WO2022067611A1 - 先侦听后传输失败上报的方法、终端设备和网络设备 - Google Patents

先侦听后传输失败上报的方法、终端设备和网络设备 Download PDF

Info

Publication number
WO2022067611A1
WO2022067611A1 PCT/CN2020/119185 CN2020119185W WO2022067611A1 WO 2022067611 A1 WO2022067611 A1 WO 2022067611A1 CN 2020119185 W CN2020119185 W CN 2020119185W WO 2022067611 A1 WO2022067611 A1 WO 2022067611A1
Authority
WO
WIPO (PCT)
Prior art keywords
resources
lbt
resource
terminal device
lbt detection
Prior art date
Application number
PCT/CN2020/119185
Other languages
English (en)
French (fr)
Inventor
付喆
吴作敏
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to CN202080102887.9A priority Critical patent/CN115836573A/zh
Priority to PCT/CN2020/119185 priority patent/WO2022067611A1/zh
Publication of WO2022067611A1 publication Critical patent/WO2022067611A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access

Definitions

  • the present application relates to the field of communications, and more particularly, to a method, a terminal device, and a network device for reporting a transmission failure after listening.
  • the working frequency band (Band) of New Radio Unlicensed (NR-U, New Radio Unlicensed) is 5GHz unlicensed spectrum and 6GHz unlicensed spectrum.
  • energy detection has been agreed as a basic coexistence mechanism.
  • the general energy detection mechanism is the (LBT, Listen Before Talk) mechanism.
  • the basic principle of this mechanism is: before the base station or terminal (transmitter) transmits data on the unlicensed spectrum, it needs to listen for a period of time according to regulations. If the result of listening indicates that the channel is in an idle state, the transmitting end can transmit data to the receiving end. If the listening result indicates that the channel is in an occupied state, the transmitting end needs to roll back a certain period of time and continue to monitor the channel until the channel listening result is in an idle state, and can transmit data to the receiving end.
  • the UE On the unlicensed frequency band, the UE needs to use LBT detection to detect whether the channel is available before transmission. If it is not available, that is, the LBT fails, the UE needs to wait until the next transmission opportunity to perform the LBT detection again. If LBT failure is detected, the MAC layer needs to be notified of LBT failure (LBT failure).
  • LBT failure LBT failure
  • the physical layer only receives a resource that needs to be transmitted from the upper layer, and performs LBT detection on it.
  • the upper layer LBT failure is indicated.
  • the upper layer in order to support the priority transmission of high-priority resources, the upper layer may indicate to the physical layer multiple resources that can be transmitted, and the physical layer may perform LBT detection on multiple resources at this time. For the situation that the physical layer performs LBT detection on multiple resources, there is currently no way of reporting LBT failures.
  • the embodiments of the present application provide a method, a terminal device, and a network device for reporting an LBT failure.
  • An embodiment of the present application proposes a method for reporting an LBT failure, including:
  • the terminal device performs LBT detection on at least one resource
  • the terminal device indicates the LBT failure to the upper layer according to the first principle.
  • the embodiment of the present application also proposes a resource configuration or scheduling method, including:
  • the network device configures or schedules resources for the terminal device, and configures or indicates the priority information of the resource to the terminal device.
  • the embodiment of the present application also proposes a terminal device, including:
  • a detection module for performing LBT detection on at least one resource
  • the indicating module is used to indicate the LBT failure to the upper layer according to the first principle.
  • the embodiment of the present application also proposes a network device, including:
  • the configuration module is configured to configure or schedule resources for the terminal device, and configure or indicate the priority information of the resources to the terminal device.
  • An embodiment of the present application further proposes a terminal device, including: a processor and a memory, where the memory is used for storing a computer program, the processor is used for calling and running the computer program stored in the memory, and executing the above method for reporting LBT failure .
  • An embodiment of the present application further proposes a network device, including: a processor and a memory, where the memory is used to store a computer program, the processor is used to call and run the computer program stored in the memory, and execute the above resource configuration or scheduling method .
  • An embodiment of the present application also provides a chip, including: a processor, configured to call and run a computer program from a memory, so that a device installed with the chip executes the above method for reporting an LBT failure.
  • An embodiment of the present application also proposes a chip, including: a processor, configured to call and run a computer program from a memory, so that a device on which the chip is installed executes the above resource configuration or scheduling method.
  • An embodiment of the present application further provides a computer-readable storage medium for storing a computer program, where the computer program enables a computer to execute the above method for reporting an LBT failure.
  • An embodiment of the present application further provides a computer-readable storage medium for storing a computer program, where the computer program enables a computer to execute the above resource configuration or scheduling method.
  • An embodiment of the present application further provides a computer program product, including computer program instructions, the computer program instructions enable a computer to execute the above-mentioned method for reporting an LBT failure.
  • the embodiments of the present application also provide a computer program product, including computer program instructions, the computer program instructions enable a computer to execute the above resource configuration or scheduling method.
  • An embodiment of the present application further provides a computer program, the computer program enables a computer to execute the above-mentioned method for reporting an LBT failure.
  • An embodiment of the present application further provides a computer program, the computer program enables a computer to execute the above resource configuration or scheduling method.
  • FIG. 1 is a schematic diagram of an application scenario of an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a method 200 for reporting an LBT failure according to an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a method 300 for reporting an LBT failure according to an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of a resource configuration or scheduling method 400 according to an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a terminal device 500 according to an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a terminal device 600 according to an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a network device 700 according to an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a network device 800 according to an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a communication device 900 according to an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a chip 1000 according to an embodiment of the present application.
  • GSM Global System of Mobile communication
  • CDMA Code Division Multiple Access
  • CDMA Wideband Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • LTE-A Advanced Long Term Evolution
  • NR New Radio
  • UMTS Universal Mobile Telecommunication System
  • WLAN Wireless Local Area Networks
  • WiFi Wireless Fidelity
  • 5G 5th-Generation
  • the communication system in this embodiment of the present application may be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, a dual connectivity (Dual Connectivity, DC) scenario, or a standalone (Standalone, SA) distribution. web scene.
  • Carrier Aggregation, CA Carrier Aggregation, CA
  • DC Dual Connectivity
  • SA standalone
  • This embodiment of the present application does not limit the applied spectrum.
  • the embodiments of the present application may be applied to licensed spectrum, and may also be applied to unlicensed spectrum.
  • terminal equipment may also be referred to as user equipment (User Equipment, UE), access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device, etc.
  • UE User Equipment
  • access terminal subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device, etc.
  • the terminal device can be a station (STAION, ST) in the WLAN, can be a cellular phone, a cordless phone, a Session Initiation Protocol (Session Initiation Protocol, SIP) phone, a Wireless Local Loop (WLL) station, a personal digital processing (Personal Digital Assistant, PDA) devices, handheld devices with wireless communication capabilities, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, and next-generation communication systems, such as terminal devices in NR networks or Terminal equipment in the future evolved Public Land Mobile Network (Public Land Mobile Network, PLMN) network, etc.
  • STAION, ST Session Initiation Protocol
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices, which are the general term for the intelligent design of daily wear and the development of wearable devices using wearable technology, such as glasses, gloves, watches, clothing and shoes.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-scale, complete or partial functions without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, which needs to cooperate with other devices such as smart phones.
  • a network device can be a device used to communicate with a mobile device.
  • the network device can be an access point (Access Point, AP) in WLAN, a base station (Base Transceiver Station, BTS) in GSM or CDMA, or a WCDMA
  • a base station NodeB, NB
  • it can also be an evolved base station (Evolutional Node B, eNB or eNodeB) in LTE, or a relay station or access point, or a vehicle-mounted device, wearable device, and network equipment (gNB) in NR networks Or network equipment in the PLMN network that evolves in the future.
  • AP Access Point
  • BTS Base Transceiver Station
  • gNB network equipment
  • a network device provides services for a cell
  • a terminal device communicates with the network device through transmission resources (for example, frequency domain resources, or spectrum resources) used by the cell
  • the cell may be a network device (for example, a frequency domain resource).
  • the cell corresponding to the base station), the cell can belong to the macro base station, or it can belong to the base station corresponding to the small cell (Small cell), where the small cell can include: Metro cell, Micro cell, Pico cell cell), Femto cell, etc.
  • These small cells have the characteristics of small coverage and low transmit power, and are suitable for providing high-speed data transmission services.
  • FIG. 1 exemplarily shows one network device 110 and two terminal devices 120.
  • the wireless communication system 100 may include a plurality of network devices 110, and the coverage of each network device 110 may include other numbers
  • the terminal device 120 is not limited in this embodiment of the present application.
  • the embodiments of the present application may be applied to one terminal device 120 and one network device 110 , and may also be applied to one terminal device 120 and another terminal device 120 .
  • the wireless communication system 100 may further include other network entities such as a mobility management entity (Mobility Management Entity, MME), an access and mobility management function (Access and Mobility Management Function, AMF). This is not limited.
