarriers, multiplexes it with a reference signal (e.g., pilot) in the time domain and/or frequency domain, and then uses an inverse fast Fourier transform (IFFT) to generate The physical channel that carries the multi-carrier symbol stream in the time domain.
- IFFT inverse fast Fourier transform
- the multi-antenna transmission processor 471 performs transmission simulation precoding/beamforming operations on the time-domain multi-carrier symbol stream.
- Each transmitter 418 converts the baseband multi-carrier symbol stream provided by the multi-antenna transmission processor 471 into a radio frequency stream, and then provides it to a different antenna 420.
- each receiver 454 receives a signal through its corresponding antenna 452.
- Each receiver 454 recovers the information modulated on the radio frequency carrier, and converts the radio frequency stream into a baseband multi-carrier symbol stream and provides it to the receiving processor 456.
- the receiving processor 456 and the multi-antenna receiving processor 458 implement various signal processing functions of the L1 layer.
- the multi-antenna reception processor 458 performs reception analog precoding/beamforming operations on the baseband multi-carrier symbol stream from the receiver 454.
- the receiving processor 456 uses a Fast Fourier Transform (FFT) to convert the baseband multi-carrier symbol stream after receiving the analog precoding/beamforming operation from the time domain to the frequency domain.
- FFT Fast Fourier Transform
- the reference signal will be used for channel estimation.
- the second communication device 450 is any spatial flow of the destination.
- the symbols on each spatial stream are demodulated and recovered in the receiving processor 456, and soft decisions are generated.
- the receiving processor 456 then decodes and deinterleaves the soft decision to recover the upper layer data and control signals transmitted by the first communication device 410 on the physical channel.
- the upper layer data and control signals are then provided to the controller/processor 459.
- the controller/processor 459 implements the functions of the L2 layer.
- the controller/processor 459 may be associated with a memory 460 that stores program codes and data.
- the memory 460 may be referred to as a computer-readable medium.
- the controller/processor 459 provides demultiplexing between transport and logical channels, packet reassembly, decryption, header decompression , Control signal processing to recover upper layer data packets from the core network.
- the upper layer data packets are then provided to all protocol layers above the L2 layer.
- Various control signals can also be provided to L3 for L3 processing.
- a data source 467 is used to provide upper layer data packets to the controller/processor 459.
- the data source 467 represents all protocol layers above the L2 layer.
- the controller/processor 459 implements the header based on the radio resource allocation Compression, encryption, packet segmentation and reordering, as well as multiplexing between logic and transport channels, implement L2 layer functions for the user plane and control plane.
- the controller/processor 459 is also responsible for retransmission of lost packets and signaling to the first communication device 410.
- the transmission processor 468 performs modulation mapping and channel coding processing, and the multi-antenna transmission processor 457 performs digital multi-antenna spatial precoding, including codebook-based precoding and non-codebook-based precoding, and beamforming processing, followed by transmission
- the processor 468 modulates the generated spatial stream into a multi-carrier/single-carrier symbol stream, which is subjected to an analog precoding/beamforming operation in the multi-antenna transmission processor 457 and then provided to different antennas 452 via the transmitter 454.
- Each transmitter 454 first converts the baseband symbol stream provided by the multi-antenna transmission processor 457 into a radio frequency symbol stream, and then supplies it to the antenna 452.
- the function at the first communication device 410 is similar to that in the transmission from the first communication device 410 to the second communication device 450.
- Each receiver 418 receives radio frequency signals through its corresponding antenna 420, converts the received radio frequency signals into baseband signals, and provides the baseband signals to the multi-antenna receiving processor 472 and the receiving processor 470.
- the receiving processor 470 and the multi-antenna receiving processor 472 jointly implement the functions of the L1 layer.
- the controller/processor 475 implements L2 layer functions.
- the controller/processor 475 may be associated with a memory 476 that stores program codes and data.
- the memory 476 may be referred to as a computer-readable medium.
- the controller/processor 475 In the transmission from the second communication device 450 to the first communication device 410, the controller/processor 475 provides demultiplexing between transport and logical channels, packet reassembly, decryption, and header decompression. , Control signal processing to recover upper layer data packets from UE450.
- the upper layer data packet from the controller/processor 475 may be provided to the core network.
- the first node in this application includes the second communication device 450, and the second node in this application includes the first communication device 410.
- the first node is user equipment
- the second node is user equipment
- the first node is a user equipment
- the second node is a relay node
- the first node is a relay node
- the second node is a user equipment
- the first node is user equipment
- the second node is base station equipment
- the first node is a relay node
- the second node is a base station device
- the second communication device 450 includes: at least one controller/processor; the at least one controller/processor is responsible for HARQ operations.
- the first communication device 410 includes: at least one controller/processor; the at least one controller/processor is responsible for HARQ operations.
- the first communication device 410 includes: at least one controller/processor; the at least one controller/processor is responsible for using positive acknowledgement (ACK) and/or negative acknowledgement (NACK) )
- the protocol performs error detection to support HARQ operations.
- the second communication device 450 includes: at least one processor and at least one memory, the at least one memory includes computer program code; the at least one memory and the computer program code are configured to interact with the Use at least one processor together.
- the second communication device 450 means at least: receiving the first information in this application; sending the first signal in this application in the first time-frequency resource block in this application, and the first The signal carries the second bit block in this application.
- the first bit block in this application is used to generate the second bit block; the first bit block includes the first bit sub-block in this application and the second bit block in this application.
- Bit sub-block the priority corresponding to the first bit sub-block is higher than the priority corresponding to the second bit sub-block; resources in the first time-frequency resource block used to transmit the second bit block
- the number of particles is not greater than the first value in this application, and the number of bits included in the first bit sub-block is used to determine the first value; the number of bits included in the first bit sub-block is sum
- the first information is jointly used to determine the second value in the present application; the first time-frequency resource block is used to transmit the data included in the second bit block and the first bit sub-block
- the number of the resource particles of the related bit is equal to the minimum value of the first value and the second value.
- the second communication device 450 corresponds to the first node in this application.
- the second communication device 450 includes: a memory storing a computer-readable instruction program, the computer-readable instruction program generates actions when executed by at least one processor, and the actions include: receiving the present The first information in the application; the first signal in this application is sent in the first time-frequency resource block in this application, and the first signal carries the second bit block in this application .
- the first bit block in this application is used to generate the second bit block; the first bit block includes the first bit sub-block in this application and the second bit block in this application.
- Bit sub-block the priority corresponding to the first bit sub-block is higher than the priority corresponding to the second bit sub-block; resources in the first time-frequency resource block used to transmit the second bit block
- the number of particles is not greater than the first value in this application, and the number of bits included in the first bit sub-block is used to determine the first value; the number of bits included in the first bit sub-block is sum
- the first information is jointly used to determine the second value in the present application; the first time-frequency resource block is used to transmit the data included in the second bit block and the first bit sub-block
- the number of the resource particles of the related bit is equal to the minimum value of the first value and the second value.
- the second communication device 450 corresponds to the first node in this application.
- the first communication device 410 includes: at least one processor and at least one memory, the at least one memory includes computer program code; the at least one memory and the computer program code are configured to interact with the Use at least one processor together.
- the first communication device 410 means at least: sending the first information in this application; receiving the first signal in this application in the first time-frequency resource block in this application, and the first The signal carries the second bit block in this application.
- the first bit block in this application is used to generate the second bit block; the first bit block includes the first bit sub-block in this application and the second bit block in this application.
- Bit sub-block the priority corresponding to the first bit sub-block is higher than the priority corresponding to the second bit sub-block; resources in the first time-frequency resource block used to transmit the second bit block
- the number of particles is not greater than the first value in this application, and the number of bits included in the first bit sub-block is used to determine the first value; the number of bits included in the first bit sub-block is sum
- the first information is jointly used to determine the second value in the present application; the first time-frequency resource block is used to transmit the data included in the second bit block and the first bit sub-block
- the number of the resource particles of the related bit is equal to the minimum value of the first value and the second value.
- the first communication device 410 corresponds to the second node in this application.
- the first communication device 410 includes: a memory storing a computer-readable instruction program, the computer-readable instruction program generates an action when executed by at least one processor, and the action includes: sending this The first information in the application; the first signal in the application is received in the first time-frequency resource block in the application, and the first signal carries the second bit block in the application .
- the first bit block in this application is used to generate the second bit block; the first bit block includes the first bit sub-block in this application and the second bit block in this application.
- Bit sub-block the priority corresponding to the first bit sub-block is higher than the priority corresponding to the second bit sub-block; resources in the first time-frequency resource block used to transmit the second bit block
- the number of particles is not greater than the first value in this application, and the number of bits included in the first bit sub-block is used to determine the first value; the number of bits included in the first bit sub-block is sum
- the first information is jointly used to determine the second value in the present application; the first time-frequency resource block is used to transmit the data included in the second bit block and the first bit sub-block
- the number of the resource particles of the related bit is equal to the minimum value of the first value and the second value.
- the first communication device 410 corresponds to the second node in this application.
- the antenna 452 the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460, the data At least one of the sources 467 ⁇ is used to receive the first information in this application.
- the antenna 420, the transmitter 418, the multi-antenna transmission processor 471, the transmission processor 416, the controller/processor 475, the memory 476 ⁇ at least One is used to send the first information in this application.
- the antenna 452 the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460, the data At least one of the sources 467 ⁇ is used to receive the first signaling in this application.
- the antenna 420, the transmitter 418, the multi-antenna transmission processor 471, the transmission processor 416, the controller/processor 475, the memory 476 ⁇ at least One is used to send the first signaling in this application.
- the antenna 452 the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460, the data At least one of the sources 467 ⁇ is used to receive the second signaling in this application.
- the antenna 420, the transmitter 418, the multi-antenna transmission processor 471, the transmission processor 416, the controller/processor 475, the memory 476 ⁇ at least One is used to send the second signaling in this application.
- the antenna 452 the transmitter 454, the multi-antenna transmission processor 458, the transmission processor 468, the controller/processor 459, the memory 460, the data At least one of the sources 467 ⁇ is used to transmit the first signal in this application in the first time-frequency resource block in this application.
- the antenna 420, the receiver 418, the multi-antenna receiving processor 472, the receiving processor 470, the controller/processor 475, the memory 476 ⁇ at least One of them is used to receive the first signal in this application in the first time-frequency resource block in this application.
- the second communication device 450 includes: at least one processor and at least one memory, the at least one memory includes computer program code; the at least one memory and the computer program code are configured to interact with the Use at least one processor together.
- the second communication device 450 means at least: receiving the first signaling in this application and the second signaling in this application, and the first signaling and the second signaling are respectively used for Determine the first air interface resource block in this application and the second air interface resource block in this application; send the target signal in this application in the target air interface resource block in this application.
- the first air interface resource block is reserved for the transmission of the first bit block in this application
- the second air interface resource block is reserved for the transmission of the second bit block in this application.
- the number of bits included in the first bit block is used to determine the second time in this application; the second time is not earlier than the first time in the time domain; the second The time interval between the time and the first time is used to determine whether the bits in the second bit block are used to generate the target signal; the first bit block and the second bit block respectively correspond to Different types.
- the second communication device 450 corresponds to the first node in this application.
- the second communication device 450 includes: a memory storing a computer-readable instruction program, the computer-readable instruction program generates actions when executed by at least one processor, and the actions include: receiving the present The first signaling in the application and the second signaling in the application, the first signaling and the second signaling are respectively used to determine the first air interface resource block in the application And the second air interface resource block in this application; the target signal in this application is sent in the target air interface resource block in this application.
- the first air interface resource block is reserved for the transmission of the first bit block in this application
- the second air interface resource block is reserved for the transmission of the second bit block in this application.
- the number of bits included in the first bit block is used to determine the second time in this application; the second time is not earlier than the first time in the time domain; the second The time interval between the time and the first time is used to determine whether the bits in the second bit block are used to generate the target signal; the first bit block and the second bit block respectively correspond to Different types.
- the second communication device 450 corresponds to the first node in this application.
- the first communication device 410 includes: at least one processor and at least one memory, the at least one memory includes computer program code; the at least one memory and the computer program code are configured to interact with the Use at least one processor together.
- the first communication device 410 means at least: sending the first signaling in this application and the second signaling in this application, and the first signaling and the second signaling are respectively used for Determine the first air interface resource block in this application and the second air interface resource block in this application; receive the target signal in this application in the target air interface resource block in this application.
- the first air interface resource block is reserved for the transmission of the first bit block in this application
- the second air interface resource block is reserved for the transmission of the second bit block in this application.
- the number of bits included in the first bit block is used to determine the second time in this application; the second time is not earlier than the first time in the time domain; the second The time interval between the time and the first time is used to determine whether the bits in the second bit block are used to generate the target signal; the first bit block and the second bit block respectively correspond to Different types.
- the first communication device 410 corresponds to the second node in this application.
