WO2023036142A1 - 时隙配置方法、终端及网络侧设备 - Google Patents

时隙配置方法、终端及网络侧设备 Download PDF

Info

Publication number
WO2023036142A1
WO2023036142A1 PCT/CN2022/117345 CN2022117345W WO2023036142A1 WO 2023036142 A1 WO2023036142 A1 WO 2023036142A1 CN 2022117345 W CN2022117345 W CN 2022117345W WO 2023036142 A1 WO2023036142 A1 WO 2023036142A1
Authority
WO
WIPO (PCT)
Prior art keywords
bit
bits
indication
target
indication field
Prior art date
Application number
PCT/CN2022/117345
Other languages
English (en)
French (fr)
Inventor
洪琪
李�灿
李�根
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2023036142A1 publication Critical patent/WO2023036142A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0446Resources in time domain, e.g. slots or frames

Definitions

  • the present application belongs to the technical field of terminal communication, and in particular relates to a time slot configuration method, a terminal and a network side device.
  • a terminal and a network-side device can use different subcarrier spacing (Subcarrier Spacing, SCS) for data and control channel transmission.
  • SCS subcarrier Spacing
  • multiple time slots (slots) can be included in one frame.
  • each Different time slot formats are designed for the time slots in the frame, and the format of the time slots in each frame is configured by the network side device during communication.
  • the format of the time slot may specifically include the following three types: a time slot is only used for downlink transmission, or only used for uplink transmission, or a mixed time slot.
  • the network side device configures the format of the time slot, it can The number of time slots used for uplink transmission and the number of time slots used for downlink transmission are configured, and the remaining unconfigured time slots can be flexible time slots.
  • the embodiment of the present application provides a time slot configuration method, a terminal, and a network-side device, which can solve the problem that the network-side device may not be able to configure the format of each time slot based on the current solution when the number of time slots to be configured is large. Problems with efficient configuration.
  • a time slot configuration method comprising:
  • the terminal receives configuration information, the configuration information includes a first indication field, and the configuration information is used to indicate a first target bit and a second target bit through a first indication mode or a second indication mode, and the first target bit is used
  • the second target bit is used to indicate the number of time slots for downlink transmission
  • the first indication method includes dividing multiple bits in the first indication field into multiple groups of bits, performing a joint indication by using the multiple groups of bits, and the second indication manner includes jointly indicating by the first indication field in conjunction with other fields;
  • the number of time slots for uplink transmission is determined based on the first target bit, and the number of time slots for downlink transmission is determined based on the second target bit.
  • a time slot configuration device which includes:
  • a receiving module configured to receive configuration information, where the configuration information includes a first indication field, and the configuration information is used to indicate the first target bit and the second target bit through a first indication manner or a second indication manner, and the first indication field
  • a target bit is used to indicate the number of time slots for uplink transmission
  • the second target bit is used to indicate the number of time slots for downlink transmission
  • the first indication method includes dividing multiple bits in the first indication field into A plurality of groups of bits is jointly indicated by the plurality of groups of bits
  • the second indication method includes the indication by the first indication field in combination with other fields
  • a first determining module configured to determine the first target bit and the second target bit based on the configuration information
  • a second determining module configured to determine the number of time slots for uplink transmission based on the first target bit, and determine the number of time slots for downlink transmission based on the second target bit.
  • a time slot configuration method which includes:
  • the network side device sends configuration information
  • the configuration information includes a first indication field
  • the configuration information is used to indicate the first target bit and the second target bit through the first indication mode or the second indication mode
  • the first target bit is used to indicate the uplink The number of time slots for transmission
  • the second target bit is used to indicate the number of time slots for downlink transmission
  • the first indication method includes dividing multiple bits in the first indication field into multiple groups of bits, through the A joint indication is performed by multiple groups of bits
  • the second indication manner includes the joint indication by the first indication field in combination with other fields.
  • a time slot configuration device comprising:
  • a sending module configured to send configuration information
  • the configuration information includes a first indication field
  • the configuration information is used to indicate the first target bit and the second target bit through the first indication mode or the second indication mode
  • the first target bit is used to indicate the uplink The number of time slots for transmission
  • the second target bit is used to indicate the number of time slots for downlink transmission
  • the first indication method includes dividing multiple bits in the first indication field into multiple groups of bits, through the A joint indication is performed by multiple groups of bits
  • the second indication manner includes the joint indication by the first indication field in combination with other fields.
  • a terminal includes a processor, a memory, and a program or instruction stored in the memory and operable on the processor.
  • the program or instruction is executed by the processor The steps of the method described in the first aspect are realized.
  • a terminal including a processor and a communication interface, wherein the communication interface is used to receive configuration information, the configuration information includes a first indication field, and the configuration information is used to pass the first indication
  • the mode or the second indication mode indicates the first target bit and the second target bit, the first target bit is used to indicate the number of time slots for uplink transmission, and the second target bit is used to indicate the number of time slots for downlink transmission, so
  • the first indication method includes dividing multiple bits in the first indication field into multiple groups of bits, and performing joint indication through the multiple groups of bits, and the second indication mode includes combining the first indication field with other Fields together indicate that the processor is used to determine the first target bit and the second target bit based on the configuration information; determine the number of time slots for uplink transmission based on the first target bit, and determine the number of time slots for uplink transmission based on the first target bit.
  • the two target bits determine the number of time slots for downlink transmission.
  • a network-side device includes a processor, a memory, and a program or instruction stored in the memory and operable on the processor, and the program or instruction is executed by the The processor implements the steps of the method described in the third aspect when executing.
  • a network side device including a processor and a communication interface, where the communication interface is used to send configuration information; where the configuration information includes a first indication field, and the configuration information is used for The first target bit and the second target bit are indicated by the first indication mode or the second indication mode, the first target bit is used to indicate the number of time slots for uplink transmission, and the second target bit is used to indicate the time slot for downlink transmission
  • the number of slots the first indication method includes dividing the multiple bits in the first indication field into multiple groups of bits, and performing joint indication through the multiple groups of bits, and the second indication method includes the first The indicating field is jointly indicated with other fields.
  • a readable storage medium is provided, and programs or instructions are stored on the readable storage medium, and when the programs or instructions are executed by a processor, the steps of the method described in the first aspect are realized, or the steps of the method described in the first aspect are realized, or The steps of the method described in the third aspect.
  • a chip in a tenth aspect, includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the method as described in the first aspect , or implement the method described in the third aspect.
  • a computer program/program product is provided, the computer program/program product is stored in a non-volatile storage medium, and the program/program product is executed by at least one processor to implement the first The steps of the method described in the third aspect, or the steps of the method described in the third aspect.
  • the network side device when configuring the time slot format, may send configuration information including the first indication field to the terminal, and the configuration information is used to indicate uplink transmission through the first indication mode or the second indication mode
  • the number of time slots and the number of time slots for downlink transmission wherein, the first indication method includes dividing the multiple bits in the first indication field into multiple groups of bits, and performing joint indication through multiple groups of bits, and the second indication method includes the number of bits in the first indication field.
  • An indication field cooperates with other fields for indication.
  • FIG. 1 is a schematic diagram of a wireless communication system according to an embodiment of the present application.
  • Fig. 2 is a schematic flowchart of a time slot configuration method according to an embodiment of the present application
  • FIG. 3 is a schematic flowchart of a time slot configuration method according to an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of a time slot configuration device according to an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a time slot configuration device according to an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a terminal according to an embodiment of the present application.
  • Fig. 8 is a schematic structural diagram of a network side device according to an embodiment of the present application.
  • first, second and the like in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments of the application are capable of operation in sequences other than those illustrated or described herein and that "first" and “second” distinguish objects. It is usually one category, and the number of objects is not limited. For example, there may be one or more first objects.
  • “and/or” in the description and claims means at least one of the connected objects, and the character “/” generally means that the related objects are an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced LTE-Advanced
  • LTE-A Long Term Evolution-Advanced
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency-Division Multiple Access
  • system and “network” in the embodiments of the present application are often used interchangeably, and the described technology can be used for the above-mentioned system and radio technology, and can also be used for other systems and radio technologies.
  • NR New Radio
  • the following description describes the New Radio (NR) system for illustrative purposes, and uses NR terminology in most of the following descriptions, but these techniques can also be applied to applications other than NR system applications, such as the 6th generation (6 th Generation, 6G) communication system.
  • 6G 6th Generation
  • Fig. 1 shows a block diagram of a wireless communication system to which the embodiment of the present application is applicable.
  • the wireless communication system includes a terminal 11 and a network side device 12 .
  • the terminal 11 can also be called a terminal device or a user terminal (User Equipment, UE), and the terminal 11 can be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital Assistant (Personal Digital Assistant, PDA), handheld computer, netbook, ultra-mobile personal computer (UMPC), mobile Internet device (Mobile Internet Device, MID), wearable device (Wearable Device) or vehicle-mounted device (VUE), Pedestrian Terminal (PUE) and other terminal-side devices, wearable devices include: smart watches, bracelets, earphones, glasses, etc.
  • the network side device 12 may be a base station or a core network, where a base station may be called a node B, an evolved node B, an access point, a base transceiver station (Base Transceiver Station, BTS), a radio base station, a radio transceiver, a basic service Basic Service Set (BSS), Extended Service Set (ESS), Node B, Evolved Node B (eNB), Home Node B, Home Evolved Node B, Wireless Local Area Network (WLAN) ) access point, wireless fidelity (Wireless Fidelity, WiFi) node, transmitting and receiving point (Transmitting Receiving Point, TRP) or some other suitable term in the field, as long as the same technical effect is achieved, the base station is not limited to Specific technical terms, it should be noted that in the embodiment of the present application, only the base station in the NR system is taken as an example, but the specific type of the
  • a network side device when configuring a time slot format, may use TDD-uplink (UL)-downlink (Downlink, DL)-ConfigCommon for configuration. Specifically, the network side device can indicate the number of time slots for downlink transmission through the indication field nrofDownlinkSlots, use the indication field nrofUplinkSlots to indicate the number of time slots for uplink transmission, and the remaining time slots can be flexible time slots (in the transmission period of uplink/downlink When the SCS and SCS are determined, the number of time slots in each frame is fixed, and after the network side device indicates the number of time slots for uplink transmission and downlink transmission, the remaining number of time slots is the number of flexible time slots). Wherein, both nrofDownlinkSlots and nrofUplinkSlots include a specific number of bits.
