WO2022036565A1 - 一种通信的方法及装置 - Google Patents

一种通信的方法及装置 Download PDF

Info

Publication number
WO2022036565A1
WO2022036565A1 PCT/CN2020/109865 CN2020109865W WO2022036565A1 WO 2022036565 A1 WO2022036565 A1 WO 2022036565A1 CN 2020109865 W CN2020109865 W CN 2020109865W WO 2022036565 A1 WO2022036565 A1 WO 2022036565A1
Authority
WO
WIPO (PCT)
Prior art keywords
sequence
terminal
cluster
access device
terminals
Prior art date
Application number
PCT/CN2020/109865
Other languages
English (en)
French (fr)
Inventor
张云昊
徐修强
范平志
李里
陈欢
程高峰
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2020/109865 priority Critical patent/WO2022036565A1/zh
Publication of WO2022036565A1 publication Critical patent/WO2022036565A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes

Definitions

  • the embodiments of the present application relate to the field of wireless communication technologies, and in particular, to a communication method and apparatus.
  • the way for the access device to identify the terminal identity is to pre-configure each terminal with a sequence, such as a preamble.
  • a sequence such as a preamble.
  • the terminal When the terminal is activated due to service requirements, it can send a pre-configured sequence on a specific resource, and the access device identifies the terminal's identity through the sequence. Theoretically, the more terminals the access device needs to identify by using the same resource, the longer the length of the sequence configured for the terminals needs to be.
  • the access device Since the access device cannot perceive the number of active terminals before the terminal is active, in order to ensure the accuracy of terminal identification, the access device usually configures a sequence of sufficient length for the terminal, and also needs to reserve enough resources to send and receive the terminal. sequence. In this way, more resources are occupied in the network, so that the resource overhead of the communication system is greater, and sending a longer sequence makes the terminal power consumption greater.
  • the present application provides a communication method and apparatus to solve the problems of high resource overhead and high terminal power consumption when an access device performs terminal identification.
  • a communication method includes: first, an access device receives a first sequence sent by a terminal in a first cluster. Then, the access device sends a sequence length to the terminals in the first cluster, where the sequence length is determined according to n, where n is the number of the first sequences received by the access device. The sequences are all sent from the terminals in the first cluster, and the n is an integer greater than 0. Furthermore, the access device receives a second sequence of the sequence length, where the second sequence is used to identify the identity of the terminal that sends the second sequence in the first cluster.
  • the number n of the first sequence received by the access device may represent the number of active terminals, and the access device first senses the number n of active terminals in the first cluster, and determines the number n according to the number n of active terminals In this way, the terminal can send the second sequence corresponding to the sequence length to the access device, so as to identify the identity of the terminal. Since the sequence length is determined according to the number n of active terminals, the sequence length is an optimal length that conforms to the terminal identity identification, so that when receiving and sending the second sequence for identifying the terminal identity, the network can be reasonably utilized. resources, avoid excessive resource overhead of the communication system, and also prevent the terminal from sending a long sequence, causing the terminal to consume a lot of power.
  • the second sequences sent by different terminals in the first cluster are different. Different second sequences correspond to different terminals, and the access device can identify the identities of the terminals in the first cluster that send the second sequences through the different second sequences.
  • the second sequence sent by different terminals in the first cluster may also be the same, and different terminals in the first cluster may send the second sequence on different resources, so that the access device can receive the resources of the second sequence by , identifying the identity of the terminal in the first cluster that sends the second sequence.
  • the access device may also send first configuration information to the terminals in the first cluster, where the first configuration information includes information of a first resource, and the first resource is used for the All terminals in the first cluster transmit the first sequence. That is, different terminals in the same cluster send the first sequence on the same resource.
  • the access device may also send second configuration information to the terminals in the first cluster, where the second configuration information includes information of a second resource, and the second resource is used for the All terminals in the first cluster transmit the second sequence. That is, different terminals in the same cluster send the second sequence on the same resource.
  • the access device may also send information about different second resources to different terminals in the same cluster, that is, different terminals in the same cluster send the second sequence on different resources, so that the access device can also receive the second sequence by receiving the first sequence.
  • the resource of the second sequence identifies the identity of the terminal in the first cluster that sends the second sequence.
  • the access device sends third configuration information to the terminals in the first cluster, where the third configuration information includes the first sequence or a parameter for generating the first sequence.
  • the access device may configure the same first sequence for all terminals in the first cluster, or configure the same parameters for generating the first sequence, so that all terminals in the first cluster send the same first sequence to the access device. sequence.
  • the access device may send fourth configuration information to the first terminal, where the fourth configuration information includes first information, and the first information is used by the first terminal to determine the The second sequence sent by the first terminal, where the first terminal is located in the first cluster.
  • the access device may also send fifth configuration information to the second terminal, where the fifth configuration information includes second information, and the second information is used by the second terminal to determine that the second terminal sends The second sequence of the second terminal is located in the first cluster.
  • the first information and the second information may be different, and the access device sends different information for determining the second sequence to different terminals in the first cluster, so that different terminals in the first cluster can generate different second sequences.
  • the information for generating the second sequence may be, for example, an operation relational expression, such as a*x+b*y, or a coefficient value a or b, and so on.
  • the second information may also be the same as the first information.
  • the second sequence generated by the first terminal combining the first information and the first parameter may be different from the second sequence generated by the second terminal combining the second information and the second parameter.
  • the parameter and the second parameter can be pre-specified by the protocol, and do not need to be sent by the access device. For example, they can be the identifier of the terminal. When different terminal identifiers are substituted into the same operation relation, the obtained results may also be different, that is, different terminals. The resulting second sequence is different.
  • the access device may determine that the first terminal is located in the first cluster according to the time delay between the first terminal and the access device.
  • the difference between the time delays between the terminals in the first cluster and the access device is less than or equal to a set threshold.
  • the absolute value of the difference between the delay between the first terminal and the access device and the average delay value is less than or equal to the set threshold
  • the absolute value of the difference between the delay between the second terminal and the access device and the average delay value is less than or equal to the set threshold
  • the first terminal and the second terminal are located in the first cluster
  • the average time delay is the average time delay of the terminals in the first cluster and the access device respectively.
  • the terminal is divided into clusters, and the terminals located in a cluster have the same or similar time delay as the access device respectively.
  • the first sequence sent by different terminals in the first cluster is the same; the first sequence sent by the terminals in the first cluster is the same as the first sequence sent by the terminals in the second cluster different. That is, the first sequences sent by different terminals in the same cluster are the same, and the first sequences sent by terminals in different clusters are different. In this way, it is convenient for the access device to quickly and accurately determine the number of active terminals in a cluster.
  • a communication method is provided. First, a terminal can send a first sequence to an access device. The terminal then receives the sequence length from the access device. Further, the terminal sends a second sequence of the sequence length to the access device, where the second sequence is used to identify the identity of the terminal.
  • the first sequence is used to determine the sequence length.
  • the terminal is located in the first cluster, and the sequence length is determined according to n, where n is the data sent by the terminal in the first cluster received by the access device The number of the first sequence, and the n is an integer greater than 0.
  • the number n of the first sequences received by the access device may represent the number of active terminals. Since the sequence length is determined according to the number n of active terminals, the sequence length is an optimal length that conforms to the terminal identity identification, so that when receiving and sending the second sequence for identifying the terminal identity, the network can be reasonably utilized. resources, avoid excessive resource overhead of the communication system, and also prevent the terminal from sending a long sequence, causing the terminal to consume a lot of power.
  • the terminal may further receive first configuration information from the access device, where the first configuration information includes information of a first resource, and the first resource is used by the terminal to send the first sequence. That is, the terminal sends the first sequence on the first resource.
  • the terminal may further receive second configuration information from the access device, where the second configuration information includes information of a second resource, and the second resource is used for sending by the terminal the second sequence. That is, the terminal sends the second sequence on the second resource.
  • the terminal receives third configuration information from the access device, where the third configuration information includes the first sequence or a parameter for generating the first sequence.
  • the terminal receives fourth configuration information from the access device, where the fourth configuration information includes first information, and the first information is used by the terminal to determine the second configuration information. sequence.
  • a communication device in a third aspect, has the functions of implementing the first aspect and any possible implementation of the first aspect, or implementing any possible implementation of the second aspect and the second aspect. function. These functions can be implemented by hardware or by executing corresponding software by hardware.
  • the hardware or software includes one or more functional modules corresponding to the above-mentioned functions.
  • a computer program product in a fourth aspect, includes: computer program code, when the computer program code is run on a computer, the computer program code enables the computer to execute the first aspect and any of the possible first aspects.
  • the present application provides a chip system, the chip system includes a processor and a memory, the processor and the memory are electrically coupled; the memory is used to store computer program instructions; the processor , used to execute part or all of the computer program instructions in the memory, and when the part or all of the computer program instructions are executed, to implement the first aspect and any possible implementation of the first aspect.
  • the function of the device, or the function of the terminal in any possible implementation of the second aspect and the second aspect.
  • the chip system may further include a transceiver, where the transceiver is configured to send a signal processed by the processor, or receive a signal input to the processor.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • a sixth aspect provides a computer storage medium for storing a computer program, the computer program comprising instructions for implementing the functions in the first aspect and any possible implementation of the first aspect, or for implementing the second aspect Instructions for functions in any possible implementation of the aspect and the second aspect.
  • a communication system in a seventh aspect, includes the access device in the first aspect and any possible implementation method of the first aspect and any possible implementation of the second aspect and the second aspect. method in the terminal.
  • FIG. 1 is a schematic diagram of a communication system architecture provided in an embodiment of the present application
  • FIG. 2 is a schematic diagram of a communication process provided in an embodiment of the present application.
  • FIG. 3 is a schematic diagram of a communication process provided in an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a cluster division provided in an embodiment of the present application.
  • FIG. 5a is a schematic diagram of allocating time-frequency resources according to an embodiment of the present application.
  • FIG. 5b is a schematic diagram of a grouping process provided in an embodiment of the present application.
  • FIG. 5c is a schematic diagram of a communication process provided in an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a communication device provided in an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a communication device provided in an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a communication apparatus provided in an embodiment of the present application.
  • system architecture of the communication methods provided by the embodiments of the present application. It is understandable that the system architecture described in the embodiments of the present application is to more clearly describe the technical solutions of the embodiments of the present application, and does not constitute a limitation on the technical solutions provided by the embodiments of the present application.
  • WLAN wireless local area network
  • LTE long term evolution
  • LTE frequency division duplex frequency division duplex
  • FDD frequency division duplex
  • TDD time division duplex
  • UMTS universal mobile telecommunication system
  • WiMAX worldwide interoperability for microwave access
  • 5G fifth generation
  • NR new radio
  • terminals gradually show the characteristics of large numbers, densification, and multiple forms.
  • monitoring devices cameras
  • machines production machines
  • sensors sensors
  • terminals such as mobile phones and wearable devices used by workers at the same time.
  • Operators are restricted by various conditions, and the number of access devices installed is limited, and there is a situation where one access device covers a large number of terminals.
  • the way for the access device to identify the terminal identity is to preconfigure each terminal with a sequence, such as a preamble.
  • a sequence such as a preamble.
  • the terminal When the terminal is activated due to service requirements, it can send a pre-configured sequence on a specific resource, and the access device identifies the terminal's identity through the sequence. Theoretically, the more terminals the access device needs to identify by using the same resource, the longer the length of the sequence configured for the terminals needs to be.
  • the access device Since the access device cannot perceive the number of active terminals before the terminal is activated, in order to ensure the accuracy of the terminal identification, the access device usually configures the terminal with a sequence of sufficient length, and also needs to reserve enough resources for sending and receiving. the sequence. In this way, more resources are occupied in the network, so that the resource overhead of the communication system is greater, and sending a longer sequence makes the terminal power consumption greater.
  • the communication system shown in FIG. 1 includes an access device and a terminal, and a plurality of terminals can be divided into several clusters.
  • an access device and a terminal can use air interface resources to perform wireless communication.
  • the air interface resources may include one or more of time domain resources, frequency domain resources, code domain resources and air domain resources.
  • Terminals in a cluster can send sequences for terminal identification on the same resource, and different clusters occupy different resources. In this way, since the number of terminals using one resource is reduced after clustering, correspondingly, the length of the sequence used for terminal identification can be shortened accordingly.
  • the terminal clustering can reduce a part of the resource overhead and terminal power consumption, it is inevitable that the access device still does not perceive the number of active terminals in a cluster, and there will still be a longer configuration for the terminal for the terminal.