- the first communication device 410 includes: a memory storing a computer-readable instruction program, the computer-readable instruction program generates an action when executed by at least one processor, and the action includes: sending this The first signaling in the application and the second signaling in the application, the first signaling and the second signaling are respectively used to determine the first air interface resource block in the application And the second air interface resource block in this application; the target signal in this application is received in the target air interface resource block in this application.
- the first air interface resource block is reserved for the transmission of the first bit block in this application
- the second air interface resource block is reserved for the transmission of the second bit block in this application.
- the number of bits included in the first bit block is used to determine the second time in this application; the second time is not earlier than the first time in the time domain; the second The time interval between the time and the first time is used to determine whether the bits in the second bit block are used to generate the target signal; the first bit block and the second bit block respectively correspond to Different types.
- the first communication device 410 corresponds to the second node in this application.
- the antenna 452 the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460, the data At least one of the sources 467 ⁇ is used to receive the first signaling in this application.
- the antenna 420, the transmitter 418, the multi-antenna transmission processor 471, the transmission processor 416, the controller/processor 475, the memory 476 ⁇ at least One is used to send the first signaling in this application.
- the antenna 452 the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460, the data At least one of the sources 467 ⁇ is used to receive the second signaling in this application.
- the antenna 420, the transmitter 418, the multi-antenna transmission processor 471, the transmission processor 416, the controller/processor 475, the memory 476 ⁇ at least One is used to send the second signaling in this application.
- the antenna 452 the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460, the data At least one of the sources 467 ⁇ is used to receive the first signal in this application.
- the antenna 420, the transmitter 418, the multi-antenna transmission processor 471, the transmission processor 416, the controller/processor 475, the memory 476 ⁇ at least One is used to send the first signal in this application.
- the antenna 452 the transmitter 454, the multi-antenna transmission processor 458, the transmission processor 468, the controller/processor 459, the memory 460, the data At least one of the sources 467 ⁇ is used to transmit the target signal in this application in the target air interface resource block in this application.
- the antenna 420, the receiver 418, the multi-antenna receiving processor 472, the receiving processor 470, the controller/processor 475, the memory 476 ⁇ at least One is used to receive the target signal in this application in the target air interface resource block in this application.
- Embodiment 5A illustrates a wireless signal transmission flowchart according to an embodiment of the present application, as shown in FIG. 5A.
- the first node U1A and the second node U2A communicate through an air interface.
- the dashed boxes F1A and F2A are optional, and the sequence between the dashed boxes F1A and F2A does not represent a specific time sequence.
- the first node U1A receives the first information in step S511A; receives the first signaling in step S5101A; receives the second signaling in step S5102A; and sends the first signal in the first time-frequency resource block in step S512A .
- the second node U2A sends the first information in step S521A; sends the first signaling in step S5201A; sends the second signaling in step S5202A; and receives the first signal in the first time-frequency resource block in step S522A .
- the first bit block is used to generate the second bit block; the first bit block includes a first bit sub-block and a second bit sub-block, and the first bit sub-block corresponds to the priority
- the priority is higher than the priority corresponding to the second bit sub-block; the number of resource particles used to transmit the second bit block in the first time-frequency resource block is not greater than a first value, and the first bit
- the number of bits included in the sub-block is used to determine the first value; the number of bits included in the first-bit sub-block and the first information are used together to determine the second value; the first time-frequency The number of resource particles in the resource block used to transmit the bits related to the first bit sub-block included in the second bit block is equal to the first value and the second value.
- a target parameter is used to determine the first value; the target parameter is the first parameter or the second parameter, and the first parameter and the second parameter Respectively corresponding to the first priority and the second priority; the priority of the first bit sub-block is the first priority, and the priority of the second bit sub-block is the second priority Level; the number of bits included in the first bit sub-block and the number of bits included in the second bit sub-block are jointly used to determine the target parameter.
- the first value when the second value is greater than the second candidate value, the first value is the first candidate value; when the second value is not greater than the second candidate value, The first value is the second candidate value.
- the first node U1A is the first node in this application.
- the second node U2A is the second node in this application.
- the first node U1A is a UE.
- the second node U2A is a base station.
- the second node U2A is a UE.
- the air interface between the second node U2A and the first node U1A is a Uu interface.
- the air interface between the second node U2A and the first node U1A includes a cellular link.
- the air interface between the second node U2A and the first node U1A includes a wireless interface between a base station device and a user equipment.
- the first priority and the second priority are different priorities (Priority).
- the first priority is a high priority
- the second priority is a low priority
- the first priority is a priority corresponding to a URLLC service type
- the second priority is a low priority corresponding to an eMBB service type.
- the first priority is a low priority
- the second priority is a high priority
- the second priority is a priority corresponding to a URLLC service type
- the first priority is a low priority corresponding to an eMBB service type
- the first priority and the second priority are the priorities corresponding to different communication modes, respectively.
- the first priority and the second priority are priorities corresponding to different service types, respectively.
- the first air interface resource block and the first time-frequency resource block overlap in the time domain.
- the second air interface resource block and the first time-frequency resource block overlap in the time domain.
- the first air interface resource block and the second air interface resource block both overlap with the first time-frequency resource block in the time domain.
- the first air interface resource block and the second air interface resource block overlap in the time domain.
- the first signaling is the last (Last) signaling in the first signaling set, and all signaling in the first signaling set indicates the first priority.
- the second signaling is the last signaling in the second signaling set, and all signaling in the second signaling set indicates the second priority.
- the first air interface resource block is an air interface resource block configured to the first bit sub-block.
- the second air interface resource block is an air interface resource block configured to the second bit sub-block.
- the first air interface resource block includes a PUCCH (Physical Uplink Control Channel).
- PUCCH Physical Uplink Control Channel
- the PUCCH is configured to a high-priority HARQ-ACK codebook.
- the PUCCH is configured to the HARQ-ACK codebook of the URLLC service type.
- the PUCCH is a slot-based PUCCH.
- the PUCCH is a sub-slot-based PUCCH.
- the second air interface resource block includes one PUCCH.
- the PUCCH is configured to a low-priority HARQ-ACK codebook.
- the PUCCH is configured to the HARQ-ACK codebook of the eMBB service type.
- the PUCCH is a slot-based PUCCH.
- the PUCCH is a sub-slot-based PUCCH.
- the first signaling set includes a positive integer number of signaling
- the first bit sub-block includes a positive integer number of HARQ corresponding to the positive integer number of signaling in the first signaling set.
- ACK bit, the positive integer number of signaling in the first signaling set all indicate the first priority.
- the positive integer numbers of signaling in the first signaling set are all DCI.
- the positive integer number of signaling in the first signaling set includes the second signaling.
- the positive integer number of signaling in the first signaling set includes one domain, and the positive integer number of signaling in the first signaling set includes The one field indicates the first priority, and the one field is the Priority Indicator field.
- the second signaling set includes a positive integer number of signaling
- the second bit sub-block includes a positive integer number of HARQ corresponding to the positive integer number of signaling in the second signaling set.
- ACK bit, the positive integer number of signaling in the second signaling set all indicate the second priority.
- the positive integer numbers of signaling in the second signaling set are all DCIs.
- the positive integer number of signaling in the second signaling set includes the second signaling.
- the positive integer number of signaling in the second signaling set includes one domain
- the positive integer number of signaling in the second signaling set includes The one field indicates the second priority
- the one field is the Priority Indicator field.
- the third bit block includes a TB (Transport Block, transport block).
- the third bit block includes a CBG (Code Block Group, code block group).
- the third bit block includes a positive integer number of CB (Code Block, code block).
- the third bit block includes a positive integer number of bits.
- control signaling for scheduling the third bit block indicates that the third bit block is the first type bit block of both the first type bit block and the second type bit block .
- control signaling for scheduling the third bit block is DCI (Downlink Control Information).
- a field in the control signaling for scheduling the third bit block indicates the first type of the first type of bit block and the second type of bit block.
- One type of bit block, the one field is Priority Indicator field.
- the third signaling includes scheduling information of the third bit block; the scheduling information of the third bit block includes occupied time domain resources, occupied frequency domain resources, MCS (Modulation and Modulation) Coding Scheme, modulation and coding method), DMRS (DeModulation Reference Signals, demodulation reference signal) configuration information, HARQ (Hybrid Automatic Repeat reQuest, hybrid automatic repeat request) process number, RV (Redundancy Version, redundancy version), NDI (New Data Indicator), transmitting antenna port, and at least one of the corresponding TCI (Transmission Configuration Indicator) states.
- MCS Modulation and Modulation
- Coding Scheme Modulation and Modulation
- DMRS DeModulation Reference Signals, demodulation reference signal
- HARQ Hybrid Automatic Repeat reQuest, hybrid automatic repeat request
- RV Redundancy Version
- redundancy version redundancy version
- NDI New Data Indicator
- transmitting antenna port and at least one of the corresponding TCI (Transmission Configuration Indicator) states
- the first time-frequency resource block is scheduled to transmit the third bit block.
- the third bit block is a bit block including service data.
- the first type of bit block is a bit block including high priority data
- the second type of bit block is a bit block including low priority data
- the first type of bit block is a bit block including low priority data
- the second type of bit block is a bit block including high priority data
- the phrase said first-type bit block is a bit block including low-priority data
- the first-type bit block is a bit block including service data
- the first-type bit block is scheduled Control signaling indicates low priority
- control signaling for scheduling the first-type bit block is DCI.
- a field in the control signaling for scheduling the first-type bit block indicates low priority, and the one field is the Priority Indicator field in the DCI.
- the phrase said first-type bit block is a bit block including high-priority data
- the first-type bit block is a bit block including service data
- the first-type bit block is scheduled Control signaling indicates high priority
- control signaling for scheduling the first-type bit block is DCI.
- a field in the control signaling for scheduling the first-type bit block indicates low and high priority, and the one field is the Priority Indicator field in the DCI.
- the phrase said second-type bit block is a bit block including low-priority data
- the second-type bit block is a bit block including service data
- the second-type bit block is scheduled Control signaling indicates low priority
- control signaling for scheduling the second type of bit block is DCI.
- a field in the control signaling for scheduling the second-type bit block indicates low priority, and the one field is the Priority Indicator field in the DCI.
- the phrase, the second type of bit block is a bit block including high priority data
- the second type of bit block is a bit block including service data
- the second type of bit block is scheduled Control signaling indicates high priority
- control signaling for scheduling the second type of bit block is DCI.
- one field in the control signaling for scheduling the second type of bit block indicates low-high priority, and the one field is the Priority Indicator field in the DCI.
- the first type of bit block is a bit block including URLLC service type data
- the second type of bit block is a bit block including eMBB service type data.
- the first type of bit block is a bit block including eMBB service type data
- the second type of bit block is a bit block including URLLC service type data
- the first type of bit block is a bit block including low priority data
- the second type of bit block is a bit block including high priority data
- the first time-frequency resource block is configured For the time-frequency resource block of the third bit block, the third bit block is the first type bit block; only when the second value is not greater than the first candidate value, the first signal Before being sent by the first node in the first time-frequency resource block.
- the first signal when the first signal is sent by the first node in this application in the first time-frequency resource block, the first signal carries the third bit Piece.
- the first signal when the second value is greater than the first candidate value, the first signal is not used by the first node in this application in the first time-frequency resource block. Send in.
- the first signal when the second value is greater than the first candidate value, the first signal is not used by the first node in this application in the first time-frequency resource block.
- the first bit sub-block is sent in the first air interface resource block by the first node in this application.
- the second type of bit block is a bit block including low priority data
- the first type of bit block is a bit block including high priority data
- the first time-frequency resource block is configured For the time-frequency resource block of the third bit block
- the third bit block is the first-type bit block
- the first signal is sent by the first node in the first time-frequency resource block ,
- the first signal carries the third bit block.
- the number of bits included in the first bit sub-block is mapped to a value range among multiple value ranges, and the second value belongs to the one value range.
- the steps in block F1A in FIG. 5A exist.
- the step in block F1A in FIG. 5A does not exist.
- the steps in block F2A in FIG. 5A exist.
- the step in block F2A in FIG. 5A does not exist.
- Embodiment 5B illustrates a wireless signal transmission flowchart according to an embodiment of the present application, as shown in FIG. 5B.
- the first node U1B and the second node U2B communicate through an air interface.
- the dashed box F1B is optional.
- the sequence between ⁇ S521B, S511B ⁇ and ⁇ S522B, S512B ⁇ in Fig. 5B of the pair of sending and receiving steps (Pair) does not represent a specific time sequence; in Fig. 5B, ⁇ S521B, The sequence of the two sending and receiving step pairs S511B ⁇ and ⁇ S5201B, S5101B ⁇ does not represent a specific time sequence.
- the first node U1B receives the second signaling in step S511B; receives the first signaling in step S512B; receives the first signal in step S5101B; and sends the target signal in the target air interface resource block in step S513B.
- the second node U2B sends the second signaling in step S521B; sends the first signaling in step S522B; sends the first signal in step S5201B; and receives the target signal in the target air interface resource block in step S523B.