  • nrofDownlinkSlots and nrofUplinkSlots When the frequency of SCS is high, the number of time slots in one frame will increase sharply. In this way, the network side equipment is limited when using nrofDownlinkSlots and nrofUplinkSlots to indicate the number of time slots for downlink transmission and the number of time slots for uplink transmission respectively. Due to the number of bits in nrofDownlinkSlots and nrofUplinkSlots, there will be a problem that the format of some of the time slots cannot be configured.
  • the SCS frequency as 480KHz and 960KHz and the transmission period as 10ms
  • the number of time slots in one frame is 320
  • the maximum number of time slots for uplink transmission can be 320 (the number of time slots for downlink transmission is 0 at this time)
  • the maximum number of time slots for downlink transmission can be 320 (the number of time slots for uplink transmission is 0 at this time)
  • the above two indication fields nrofDownlinkSlots and nrofUplinkSlots can be Each contains 9 bits, so that the format of each time slot can be effectively configured.
  • the number of time slots in one frame will increase to 640.
  • the 9-bit nrofDownlinkSlots and nrofUplinkSlots are used to refer to the number of time slots for downlink transmission and the number of time slots for uplink transmission
  • the number of time slots for uplink transmission/downlink transmission can be indicated up to 512.
  • the number of time slots for uplink transmission/downlink transmission is greater than 512, nrofDownlinkSlots and nrofUplinkSlots cannot be used for effective indication.
  • the embodiment of the present application provides a time slot configuration method, a terminal and a network side device.
  • the Some bits are divided into multiple groups of bits and then multiple groups of bits are used to jointly indicate the number of time slots in different formats, or a new number of bits is added and combined with the existing number of bits to jointly indicate the number of time slots in different formats.
  • the embodiments of the present application can solve the above technical problems in two different ways.
  • One way is to consider that the sum of the number of time slots for uplink transmission and the number of time slots for downlink transmission does not exceed the total number of time slots. Therefore, There may be no need to allocate more bits to respectively indicate the number of time slots for uplink transmission and the number of time slots for downlink transmission. For example, in the case where the SCS is 960 KHz and the transmission period is 10 ms, there is no need to allocate 10 bits to nrofDownlinkSlots and nrofUplinkSlots respectively.
  • Another way is to increase the number of bits, so that a greater number of bits can be used to configure the format of a greater number of time slots. For example, in the case where the SCS is 960 KHz and the transmission period is 10 ms, 10 bits may be used to indicate the number of time slots for uplink transmission and the number of time slots for downlink transmission respectively.
  • the embodiment of the present application provides a time slot configuration method 200, which can be executed by a terminal, in other words, the method can be executed by software or hardware installed in the terminal, and the method includes the following steps.
  • the terminal receives configuration information, the configured information includes a first indication field, the configuration information is used to indicate the first target bit and the second target bit through the first indication mode or the second indication mode, and the first target bit is used to indicate the uplink The number of time slots for transmission, the second target bit is used to indicate the number of time slots for downlink transmission, the first indication method includes dividing multiple bits in the first indication field into multiple groups of bits, and performing joint indication through multiple groups of bits, the second The two indication modes include that the first indication field is combined with other fields for indication.
  • the network side device When the network side device configures the time slot format, it can send configuration information to the terminal, the configuration information is used to indicate the number of bits used to indicate the number of time slots for uplink transmission through the first indication mode or the second indication mode (ie The first target bit), and the number of bits used to indicate the number of time slots for downlink transmission (ie, the second target bit).
  • the above configuration information may include a first indication field, and the first indication field may consist of one indication field, or may also consist of multiple indication fields.
  • the multiple indication fields may be two indication fields nrofDownlinkSlots and nrofUplinkSlots in the current TDD-UL-DL-ConfigurationCommon configuration.
  • the first indication field may include multiple bits, and the number of multiple bits may be the total number of bits used to indicate the number of time slots for uplink transmission and the number of bits used to indicate the number of time slots for downlink transmission in the prior art head.
  • the number of the multiple bits may also be configured by the network side device according to actual conditions, which is not specifically limited here.
  • the above-mentioned first indication mode can be understood as changing the bit indication mode without increasing the number of bits, that is, changing the way the terminal understands the bits, so as to realize the use of existing multiple bits to indicate the format of more time slots Specifically, the purpose is to group the existing multiple bits and use the grouped multiple groups of bits for joint indication.
  • the above-mentioned second indication manner can be understood as adding a plurality of bits on the basis of the existing plurality of bits to jointly indicate the number of time slots for uplink and downlink transmission.
  • the above-mentioned existing multiple bits can be used for the format of 320 time slots (corresponding to SCS of 480KHz and a transmission period of 10ms) 18 bits for indication (including 9 bits for indicating the number of time slots for uplink transmission and 9 bits for indicating the number of time slots for downlink transmission).
  • the existing multiple bits may also be other numbers of bits, which will not be illustrated here one by one.
  • the multiple bits in the first indication field may include the first target bit and the second target bit. target bits.
  • the first target bit and the second target bit do not overlap each other, and the sum of the numbers of the first target bit and the second target bit is less than or equal to the total number of bits in the first indication field. That is to say, the network side device may use one or more bits in the first indication field as the first target bits, and use one or more bits in the remaining bits as the second target bits.
  • the configuration information may also include a second indication field, which can be understood as the same as the first indication field.
  • the other fields indicating the first number of bits and the second number of bits, that is, the second indication mode, are jointly indicated by the first indication field and the second indication field.
  • the second indication field and the first indication field may belong to the same indication domain, that is, the second indication field is a newly added field in the indication domain where the first indication field is located.
  • the second indication field may also belong to a different indication domain from the first indication field, where the indication domain to which the second indication field belongs may be a newly added indication domain, or the second indication field may be a specified indication domain.
  • the designated indication field can be configured by the network side device, or can be predefined by the protocol.
  • the designated indication field can be nrofUplinkSymbols or nrofDownlinkSymbols in the existing TDD-UL-DL-ConfigurationCommon configuration.
  • the terminal may determine the first target bit and the second target bit based on the configuration information.
  • the terminal when determining the first target bit and the second target bit based on the configuration information, may determine the first target bit and the second target bit based on the above-mentioned first indication method, or may determine the first target bit and the second target bit based on the above-mentioned second indication method.
  • the specific indication mode of the first target bit and the second target bit can be configured by the network side device, can also be predefined by the protocol, or can also be judged according to the actual situation.
  • the terminal judges according to the actual situation, in a possible implementation manner, it can judge whether the first preset condition is satisfied, and if so, it can determine the first target bit and the second target bit based on the second indication method, If not, the first target bit and the second target bit may be determined based on the first indication manner.
  • the above-mentioned first preset condition may include at least one of the following: the sending frequency range (Frequency range, FR) of the system information block (System Information Block1, SIB1) is a specified frequency (such as FR2/FR2-2), and the SCS is a specified frequency ( For example, 960KHz), and the transmission period of the uplink/downlink is a specified period (for example, 10ms).
  • FR the sending frequency range
  • SIB1 System Information Block1, SIB1
  • SIB1 System Information Block1, SIB1
  • SCS is a specified frequency (for example, 960KHz)
  • the transmission period of the uplink/downlink is a specified period (for example, 10ms).
  • the terminal may not perform S204, that is, the first target bit and the second target bit are not determined based on the time slot configuration method of the embodiment of the present application.
  • Two target bits For example, when the SCS configured on the network side device is 960KHz, the transmission period is not configured as 10ms, so that the network side device does not need to indicate the format of more time slots through existing bits, and does not need to add new bits to match the existing The bits collectively indicate the slot format.
  • This embodiment of the present application only takes the execution of S204 as an example for illustration.
  • the specific implementation method is as follows:
  • S2041 Determine non-overlapping first bits, second bits, and third bits from multiple bits in the first indication field based on the first manner.
  • the sum of the numbers of the first bit, the second bit and the third bit may be equal to the total number of bits in the first indication field.
  • the first method can be pre-configured by the network side device or predefined by the protocol, that is, the network side device or the protocol can configure or define how many bits in the first indication field are the first bit and how many bits are the second bit. Two bits, how many bits are the third bits. Wherein, the number of the first bit, the second bit and the third bit can be zero, one or more, and the specific number can be determined according to the actual situation, and is not specifically limited here.
  • the network side device may configure (or pre-define by protocol) N bits in the P bits of the first indication field as the first bit, M bits as the second bit, and Q bits as the third bit, where N , M and Q are all integers greater than or equal to 0, and the sum of N, M and Q is less than or equal to P.
  • the positions of the first bit, the second bit and the third bit in the multiple bits of the first indication field may also be configured by the network side device or predefined by the protocol. That is, the network side device or the protocol can configure or define which bit is the first bit, which bit is the second bit, and which bit is the third bit among the multiple bits of the first indication field.
  • the network-side device may configure (or pre-define by protocol) the first N bits of the P bits of the above-mentioned first indication field as the first bit, the middle M bits as the second bit, and the last Q bits as the third bit,
  • the first N bits may be configured as the first bits
  • the last M bits may be configured as the second bits
  • the middle Q bits may be configured as the third bits.
  • other situations may also be used, and examples will not be described here.
  • the network-side device and the protocol may preconfigure or predefine the positions of the first bit, the second bit, and the third bit in the multiple bits of the first indication field in the above-mentioned first manner. That is to say, based on the first method, the terminal can not only determine the number of the first bit, the second bit and the third bit, but also determine the number of the first bit, the second bit and the third bit in the first indication field. specific position in a bit.
  • S2042 Determine non-overlapping fourth bits and fifth bits from the third bits based on the second manner.
  • the terminal may determine non-overlapping fourth bits and fifth bits from the third bits based on the second method.
  • the sum of the numbers of the fourth bits and the fifth bits may be less than or equal to the total number of the third bits.
  • the second mode is pre-configured by the network-side device or predefined by the protocol, that is, it is configured or defined by the network-side device or the protocol how many bits in the third bit can be the fourth bit, and how many bits can be the fifth bit, wherein the first The number of four bits and fifth bits can be zero, one or more.
  • the position of the fourth bit and the fifth bit in the third bit can also be configured by the network side device or predefined by the protocol, that is, the network side device or the protocol can configure or define which bit in the third bit is the fourth bit. bit, which bit is the fifth bit.
  • the network-side device and the protocol may pre-configure or pre-define the positions of the fourth bit and the fifth bit in the third bit through the above-mentioned second manner. That is to say, based on the second method, the terminal can not only determine the respective numbers of the fourth bit and the fifth bit, but also determine the specific positions of the fourth bit and the fifth bit in the third bit.
  • the terminal may specifically determine the sixth bit from the third bit based on the second method, where determining the sixth bit may be determining Which specific bit among the third bits is the sixth bit, after the sixth bit is determined, the fourth bit and the fifth bit may be determined based on the sixth bit.