  • MME Mobility Management Entity
  • AMF Access and Mobility Management Function
  • the "instruction" mentioned in the embodiments of the present application may be a direct instruction, an indirect instruction, or an associated relationship.
  • a indicates B it can indicate that A directly indicates B, for example, B can be obtained through A; it can also indicate that A indicates B indirectly, such as A indicates C, and B can be obtained through C; it can also indicate that there is an association between A and B relation.
  • corresponding may indicate that there is a direct or indirect corresponding relationship between the two, or may indicate that there is an associated relationship between the two, or indicate and be instructed, configure and be instructed configuration, etc.
  • the 3GPP RAN working group has approved the project of NR unlicensed working mode.
  • the goal of this project is to make NR work in unlicensed frequency bands.
  • the working frequency bands (Band) of NR-U are 5GHz unlicensed spectrum and 6GHz unlicensed spectrum. spectrum.
  • the design of NR-U should ensure fairness with other systems already working on these unlicensed spectrum, such as WiFi.
  • the principle of fairness is that NR-U cannot affect systems already deployed on unlicensed spectrum more than between those systems.
  • the general energy detection mechanism is the LBT mechanism.
  • the basic principle of the mechanism is that: before the base station or the terminal (transmitter) transmits data on the unlicensed spectrum, it needs to listen for a period of time according to regulations. If the result of listening indicates that the channel is in an idle state, the transmitting end can transmit data to the receiving end. If the listening result indicates that the channel is in an occupied state, the transmitting end needs to roll back a certain period of time and continue to monitor the channel until the channel listening result is in an idle state, and can transmit data to the receiving end.
  • the UE On the unlicensed frequency band, the UE needs to use LBT to listen before transmitting the Uplink Scheduling Request (SR, Scheduling Request), Physical Random Access Channel (PRACH, Physical Random Access Channel) or Uplink Physical Shared Channel (PUSCH, Physical Uplink Shared Channel). Whether the channel is available. If it is not available, that is, the LBT detection fails, the UE needs to wait until the next transmission opportunity to perform the LBT detection again. If it is detected that the LBT detection fails, the MAC layer needs to be notified of the LBT failure information.
  • SR Uplink Scheduling Request
  • PRACH Physical Random Access Channel
  • PUSCH Uplink Physical Shared Channel
  • R16NR-U it is considered that only one resource that needs to be transmitted is indicated from the MAC layer to the physical layer. Therefore, for R16NR-U, the scenario of resource conflict is not particularly discussed.
  • the physical layer only receives one resource that needs to be transmitted from the upper layer, and performs LBT detection on it. When the LBT detection fails, it indicates High level LBT failure.
  • the upper layer may indicate to the physical layer more A resource that can be transmitted, such as multiple medium access control (MAC, Medium Access Control) protocol data units (PDU, Protocol Data Unit), MAC PDU+SR, at this time, the physical layer may perform LBT detection on multiple resources. Then it may happen that some of the LBT detections are successful, and the other part of the LBT detection fails. For how to deal with this complex situation, for example, how to report the LBT failure, the embodiment of the present application proposes a solution.
  • MAC Medium Access Control protocol data units
  • PDU Protocol Data Unit
  • FIG. 2 is a schematic flowchart of a method 200 for reporting an LBT failure according to an embodiment of the present application.
  • the method can optionally be applied to the system shown in FIG. 1 . , as applied to the terminal device shown in Figure 1, but not limited to this.
  • the method includes at least some of the following.
  • the terminal device performs listen-before-transmit (LBT) detection on at least one resource
  • the terminal device indicates the LBT failure to the upper layer according to the first principle.
  • the above-mentioned resources include at least one of Dynamic Grant (DG, Dynamic Grant), Configuration Grant (CG, Configured Grant), Physical Uplink Control Channel (PUCCH, Physical Uplink Control Channel) and PRACH.
  • DG Dynamic Grant
  • CG Configuration Grant
  • PUCCH Physical Uplink Control Channel
  • PRACH Physical Uplink Control Channel
  • the above-mentioned resources include at least one of Physical Uplink Share Channel (PUSCH, Physical Uplink Share Channel), PUCCH, and PRACH resources.
  • PUSCH Physical Uplink Share Channel
  • PUCCH Physical Uplink Share Channel
  • PRACH resources PRACH resources
  • the above-mentioned resources may include resources configured or scheduled by the network device.
  • the network device is the CG configured by the terminal, or the network device is the DG scheduled by the terminal.
  • the network device may configure or indicate priority information for resources. For example, the network device may configure the priority information of the CG while configuring the CG for the terminal. For another example, the network device may indicate the priority information of the DG while scheduling the DG for the terminal. For another example, when configuring the PUCCH/PRACH for the terminal, the network device may configure the priority information of the PUCCH/PRACH.
  • the terminal device receives the configuration or indication of the above-mentioned resource, where the configuration or indication includes priority information of the resource.
  • the above priority information includes high priority or low priority.
  • the above-mentioned priority information may be resource priority information based on a physical layer resource priority, and/or resource priority information based on a logical channel (LCH, Logical Channel) priority.
  • LCH Logical Channel
  • the above priority information may be resource priority information used when performing resource priority selection based on the physical layer, and/or resource priority information used when performing resource priority selection based on the MAC layer.
  • the above-mentioned first principle includes at least one of the following:
  • the count value (counter) of LBT failure reported by the terminal includes one of the following: 1. The number of resources for which LBT detection fails, and the high-priority resources for LBT detection failure. number of resources.
  • the aforementioned count value of LBT failure reported by the terminal may further include the number of low-priority resources for which LBT detection fails.
  • the above-mentioned failure to report the LBT is reported for at least one of a bandwidth part (BWP, Bandwidth Part), a serving cell (serving cell), and a resource.
  • BWP bandwidth part
  • serving cell serving cell
  • At least some of the above-mentioned resources include high-priority resources.
  • At least some of the above-mentioned resources do not include high-priority resources, and data (such as MAC PDUs, such as SR) corresponding to high-priority resources can be detected by LBT Successful other resource send.
  • data such as MAC PDUs, such as SR
  • At least some of the above-mentioned resources include high-priority resources.
  • At least some of the above-mentioned resources include high-priority resources, and the data (for example, MAC PDU) corresponding to the high-priority resources cannot be successfully detected by LBT. Other resources send.
  • the count value of LBT failure reported by the terminal includes one of the following: 1, the number of resources for which LBT detection fails, and the number of high-priority resources for which LBT detection fails .
  • the aforementioned count value of LBT failure reported by the terminal may further include the number of low-priority resources for which LBT detection fails.
  • the above-mentioned failure to report the LBT is reported for at least one of the BWP, the serving cell, and the resource.
  • the identifier of the BWP the identifier of the serving cell
  • the identifier of the resource the identifier of the resource.
  • the terminal device performs LBT detection on at least one resource, and indicates the LBT failure to a higher layer according to the above-mentioned first principle.
  • LBT detection is performed on at least one resource, and the LBT failure is indicated to the upper layer according to the above-mentioned first principle.
  • the LBT failure may be indicated to a higher layer (eg, a MAC layer) by the physical layer of the terminal device.
  • a higher layer eg, a MAC layer
  • the upper layer of the UE After the upper layer of the UE receives the LBT failure indication, it can judge whether the LBT failure is recovered or not according to the existing rules.
  • the above-mentioned first condition includes at least one of the following:
  • the physical layer receives a number of available/to-be-transmitted information from higher layers
  • the physical layer determines that there are multiple resource conflicts or overlaps
  • the above-mentioned available/to-be-transmitted information includes at least one of the following:
  • the terminal device may detect the resource according to the LBT detection mode indicated by the network. For example, the terminal device receives the LBT detection mode indication information.
  • the above-mentioned LBT detection mode indication information includes at least one of the following:
  • LBT detection is performed according to the LBT detection mode indicated by the network.
  • the above-mentioned specific resources may refer to specific types of resources; such as high-priority resources and/or low-priority resources.
  • the LBT detection is performed according to the LBT detection mode indicated by the network, and the terminal may detect the corresponding resource according to the instruction, and after the detection, indicate the LBT failure to the upper layer according to the first principle.
  • FIG. 3 is a schematic flowchart of a method 300 for reporting an LBT failure according to an embodiment of the present application.
  • the network device configures resources or schedules resource transmission for the UE.
  • the resource may be at least one of DG, CG, PUCCH, and PRACH.
  • the network device may configure or indicate the priority information of the resource at the same time.
  • the priority information may be high priority or low priority.
  • the network device may indicate the LBT detection mode to the UE.
  • the indication information of the LBT detection mode has been introduced in the above-mentioned embodiments, and will not be repeated here.
  • the UE receives the resources scheduled or configured by the network, and optionally, the UE performs LBT detection according to the LBT detection mode indicated by the network device, and transmits. And, the UE indicates the LBT failure to the upper layer according to the first principle.
  • the first principle has been introduced in the above-mentioned embodiments, and will not be repeated here.
  • the upper layer eg, the MAC layer
  • the UE After the upper layer (eg, the MAC layer) of the UE receives the LBT failure indication, it judges whether the LBT failure is recovered or not according to the existing rules.
  • the embodiments of the present application specify how the UE reports the UE behavior of the LBT failure in the case of resource conflict, which ensures the channel transmission quality while satisfying the URLLC service transmission.
  • FIG. 4 is a schematic flowchart of a resource configuration or scheduling method 400 according to an embodiment of the present application.