- the first signaling and the second signaling are respectively used to determine a first air interface resource block and a second air interface resource block; the first air interface resource block is reserved for the first air interface resource block; Bit block transmission, the second air interface resource block is reserved for transmission of the second bit block, the time domain resource occupied by the first air interface resource block and the time domain occupied by the second air interface resource block Resources overlap; the first bit block is used to generate the target signal; the target air interface resource block is the first air interface resource block, or the target air interface resource block is the second air interface resource Block; the expiration time of the first air interface resource block in the time domain is the first time, and the number of bits included in the first bit block is used to determine the second time; the second time is no earlier than in the time domain The first moment; the time interval between the second moment and the first moment is used to determine whether the bits in the second bit block are used to generate the target signal; the first bit Block and the second bit block respectively correspond to different types; when the time interval between the second moment and the first
- the second time is located after the first time in the time domain.
- the first threshold is greater than zero.
- the first node U1B is the first node in this application.
- the second node U2B is the second node in this application.
- the first node U1B is a UE.
- the second node U2B is a base station.
- the second node U2B is a UE.
- the air interface between the second node U2B and the first node U1B is a Uu interface.
- the air interface between the second node U2B and the first node U1B includes a cellular link.
- the air interface between the second node U2B and the first node U1B is a PC5 interface.
- the air interface between the second node U2B and the first node U1B includes an accompanying link.
- the air interface between the second node U2B and the first node U1B includes a wireless interface between a base station device and a user equipment.
- the first signal is a wireless signal.
- the first signal is a baseband signal.
- the first signal is a radio frequency signal.
- the second time is located after the first time in the time domain, or the second time and the first time are the same time.
- the first time is the cut-off time in the time domain of the last multi-carrier symbol included in the first air interface resource block.
- the second moment is the last multi-carrier symbol occupied by the modulation symbol generated by the first bit block The deadline.
- the time domain resources occupied by the second air interface resource block include the second time.
- the second time is before the expiration time of the second air interface resource block in the time domain, and the second time is after the start time of the second air interface resource block in the time domain.
- the second time is the cut-off time in the time domain of one multi-carrier symbol included in the second air interface resource block.
- the modulation symbol generated by the first bit block is the bits generated by all or part of the bits in the first bit block sequentially undergoing CRC addition, segmentation, coding block-level CRC addition, and channel coding, Some or all of the symbols output after rate matching, concatenation, scrambling, modulation, layer mapping, and precoding.
- the modulation symbol generated by the first bit block is that all or part of the bits in the first bit block undergo CRC addition, segmentation, coding block-level CRC addition, channel coding, rate matching, and concatenation in sequence. , Scrambling, modulation, layer mapping, precoding part or all of the symbols to be output after.
- the expiration time of the time domain resources occupied by the modulation symbols generated by the first bit block of the phrase includes the last time domain resources occupied by the modulation symbols generated by the first bit block includes The cut-off time of a multi-carrier symbol.
- the scheduling information includes ⁇ indication information of occupied time domain resources, indication information of occupied frequency domain resources, MCS, DMRS (Demodulation Reference Signals, demodulation reference signal) configuration information, HARQ process number One or more of (HARQ process ID), RV (Redundancy Version), NDI (New Data Indicator), priority (Priority) ⁇ .
- the first bit block includes a HARQ-ACK codebook
- the HARQ-ACK codebook includes a positive integer number of HARQ-ACK bits indicating whether the third bit block is received correctly.
- the second signaling includes scheduling information of the second bit block.
- the first node receives a second signal; the second signal carries a fourth bit block, the second signaling includes scheduling information of the fourth bit block, and the second bit block includes Indication information of whether the fourth bit block is received correctly.
- the second bit block includes a positive integer number of HARQ-ACK bits indicating whether the fourth bit block is received correctly.
- the bits related to the phrase and the first bit block include all bits in the first bit block.
- the bits related to the phrase and the first bit block include some bits in the first bit block.
- the bits related to the first bit block of the phrase include bits generated by the first bit block.
- the bits related to the phrase and the first bit block include bits generated after the first bit block undergoes a bundling operation.
- the bits related to the phrase and the first bit block include bits generated after the first bit block undergoes a logical AND/logical OR/logical exclusive OR operation.
- the earliest reference signal in the time domain is used for channel detection.
- the earliest reference signal in the time domain is a DMRS.
- the earliest reference signal in the time domain is a UE-specific reference signal.
- the time domain resource occupied by the earliest reference signal in the time domain in the target air interface resource block includes one multi-carrier symbol.
- the time domain resource before the time domain resource occupied by the earliest reference signal in the time domain in the target air interface resource block includes a multi-carrier symbol; the one multi-carrier symbol is The multi-carrier symbol in the target air interface resource block before the multi-carrier symbol occupied by the earliest reference signal in the time domain.
- the multi-carrier symbol is an OFDM symbol.
- the multi-carrier symbols are DFT-s-OFDM symbols.
- the multi-carrier symbols are SC-OFDM symbols.
- the target air interface resource block is the second air interface resource block.
- the second air interface resource block is used to transmit the second bit block.
- the first bit block includes a positive integer number of bits.
- the second bit block includes a TB (Transport Block, transport block).
- the second bit block includes a CBG (Code Block Group, code block group).
- CBG Code Block Group, code block group
- the second bit block includes a positive integer number of CB (Code Block, code block).
- the second bit block includes a positive integer number of bits.
- the third bit block includes one TB.
- the third bit block includes one CBG.
- the third bit block includes a positive integer number of CBs.
- the third bit block includes a positive integer number of bits.
- the steps in block F1B in FIG. 5B exist.
- the step in block F1B in FIG. 5B does not exist.
- Embodiment 6A illustrates the relationship between the number of bits included in the first bit sub-block, the number of bits included in the second bit sub-block, the target parameter and the first value according to an embodiment of the present application, as shown in the appendix Shown in Figure 6A.
- the number of bits included in the first bit sub-block and the number of bits included in the second bit sub-block are used to determine the target parameter, and the target parameter is used to determine the first value.
- the first value is equal to the target parameter multiplied by the first number plus the first offset.
- the first value is equal to a value obtained by rounding up the target calculation amount
- the target calculation amount is equal to the target parameter multiplied by the first amount
- the target calculation amount is equal to the first calculation amount or the second calculation amount.
- the first number is related to the number of resource particles that can be used to carry the second bit block on the first time-frequency resource block.
- the first number is not greater than the number of resource particles that can be used to carry the second bit block on the first time-frequency resource block.
- the first number is equal to the number of resource particles that can be occupied by the second bit block on the multiple multi-carrier symbols in the first time-frequency resource block.
- the first number is equal to Wherein, the N symbol, all is equal to the number of multi-carrier symbols occupied by the first time-frequency resource block, and the M offset (1) is equal to the number of multi-carrier symbols that can be used by the second multi-carrier symbol on the first time-frequency resource block.
- the target parameter when the number of bits included in the first bit sub-block is greater than the number of bits included in the second bit sub-block, the target parameter is the first parameter; when the first bit sub-block When the number of bits included is not greater than the number of bits included in the second bit sub-block, the target parameter is the second parameter.
- the target parameter when the number of bits included in the first bit sub-block is not less than the number of bits included in the second bit sub-block, the target parameter is the first parameter; when the first bit sub-block When the number of bits included in the block is less than the number of bits included in the second bit sub-block, the target parameter is the second parameter.
- the target parameter when the number of bits included in the second bit sub-block is greater than the number of bits included in the first bit sub-block, the target parameter is the first parameter; when the second bit sub-block When the number of bits included is not greater than the number of bits included in the first bit sub-block, the target parameter is a second parameter.
- the target parameter when the number of bits included in the second bit sub-block is not less than the number of bits included in the first bit sub-block, the target parameter is the first parameter; when the second bit sub-block When the number of bits included in the block is less than the number of bits included in the first bit sub-block, the target parameter is a second parameter.
- the first ratio is used to determine whether the target parameter is the first parameter or the second parameter, and the first ratio is the number of bits included in the first bit sub-block and the second bit sub-block. The ratio of the number of bits included in the block.
- the target parameter when the first ratio is greater than the first threshold, the target parameter is the first parameter; otherwise, the target parameter is the second parameter.
- the target parameter when the first ratio is not less than the first threshold, the target parameter is the first parameter; otherwise, the target parameter is the second parameter.
- the target parameter when the first ratio is greater than the first threshold, the target parameter is the second parameter; otherwise, the target parameter is the first parameter.
- the target parameter when the first ratio is not less than the first threshold, the target parameter is the second parameter; otherwise, the target parameter is the first parameter.
- the first difference is used to determine whether the target parameter is the first parameter or the second parameter, and the first difference is the number of bits included in the first bit sub-block and the second The difference in the number of bits included in the bit sub-block.
- the target parameter when the first difference is greater than the first threshold, the target parameter is the first parameter; otherwise, the target parameter is the second parameter.
- the target parameter when the first difference is not less than the first threshold, the target parameter is the first parameter; otherwise, the target parameter is the second parameter.
- the target parameter when the first difference is greater than the first threshold, the target parameter is the second parameter; otherwise, the target parameter is the first parameter.
- the target parameter when the first difference is not less than the first threshold, the target parameter is the second parameter; otherwise, the target parameter is the first parameter.
- Embodiment 6B illustrates a schematic diagram of the relationship between the number of bits included in the first bit block and the second time according to an embodiment of the present application, as shown in FIG. 6B.
- the number of bits included in the first bit block is used to determine the second moment.
- the first node in this application performs calculation according to the number of bits included in the first bit block to determine the first bit block when the first bit block is transmitted in the second air interface resource block.
- the time domain resource related to the first bit block in the second air interface resource block; the second moment is when the first bit block determined by the first node performing the calculation is in the second air interface resource block The expiration time of the time-domain resource related to the first bit block in the second air interface resource block when it is transmitted.
- the time domain resources related to the first bit block include time domain resources occupied by modulation symbols generated by the first bit block.
- the expiration time of the time domain resource related to the first bit block includes the first bit block when the first bit block is transmitted in the second air interface resource block.
- the time domain unit is a multi-carrier symbol.
- the time domain unit is an OFDM symbol.
- the time domain unit is a DFT-s-OFDM symbol.
- the time domain unit is an SC-OFDM symbol.
- the third bit block is a bit block obtained by performing channel coding on the first bit block; the number of bits included in the third bit block is used to determine the second moment.
- the ratio of the number of bits included in the first bit block to the number of bits included in the second bit block is used to determine the second time.
- the value of the time-frequency resource particles related to the first bit block in the second air interface resource block is The quantity is the minimum of the first value and the second value; the first value is equal to The second value is equal to
- the O ACK is equal to the number of bits included in the HARQ-ACK codebook
- the L ACK is equal to the number of CRC bits related to the HARQ-ACK codebook
- the number of bits included in the first bit block is equal to the number of bits in the HARQ-ACK codebook.
- the second signaling indicates Value
- the N symbol,all is equal to the number of multi-carrier symbols occupied by the second air interface resource block
- the M offset (1) is equal to the first bit that can be used on the l-th multi-carrier symbol
- the number of time-frequency resource particles occupied by the block, the Equal to the payload size of the uplink data, and the number of bits included in the second bit block is equal to the
- the 10 is a symbol index (Index) of one of the multi-carrier symbols in the second air interface resource block, and the ⁇ is used to limit the allocation to the first bit in the second air interface resource block The number of time-frequency resource particles of the block.
- the smallest value of the first value and the second value is used to determine the second moment.
- the first node is based on the minimum value of the first value and the second value and the value of the first bit block in the second air interface resource block.
- the resource mapping manner determines the second moment.
- the time-frequency resource particle is RE.
- the sum of the number of bits included in the second bit block and the number of bits included in the first bit block is used to determine the second time.
- the first bit block includes a CRC payload (Payload).
- Embodiment 7A illustrates a flowchart of judging whether the first value is the first candidate value or the second candidate value according to an embodiment of the present application, as shown in FIG. 7A.
- step S71A it is determined in step S71A whether the second value is greater than the second candidate value; if so, it proceeds to step S72A to determine that the first value is the first candidate value; otherwise, it proceeds to step S73A to determine the first value.
- the value is the second candidate value.
- the second candidate value is greater than zero.
- the second candidate value is smaller than the first candidate value.
- the first signal is sent by the first node in this application in the first time-frequency resource block, and the first signal carries the second bit block; when the first When the value is the first candidate value, the first bit sub-block is used to generate all or part of the bits included in the second bit block, and the second bit sub-block is not used to generate the second bit sub-block. Any bit included in the bit block; when the first value is the second candidate value, the first bit sub-block is used to generate a part of the bits included in the second bit block, and the second bit The sub-block is used to generate another part of bits included in the second bit block.
- the first numeric value is the first candidate numeric value
- the first candidate numeric value is The number of resource particles used to transmit the second bit block in a time-frequency resource block.
- the first value is For the second candidate value, the number of resource particles used for transmitting the second bit block in the first time-frequency resource block is smaller than the second candidate value.