  • the sixth bit can be one or more bits in the third bit, and the sixth bit is used to indicate the fourth bit and the fifth bit, specifically, it can indicate the respective numbers of the fourth bit and the fifth bit, and indicate The specific positions of the fourth bit and the fifth bit in the third bit.
  • the terminal when determining the fourth bit and the fifth bit based on the sixth bit, may jointly determine the fourth bit and the fifth bit based on the first mapping relationship and the sixth bit.
  • the first mapping relationship can be understood as the mapping relationship between the value of the sixth bit and the number of the fourth bit and the number of the fifth bit.
  • the first mapping relationship can be pre-configured by the network side device or by the protocol Predefined.
  • the fourth bit and the fifth bit jointly indicated by the first preset mapping relationship and the sixth bit are other bits except the sixth bit in the third bit.
  • the first mapping relationship (that is, the value of the sixth bit, the number of the fourth bit, and the number of the fifth bit The mapping relationship between them) can be represented by the following table 1.
  • the number of the fourth bit and the fifth bit in the above Table 1 may also be other numbers.
  • the remaining four bits in the third bit can also be used as the fourth bit, or the first or last one of the remaining bits in the third bit can also be used as the fourth bit.
  • One bit is used as the fourth bit, one of the remaining three bits is used as the fifth bit, and so on, which will not be described here one by one.
  • the terminal when it determines the fourth bit and the fifth bit based on the sixth bit, it may combine one or more bits of the sixth bit to jointly determine the fourth bit and the fifth bit, that is, the sixth bit One or more bits in as the fourth bit or the fifth bit, or as a part of the fourth bit or the fifth bit.
  • the non-overlapping eighth bit and ninth bit may be determined from the seventh bit based on the sixth bit and the second mapping relationship.
  • the seventh bit is other bits except the sixth bit in the third bit, and the number of the seventh bit can be one or more.
  • the determination of the eighth bit and the ninth bit from the seventh bit here may be to determine which bit is the eighth bit and which bit is the ninth bit among the seventh bits.
  • the sum of the numbers of the eighth bits and the ninth bits may be less than or equal to the total number of the seventh bits.
  • the second mapping relationship is a mapping relationship between the value of the sixth bit and the number of the eighth bit and the number of the ninth bit.
  • the second mapping relationship can be the same as the above-mentioned first mapping relationship (the number of the eighth bits is equal to the number of the fourth bits, and the number of the ninth bits).
  • the number of bits is equal to the number of the fifth bit, or the number of the eighth bit is equal to the number of the fifth bit, and the number of the ninth bit is equal to the number of the fourth bit).
  • the fourth bit and the fifth bit can be determined in any of the following ways:
  • the specified bit of the eighth bit and the sixth bit can be determined as the fourth bit, and the ninth bit can be determined as the fifth bit, or the eighth bit can be determined as the fourth bit, and the A designated bit among the nine bits and the sixth bit is determined as the fifth bit.
  • the specified bit in the sixth bit may be one or more bits in the sixth bit, and specifically may be preconfigured by the network side device or predefined by a protocol.
  • the first specified value can be 0 or 1.
  • the difference between the above two methods is that, for the first method, regardless of the value of the specified bit in the sixth bit, the fourth bit or the fifth bit is jointly determined based on the specified bit, while for the second method In terms of the method, only when the value of the specified bit is the first specified value, the fourth bit or the fifth bit is jointly determined based on the specified bit.
  • the specified bit can be used as the highest bit of the fourth bit or the fifth bit, or can be used as the fourth bit or the fifth bit.
  • the lowest bit of the five bits may also be the highest bit or the lowest bit of the first target bit or the second target bit that is finally determined. Specifically, it may be configured by a network-side device or predefined by a protocol, which is not specifically limited here.
  • the second mapping relationship (that is, the value of the sixth bit, the number of the eighth bit, and the number of the ninth bit The mapping relationship between them) can be represented by the following table 2.
  • the rightmost bit in the sixth bit can be used as the specified bit, and the value 1 can be used as the first specified value. In this way, take the sixth bit as 00 and 01 as an example:
  • the rightmost bit in the sixth bit can be used as the fourth bit, and the remaining bits in the third bit 4 bits (that is, the ninth bit) as the fifth bit, or the rightmost bit in the sixth bit as the fifth bit, and the remaining 4 bits in the third bit (that is, the ninth bit) as the fourth bit .
  • the value of the sixth bit is 01
  • the first or last bit (that is, the eighth bit) of the remaining 4 bits of the rightmost bit and the third bit in the sixth bit can be used as the fourth bit , use the remaining other 3 bits (i.e.
  • the ninth bit as the fifth bit, or use the rightmost bit in the sixth bit and the first 3 or last 3 bits in the remaining 4 bits of the third bit ( That is, the ninth bit) is used as the fourth bit, and the remaining one bit (that is, the eighth bit) is used as the fifth bit.
  • the remaining 4 bits (i.e. the ninth bit) in the third bit can be used as the fifth bit, and the sixth bit The number of four bits is 0, or the remaining 4 bits (that is, the ninth bit) in the third bit are used as the fourth bit, and the number of the fifth bit is 0. If the value of the sixth bit is 01, the first or last bit (that is, the eighth bit) of the remaining 4 bits of the rightmost bit and the third bit in the sixth bit can be used as the fourth bit , use the remaining 3 bits (i.e.
  • the ninth bit as the fifth bit, or use the rightmost bit in the sixth bit and the first 3 or last 3 bits of the remaining 4 bits of the third bit (i.e. The ninth bit) is used as the fourth bit, and the remaining 1 bit (that is, the eighth bit) is used as the fifth bit.
  • S2043 Determine the first bit and the fourth bit as the first target bit, and determine the second bit and the fifth bit as the second target bit.
  • the first bit and the fourth bit may be determined as the first target bit
  • the second bit and the fifth bit may be determined as the second target bit. Therefore, through the above S2041 to S2043, the first target bit used to indicate the number of time slots for uplink transmission and the time slot used to indicate downlink transmission can be determined based on the first indication mode indicated by the configuration information issued by the network side device Number of second destination bits.
  • the terminal may jointly determine the first target bit and the second target bit based on the first indication field and the second indication field in the configuration information.
  • the second indication field may include a set number of bits, and the sum of the set number of bits and the number of bits in the first indication field may be equal to the time slot configuration method in the prior art when indicating The total number of bits that need to be used for the number of time slots for uplink and downlink transmission.
  • the format indicating 640 time slots (corresponding to SCS 960KHz and transmission period of 10ms) as an example
  • 10 bits need to be used to indicate the number of time slots for uplink transmission
  • 10 bits The bits indicate the number of time slots for downlink transmission. If the number of bits included in the first indication field is 18, the set number of bits included in the second indication field is 2 bits.
  • the first target bit can be determined from a plurality of bits obtained by combining the first indicator field and the second indicator field based on a third method and the second target bit.
  • the first target bit and the second target bit do not overlap each other in the plurality of bits obtained by the combination, and the sum of the number of the first target bit and the second target bit is equal to the total number of the plurality of bits obtained by the combination number.
  • the third method can be preconfigured by the network side equipment, or predefined by the protocol, and the position of the first target bit and the second target bit in the combined multiple bits can also be preconfigured by the network side equipment, or by the protocol Predefined.
  • the network-side device and the protocol can configure or define the positions of the first target bit and the second target bit in the combined multiple bits in the third way, that is, the terminal can determine the combined multiple bits based on the third way.
  • the bits which bit is the first target bit and which bit is the second target bit.
  • the third method may indicate that the first 9 slots in the first indication field The bit and the first bit in the second indication field are determined as the first target bit, and the remaining 9 bits in the first indication field and another bit in the second indication field are determined as the second target bit.
  • the third method may also indicate that the first 10 bits in the first indication field are determined as the first target bits, and the remaining 8 bits in the first indication field and 2 bits in the second indication field are determined as the first target bits. Two target bits.
  • the third manner may only indicate the number of bits, and the specific position of the bits is configured by the network side device or predefined by the protocol.
  • S206 Determine the number of time slots for uplink transmission based on the first target bit, and determine the number of time slots for downlink transmission based on the second target bit.
  • the terminal After the terminal obtains the first target bit and the second target bit through determination in S204, it may determine the number of time slots for uplink transmission based on the first target bit, and determine the number of time slots for downlink transmission based on the second target bit.
  • the network side device needs to indicate the format of 640 time slots, and the first indication field includes 18 bits. Then, when the terminal determines the first target bit and the second target bit based on the first indication method, if The first bit is 6, the second bit is 6, the fourth bit in the third bit is 2, and the fifth bit is 1, then the number of the first target bit is 8, and the second target bit is 7, assuming that the value of the first target bit is 01000010 and the value of the second target bit is 0010101, it can be determined that the number of time slots for uplink transmission is 67, the number of time slots for downlink transmission is 22, and the remaining time slots can be is a flexible time slot. Among them, the 67 time slots for uplink transmission can be 67 consecutive time slots from the last time slot, and the 22 time slots for downlink transmission can be 22 consecutive time slots starting from the first time slot. All slots can be used as flexible time slots.
  • the network side device when configuring the time slot format, may send configuration information including the first indication field to the terminal, and the configuration information is used to indicate uplink transmission through the first indication mode or the second indication mode
  • the number of time slots and the number of time slots for downlink transmission wherein, the first indication method includes dividing the multiple bits in the first indication field into multiple groups of bits, and performing joint indication through multiple groups of bits, and the second indication method includes the number of bits in the first indication field.
  • An indication field cooperates with other fields for indication.
  • the embodiment of the present application provides a time slot configuration method 300, which can be performed by a network-side device, in other words, the method can be performed by software or hardware installed on the network-side device, and the method includes the following step.
  • the network side device sends configuration information; wherein, the configuration information includes a first indication field, and the configuration information is used to indicate the first target bit and the second target bit through the first indication mode or the second indication mode, and the first target bit uses In order to indicate the number of time slots for uplink transmission, the second target bit is used to indicate the number of time slots for downlink transmission.
  • the first indication method includes dividing the multiple bits in the first indication field into multiple groups of bits, and combining multiple groups of bits Indication, the second indication method includes the first indication field combined with other fields for indication.
  • the network side device When the network side device configures the time slot format, it can send configuration information to the terminal, the configuration information is used to indicate the number of bits used to indicate the number of time slots for uplink transmission through the first indication mode or the second indication mode (ie The first target bit), and the number of bits used to indicate the number of time slots for downlink transmission (ie, the second target bit).
  • the above configuration information may include a first indication field, and the first indication field may consist of one indication field, or may also consist of multiple indication fields.