  • the sequence of identity recognition results in the occupation of more resources of the network, which makes the resource overhead of the communication system larger and the power consumption of the terminal larger.
  • the present application proposes a communication method for sending two sequences.
  • the first sequence is used to determine the number of active terminals
  • the second sequence is used to identify the identities of the active terminals.
  • the first sequence and the second sequence here represent sequences sent in two different stages.
  • the first sequence corresponds to the first stage
  • the second sequence corresponds to the second stage.
  • different terminals in a cluster all send the first sequence to the access device
  • the access device determines the sequence length according to the number of received first sequences, and sends the sequence length to the terminals in the cluster.
  • different terminals in a cluster send the second sequence of the sequence length for terminal identification.
  • the determined sequence length is an optimal length in accordance with the terminal identification, which can realize rational utilization of resources, avoid excessive resource overhead, and also avoid the problem that the terminal transmits a long sequence and causes the terminal to consume more power.
  • the equipment includes but is not limited to: evolved Node B (evolved Node B, eNB), wireless network control radio network controller (RNC), Node B (NB), base station controller (BSC), base transceiver station (BTS), home base station (for example, home evolved NodeB, or Home Node B, HNB), baseband unit (BBU), access point (AP), wireless relay node, wireless backhaul node, transmission point in wireless fidelity (wireless fidelity, WIFI) systems (transmission and reception point, TRP or transmission point, TP), etc., can also be 5G, such as NR, gNB in the system, or transmission point (TRP or TP), one or a group of base stations in the 5G system ( Including multiple antenna panels) antenna panels, or, it can also be a network node that constitutes a gNB or a transmission point, such as a baseband unit (B
  • Terminal equipment also known as user equipment (UE), mobile station (MS), mobile terminal (MT), terminal, etc.
  • UE user equipment
  • MS mobile station
  • MT mobile terminal
  • the terminal device includes a handheld device with a wireless connection function, a vehicle-mounted device, and the like.
  • terminal devices can be: mobile phones (mobile phones), tablet computers, notebook computers, PDAs, mobile Internet devices (MIDs), wearable devices, virtual reality (virtual reality, VR) devices, augmented reality (augmented reality (AR) equipment, wireless terminals (eg, sensors, etc.) in industrial control, wireless terminals in self-driving, wireless terminals in remote medical surgery, intelligent A wireless terminal in a smart grid, a wireless terminal in transportation safety, a wireless terminal in a smart city, or a wireless terminal in a smart home, or with a car-to-car ( Vehicle-to-Vehicle, V2V) public wireless terminals, etc.
  • MIDs mobile Internet devices
  • VR virtual reality
  • AR augmented reality
  • wireless terminals eg, sensors, etc.
  • a wireless terminal in a smart grid a wireless terminal in transportation safety, a wireless terminal in a smart city, or a wireless terminal in a smart home, or with a car-to-car ( Vehicle-to-Vehicle, V2V)
  • FIG. 2 provides a schematic diagram of a communication process, taking the first cluster as an example for illustration, and the first cluster is any cluster. Specifically include the following steps:
  • Step 201 The first terminal sends the first sequence to the access device; correspondingly, the access device receives the first sequence sent by the first terminal.
  • the first terminal is located in the first cluster, and the first terminal is any terminal in the first cluster.
  • other terminals in the first cluster may also send the first sequence to the access device, and the access device receives the first sequence sent by other terminals in the first cluster.
  • Step 202 The access device determines the sequence length according to the received number n of the first sequence.
  • the first sequence here is the sequence sent by the terminals in the first cluster.
  • the number of the first sequence may represent the number of active terminals in the first cluster, and the first sequence may be used to determine the sequence length.
  • Step 203 The access device sends the sequence length to the first terminal, and accordingly, the first terminal receives the sequence length from the access device.
  • the access device may also send the sequence length to other terminals in the first cluster.
  • the sequence length is determined according to n, where n is the number of the first sequence received by the access device, and n is an integer greater than 0.
  • Step 204 The first terminal sends the second sequence of the sequence length to the access device, and accordingly, the access device receives the second sequence of the sequence length, and the second sequence is used to identify the The identity of the terminal sending the second sequence in the first cluster.
  • Step 205 According to the second sequence, the access device identifies the identity of the terminal sending the second sequence, that is, the identity of the first terminal.
  • the number n of the first sequences received by the access device may represent the number of active terminals in the first cluster.
  • the access device first senses the number n of active terminals in the first cluster, and will The number of terminals n determines the sequence length, so that any terminal in the first cluster can send a second sequence corresponding to the sequence length to the access device, so as to identify the identity of the terminal. Since the sequence length is determined according to the number n of active terminals, the sequence length is an optimal length that conforms to the terminal identity identification, so that when receiving and sending the second sequence for identifying the terminal identity, the network can be reasonably utilized. resources, avoid excessive resource overhead of the communication system, and also prevent the terminal from sending a long sequence, causing the terminal to consume a lot of power.
  • the communication process between the terminal and the access device is described above.
  • the communication process between the terminal and the access device will be described in detail in combination with multiple clusters, such as the second cluster and the third cluster.
  • the access device not only sends the sequence length to the terminal, but also can send the information for determining the first sequence and the second sequence, and the information for sending the resources of the first sequence and the second sequence to the terminal, etc. , also introduces the way to divide the clusters.
  • Figure 3 includes the following steps:
  • Step 31 The access device clusters the terminals.
  • the access device can cluster the terminals within the coverage.
  • these terminals are in a connected state, or the access device knows information of each terminal to be clustered, such as identity information and location information.
  • the access device divides the terminals into clusters according to the time delay between the terminal and the access device.
  • the time delays of the terminals located in a cluster and the access device are respectively the same or similar, so that the time domain symbols of the first sequence sent by each terminal in a cluster to the access device are basically aligned.
  • 9 UEs are divided into 3 clusters, where UE-1, UE-2, and UE-3 are located in the first cluster, UE-4, UE-5, and UE-6 are located in the second cluster, and UE-1 is located in the second cluster. -7, UE-8, UE-9 are located in the third cluster.
  • the difference between the time delays of the terminals in the first cluster and the access device is less than or equal to the set threshold.
  • the time delay between UE-1 and the access device is t1
  • the time delay between UE-2 and the access device is t2
  • the time delay between UE-3 and the access device is t3.
  • t1, t2 and t3 are the same or similar.
  • the difference between t1 and t2, the difference between t1 and t3, and the difference between t2 and t3 are all less than or equal to the set threshold.
  • the set threshold is close to 0, which can be a very small duration in the microsecond level.
  • the absolute value of the difference between the delay between the first terminal and the access device and the average delay value is less than or equal to the set threshold
  • the absolute value of the difference between the delay between the second terminal and the access device and the average delay value is less than or equal to the set threshold
  • the first terminal and the second terminal are located in the first cluster
  • the average time delay is the average time delay of the terminals in the first cluster and the access device respectively.
  • the average value of t1, t2, and t3 is T
  • the difference between t1 and T the difference between t2 and T
  • the difference between t3 and T all of which are less than or equal to the set threshold.
  • the set threshold is close to 0, which can be a very small duration in milliseconds.
  • Step 32 The access device allocates the same first sequence to terminals in the same cluster, and allocates different first sequences to terminals in different clusters.
  • the access device allocates the first sequence to each terminal in each cluster, and sends the first resource of the first sequence.
  • the first sequence corresponds to the first stage
  • the second sequence corresponds to the second stage.
  • the first resource is the resource allocated in the first stage
  • the first resource is used for sending the first sequence
  • the second resource is the resource allocated in the second stage
  • the second resource is used for sending the second sequence (the Details will be introduced later).
  • the first resource allocated in the first stage may also be referred to as a first-stage physical random access channel opportunity (RO)
  • the second resource allocated in the second stage may also be referred to as a first-stage physical random access channel opportunity (RO). Secondary RO.
  • the access device allocates the first sequence and the first resource to each terminal
  • the first sequences allocated by the access device to different terminals in the same cluster are the same, and the first sequences allocated to terminals in different clusters may be different. As shown in Table 1, it is divided into three clusters, namely the first cluster, the second cluster and the third cluster.
  • the first sequences allocated to the terminals in the first cluster are all preamble-1; the first sequences allocated to different terminals in the second cluster are all preamble-2, and the first sequences allocated to different terminals in the third cluster Both are preamble-3. preamble-1, preamble-2, preamble-3 are different.
  • the first sequence allocated by the access device to the terminals in different clusters may also be the same, but the resources used by the terminals in different clusters for sending the first sequence are different.
  • the access device allocates different sequence groups to terminals in different clusters, and the different sequence groups do not have the same sequence, and the terminals in the cluster determine the sequence to use within the assigned sequence groups.
  • the access device may send third configuration information to the terminals in the first cluster, and accordingly, the terminal receives information from the access device.
  • Third configuration information of the device where the third configuration information includes the first sequence or a parameter for generating the first sequence.
  • the access device may configure the same first sequence for all terminals in the first cluster, or configure the same parameters for generating the first sequence, so that all terminals in the first cluster send the same first sequence to the access device. sequence.
  • the manner in which the access device assigns the first sequence to the second cluster and the third cluster is the same as the manner in which the first sequence is assigned to the first cluster, and will not be repeated.
  • the first resources allocated by the access device to different terminals in the same cluster are the same or different, and the first resources allocated to terminals in different clusters may be the same or different.
  • the first resource allocated by the access device to the terminals in the first cluster is the time-frequency resource 11, and the terminals in the first cluster can send the first sequence Preamble-1 on the time-frequency resource 11.
  • the first resource allocated by the access device to the terminals in the second cluster may also be the time-frequency resource 11 , and the terminals in the second cluster may send the first sequence Preamble-2 on the time-frequency resource 11 .
  • the first resource allocated by the access device to the terminals in the second cluster may also be the time-frequency resource 12 , and the terminals in the second cluster may all send the first sequence Preamble-2 on the time-frequency resource 12 .
  • the first resource allocated by the access device to the terminal in the third cluster may be time-frequency resource 11 or time-frequency resource 13, and the terminals in the third cluster can all send the first resource on time-frequency resource 11 or time-frequency resource 13. Sequence Preamble-3.
  • the time-frequency resource 11 , the time-frequency resource 12 and the time-frequency resource 13 are different from each other.
  • the access device may also send the first configuration information to the terminals in the first cluster, and correspondingly, the terminal receives the incoming
  • the first configuration information of the incoming device includes the information of the first resource, and the first resource is used for all terminals in the first cluster to send the first sequence.
  • the first resource here may be one or more of a time domain resource, a frequency domain resource, a space domain resource, and a code domain resource.
  • the manner in which the access device allocates the first resource to the second cluster and the third cluster is the same as the manner of allocating the first resource to the first cluster, and details are not repeated here.
  • the access device When the access device sends the third configuration information to the terminal to configure the first sequence for the terminal, it may include but is not limited to adopting any one of the following methods:
  • Mode 1 The access device transmits by broadcasting.
  • Each terminal can determine which first sequence it uses or which parameter to use to generate the first sequence according to the cluster where it is located, and the identity or identification or sequence in the cluster. With reference to Table 1, for example, when the terminal determines that it is located in the first cluster, it can determine that it uses preamble-1, and when the terminal determines that it is located in the second cluster, it can determine that it uses preamble-2.
  • Mode 2 The access device transmits in a multicast mode.
  • each cluster has a cluster-level multicast resource, which can include a control resource set (CORESET) shared by all terminals in the cluster, a search space Search Space resource, and a shared wireless network temporary identifier (radio network tempory identity, RNTI), etc.
  • the access device may multicast the first sequence used by the cluster or the parameters used to generate the first sequence in the multicast resources of each cluster.
  • CORESET control resource set
  • RNTI shared wireless network temporary identifier
  • Mode 3 The access device sends in unicast mode. That is, the access device individually sends to each terminal the first sequence used by the terminal or the parameters used to generate the first sequence.
  • the access device when the access device sends the first configuration information to the terminal to configure the first resource for the terminal, it can also be configured by broadcasting, multicast or unicast similar to the third configuration information, and the repetition is not repeated. Repeat.
  • the first configuration information and the third configuration information may be carried in the same message sent to the terminal, or may be in different messages.
  • Step 33 Terminals in the same cluster send the same first sequence to the access device, and terminals in different clusters send different first sequences to the access device.
  • the first sequences sent by different terminals in the first cluster are all preamble-1; the first sequences sent by different terminals in the second cluster are all preamble-2, and the first sequences sent by different terminals in the third cluster are all preamble-2.
  • the first sequences of are all preamble-3. In this way, it is convenient for the access device to quickly and accurately determine the number of active terminals in a cluster.
  • the first sequence sent by the terminal in the first cluster may be the first sequence included in the third configuration information sent by the access device to the first cluster, or the first sequence generated according to the parameters included in the third configuration information Generated first sequence.
  • the manner in which the terminals in the second cluster and the third cluster determine the first sequence is the same as the manner in which the terminals in the first cluster determine the first sequence, and will not be repeated.
  • Terminals in the same cluster send the first sequence on the same first resource, and terminals in different clusters send the first sequence on the same or different first resources.
  • the terminals in the first cluster can send the first sequence Preamble-1 on the time-frequency resource 11.
  • All terminals in the second cluster can send the first sequence Preamble-2 on the time-frequency resource 12 .
  • All terminals in the third cluster can send the first sequence Preamble-3 on the time-frequency resource 13 .
  • the terminals in the first cluster, the terminals in the second cluster, and the terminals in the third cluster may all send their corresponding first sequences Preamble-1, Preamble-2, and Preamble-3 on the time-frequency resource 11 .