- the first value is the first candidate value
- the first time-frequency resource block is used for The number of resource particles for transmitting the second bit block is equal to the first value.
- the number of resource particles used to transmit the second bit block in the first time-frequency resource block is different. Less than the second value.
- the second bit block when the second value is not greater than the first candidate value and the second value is not less than the second candidate value, the second bit block only includes the first candidate value.
- the second bit block when the second value is less than the second candidate value, includes all bits in the first bit sub-block and the second bit sub-block Part of the bits in the block.
- the second bit block when the second value is less than the second candidate value, the second bit block only includes the first bit sub-block and the second bit sub-block.
- the second bit block when the second value is less than the second candidate value, includes all bits in the first bit sub-block and a third bit sub-block;
- the second bit sub-block is used to generate the third bit sub-block, and the number of bits included in the third bit sub-block is less than the number of bits included in the second bit sub-block.
- the first bit sub-block when the second value is less than the second candidate value, the first bit sub-block is used to generate a part of the bits included in the second bit block, and the first bit sub-block is The two-bit sub-block is used to generate another part of the bits included in the second bit block.
- Embodiment 7B illustrates a flowchart of judging whether the bits in the second bit block are used to generate the target signal according to an embodiment of the present application, as shown in FIG. 7B.
- the first node in this application determines in step S71B whether the time interval between the second moment and the first moment is greater than the first threshold; if so, it proceeds to step S72B to determine If the bits in the two-bit block are not used to generate the target signal, it is determined that the target air interface resource block is the first air interface resource block; otherwise, it proceeds to step S73B, and it is determined that the bits in the second bit block are used to generate the target signal, and it is determined The target air interface resource block is the second air interface resource block.
- the target signal when the bits in the second bit block are used to generate the target signal, the target signal includes a second sub-signal; the second sub-signal is the second sub-signal in the second bit block All or part of the bits are added sequentially through CRC, segmentation, coding block-level CRC addition, channel coding, rate matching, concatenation, scrambling, modulation, layer mapping, precoding, mapping to resource particles, multi-carrier symbol generation, modulation up-conversion Part or all of the output after.
- the target signal when the bits in the second bit block are used to generate the target signal, the target signal includes a second sub-signal; the second sub-signal is the second sub-signal in the second bit block All or part of the bits undergo CRC addition, segmentation, coding block-level CRC addition, channel coding, rate matching, concatenation, scrambling, modulation, layer mapping, precoding, mapping to resource particles, multi-carrier symbols after bundling operation. Generate and modulate some or all of the output after upconversion.
- the target signal when the bits in the second bit block are used to generate the target signal, the target signal includes a second sub-signal; the second sub-signal is the second sub-signal in the second bit block All or part of the bits generated are sequentially added by CRC, segmentation, coding block-level CRC addition, channel coding, rate matching, concatenation, scrambling, modulation, layer mapping, precoding, mapping to resource particles, and multi-carrier symbol generation , Modulate the output after part or all of the up-conversion.
- the target signal when the time interval between the second time and the first time is not greater than the first threshold, the target signal includes a first sub-signal and a second sub-signal, and the first The bit block is used to generate the first sub-signal, and the second bit block is used to generate the second sub-signal.
- the target air interface resource block is the second air interface resource block.
- the time interval between the second time and the first time is greater than the first threshold, only the first bit block of the first bit block and the second bit block Bit blocks are used to generate the target signal.
- the target air interface resource block is the first air interface resource block.
- the meaning that the bits in the second bit block of the sentence are used to generate the target signal includes: all the bits in the second bit block are used to generate the target signal.
- the meaning that the bits in the second bit block of the sentence are used to generate the target signal includes: part of the bits in the second bit block are used to generate the target signal.
- all or part of the bits in the second bit block are used to generate the target signal after a bundling operation.
- all or part of the bits in the second bit block are used to generate the target signal after undergoing a logical AND operation.
- all or part of the bits in the second bit block are used to generate the target signal after being logically ORed.
- all or part of the bits in the second bit block are used to generate the target signal after undergoing an exclusive logical OR operation.
- the phrase that the time interval between the second moment and the first moment is not greater than a first threshold includes that the second moment is the same moment as the first moment.
- the number of bits included in the first bit block is used to determine the third moment; only when the third moment is not earlier than the first moment in the time domain, the first bit block includes The number of bits is used to determine the second moment, and the time interval between the second moment and the first moment is used to determine whether the bits in the second bit block are used to generate the The target signal.
- the second time is the third time, and the second time is the same as the first time.
- the time interval between a moment in time is used to determine whether the bits in the second bit block are used to generate the target signal.
- the bits in the second bit block are used to generate the target signal.
- the bits in the second bit block are used for The target signal is generated.
- the number of bits included in the first bit block is used only when the first set of conditions is met and the third time is not earlier than the first time in the time domain.
- the time interval between the second moment and the first moment is used by the first node to determine whether the bits in the second bit block are used to generate the Target signal.
- the phrase that the first condition set is satisfied includes that all the conditions in the first condition set are satisfied.
- the first condition set includes a positive integer number of conditions.
- the conditions in the first set of conditions include: a third value is not greater than a first threshold; the number of bits included in the first bit block and the second bit block include The number of bits in is jointly used to determine the third value; the first threshold is related to the number of time-frequency resource particles included in the second air interface resource block.
- the conditions in the first set of conditions include: a third value is not greater than a first threshold; the number of bits included in the first bit block and the second bit block include The ratio of the number of bits is used to determine the third value; the first threshold is related to the number of time-frequency resource particles included in the second air interface resource block.
- the time-frequency resource particle is RE.
- the first node determines that the bits in the second bit block are not used to generate the target Signal.
- the first set of conditions includes a timeline condition (Timeline condition), and a specific description of the timeline condition can be found in section 9.2.5 of 3GPP TS38.213.
- a condition in the first set of conditions is or Timeline condition related to at least one of the Said Said And said
- a condition in the first set of conditions is or Timeline condition related to at least one of the Said Said
- a condition in the first set of conditions is or Timeline condition related to at least one of the Said Said
- a condition in the first set of conditions is or Timeline condition related to at least one of the Said Said
- TS38.213 for the specific definition, please refer to section 9.2.5 in 3GPP TS38.213.
- the first set of conditions includes a condition indicating that the second air interface resource block can support the transmission of the first bit block.
- the first set of conditions includes a timeline condition.
- the timeline condition refers to section 9.2.5 of 3GPP TS38.213; the first condition
- the timeline condition in the set is related to the earliest multi-carrier symbol in the first time domain resource set, and the first time domain resource set includes the time domain resources occupied by the first air interface resource block and the Time domain resources occupied by the second air interface resource block.
- the first node performs calculations according to the number of bits included in the first bit block to determine when the first bit block is transmitted in the second air interface resource block.
- the number of bits included in the first bit block is used to determine the third time; only when the third time is later than the first time in the time domain, the first bit block includes The number of bits is used to determine the second moment, and the time interval between the second moment and the first moment is used to determine whether the bits in the second bit block are used to generate the Target signal.
- the second time is the third time
- the second time is the same as the first time.
- the time interval between moments is used to determine whether the bits in the second bit block are used to generate the target signal.
- the bits in the second bit block are used to generate the target signal.
- the bits in the second bit block are used To generate the target signal.
- the number of bits included in the first bit block is used for Determine the second moment, the time interval between the second moment and the first moment is used by the first node to determine whether the bits in the second bit block are used to generate the target Signal.
- the phrase that the first condition set is satisfied includes that all the conditions in the first condition set are satisfied.
- the first condition set includes a positive integer number of conditions.
- the conditions in the first condition set include: a third value is not greater than a first threshold; the number of bits included in the first bit block and the second bit block include The number of bits in is jointly used to determine the third value; the first threshold is related to the number of time-frequency resource particles included in the second air interface resource block.
- the conditions in the first set of conditions include: a third value is not greater than a first threshold; the number of bits included in the first bit block and the second bit block include The ratio of the number of bits is used to determine the third value; the first threshold is related to the number of time-frequency resource particles included in the second air interface resource block.
- the time-frequency resource particle is RE.
- the first node determines that the bits in the second bit block are not used to generate the target Signal.
- the first set of conditions includes a timeline condition (Timeline condition), and a detailed description of the timeline condition can be found in section 9.2.5 of 3GPP TS38.213.
- a condition in the first set of conditions is or Timeline condition related to at least one of the Said Said And said
- a condition in the first set of conditions is or Timeline condition related to at least one of the Said Said
- a condition in the first set of conditions is or Timeline condition related to at least one of the Said Said
- a condition in the first set of conditions is or Timeline condition related to at least one of the Said Said
- TS38.213 for the specific definition, please refer to section 9.2.5 in 3GPP TS38.213.
- the first set of conditions includes a condition indicating that the second air interface resource block can support the transmission of the first bit block.
- the first set of conditions includes a timeline condition.
- the timeline condition refers to section 9.2.5 of 3GPP TS38.213; the first condition
- the timeline condition in the set is related to the earliest multi-carrier symbol in the first time domain resource set, and the first time domain resource set includes the time domain resources occupied by the first air interface resource block and the Time domain resources occupied by the second air interface resource block.
- the first node performs calculations according to the number of bits included in the first bit block to determine when the first bit block is transmitted in the second air interface resource block.
- Embodiment 8A illustrates a schematic diagram of the relationship between the number of bits included in the first bit sub-block, the first information and the second value according to an embodiment of the present application, as shown in FIG. 8A.
- the number of bits included in the first bit sub-block and the first information are used together to determine the second value.
- the first information is a numerical value used to calculate the number of the resource particles of the bits related to the first bit sub-block included in the second bit block.
- the first information is information configured by a higher layer.
- the product of the number of bits included in the first bit sub-block and the first information is used to determine the second value.
- the product of the first intermediate quantity and the first information is used to determine the second value, and the first intermediate quantity is greater than the number of bits included in the first bit sub-block.
- the first intermediate quantity is equal to the sum of the number of bits included in the first bit sub-block and the number of CRC bits related to the first bit sub-block.
- the second value is linearly related to the product of the first intermediate quantity and the first information.
- the first information is a Value; where the Refer to section 9.3 of TS38.213 for the definition.
- the first information is used for high priority HACK-ACK Value; where the Refer to section 9.3 of TS38.213 for the definition.
- the first bit sub-block includes a high-priority HARQ-ACK codebook
- the second value is equal to
- the O ACK is equal to the number of high-priority HARQ-ACK bits
- the L ACK is equal to the number of CRC bits related to the number of high-priority HARQ-ACK bits
- O ACK + L ACK is equal to the first The number of bits included in the bit sub-block
- the Equal to the first information the N symbol,all is equal to the number of multi-carrier symbols occupied by the first time-frequency resource block
- the M offset (1) is equal to The number of the resource particles occupied by the second bit block, the It is equal to the payload size of the uplink data carried by the first signal.
- the first bit sub-block includes a high-priority HARQ-ACK codebook
- the second value is equal to
- the O ACK is equal to the number of high-priority HARQ-ACK bits
- the L ACK is equal to the number of CRC bits related to the number of high-priority HARQ-ACK bits
- the bits included in the first bit sub-block The number is equal to O ACK
- the Equal to the first information the N symbol,all is equal to the number of multi-carrier symbols occupied by the first time-frequency resource block
- the M offset (1) is equal to The number of the resource particles occupied by the second bit block, the It is equal to the payload size of the uplink data carried by the first signal.
- the second value is equal to the value obtained by rounding up the third calculation amount, the third calculation amount and the number of bits included in the first bit sub-block and the value of the first information
- the product is linearly related.
- the first bit sub-block includes a high-priority HARQ-ACK codebook.
- the first bit sub-block includes a high-priority HARQ-ACK codebook and corresponding CRC bits.
- Embodiment 8B illustrates a schematic diagram of the relationship between the first bit block, the first signaling and the third bit block according to an embodiment of the present application, as shown in FIG. 8B.
- the first signaling is used to determine the first bit block, the first signaling includes scheduling information of the third bit block, and the first bit block includes information indicating whether the third bit block is correctly received.
- the scheduling information includes ⁇ indication information of occupied time domain resources, indication information of occupied frequency domain resources, MCS, DMRS (Demodulation Reference Signals, demodulation reference signal) configuration information, HARQ process number One or more of (HARQ process ID), RV (Redundancy Version), NDI (New Data Indicator), priority (Priority) ⁇ .
- the first bit block includes UCI.
- the first bit block includes high priority UCI.
- the first bit block includes UCI for the URLLC service type.
- the first bit block includes a HARQ-ACK codebook.
- the first bit block includes a high-priority HARQ-ACK codebook.
- the first bit block includes a HARQ-ACK codebook for the URLLC service type.
- the first bit block includes a HARQ-ACK codebook
- the HARQ-ACK codebook includes a positive integer number of HARQ-ACK bits indicating whether the third bit block is received correctly.
- the second signaling includes scheduling information of the second bit block.