  • the method can optionally be applied to the method shown in FIG. 1 . system, as applied to the network device shown in Figure 1, but not limited to this.
  • the method includes at least some of the following. include:
  • the network device configures or schedules resources for the terminal device, and configures or indicates the priority information of the resource to the terminal device.
  • the above priority information includes high priority or low priority.
  • the above method further includes: sending LBT detection mode indication information.
  • the above-mentioned LBT detection mode indication information includes at least one of the following:
  • LBT detection is performed according to the LBT detection mode indicated by the network.
  • the above-mentioned specific resources may refer to specific types of resources; such as high-priority resources and/or low-priority resources.
  • the above-mentioned resources include at least one of DG, CG, PUCCH and PRACH.
  • the above-mentioned resources include at least one of PUSCH, PUCCH, and PRACH resources.
  • FIG. 5 is a schematic structural diagram of a terminal device 500 according to an embodiment of the present application, including:
  • a detection module 510 configured to perform LBT detection on at least one resource after listening and then transmitting
  • the indicating module 520 is configured to indicate the LBT failure to the upper layer according to the first principle.
  • the above-mentioned first principle includes at least one of the following:
  • the LBT detection is successful on all resources in at least one resource, the LBT failure is not reported to the upper layer;
  • the LBT detection is successful on at least part of the at least one resource, the LBT failure is not reported to the upper layer;
  • the LBT detection fails on at least part of the at least one resource, the LBT failure is reported to the upper layer.
  • At least part of the resources include high-priority resources.
  • At least some of the resources do not include high-priority resources and correspond to high-priority resources.
  • the data of the resource can be sent by other resources whose LBT detection is successful.
  • At least part of the resources include high-priority resources.
  • At least some of the resources include high-priority resources, and corresponding to the high-priority resources. Data cannot be sent through other resources for which LBT detection is successful.
  • the reported count value of LBT failures includes one of the following: 1, the number of resources for which LBT detection fails, and the number of high-priority resources for which LBT detection fails.
  • the above-mentioned first principle further includes: reporting the failure of the LBT is reporting for at least one of the bandwidth part BWP, the serving cell, and the resource.
  • the above-mentioned first principle further includes: carrying at least one of the following when reporting the LBT failure: the identifier of the BWP, the identifier of the serving cell, and the identifier of the resource.
  • the above-mentioned indicating module 520 is configured to indicate the LBT failure to the upper layer according to the first principle in the case of resource conflict or overlap.
  • the above-mentioned indicating module 520 is configured to indicate the LBT failure to the upper layer according to the first principle when the resources conflict or overlap and the first condition is satisfied.
  • the above-mentioned first condition includes at least one of the following:
  • the physical layer receives a number of available/to-be-transmitted information from higher layers
  • the physical layer determines that there are multiple resource conflicts or overlaps
  • the above-mentioned available/to-be-transmitted information includes at least one of the following:
  • the above-mentioned instructing module 520 is configured to use the physical layer of the terminal device to indicate the LBT failure to the upper layer according to the first principle.
  • the above-mentioned higher layers include a MAC layer.
  • the above-mentioned resources include resources configured or scheduled by the network device.
  • the above-mentioned terminal device further includes:
  • the first receiving module 630 is configured to receive a configuration or an indication of a resource, where the configuration or indication includes priority information of the resource.
  • the above priority information includes high priority or low priority.
  • the above-mentioned terminal device further includes:
  • the second receiving module 640 is configured to receive LBT detection mode indication information.
  • the above-mentioned LBT detection mode indication information includes at least one of the following:
  • LBT detection is performed according to the LBT detection mode indicated by the network.
  • the above-mentioned specific resources may refer to specific types of resources; such as high-priority resources and/or low-priority resources.
  • the above resources include at least one of the following:
  • FIG. 7 is a schematic structural diagram of a network device 700 according to an embodiment of the present application, including:
  • the configuration module 710 is configured to configure or schedule resources for the terminal device, and configure or indicate the priority information of the resources to the terminal device.
  • the above priority information includes high priority or low priority.
  • the above-mentioned network device further includes:
  • the sending module 820 is configured to send LBT detection mode indication information.
  • the above-mentioned LBT detection mode indication information includes at least one of the following:
  • LBT detection is performed according to the LBT detection mode indicated by the network.
  • the above-mentioned specific resources may refer to specific types of resources; such as high-priority resources and/or low-priority resources.
  • the above-mentioned resources include at least one of DG, CG, PUCCH and PRACH.
  • the above-mentioned resources include at least one of PUSCH, PUCCH, and PRACH resources.
  • FIG. 9 is a schematic structural diagram of a communication device 900 according to an embodiment of the present application.
  • the communication device 900 shown in FIG. 9 includes a processor 910, and the processor 910 can call and run a computer program from a memory, so as to implement the method in the embodiment of the present application.
  • the communication device 900 may further include a memory 920 .
  • the processor 910 may call and run a computer program from the memory 920 to implement the methods in the embodiments of the present application.
  • the memory 920 may be a separate device independent of the processor 910 , or may be integrated in the processor 910 .
  • the communication device 900 may further include a transceiver 930, and the processor 910 may control the transceiver 930 to communicate with other devices, specifically, may send information or data to other devices, or receive other Information or data sent by a device.
  • the transceiver 930 may include a transmitter and a receiver.
  • the transceiver 930 may further include antennas, and the number of the antennas may be one or more.
  • the communication device 900 may be the terminal device of the embodiment of the present application, and the communication device 900 may implement the corresponding processes implemented by the terminal device in each method of the embodiment of the present application, which is not repeated here for brevity.
  • the communication device 900 may be a network device in this embodiment of the present application, and the communication device 900 may implement the corresponding processes implemented by the network device in each method in this embodiment of the present application, which is not repeated here for brevity.
  • FIG. 10 is a schematic structural diagram of a chip 1000 according to an embodiment of the present application.
  • the chip 1000 shown in FIG. 10 includes a processor 1010, and the processor 1010 can call and run a computer program from a memory, so as to implement the method in the embodiment of the present application.
  • the chip 1000 may further include a memory 1020 .
  • the processor 1010 may call and run a computer program from the memory 1020 to implement the methods in the embodiments of the present application.
  • the memory 1020 may be a separate device independent of the processor 1010, or may be integrated in the processor 1010.
  • the chip 1000 may further include an input interface 1030 .
  • the processor 1010 can control the input interface 1030 to communicate with other devices or chips, and specifically, can obtain information or data sent by other devices or chips.
  • the chip 1000 may further include an output interface 1040 .
  • the processor 1010 can control the output interface 1040 to communicate with other devices or chips, and specifically, can output information or data to other devices or chips.
  • the chip can be applied to the terminal device in the embodiment of the present application, and the chip can implement the corresponding processes implemented by the terminal device in each method of the embodiment of the present application, which is not repeated here for brevity.
  • the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding processes implemented by the network device in each method of the embodiment of the present application, which is not repeated here for brevity.
  • the chip mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip, a system-on-chip, or a system-on-a-chip, or the like.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (DSP), an off-the-shelf programmable gate array (field programmable gate array, FPGA), an application specific integrated circuit (ASIC) or Other programmable logic devices, transistor logic devices, discrete hardware components, etc.
  • DSP digital signal processor
  • FPGA field programmable gate array
  • ASIC application specific integrated circuit
  • the general-purpose processor mentioned above may be a microprocessor or any conventional processor or the like.
  • the memory mentioned above may be either volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically programmable Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory may be random access memory (RAM).
  • the memory in the embodiment of the present application may also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is, the memory in the embodiments of the present application is intended to include but not limited to these and any other suitable types of memory.
  • the above-mentioned embodiments it may be implemented in whole or in part by software, hardware, firmware or any combination thereof.
  • software it can be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present application are generated.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions may be stored on or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted over a wire from a website site, computer, server or data center (eg coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (eg infrared, wireless, microwave, etc.) means to another website site, computer, server or data center.
  • the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that includes an integration of one or more available media.
  • the available media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), and the like.
  • the size of the sequence numbers of the above-mentioned processes does not mean the order of execution, and the execution order of each process should be determined by its functions and internal logic, and should not be dealt with in the embodiments of the present application. implementation constitutes any limitation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例涉及先侦听后传输失败上报的天线切换方法、终端设备和通信设备,其中方法包括,终端设备在至少一个资源上进行先侦听后传输LBT检测;终端设备按照第一原则将LBT失败指示给高层。本申请实施例可以实现在资源冲突或重叠情况下UE明确如何上报LBT失败。