  • the above-mentioned first indication mode can be understood as changing the bit indication mode without increasing the number of bits, that is, changing the way the terminal understands the bits, so as to realize the use of existing multiple bits to indicate the format of more time slots Specifically, the purpose is to group the existing multiple bits and use the grouped multiple groups of bits for joint indication.
  • the above-mentioned second indication manner can be understood as adding a plurality of bits on the basis of the existing plurality of bits to jointly indicate the number of time slots for uplink and downlink transmission.
  • the multiple bits of the first indication field include the first target bit and the second target bit, and the first target bit and the second target bit The two target bits do not overlap each other, and the sum of the first target bits and the second target bits is less than or equal to the total number of multiple bits.
  • the above-mentioned first indication method is used to indicate the non-overlapping first bit, the second bit and the third bit among the multiple bits through the first method, and indicate the non-overlapping fourth bit and the third bit among the third bits through the second method.
  • the fifth bit wherein the number of the fourth bit and the fifth bit can be zero, one or more.
  • the sum of the first bit, the second bit, and the third bit is equal to the total number of bits in the first indication field, the first target bit includes the first bit and the fourth bit, and the second target bit includes the second bit and fifth bit.
  • the foregoing first manner may be pre-configured by the network side device, or pre-defined by a protocol.
  • the positions of the first bit, the second bit, and the third bit in the multiple bits of the first indication field are preconfigured by the network side device, or predefined by the protocol.
  • the network-side device and the protocol can indicate the positions of the first bit, the second bit, and the third bit in the multiple bits of the first indication field in a first manner, so that the terminal can determine the first indication based on the first manner Among the multiple bits of the field, which bits are the first bits, which bits are the second bits, and which bits are the third bits.
  • the foregoing second mode may be pre-configured by the network side device, or pre-defined by a protocol.
  • the positions of the fourth bit and the fifth bit in the third bit are pre-configured by the network side device, or predefined by the protocol.
  • the network-side device and the protocol can indicate the positions of the fourth bit and the fifth bit in the third bit through the second method, so that the terminal can not only determine the respective numbers of the fourth bit and the fifth bit based on the second method , it is also possible to determine the specific positions of the fourth bit and the fifth bit in the third bit.
  • the second manner is specifically used to determine the sixth bit from the third bit, and the sixth bit is used to indicate the fourth bit and the fifth bit.
  • determining the sixth bit from the third bit may be determining which bit among the third bits is the sixth bit.
  • the sixth bit is used to indicate the fourth bit and the fifth bit through the first mapping relationship.
  • the first mapping relationship is the mapping relationship between the value of the sixth bit and the number of the fourth bit and the number of the fifth bit, and the fourth bit and the fifth bit are the third bits except the sixth bit other bits.
  • the first mapping relationship (that is, the value of the sixth bit and The mapping relationship between the number of the fourth bit and the number of the fifth bit) can be represented by Table 3 below.
  • the number of the fourth bit and the fifth bit indicated by the sixth bit in Table 3 above may also be other numbers, No more examples here.
  • the sixth bit may indicate that the fourth bit or the fifth bit is jointly determined based on a specified bit in the sixth bit.
  • the sixth bit can be used to indicate that the eighth bit in the seventh bit and the specified bit in the sixth bit are determined as the fourth bit, and the ninth bit in the seventh bit determine as the fifth bit, or determine the eighth bit as the fourth bit, and determine a specified bit among the ninth bit and the sixth bit as the fifth bit.
  • the sixth bit is used to determine the eighth bit and the specified bit as the fourth bit and the ninth bit as the fifth bit when the value of the specified bit is the first specified value , or, determining the eighth bit as the fourth bit, and determining the ninth bit and the specified bit as the fifth bit.
  • the seventh bit is other bits except the sixth bit in the third bit, the eighth bit and the ninth bit do not overlap each other, the number of the eighth bit, the number of the ninth bit and the value of the sixth bit There is a second mapping relationship between them, and the sum of the numbers of the eighth bit and the ninth bit is smaller than the total number of the seventh bit.
  • the indication of the eighth bit and the ninth bit here may indicate which specific bit is the eighth bit and the ninth bit.
  • the specified bit in the sixth bit may be one or more bits in the sixth bit, and specifically may be preconfigured by the network side device or predefined by a protocol.
  • the above-mentioned second mapping relationship can be the same as the above-mentioned first mapping relationship (the number of the eighth bits is equal to the number of the fourth bits, and the number of the ninth bits).
  • the number of bits is equal to the number of the fifth bit, or the number of the eighth bit is equal to the number of the fifth bit, and the number of the ninth bit is equal to the number of the fourth bit).
  • the network side device when the network side device indicates that the specified bit in the sixth bit is used as the fourth bit or the fifth bit, it may also indicate or predefine by the protocol whether the specified bit is the highest bit or the lowest bit of the fourth bit/fifth bit, Alternatively, it may also indicate whether the specified bit is the highest bit or the lowest bit of the final determined first target bit/second target bit.
  • the second mapping relationship (that is, the value of the sixth bit and the number of the eighth bit , the mapping relationship between the number of ninth bits) can be represented by the following table 4.
  • Table 4 may indicate that the rightmost bit in the sixth bit is the specified bit, and take the value 1 as the first specified value. In this way, take the sixth bit as 00 and 01 as an example:
  • the sixth bit is used to indicate that the rightmost bit in the sixth bit is used as the fourth bit, and the sixth bit is used as the fourth bit.
  • the remaining 4 bits (i.e. the ninth bit) in the three bits are used as the fifth bit, or used to indicate that the rightmost bit in the sixth bit is used as the fifth bit, and the remaining 4 bits in the third bit (i.e. ninth bit) as the fourth bit.
  • the sixth bit is used to indicate that the rightmost bit in the sixth bit and the first or last bit of the remaining 4 bits of the third bit (that is, the eighth bit ) as the fourth bit, the remaining other 3 bits (i.e. the ninth bit) as the fifth bit, or used to indicate that the rightmost bit of the sixth bit and the first of the remaining 4 bits of the third bit.
  • the 3 or last 3 bits are used as the fourth bit, and the remaining 1 bit (ie, the eighth bit) is used as the fifth bit.
  • the sixth bit is used to indicate that the remaining 4 bits (that is, the ninth bit) in the third bit are used as The fifth bit, the number of the fourth bit is 0, or is used to indicate that the remaining 4 bits (ie, the ninth bit) in the third bit are used as the fourth bit, and the number of the fifth bit is 0. If the value of the sixth bit is 01, then the sixth bit is used to indicate that the rightmost bit in the sixth bit and the first or last bit of the remaining 4 bits of the third bit (that is, the eighth bit ) as the fourth bit, the remaining 3 bits (i.e.
  • the ninth bit as the fifth bit, or used to indicate that the rightmost bit in the sixth bit and the first 3 of the remaining 4 bits in the third bit
  • the first or last 3 bits that is, the ninth bit
  • the remaining 1 bit that is, the eighth bit
  • the configuration information also includes the second indication field, then the network side device indicates the first target bit and the second target bit through the second indication mode.
  • the target bit is specifically indicated by the combination of the first indication field and the second indication field.
  • the second indication field and the first indication field may belong to the same indication domain, that is, the second indication field is a newly added field in the indication domain where the first indication field is located.
  • the second indication field may also belong to a different indication domain from the first indication field, where the indication domain to which the second indication field belongs may be a newly added indication domain, or the second indication field may be a specified indication domain.
  • the designated indication field can be configured by the network side device, or can be predefined by the protocol.
  • the designated indication field can be nrofUplinkSymbols or nrofDownlinkSymbols in the existing TDD-UL-DL-ConfigurationCommon configuration.
  • the network side device when the network side device indicates the first target bit and the second target bit, it can indicate through the first indication mode or the second indication mode, and the specific indication mode can be determined by the network side. Device determined, or predefined according to the protocol.
  • the network side device may indicate the first target bit and the second target bit in a second indication manner.
  • the above-mentioned first preset condition includes at least one of the following: the transmission frequency range of SIB1 is a specified frequency (such as FR2/FR2-2), the SCS is a specified frequency (such as 960KHz), and the transmission period of the uplink/downlink is a specified period (such as 10ms).
  • the transmission frequency range of SIB1 is a specified frequency (such as FR2/FR2-2)
  • the SCS is a specified frequency (such as 960KHz)
  • the transmission period of the uplink/downlink is a specified period (such as 10ms).
  • the second indication field may include a set number of bits.
  • the second indication mode is used to indicate the second target bit through the third mode.
  • a target bit and a second target bit are not overlap each other in the multiple bits obtained by combining the first indication field and the second indication field, and the sum of the number of the first target bit and the second target bit is equal to the number of bits obtained by the combination The total number of bits.
  • the third manner is preconfigured by the network side device, or predefined by the protocol, and the positions of the first target bit and the second target bit in the combined multiple bits are preconfigured by the network side device, or predefined by the protocol.
  • the network-side device and the protocol can configure or define the positions of the first target bit and the second target bit in the multiple bits obtained through the above-mentioned third method, so that the terminal can determine the first indication field based on the third method Which bit among the multiple bits obtained by combining with the second indication field is the first target bit and which bit is the second target bit.
  • the terminal can determine the first indication field based on the third method Which bit among the multiple bits obtained by combining with the second indication field is the first target bit and which bit is the second target bit.
  • the terminal may determine the first target bit and the second target bit based on the configuration information.
  • the specific implementation manner of determining the first target bit and the second target bit by the terminal may refer to the embodiment shown in FIG. 2 , which will not be repeated here.
  • the network side device when configuring the time slot format, may send configuration information including the first indication field to the terminal, and the configuration information is used to indicate uplink transmission through the first indication mode or the second indication mode
  • the number of time slots and the number of time slots for downlink transmission wherein, the first indication method includes dividing the multiple bits in the first indication field into multiple groups of bits, and performing joint indication through multiple groups of bits, and the second indication method includes the number of bits in the first indication field.
  • An indication field cooperates with other fields for indication.
  • the executor may be a time slot configuration device, or a control module in the time slot configuration for executing the time slot configuration method.
  • the time slot configuration method performed by the time slot configuration device is taken as an example to illustrate the time slot configuration device provided in the embodiment of the present application.
  • Fig. 4 is a schematic structural diagram of an apparatus for configuring time slots according to an embodiment of the present application, and the apparatus may correspond to terminals in other embodiments.
  • the device 400 includes the following modules.