- the first node receives a second signal; the second signal carries a fourth bit block, the second signaling includes scheduling information of the fourth bit block, and the second bit block includes Indication information of whether the fourth bit block is received correctly.
- the second bit block includes a positive integer number of HARQ-ACK bits indicating whether the fourth bit block is received correctly.
- Embodiment 9A illustrates a schematic diagram of the relationship among the first parameter, the first candidate value, the second parameter, and the second candidate value according to an embodiment of the present application, as shown in FIG. 9A.
- the first parameter is used to determine the first candidate value
- the second parameter is used to determine the second candidate value
- the first candidate value is equal to the value obtained by rounding up the first calculation amount, and the first calculation amount is equal to the first parameter multiplied by the first amount.
- the second candidate value is equal to the value obtained by rounding up the second calculation amount, and the second calculation amount is equal to the second parameter multiplied by the first amount.
- the first parameter is a scaling parameter.
- the first parameter is a scaling parameter configured for high-priority UCI.
- the first parameter is a parameter configured at a higher layer.
- the first parameter is a parameter configured at the RRC layer.
- the second parameter is a scaling parameter configured for a low-priority UCI.
- the second parameter is a parameter configured at a higher layer.
- the second parameter is a parameter configured at the RRC layer.
- the first parameter and the second parameter are respectively scaling parameters for configuring UCI with different priorities.
- the first candidate value is equal to the first parameter multiplied by the first number plus the first offset.
- the second candidate value is equal to the second parameter multiplied by the first number plus the second offset.
- the first parameter and the second parameter are respectively parameters configured for different priorities.
- the first parameter and the second parameter are parameters configured for different service types, respectively.
- the first parameter and the second parameter are parameters configured for high priority and low priority, respectively.
- the first parameter and the second parameter are parameters configured for the URLLC service type and the eMBB service type, respectively.
- Embodiment 9B illustrates a schematic diagram of the relationship between the first air interface resource block, the first time, the second time, and the first threshold according to an embodiment of the present application, as shown in FIG. 9B.
- the expiration time of the first air interface resource block in the time domain is the first time, and the time interval between the second time and the first time is not greater than the first threshold.
- the time interval between the second time and the first time is less than the first threshold.
- the time interval between the second time and the first time is equal to the first threshold.
- the second time is the first time.
- the bits in the second bit block in this application are used to generate the target signal in this application.
- the target air interface resource block in this application is the second air interface resource block in this application.
- the first threshold is configured at a higher layer.
- the first threshold is a candidate threshold in a threshold set configured at a higher layer; the threshold set includes a plurality of candidate thresholds.
- the first threshold is equal to the time interval between the expiration time of the first time window and the first time; the first time window includes the time domain resources occupied by the first air interface resource block .
- the expiration time of the first time window is not earlier than the first time.
- the expiration time of the first time window is later than the first time.
- the first time window includes time domain resources other than time domain resources occupied by the first air interface resource block.
- the first time window does not include time domain resources other than the time domain resources occupied by the first air interface resource block.
- the first time window is a slot including time domain resources occupied by the first air interface resource block.
- the first time window is a sub-slot including time domain resources occupied by the first air interface resource block.
- the first time window is a plurality of sub-slots including time domain resources occupied by the first air interface resource block.
- the first threshold is not less than zero.
- the first threshold is equal to zero.
- the first threshold is equal to the duration of a positive integer number of consecutive multi-carrier symbols.
- the first threshold is a dynamically indicated value.
- the first threshold is related to the size of time domain resources occupied by the first air interface resource block.
- the time interval between the second time and the first time is equal to the duration of a positive integer number of consecutive multi-carrier symbols.
- the first threshold is equal to the maximum allowable additional delay (Additional Delay).
- the first threshold is equal to the time interval between a moment after the first moment and the first moment.
- Embodiment 10A illustrates a schematic diagram of the relationship between the first signal, the first bit block, the second bit block, the third bit block, the first bit sub-block and the second bit sub-block according to an embodiment of the present application, such as Shown in Figure 10A.
- the first signal carries the second bit block and the third bit block
- the first bit block is used to generate the second bit block
- the first bit block includes the first bit sub-block and the second bit sub-block.
- the bits related to the first bit sub-block included in the second bit block include all bits in the first bit sub-block.
- the bits related to the first bit sub-block included in the second bit block only include part of the bits in the first bit sub-block.
- the bits related to the first bit sub-block included in the second bit block are obtained by a logical OR/logical AND/XOR operation of a positive integer number of bits in the first bit block .
- the second bit block includes all bits in the first bit block.
- the second bit block only includes all the bits in the first bit block.
- the second bit block only includes the first bit sub-block of the first bit sub-block and the second bit sub-block.
- the second bit block includes all bits in the first bit sub-block and some bits in the second bit sub-block.
- the second bit block includes all bits in the first bit sub-block and all bits in the second bit sub-block.
- any bit in the second bit block is obtained by a positive integer number of bits in the first bit block through a logical OR/logical AND/exclusive OR operation.
- the second bit block includes all bits in the first bit sub-block and a third bit sub-block; the second bit sub-block is used to generate the third bit sub-block, so The number of bits included in the third bit sub-block is smaller than the number of bits included in the second bit sub-block.
- the third bit sub-block is obtained by logical OR/logical AND/exclusive OR operation of a positive integer number of bits in the second bit sub-block.
- the first bit sub-block is used to generate all or part of the bits included in the second bit block, and the second bit sub-block is not used to generate all or part of the bits included in the second bit block. Any bit.
- the first bit sub-block is used to generate a part of bits included in the second bit block
- the second bit sub-block is used to generate another part of bits included in the second bit block
- the first signal includes a first sub-signal; the second bit block sequentially undergoes CRC insertion (CRC Insertion), segmentation, coding block-level CRC insertion (CRC Insertion), and channel coding ( Channel Coding, Rate Matching, Concatenation, Scrambling, Modulation, Layer Mapping, Precoding, Mapping to Resource Element OFDM baseband signal generation (OFDM Baseband Signal Generation), and part or all of the modulation and upconversion (Modulation and Upconversion) are used to obtain the first sub-signal.
- CRC Insertion CRC Insertion
- segmentation coding block-level CRC insertion
- CRC Insertion CRC Insertion
- channel coding Channel Coding, Rate Matching, Concatenation, Scrambling, Modulation, Layer Mapping, Precoding, Mapping to Resource Element OFDM baseband signal generation (OFDM Baseband Signal Generation), and part or all of the modulation and upconversion (Modulation and Upconversion) are used to obtain the first sub-sign
- the first signal includes a first sub-signal and a second sub-signal; the second bit block sequentially undergoes CRC Insertion, Segmentation, and CRC Insertion at the coding block level. ), Channel Coding, Rate Matching, Concatenation, Scrambling, Modulation, Layer Mapping, Precoding, Mapping to Resource Particles ( Mapping to Resource Element), OFDM Baseband Signal Generation (OFDM Baseband Signal Generation), the first sub-signal is obtained after part or all of the modulation and upconversion (Modulation and Upconversion); the third bit block is sequentially added by CRC and divided Segment, coding block-level CRC addition, channel coding, rate matching, concatenation, scrambling, modulation, layer mapping, precoding, mapping to resource particles, OFDM baseband signal generation, modulation and up-conversion part or all of the second Sub-signal.
- Embodiment 10B illustrates a schematic diagram of the relationship between the first air interface resource block, the first time, the second time, and the first threshold according to another embodiment of the present application, as shown in FIG. 10B.
- the expiration time of the first air interface resource block in the time domain is the first time, and the time interval between the second time and the first time is greater than the first threshold.
- the bits in the second bit block in this application are not used to generate the target signal in this application.
- the target air interface resource block in this application is the first air interface resource block in this application.
- Embodiment 11A illustrates a structural block diagram of a processing device in a first node device, as shown in FIG. 11A.
- the first node device processing apparatus 1100A includes a first receiver 1101A and a first transmitter 1102A.
- the first node device 1100A is user equipment.
- the first node device 1100A is a relay node.
- the first node device 1100A is a vehicle-mounted communication device.
- the first node device 1100A is a user equipment supporting V2X communication.
- the first node device 1100A is a relay node supporting V2X communication.
- the first receiver 1101A includes the antenna 452, the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460 and the data shown in Figure 4 of the present application. At least one of the sources 467.
- the first receiver 1101A includes the antenna 452, the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460 and the data shown in Figure 4 of the present application. At least the top five in source 467.
- the first receiver 1101A includes the antenna 452, the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460 and the data shown in Figure 4 of the present application. At least the first four of Source 467.
- the first receiver 1101A includes the antenna 452, the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460 and the data shown in Figure 4 of the present application. At least the first three of Source 467.
- the first receiver 1101A includes the antenna 452, the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460 and the data shown in Figure 4 of the present application.
- Source 467 at least the first two.
- the first transmitter 1102A includes the antenna 452, the transmitter 454, the multi-antenna transmitter processor 457, the transmission processor 468, the controller/processor 459, the memory 460 and the antenna shown in FIG. 4 of this application. At least one of the data sources 467.
- the first transmitter 1102A includes the antenna 452, the transmitter 454, the multi-antenna transmitter processor 457, the transmission processor 468, the controller/processor 459, the memory 460 and the At least the top five of data sources 467.
- the first transmitter 1102A includes the antenna 452, the transmitter 454, the multi-antenna transmitter processor 457, the transmission processor 468, the controller/processor 459, the memory 460 and the At least the first four of the data sources 467.
- the first transmitter 1102A includes the antenna 452, the transmitter 454, the multi-antenna transmitter processor 457, the transmission processor 468, the controller/processor 459, the memory 460 and the At least the first three of the data sources 467.
- the first transmitter 1102A includes the antenna 452, the transmitter 454, the multi-antenna transmitter processor 457, the transmission processor 468, the controller/processor 459, the memory 460 and the At least the first two of the data sources 467.
- the first receiver 1101A receives the first information; the first transmitter 1102A sends a first signal in a first time-frequency resource block, and the first signal carries a second bit block; where , The first bit block is used to generate the second bit block; the first bit block includes a first bit sub-block and a second bit sub-block, and the priority corresponding to the first bit sub-block is higher than the The priority corresponding to the second bit sub-block; the number of resource particles used to transmit the second bit block in the first time-frequency resource block is not greater than a first value, and the bits included in the first bit sub-block The number of bits is used to determine the first value; the number of bits included in the first bit sub-block and the first information are used to determine the second value; the first time-frequency resource block is used The number of the resource particles used to transmit the bits related to the first bit sub-block included in the second bit block is equal to the minimum value of the first value and the second value.
- the first value has nothing to do with the first information.
- the first value is not greater than the first candidate value and not less than the second candidate value; the first parameter is used to determine the first candidate value, and the second parameter is used to determine the second candidate value.
- Numerical value; the first parameter and the second parameter respectively correspond to the first priority and the second priority; the priority of the first bit sub-block is the first priority, the second bit sub-block The priority is the second priority.
- the target parameter is used to determine the first value; the target parameter is the first parameter or the second parameter, and the first parameter and the second parameter correspond to the first priority and the second parameter, respectively.
- Priority the priority of the first bit sub-block is the first priority, the priority of the second bit sub-block is the second priority; the first bit sub-block includes the bit The number and the number of bits included in the second bit sub-block are used together to determine the target parameter.
- the first value is the first candidate value; when the second value is not greater than the second candidate value, the first value Is the second candidate value.
- the first receiver 1101A receives first signaling and second signaling; wherein, the first signaling indicates a first air interface resource block, and the second signaling indicates a second air interface resource block ; At least one of the first air interface resource block and the second air interface resource block overlaps with the first time-frequency resource block in the time domain.
- the first signal carries a third bit block;
- the first time-frequency resource block is a time-frequency resource block allocated to the third bit block;
- the third bit block is of the first type The first type bit block of both the bit block and the second type bit block.
- the first time-frequency resource block includes one PUSCH; the first node transmits the first signal in the PUSCH, and the first signal carries the second bit block;
- the one-bit sub-block and the second-bit sub-block respectively include the HARQ-ACK codebook of the first priority and the HARQ-ACK codebook of the second priority;
- the first parameter and the second The parameters are respectively the scaling parameter of the HARQ-ACK codebook of the first priority and the scaling parameter of the HARQ-ACK codebook of the second priority;
- the first parameter is used to determine the first Candidate value
- the second parameter is used to determine the second candidate value;
- the number of bits included in the first bit sub-block and the first information are both used to determine the second value; when the second value Greater than the second candidate value, the first value is the first candidate value; when the second value is not greater than the second candidate value, the first value is the second candidate value; so
- the first time-frequency resource block includes a PUSCH; the first type of bit block is a bit block that includes low priority data, and the second type of bit block is a bit block that includes high priority data.
- the PUSCH is a time-frequency resource block configured to the third bit block, and the third bit block is the first type bit block; only if the second value is not greater than the first candidate value When the first signal is sent by the first node in the PUSCH; when the second value is greater than the first candidate value, the first signal is not sent by the first node.