  • Step 34 The access device determines the number of received first sequences sent by terminals in each cluster, that is, determines the number of active terminals in the cluster.
  • the first sequences sent by terminals in the same cluster are the same, and the first sequences sent by terminals in different clusters are different.
  • the access device determines which cluster the terminal sending the sequence belongs to according to the received first sequence, and then determines the number of active terminals in each cluster according to the number of received first sequences. For example, the access device determines the number of received first sequences sent from terminals in the first cluster, thereby determining the number of active terminals in the first cluster.
  • the access device determines the number of received first sequences sent from terminals in the second cluster, thereby determining the number of active terminals in the second cluster.
  • the access device determines the number of received first sequences sent from terminals in the third cluster, so as to determine the number of active terminals in the third cluster.
  • the access device determines the number of active terminals in each cluster, it can be determined by using sequence correlation detection, or by other sequence detection methods, which is not limited here.
  • sequence correlation detection or by other sequence detection methods, which is not limited here.
  • the following is a sequence correlation detection method. For example.
  • P ix represents the transmit power of the x-th terminal in the i-th cluster, which can be a scalar, s i is the Preamble-i sent by the active terminal in the i-th cluster, and is a column vector; h 1x is the i-th cluster in
  • the channel between the xth terminal and the access device can be assumed to be known through channel estimation. If the sequence is a frequency domain sequence, si h ix can be understood as the dot product of the vector, that is, the corresponding phase of each element in the vector. Multiply to get a column vector with the same dimension as si . Then the correlation detection calculation formula is (taking s 1 detection as an example):
  • several sequences with autocorrelation of 1 and cross-correlation of 0 can be designed to satisfy the above conditions, such as the Preamble sequence or DMRS sequence in the existing 3GPP protocol, which will not be described here.
  • the number of terminals sending Preamble-1 can be obtained according to the relevant detection value R1.
  • the number of terminals sending Preamble-2 and Preamble-3 can be obtained.
  • Step 35 The access device determines the sequence length of the second sequence corresponding to the cluster according to the received number of the first sequences sent by the terminals in each cluster, and sends the sequence length to the terminals in the corresponding cluster.
  • the access device determines the sequence length corresponding to the first cluster according to the received number of the first sequences sent from the terminals in the first cluster.
  • the access device determines the sequence length corresponding to the second cluster according to the received number of second sequences sent from the terminals in the second cluster.
  • the access device determines the sequence length corresponding to the third cluster according to the number of third sequences received from the terminals in the third cluster.
  • the sequence lengths of different clusters determined in this way may be the same or different.
  • the access device may send the sequence length of the corresponding second sequence to each terminal in each cluster in a broadcast, multicast or unicast manner.
  • the broadcasting, multicasting or unicasting here is the same as the manner in which the access device sends the third configuration information to the terminal described above, and repeated details are not repeated here.
  • the access device may also assign different second sequences to terminals in the same cluster. Exemplarily, the access device first determines the information for generating the second sequence, and then allocates the information to the corresponding terminal, so that the terminal uses the corresponding information to generate the second sequence. The access device may also determine the second resource occupied by the second sequence, and send the second resource to the corresponding terminal, so that the terminal sends the second sequence on the corresponding second resource.
  • Table 2 The following is a detailed introduction in conjunction with Table 2.
  • Table 2 The access device allocates the second sequence and the second resource to each terminal
  • the information allocated by the access device to the first terminal to determine the second sequence is f11(n), and the information allocated to the second terminal to determine the second sequence is f11(n).
  • the information of the second sequence is f12(n), and the information allocated to the xth terminal for determining the second sequence is f1x(n).
  • the information allocated by the access device to the first terminal for determining the second sequence is f21(n), and the information allocated to the second terminal for determining the second sequence is f22 (n), the information allocated to the yth terminal for determining the second sequence is f2y(n).
  • the third cluster is similar and will not be repeated.
  • the access device may determine the information used by each terminal to generate the second sequence, and send the information to the corresponding terminal. Specifically, when the access device allocates different information for determining the second sequence to different terminals in the same cluster, by way of example, the access device may send fourth configuration information to the first terminal.
  • the first terminal receiving fourth configuration information from an access device, where the fourth configuration information includes first information, and the first information is used by the first terminal to determine a second sequence sent by the first terminal, the first The terminal is located in the first cluster.
  • the first terminal here may be, for example, the first terminal in the first cluster described above, and the first information may be f11(n) described above.
  • the access device may also send fifth configuration information to the second terminal, and correspondingly, the second terminal receives fifth configuration information from the access device, where the fifth configuration information includes the second information, the second information is used by the second terminal to determine the second sequence sent by the second terminal, and the second terminal is located in the first cluster.
  • the second terminal here may be, for example, the second terminal in the first cluster described above, and the second information may be f12(n) described above.
  • the first information (for example, f11(n)) and the second information (for example, f12(n)) may be different, and the access device sends different information for determining the second sequence to different terminals in the first cluster, so as to facilitate Different terminals within the first cluster generate different second sequences.
  • the information f11(n) and f12(n) for generating the second sequence can be, for example, an operation relational expression, such as a*x+b*y, or a coefficient value a or b, or an index indicating an operation relational expression, Or an index of coefficient values, or an index of a combination of coefficient values, and so on.
  • the second information may also be the same as the first information.
  • the second sequence generated by the first terminal combining the first information and the first parameter may be different from the second sequence generated by the second terminal combining the second information and the second parameter.
  • the parameter and the second parameter can be pre-specified by the protocol, and do not need to be sent by the access device. For example, they can be the identifier of the terminal. When different terminal identifiers are substituted into the same operation relation, the obtained results may also be different, that is, different terminals. The resulting second sequence is different.
  • the access device may also determine the second resource for sending the second sequence, and send the second resource to the terminal, so that the terminal sends the second sequence on the corresponding second resource.
  • the second resource of the second sequence may be determined according to the length of the sequence sent to the terminals of the cluster.
  • the access device may determine, according to the sequence length, the number of resource elements (resource elements, REs) corresponding to the second resource, or the number of time-domain symbols in the second resource, or the number of subcarriers on the second resource. Further, according to the determined quantity, a corresponding second resource is selected for the cluster.
  • resource elements resource elements, REs
  • the present application allows a certain measurement error of the number of terminals, for example, the measurement of the number of active terminals may be inaccurate, resulting in an inaccurate determination of the sequence length, resulting in suboptimal resource allocation.
  • This application can set a certain redundancy. For example, the length of the sequence sent by the access device to the terminal is a little longer than the required sequence length calculated by the access device.
  • the second resource allocated to the terminal for sending the second sequence also a little more. However, the waste of resources can still be reduced in this way, and the beneficial effects of the present application are not affected.
  • the second resources allocated by the access device to different terminals in the same cluster are the same, and the second resources allocated to terminals in different clusters may be the same or different.
  • the second resource allocated by the access device to the terminals in the first cluster is the time-frequency resource 21 , and the terminals in the second cluster can all send the second sequence on the time-frequency resource 21 .
  • the second resource allocated by the access device to the terminal in the second cluster may also be the time-frequency resource 21 , and all the terminals in the second cluster may send the second sequence on the time-frequency resource 21 .
  • the second resource allocated by the access device to the terminal in the second cluster may also be the time-frequency resource 22 , and the terminals in the second cluster may all send the second sequence on the time-frequency resource 22 .
  • the second resource allocated by the access device to the terminal in the third cluster may be the time-frequency resource 21 or the time-frequency resource 23, and the terminals in the third cluster can all send the first resource on the time-frequency resource 21 or the time-frequency resource 23.
  • the time-frequency resource 21 , the time-frequency resource 22 and the time-frequency resource 23 are different from each other.
  • the access device may send the second configuration information to the terminals in the first cluster, and accordingly, the terminals receive information from the access device.
  • the second configuration information of the device where the second configuration information includes information of a second resource, and the second resource is used for all terminals in the first cluster to send the second sequence.
  • the second resource here may be one or more of a time domain resource, a frequency domain resource, a space domain resource and a code domain resource.
  • the manner in which the access device allocates the second resource to the second cluster and the third cluster is the same as the manner of allocating the second resource to the first cluster, which will not be repeated.
  • the access device may send the second configuration information to each terminal in each cluster in a broadcast, multicast or unicast manner.
  • the broadcasting, multicasting or unicasting here is the same as the manner in which the access device sends the third configuration information to the terminal described above, and repeated details are not repeated here.
  • Fig. 5a there are provided two ways for the access device to allocate different second resources to different clusters.
  • the second resources of different clusters occupy the same number of frequency domain resources (subcarriers), the length of the second sequence is determined according to the number of active terminals in the cluster, and the access device is the second sequence determined by different clusters.
  • the sequence length of the sequences may vary. For example, the sequence length of the second sequence of the first cluster is greater than the sequence length of the second sequence of the third cluster, and the sequence length of the second sequence of the third cluster is greater than the sequence length of the second sequence of the second cluster. Then, when terminals in different clusters send their respective second sequences, the amount of time domain resources occupied will be different.
  • the number of time domain resources occupied by the first cluster is greater than the number of time domain resources occupied by the third cluster, which is greater than the time domain resources occupied by the second cluster.
  • the access device allocates the same number of time-domain resources to different clusters, and allocates different frequency-domain resources (subcarriers) quantity. That is, when three clusters occupy the same amount of time domain resources, in the frequency domain, the number of frequency domain resources occupied by the first cluster is greater than the number of frequency domain resources occupied by the third cluster, and greater than the frequency domain resources occupied by the second cluster. The number of domain resources.
  • FIG. 5a above only provides an example of allocating second resources.
  • the number of frequency domain resources occupied by the second resources of different clusters may be different, and the number of occupied time domain resources may also be different. Then the access device allocates different amounts of time domain resources to different clusters, and allocates different amounts of time domain resources.
  • the access device may also configure different second resource information for different terminals in the same cluster, that is, different terminals in the same cluster send the second sequence on different resources, so that The access device may also identify the identity of the terminal in the first cluster that sends the second sequence by receiving the resources of the second sequence.
  • the second sequences sent by different terminals in a cluster may be the same or different.
  • the second sequences sent by terminals in different clusters are generally different.
  • the access device may also configure the same second sequence for different terminals in the same cluster, and configure different second resources for different terminals in the same cluster, so that different terminals in a cluster
  • the sent second sequence can be the same, and different terminals in a cluster can send the second sequence on different second resources, so that the access device can identify the second sequence sent in the cluster by receiving the second resource of the second sequence the identity of the terminal.
  • Step 36 The terminal generates a second sequence according to the information sent by the access device for generating the second sequence, and the generated second sequence conforms to the sequence length sent by the access device, and sends the second sequence on the corresponding second resource. sequence.
  • the second sequences sent by different terminals in one cluster are different, and the second sequences sent by different terminals in different clusters are also different.
  • the second sequence sent by the first terminal in the first cluster is determined according to f11(n), and the second sequence sent by the second terminal in the first cluster is determined according to f12(n).
  • the second sequence sent by the xth terminal in the cluster is determined according to f1x(n).
  • the second sequence sent by the first terminal in the second cluster is determined according to f21(n), and the second sequence sent by the second terminal in the second cluster is determined according to f22(n).
  • the second sequence sent by the terminal is determined according to f2x(n).
  • the second sequence generated by the terminal in the first cluster conforms to the sequence length corresponding to the first cluster
  • the second sequence generated by the terminal in the second cluster conforms to the sequence length corresponding to the second cluster.
  • Terminals in the same cluster send the second sequence on the same second resource, and terminals in different clusters send the second sequence on the same or different second resources.
  • the terminals in the first cluster can all send the second sequence on the time-frequency resource 21 .
  • the terminals in the second cluster can all send the second sequence on the time-frequency resource 22
  • the terminals in the third cluster can all send the second sequence on the time-frequency resource 23 .
  • the terminals in the first cluster, the terminals in the second cluster, and the terminals in the third cluster may all send their corresponding second sequences on the time-frequency resource 11 .
  • Step 37 The access device identifies the identity of the terminal sending the second sequence according to the second sequence.
  • the access device Since the second sequences determined by each terminal are different, and the access device knows the terminal identities corresponding to each second sequence, the access device can distinguish each terminal through sequence detection. The process of how the access device knows the terminal identity corresponding to each second sequence is not concerned by the present application.
  • the access device can also allocate uplink data sending resources to each terminal, and specifically can send the allocated uplink resources to the corresponding terminal by means of broadcast, multicast or unicast.
  • the uplink data sending resource may also be sent before the identity of the terminal is identified. For example, when the second resource is sent to the terminal, the uplink data sending resource is also sent.