Description

先侦听后传输失败上报的方法、终端设备和网络设备 技术领域
本申请涉及通信领域,并且更具体地,涉及先侦听后传输失败上报的方法、终端设备和网络设备。
背景技术
一般来说,新空口非授权(NR-U,New Radio Unlicensed)的工作频带(Band)为5GHz非授权频谱和6GHz非授权频谱。为了保证在非授权频谱上各系统之间的公平性共存,能量检测已经被同意作为一个基本的共存机制。一般的能量检测机制为(LBT,Listen Before Talk)机制,该机制的基本原理为:基站或者终端(传输端)在非授权频谱上传输数据之前,需要先按照规定侦听一段时间。如果侦听的结果表示该信道为空闲状态,则传输端可以给接收端传输数据。如果侦听的结果表示该信道为占用状态,则传输端需要根据规定回退一段时间再继续侦听信道,直到信道侦听结果为空闲状态,才能向接收端传输数据。
在非授权频带上,UE传输之前都需要先用LBT检测来侦听信道是否可用,如果不可以用,即LBT失败,UE需要等到下一个传输机会再次执行LBT检测。若检测到LBT失败,需要通知给MAC层LBT失败(LBT failure)的信息。
在R16NR-U中物理层仅收到一个来自高层的需要传输的资源,并对其进行LBT检测,当LBT检测失败时指示高层LBT failure。但是,在R17中,为了支持高优先的资源的优先传输,高层可能指示给物理层多个可以传输的资源,此时物理层有可能对多个资源进行LBT检测。针对物理层对多个资源进行LBT检测的情况,目前并没有确定LBT失败的上报方式。
发明内容
本申请实施例提供一种LBT失败上报的方法、终端设备和网络设备。
本申请实施例提出一种LBT失败上报的方法,包括:
终端设备在至少一个资源上进行LBT检测;
终端设备按照第一原则将LBT失败指示给高层。
本申请实施例还提出一种资源配置或调度方法,包括:
网络设备为终端设备配置或调度资源,并向终端设备配置或指示该资源的优先级信息。
本申请实施例还提出一种终端设备,包括:
检测模块,用于在至少一个资源上进行LBT检测;
指示模块,用于按照第一原则将LBT失败指示给高层。
本申请实施例还提出一种网络设备,包括:
配置模块,用于为终端设备配置或调度资源,并向该终端设备配置或指示所述资源的优先级信息。
本申请实施例还提出一种终端设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行上述LBT失败上报的方法。
本申请实施例还提出一种网络设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行上述资源配置或调度方法。
本申请实施例还提出一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行上述LBT失败上报的方法。
本申请实施例还提出一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行上述资源配置或调度方法。
本申请实施例还提出一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行上述LBT失败上报的方法。
本申请实施例还提出一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行上述资源配置或调度方法。
本申请实施例还提出一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述LBT失败上报的方法。
本申请实施例还提出一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述资源配置或调度方法。
本申请实施例还提出一种计算机程序,所述计算机程序使得计算机执行上述LBT失败上报的的方法。
本申请实施例还提出一种计算机程序,所述计算机程序使得计算机执行上述资源配置或调度方法。
本申请实施例通过UE按照第一资源将LBT失败指示给高层,可以实现在资源冲突或重叠的情况下明确如何上报LBT失败。
附图说明
图1是本申请实施例的应用场景的示意图。
图2是根据本申请实施例的一种LBT失败上报的方法200的示意性流程图。
图3是根据本申请实施例的一种LBT失败上报的方式300的示意性流程图。
图4是根据本申请实施例的一种资源配置或调度方法400的示意性流程图。
图5是根据本申请实施例的终端设备500结构示意图。
图6是根据本申请实施例的终端设备600结构示意图。
图7是根据本申请实施例的网络设备700结构示意图。
图8是根据本申请实施例的网络设备800结构示意图。
图9是根据本申请实施例的通信设备900示意性结构图。
图10是根据本申请实施例的芯片1000的示意性结构图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。
需要说明的是,本申请实施例的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。同时描述的“第一”、“第二”描述的对象可以相同,也可以不同。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、先进的长期演进(Advanced long term evolution,LTE-A)系统、新无线(New Radio,NR)系统、NR系统的演进系统、免授权频谱上的LTE(LTE-based access to unlicensed spectrum,LTE-U)系统、免授权频谱上的NR(NR-based access to unlicensed spectrum,NR-U)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、无线局域网(Wireless Local Area Networks,WLAN)、无线保真(Wireless Fidelity,WiFi)、下一代通信(5th-Generation,5G)系统或其他通信系统等。
通常来说,传统的通信系统支持的连接数有限,也易于实现,然而,随着通信技 术的发展,移动通信系统将不仅支持传统的通信,还将支持例如,设备到设备(Device to Device,D2D)通信,机器到机器(Machine to Machine,M2M)通信,机器类型通信(Machine Type Communication,MTC),以及车辆间(Vehicle to Vehicle,V2V)通信等,本申请实施例也可以应用于这些通信系统。
可选地,本申请实施例中的通信系统可以应用于载波聚合(Carrier Aggregation,CA)场景,也可以应用于双连接(Dual Connectivity,DC)场景,还可以应用于独立(Standalone,SA)布网场景。
本申请实施例对应用的频谱并不限定。例如,本申请实施例可以应用于授权频谱,也可以应用于免授权频谱。
本申请实施例结合网络设备和终端设备描述了各个实施例,其中:终端设备也可以称为用户设备(User Equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置等。终端设备可以是WLAN中的站点(STAION,ST),可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)设备、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备以及下一代通信系统,例如,NR网络中的终端设备或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)网络中的终端设备等。
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。
网络设备可以是用于与移动设备通信的设备,网络设备可以是WLAN中的接入点(Access Point,AP),GSM或CDMA中的基站(Base Transceiver Station,BTS),也可以是WCDMA中的基站(NodeB,NB),还可以是LTE中的演进型基站(Evolutional Node B,eNB或eNodeB),或者中继站或接入点,或者车载设备、可穿戴设备以及NR网络中的网络设备(gNB)或者未来演进的PLMN网络中的网络设备等。
在本申请实施例中,网络设备为小区提供服务,终端设备通过该小区使用的传输资源(例如,频域资源,或者说,频谱资源)与网络设备进行通信,该小区可以是网络设备(例如基站)对应的小区,小区可以属于宏基站,也可以属于小小区(Small cell)对应的基站,这里的小小区可以包括:城市小区(Metro cell)、微小区(Micro cell)、微微小区(Pico cell)、毫微微小区(Femto cell)等,这些小小区具有覆盖范围小、发射功率低的特点,适用于提供高速率的数据传输服务。
图1示例性地示出了一个网络设备110和两个终端设备120,可选地,该无线通信系统100可以包括多个网络设备110,并且每个网络设备110的覆盖范围内可以包括其它数量的终端设备120,本申请实施例对此不做限定。本申请实施例可以应用于一个终端设备120与一个网络设备110,也可以应用于一个终端设备120与另一个终端设备120。
可选地,该无线通信系统100还可以包括移动性管理实体(Mobility Management Entity,MME)、接入与移动性管理功能(Access and Mobility Management Function,AMF) 等其他网络实体,本申请实施例对此不作限定。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
应理解,在本申请的实施例中提到的“指示”可以是直接指示,也可以是间接指示,还可以是表示具有关联关系。举例说明,A指示B,可以表示A直接指示B,例如B可以通过A获取;也可以表示A间接指示B,例如A指示C,B可以通过C获取;还可以表示A和B之间具有关联关系。
在本申请实施例的描述中,术语“对应”可表示两者之间具有直接对应或间接对应的关系,也可以表示两者之间具有关联关系,也可以是指示与被指示、配置与被配置等关系。