- the first bit sub-block and the second bit sub-block respectively include the HARQ-ACK codebook of the first priority and the HARQ-ACK codebook of the second priority;
- the The first parameter and the second parameter are respectively the scaling parameter configured to the HARQ-ACK codebook of the first priority and the scaling parameter of the HARQ-ACK codebook of the second priority;
- the first parameter Is used to determine the first candidate value, and the second parameter is used to determine the second candidate value; the number of bits included in the first bit sub-block and the first information are both used to determine The second value.
- the low-priority data is eMBB service type data
- the high-priority data is URLLC service type data
- the first signal when the first signal is sent by the first node in the PUSCH: the first signal carries the second bit block; when the second value is greater than the Second candidate value, the first value is the first candidate value; when the second value is not greater than the second candidate value, the first value is the second candidate value; in the PUSCH
- the number of the resource particles used to transmit the bits related to the first bit sub-block included in the second bit block is equal to the minimum value of the first value and the second value;
- the number of resource particles used for transmitting the second bit block in the PUSCH is not greater than a first value.
- the first bit sub-block is transmitted by the first node on the first air interface. It is sent in a resource block, and the first air interface resource block includes one PUCCH.
- the first time-frequency resource block includes one PUSCH; the first node transmits the first signal in the PUSCH, and the first signal carries the second bit block;
- the one-bit sub-block and the second-bit sub-block respectively include the HARQ-ACK codebook of the first priority and the HARQ-ACK codebook of the second priority;
- the first parameter and the second The parameters are respectively the scaling parameter of the HARQ-ACK codebook of the first priority and the scaling parameter of the HARQ-ACK codebook of the second priority;
- the first parameter is used to determine the first Candidate value, the second parameter is used to determine the second candidate value; the number of bits included in the first bit sub-block and the first information are both used to determine the second value;
- the target parameter is used To determine the first value;
- the target parameter is the first parameter or the second parameter, and the number of bits included in the first bit sub-block and the number of bits included in the second bit sub-block are used together Determine the target parameter; the number of the resource particles in the PU
- Embodiment 11B illustrates a structural block diagram of a processing device in a first node device, as shown in FIG. 11B.
- the first node device processing apparatus 1100B includes a first receiver 1101B and a first transmitter 1102B.
- the first node device 1100B is user equipment.
- the first node device 1100B is a relay node.
- the first node device 1100B is a vehicle-mounted communication device.
- the first node device 1100B is a user equipment supporting V2X communication.
- the first node device 1100B is a relay node supporting V2X communication.
- the first receiver 1101B includes the antenna 452, the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460 and the data shown in FIG. 4 of the present application. At least one of the sources 467.
- the first receiver 1101B includes the antenna 452, the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460 and the data shown in FIG. 4 of the present application. At least the top five in source 467.
- the first receiver 1101B includes the antenna 452, the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460 and the data shown in FIG. 4 of the present application. At least the first four of Source 467.
- the first receiver 1101B includes the antenna 452, the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460 and the data shown in FIG. 4 of the present application. At least the first three of Source 467.
- the first receiver 1101B includes the antenna 452, the receiver 454, the multi-antenna receiving processor 458, the receiving processor 456, the controller/processor 459, the memory 460 and the data shown in FIG. 4 of the present application.
- Source 467 at least the first two.
- the first transmitter 1102B includes the antenna 452, the transmitter 454, the multi-antenna transmitter processor 457, the transmission processor 468, the controller/processor 459, the memory 460 and the At least one of the data sources 467.
- the first transmitter 1102B includes the antenna 452, the transmitter 454, the multi-antenna transmitter processor 457, the transmission processor 468, the controller/processor 459, the memory 460 and the At least the top five of data sources 467.
- the first transmitter 1102B includes the antenna 452, the transmitter 454, the multi-antenna transmitter processor 457, the transmission processor 468, the controller/processor 459, the memory 460 and the At least the first four of the data sources 467.
- the first transmitter 1102B includes the antenna 452, the transmitter 454, the multi-antenna transmitter processor 457, the transmission processor 468, the controller/processor 459, the memory 460 and the antenna shown in FIG. 4 of the present application At least the first three of the data sources 467.
- the first transmitter 1102B includes the antenna 452, the transmitter 454, the multi-antenna transmitter processor 457, the transmission processor 468, the controller/processor 459, the memory 460 and the antenna shown in FIG. 4 of the present application At least the first two of the data sources 467.
- the first receiver 1101B receives first signaling and second signaling, and the first signaling and the second signaling are used to determine the first air interface resource block and the second signaling, respectively.
- Two air interface resource blocks the first transmitter 1102B sends a target signal in a target air interface resource block; wherein, the first air interface resource block is reserved for transmission of the first bit block, and the second air interface resource A block is reserved for the transmission of a second bit block, and the time domain resources occupied by the first air interface resource block overlap with the time domain resources occupied by the second air interface resource block; the first bit block Is used to generate the target signal; the target air interface resource block is the first air interface resource block, or the target air interface resource block is the second air interface resource block; the first air interface resource block is in time The expiration time of the domain is the first time, and the number of bits included in the first bit block is used to determine the second time; the second time is not earlier than the first time in the time domain; the second time The time interval between and the first
- the second time is located after the first time in the time domain.
- the bits in the second bit block are used to generate the target signal, and the target The air interface resource block is the second air interface resource block; when the time interval between the second time and the first time is greater than the first threshold, the bits in the second bit block are not used The target signal is generated, and the target air interface resource block is the first air interface resource block.
- the first threshold is greater than zero.
- the second moment is the end of the time domain resources occupied by the modulation symbols generated by the first bit block Time; the second time is before the expiration time of the second air interface resource block in the time domain.
- the first receiver 1101B receives a first signal; wherein, the first signal carries a third bit block, the first signaling includes scheduling information of the third bit block, and The first bit block includes information indicating whether the third bit block is received correctly.
- the time domain before the time domain resource occupied by the earliest reference signal in the time domain in the target air interface resource block The resource is used to transmit the bits related to the first block of bits.
- the first air interface resource block includes one PUCCH
- the second air interface resource block includes one PUSCH
- the PUCCH and the PUSCH overlap in the time domain
- the PUCCH is reserved for the For the transmission of the first bit block
- the PUSCH is reserved for the transmission of the second bit block
- the first bit block includes high-priority UCI
- the second bit block includes low-priority service data
- the end time of PUCCH in the time domain is the first time, and the number of bits included in the first bit block is used by the first node to perform calculations to determine the second time
- the second time is in the time domain Not earlier than the first moment
- the time interval between the second moment and the first moment is used to determine whether the bits in the second bit block are used to generate the target signal.
- the high-priority UCI includes a HARQ-ACK codebook of the URLLC service type.
- the low-priority service data includes eMBB service type service data.
- the first air interface resource block includes one PUCCH
- the second air interface resource block includes one PUSCH
- the PUCCH is reserved for the For the transmission of the first bit block
- the PUSCH is reserved for the transmission of the second bit block
- the first bit block includes high-priority UCI
- the second bit block includes low-priority service data
- the end time of PUCCH in the time domain is the first time, and the number of bits included in the first bit block is used by the first node to perform calculations to determine the second time
- the second time is in the time domain Not earlier than the first moment; when the time interval between the second moment and the first moment is not greater than the first threshold, the bits in the second bit block are used to generate the Target signal
- the target air interface resource block is the PUSCH, and the bits generated by the first bit block and the second bit block are transmitted in the PUSCH; when the second time and the first time When the time interval between is greater than the first threshold, the bits
- the high-priority UCI includes a HARQ-ACK codebook of the URLLC service type.
- the low-priority service data includes eMBB service type service data.
- the first threshold is equal to zero.
- the first air interface resource block includes one PUCCH
- the second air interface resource block includes one PUSCH
- the PUCCH is reserved for the For the transmission of the first bit block
- the PUSCH is reserved for the transmission of the second bit block
- the first bit block includes high-priority UCI
- the second bit block includes low-priority service data
- the end time of PUCCH in the time domain is the first time, and the number of bits included in the first bit block is used by the first node to perform calculations to determine the second time
- the second time is in the time domain Not earlier than the first moment; when the time interval between the second moment and the first moment is not greater than the first threshold, the bits in the second bit block are used to generate the Target signal
- the target air interface resource block is the PUSCH, and the bits generated by the first bit block and the second bit block are transmitted in the PUSCH; when the second time and the first time When the time interval between is greater than the first threshold, the bits
- the high-priority UCI includes a HARQ-ACK codebook of the URLLC service type.
- the low-priority service data includes eMBB service type service data.
- the first set of conditions is satisfied; the first air interface resource block includes one PUCCH, the second air interface resource block includes one PUSCH, and the PUCCH and the PUSCH overlap in the time domain; the The PUCCH is reserved for the transmission of the first bit block, and the PUSCH is reserved for the transmission of the second bit block; the first bit block includes high priority UCI, and the second bit block includes low Priority service data; the expiration time of the PUCCH in the time domain is the first time, and the number of bits included in the first bit block is used by the first node to perform calculation to determine the second time; the The second time is not earlier than the first time in the time domain; when the time interval between the second time and the first time is not greater than the first threshold, the value in the second bit block Bits are used to generate the target signal, the target air interface resource block is the PUSCH, and the bits generated by the first bit block and the second bit block are transmitted in the PUSCH; when the second bit block is When the time interval between the time and the first time
- the high-priority UCI includes a HARQ-ACK codebook of the URLLC service type.
- the low-priority service data includes eMBB service type service data.
- the first threshold is equal to zero.
- the first set of conditions includes a timeline condition (Timeline condition), and a specific description of the timeline condition can be found in section 9.2.5 of 3GPP TS38.213.
- the conditions in the first set of conditions are or Timeline condition related to at least one of the Said Said And said
- the specific definition please refer to section 9.2.5 in 3GPP TS38.213.
- the first condition set includes a condition indicating that the PUSCH can support the transmission of the first bit block.
- the phrase that the first condition set is satisfied includes that all the conditions in the first condition set are satisfied.
- the first set of conditions is satisfied; the first air interface resource block includes one PUCCH, the second air interface resource block includes one PUSCH, and the PUCCH and the PUSCH overlap in the time domain; the The PUCCH is reserved for the transmission of the first bit block, and the PUSCH is reserved for the transmission of the second bit block; the first bit block includes high priority UCI, and the second bit block includes low Priority service data; the expiration time of the PUCCH in the time domain is the first time, and the number of bits included in the first bit block is used by the first node to perform calculation to determine the second time; the The second time is not earlier than the first time in the time domain; when the time interval between the second time and the first time is not greater than the first threshold, the value in the second bit block Bits are used to generate the target signal, the target air interface resource block is the PUSCH, and the bits generated by the first bit block and the second bit block are transmitted in the PUSCH; when the second bit block is When the time interval between the time and the first time
- the high-priority UCI includes a HARQ-ACK codebook of the URLLC service type.
- the low-priority service data includes eMBB service type service data.
- the first set of conditions includes a timeline condition (Timeline condition), and a specific description of the timeline condition can be found in section 9.2.5 of 3GPP TS38.213.
- the conditions in the first set of conditions are or Timeline condition related to at least one of the Said Said And said
- the specific definition please refer to section 9.2.5 in 3GPP TS38.213.
- the first condition set includes a condition indicating that the PUSCH can support the transmission of the first bit block.
- the phrase that the first condition set is satisfied includes that all the conditions in the first condition set are satisfied.
- the first set of conditions is satisfied; the first air interface resource block includes one PUCCH, the second air interface resource block includes one PUSCH, and the PUCCH and the PUSCH overlap in the time domain; the The PUCCH is reserved for the transmission of the first bit block, and the PUSCH is reserved for the transmission of the second bit block; the first bit block includes high priority UCI, and the second bit block includes low Priority service data; the expiration time of the PUCCH in the time domain is the first time, and the number of bits included in the first bit block is used by the first node to perform calculation to determine the second time; the The second time is not earlier than the first time in the time domain; the time interval between the second time and the first time is used to determine whether the bits in the second bit block are used to generate The target signal.
- the high-priority UCI includes a HARQ-ACK codebook of the URLLC service type.
- the low-priority service data includes eMBB service type service data.
- the first set of conditions includes a timeline condition (Timeline condition), and a specific description of the timeline condition can be found in section 9.2.5 of 3GPP TS38.213.
- the conditions in the first set of conditions are or Timeline condition related to at least one of the Said Said And said
- the specific definition please refer to section 9.2.5 in 3GPP TS38.213.
- the first condition set includes a condition indicating that the PUSCH can support the transmission of the first bit block.
- the phrase that the first condition set is satisfied includes that all the conditions in the first condition set are satisfied.
- the first air interface resource block includes one PUCCH
- the second air interface resource block includes one PUSCH
- the PUCCH is reserved for the For the transmission of the first bit block
- the PUSCH is reserved for the transmission of the second bit block
- the first bit block includes high-priority UCI
- the second bit block includes low-priority service data
- the end time of PUCCH in the time domain is the first time
- the number of bits included in the first bit block is used to determine the third time
- the number of bits included in the first bit block is used to determine the second time, the second time is not earlier than the first time in the time domain, and the second time is the same as the first time
- the time interval between is used to determine whether the bits in the second bit block are used to generate the target signal.