  • the receiving module 401 is configured to receive configuration information, the configuration information includes a first indication field, and the configuration information is used to indicate the first target bit and the second target bit through the first indication mode or the second indication mode, the The first target bit is used to indicate the number of time slots for uplink transmission, the second target bit is used to indicate the number of time slots for downlink transmission, and the first indication method includes dividing multiple bits in the first indication field It is multiple groups of bits, and the multiple groups of bits are used for joint indication, and the second indication method includes the joint indication of the first indication field in conjunction with other fields;
  • a first determining module 402 configured to determine the first target bit and the second target bit based on the configuration information
  • the second determining module 403 is configured to determine the number of time slots for uplink transmission based on the first target bit, and determine the number of time slots for downlink transmission based on the second target bit.
  • the first indication field is composed of one or more indication fields.
  • the plurality of bits includes the first target bit and the second target bit, the first target bit and the second target bit do not overlap each other, and the first target bit and the second target bit
  • the sum of the number of target bits is less than or equal to the total number of the plurality of bits.
  • the first determination module 402 is further configured to:
  • the first bit and the fourth bit are determined as the first target bit, and the second bit and the fifth bit are determined as the second target bit.
  • the first mode and the second mode are preconfigured by the network side device, or predefined by a protocol
  • Positions of the first bit, the second bit, the fourth bit, and the fifth bit among the multiple bits are preconfigured by the network side device, or are predefined by a protocol.
  • the first determination module 402 is further configured to:
  • the fourth bit and the fifth bit are determined based on the sixth bit.
  • the first determination module 402 is further configured to:
  • the first mapping relationship is the mapping relationship between the value of the sixth bit and the number of the fourth bit and the number of the fifth bit, and the fourth bit and the number of the fifth bit
  • the five bits are other bits in the third bits except the sixth bit.
  • the first determination module 402 is further configured to:
  • the second mapping relationship is the value of the sixth bit and the eighth bit
  • the mapping relationship between the number of bits and the number of the ninth bit, the seventh bit is other bits in the third bit except the sixth bit;
  • determining the eighth bit and the specified bit as the fourth bit, and determining the ninth bit as the fifth bit or, determining the eighth bit as the fourth bit, and determining the ninth bit and the designated bit as the fifth bit.
  • the configuration information further includes a second indication field, and the second indication manner includes indicating jointly by the first indication field and the second indication field;
  • the first determination module 402 is also used for:
  • the first target bit and the second target bit are determined based on the second indication manner.
  • the second indication field and the first indication field belong to the same indication domain; or,
  • the second indication field and the first indication field belong to different indication domains, wherein the indication domain to which the second indication field belongs is a newly added indication domain, or the second indication field is a specified indication domain available fields.
  • the first preset condition includes at least one of the following:
  • the sending frequency range of the system message block SIB1 is the specified frequency
  • the subcarrier spacing SCS is the specified frequency
  • the transmission period of the uplink/downlink is a specified period.
  • the second indication field includes a set number of bits; wherein, the first determination module 402 is further configured to:
  • the first target bit and the second target bit are mutually different overlap and the sum of the first target bit and the second target bit is equal to the sum of the plurality of bits and the set number;
  • the third mode is pre-configured by the network side equipment, or predefined by the protocol, the first target bit and the second target bit in the plurality of bits and the set number of bits
  • the location is preconfigured by the network side device, or predefined by a protocol.
  • the device 400 according to the embodiment of the present application can refer to the process of the method 200 corresponding to the embodiment of the present application, and each unit/module in the device 400 and the above-mentioned other operations and/or functions are respectively in order to realize the corresponding process in the method 200, And can achieve the same or equivalent technical effect, for the sake of brevity, no more details are given here.
  • Fig. 5 is a schematic structural diagram of an apparatus for configuring time slots according to an embodiment of the present application, and the apparatus may correspond to network-side devices in other embodiments.
  • the device 500 includes the following modules.
  • a sending module 501 configured to send configuration information
  • the configuration information includes a first indication field
  • the configuration information is used to indicate the first target bit and the second target bit through the first indication mode or the second indication mode
  • the first target bit is used to indicate the uplink The number of time slots for transmission
  • the second target bit is used to indicate the number of time slots for downlink transmission
  • the first indication method includes dividing multiple bits in the first indication field into multiple groups of bits, through the A joint indication is performed by multiple groups of bits
  • the second indication manner includes the joint indication by the first indication field in combination with other fields.
  • the first indication field is composed of one or more indication fields.
  • the plurality of bits includes the first target bit and the second target bit, the first target bit and the second target bit do not overlap each other, and the first target bit and the second target bit
  • the sum of the number of target bits is less than or equal to the total number of the plurality of bits.
  • the first indication mode is used to indicate the non-overlapping first bit, second bit, and third bit among the plurality of bits through the first mode, and indicate through the second mode non-overlapping fourth and fifth bits among the third bits;
  • the sum of the number of the first bit, the second bit, and the third bit is equal to the total number of the plurality of bits, and the first target bit includes the first bit and the third bit four bits, the second target bit includes the second bit and the fifth bit.
  • the first mode and the second mode are preconfigured by the network side device, or predefined by a protocol
  • Positions of the first bit, the second bit, the fourth bit, and the fifth bit among the multiple bits are preconfigured by the network side device, or are predefined by a protocol.
  • the second manner is used to determine a sixth bit from the third bit, and the sixth bit is used to indicate the fourth bit and the fifth bit.
  • the sixth bit is used to indicate the fourth bit and the fifth bit through the first mapping relationship
  • the first mapping relationship is a mapping relationship between the value of the sixth bit and the number of the fourth bit and the number of the fifth bit, and the fourth bit and the number of the fifth bit
  • the five bits are other bits in the third bits except the sixth bit.
  • the sixth bit is used to indicate that the eighth bit in the seventh bit and the specified bit in the sixth bit are determined as the fourth bit, and the seventh bit determining the ninth bit of the bits as the fifth bit, or determining the eighth bit as the fourth bit, and determining the ninth bit and the designated bit as the fifth bit;
  • the sixth bit is used to indicate that the eighth bit and the specified bit are determined as the fourth bit when the value of the specified bit is the first specified value, and the determining the ninth bit as the fifth bit, or determining the eighth bit as the fourth bit, and determining the ninth bit and the specified bit as the fifth bit;
  • the seventh bit is other bits except the sixth bit in the third bit, the eighth bit and the ninth bit do not overlap each other, the number of the eighth bit, the There is a second mapping relationship between the number of the ninth bit and the value of the sixth bit.
  • the configuration information further includes a second indication field, and the second indication manner includes indicating jointly by the first indication field and the second indication field;
  • the configuration information is used to indicate the first target bit and the second target bit through the second indication manner.
  • the second indication field and the first indication field belong to the same indication domain; or,
  • the second indication field and the first indication field belong to different indication domains, wherein the indication domain to which the second indication field belongs is a newly added indication domain, or the second indication field is a specified indication domain available fields.
  • the first preset condition includes at least one of the following:
  • the sending frequency range of the system message block SIB1 is the specified frequency
  • the subcarrier spacing SCS is the specified frequency
  • the transmission period of the uplink/downlink is a specified period.
  • the second indication field includes a set number of bits
  • the second indication mode is used to indicate the first target bit and the second target bit in a third mode , the first target bit and the second target bit do not overlap each other, and the sum of the number of the first target bit and the second target bit is equal to the number of the plurality of bits and the set sum of numbers;
  • the third method is pre-configured by the network side device or predefined by the protocol, and the first target bit and the second target bit are divided between the plurality of bits and the set number of bits
  • the location in is preconfigured by the network side device, or predefined by a protocol.
  • the device 500 according to the embodiment of the present application can refer to the process of the method 300 corresponding to the embodiment of the present application, and each unit/module in the device 500 and the above-mentioned other operations and/or functions are respectively in order to realize the corresponding process in the method 300, And can achieve the same or equivalent technical effect, for the sake of brevity, no more details are given here.
  • the time slot configuration apparatus in the embodiment of the present application may be a device, an apparatus having an operating system or an electronic device, or may be a component, an integrated circuit, or a chip in a terminal.
  • the apparatus or electronic equipment may be a mobile terminal or a non-mobile terminal.
  • the mobile terminal may include but not limited to the types of terminals 11 listed above, and the non-mobile terminal may be a server, a network attached storage (Network Attached Storage, NAS), a personal computer (personal computer, PC), a television ( television, TV), teller machines or self-service machines, etc., are not specifically limited in this embodiment of the present application.
  • the time slot configuration device provided in the embodiment of the present application can realize each process realized by the method embodiments in FIG. 2 to FIG. 3 , and achieve the same technical effect. In order to avoid repetition, details are not repeated here.
  • this embodiment of the present application further provides a communication device 600, including a processor 601, a memory 602, and programs or instructions stored in the memory 602 and operable on the processor 601,
  • a communication device 600 including a processor 601, a memory 602, and programs or instructions stored in the memory 602 and operable on the processor 601
  • the communication device 600 is a terminal
  • the program or instruction is executed by the processor 601
  • each process of the above embodiment of the time slot configuration method can be realized, and the same technical effect can be achieved.
  • the communication device 600 is a network-side device
  • the program or instruction is executed by the processor 601
  • each process of the above embodiment of the time slot configuration method can be achieved, and the same technical effect can be achieved. To avoid repetition, details are not repeated here.
  • the embodiment of the present application also provides a terminal, including a processor and a communication interface, the communication interface is used to receive configuration information, the configuration information includes a first indication field, and the configuration information is used to pass the first indication method or the second
  • the indication mode indicates a first target bit and a second target bit, the first target bit is used to indicate the number of time slots for uplink transmission, the second target bit is used to indicate the number of time slots for downlink transmission, and the first indication
  • the method includes dividing multiple bits in the first indication field into multiple groups of bits, and performing joint indication through the multiple groups of bits, and the second indication mode includes using the first indication field in conjunction with other fields to jointly indicate , the processor is configured to determine the first target bit and the second target bit based on the configuration information; determine the number of time slots for uplink transmission based on the first target bit, and determine downlink transmission based on the second target bit number of time slots.
  • FIG. 7 is a schematic diagram of a hardware structure of a terminal implementing an embodiment of the present application.
  • the terminal 700 includes but is not limited to: a radio frequency unit 701, a network module 702, an audio output unit 703, an input unit 704, a sensor 705, a display unit 706, a user input unit 707, an interface unit 708, a memory 709, and a processor 710, etc. at least some of the components.
  • the terminal 700 may also include a power supply (such as a battery) for supplying power to various components, and the power supply may be logically connected to the processor 710 through the power management system, so as to manage charging, discharging, and power consumption through the power management system. Management and other functions.
  • a power supply such as a battery
  • the terminal structure shown in FIG. 7 does not constitute a limitation on the terminal, and the terminal may include more or fewer components than shown in the figure, or combine some components, or arrange different components, which will not be repeated here.