为便于理解本申请实施例的技术方案,以下对本申请实施例的相关技术进行说明,以下相关技术作为可选方案与本申请实施例的技术方案可以进行任意结合,其均属于本申请实施例的保护范围。
3GPP RAN工作组已经同意了NR非授权工作方式的立项,该项目的目标是使得NR工作在非授权频段,一般来说,NR-U的工作频带(Band)为5GHz非授权频谱和6GHz非授权频谱。在非授权频谱上,NR-U的设计应该保证与其他已经工作在这些非授权频谱上的系统之间的公平性,比如WiFi等。公平性的原则是,NR-U对于已经部署在非授权频谱上的系统的影响不能超过这些系统之间的影响。
为了保证在非授权频谱上各系统之间的公平性共存,能量检测已经被同意作为一个基本的共存机制。一般的能量检测机制为LBT机制,该机制的基本原理为:基站或者终端(传输端)在非授权频谱上传输数据之前,需要先按照规定侦听一段时间。如果侦听的结果表示该信道为空闲状态,则传输端可以给接收端传输数据。如果侦听的结果表示该信道为占用状态,则传输端需要根据规定回退一段时间再继续侦听信道,直到信道侦听结果为空闲状态,才能向接收端传输数据。
在非授权频带上,UE传输上行调度请求(SR,Scheduling Request)、物理随机接入信道(PRACH,Physical Random Access Channel)或者上行物理共享信道(PUSCH,PhysicalUplinkSharedChannel)之前都需要先用LBT来侦听信道是否可用。如果不可以用,即LBT检测失败,则UE需要等到下一个传输机会再次执行LBT检测。若检测到LBT检测失败,需要通知给MAC层LBT失败的信息。
在R16中,认为只会有一个需要传输的资源从MAC层指示给物理层。因此,对R16NR-U来说,没有特别讨论过资源冲突的场景,在R16NR-U中物理层仅收到一个来自高层的需要传输的资源,并对其进行LBT检测,当LBT检测失败时指示高层LBT failure。但是,在R17中,为了支持高优先的资源的优先传输(如超可靠、低时延通信(URLLC,Ultra reliability and low latency communication)业务对应的资源的优先传输),高层可能指示给物理层多个可以传输的资源,如多个媒质接入控制(MAC,Medium Access Control)协议数据单元(PDU,Protocol Data Unit),MAC PDU+SR,此时物理层有可能对多个资源进行LBT检测。那就可能出现其中部分LBT检测成功,另一部分LBT检测失败的情况。针对这一复杂的情况下如何处理,例如如何上报LBT failure,本申请实施例对此提出解决方案。
本申请实施例提出一种LBT失败上报的方法,图2是根据本申请实施例的一种LBT失败上报的方法200的示意性流程图,该方法可选地可以应用于图1所示的系统,如应用于图1所示的终端设备,但并不仅限于此。该方法包括以下内容的至少部分内容。
S210:终端设备在至少一个资源上进行先侦听后传输(LBT)检测;
S220:该终端设备按照第一原则将LBT失败指示给高层。
可选地,上述资源包括动态授权(DG,Dynamic Grant)、配置授权(CG,Configured Grant)、物理上行控制信道(PUCCH,Physical Uplink Control Channel)及PRACH中的至少一项。
可选地,上述资源包括物理上行共享信道(PUSCH,Physical Uplink Share Channel)、PUCCH、PRACH资源中的至少一项。
可选地,上述资源可以包括网络设备配置或调度的资源。例如,网络设备为终端配置的CG、或者网络设备为终端调度的DG。
在配置或调度资源的同时,网络设备可以配置或指示资源的优先级信息。例如,网络设备在为终端配置的CG的同时,可以配置该CG的优先级信息。又如,网络设备在为终端调度的DG的同时,可以指示该DG的优先级信息。又例如,网络设备在为终端配置PUCCH/PRACH的同时,可以配置该PUCCH/PRACH的优先级信息。
可选地,终端设备接收对上述资源的配置或指示,该配置或指示中包括该资源的优先级信息。
可选地,上述优先级信息包括高优先级或低优先级。
可选地,上述优先级信息可以是基于物理层资源优先级的资源优先级信息,和/或,基于逻辑信道(LCH,Logical Channel)优先级的资源优先级信息。
可选地,上述优先级信息可以是基于物理层执行资源优先级选择时使用的资源优先级信息,和/或,基于MAC层执行资源优先级选择时使用的资源优先级信息。
可选地,上述第一原则包括以下至少一项:
(1)若在该至少一个资源中的所有资源上LBT检测成功,则不向高层上报LBT失败;
(2)若在该至少一个资源中的所有资源上LBT检测失败,则向高层上报LBT失败;
(3)若在该至少一个资源中的至少部分资源上LBT检测成功,则不向高层上报LBT失败;
(4)若在该至少一个资源中的至少部分资源上LBT检测失败,则向高层上报LBT失败。
针对上述第一原则的第(2)项,可选地,终端上报的LBT失败的计数值(counter)包括以下之一:1,LBT检测失败的资源个数,LBT检测失败的高优先级的资源个数。可选地,前述终端上报的LBT失败的计数值还可以包括LBT检测失败的低优先级的资源个数。
针对上述第一原则的第(2)项,可选地,上述上报LBT失败为针对带宽部分(BWP,Bandwidth Part)、服务小区(serving cell)、资源中的至少之一上报。可选地,上报LBT失败时携带以下至少之一:该BWP的标识,该服务小区的标识,该资源的标识。
针对上述第一原则的第(3)项,可选地,上述至少部分资源包括高优先级的资源。
或者,针对上述第一原则的第(3)项,可选地,上述至少部分资源不包括高优先级的资源,并且对应高优先级资源的数据(例如MAC PDU,例如SR)可以通过LBT检测成功的其他资源发送。
针对上述第一原则的第(4)项,可选地,上述至少部分资源包括高优先级的资源。
或者,针对上述第一原则的第(4)项,可选地,上述至少部分资源包括高优先级的资源,并且对应高优先级资源的数据(例如MAC PDU)不能通过LBT检测成功的其他资源发送。
针对上述第一原则的第(4)项,可选地,终端上报的LBT失败的计数值包括以下之一:1,LBT检测失败的资源个数,LBT检测失败的高优先级的资源个数。可选地,前述终端上报的LBT失败的计数值还可以包括LBT检测失败的低优先级的资源个数。
针对上述第一原则的第(4)项,可选地,上述上报LBT失败为针对BWP、服务小区serving cell、资源中的至少之一上报。可选地,上报LBT失败时携带以下至少之一:该BWP的标识,该服务小区的标识,该资源的标识。
可选地,在资源冲突或重叠的情况下,终端设备在至少一个资源上进行LBT检测,并按照上述第一原则将LBT失败指示给高层。
或者,在资源冲突或重叠,并且满足第一条件的情况下,在至少一个资源上进行LBT检测,并按照上述第一原则将LBT失败指示给高层。
具体的,可以由终端设备的物理层将LBT失败指示给高层(如MAC层)。
当UE高层接收到LBT失败指示后,可以按照现有规则,进行LBT失败是否恢复的判断。
可选地,上述第一条件包括以下至少一项:
物理层接收到多个来自高层的可用/待传输信息;
物理层确定存在多个资源冲突或重叠;
多个冲突或重叠的资源的优先级不同;
多个冲突或重叠的资源的优先级不同,并且物理层接收到多个来自高层的可用/待传输信息;
多个冲突或重叠的资源的优先级相同;
多个冲突或重叠的资源的优先级相同,并且物理层接收到多个来自高层的可用/待传输信息。
可选地,上述可用/待传输信息包括以下至少一项:
MAC PDU;
SR;
确认(ACK)/否定确认(NACK)生成指示;
ACK/NACK指示。
可选地,终端设备可以根据网络指示的LBT检测方式对资源进行检测。例如,终端设备接收LBT检测方式指示信息。
可选地,上述LBT检测方式指示信息包括以下至少一项:
针对任意一个资源执行LBT检测;
针对至少一个特定资源执行LBT检测;
针对特定数目的资源执行LBT检测;
针对特定资源执行LBT检测;
针对全部资源执行LBT检测;
根据网络指示的LBT检测方式执行LBT检测。
可选地,上述特定资源可以指特定类型的资源;如高优先级的资源和/或低优先级的资源。
示例性的,根据上述网络指示的LBT检测方式执行LBT检测,终端可以按照指示对对应的资源进行检测,并在检测之后按照第一原则将LBT失败指示给高层。
以下举具体的实施例,介绍资源重复或重叠的情况下,若UE在至少一个资源上进行了LBT检测,UE按照第一原则指示LBT失败给高层的具体实现方式。
图3是根据本申请实施例的一种LBT失败上报的方式300的示意性流程图。如图3所示,网络设备为UE配置资源或调度资源传输。其中,该资源可以为DG、CG、 PUCCH、PRACH中的至少一项。网络设备在配置或调度资源的同时,可以同时配置或指示该资源的优先级信息。例如,该优先级信息可以为高优先级,或者低优先级。进一步地,网络设备可以向UE指示LBT检测方式。LBT检测方式指示信息在上述实施方式中已有介绍,在此不再赘述。
UE接收网络调度或配置的资源,可选地,UE按照网络设备指示的LBT检测方式执行LBT检测,进行传输。并且,UE按照第一原则将LBT失败指示给高层。第一原则在上述实施方式中已有介绍,在此不再赘述。
当UE的高层(如MAC层)接收到LBT失败指示后,按照现有规则,进行LBT失败是否恢复的判断。
可见,本申请实施方式明确了UE在资源冲突情况下如何上报LBT failure的UE行为,在满足URLLC业务传输的同时,保证了信道传输质量。
本申请实施方式还提出一种资源配置或调度方法,图4是根据本申请实施例的一种资源配置或调度方法400的示意性流程图,该方法可选地可以应用于图1所示的系统,如应用于图1所示的网络设备,但并不仅限于此。该方法包括以下内容的至少部分内容。包括:
S410:网络设备为终端设备配置或调度资源,并向该终端设备配置或指示该资源的优先级信息。
可选地,上述优先级信息包括高优先级或低优先级。
可选地,上述方法还包括:发送LBT检测方式指示信息。
可选地,上述LBT检测方式指示信息包括以下至少一项:
针对任意一个资源执行LBT检测;
针对至少一个特定资源执行LBT检测;
针对特定数目的资源执行LBT检测;
针对特定资源执行LBT检测;