  • the transmission resource of the uplink data may be a physical uplink shared channel (physical uplink shared channel, PUSCH).
  • the second resources of each cluster may be an association relationship between the second resources of each cluster and the PUSCH, for example, the time domain resources of the PUSCH and the second resources are the same, or the frequency domain resources are the same.
  • the same PUSCH can be multiplexed to send uplink data to the access device.
  • the way that multiple terminals multiplex the same PUSCH resource can be that each terminal can use different codebooks and/or different spreading codes . Since the access device has identified the identity of the active terminal, and the access device knows the codebook or spreading code used by the terminal in advance, the access device can demodulate the codebook or spreading code of the active user according to the codebook or spreading code of the active user. Uplink data sent by active terminals on the PUSCH.
  • the "terminal" in the above embodiment can also be understood as a group head terminal in a terminal group.
  • a group head terminal of the group is notified, and the group head terminal may represent some or all terminals of the whole group, and send the first sequence and the second sequence to the access device .
  • Terminals can communicate through D2D.
  • the terminal can enter the connected state through random access and send registration information to the access device.
  • the access device For example, as shown in Figure 5b, UE1, UE2, and UE3 are terminals to be added to the network. These terminals enter the connected state through random access, and send a registration message to the access device. Correspondingly, the access device receives these terminals. The registration message sent.
  • the access device After receiving the registration message, the access device returns a registration response message (registration response message) to each terminal.
  • the registration response message may include information of other registered terminals, and/or resources for sidelink transmission with other registered terminals.
  • the terminal may be designated as the group head terminal of the terminal group in the registration response information.
  • the registration response message sent by UE1 may include indication information to indicate UE1 as the group head terminal.
  • the group head terminal broadcasts the information gk to the surrounding terminals (announce the exist of gk by GM).
  • the group head terminal uses the sidelink broadcast resources to broadcast the information gk to the surrounding terminals.
  • gk can include a sequence.
  • UE1 broadcasts information gk to UE2 and UE3.
  • the surrounding terminals feed back the measurement information of the gk to the one or more terminals, that is, feed back the channel information between the terminal and the group head terminal.
  • the group head terminal After receiving the measurement information of one or more surrounding terminals, the group head terminal groups these terminals (terminals that have fed back the gk measurement information) according to a preset specific rule, such as the principle of minimum energy consumption in the terminal group (opt. -EC based GH reselection), such as grouping according to algorithms such as K-means.
  • a preset specific rule such as the principle of minimum energy consumption in the terminal group (opt. -EC based GH reselection), such as grouping according to algorithms such as K-means.
  • the group head terminal After the group head terminal is grouped, it records or updates the terminal information of the group (update GH), and broadcasts the terminal information of the group to the terminals in the group and other group heads, where the terminal information can be, for example, the identification of the terminal. For example, UE1 broadcasts the terminal information of this group to UE2 and UE3.
  • the group head terminal or other terminals in the group can feed back group information to the access device, such as the ID of the group head terminal and the channel state information (CSI) between the group head terminal and the access device. ).
  • group information such as the ID of the group head terminal and the channel state information (CSI) between the group head terminal and the access device.
  • CSI channel state information
  • UE1 feeds back the ID and channel state information of the group head terminal to the access device.
  • the access device may update the terminal group periodically or aperiodically, for example, by broadcasting an instruction to update the terminal group, the new group head terminal and other terminals repeat the above-mentioned construction process of the terminal group.
  • the access device may assign the group head terminal to a cluster.
  • clustering method please refer to the introduction in FIG. 3 above, which will not be repeated here.
  • the access device may also allocate the first sequence to the group head terminal, and send the first resource of the first sequence for determining the information of the second sequence.
  • the detailed process can also refer to the introduction in FIG. 3 above, which will not be repeated here.
  • the head terminal of the group can determine which cluster it is in through the configuration of the access device, and can obtain the first sequence and the first resource, and obtain the information for determining the second sequence.
  • All active group head terminals send the first sequence on the first resource.
  • the access device estimates the number of active group head terminals in each cluster, determines the sequence length of the second sequence used by each cluster, and compares the sequence length with the first sequence length.
  • the second resource is sent to each active group head terminal by means of broadcast or multicast.
  • the second resource may also be determined, and the second resource is sent to each active group head terminal.
  • the priority of each cluster can be indicated through the configuration of the second resource, for example, the time resource of the second resource of the cluster with higher priority is configured earlier than the second resource of the cluster with lower priority.
  • Each active group head terminal sends the second sequence on the designated second resource.
  • the access device can solve the second sequence through algorithms such as AMP, so as to obtain the identity information of the active group head terminal.
  • the group head terminal may also be allocated an uplink resource for sending uplink data.
  • Each active group head terminal sends uplink data on the allocated uplink resources.
  • each terminal group head when sending the second sequence, optionally sends uplink data on the corresponding PUSCH.
  • the communication method in the embodiment of the present application is described above, and the communication device in the embodiment of the present application will be described below.
  • the method and the device are based on the same technical concept. Since the principles of the method and the device for solving problems are similar, the implementation of the device and the method can be referred to each other, and repeated descriptions will not be repeated.
  • a communication apparatus 600 is provided, and the apparatus 600 can perform each step performed by the access device in the above-mentioned methods in FIGS. 2 and 3 .
  • the apparatus 600 may be an access device, or may be a chip applied in the access device.
  • the apparatus 600 may include: a receiving module 620a, a sending module 620b, a processing module 610, and optionally, a storage module 630; the processing module 610 may be connected to the storage module 630, the receiving module 620a, and the sending module 620b, respectively, and the storage module 630 may also be connected to the receiving module 620a and the transmitting module 620b.
  • the receiving module 620a is configured to receive the first sequence sent by the terminal in the first cluster; the sending module 620b is configured to send the sequence length to the terminal in the first cluster, the The sequence length is determined according to n, where n is the number of the first sequence received by the device, and n is an integer greater than 0; the receiving module 620a is configured to receive the second sequence of the sequence length , the second sequence is used to identify the identity of the terminal sending the second sequence in the first cluster.
  • the sending module 620b is further configured to send first configuration information to the terminals in the first cluster, where the first configuration information includes information of a first resource, and the first resource is used for the All terminals in the first cluster transmit the first sequence.
  • the sending module 620b is further configured to send second configuration information to the terminals in the first cluster, where the second configuration information includes information of second resources, and the second resources are used for the All terminals in the first cluster transmit the second sequence.
  • the sending module 620b is further configured to send third configuration information to the terminals in the first cluster, where the third configuration information includes the first sequence or a method that generates the first sequence parameter.
  • the sending module 620b is further configured to send fourth configuration information to the first terminal, where the fourth configuration information includes first information, and the first information is used by the first terminal to determine the The second sequence sent by the first terminal, where the first terminal is located in the first cluster.
  • the sending module 620b is further configured to send fifth configuration information to the second terminal, where the fifth configuration information includes second information, and the second information is used by the second terminal to determine the The second sequence sent by the second terminal is located in the first cluster.
  • the processing module 610 is configured to determine that the first terminal is located in the first cluster according to the time delay between the first terminal and the device.
  • the processing module 610 is configured to identify the identity of the terminal sending the second sequence according to the second sequence.
  • the storage module 630 may store computer-executed instructions for accessing the method on the device side, so that the processing module 610, the sending module 620b and the receiving module 620a execute the method in the above example.
  • the sending module 620b and the receiving module 620a can also be integrated together, which is called a transceiver module.
  • a communication apparatus 700 is provided, and the apparatus 700 can perform each step performed by the terminal in the above-mentioned methods of FIG. 2 and FIG. 3 .
  • the apparatus 700 may be a terminal, or may be a chip applied in the terminal.
  • the apparatus 700 may include: a receiving module 720a, a sending module 720b, a processing module 710, and optionally, a storage module 730; the processing module 710 may be respectively connected to the storage module 730, the receiving module 720a, and the sending module 720b, the storage module 730 may also be connected to the receiving module 720a and the transmitting module 720b.
  • the sending module 720b is configured to send the first sequence to the access device; the receiving module 720a is configured to receive the sequence length from the access device; the sending module 720b is further configured to A second sequence of the sequence length is sent to the access device, the second sequence being used to identify the apparatus.
  • the processing module 710 is configured to determine the second sequence of the sequence length.
  • the receiving module 720a is further configured to receive first configuration information from the access device, where the first configuration information includes information of a first resource, and the first resource is used for the The device transmits the first sequence.
  • the receiving module 720a is further configured to receive second configuration information from the access device, where the second configuration information includes information of a second resource, and the second resource is used for the The device transmits the second sequence.
  • the receiving module 720a is further configured to receive third configuration information from the access device, where the third configuration information includes the first sequence or a parameter for generating the first sequence.
  • the receiving module 720a is further configured to receive fourth configuration information from the access device, where the fourth configuration information includes first information, and the first information is used to determine the first configuration information. Second sequence.
  • the storage module 730 may store computer-executed instructions for accessing the method on the device side, so that the processing module 710, the sending module 720b and the receiving module 720a execute the method in the above example.
  • the sending module 720b and the receiving module 720a can also be integrated together, which is called a transceiver module.
  • a storage module may include one or more memories, which may be devices in one or more devices or circuits for storing programs or data.
  • the storage module can be a register, cache or RAM, etc., and the storage module can be integrated with the processing module.
  • the storage module can be a ROM or other type of static storage device that can store static information and instructions, and the storage module can be independent of the processing module.
  • the sending module, the receiving module, or the transceiver module may be an input or output interface, a pin or a circuit, or the like.
  • the apparatus 800 includes: a processor 810, a transceiver 820, and optionally, a memory 830.
  • the transceiver may be used to receive program instructions and transmit them to the processor, or the transceiver may be used for the apparatus to communicate and interact with other communication devices, such as interactive control signaling and/or service data.
  • the transceiver may be a code and/or data read/write transceiver, or alternatively, the transceiver may be a signal transmission transceiver between the communication processor and the transceiver.
  • the processor 810 and the memory 830 are electrically coupled.
  • the memory 830 is used to store a computer program; the processor 810 can be used to invoke the computer program or instruction stored in the memory to execute the above-mentioned communication method, or to execute the above-mentioned communication method through the transceiver 820 method of communication.
  • the processing module 610 in FIG. 6 and the processing module 710 in FIG. 7 may be implemented by the processor 810 .
  • the sending module 620b and the receiving module 620a in FIG. 6 and the sending module 720b and the receiving module 720a in FIG. 7 may be implemented by the transceiver 820 .
  • transceiver 820 may include a separate transmitter, and/or a separate receiver.
  • the sending module 620b in FIG. 6 and the sending module 720b in FIG. 7 may be implemented by a transmitter.
  • the receiving module 620a in FIG. 6 and the receiving module 720a in FIG. 7 may be implemented by receivers.
  • the storage module 630 in FIG. 6 and the storage module 730 in FIG. 7 may be implemented by the memory 830 .
  • the above-mentioned processor may be a central processing unit (CPU), a network processor (NP), or a combination of CPU and NP.
  • the processor may further include hardware chips or other general purpose processors.
  • the above-mentioned hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD) or a combination thereof.
  • the above-mentioned PLD can be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a general-purpose array logic (generic array logic, GAL) and other programmable logic devices. , discrete gate or transistor logic devices, discrete hardware components, etc., or any combination thereof.
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the memory mentioned in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM, PROM), an erasable programmable read-only memory (Erasable PROM, EPROM), an electrically programmable read-only memory (Erasable PROM, EPROM). Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • Volatile memory may be Random Access Memory (RAM), which acts as an external cache.
  • RAM Static RAM
  • DRAM Dynamic RAM
  • SDRAM Synchronous DRAM
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDR SDRAM
  • enhanced SDRAM ESDRAM
  • synchronous link dynamic random access memory Synchlink DRAM, SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • the transceiver device, the interface circuit, or the transceiver described in the embodiments of the present application may include a separate transmitter and/or a separate receiver, or the transmitter and the receiver may be integrated.
  • Transceiver devices, interface circuits, or transceivers may operate under the direction of a corresponding processor.
  • the transmitter may correspond to the transmitter in the physical device
  • the receiver may correspond to the receiver in the physical device.
  • Embodiments of the present application further provide a computer storage medium storing a computer program, and when the computer program is executed by a computer, the computer can be used to perform the above communication method.
  • Embodiments of the present application also provide a computer program product containing instructions, which, when executed on a computer, enable the computer to execute the above-mentioned communication method.
  • An embodiment of the present application further provides a communication system, where the communication system includes: an access device and a terminal for executing the above communication method.
  • the embodiments of the present application may be provided as a method, a system, or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions
  • the apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种通信的方法及装置,用以解决接入设备在进行终端身份识别时,资源开销大且终端功耗大的问题。首先接入设备接收第一簇内的终端发送的第一序列,然后接入设备向第一簇内的终端发送序列长度,序列长度根据n确定,n为接入设备接收到的第一序列的数量,这些第一序列均由第一簇内的终端所发送。进而,接入设备接收序列长度的第二序列,第二序列用于识别第一簇内发送第二序列的终端的身份。第一序列的数量代表了活跃终端的数量,由于序列长度根据活跃终端的数量n确定,该序列长度是符合终端身份识别的较优长度,则可以实现合理地利用资源,避免资源开销过大,也避免了终端发送较长的序列使得终端功耗较大。