  • the input unit 704 may include a graphics processor (Graphics Processing Unit, GPU) 7041 and a microphone 7042, and the graphics processor 7041 is used for the image capture device (such as the image data of the still picture or video obtained by the camera) for processing.
  • the display unit 706 may include a display panel 7061, and the display panel 7061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 707 includes a touch panel 7071 and other input devices 7072 .
  • the touch panel 7071 is also called a touch screen.
  • the touch panel 7071 may include two parts, a touch detection device and a touch controller.
  • Other input devices 7072 may include, but are not limited to, physical keyboards, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, and joysticks, which will not be repeated here.
  • the radio frequency unit 701 receives the downlink data from the network side device, and processes it to the processor 710; in addition, sends the uplink data to the network side device.
  • the radio frequency unit 701 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the memory 709 can be used to store software programs or instructions as well as various data.
  • the memory 709 may mainly include a program or instruction storage area and a data storage area, wherein the program or instruction storage area may store an operating system, an application program or instructions required by at least one function (such as a sound playback function, an image playback function, etc.) and the like.
  • the memory 709 may include a high-speed random access memory, and may also include a nonvolatile memory, wherein the nonvolatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM) , PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • ROM Read-Only Memory
  • PROM programmable read-only memory
  • PROM erasable programmable read-only memory
  • Erasable PROM Erasable PROM
  • EPROM electrically erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • flash memory for example at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device.
  • the processor 710 may include one or more processing units; optionally, the processor 710 may integrate an application processor and a modem processor, wherein the application processor mainly processes the operating system, user interface and application programs or instructions, etc., Modem processors mainly handle wireless communications, such as baseband processors. It can be understood that the foregoing modem processor may not be integrated into the processor 710 .
  • the radio frequency unit 701 is configured to receive configuration information, the configuration information includes a first indication field, and the configuration information is used to indicate the first target bit and the second target bit through a first indication manner or a second indication manner,
  • the first target bit is used to indicate the number of time slots for uplink transmission
  • the second target bit is used to indicate the number of time slots for downlink transmission
  • the first indication method includes multiple The bits are divided into multiple groups of bits, and the multiple groups of bits are used for joint indication
  • the second indication method includes the joint indication of the first indication field in conjunction with other fields;
  • a processor 710 configured to determine the first target bit and the second target bit based on the configuration information; determine the number of time slots for uplink transmission based on the first target bit, and determine the number of time slots for uplink transmission based on the second target bit The number of time slots for downlink transmission.
  • the network side device when configuring the time slot format, may send configuration information including the first indication field to the terminal, and the configuration information is used to indicate uplink transmission through the first indication mode or the second indication mode
  • the number of time slots and the number of time slots for downlink transmission wherein, the first indication method includes dividing the multiple bits in the first indication field into multiple groups of bits, and performing joint indication through multiple groups of bits, and the second indication method includes the number of bits in the first indication field.
  • An indication field cooperates with other fields for indication.
  • the terminal 700 provided in the embodiment of the present application can also implement various processes in the above embodiment of the time slot configuration method, and can achieve the same technical effect. To avoid repetition, details are not repeated here.
  • the embodiment of the present application also provides a network side device, including a processor and a communication interface, and the communication interface is used to send configuration information; wherein, the configuration information includes a first indication field, and the configuration information is used to pass the first indication
  • the mode or the second indication mode indicates the first target bit and the second target bit, the first target bit is used to indicate the number of time slots for uplink transmission, and the second target bit is used to indicate the number of time slots for downlink transmission, so
  • the first indication method includes dividing multiple bits in the first indication field into multiple groups of bits, and performing joint indication through the multiple groups of bits, and the second indication mode includes combining the first indication field with other fields collectively.
  • the network-side device embodiment corresponds to the above-mentioned network-side device method embodiment, and each implementation process and implementation mode of the above-mentioned method embodiment can be applied to this network-side device embodiment, and can achieve the same technical effect.
  • the embodiment of the present application also provides a network side device.
  • the network device 800 includes: an antenna 81 , a radio frequency device 82 , and a baseband device 83 .
  • the antenna 81 is connected to a radio frequency device 82 .
  • the radio frequency device 82 receives information through the antenna 81, and sends the received information to the baseband device 83 for processing.
  • the baseband device 83 processes the information to be sent and sends it to the radio frequency device 82, and the radio frequency device 82 processes the received information and sends it out through the antenna 81.
  • the foregoing frequency band processing device may be located in the baseband device 83 , and the method performed by the network side device in the above embodiments may be implemented in the baseband device 83 , and the baseband device 83 includes a processor 84 and a memory 85 .
  • Baseband device 83 for example can comprise at least one baseband board, and this baseband board is provided with a plurality of chips, as shown in Fig. The network device operations shown in the above method embodiments.
  • the baseband device 83 may also include a network interface 86 for exchanging information with the radio frequency device 82, such as a common public radio interface (CPRI for short).