针对全部资源执行LBT检测;
根据网络指示的LBT检测方式执行LBT检测。
可选地,上述特定资源可以指特定类型的资源;如高优先级的资源和/或低优先级的资源。
可选地,上述资源包括DG、CG、PUCCH和PRACH中的至少一项。
可选地,上述资源包括PUSCH、PUCCH、PRACH资源中的至少一项。
本申请实施例还提出一种终端设备,图5是根据本申请实施例的终端设备500结构示意图,包括:
检测模块510,用于在至少一个资源上进行先侦听后传输LBT检测;
指示模块520,用于按照第一原则将LBT失败指示给高层。
可选地,上述第一原则包括以下至少一项:
若在至少一个资源中的所有资源上LBT检测成功,则不向高层上报LBT失败;
若在至少一个资源中的所有资源上LBT检测失败,则向高层上报LBT失败;
若在至少一个资源中的至少部分资源上LBT检测成功,则不向高层上报LBT失败;
若在至少一个资源中的至少部分资源上LBT检测失败,则向高层上报LBT失败。
可选地,上述若在至少一个资源中的至少部分资源上LBT检测成功,则不向高层上报LBT失败的第一原则内容中,至少部分资源包括高优先级的资源。
可选地,上述若在至少一个资源中的至少部分资源上LBT检测成功,则不向高层上报LBT失败的第一原则内容中,至少部分资源不包括高优先级的资源,并且对应高优先级资源的数据可以通过LBT检测成功的其他资源发送。
可选地,上述若在至少一个资源中的至少部分资源上LBT检测失败,则向高层上报LBT失败的第一原则内容中,至少部分资源包括高优先级的资源。
可选地,上述若在至少一个资源中的至少部分资源上LBT检测失败,则向高层上报LBT失败的第一原则内容中,至少部分资源包括高优先级的资源,并且对应高优先级资源的数据不能通过LBT检测成功的其他资源发送。
可选地,上述上报的LBT失败的计数值包括以下之一:1,LBT检测失败的资源个数,LBT检测失败的高优先级的资源个数。
可选地,上述第一原则还包括:上报LBT失败为针对带宽部分BWP、服务小区、资源中的至少之一上报。
可选地,上述第一原则还包括:上报LBT失败时携带以下至少之一:BWP的标识,服务小区的标识,资源的标识。
可选地,上述指示模块520用于,在资源冲突或重叠的情况下,按照第一原则将LBT失败指示给高层。
可选地,上述指示模块520用于,在资源冲突或重叠,并且满足第一条件的情况下,按照第一原则将LBT失败指示给高层。
可选地,上述第一条件包括以下至少一项:
物理层接收到多个来自高层的可用/待传输信息;
物理层确定存在多个资源冲突或重叠;
多个冲突或重叠的资源的优先级不同;
多个冲突或重叠的资源的优先级不同,并且物理层接收到多个来自高层的可用/待传输信息;
多个冲突或重叠的资源的优先级相同;
多个冲突或重叠的资源的优先级相同,并且物理层接收到多个来自高层的可用/待传输信息。
可选地,上述可用/待传输信息包括以下至少一项:
媒质接入控制MAC协议数据单元PDU;
上行调度请求SR;
确认ACK/否定确认NACK生成指示;
ACK/NACK指示。
可选地,上述指示模块520用于,采用终端设备的物理层按照第一原则将LBT失败指示给高层。
可选地,上述高层包括MAC层。
可选地,上述资源包括网络设备配置或调度的资源。
可选地,如图6所示,上述终端设备还包括:
第一接收模块630,用于接收对资源的配置或指示,配置或指示中包括资源的优先级信息。
可选地,上述优先级信息包括高优先级或低优先级。
可选地,如图6所示,上述终端设备还包括:
第二接收模块640,用于接收LBT检测方式指示信息。
可选地,上述LBT检测方式指示信息包括以下至少一项:
针对任意一个资源执行LBT检测;
针对至少一个特定资源执行LBT检测;
针对特定数目的资源执行LBT检测;
针对特定资源执行LBT检测;
针对全部资源执行LBT检测;
根据网络指示的LBT检测方式执行LBT检测。
可选地,上述特定资源可以指特定类型的资源;如高优先级的资源和/或低优先级的资源。
可选地,上述资源包括以下至少一项:
动态授权DG;
配置授权CG;
物理上行控制信道PUCCH;
PRACH。
应理解,根据本申请实施例的终端设备中的模块的上述及其他操作和/或功能分别为了实现图2的方法200中的终端设备的相应流程,为了简洁,在此不再赘述。
本申请实施例还提出一种网络设备,图7是根据本申请实施例的网络设备700结构示意图,包括:
配置模块710,用于为终端设备配置或调度资源,并向终端设备配置或指示资源的优先级信息。
可选地,上述优先级信息包括高优先级或低优先级。
可选地,如图8所示,上述网络设备还包括:
发送模块820,用于发送LBT检测方式指示信息。
可选地,上述LBT检测方式指示信息包括以下至少一项:
针对任意一个资源执行LBT检测;
针对至少一个特定资源执行LBT检测;
针对特定数目的资源执行LBT检测;
针对特定资源执行LBT检测;
针对全部资源执行LBT检测;
根据网络指示的LBT检测方式执行LBT检测。
可选地,上述特定资源可以指特定类型的资源;如高优先级的资源和/或低优先级的资源。
可选地,上述资源包括DG、CG、PUCCH和PRACH中的至少一项。
可选地,上述资源包括PUSCH、PUCCH、PRACH资源中的至少一项。
应理解,根据本申请实施例的网络设备中的模块的上述及其他操作和/或功能分别为了实现图4的方法400中的网络设备的相应流程,为了简洁,在此不再赘述。
图9是根据本申请实施例的通信设备900示意性结构图。图9所示的通信设备900包括处理器910,处理器910可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图9所示,通信设备900还可以包括存储器920。其中,处理器910可以从存储器920中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器920可以是独立于处理器910的一个单独的器件,也可以集成在处理器910中。
可选地,如图9所示,通信设备900还可以包括收发器930,处理器910可以控制该收发器930与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器930可以包括发射机和接收机。收发器930还可以进一步包括天线,天线的数量可以为一个或多个。
可选地,该通信设备900可为本申请实施例的终端设备,并且该通信设备900可 以实现本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备900可为本申请实施例的网络设备,并且该通信设备900可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
图10是根据本申请实施例的芯片1000的示意性结构图。图10所示的芯片1000包括处理器1010,处理器1010可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图10所示,芯片1000还可以包括存储器1020。其中,处理器1010可以从存储器1020中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器1020可以是独立于处理器1010的一个单独的器件,也可以集成在处理器1010中。
可选地,该芯片1000还可以包括输入接口1030。其中,处理器1010可以控制该输入接口1030与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该芯片1000还可以包括输出接口1040。其中,处理器1010可以控制该输出接口1040与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
可选地,该芯片可应用于本申请实施例中的终端设备,并且该芯片可以实现本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该芯片可应用于本申请实施例中的网络设备,并且该芯片可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
上述提及的处理器可以是通用处理器、数字信号处理器(digital signal processor,DSP)、现成可编程门阵列(field programmable gate array,FPGA)、专用集成电路(application specific integrated circuit,ASIC)或者其他可编程逻辑器件、晶体管逻辑器件、分立硬件组件等。其中,上述提到的通用处理器可以是微处理器或者也可以是任何常规的处理器等。
上述提及的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM)。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。该计算机 程序产品包括一个或多个计算机指令。在计算机上加载和执行该计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。该计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。该计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,该计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(Digital Subscriber Line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。该计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。该可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(Solid State Disk,SSD))等。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
以上所述仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以该权利要求的保护范围为准。