Description

一种通信的方法及装置 技术领域
本申请实施例涉及无线通信技术领域,尤其涉及一种通信的方法及装置。
背景技术
近年来,海量终端发起随机接入或进行数据传输时,接入设备识别终端身份的方式是:给每个终端预先配置一个序列,例如前导码preamble。终端因业务需求被激活时,可以在特定的资源上发送预先配置的序列,接入设备通过序列识别终端的身份。理论上,接入设备利用同一块资源要识别的终端越多,则为终端配置的序列的长度需要越长。
由于接入设备在终端活跃前无法感知活跃终端的数量,为保障终端身份识别的准确性,接入设备通常给终端配置足够长度的序列,则也需要预留足够多的资源来发送、接收该序列。这样,占用网络的资源较多,使得通信系统的资源开销较大,并且发送较长的序列使得终端功耗较大。
发明内容
本申请提供一种通信的方法及装置,用以解决接入设备在进行终端身份识别时,资源开销大且终端功耗大的问题。
第一方面,提供一种通信的方法,该方法包括:首先,接入设备接收第一簇内的终端发送的第一序列。然后所述接入设备向所述第一簇内的终端发送序列长度,所述序列长度根据n确定,所述n为所述接入设备接收到的所述第一序列的数量,这些第一序列均来自所述第一簇内的终端所发送的,所述n为大于0的整数。进而,所述接入设备接收所述序列长度的第二序列,所述第二序列用于识别所述第一簇内发送所述第二序列的终端的身份。
在该实施例中,接入设备接收到的第一序列的数量n可以代表活跃终端的数量,接入设备先感知第一簇内的活跃终端的数量n,并将根据活跃终端的数量n确定的序列长度,这样终端就可以发送对应序列长度的第二序列给接入设备,以便于识别终端的身份。由于序列长度是根据活跃终端的数量n确定的,所以该序列长度是符合终端身份识别的较优长度,进而可以实现在接收、发送用于识别终端身份的第二序列时,合理地利用网络的资源,避免通信系统的资源开销过大,也避免了终端发送较长的序列使得终端功耗较大。
在一种可能的实现中,所述第一簇内的不同终端发送的第二序列不同。不同的第二序列对应不同的终端,则接入设备可以通过不同的第二序列,识别第一簇内的发送第二序列的终端的身份。或者,所述第一簇内的不同终端发送的第二序列也可以相同,第一簇内的不同终端可以在不同的资源上发送第二序列,这样接入设备可以通过接收第二序列的资源,识别第一簇内的发送第二序列的终端的身份。
在一种可能的实现中,所述接入设备还可以向所述第一簇内的终端发送第一配置信息,第一配置信息包括第一资源的信息,所述第一资源用于所述第一簇内的所有终端发送所述第一序列。也就是同一簇内的不同终端在相同的资源上发送第一序列。
在一种可能的实现中,所述接入设备还可以向所述第一簇内的终端发送第二配置信息,第二配置信息包括第二资源的信息,所述第二资源用于所述第一簇内的所有终端发送所述 第二序列。也就是同一簇内的不同终端在相同的资源上发送第二序列。或者,接入设备也可以向同一簇内的不同终端发送不同的第二资源的信息,也就是同一簇内的不同终端在不同的资源上发送第二序列,这样接入设备也可以通过接收第二序列的资源,识别第一簇内的发送所述第二序列的终端的身份。
在一种可能的实现中,所述接入设备向所述第一簇内的终端发送第三配置信息,所述第三配置信息包括所述第一序列或生成所述第一序列的参数。接入设备可以向第一簇内的所有终端配置相同的第一序列,或者配置相同的生成所述第一序列的参数,以便于第一簇内的所有终端向接入设备发送相同的第一序列。
在一种可能的实现中,所述接入设备可以向第一终端发送第四配置信息,所述第四配置信息包括第一信息,所述第一信息用于所述第一终端确定所述第一终端发送的第二序列,所述第一终端位于所述第一簇内。
进一步地,所述接入设备还可以向第二终端发送第五配置信息,所述第五配置信息包括第二信息,所述第二信息用于所述第二终端确定所述第二终端发送的第二序列,所述第二终端位于所述第一簇内。
第一信息与第二信息可以不同,则接入设备向第一簇内的不同终端发送不同的用于确定第二序列的信息,以便于第一簇内的不同终端生成不同的第二序列。这些用于生成第二序列的信息例如可以是运算关系式,例如a*x+b*y,或者系数值a或b等等。第二信息与第一信息也可以相同,第一终端结合第一信息和第一参数生成的第二序列,与第二终端结合第二信息和第二参数生成的第二序列可以不同,第一参数与第二参数可以是协议预先规定好的,无需接入设备发送,例如可以是终端的标识,不同的终端标识代入同一运算关系式中,得出的结果也可能不同,也就是不同的终端得出的第二序列不同。
在一种可能的实现中,所述接入设备可以根据所述第一终端与所述接入设备的时延,确定所述第一终端位于第一簇内。
在一种可能的实现中,所述第一簇内的终端分别与所述接入设备的时延,之间的差值小于或等于设定阈值。或者,第一终端与接入设备的时延,与时延平均值的差值绝对值小于或等于设定阈值,第二终端与接入设备的时延,与时延平均值的差值绝对值小于或等于设定阈值,第一终端与第二终端位于第一簇内,所述时延平均值为所述第一簇内的终端分别与所述接入设备的时延的平均值。
通过终端与接入设备之间的时延,将终端划分簇,位于一个簇内的终端分别与接入设备的时延相同或相近。
在一种可能的实现中,所述第一簇内的不同终端发送的第一序列相同;所述第一簇内的终端发送的第一序列,与第二簇内的终端发送的第一序列不同。也就是同一簇内的不同终端发送的第一序列相同,不同簇内的终端发送的第一序列不同。这样可以便于接入设备快速准确地确定出一个簇内的活跃终端的数量。
第二方面,提供了一种通信的方法,首先,终端可以向接入设备发送第一序列。然后,所述终端接收来自所述接入设备的序列长度。进而,所述终端向接入设备发送所述序列长度的第二序列,所述第二序列用于识别所述终端的身份。
在一种可能的实现中,所述第一序列用于确定所述序列长度。
在一种可能的实现中,所述终端位于第一簇内,所述序列长度根据n确定,所述n为 所述接入设备接收到的来自所述第一簇内的终端所发送的所述第一序列的数量,所述n为大于0的整数。
接入设备接收到的第一序列的数量n可以代表活跃终端的数量。由于序列长度是根据活跃终端的数量n确定的,所以该序列长度是符合终端身份识别的较优长度,进而可以实现在接收、发送用于识别终端身份的第二序列时,合理地利用网络的资源,避免通信系统的资源开销过大,也避免了终端发送较长的序列使得终端功耗较大。
在一种可能的实现中,所述终端还可以接收来自所述接入设备的第一配置信息,所述第一配置信息包括第一资源的信息,所述第一资源用于所述终端发送所述第一序列。也就是所述终端在第一资源上发送所述第一序列。
在一种可能的实现中,所述终端还可以接收来自所述接入设备的第二配置信息,所述第二配置信息包括第二资源的信息,所述第二资源用于所述终端发送所述第二序列。也就是所述终端在第二资源上发送所述第二序列。
在一种可能的实现中,所述终端接收来自所述接入设备的第三配置信息,所述第三配置信息包括所述第一序列或生成所述第一序列的参数。
在一种可能的实现中,所述终端接收来自所述接入设备的第四配置信息,所述第四配置信息包括第一信息,所述第一信息用于所述终端确定所述第二序列。
第三方面,提供了一种通信的装置,所述装置具有实现上述第一方面及第一方面任一可能的实现中的功能,或实现上述第二方面及第二方面任一可能的实现中的功能。这些功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的功能模块。
第四方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码在计算机上运行时,使得计算机执行上述第一方面及第一方面任一可能的实现中由接入设备执行的方法,或执行上述第二方面及第二方面任一可能的实现中由终端执行的方法。
第五方面,本申请提供了一种芯片系统,该芯片系统包括处理器和存储器,所述处理器、所述存储器之间电耦合;所述存储器,用于存储计算机程序指令;所述处理器,用于执行所述存储器中的部分或者全部计算机程序指令,当所述部分或者全部计算机程序指令被执行时,用于实现上述第一方面及第一方面任一可能的实现的方法中接入设备的功能,或实现上述第二方面及第二方面任一可能的实现中终端的功能。
在一种可能的设计中,所述芯片系统还可以包括收发器,所述收发器,用于发送所述处理器处理后的信号,或者接收输入给所述处理器的信号。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
第六方面,提供了一种计算机存储介质,用于存储计算机程序,所述计算机程序包括用于实现第一方面及第一方面任一可能的实现中的功能的指令,或用于实现第二方面及第二方面任一可能的实现中的功能的指令。
第七方面,提供了一种通信系统,所述通信系统包括上述第一方面及第一方面任一可能的实现的方法中的接入设备和上述第二方面及第二方面任一可能的实现的方法中的终端。
上述第三方面至第七方面的技术效果可以参照第一方面至第二方面中的描述,重复之 处不再赘述。
附图说明
图1为本申请实施例中提供的一种通信系统架构示意图;
图2为本申请实施例中提供的一种通信过程示意图;
图3为本申请实施例中提供的一种通信过程示意图;
图4为本申请实施例中提供的一种划分簇的示意图;
图5a为本申请实施例中提供的一种分配时频资源的示意图;
图5b为本申请实施例中提供的一种分组过程示意图;
图5c为本申请实施例中提供的一种通信过程示意图;
图6为本申请实施例中提供的一种通信装置结构示意图;
图7为本申请实施例中提供的一种通信装置结构示意图;
图8为本申请实施例中提供的一种通信装置结构示意图。
具体实施方式
下面将结合附图,对本申请实施例进行详细描述。
为便于理解本申请实施例的技术方案,下面将对本申请实施例提供的通信的方法的系统架构进行简要说明。可理解的,本申请实施例描述的系统架构是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定。
本申请实施例的技术方案可以应用于各种通信系统,例如:无线局域网(wireless local area network,WLAN)通信系统,长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统、第五代(5th generation,5G)系统或新无线(new radio,NR),以及未来通信系统等。
为便于理解本申请实施例,接下来对本请的应用场景进行介绍,本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
随着物联网等技术的发展,在家庭、工业、公共场所等各应用场景中,终端逐渐呈现大数量、密集化、多形态等特征。例如,一种工业自动化场景中,一个厂房中存在很多监控设备(camera)、生产机器(machine)和传感器(sensor),也可能同时存在工作人员使用的手机和穿戴式设备等终端。运营商受各种条件限制,铺设的接入设备的数量有限,存在一个接入设备覆盖海量终端的情况。
海量终端发起随机接入或进行数据传输时,接入设备识别终端身份的方式是:给每个终端预先配置一个序列,例如前导码preamble。终端因业务需求被激活时,可以在特定的资源上发送预先配置的序列,接入设备通过序列识别终端的身份。理论上,接入设备利用同一块资源要识别的终端越多,则为终端配置的序列的长度需要越长。
由于接入设备在终端被激活前无法感知活跃终端的数量,为保障终端身份识别的准确 性,接入设备通常给终端配置足够长度的序列,则也需要预留足够多的资源来发送、接收该序列。这样,占用网络的资源较多,使得通信系统的资源开销较大,并且发送较长的序列使得终端功耗较大。
为了解决该问题,如图1所示的通信系统,包括接入设备和终端,可以将多个终端分成若干个簇。在无线通信系统中,接入设备和终端间可以利用空口资源进行无线通信。空口资源可以包括时域资源、频域资源、码域资源和空域资源中一个或多个。
一个簇内的终端可以在同一资源上发送用于终端身份识别的序列,不同的簇占用不同的资源。这样,由于分簇后使用一个资源的终端数量减少,相应的,用于终端身份识别的序列的长度也可以相应的缩短。
虽然对终端分簇后,可以减小一部分资源开销和终端功耗,但不可避免的,接入设备仍然不感知一个簇内的活跃终端的数量,还是会存在给终端配置较长的用于终端身份识别的序列,而导致占用网络的资源较多,使得通信系统的资源开销较大,且终端功耗较大的问题。
基于此,本申请提出了一种发送两次序列的通信方法,第一序列用于确定活跃终端的数量,第二序列用于识别活跃终端的身份。此处的第一序列与第二序列表示两个不同阶段发送的序列。第一序列对应第一个阶段,第二序列对应第二个阶段。在第一个阶段,一个簇内的不同终端均向接入设备发送第一序列,接入设备根据接收到的第一序列的数量,确定序列长度,并将序列长度发送给簇内的终端。第二个阶段,一个簇内的不同终端发送所述序列长度的第二序列,用于终端身份识别。这样,确定出的序列长度是符合终端身份识别的较优长度,则可以实现合理地利用资源,避免资源开销过大,也避免了终端发送较长的序列使得终端功耗较大的问题。
为便于理解本申请实施例,以下对本申请实施例的部分用语进行解释说明,以便于本领域技术人员理解。
1)、接入设备,具有能够为终端设备提供随机接入功能的设备或可设置于该设备的芯片,该设备包括但不限于:演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved NodeB,或home Node B,HNB)、基带单元(baseband unit,BBU),无线保真(wireless fidelity,WIFI)系统中的接入点(access point,AP)、无线中继节点、无线回传节点、传输点(transmission and reception point,TRP或者transmission point,TP)等,还可以为5G,如,NR,系统中的gNB,或,传输点(TRP或TP),5G系统中的基站的一个或一组(包括多个天线面板)天线面板,或者,还可以为构成gNB或传输点的网络节点,如基带单元(BBU),或,分布式单元(DU,distributed unit)等。
2)终端设备,又称之为用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal,MT)、终端等,是一种向用户提供语音和/或数据连通性的设备。例如,终端设备包括具有无线连接功能的手持式设备、车载设备等。目前,终端设备可以是:手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端(例如,传感器等)、无人驾驶(self-driving)中的无线终端、远程手术(remote medical surgery) 中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端,或智慧家庭(smart home)中的无线终端,或具有车与车(Vehicle-to-Vehicle,V2V)公共的无线终端等。
接下来将结合附图对方案进行详细介绍。附图中以虚线标识的特征或内容可理解为本申请实施例的可选操作或者可选结构。
图2提供了一种通信的过程示意图,以第一簇为例,进行说明,第一簇为任一簇。具体包括以下步骤:
步骤201:第一终端向接入设备发送第一序列;相应的,接入设备接收第一终端发送的第一序列。所述第一终端位于第一簇内,所述第一终端为第一簇内的任一终端。
可选的,所述第一簇内的其它终端也可以向接入设备发送第一序列,则接入设备接收第一簇内的其它终端发送的第一序列。
步骤202:所述接入设备根据接收到的所述第一序列的数量n,确定序列长度。此处的第一序列为第一簇内的终端所发送的序列。
所述第一序列的数量可以代表第一簇内的活跃终端的数量,所述第一序列可以用于确定序列长度。
步骤203:所述接入设备向所述第一终端发送序列长度,相应的,所述第一终端接收来自所述接入设备的序列长度。
可选的,接入设备还可以向第一簇内的其它终端发送序列长度。所述序列长度根据n确定,所述n为所述接入设备接收到的所述第一序列的数量,所述n为大于0的整数。
步骤204:所述第一终端向接入设备发送所述序列长度的第二序列,相应的,所述接入设备接收所述序列长度的第二序列,所述第二序列用于识别所述第一簇内发送所述第二序列的终端的身份。
步骤205:所述接入设备根据所述第二序列,识别发送所述第二序列的终端的身份,也就是识别第一终端的身份。
在该实施例中,接入设备接收到的第一序列的数量n可以代表第一簇内的活跃终端的数量,接入设备先感知第一簇内的活跃终端的数量n,并将根据活跃终端的数量n确定的序列长度,这样第一簇内的任一终端就可以发送对应序列长度的第二序列给接入设备,以便于识别终端的身份。由于序列长度是根据活跃终端的数量n确定的,所以该序列长度是符合终端身份识别的较优长度,进而可以实现在接收、发送用于识别终端身份的第二序列时,合理地利用网络的资源,避免通信系统的资源开销过大,也避免了终端发送较长的序列使得终端功耗较大。
以上以第一簇为例,介绍了终端与接入设备之间的通信过程。接下来再结合多个簇,例如第二簇,第三簇等,详细介绍一下终端与接入设备之间的通信过程。在该通信过程中,接入设备不但向终端发送序列长度,还可以向终端发送用于确定第一序列、第二序列的信息,以及用于发送第一序列和第二序列的资源的信息等,还介绍了划分簇的方式。具体参见图3所示的通信过程,包括以下步骤:
步骤31:接入设备对终端进行分簇。
具体的,接入设备可以对覆盖范围内的终端进行分簇。可选的,这些终端处于连接态,或者接入设备知道待分簇的各个终端的信息,例如身份信息和位置信息。
在一种示例中,接入设备根据终端与该接入设备之间的时延,对终端划分簇。位于一 个簇内的终端分别与接入设备的时延相同或相近,这样,一个簇内各终端向接入设备发送第一序列的时域符号基本对齐。如图4所示,9个UE分成3个簇,其中UE-1、UE-2、UE-3位于第一簇内,UE-4、UE-5、UE-6位于第二簇内,UE-7、UE-8、UE-9位于第三簇内。一个簇内的终端分别与接入设备的距离相同或相近。任一簇i(i=1,2,3)中的多个终端,若同时向接入设备发送相同的波形,可以认为接入设备在接收时域上是近似重合的。
以第一簇为例,例如,第一簇内的终端分别与所述接入设备的时延,之间的差值小于或等于设定阈值。如图4所示,UE-1与接入设备的时延为t1,UE-2与接入设备的时延为t2,UE-3与接入设备的时延为t3。t1、t2和t3之间相同或相近。例如,t1与t2的差值,t1与t3的差值,以及t2与t3的差值,这三个差值均小于或等于设定阈值。该设定阈值接近0,可以是微秒级别的、非常小的时长。
再例如,第一终端与接入设备的时延,与时延平均值的差值绝对值小于或等于设定阈值,第二终端与接入设备的时延,与时延平均值的差值绝对值小于或等于设定阈值,第一终端与第二终端位于第一簇内,所述时延平均值为所述第一簇内的终端分别与所述接入设备的时延的平均值。例如,t1与t2与t3的平均值为T,t1与T的差值,t2与T的差值,t3与T的差值,这三个差值均小于或等于设定阈值。该设定阈值接近0,可以是毫秒级别的、非常小的时长。
步骤32:接入设备向同一簇内的终端分配相同的第一序列,向不同簇内的终端分配不同的第一序列。
参见表1所示,介绍了接入设备给各个簇内的各个终端分配第一序列,以及发送第一序列的第一资源。前面介绍过,第一序列对应第一阶段,第二序列对应第二阶段。同理,第一资源为第一阶段分配的资源,第一资源用于发送第一序列,第二资源为第二阶段分配的资源,第二资源用于发送第二序列(分配第二资源的详细内容后续介绍)。在一实施例中,第一阶段分配的第一资源也可以称为第一级物理随机接入信道时机(physical random access channel occasion,RO),第二阶段分配的第二资源也可以称为第二级RO。
表1:接入设备给各终端分配第一序列及第一资源
终端 第一序列 第一资源
第一簇内的终端 Preamble-1 时频资源11
第二簇内的终端 Preamble-2 时频资源11或12
第三簇内的终端 Preamble-3 时频资源11或13
接入设备向同一簇内的不同终端分配的第一序列相同,向不同簇内的终端分配的第一序列可以不同。如表1所示,分为三个簇,分别为第一簇,第二簇,第三簇。为第一簇内的终端分配的第一序列均为preamble-1;为第二簇内的不同终端分配的第一序列均为preamble-2,为第三簇内的不同终端分配的第一序列均为preamble-3。preamble-1、preamble-2、preamble-3各不相同。在另外的实施例中,接入设备向不同簇内的终端分配的第一序列也可以相同,但是,不同簇内的终端用于发送第一序列的资源不同。在又一实施例中,接入设备向不同簇内的终端分配不同的序列组,不同的序列组之间没有相同的序列,簇内的终端在其分配的序列组内确定使用的序列。
接入设备在向同一簇内的终端分配相同的第一序列时,示例的,接入设备可以向所述第一簇内的终端发送第三配置信息,相应的,所述终端接收来自接入设备的第三配置信息,所述第三配置信息包括所述第一序列或生成所述第一序列的参数。接入设备可以向第一簇 内的所有终端配置相同的第一序列,或者配置相同的生成所述第一序列的参数,以便于第一簇内的所有终端向接入设备发送相同的第一序列。接入设备向第二簇和第三簇分配第一序列的方式,与向第一簇分配第一序列的方式相同,不再重复赘述。
此外,接入设备向同一簇内的不同终端分配的第一资源相同或不同,向不同簇内的终端分配的第一资源可以相同,也可以不同。如表1所示,接入设备分配给第一簇内的终端的第一资源为时频资源11,第一簇内的终端均可以在时频资源11上发送第一序列Preamble-1。接入设备分配给第二簇内的终端的第一资源也可以为时频资源11,第二簇内的终端均可以在时频资源11上发送第一序列Preamble-2。接入设备分配给第二簇内的终端的第一资源也可以为时频资源12,第二簇内的终端均可以在时频资源12上发送第一序列Preamble-2。接入设备分配给第三簇内的终端的第一资源可以为时频资源11、或时频资源13,第三簇内的终端均可以在时频资源11或时频资源13上发送第一序列Preamble-3。时频资源11、时频资源12和时频资源13各不相同。
接入设备在向同一簇内的终端分配相同的第一资源时,示例的,接入设备还可以向所述第一簇内的终端发送第一配置信息,相应的,所述终端接收来自接入设备的第一配置信息,第一配置信息包括第一资源的信息,所述第一资源用于所述第一簇内的所有终端发送所述第一序列。此处的第一资源可以是时域资源、频域资源、空域资源和码域资源中的一种或多种。接入设备向第二簇和第三簇分配第一资源的方式,与向第一簇分配第一资源的方式相同,不再重复赘述。
接入设备在向终端发送第三配置信息,来为终端配置第一序列时,可以包括但不限于采用以下方式中的任一种方式:
方式1:接入设备以广播的方式发送。各终端可以根据自身所在的簇,以及簇中的身份或标识或顺序,确定自身使用哪个第一序列或者使用哪个生成所述第一序列的参数。结合表1所示,例如当终端确定自身位于第一簇内时,可以确定自身使用preamble-1,当终端确定自身位于第二簇内时,可以确定自身使用preamble-2。
方式2:接入设备以组播的方式发送。例如,每个簇有一个簇级别的组播资源,组播资源可以包括簇内所有终端共用的控制资源集合(control resource set,CORESET)和搜索空间Search Space资源、共用的无线网络临时标识(radio network tempory identity,RNTI)等,接入设备可以在各簇的组播资源中组播该簇所用的第一序列或所用的生成所述第一序列的参数。
方式3:接入设备以单播的方式发送。也就是接入设备给每个终端单独发送该终端使用的第一序列或所使用的生成所述第一序列的参数。
同理,接入设备在向终端发送第一配置信息,来为终端配置第一资源时,也可以与第三配置信息类似,通过广播、组播或单播的方式配置,重复之处不再赘述。第一配置信息和第三配置信息可以被携带在发送给终端的同一条消息中,也可以在不同的消息中。
步骤33:同一簇内的终端向接入设备发送相同的第一序列,不同簇内的终端向接入设备发送不同的第一序列。
结合表1所示,第一簇内的不同终端发送的第一序列均为preamble-1;第二簇内的不同终端发送的第一序列均为preamble-2,第三簇内的不同终端发送的第一序列均为preamble-3。这样可以便于接入设备快速准确地确定出一个簇内的活跃终端的数量。
第一簇内的终端发送的第一序列可以是接入设备向第一簇发送的第三配置信息中所 包括第一序列,或者根据第三配置信息所包括的生成所述第一序列的参数生成的第一序列。第二簇和第三簇内的终端确定第一序列的方式与第一簇内的终端确定第一序列的方式相同,不再重复赘述。
同一簇内的终端在相同的第一资源上发送第一序列,不同簇内的终端在相同或不同的第一资源上发送第一序列。结合表1所示,第一簇内的终端均可以在时频资源11上发送第一序列Preamble-1。第二簇内的终端均可以在时频资源12上发送第一序列Preamble-2。第三簇内的终端均可以在时频资源13上发送第一序列Preamble-3。或者,第一簇内的终端、第二簇内的终端、第三簇内的终端均可以在时频资源11上发送各自对应的第一序列Preamble-1、Preamble-2、Preamble-3。
步骤34:接入设备确定接收到的每个簇内的终端所发送的第一序列的数量,也就是确定该簇内的活跃终端的数量。
具体的,同一簇内的终端发送的第一序列相同,不同簇内的终端发送的第一序列不同。接入设备根据接收到的第一序列,确定发送该序列的终端是属于哪个簇,进而根据接收到的第一序列的数量,确定各个簇内的活跃终端的数量。例如,接入设备确定接收到来自第一簇内的终端所发送的第一序列的数量,从而确定第一簇内的活跃终端的数量。接入设备确定接收到的来自第二簇内的终端所发送的第一序列的数量,从而确定第二簇内的活跃终端的数量。接入设备确定接收到的来自第三簇内的终端所发送的第一序列的数量,从而能确定第三簇内的活跃终端的数量。
接入设备在确定每个簇内的活跃终端的数量时,可以采用序列相关性检测的方式确定,也可以采用其他序列检测的方式确定,此处不做限定,以下以序列相关性检测的方式为例。
例如,接收信号
Figure PCTCN2020109865-appb-000001
其中P ix表示第i个簇中第x个终端的发送功率,可以为标量,s i为第i个簇中活跃终端发送的Preamble-i,为一个列向量;h 1x为第i个簇中第x个终端与接入设备间的信道,可以假设通过信道估计已知,若该序列为频域序列,则s ih ix可以理解为是向量的点乘,即向量中各元素的对应相乘,得到一个与s i维度相同的列向量。则相关性检测计算公式为(以s 1检测为例):
Figure PCTCN2020109865-appb-000002
上式中,最后一个约等号成立的条件是s i Hs 1≈0,(i不等于1时),且s 1 Hs 1=1。根据现有的序列设计规则,可以设计出若干个自相关为1、互相关为0的序列满足上述条件,例如现有3GPP协议中的Preamble序列或DMRS序列,在此不赘述。根据上式可知,若第一簇中各终端的信道h 1x已知且发射功率P 1x已知,或第一簇中各终端的P 1xh 1x已知(例如基站通过对各终端的信道估计,指示各终端调整发送功率,使各终端发送的preamble到达基站时功率大致相等),则可以根据相关检测值R1得到发送Preamble-1的终端的数量。同 样地,可以得到发送Preamble-2、Preamble-3的终端的数量。
步骤35:接入设备根据接收到的每个簇内的终端所发送的第一序列的数量,确定该簇对应的第二序列的序列长度,并将序列长度发送给对应簇的终端。
具体的,接入设备根据接收到的来自第一簇内的终端所发送的第一序列的数量,确定第一簇对应的序列长度。接入设备根据接收到的来自第二簇内的终端所发送的第二序列的数量,确定第二簇对应的序列长度。接入设备根据接收到的来自第三簇内的终端所发送的第三序列的数量,确定第三簇对应的序列长度。根据这种方式确定出来的不同簇的序列长度,可能相同,也可能不同。
接入设备可以采用广播或组播或单播的方式,向各个簇内的各个终端发送对应的第二序列的序列长度。此处的广播或组播或单播,与上面介绍的接入设备向终端发送第三配置信息的方式相同,重复之处不再赘述。
接入设备还可以向同一簇内的终端分配不同的第二序列。示例的,接入设备先确定用于生成第二序列的信息,然后将该信息分配给对应的终端,进而使终端采用对应的信息生成第二序列。接入设备还可以确定第二序列所占用的第二资源,并将第二资源发送给对应的终端,以便终端在对应的第二资源上发送第二序列。以下结合表2具体介绍。
表2:接入设备给各终端分配第二序列及第二资源
终端 用于确定第二序列的信息 第二资源
第一簇内的终端 f11(n),f12(n),……,f1x(n) 时频资源21
第二簇内的终端 f21(n),f22(n),……,f2y(n) 时频资源22或21
第三簇内的终端 f31(n),f32(n),……,f3g(n) 时频资源23或21
如表2所示,第一簇内有x个终端,接入设备分配给第一个终端的用于确定第二序列的信息为f11(n),分配给第二个终端的用于确定第二序列的信息为f12(n),分配给第x个终端的用于确定第二序列的信息为f1x(n)。第二簇内有y个终端,接入设备分配给第一个终端的用于确定第二序列的信息为f21(n),分配给第二个终端的用于确定第二序列的信息为f22(n),分配给第y个终端的用于确定第二序列的信息为f2y(n)。第三簇类似,不再重复。
接入设备可以确定每个终端所使用的生成第二序列的信息,并将该信息发送给对应的终端。具体的,接入设备在向同一簇内的不同终端分配不同的确定第二序列的信息时,示例的,接入设备可以向第一终端发送第四配置信息,相应的,所述第一终端接收来自接入设备的第四配置信息,所述第四配置信息包括第一信息,所述第一信息用于所述第一终端确定所述第一终端发送的第二序列,所述第一终端位于所述第一簇内。此处的第一终端例如可以是上面描述的第一簇内的第一个终端,在第一信息可以是上面描述的f11(n)。
进一步地,所述接入设备还可以向第二终端发送第五配置信息,相应的,所述第二终端接收来自所述接入设备的第五配置信息,所述第五配置信息包括第二信息,所述第二信息用于所述第二终端确定所述第二终端发送的第二序列,所述第二终端位于所述第一簇内。此处的第二终端例如可以是上面描述的第一簇内的第二个终端,在第二信息可以是上面描述的f12(n)。
第一信息(例如f11(n))与第二信息(例如f12(n))可以不同,则接入设备向第一簇内的不同终端发送不同的用于确定第二序列的信息,以便于第一簇内的不同终端生成不同的第二序列。这些用于生成第二序列的信息f11(n)、f12(n)例如可以是运算关系式,例如 a*x+b*y,或者系数值a或b,或者是指示运算关系式的索引,或者系数值的索引、或者系数值组合的索引等等。第二信息与第一信息也可以相同,第一终端结合第一信息和第一参数生成的第二序列,与第二终端结合第二信息和第二参数生成的第二序列可以不同,第一参数与第二参数可以是协议预先规定好的,无需接入设备发送,例如可以是终端的标识,不同的终端标识代入同一运算关系式中,得出的结果也可能不同,也就是不同的终端得出的第二序列不同。
此外,接入设备还可以确定发送第二序列的第二资源,并将该第二资源发送给终端,以便终端在对应的第二资源上发送第二序列。该第二序列的第二资源可以是根据发送给该簇的终端的序列长度确定的。
例如,接入设备可以根据序列长度,确定第二资源对应的资源元素(resource element,RE)的数量,或者第二资源中的时域符号的数量,或者第二资源上的子载波的数量。进而,再根据确定出的数量,为该簇选择对应的第二资源。
需要说明的是,本申请允许一定的终端数量测量误差,例如活跃终端的数量的测量有可能不精确,从而导致确定序列长度不准确,从而导致资源分配不是最优的。本申请可以设置一定的冗余,例如,接入设备发送给终端的序列长度比接入设备计算出的所需序列长度更长一点,相应的,分配给终端的发送第二序列的第二资源也会更多一点。但是这样仍然可以减少资源浪费,并不影响本申请的有益效果。
接入设备向同一簇内的不同终端分配的第二资源相同,向不同簇内的终端分配的第二资源可以相同也可以不同。如表2所示,接入设备分配给第一簇内的终端的第二资源为时频资源21,第二簇内的终端均可以在时频资源21上发送第二序列。接入设备分配给第二簇内的终端的第二资源也可以为时频资源21,第二簇内的终端均可以在时频资源21上发送第二序列。接入设备分配给第二簇内的终端的第二资源也可以为时频资源22,第二簇内的终端均可以在时频资源22上发送第二序列。接入设备分配给第三簇内的终端的第二资源可以为时频资源21、或时频资源23,第三簇内的终端均可以在时频资源21或时频资源23上发送第第二序列。时频资源21、时频资源22和时频资源23各不相同。
接入设备在向同一簇内的终端分配相同的第二资源时,示例的,接入设备可以向所述第一簇内的终端发送第二配置信息,相应的,所述终端接收来自接入设备的第二配置信息,第二配置信息包括第二资源的信息,所述第二资源用于所述第一簇内的所有终端发送所述第二序列。此处的第二资源可以是时域资源、频域资源、空域资源和码域资源中的一种或多种。接入设备向第二簇和第三簇分配第二资源的方式,与向第一簇分配第二资源的方式相同,不再重复赘述。接入设备可以采用广播或组播或单播的方式,向各个簇内的各个终端发送第二配置信息。此处的广播或组播或单播,与上面介绍的接入设备向终端发送第三配置信息的方式相同,重复之处不再赘述。
如图5a所示,提供了两种接入设备为不同簇分配不同的第二资源的方式。
在一种方式中,不同簇的第二资源占用相同的频域资源(子载波)数量,第二序列的长度根据簇内的活跃终端的数量确定,则接入设备为不同簇确定的第二序列的序列长度可能不同。例如,第一簇的第二序列的序列长度大于第三簇的第二序列的序列长度,第三簇的第二序列的序列长度大于第二簇的第二序列的序列长度。则不同簇的终端发送各自的第二序列时,占用的时域资源数量就会不同。即当三个簇占用相同数量的频域资源时,则在时域上,第一簇占用的时域资源的数量,大于第三簇占用的时域资源的数量,大于第二簇 占用的时域资源的数量。
在另一种方式中,不同簇的第二资源占据相同的时域资源(时域符号)数量,接入设备为不同簇分配相同的时域资源数量,分配不同的频域资源(子载波)数量。即当着三个簇占用相同数量的时域资源时,在频域上,第一簇占用的频域资源的数量,大于第三簇占用的频域资源的数量,大于第二簇占用的频域资源的数量。