  • a network interface 86 for exchanging information with the radio frequency device 82, such as a common public radio interface (CPRI for short).
  • CPRI common public radio interface
  • the network-side device in the embodiment of the present invention also includes: instructions or programs stored in the memory 85 and operable on the processor 84, and the processor 84 calls the instructions or programs in the memory 85 to execute the modules shown in FIG. 5 To avoid duplication, the method of implementation and to achieve the same technical effect will not be repeated here.
  • the embodiment of the present application also provides a readable storage medium, the readable storage medium stores a program or an instruction, and when the program or instruction is executed by a processor, each process of the above embodiment of the time slot configuration method is implemented, and can achieve The same technical effects are not repeated here to avoid repetition.
  • the processor is the processor in the terminal described in the foregoing embodiments.
  • the readable storage medium includes computer readable storage medium, such as computer read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk, etc.
  • the embodiment of the present application further provides a chip, the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the above embodiment of the time slot configuration method Each process, and can achieve the same technical effect, in order to avoid repetition, will not repeat them here.
  • the chip mentioned in the embodiment of the present application may also be called a system-on-chip, a system-on-chip, a system-on-a-chip, or a system-on-a-chip.
  • the term “comprising”, “comprising” or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article or apparatus comprising a set of elements includes not only those elements, It also includes other elements not expressly listed, or elements inherent in the process, method, article, or device. Without further limitations, an element defined by the phrase “comprising a " does not preclude the presence of additional identical elements in the process, method, article, or apparatus comprising that element.
  • the scope of the methods and devices in the embodiments of the present application is not limited to performing functions in the order shown or discussed, and may also include performing functions in a substantially simultaneous manner or in reverse order according to the functions involved. Functions are performed, for example, the described methods may be performed in an order different from that described, and various steps may also be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
  • the methods of the above embodiments can be implemented by means of software plus a necessary general-purpose hardware platform, and of course also by hardware, but in many cases the former is better implementation.
  • the technical solution of the present application can be embodied in the form of computer software products, which are stored in a storage medium (such as ROM/RAM, magnetic disk, etc.) , CD-ROM), including several instructions to make a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种时隙配置方法、终端及网络侧设备,属于终端通信技术领域,本申请实施例的方法包括:终端接收配置信息,配置信息中包括第一指示字段,配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,第一目标比特用于指示上行传输的时隙数目,第二目标比特用于指示下行传输的时隙数目,第一指示方式包括将第一指示字段中的多个比特划分为多组比特,通过多组比特进行联合指示,第二指示方式包括由第一指示字段联合其他字段共同进行指示;基于配置信息确定第一目标比特和第二目标比特;基于第一目标比特确定上行传输的时隙数目,基于第二目标比特确定下行传输的时隙数目。

Description

时隙配置方法、终端及网络侧设备
交叉引用
本发明要求在2021年09月07日提交中国专利局、申请号为202111045970.X、发明名称为“时隙配置方法、终端及网络侧设备”的中国专利申请的优先权,该申请的全部内容通过引用结合在本发明中。
技术领域
本申请属于终端通信技术领域,具体涉及一种时隙配置方法、终端及网络侧设备。
背景技术
在通信系统中,终端和网络侧设备可以使用不同的子载波间隔(Subcarrier Spacing,SCS)进行数据和控制信道的传输。通常,针对不同的子载波间隔而言,一帧内可以包括多个时隙(slot),为了支持更加灵活的调度,特别是在时分双工(Time Division Duplexing,TDD)系统中,可以对每帧内的时隙设计不同的时隙格式,并在通信时由网络侧设备对每帧内的时隙的格式进行配置。其中,时隙的格式具体可以包括以下三种:一个时隙仅用于下行传输、或仅用于上行传输、或为一个混合时隙,网络侧设备在对时隙的格式进行配置时,可以配置用于上行传输的时隙数目以及用于下行传输的时隙数目,其余未配置的时隙可以为灵活的时隙。
目前,通信系统中引入了更高频率的SCS,在SCS的频率较高的情况下,需要配置的时隙数目会急剧增加,这样,网络侧设备在基于目前的方案对每帧内的时隙的格式进行配置时,可能会出现无法对某些时隙的格式进行有效配置的问题。
发明内容
本申请实施例提供一种时隙配置方法、终端及网络侧设备,能够解决在需要配置的时隙数目较多的情况下,网络侧设备基于目前的方案可能无法对每个时隙的格式进行有效配置的问题。
第一方面,提供了一种时隙配置方法,该方法包括:
终端接收配置信息,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示;
基于所述配置信息确定所述第一目标比特和所述第二目标比特;
基于所述第一目标比特确定上行传输的时隙数目,以及基于所述第二目标比特确定下行传输的时隙数目。
第二方面,提供了一种时隙配置装置,该装置包括:
接收模块,用于接收配置信息,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示;
第一确定模块,用于基于所述配置信息确定所述第一目标比特和所述第二目标比特;
第二确定模块,用于基于所述第一目标比特确定上行传输的时隙数目,以及基于所述第二目标比特确定下行传输的时隙数目。
第三方面,提供了一种时隙配置方法,该方法包括:
网络侧设备发送配置信息;
其中,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示。
第四方面,提供了一种时隙配置装置,该装置包括:
发送模块,用于发送配置信息;
其中,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示。
第五方面,提供了一种终端,该终端包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。
第六方面,提供了一种终端,包括处理器及通信接口,其中,所述通信接口用于接收配置信息,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示,所述处理器用于基 于所述配置信息确定所述第一目标比特和所述第二目标比特;基于所述第一目标比特确定上行传输的时隙数目,以及基于所述第二目标比特确定下行传输的时隙数目。
第七方面,提供了一种网络侧设备,该网络侧设备包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第三方面所述的方法的步骤。
第八方面,提供了一种网络侧设备,包括处理器及通信接口,其中,所述通信接口用于发送配置信息;其中,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示。
第九方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤,或者实现如第三方面所述的方法的步骤。
第十方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法,或实现如第三方面所述的方法。
第十一方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在非易失的存储介质中,所述程序/程序产品被至少一个处理器执行以实现如第一方面所述的方法的步骤,或者实现如第三方面所述的方法的步骤。
在本申请实施例中,在对时隙格式进行配置时,网络侧设备可以向终端发送包括第一指示字段的配置信息,该配置信息用于通过第一指示方式或第二指示方式指示上行传输的时隙数目以及下行传输的时隙数目,其中,第一 指示方式包括将第一指示字段中的多个比特划分为多组比特,通过多组比特进行联合指示,第二指示方式包括由第一指示字段联合其他字段共同进行指示。这样,在时隙数目较多的情况下,通过将已有的比特数目划分为多组比特后使用多组比特联合指示不同格式的时隙数目,或增加新的比特数目后结合已有的比特数目共同指示不同格式的时隙数目,可以实现对不同格式的时隙数目的有效指示,从而可以对每个时隙的格式进行有效配置。
附图说明
图1是根据本申请实施例的无线通信系统的示意图;
图2是根据本申请实施例的时隙配置方法的示意性流程图;
图3是根据本申请实施例的时隙配置方法的示意性流程图;
图4是根据本申请实施例的时隙配置装置的结构示意图;
图5是根据本申请实施例的时隙配置装置的结构示意图;
图6是根据本申请实施例的通信设备的结构示意图;
图7是根据本申请实施例的终端的结构示意图;
图8是根据本申请实施例的网络侧设备的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一 类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency-Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,如第6代(6 th Generation,6G)通信系统。
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11和网络侧设备12。其中,终端11也可以称作终端设备或者用户终端(User Equipment,UE),终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、可穿戴式设备(Wearable Device)或车载设备(VUE)、行人终端(PUE)等终端侧设备,可穿戴式设备包括:智能手表、手环、耳机、眼镜等。需要说明的是,在本申请实施例并不限定终端11的具体类型。网络侧设备12可以是基站或核心网,其中,基站可被称为节点B、演进节点B、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无 线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、B节点、演进型B节点(eNB)、家用B节点、家用演进型B节点、无线局域网(Wireless Local Area Network,WLAN)接入点、无线保真(Wireless Fidelity,WiFi)节点、发送接收点(Transmitting Receiving Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例,但是并不限定基站的具体类型。
目前,在TDD通信系统中,网络侧设备在对时隙格式进行配置时,可以采用TDD-上行(Uplink,UL)-下行(Downlink,DL)-ConfigCommon进行配置。具体地,网络侧设备可以通过指示域nrofDownlinkSlots指示下行传输的时隙数目,使用指示域nrofUplinkSlots指示上行传输的时隙数目,其余时隙可以是灵活的时隙(在上行/下行链路的传输周期和SCS确定的情况下,每帧内的时隙数目是固定的,网络侧设备指示了上行传输和下行传输的时隙数目后,剩余数目的时隙即为灵活时隙的数目)。其中,nrofDownlinkSlots和nrofUplinkSlots中均包括特定数量的比特。
在SCS的频率较高的情况下,一帧内的时隙数目会急剧增加,这样,网络侧设备在使用nrofDownlinkSlots和nrofUplinkSlots分别指示下行传输的时隙数目和上行传输的时隙数目时,受限于nrofDownlinkSlots和nrofUplinkSlots中的比特数目,将会出现无法配置其中一部分时隙的格式的问题。