Claims (62)

  1. 一种先侦听后传输失败上报的方法,包括:
    终端设备在至少一个资源上进行先侦听后传输LBT检测;
    所述终端设备按照第一原则将LBT失败指示给高层。
  2. 根据权利要求1所述的方法,其中,所述第一原则包括以下至少一项:
    若在所述至少一个资源中的所有资源上LBT检测成功,则不向高层上报LBT失败;
    若在所述至少一个资源中的所有资源上LBT检测失败,则向高层上报LBT失败;
    若在所述至少一个资源中的至少部分资源上LBT检测成功,则不向高层上报LBT失败;
    若在所述至少一个资源中的至少部分资源上LBT检测失败,则向高层上报LBT失败。
  3. 根据权利要求2所述的方法,其中,所述若在所述至少一个资源中的至少部分资源上LBT检测成功,则不向高层上报LBT失败的第一原则内容中,所述至少部分资源包括高优先级的资源。
  4. 根据权利要求2所述的方法,其中,所述若在所述至少一个资源中的至少部分资源上LBT检测成功,则不向高层上报LBT失败的第一原则内容中,所述至少部分资源不包括高优先级的资源,并且对应高优先级资源的数据可以通过LBT检测成功的其他资源发送。
  5. 根据权利要求2所述的方法,其中,所述若在所述至少一个资源中的至少部分资源上LBT检测失败,则向高层上报LBT失败的第一原则内容中,所述至少部分资源包括高优先级的资源。
  6. 根据权利要求2所述的方法,其中,所述若在所述至少一个资源中的至少部分资源上LBT检测失败,则向高层上报LBT失败的第一原则内容中,所述至少部分资源包括高优先级的资源,并且对应所述高优先级资源的数据不能通过LBT检测成功的其他资源发送。
  7. 根据权利要求2、5或6所述的方法,其中,所述上报的LBT失败的计数值包括以下之一:1,LBT检测失败的资源个数,LBT检测失败的高优先级的资源个数。
  8. 根据权利要求2、5或6所述的方法,其中,所述第一原则还包括:所述上报LBT失败为针对带宽部分BWP、服务小区、资源中的至少之一上报。
  9. 根据权利要求8所述的方法,其中,所述第一原则还包括:上报LBT失败时携带以下至少之一:所述BWP的标识,所述服务小区的标识,所述资源的标识。
  10. 根据权利要求1至9任一所述的方法,其中,所述终端设备按照第一原则将LBT失败指示给高层,包括:
    在资源冲突或重叠的情况下,所述终端设备按照第一原则将LBT失败指示给高层。
  11. 根据权利要求1至9任一所述的方法,其中,所述终端设备按照第一原则将LBT失败指示给高层,包括:
    在资源冲突或重叠,并且满足第一条件的情况下,所述终端设备按照第一原则将LBT失败指示给高层。
  12. 根据权利要求11所述的方法,其中,所述第一条件包括以下至少一项:
    物理层接收到多个来自高层的可用/待传输信息;
    物理层确定存在多个资源冲突或重叠;
    多个冲突或重叠的资源的优先级不同;
    多个冲突或重叠的资源的优先级不同,并且物理层接收到多个来自高层的可用/待 传输信息;
    多个冲突或重叠的资源的优先级相同;
    多个冲突或重叠的资源的优先级相同,并且物理层接收到多个来自高层的可用/待传输信息。
  13. 根据权利要求12所述的方法,其中,所述可用/待传输信息包括以下至少一项:
    媒质接入控制MAC协议数据单元PDU;
    上行调度请求SR;
    确认ACK/否定确认NACK生成指示;
    ACK/NACK指示。
  14. 根据权利要求1至13任一所述的方法,其中,所述终端设备按照第一原则将LBT失败指示给高层,包括:
    所述终端设备的物理层按照第一原则将LBT失败指示给高层。
  15. 根据权利要求1至14任一所述的方法,其中,所述高层包括MAC层。
  16. 根据权利要求1至15任一所述的方法,所述资源包括网络设备配置或调度的资源。
  17. 根据权利要求16所述的方法,还包括:
    所述终端设备接收对所述资源的配置或指示,所述配置或指示中包括所述资源的优先级信息。
  18. 根据权利要求17所述的方法,其中,所述优先级信息包括高优先级或低优先级。
  19. 根据权利要求1至18任一所述的方法,还包括:所述终端设备接收LBT检测方式指示信息。
  20. 根据权利要求19所述的方法,其中,所述LBT检测方式指示信息包括以下至少一项:
    针对任意一个资源执行LBT检测;
    针对至少一个特定资源执行LBT检测;
    针对特定数目的资源执行LBT检测;
    针对特定资源执行LBT检测;
    针对全部资源执行LBT检测;
    根据网络指示的LBT检测方式执行LBT检测。
  21. 根据权利要求1至20任一所述的方法,其中,所述资源包括以下至少一项:
    动态授权DG;
    配置授权CG;
    物理上行控制信道PUCCH;
    物理随机接入信道PRACH。
  22. 一种资源配置或调度方法,包括:
    网络设备为终端设备配置或调度资源,并向所述终端设备配置或指示所述资源的优先级信息。
  23. 根据权利要求22所述的方法,其中,所述优先级信息包括高优先级或低优先级。
  24. 根据权利要求22或23所述的方法,还包括:发送LBT检测方式指示信息。
  25. 根据权利要求24所述的方法,其中,所述LBT检测方式指示信息包括以下至少一项:
    针对任意一个资源执行LBT检测;
    针对至少一个特定资源执行LBT检测;
    针对特定数目的资源执行LBT检测;
    针对特定资源执行LBT检测;
    针对全部资源执行LBT检测;
    根据网络指示的LBT检测方式执行LBT检测。
  26. 根据权利要求22至25任一所述的方法,其中,所述资源包括DG、CG、PUCCH和PRACH中的至少一项。
  27. 一种终端设备,包括:
    检测模块,用于在至少一个资源上进行先侦听后传输LBT检测;
    指示模块,用于按照第一原则将LBT失败指示给高层。
  28. 根据权利要求27所述的终端设备,其中,所述第一原则包括以下至少一项:
    若在所述至少一个资源中的所有资源上LBT检测成功,则不向高层上报LBT失败;
    若在所述至少一个资源中的所有资源上LBT检测失败,则向高层上报LBT失败;
    若在所述至少一个资源中的至少部分资源上LBT检测成功,则不向高层上报LBT失败;
    若在所述至少一个资源中的至少部分资源上LBT检测失败,则向高层上报LBT失败。
  29. 根据权利要求28所述的终端设备,其中,所述若在所述至少一个资源中的至少部分资源上LBT检测成功,则不向高层上报LBT失败的第一原则内容中,所述至少部分资源包括高优先级的资源。
  30. 根据权利要求28所述的终端设备,其中,所述若在所述至少一个资源中的至少部分资源上LBT检测成功,则不向高层上报LBT失败的第一原则内容中,所述至少部分资源不包括高优先级的资源,并且对应高优先级资源的数据可以通过LBT检测成功的其他资源发送。
  31. 根据权利要求28所述的终端设备,其中,所述若在所述至少一个资源中的至少部分资源上LBT检测失败,则向高层上报LBT失败的第一原则内容中,所述至少部分资源包括高优先级的资源。
  32. 根据权利要求28所述的终端设备,其中,所述若在所述至少一个资源中的至少部分资源上LBT检测失败,则向高层上报LBT失败的第一原则内容中,所述至少部分资源包括高优先级的资源,并且对应所述高优先级资源的数据不能通过LBT检测成功的其他资源发送。
  33. 根据权利要求28、31或32所述的终端设备,其中,所述上报的LBT失败的计数值包括以下之一:1,LBT检测失败的资源个数,LBT检测失败的高优先级的资源个数。
  34. 根据权利要求28、31或32所述的终端设备,其中,所述第一原则还包括:所述上报LBT失败为针对带宽部分BWP、服务小区、资源中的至少之一上报。
  35. 根据权利要求34所述的终端设备,其中,所述第一原则还包括:上报LBT失败时携带以下至少之一:所述BWP的标识,所述服务小区的标识,所述资源的标识。
  36. 根据权利要求27至35任一所述的终端设备,其中,所述指示模块用于,在资源冲突或重叠的情况下,按照第一原则将LBT失败指示给高层。
  37. 根据权利要求27至35任一所述的终端设备,其中,所述指示模块用于,在资源冲突或重叠,并且满足第一条件的情况下,按照第一原则将LBT失败指示给高层。
  38. 根据权利要求37所述的终端设备,其中,所述第一条件包括以下至少一项:
    物理层接收到多个来自高层的可用/待传输信息;
    物理层确定存在多个资源冲突或重叠;
    多个冲突或重叠的资源的优先级不同;
    多个冲突或重叠的资源的优先级不同,并且物理层接收到多个来自高层的可用/待传输信息;
    多个冲突或重叠的资源的优先级相同;
    多个冲突或重叠的资源的优先级相同,并且物理层接收到多个来自高层的可用/待传输信息。
  39. 根据权利要求38所述的终端设备,其中,所述可用/待传输信息包括以下至少一项:
    媒质接入控制MAC协议数据单元PDU;
    上行调度请求SR;
    确认ACK/否定确认NACK生成指示;
    ACK/NACK指示。
  40. 根据权利要求27至39任一所述的终端设备,其中,所述指示模块用于,采用所述终端设备的物理层按照第一原则将LBT失败指示给高层。
  41. 根据权利要求27至40任一所述的终端设备,其中,所述高层包括MAC层。
  42. 根据权利要求27至41任一所述的终端设备,所述资源包括网络设备配置或调度的资源。
  43. 根据权利要求42所述的终端设备,还包括:
    第一接收模块,用于接收对所述资源的配置或指示,所述配置或指示中包括所述资源的优先级信息。
  44. 根据权利要求43所述的终端设备,其中,所述优先级信息包括高优先级或低优先级。
  45. 根据权利要求27至44任一所述的终端设备,还包括:
    第二接收模块,用于接收LBT检测方式指示信息。
  46. 根据权利要求45所述的终端设备,其中,所述LBT检测方式指示信息包括以下至少一项:
    针对任意一个资源执行LBT检测;
    针对至少一个特定资源执行LBT检测;
    针对特定数目的资源执行LBT检测;
    针对特定资源执行LBT检测;
    针对全部资源执行LBT检测;
    根据网络指示的LBT检测方式执行LBT检测。
  47. 根据权利要27至46任一所述的终端设备,其中,所述资源包括DG、CG、PUCCH和PRACH中的至少一项。
  48. 一种网络设备,包括:
    配置模块,用于为终端设备配置或调度资源,并向所述终端设备配置或指示所述资源的优先级信息。
  49. 根据权利要求48所述的网络设备,其中,所述优先级信息包括高优先级或低优先级。
  50. 根据权利要求48或49所述的网络设备,还包括:
    发送模块,用于发送LBT检测方式指示信息。
  51. 根据权利要求50所述的网络设备,其中,所述LBT检测方式指示信息包括以下至少一项:
    针对任意一个资源执行LBT检测;
    针对至少一个特定资源执行LBT检测;
    针对特定数目的资源执行LBT检测;
    针对特定资源执行LBT检测;
    针对全部资源执行LBT检测;
    根据网络指示的LBT检测方式执行LBT检测。
  52. 根据权利要求48至51任一所述的网络设备,其中,所述资源包括DG、CG、PUCCH和PRACH中的至少一项。
  53. 一种终端设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至21中任一项所述的方法。
  54. 一种网络设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求22至26中任一项所述的方法。
  55. 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至21中任一项所述的方法。
  56. 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求22至26中任一项所述的方法。
  57. 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至21中任一项所述的方法。
  58. 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求22至26中任一项所述的方法。
  59. 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至21中任一项所述的方法。
  60. 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求22至26中任一项所述的方法。
  61. 一种计算机程序,所述计算机程序使得计算机执行如权利要求1至21中任一项所述的方法。
  62. 一种计算机程序,所述计算机程序使得计算机执行如权利要求22至26中任一项所述的方法。
PCT/CN2020/119185 2020-09-30 2020-09-30 先侦听后传输失败上报的方法、终端设备和网络设备 WO2022067611A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202080102887.9A CN115836573A (zh) 2020-09-30 2020-09-30 先侦听后传输失败上报的方法、终端设备和网络设备
PCT/CN2020/119185 WO2022067611A1 (zh) 2020-09-30 2020-09-30 先侦听后传输失败上报的方法、终端设备和网络设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/119185 WO2022067611A1 (zh) 2020-09-30 2020-09-30 先侦听后传输失败上报的方法、终端设备和网络设备