- the second time is the third time; when the second time is the same as the When the time interval between the first moments is not greater than the first threshold, the bits in the second bit block are used to generate the target signal, the target air interface resource block is the PUSCH, and the first The bit block and the bit generated by the second bit block are transmitted in the PUSCH; when the time interval between the second moment and the first moment is greater than the first threshold, the second bit The bits in the block are not used to generate the target signal, the target air interface resource block is the PUCCH, and the first bit block is transmitted in the PUCCH; the first threshold is greater than zero.
- the second time is the third time; when the second time is the same as the When the time interval between the first moments is not greater than the first threshold, the bits in the second bit block are used to generate the target signal, the target air interface resource block is the PUSCH, and the first The bit block and the bit generated by the second bit block are transmitted in the PUSCH; when the time interval between the second moment and the first moment is greater than the first threshold, the second bit The bits in the block are not used to generate the target signal, the target air interface resource block is the PUCCH, and the first bit block is transmitted in the PUCCH; the first threshold is equal to zero.
- the bits in the second bit block are used to generate the target signal.
- the high-priority UCI includes a HARQ-ACK codebook of the URLLC service type.
- the low-priority service data includes eMBB service type service data.
- the first air interface resource block includes one PUCCH
- the second air interface resource block includes one PUSCH
- the PUCCH is reserved for the For the transmission of the first bit block
- the PUSCH is reserved for the transmission of the second bit block
- the first bit block includes high-priority UCI
- the second bit block includes low-priority service data
- the end time of PUCCH in the time domain is the first time
- the number of bits included in the first bit block is used to determine the third time
- the number of bits included in the first bit block is used to determine the second moment, which is later than the first moment in the time domain, and is between the second moment and the first moment
- the time interval of is used to determine whether the bits in the second bit block are used to generate the target signal.
- the second time is the third time; when the second time is the same as the first time
- the bits in the second bit block are used to generate the target signal, the target air interface resource block is the PUSCH, and the first bit Block and the bits generated by the second bit block are transmitted in the PUSCH; when the time interval between the second moment and the first moment is greater than the first threshold, the second bit block
- the bits in are not used to generate the target signal, the target air interface resource block is the PUCCH, and the first bit block is transmitted in the PUCCH; the first threshold is greater than zero.
- the bits in the second bit block are used to generate the target signal.
- the high-priority UCI includes a HARQ-ACK codebook of the URLLC service type.
- the low-priority service data includes eMBB service type service data.
- the first set of conditions is satisfied; the first air interface resource block includes one PUCCH, the second air interface resource block includes one PUSCH, and the PUCCH and the PUSCH overlap in the time domain; the The PUCCH is reserved for the transmission of the first bit block, and the PUSCH is reserved for the transmission of the second bit block; the first bit block includes high priority UCI, and the second bit block includes low Priority service data; the end time of the PUCCH in the time domain is the first time; the number of bits included in the first bit block is used to determine the third time; when the third time is not early in the time domain At the first moment, the number of bits included in the first bit block is used to determine the second moment, and the second moment is not earlier than the first moment in the time domain. The time interval between the time and the first time is used to determine whether the bits in the second bit block are used to generate the target signal.
- the second time is the third time; when the second time is the same as the When the time interval between the first moments is not greater than the first threshold, the bits in the second bit block are used to generate the target signal, the target air interface resource block is the PUSCH, and the first The bit block and the bit generated by the second bit block are transmitted in the PUSCH; when the time interval between the second moment and the first moment is greater than the first threshold, the second bit The bits in the block are not used to generate the target signal, the target air interface resource block is the PUCCH, and the first bit block is transmitted in the PUCCH; the first threshold is greater than zero.
- the second time is the third time; when the second time is the same as the When the time interval between the first moments is not greater than the first threshold, the bits in the second bit block are used to generate the target signal, the target air interface resource block is the PUSCH, and the first The bit block and the bit generated by the second bit block are transmitted in the PUSCH; when the time interval between the second moment and the first moment is greater than the first threshold, the second bit The bits in the block are not used to generate the target signal, the target air interface resource block is the PUCCH, and the first bit block is transmitted in the PUCCH; the first threshold is equal to zero.
- the bits in the second bit block are used to generate the target signal.
- the high-priority UCI includes a HARQ-ACK codebook of the URLLC service type.
- the low-priority service data includes eMBB service type service data.
- the first set of conditions includes a timeline condition (Timeline condition), and a specific description of the timeline condition can be found in section 9.2.5 of 3GPP TS38.213.
- the conditions in the first set of conditions are or Timeline condition related to at least one of the Said Said And said
- the specific definition please refer to section 9.2.5 in 3GPP TS38.213.
- the first condition set includes a condition indicating that the PUSCH can support the transmission of the first bit block.
- the phrase that the first condition set is satisfied includes that all the conditions in the first condition set are satisfied.
- the first set of conditions is satisfied; the first air interface resource block includes one PUCCH, the second air interface resource block includes one PUSCH, and the PUCCH and the PUSCH overlap in the time domain; the The PUCCH is reserved for the transmission of the first bit block, and the PUSCH is reserved for the transmission of the second bit block; the first bit block includes high priority UCI, and the second bit block includes low Priority service data; the end time of the PUCCH in the time domain is the first time; the number of bits included in the first bit block is used to determine the third time; when the third time is later than the time in the time domain At the first moment, the number of bits included in the first bit block is used to determine the second moment, the second moment is later than the first moment in the time domain, and the second moment is equal to The time interval between the first moments is used to determine whether the bits in the second bit block are used to generate the target signal.
- the second time is the third time; when the second time is the same as the first time
- the bits in the second bit block are used to generate the target signal, the target air interface resource block is the PUSCH, and the first bit Block and the bits generated by the second bit block are transmitted in the PUSCH; when the time interval between the second moment and the first moment is greater than the first threshold, the second bit block
- the bits in are not used to generate the target signal, the target air interface resource block is the PUCCH, and the first bit block is transmitted in the PUCCH; the first threshold is greater than zero.
- the bits in the second bit block are used to generate the target signal.
- the high-priority UCI includes a HARQ-ACK codebook of the URLLC service type.
- the low-priority service data includes eMBB service type service data.
- the first set of conditions includes a timeline condition (Timeline condition), and a specific description of the timeline condition can be found in section 9.2.5 of 3GPP TS38.213.
- the conditions in the first set of conditions are or Timeline condition related to at least one of the Said Said And said
- the specific definition please refer to section 9.2.5 in 3GPP TS38.213.
- the first condition set includes a condition indicating that the PUSCH can support the transmission of the first bit block.
- the phrase that the first condition set is satisfied includes that all the conditions in the first condition set are satisfied.
- Embodiment 12A illustrates a structural block diagram of a processing device in a second node device, as shown in FIG. 12A.
- the second node device processing apparatus 1200A includes a second transmitter 1201A and a second receiver 1202A.
- the second node device 1200A is user equipment.
- the second node device 1200A is a base station.
- the second node device 1200A is a relay node.
- the second node device 1200A is a vehicle-mounted communication device.
- the second node device 1200A is a user equipment supporting V2X communication.
- the second transmitter 1201A includes the antenna 420, transmitter 418, multi-antenna transmission processor 471, transmission processor 416, controller/processor 475 and memory 476 in Figure 4 of the present application. At least one.
- the second transmitter 1201A includes the antenna 420, transmitter 418, multi-antenna transmission processor 471, transmission processor 416, controller/processor 475 and memory 476 in Figure 4 of the present application. At least the first five.
- the second transmitter 1201A includes the antenna 420, transmitter 418, multi-antenna transmission processor 471, transmission processor 416, controller/processor 475 and memory 476 in Figure 4 of the present application. At least the first four.
- the second transmitter 1201A includes the antenna 420, transmitter 418, multi-antenna transmission processor 471, transmission processor 416, controller/processor 475 and memory 476 in Figure 4 of the present application. At least the first three.
- the second transmitter 1201A includes the antenna 420, transmitter 418, multi-antenna transmission processor 471, transmission processor 416, controller/processor 475 and memory 476 in Figure 4 of the present application. At least the first two.
- the second receiver 1202A includes the antenna 420, the receiver 418, the multi-antenna receiving processor 472, the receiving processor 470, the controller/processor 475 and the memory 476 in Figure 4 of the present application. At least one.
- the second receiver 1202A includes the antenna 420, the receiver 418, the multi-antenna receiving processor 472, the receiving processor 470, the controller/processor 475 and the memory 476 in Figure 4 of the present application. At least the first five.
- the second receiver 1202A includes the antenna 420, the receiver 418, the multi-antenna receiving processor 472, the receiving processor 470, the controller/processor 475 and the memory 476 in Figure 4 of the present application. At least the first four.
- the second receiver 1202A includes the antenna 420, the receiver 418, the multi-antenna receiving processor 472, the receiving processor 470, the controller/processor 475 and the memory 476 in Figure 4 of the present application. At least the first three.
- the second receiver 1202A includes the antenna 420, the receiver 418, the multi-antenna receiving processor 472, the receiving processor 470, the controller/processor 475 and the memory 476 in Figure 4 of the present application. At least the first two.
- the second transmitter 1201A sends the first information; the second receiver 1202A receives the first signal in the first time-frequency resource block, and the first signal carries the second bit block; where , The first bit block is used to generate the second bit block; the first bit block includes a first bit sub-block and a second bit sub-block, and the priority corresponding to the first bit sub-block is higher than the The priority corresponding to the second bit sub-block; the number of resource particles used to transmit the second bit block in the first time-frequency resource block is not greater than a first value, and the bits included in the first bit sub-block The number of bits is used to determine the first value; the number of bits included in the first bit sub-block and the first information are used to determine the second value; the first time-frequency resource block is used The number of the resource particles used to transmit the bits related to the first bit sub-block included in the second bit block is equal to the minimum value of the first value and the second value.
- the first value has nothing to do with the first information.
- the first value is not greater than the first candidate value and not less than the second candidate value; the first parameter is used to determine the first candidate value, and the second parameter is used to determine the second candidate value.
- Numerical value; the first parameter and the second parameter respectively correspond to the first priority and the second priority; the priority of the first bit sub-block is the first priority, the second bit sub-block The priority is the second priority.
- the target parameter is used to determine the first value; the target parameter is the first parameter or the second parameter, and the first parameter and the second parameter correspond to the first priority and the second parameter, respectively.
- Priority the priority of the first bit sub-block is the first priority, the priority of the second bit sub-block is the second priority; the first bit sub-block includes the bit The number and the number of bits included in the second bit sub-block are used together to determine the target parameter.
- the first value is the first candidate value; when the second value is not greater than the second candidate value, the first value Is the second candidate value.
- the second transmitter 1201A receives first signaling and second signaling; wherein, the first signaling indicates a first air interface resource block, and the second signaling indicates a second air interface resource block ; At least one of the first air interface resource block and the second air interface resource block overlaps with the first time-frequency resource block in the time domain.
- the first signal carries a third bit block;
- the first time-frequency resource block is a time-frequency resource block allocated to the third bit block;
- the third bit block is of the first type The first type bit block of both the bit block and the second type bit block.
- Embodiment 12B illustrates a structural block diagram of a processing device in a second node device, as shown in FIG. 12B.
- the second node device processing apparatus 1200B includes a second transmitter 1201B and a second receiver 1202B.
- the second node device 1200B is user equipment.
- the second node device 1200B is a base station.
- the second node device 1200B is a relay node.
- the second node device 1200B is a vehicle-mounted communication device.
- the second node device 1200B is a user equipment supporting V2X communication.
- the second transmitter 1201B includes the antenna 420, the transmitter 418, the multi-antenna transmission processor 471, the transmission processor 416, the controller/processor 475 and the memory 476 shown in FIG. 4 of the present application. At least one.
- the second transmitter 1201B includes the antenna 420, the transmitter 418, the multi-antenna transmission processor 471, the transmission processor 416, the controller/processor 475 and the memory 476 shown in FIG. 4 of the present application. At least the first five.
- the second transmitter 1201B includes the antenna 420, the transmitter 418, the multi-antenna transmission processor 471, the transmission processor 416, the controller/processor 475 and the memory 476 shown in FIG. 4 of the present application. At least the first four.
- the second transmitter 1201B includes the antenna 420, the transmitter 418, the multi-antenna transmission processor 471, the transmission processor 416, the controller/processor 475 and the memory 476 shown in FIG. 4 of the present application. At least the first three.
- the second transmitter 1201B includes the antenna 420, the transmitter 418, the multi-antenna transmission processor 471, the transmission processor 416, the controller/processor 475 and the memory 476 shown in FIG. 4 of the present application. At least the first two.