以上图5a仅是提供了一种分配第二资源的示例,在实际应用中,不同簇的第二资源占用的频域资源数量可以不同,占用的时域资源数量也可以不同。则接入设备为不同簇分配不同的时域资源数量,分配不同的时域资源数量。
在本申请的另一种示例中,接入设备也可以为同一簇内的不同终端配置不同的第二资源的信息,也就是同一簇内的不同终端在不同的资源上发送第二序列,这样接入设备也可以通过接收第二序列的资源,识别第一簇内的发送所述第二序列的终端的身份。在这种情况下,一个簇内的不同的终端发送的第二序列可以相同,也可以不同。不同簇内的终端发送的第二序列一般不同。
在本申请的另一种示例中,接入设备也可以为同一簇内的不同终端配置相同的第二序列,为同一簇内的不同终端配置不同的第二资源,这样一个簇内的不同终端发送的第二序列可以相同,一个簇内的不同终端可以在不同的第二资源上发送第二序列,这样接入设备可以通过接收第二序列的第二资源,识别簇内的发送第二序列的终端的身份。
步骤36:终端根据接入设备发送的用于生成第二序列的信息,生成第二序列,且生成的第二序列符合接入设备发送的序列长度,并在对应的第二资源上发送第二序列。
一个簇内的不同终端发送的第二序列不同,不同簇内的不同终端发送的第二序列也各不相同。结合表2所示,第一簇内的第1个终端发送的第二序列根据f11(n)确定,第一簇内的第2个终端发送的第二序列根据f12(n)确定,第一簇内的第x个终端发送的第二序列根据f1x(n)确定。第二簇内的第1个终端发送的第二序列根据f21(n)确定,第二簇内的第2个终端发送的第二序列根据f22(n)确定,第二簇内的第x个终端发送的第二序列根据f2x(n)确定。第一簇内的终端生成的第二序列符合第一簇对应的序列长度,第二簇内的终端生成的第二序列符合第二簇对应的序列长度。
同一簇内的终端在相同的第二资源上发送第二序列,不同簇内的终端在相同或不同的第二资源上发送第二序列。结合表2所示,第一簇内的终端均可以在时频资源21上发送第二序列。第二簇内的终端均可以在时频资源22上发送第二序列,第三簇内的终端均可以在时频资源23上发送第二序列。或者,第一簇内的终端、第二簇内的终端、第三簇内的终端均可以在时频资源11上发送各自对应的第二序列。
步骤37:接入设备根据第二序列,识别发送该第二序列的终端的身份。
由于各终端确定出的第二序列不同,且接入设备知道各个第二序列对应的终端身份,因此接入设备可以通过序列检测区分出各个终端。接入设备是如何知道各个第二序列对应的终端身份的过程不是本申请关注的。
可选地,接入设备在识别出终端的身份后,还可以给各个终端分配上行数据的发送资源,具体可以通过广播或组播或单播的方式将分配的上行资源发送给对应的终端。该上行数据的发送资源也可以是在识别出终端的身份之前发送的,例如在向终端发送第二资源时,也发送上行数据的发送资源。该上行数据的发送资源可以是物理上行共享信道(physical  uplink shared channel,PUSCH)。
可选地,各个簇的第二资源与PUSCH可以存在关联关系,例如PUSCH与第二资源的时域资源相同,或频域资源相同等。
若有多个终端,可以复用同一个PUSCH向接入设备发送上行数据,多个终端复用相同PUSCH资源的方式可以是,各终端可以使用不同的码本,和/或不同的扩频码。由于接入设备已识别出活跃的终端的身份,且接入设备预先知晓该终端使用的码本或扩频码,因而接入设备可以根据该活跃用户的码本或扩频码,解调出PUSCH上的活跃的终端所发送的上行数据。
可选地,上述实施例中的“终端”,也可以理解为一个终端组中的组头终端。例如,一个终端组中的一个或多个终端活跃时,告知本组的一个组头终端,该组头终端可以代表全组的部分或全部终端,向接入设备发送第一序列和第二序列。终端之间可以通过D2D的方式通信。
以下结合如图5b,先介绍确定终端组的过程。
当有新的终端希望加入到网络时,该终端可以通过随机接入进入连接态,并向接入设备发送注册信息。例如图5b所示,UE1、UE2、UE3为待加入网络的终端,这些终端通过随机接入进入连接态,并向接入设备发送注册消息(registration message),相应的,接入设备接收这些终端发送的注册消息。
接入设备收到注册消息后,向各个终端返回注册响应消息(registration response message)。注册响应消息中可包括已注册的其他终端的信息,和/或与已注册的其他终端之间进行sidelink传输的资源。此外,可选的,注册响应信息中还可以指定该终端作为终端组的组头终端。例如接入设备指定UE1作为组头终端,则发送UE1的注册响应消息中可以包括指示信息,来指示UE1作为组头终端。
随后进行终端组的构建流程,如图5b所示,组头终端向周围的终端广播信息gk(announce the exist of gk by GM),例如,组头终端使用sidelink广播资源向周围的终端广播信息gk,例如gk可以包括一个序列。例如,UE1向UE2、UE3广播信息gk。周围的终端收到一个或多个组头终端发送的gk后,向所述一个或多个终端反馈对gk的测量信息,即反馈该终端与组头终端之间的信道信息。
组头终端接收到周围的一个或多个终端的测量信息后,根据一个预设的特定的规则,例如终端组内最小能耗原则对这些终端(反馈了gk测量信息的终端)进行分组(opt-EC based GH reselection),例如根据K-means等算法进行分组。
组头终端在分组后,记录或更新本组的终端信息(update GH),向该组内的终端以及其他组头广播本组的终端信息,此处的终端信息例如可以是终端的标识。例如UE1向UE2和UE3广播本组的终端信息。
若通过上述过程,仍有部分终端未成功入组,则可以等下一次组头终端更新时,重复上述流程,向组头终端反馈测量信息,来申请加入终端组。
新的终端组形成后,组头终端或组内其他终端可以向接入设备反馈分组信息,例如反馈组头终端的ID以及组头终端与接入设备间的信道状态信息(channel state information,CSI)。例如UE1向接入设备反馈组头终端的ID、信道状态信息。
可选地,接入设备可以周期性或非周期性地更新终端组,例如广播更新终端组指令, 则新的组头终端和其他终端重复上述终端组的构建流程。
接下来结合图5c,介绍组头终端发送第一序列和第二序列的过程。与上面图2和图3中描述的终端发送第一序列和第二序列的过程相同,仅是把终端替换为组头终端。
终端组形成或更新后,接入设备可以将组头终端分配到一个簇中,具体的分簇方法可以参见上面图3中的介绍,此处不再重复。
接入设备还可以向组头终端分配第一序列,发送第一序列的第一资源,用于确定第二序列的信息。详细过程也可以参见上面图3中的介绍,此处不再重复。
各个终端组形成后,组头终端通过接入设备的配置,可以确定自身处于哪个簇中,并且可以获得第一序列及第一资源,以及获得用于确定第二序列的信息。
所有活跃的组头终端在第一资源上发送第一序列,接入设备估计每个簇的活跃的组头终端的数量,确定各簇所使用的第二序列的序列长度,将序列长度及第二资源通过广播或组播等方式发送给各活跃的组头终端。还可以确定第二资源,将第二资源发送给各活跃组头终端。其中通过第二资源的配置,可以指示出各簇的优先级,例如将优先级高的簇的第二资源配置的时间资源早于优先级低的簇的第二资源。
各活跃的组头终端在指定的第二资源上,发送第二序列。接入设备可以通过AMP等算法解出第二序列,从而获得活跃的组头终端的身份信息。
可选地,在获得了活跃的组头终端的身份信息后,还可以向该组头终端分配其发送上行数据的上行资源。各活跃组头终端在分配的上行资源上发送上行数据。
或者,各终端组头在发送第二序列时,可选地,在对应的PUSCH上发送上行数据。
前文介绍了本申请实施例的通信方法,下文中将介绍本申请实施例中的通信装置。方法、装置是基于同一技术构思的,由于方法、装置解决问题的原理相似,因此装置与方法的实施可以相互参见,重复之处不再赘述。
基于与上述通信方法的同一技术构思,如图6所示,提供了一种通信装置600,装置600能够执行上述图2和图3的方法中由接入设备执行的各个步骤。装置600可以为接入设备,也可以为应用于接入设备中的芯片。装置600可以包括:接收模块620a,发送模块620b,处理模块610,可选的,还包括存储模块630;处理模块610可以分别与存储模块630、接收模块620a和发送模块620b相连,所述存储模块630也可以与接收模块620a和发送模块620b相连。
在一种示例中,所述接收模块620a,用于接收第一簇内的终端发送的第一序列;所述发送模块620b,用于向所述第一簇内的终端发送序列长度,所述序列长度根据n确定,所述n为所述装置接收到的所述第一序列的数量,所述n为大于0的整数;所述接收模块620a,用于接收所述序列长度的第二序列,所述第二序列用于识别所述第一簇内发送所述第二序列的终端的身份。
在一种示例中,所述发送模块620b,还用于向所述第一簇内的终端发送第一配置信息,第一配置信息包括第一资源的信息,所述第一资源用于所述第一簇内的所有终端发送所述第一序列。
在一种示例中,所述发送模块620b,还用于向所述第一簇内的终端发送第二配置信息,第二配置信息包括第二资源的信息,所述第二资源用于所述第一簇内的所有终端发送所述第二序列。
在一种示例中,所述发送模块620b,还用于向所述第一簇内的终端发送第三配置信息,所述第三配置信息包括所述第一序列或生成所述第一序列的参数。
在一种示例中,所述发送模块620b,还用于向第一终端发送第四配置信息,所述第四配置信息包括第一信息,所述第一信息用于所述第一终端确定所述第一终端发送的第二序列,所述第一终端位于所述第一簇内。
在一种示例中,所述发送模块620b,还用于向第二终端发送第五配置信息,所述第五配置信息包括第二信息,所述第二信息用于所述第二终端确定所述第二终端发送的第二序列,所述第二终端位于所述第一簇内。
在一种示例中,所述处理模块610,用于根据第一终端与所述装置的时延,确定所述第一终端位于第一簇内。
在一种示例中,所述处理模块610,用于根据第二序列识别发送所述第二序列的终端的身份。
在一种示例中,所述存储模块630,可以存储接入设备侧的方法的计算机执行指令,以使处理模块610、发送模块620b和接收模块620a执行上述示例中的方法。
在一种示例中,所述发送模块620b和接收模块620a也可以集成在一起,称为收发模块。
基于与上述通信方法的同一技术构思,如图7所示,提供了一种通信装置700,装置700能够执行上述图2和图3的方法中由终端执行的各个步骤。装置700可以为终端,也可以为应用于终端中的芯片。装置700可以包括:接收模块720a、发送模块720b,处理模块710,可选的,还包括存储模块730;处理模块710可以分别与存储模块730、接收模块720a和发送模块720b相连,所述存储模块730也可以与接收模块720a和发送模块720b相连。
在一种示例中,所述发送模块720b,用于向接入设备发送第一序列;所述接收模块720a,用于接收来自所述接入设备的序列长度;所述发送模块720b还用于向接入设备发送所述序列长度的第二序列,所述第二序列用于识别所述装置的身份。
在一种示例中,所述处理模块710,用于确定所述序列长度的第二序列。
在一种示例中,所述接收模块720a,还用于接收来自所述接入设备的第一配置信息,所述第一配置信息包括第一资源的信息,所述第一资源用于所述装置发送所述第一序列。
在一种示例中,所述接收模块720a,还用于接收来自所述接入设备的第二配置信息,所述第二配置信息包括第二资源的信息,所述第二资源用于所述装置发送所述第二序列。
在一种示例中,所述接收模块720a,还用于接收来自所述接入设备的第三配置信息,所述第三配置信息包括所述第一序列或生成所述第一序列的参数。
在一种示例中,所述接收模块720a,还用于接收来自所述接入设备的第四配置信息,所述第四配置信息包括第一信息,所述第一信息用于确定所述第二序列。
在一种示例中,所述存储模块730,可以存储接入设备侧的方法的计算机执行指令,以使处理模块710和发送模块720b和接收模块720a执行上述示例中的方法。
在一种示例中,所述发送模块720b和接收模块720a也可以集成在一起,称为收发模块。
存储模块可以包括一个或者多个存储器,存储器可以是一个或者多个设备、电路中用 于存储程序或者数据的器件。存储模块可以是寄存器、缓存或者RAM等,存储模块可以和处理模块集成在一起。存储模块可以是ROM或者可存储静态信息和指令的其他类型的静态存储设备,存储模块可以与处理模块相独立。
所述发送模块、接收模块、或者所述收发模块可以是输入或者输出接口、管脚或者电路等。
另外,如图8所示的本申请提供了另一种通信的装置。应理解,所述装置能够执行上述图2-图3的方法中由接入设备、终端执行的各个步骤。装置800包括:处理器810和收发器820,可选的,还包括存储器830。该收发器,可以用于接收程序指令并传输至所述处理器,或者,该收发器可以用于该装置与其他通信设备进行通信交互,比如交互控制信令和/或业务数据等。该收发器可以为代码和/或数据读写收发器,或者,该收发器可以为通信处理器与收发机之间的信号传输收发器。所述处理器810和所述存储器830之间电耦合。
示例的,存储器830,用于存储计算机程序;所述处理器810,可以用于调用所述存储器中存储的计算机程序或指令,执行上述的通信的方法,或者通过所述收发器820执行上述的通信的方法。
图6中的处理模块610、图7中的处理模块710可以通过处理器810来实现。
图6中的发送模块620b和接收模块620a、图7中的发送模块720b和接收模块720a可以通过收发器820来实现。或者收发器820中可以包括单独的发送器,和/或,单独的接收器。图6中的发送模块620b、图7中的发送模块720b可以通过发送器来实现。图6中的接收模块620a、图7中的接收模块720a可以通过接收器来实现。
图6中的存储模块630、图7中的存储模块730可以通过存储器830来实现。
上述的处理器可以是中央处理器(central processing unit,CPU),网络处理器(network processor,NP)或者CPU和NP的组合。处理器还可以进一步包括硬件芯片或其他通用处理器。上述硬件芯片可以是专用集成电路(application-specific integrated circuit,ASIC),可编程逻辑器件(programmable logic device,PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(complex programmable logic device,CPLD),现场可编程逻辑门阵列(field-programmable gate array,FPGA),通用阵列逻辑(generic array logic,GAL)及其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等或其任意组合。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
还应理解,本申请实施例中提及的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM, SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本申请描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请实施例所述的收发装置、接口电路、或者收发器中可以包括单独的发送器,和/或,单独的接收器,也可以是发送器和接收器集成一体。收发装置、接口电路、或者收发器可以在相应的处理器的指示下工作。可选的,发送器可以对应物理设备中发射机,接收器可以对应物理设备中的接收机。
本申请实施例还提供了一种计算机存储介质,存储有计算机程序,该计算机程序被计算机执行时,可以使得所述计算机用于执行上述通信的方法。
本申请实施例还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机可以执行上述提供的通信的方法。
本申请实施例还提供了一种通信的系统,所述通信系统包括:执行上述通信的方法的接入设备和终端。
本申请中的“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。本申请中所涉及的多个,是指两个或两个以上。另外,需要理解的是,在本申请的描述中,“第一”、“第二”等词汇,仅用于区分描述的目的,而不能理解为指示或暗示相对重要性,也不能理解为指示或暗示顺序。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包括有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
尽管已描述了本申请的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本申请范围的所有变更和修改。
显然,本领域的技术人员可以对本申请实施例进行各种改动和变型而不脱离本申请实施例的精神和范围。这样,倘若本申请实施例的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包括这些改动和变型在内。