Publications (1)

Publication Number Publication Date
WO2022067611A1 true WO2022067611A1 (zh) 2022-04-07

Family

ID=80951072

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/119185 WO2022067611A1 (zh) 2020-09-30 2020-09-30 先侦听后传输失败上报的方法、终端设备和网络设备

Country Status (2)

Country Link
CN (1) CN115836573A (zh)
WO (1) WO2022067611A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024027607A1 (zh) * 2022-08-05 2024-02-08 中兴通讯股份有限公司 边链路先听后说检测方法、终端、基站和存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3407662A1 (en) * 2016-01-21 2018-11-28 ZTE Corporation Method and apparatus for sending and receiving preamble, user equipment, and base station
CN109496400A (zh) * 2018-10-16 2019-03-19 北京小米移动软件有限公司 重传信息的方法、装置、基站及终端
WO2019194652A1 (ko) * 2018-04-05 2019-10-10 엘지전자 주식회사 비면허 대역을 지원하는 무선 통신 시스템에서 신호를 송수신하는 방법 및 이를 지원하는 장치
CN111050404A (zh) * 2018-10-11 2020-04-21 华为技术有限公司 控制资源的配置方法、解析方法及设备
CN111107555A (zh) * 2019-11-08 2020-05-05 中兴通讯股份有限公司 传输信道的传输和发送方法、装置、设备和存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3407662A1 (en) * 2016-01-21 2018-11-28 ZTE Corporation Method and apparatus for sending and receiving preamble, user equipment, and base station
WO2019194652A1 (ko) * 2018-04-05 2019-10-10 엘지전자 주식회사 비면허 대역을 지원하는 무선 통신 시스템에서 신호를 송수신하는 방법 및 이를 지원하는 장치
CN111050404A (zh) * 2018-10-11 2020-04-21 华为技术有限公司 控制资源的配置方法、解析方法及设备
CN109496400A (zh) * 2018-10-16 2019-03-19 北京小米移动软件有限公司 重传信息的方法、装置、基站及终端
CN111107555A (zh) * 2019-11-08 2020-05-05 中兴通讯股份有限公司 传输信道的传输和发送方法、装置、设备和存储介质

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
MODERATOR (NOKIA): "Feature lead summary#1 on email discussion [101-e-NR-unlic-NRU- ChAcc-02]", 3GPP DRAFT; R1-2004859, vol. RAN WG1, 3 June 2020 (2020-06-03), pages 1 - 19, XP051893138 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024027607A1 (zh) * 2022-08-05 2024-02-08 中兴通讯股份有限公司 边链路先听后说检测方法、终端、基站和存储介质

Also Published As

Publication number Publication date
CN115836573A (zh) 2023-03-21

Similar Documents

Publication Publication Date Title
WO2012038912A1 (en) Autonomous unlicensed band reuse in mixed cellular and device-to-device network
WO2020087509A1 (zh) 无线通信方法、终端设备和网络设备
US11729819B2 (en) Method and device for determining contention window
WO2019214660A1 (zh) 通信方法和通信装置
WO2019237805A1 (zh) 一种随机接入方法及装置、通信设备
US20200374887A1 (en) Channel transmission method and apparatus, and computer storage medium
WO2022067611A1 (zh) 先侦听后传输失败上报的方法、终端设备和网络设备
US20230127511A1 (en) Communication method and communication device
WO2021243920A1 (zh) 无线通信的方法、终端设备和网络设备
WO2022021302A1 (zh) 层二测量量增强表示和报告方法及设备
WO2021159482A1 (zh) 冲突处理方法和终端设备
WO2022082783A1 (zh) 无线通信方法、终端设备和网络设备
WO2022110178A1 (zh) 传输方法和终端设备
WO2022047629A1 (zh) 报告随机接入情况的方法、终端设备和网络设备
WO2022027460A1 (zh) 无线通信方法、终端设备和网络设备
US20220256580A1 (en) Resource transmission method and terminal device
WO2022141181A1 (zh) 设置方法、终端设备和网络设备
WO2022087836A1 (zh) 传输方法和终端设备
WO2022205483A1 (zh) 传输方法、终端设备、网络设备及通信系统
WO2021159599A1 (zh) 传输优先级的确定方法和终端设备
WO2024131529A1 (zh) 一种通信方法及通信装置
WO2023010441A1 (zh) 通信方法、终端设备、网络设备及通信系统
WO2021196147A1 (zh) 信息传输的方法、终端设备和网络设备
WO2022040969A1 (zh) 使用配置授权cg资源的方法、终端设备和网络设备
WO2022027683A1 (zh) 确定传输使用的天线面板的方法和终端设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20955636

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20955636

Country of ref document: EP

Kind code of ref document: A1