- the second receiver 1202B includes the antenna 420, the receiver 418, the multi-antenna receiving processor 472, the receiving processor 470, the controller/processor 475 and the memory 476 in Figure 4 of the present application. At least one.
- the second receiver 1202B includes the antenna 420, the receiver 418, the multi-antenna receiving processor 472, the receiving processor 470, the controller/processor 475 and the memory 476 in Figure 4 of the present application. At least the first five.
- the second receiver 1202B includes the antenna 420, the receiver 418, the multi-antenna receiving processor 472, the receiving processor 470, the controller/processor 475 and the memory 476 in Figure 4 of the present application. At least the first four.
- the second receiver 1202B includes the antenna 420, the receiver 418, the multi-antenna receiving processor 472, the receiving processor 470, the controller/processor 475 and the memory 476 in Figure 4 of the present application. At least the first three.
- the second receiver 1202B includes the antenna 420, the receiver 418, the multi-antenna receiving processor 472, the receiving processor 470, the controller/processor 475 and the memory 476 in Figure 4 of the present application. At least the first two.
- the second transmitter 1201B sends the first signaling and the second signaling, and the first signaling and the second signaling are used to determine the first air interface resource block and the second signaling, respectively.
- the second time is located after the first time in the time domain.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (12)
- 一种被用于无线通信的第一节点设备,其特征在于,包括:第一接收机,接收第一信息;第一发送机,在第一时频资源块中发送第一信号,所述第一信号携带第二比特块;其中,第一比特块被用于生成所述第二比特块;所述第一比特块包括第一比特子块和第二比特子块,所述第一比特子块对应的优先级高于所述第二比特子块对应的优先级;所述第一时频资源块中被用于传输所述第二比特块的资源粒子的数量不大于第一数值,所述第一比特子块包括的比特的数量被用于确定所述第一数值;所述第一比特子块包括的比特的数量和所述第一信息共同被用于确定第二数值;所述第一时频资源块中被用于传输所述第二比特块中包括的与所述第一比特子块有关的比特的所述资源粒子的数量等于所述第一数值和所述第二数值两者中的最小值。
- 根据权利要求1所述的第一节点设备,其特征在于,所述第一数值与所述第一信息无关。
- 根据权利要求1或2所述的第一节点设备,其特征在于,所述第一数值不大于第一候选数值并且不小于第二候选数值;第一参数被用于确定所述第一候选数值,第二参数被用于确定所述第二候选数值;所述第一参数和所述第二参数分别对应第一优先级和第二优先级;所述第一比特子块的优先级是所述第一优先级,所述第二比特子块的优先级是所述第二优先级。
- 根据权利要求1至3中任一权利要求所述的第一节点设备,其特征在于,目标参数被用于确定所述第一数值;所述目标参数是第一参数或第二参数,所述第一参数和所述第二参数分别对应第一优先级和第二优先级;所述第一比特子块的优先级是所述第一优先级,所述第二比特子块的优先级是所述第二优先级;所述第一比特子块包括的比特的数量和所述第二比特子块包括的比特的数量共同被用于确定所述目标参数。
- 根据权利要求4所述的第一节点设备,其特征在于,第一比例被用于确定所述目标参数是第一参数或第二参数,所述第一比例是所述第一比特子块包括的比特的数量和所述第二比特子块包括的比特的数量的比值。
- 根据权利要求3所述的第一节点设备,其特征在于,当第二数值大于所述第二候选数值,所述第一数值是所述第一候选数值;当所述第二数值不大于所述第二候选数值,所述第一数值是所述第二候选数值。
- 根据权利要求3或6所述的第一节点设备,其特征在于,当所述第一数值是所述第一候选数值时,所述第一比特子块被用于生成所述第二比特块包括的全部或部分比特,所述第二比特子块不被用于生成所述第二比特块中包括的任何比特;当所述第一数值是所述第二候选数值时,所述第一比特子块被用于生成所述第二比特块包括的一部分比特,所述第二比特子块被用于生成所述第二比特块包括的另一部分比特。
- 根据权利要求1至7中任一权利要求所述的第一节点设备,其特征在于,包括;所述第一接收机接收第一信令和第二信令;其中,所述第一信令指示第一空口资源块,所述第二信令指示第二空口资源块;所述第一空口资源块和所述第二空口资源块两者中至少之一与所述第一时频资源块在时域上有交叠。
- 根据权利要求1至8中任一权利要求所述的第一节点设备,其特征在于,所述第一信号携带第三比特块;所述第一时频资源块是被配置给所述第三比特块的时频资源块;所述第三比特块是第一类比特块和第二类比特块两者中的所述第一类比特块。
- 一种被用于无线通信的第二节点设备,其特征在于,包括:第二发送机,发送第一信息;第二接收机,在第一时频资源块中接收第一信号,所述第一信号携带第二比特块;其中,第一比特块被用于生成所述第二比特块;所述第一比特块包括第一比特子块和第二比特子块,所述第一比特子块对应的优先级高于所述第二比特子块对应的优先级;所述第一时频资源块中被用于传输所述第二比特块的资源粒子的数量不大于第一数值,所述第一比特子块包括的比特的数量被用于确定所述第一数值;所述第一比特子块包括的比特的数量和所述第一信息共同被用于确定第二数值;所述第一时频资源块中被用于传输所述第二比特块中包括的与所述第一比特子块有关的比特的所述资源粒子的数量等于所述第一数值和所述第二数值两者中的最小值。
- 一种被用于无线通信的第一节点中的方法,其特征在于,包括:接收第一信息;在第一时频资源块中发送第一信号,所述第一信号携带第二比特块;其中,第一比特块被用于生成所述第二比特块;所述第一比特块包括第一比特子块和第二比特子块,所述第一比特子块对应的优先级高于所述第二比特子块对应的优先级;所述第一时频资源块中被用于传输所述第二比特块的资源粒子的数量不大于第一数值,所述第一比特子块包括的比特的数量被用于确定所述第一数值;所述第一比特子块包括的比特的数量和所述第一信息共同被用于确定第二数值;所述第一时频资源块中被用于传输所述第二比特块中包括的与所述第一比特子块有关的比特的所述资源粒子的数量等于所述第一数值和所述第二数值两者中的最小值。
- 一种被用于无线通信的第二节点中的方法,其特征在于,包括:发送第一信息;在第一时频资源块中接收第一信号,所述第一信号携带第二比特块;其中,第一比特块被用于生成所述第二比特块;所述第一比特块包括第一比特子块和第二比特子块,所述第一比特子块对应的优先级高于所述第二比特子块对应的优先级;所述第一时频资源块中被用于传输所述第二比特块的资源粒子的数量不大于第一数值,所述第一比特子块包括的比特的数量被用于确定所述第一数值;所述第一比特子块包括的比特的数量和所述第一信息共同被用于确定第二数值;所述第一时频资源块中被用于传输所述第二比特块中包括的与所述第一比特子块有关的比特的所述资源粒子的数量等于所述第一数值和所述第二数值两者中的最小值。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/955,545 US20230022663A1 (en) | 2020-04-02 | 2022-09-29 | Method and device in nodes used for wireless communication |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010255183.7 | 2020-04-02 | ||
CN202010255183.7A CN113498179B (zh) | 2020-04-02 | 2020-04-02 | 一种被用于无线通信的节点中的方法和装置 |
CN202010302776.4 | 2020-04-17 | ||
CN202010302776.4A CN113543231B (zh) | 2020-04-17 | 2020-04-17 | 一种被用于无线通信的节点中的方法和装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/955,545 Continuation US20230022663A1 (en) | 2020-04-02 | 2022-09-29 | Method and device in nodes used for wireless communication |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021197043A1 true WO2021197043A1 (zh) | 2021-10-07 |
Family
ID=77927699
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/080962 WO2021197043A1 (zh) | 2020-04-02 | 2021-03-16 | 一种被用于无线通信的节点中的方法和装置 |
Country Status (2)
Country | Link |
---|---|
US (1) | US20230022663A1 (zh) |
WO (1) | WO2021197043A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220095324A1 (en) * | 2020-09-18 | 2022-03-24 | Qualcomm Incorporated | Transmission time implicitly triggering uci multiplexing on pusch with different priorities |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190037586A1 (en) * | 2017-07-10 | 2019-01-31 | Lg Electronics Inc. | Method for transmitting and receiving uplink control information and devices supporting the same |
WO2019144919A1 (en) * | 2018-01-24 | 2019-08-01 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Transmission channel assignment apparatus and method for controlling a transmission over a transmission channel |
WO2019192604A1 (zh) * | 2018-04-04 | 2019-10-10 | 华为技术有限公司 | 一种上行控制信息发送和接收方法及装置 |
WO2019242501A1 (en) * | 2018-06-20 | 2019-12-26 | FG Innovation Company Limited | Method and apparatus for handling embb and urllc simultaneous transmissions |
CN110741577A (zh) * | 2017-11-15 | 2020-01-31 | Lg电子株式会社 | 在无线通信系统中由终端发送上行链路控制信息的方法及使用该方法的终端 |
CN110808819A (zh) * | 2018-08-06 | 2020-02-18 | 华为技术有限公司 | 信息传输的方法和装置 |
WO2020056726A1 (en) * | 2018-09-21 | 2020-03-26 | Qualcomm Incorporated | Uplink control information multiplexing on physical uplink control channel |
-
2021
- 2021-03-16 WO PCT/CN2021/080962 patent/WO2021197043A1/zh active Application Filing
-
2022
- 2022-09-29 US US17/955,545 patent/US20230022663A1/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190037586A1 (en) * | 2017-07-10 | 2019-01-31 | Lg Electronics Inc. | Method for transmitting and receiving uplink control information and devices supporting the same |
CN110741577A (zh) * | 2017-11-15 | 2020-01-31 | Lg电子株式会社 | 在无线通信系统中由终端发送上行链路控制信息的方法及使用该方法的终端 |
WO2019144919A1 (en) * | 2018-01-24 | 2019-08-01 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Transmission channel assignment apparatus and method for controlling a transmission over a transmission channel |
WO2019192604A1 (zh) * | 2018-04-04 | 2019-10-10 | 华为技术有限公司 | 一种上行控制信息发送和接收方法及装置 |
WO2019242501A1 (en) * | 2018-06-20 | 2019-12-26 | FG Innovation Company Limited | Method and apparatus for handling embb and urllc simultaneous transmissions |
CN110808819A (zh) * | 2018-08-06 | 2020-02-18 | 华为技术有限公司 | 信息传输的方法和装置 |
WO2020056726A1 (en) * | 2018-09-21 | 2020-03-26 | Qualcomm Incorporated | Uplink control information multiplexing on physical uplink control channel |
Also Published As
Publication number | Publication date |
---|---|
US20230022663A1 (en) | 2023-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021052165A1 (zh) | 一种被用于无线通信的节点中的方法和装置 | |
WO2022062982A1 (zh) | 一种被用于无线通信的节点中的方法和装置 | |
WO2021164558A1 (zh) | 一种被用于无线通信的节点中的方法和装置 | |
WO2021197043A1 (zh) | 一种被用于无线通信的节点中的方法和装置 | |
WO2022188835A1 (zh) | 一种被用于无线通信的节点中的方法和装置 | |
WO2022193644A1 (zh) | 一种被用于无线通信的节点中的方法和装置 | |
WO2021185229A1 (zh) | 一种被用于无线通信的节点中的方法和装置 | |
CN113543231B (zh) | 一种被用于无线通信的节点中的方法和装置 | |
CN113498173B (zh) | 一种被用于无线通信的节点中的方法和装置 | |
CN113132056B (zh) | 一种被用于无线通信的节点中的方法和装置 | |
CN113498179B (zh) | 一种被用于无线通信的节点中的方法和装置 | |
CN113677032A (zh) | 一种被用于无线通信的节点中的方法和装置 | |
CN113747587A (zh) | 一种被用于无线通信的节点中的方法和装置 | |
CN113765636A (zh) | 一种被用于无线通信的节点中的方法和装置 | |
WO2021227893A1 (zh) | 一种被用于无线通信的节点中的方法和装置 | |
WO2022048509A1 (zh) | 一种被用于无线通信的节点中的方法和装置 | |
CN113949483B (zh) | 一种被用于无线通信的节点中的方法和装置 | |
WO2022083482A1 (zh) | 一种被用于无线通信的节点中的方法和装置 | |
CN114389775B (zh) | 一种被用于无线通信的节点中的方法和装置 | |
CN114285536B (zh) | 一种被用于无线通信的节点中的方法和装置 | |
CN114257346B (zh) | 一种被用于无线通信的节点中的方法和装置 | |
CN113411887B (zh) | 一种被用于无线通信的节点中的方法和装置 | |
CN112788770B (zh) | 一种被用于无线通信的节点中的方法和装置 | |
WO2022017126A1 (zh) | 一种被用于无线通信的节点中的方法和装置 | |
WO2023123797A1 (zh) | 一种被用于无线通信的节点中的方法和装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21780137 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21780137 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 21/06/2023) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21780137 Country of ref document: EP Kind code of ref document: A1 |