Claims (35)

  1. 一种通信的方法,其特征在于,所述方法包括:
    接入设备接收第一簇内的终端发送的第一序列;
    所述接入设备向所述第一簇内的终端发送序列长度,所述序列长度根据n确定,所述n为所述接入设备接收到的所述第一序列的数量,所述n为大于0的整数;
    所述接入设备接收所述序列长度的第二序列,所述第二序列用于识别所述第一簇内发送所述第二序列的终端的身份。
  2. 如权利要求1所述的方法,其特征在于,所述第一簇内的不同终端发送的第二序列不同。
  3. 如权利要求1或2所述的方法,其特征在于,还包括:
    所述接入设备向所述第一簇内的终端发送第一配置信息,第一配置信息包括第一资源的信息,所述第一资源用于所述第一簇内的所有终端发送所述第一序列。
  4. 如权利要求1-3任一项所述的方法,其特征在于,还包括:
    所述接入设备向所述第一簇内的终端发送第二配置信息,第二配置信息包括第二资源的信息,所述第二资源用于所述第一簇内的所有终端发送所述第二序列。
  5. 如权利要求1-4任一项所述的方法,其特征在于,还包括:
    所述接入设备向所述第一簇内的终端发送第三配置信息,所述第三配置信息包括所述第一序列或生成所述第一序列的参数。
  6. 如权利要求1-5任一项所述的方法,其特征在于,还包括:
    所述接入设备向第一终端发送第四配置信息,所述第四配置信息包括第一信息,所述第一信息用于所述第一终端确定所述第一终端发送的第二序列,所述第一终端位于所述第一簇内。
  7. 如权利要求1-6任一项所述的方法,其特征在于,还包括:
    所述接入设备向第二终端发送第五配置信息,所述第五配置信息包括第二信息,所述第二信息用于所述第二终端确定所述第二终端发送的第二序列,所述第二终端位于所述第一簇内。
  8. 如权利要求1-7任一项所述的方法,其特征在于,还包括:
    所述接入设备根据第一终端与所述接入设备的时延,确定所述第一终端位于第一簇内。
  9. 如权利要求8所述的方法,其特征在于,所述第一簇内的终端分别与所述接入设备的时延,之间的差值小于或等于设定阈值;或者,第一终端与接入设备的时延,与时延平均值的差值绝对值小于或等于设定阈值,第二终端与接入设备的时延,与时延平均值的差值绝对值小于或等于设定阈值,所述第一终端与所述第二终端位于第一簇内,所述时延平均值为所述第一簇内的终端分别与所述接入设备的时延的平均值。
  10. 一种通信的方法,其特征在于,所述方法包括:
    终端向接入设备发送第一序列;
    所述终端接收来自所述接入设备的序列长度;
    所述终端向接入设备发送所述序列长度的第二序列,所述第二序列用于识别所述终端的身份。
  11. 如权利要求10所述的方法,其特征在于,所述第一序列用于确定所述序列长度。
  12. 如权利要求10或11所述的方法,其特征在于,所述终端位于第一簇内,所述序列长度根据n确定,所述n为所述接入设备接收到的来自所述第一簇内的终端所发送的所述第一序列的数量,所述n为大于0的整数。
  13. 如权利要求10-12任一项所述的方法,其特征在于,还包括:
    所述终端接收来自所述接入设备的第一配置信息,所述第一配置信息包括第一资源的信息,所述第一资源用于所述终端发送所述第一序列。
  14. 如权利要求10-13任一项所述的方法,其特征在于,还包括:
    所述终端接收来自所述接入设备的第二配置信息,所述第二配置信息包括第二资源的信息,所述第二资源用于所述终端发送所述第二序列。
  15. 如权利要求10-14任一项所述的方法,其特征在于,还包括:
    所述终端接收来自所述接入设备的第三配置信息,所述第三配置信息包括所述第一序列或生成所述第一序列的参数。
  16. 如权利要求10-15任一项所述的方法,其特征在于,还包括:
    所述终端接收来自所述接入设备的第四配置信息,所述第四配置信息包括第一信息,所述第一信息用于确定所述第二序列。
  17. 一种通信的装置,其特征在于,所述装置包括:
    接收模块,用于接收第一簇内的终端发送的第一序列;
    发送模块,用于向所述第一簇内的终端发送序列长度,所述序列长度根据n确定,所述n为所述装置接收到的所述第一序列的数量,所述n为大于0的整数;
    所述接收模块,还用于接收所述序列长度的第二序列,所述第二序列用于识别所述第一簇内发送所述第二序列的终端的身份。
  18. 如权利要求17所述的装置,其特征在于,所述第一簇内的不同终端发送的第二序列不同。
  19. 如权利要求17或18所述的装置,其特征在于,所述发送模块,还用于向所述第一簇内的终端发送第一配置信息,第一配置信息包括第一资源的信息,所述第一资源用于所述第一簇内的所有终端发送所述第一序列。
  20. 如权利要求17-19任一项所述的装置,其特征在于,所述发送模块,还用于向所述第一簇内的终端发送第二配置信息,第二配置信息包括第二资源的信息,所述第二资源用于所述第一簇内的所有终端发送所述第二序列。
  21. 如权利要求17-20任一项所述的装置,其特征在于,所述发送模块,还用于向所述第一簇内的终端发送第三配置信息,所述第三配置信息包括所述第一序列或生成所述第一序列的参数。
  22. 如权利要求17-21任一项所述的装置,其特征在于,所述发送模块,还用于向第一终端发送第四配置信息,所述第四配置信息包括第一信息,所述第一信息用于所述第一终端确定所述第一终端发送的第二序列,所述第一终端位于所述第一簇内。
  23. 如权利要求17-22任一项所述的装置,其特征在于,所述发送模块,还用于向第二终端发送第五配置信息,所述第五配置信息包括第二信息,所述第二信息用于所述第二终端确定所述第二终端发送的第二序列,所述第二终端位于所述第一簇内。
  24. 如权利要求17-23任一项所述的装置,其特征在于,还包括:
    处理模块,用于根据第一终端与所述装置的时延,确定所述第一终端位于第一簇内。
  25. 如权利要求24所述的装置,其特征在于,所述第一簇内的终端分别与所述装置的时延,之间的差值小于或等于设定阈值;或者,第一终端与装置的时延,与时延平均值的差值绝对值小于或等于设定阈值,第二终端与装置的时延,与时延平均值的差值绝对值小于或等于设定阈值,所述第一终端与所述第二终端位于第一簇内,所述时延平均值为所述第一簇内的终端分别与所述装置的时延的平均值。
  26. 一种通信的装置,其特征在于,所述装置包括:
    发送模块,用于向接入设备发送第一序列;
    接收模块,用于接收来自所述接入设备的序列长度;
    所述发送模块,还用于向接入设备发送所述序列长度的第二序列,所述第二序列用于识别所述装置的身份。
  27. 如权利要求26所述的装置,其特征在于,所述第一序列用于确定所述序列长度。
  28. 如权利要求26或27所述的装置,其特征在于,所述装置位于第一簇内,所述序列长度根据n确定,所述n为所述接入设备接收到的来自所述第一簇内的装置所发送的所述第一序列的数量,所述n为大于0的整数。
  29. 如权利要求26-28任一项所述的装置,其特征在于,所述接收模块,还用于接收来自所述接入设备的第一配置信息,所述第一配置信息包括第一资源的信息,所述第一资源用于所述装置发送所述第一序列。
  30. 如权利要求26-29任一项所述的装置,其特征在于,所述接收模块,还用于接收来自所述接入设备的第二配置信息,所述第二配置信息包括第二资源的信息,所述第二资源用于所述装置发送所述第二序列。
  31. 如权利要求26-30任一项所述的装置,其特征在于,所述接收模块,还用于接收来自所述接入设备的第三配置信息,所述第三配置信息包括所述第一序列或生成所述第一序列的参数。
  32. 如权利要求26-31任一项所述的装置,其特征在于,所述接收模块,还用于接收来自所述接入设备的第四配置信息,所述第四配置信息包括第一信息,所述第一信息用于确定所述第二序列。
  33. 一种通信的装置,其特征在于,包括处理器和存储器;
    所述存储器,用于存储计算机程序指令;
    所述处理器,用于执行所述存储器中的部分或者全部计算机程序指令,当所述部分或者全部计算机程序指令被执行时,用于实现如权利要求1-9任一项所述的方法,或实现如权利要求10-16任一项所述的方法。
  34. 一种计算机程序,其特征在于,所述计算机程序包括用于执行权利要求1-9任一项方法的指令,或者包括用于执行权利要求10-16任一项方法的指令。
  35. 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序包括用于实现权利要求1-9任一项所述的方法的指令,或者实现权利要求10-16中任一项所述的方法的指令。
PCT/CN2020/109865 2020-08-18 2020-08-18 一种通信的方法及装置 WO2022036565A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/109865 WO2022036565A1 (zh) 2020-08-18 2020-08-18 一种通信的方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/109865 WO2022036565A1 (zh) 2020-08-18 2020-08-18 一种通信的方法及装置

Publications (1)

Publication Number Publication Date
WO2022036565A1 true WO2022036565A1 (zh) 2022-02-24

Family

ID=80322384

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/109865 WO2022036565A1 (zh) 2020-08-18 2020-08-18 一种通信的方法及装置

Country Status (1)

Country Link
WO (1) WO2022036565A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017000233A1 (zh) * 2015-06-30 2017-01-05 华为技术有限公司 传输导频序列的方法和装置
CN107302800A (zh) * 2016-04-15 2017-10-27 索尼公司 用于混合多址接入无线通信系统的装置和方法
CN107431593A (zh) * 2015-03-13 2017-12-01 高通股份有限公司 用于对用户装备的移动性跟踪的系统和方法
US10470211B2 (en) * 2015-04-14 2019-11-05 Samsung Electronics Co., Ltd. Apparatus and method for band sharing in wireless communication system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107431593A (zh) * 2015-03-13 2017-12-01 高通股份有限公司 用于对用户装备的移动性跟踪的系统和方法
US10470211B2 (en) * 2015-04-14 2019-11-05 Samsung Electronics Co., Ltd. Apparatus and method for band sharing in wireless communication system
WO2017000233A1 (zh) * 2015-06-30 2017-01-05 华为技术有限公司 传输导频序列的方法和装置
CN107302800A (zh) * 2016-04-15 2017-10-27 索尼公司 用于混合多址接入无线通信系统的装置和方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZTE, ZTE MICROELECTRONICS: "Considerations on the Preamble Design for Grant-free Non-orthogonal MA", 3GPP DRAFT; R1-1608955 CONSIDERATIONS ON THE PREAMBLE DESIGN FOR GRANT-FREE NON-ORTHOGONAL MA, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG1, 9 October 2016 (2016-10-09), Lisbon, Portugal, XP051149009 *

Similar Documents

Publication Publication Date Title
US10841865B2 (en) Method and apparatus for transmitting D2D discovery signal and communication system
US9961685B2 (en) Progressive resource allocation for vehicular communication
WO2019105248A1 (en) System and method for configuring and managing on-demand positioning reference signals
US10652936B2 (en) Short identifiers for device-to-device (D2D) broadcast communications
US10959252B2 (en) Multi-cell SIB provision with encoding
EP3266266B1 (en) Scheduling of resources adapted to another node's scheduling information in the context of vehicular decentralized cooperative communications
EP2802165B1 (en) Indication of device to device communication state to base station
KR20150105630A (ko) D2d 통신에서 디바이스 id를 할당하기 위한 방법 및 장치
WO2020211096A1 (zh) 无线通信方法、终端设备和网络设备
US20220346014A1 (en) Random access method and apparatus
US20220110075A1 (en) Information transmission method and apparatus, and storage medium
KR20210021066A (ko) 멀티-브랜치 noma 무선 통신
US20210045155A1 (en) Signal transmission method, communication device and storage medium
US20240163851A1 (en) Systems and methods for valid subframe determination
WO2020030152A1 (zh) 系统信息传输方法、相关设备及系统
KR20230142812A (ko) 무선 통신에서 디바이스내 조정을 위한 사이드링크 자원 배제를 위한 방법들 및 장치
WO2022036565A1 (zh) 一种通信的方法及装置
WO2020227869A1 (zh) 一种资源池的配置方法和终端、网络设备
EP3790304B1 (en) Method for sending information, base station and computer-readable storage medium
WO2021134477A1 (zh) 一种波束训练方法及相关设备
WO2021088063A1 (zh) 一种通信方法及装置
WO2023124731A1 (zh) D2d通信的资源分配方法及装置、介质、程序产品
WO2023124753A1 (zh) D2d通信的资源分配方法及装置、介质、程序产品
WO2023206480A1 (zh) 绝对位置的定位方法、装置、设备和介质
EP4351247A1 (en) Resource selection method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20949777

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20949777

Country of ref document: EP

Kind code of ref document: A1