以SCS频率为480KHz和960KHz,传输周期为10ms为例,当SCS的频率为480KHz传输周期为10ms时,一帧内的时隙数目为320个,由于上行传输的时隙数目最大可以是320个(此时下行传输的时隙数目为0),下行传输的时隙数目最大也可以是320个(此时上行传输的时隙数目为0),因此,上述两个指示域nrofDownlinkSlots和nrofUplinkSlots中可以各包含9个比特,由此可以对每个时隙的格式进行有效配置。然而,当SCS的频率为960KHz传输周期为10ms时,一帧内的时隙数目将增加至640个,在这种情 况下,若采用9比特的nrofDownlinkSlots和nrofUplinkSlots分别是指下行传输的时隙数目和上行传输的时隙数目,则最多可以指示512个上行传输/下行传输的时隙数目,在上行传输/下行传输的时隙数目大于512时,将无法通过nrofDownlinkSlots和nrofUplinkSlots进行有效指示。
针对目前可能出现的无法对某些时隙的格式进行有效配置的问题,本申请实施例提供一种时隙配置方法、终端及网络侧设备,在时隙数目较多的情况下,通过将已有的比特数目划分为多组比特后使用多组比特联合指示不同格式的时隙数目,或增加新的比特数目后结合已有的比特数目共同指示不同格式的时隙数目,可以实现对不同格式的时隙数目的有效指示,从而可以对每个时隙的格式进行有效配置。
需要说明的是,本申请实施例可以通过两种不同的方式解决上述技术问题,一种方式是考虑到上行传输的时隙数目和下行传输的时隙数目的总和不超过时隙总数,因此,可以不需要各自分配更多的比特数目来分别指示上行传输的时隙数目和下行传输的时隙数目。比如,在上述SCS为960KHz传输周期为10ms的情况下,可以不需要对nrofDownlinkSlots和nrofUplinkSlots各自分配10个比特。另一种方式是可以增加比特数目,由此可以使用更多数目的比特实现对更多数目的时隙的格式进行配置。比如,在上述SCS为960KHz传输周期为10ms的情况下,可以分别使用10个比特指示上行传输的时隙数目和下行传输的时隙数目。
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的时隙配置方法、终端及网络侧设备进行详细地说明。
如图2所示,本申请实施例提供一种时隙配置方法200,该方法可以由终端执行,换言之,该方法可以由安装在终端的软件或硬件来执行,该方法包括如下步骤。
S202:终端接收配置信息,所配置信息中包括第一指示字段,配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特, 第一目标比特用于指示上行传输的时隙数目,第二目标比特用于指示下行传输的时隙数目,第一指示方式包括将第一指示字段中的多个比特划分为多组比特,通过多组比特进行联合指示,第二指示方式包括由第一指示字段联合其他字段共同进行指示。
网络侧设备在对时隙格式进行配置时,可以向终端发送配置信息,该配置信息用于指示通过第一指示方式或第二指示方式指示用于指示上行传输的时隙数目的比特数目(即第一目标比特),以及用于指示下行传输的时隙数目的比特数目(即第二目标比特)。
上述配置信息中可以包括第一指示字段,该第一指示字段可以由一个指示域组成,或者,也可以由多个指示域组成。可选地,该多个指示域可以是目前的TDD-UL-DL-ConfigurationCommon配置中的两个指示域nrofDownlinkSlots和nrofUplinkSlots。第一指示字段中可以包括多个比特,该多个比特的数目可以是现有技术中用于指示上行传输的时隙数目的比特数和用于指示下行传输的时隙数目的比特数的总数目。当然,该多个比特的数目也可以由网络侧设备根据实际情况进行配置,这里不做具体限定。
上述第一指示方式可以理解为在不增加比特数目的情况下,通过改变比特的指示方式,即改变终端对比特的理解方式,实现使用已有的多个比特对更多时隙的格式进行指示的目的,具体是将已有的多个比特进行分组,使用分组后的多组比特进行联合指示。上述第二指示方式可以理解为在已有的多个比特的基础上新增多个比特以共同指示上下行传输的时隙数目。以需要指示640个时隙(对应SCS为960KHz,传输周期为10ms)为例,上述已有的多个比特可以是用于对320个时隙(对应于SCS为480KHz传输周期为10ms)的格式进行指示的18个比特(包括用于指示上行传输的时隙数目的9个比特和用于指示下行传输的时隙数目的9个比特)。当然,在其他SCS的场景下,该已有的多个比特也可以是其他数目的比特,这里不再一一举例说明。
本实施例中,在配置信息用于通过上述第一指示方式指示上述第一目标 比特和第二目标比特的情况下,第一指示字段中的多个比特中可以包括第一目标比特和第二目标比特。其中,第一目标比特和第二目标比特互不重叠,且,第一目标比特和第二目标比特的个数和小于或等于第一指示字段中的多个比特的总个数。也就是说,网络侧设备可以将第一指示字段中的一个或多个比特作为第一目标比特,将剩余比特中的一个或多个比特作为第二目标比特。
在配置信息用于通过上述第二指示方式指示第一目标比特和第二目标比特的情况下,配置信息中还可以包括第二指示字段,该第二指示字段可以理解为与第一指示字段共同指示第一比特数目和第二比特数目的其他字段,即第二指示方式表征由第一指示字段联合第二指示字段共同进行指示。可选地,第二指示字段和第一指示字段可以属于同一指示域,即第二指示字段为第一指示字段所在的指示域中新增加的字段。或者,第二指示字段也可以和第一指示字段属于不同的指示域,其中,第二指示字段所属的指示域可以是新增的指示域,或者,第二指示字段可以是指定指示域中的可用字段。该指定指示域可以由网络侧设备进行配置,也可以由协议预定义,可选地,该指定指示域可以是现有的TDD-UL-DL-ConfigurationCommon配置中的nrofUplinkSymbols或nrofDownlinkSymbols。
S204:基于配置信息确定第一目标比特和第二目标比特。
终端在接收到来自网络侧设备的配置信息后,可以基于配置信息确定第一目标比特和第二目标比特。
本实施例中,终端在基于配置信息确定第一目标比特和第二目标比特时,可以基于上述第一指示方式确定第一目标比特和第二目标比特,也可以基于上述第二指示方式确定第一目标比特和第二目标比特,具体采用哪种指示方式可以由网络侧设备进行配置,也可以由协议预定义,或者还可以根据实际情况进行判断。其中,终端在根据实际情况进行判断时,在一种可能的实现方式中,可以判断是否满足第一预设条件,若是,则可以基于第二指示方式 确定第一目标比特和第二目标比特,若否,则可以基于第一指示方式确定第一目标比特和第二目标比特。
上述第一预设条件可以包括以下至少一种:系统消息块(System Information Block1,SIB1)的发送频率范围(Frequency range,FR)为指定频率(比如FR2/FR2-2)、SCS为指定频率(比如960KHz)、上行/下行链路的传输周期为指定周期(比如10ms)。
可选地,在某些特定的场景下,若网络侧设备不进行某些参数的配置,则终端可以不执行S204,即不基于本申请实施例的时隙配置方法确定第一目标比特和第二目标比特。比如,在网络侧设备配置的SCS为960KHz时,不配置传输周期为10ms,这样,网络侧设备无需通过已有的比特指示更多时隙的格式,也无需增加新的比特以便与现有的比特共同指示时隙格式。本申请实施例仅以执行S204为例进行说明。
以下将详细说明终端如何分别基于第一指示方式和第二指示方式确定第一目标比特和第二目标比特。
终端在基于第一指示方式确定第一目标比特和第二目标比特时,具体实现方式如下:
S2041:基于第一方式从第一指示字段的多个比特中确定互不重叠的第一比特、第二比特和第三比特。
第一比特、第二比特和第三比特的个数和可以等于第一指示字段中的多个比特的总个数。第一方式可以由网络侧设备预先配置,或由协议预定义,即网络侧设备或协议可以配置或定义第一指示字段的多个比特中有多少个比特为第一比特,多少个比特为第二比特,多少个比特为第三比特。其中,第一比特、第二比特和第三比特的个数可以是零个、一个或多个,具体个数可以根据实际情况确定,这里不做具体限定。比如,网络侧设备可以配置(或协议预定义)第一指示字段的P个比特中的N个比特为第一比特,M个比特为第二比特,Q个比特为第三比特,其中,N、M和Q均为大于或等于0 的整数,且N、M和Q的和小于或等于P。
此外,第一比特、第二比特和第三比特在第一指示字段的多个比特中的位置也可以由网络侧设备配置或由协议预定义。即网络侧设备或协议可以配置或定义第一指示字段的多个比特中具体是哪个比特为第一比特,哪个比特为第二比特,哪个比特为第三比特。比如,网络侧设备可以配置(或协议预定义)上述第一指示字段的P个比特中前N个比特为第一比特,中间M个比特为第二比特,后Q个比特为第三比特,或者也可以配置前N个比特为第一比特,后M个比特为第二比特,中间Q个比特为第三比特,当然也可以是其他情况,这里不再一一举例说明。
可选地,网络侧设备和协议可以通过上述第一方式预先配置或预定义第一比特、第二比特和第三比特在第一指示字段的多个比特中的位置。也就是说,终端基于第一方式不仅可以确定第一比特、第二比特和第三比特各自的个数,还可以确定第一比特、第二比特和第三比特各自在第一指示字段的多个比特中的具体位置。
S2042:基于第二方式从第三比特中确定互不重叠的第四比特和第五比特。
在第三比特的个数为一个或多个的情况下,终端可以基于第二方式从第三比特中确定互不重叠的第四比特和第五比特。第四比特和第五比特的个数和可以小于或等于第三比特的总个数。
第二方式由网络侧设备预先配置或由协议预定义,即由网络侧设备或协议配置或定义第三比特中多少个比特可以是第四比特,多少个比特可以是第五比特,其中,第四比特和第五比特的个数可以是零个、一个或多个。此外,第四比特和第五比特在第三比特中的位置也可以由网络侧设备配置或由协议预定义,即网络侧设备或协议可以配置或定义第三比特中具体是哪个比特为第四比特,哪个比特为第五比特。可选地,网络侧设备和协议可以通过上述第二方式预先配置或预定义第四比特和第五比特在第三比特中的位置。也就是说,终端基于第二方式不仅可以确定第四比特和第五比特各自的个数,还 可以确定第四比特和第五比特各自在第三比特中的具体位置。
终端在基于第二方式从第三比特中确定互不重叠的第四比特和第五比特时,具体可以基于第二方式从第三比特中确定第六比特,这里的确定第六比特可以是确定第三比特中具体是哪个比特为第六比特,在确定第六比特后,可以基于第六比特确定第四比特和第五比特。其中,第六比特可以是第三比特中的一个或多个比特,第六比特用于指示第四比特和第五比特,具体可以是指示第四比特和第五比特各自的个数,以及指示第四比特和第五比特各自在第三比特中的具体位置。
在一种实现方式中,终端在基于第六比特确定第四比特和第五比特时,可以基于第一映射关系和第六比特共同确定第四比特和第五比特。其中,第一映射关系可以理解为第六比特的取值与第四比特的个数、第五比特的个数之间的映射关系,第一映射关系具体可以由网络侧设备预先配置或由协议预定义。通过第一预设映射关系和第六比特共同指示的第四比特和第五比特为第三比特中除第六比特以外的其他比特。
以第三比特为6个比特为例,假设第六比特为其中的前两个比特,则第一映射关系(即第六比特的取值和第四比特的个数、第五比特的个数之间的映射关系)可以由下表1表示。
表1
第六比特的取值 第四比特的个数 第五比特的个数
00 0 4
01 1 3
10 2 2
11 3 1
从表1可以看出,在第六比特取值为00时,可以将第三比特的剩余比特均作为第五比特,第四比特的个数为0。在第六比特取值为01时,可以将第三比特的剩余比特中的第1个或最后1个比特作为第四比特,其余3个可以 作为第五比特。在第六比特取值为10时,可以将第三比特的剩余比特中的前2个或后2个比特作为第四比特,其余2个可以作为第五比特。在第六比特取值为11时,可以将第三比特的剩余比特中的前3个或后3个比特作为第四比特,其余1个作为第五比特。
当然,在其他实现方式,在第六比特的取值为00/01/10/11时,上述表1中的第四比特和第五比特的个数还可以是其他个数。比如,在第六比特取值为00时,也可以将第三比特中的其余4个比特均作为第四比特,或者,也可以将第三比特的剩余比特中的第1个或最后1个比特作为第四比特,剩余3个比特中的1个比特作为第五比特,等等,这里不再一一举例说明。
在另一种实现方式中,终端在基于第六比特确定第四比特和第五比特时,可以结合第六比特中的一个或多个比特共同确定第四比特和第五比特,即将第六比特中的一个或多个比特作为第四比特或第五比特,或作为第四比特或第五比特中的一部分。
具体地,可以基于第六比特和第二映射关系,从第七比特中确定互不重叠的第八比特和第九比特。第七比特为第三比特中除第六比特以外的其他比特,第七比特的个数可以是一个或多个。这里的从第七比特中确定第八比特和第九比特可以是,确定第七比特中具体哪个比特是第八比特哪个比特是第九比特。第八比特和第九比特的个数和可以小于或等于第七比特的总个数。第二映射关系为第六比特的取值与第八比特的个数、第九比特的个数之间的映射关系。可选地,在第六比特的个数为固定个数的情况下,该第二映射关系可以与上述第一映射关系相同(第八比特的个数等于第四比特的个数,第九比特的个数等于第五比特的个数,或,第八比特的个数等于第五比特的个数,第九比特的个数等于第四比特的个数)。
在基于第二映射关系和第六比特确定第八比特和第九比特后,可以通过以下任一种方式确定第四比特和第五比特:
第一种方式:可以将第八比特和第六比特中的指定比特确定为第四比特, 以及将第九比特确定为第五比特,或者,将第八比特确定为第四比特,以及将第九比特和第六比特中的指定比特确定为第五比特。其中,第六比特中的指定比特可以是第六比特中的一个或多个比特,具体可以由网络侧设备预先配置或由协议预定义。
第二种方式:在上述指定比特的取值为第一指定值的情况下,将第八比特和该指定比特确定为第四比特,以及将第九比特确定为第五比特,或,将第八比特确定为第四比特,以及将第九比特和指定比特确定为第五比特。第一指定值可以是0,也可以是1。
上述两种方式的区别在于,针对第一种方式而言,不论第六比特中的指定比特的取值为多少,均基于该指定比特共同确定第四比特或第五比特,而针对第二种方式而言,只有在指定比特的取值为第一指定值的情况下,才基于该指定比特共同确定第四比特或第五比特。
需要说明的是,在基于第六比特中的指定比特共同确定第四比特或第五比特时,可以将该指定比特作为第四比特或第五比特的最高位,也可以作为第四比特或第五比特的最低位,或者,也可以是作为最终确定得到的第一目标比特或第二目标比特的最高位或最低位。具体可以由网络侧设备配置或由协议预定义,这里不做具体限定。
以第三比特为6个比特为例,假设第六比特为其中的前2个比特,则第二映射关系(即第六比特的取值和第八比特的个数、第九比特的个数之间的映射关系)可以由下表2表示。
表2
第六比特的取值 第八比特的个数 第九比特的个数
00 0 4
01 1 3
10 2 2
11 3 1
表2中可以将第六比特中最右侧的比特作为上述指定比特,将取值1作为上述第一指定值。这样,以第六比特取值为00和01为例:
在基于上述第一种方式确定第四比特和第五比特时,若第六比特取值为00,则可以将第六比特中最右侧的比特作为第四比特,将第三比特中剩余的4个比特(即第九比特)作为第五比特,或将第六比特中最右侧的比特作为第五比特,将第三比特中剩余的4个比特(即第九比特)作为第四比特。若第六比特取值为01,则可以将第六比特中最右侧的比特和第三比特的剩余4个比特中的第1个或最后1个比特(即第八比特)作为第四比特,将剩余的其他3个比特(即第九比特)作为第五比特,或将第六比特中最右侧的比特和第三比特的剩余4个比特中的前3个或后3个比特(即第九比特)作为第四比特,将剩余的1个比特(即第八比特)作为第五比特。
在基于上述第二种方式确定第四比特和第五比特时,若第六比特取值为00,则可以将第三比特中剩余的4个比特(即第九比特)作为第五比特,第四比特的个数为0,或将第三比特中剩余的4个比特(即第九比特)作为第四比特,第五比特的个数为0。若第六比特取值为01,则可以将第六比特中最右侧的比特和第三比特的剩余4个比特中的第1个或最后1个比特(即第八比特)作为第四比特,将剩余的3个比特(即第九比特)作为第五比特,或将第六比特中最右侧的比特和第三比特的剩余4个比特中的前3个或后3个比特(即第九比特)作为第四比特,将剩余的1个比特(即第八比特)作为第五比特。
当然,上述表2中的第八比特的个数和第九比特的个数仅为示例性说明,在其他实现方式中,还可以是其他个数,这里不再一一举例说明。
S2043:将第一比特和第四比特确定为第一目标比特,以及将第二比特和第五比特确定为第二目标比特。
在通过S2042确定第四比特和第五比特后,可以将第一比特和第四比特确定为第一目标比特,将第二比特和第五比特确定为第二目标比特。由此通 过上述S2041至S2043,可以基于网络侧设备下发的配置信息所指示的第一指示方式,确定用于指示上行传输的时隙数目的第一目标比特和用于指示下行传输的时隙数目的第二目标比特。
终端在基于上述第二指示方式确定第一目标比特和第二目标比特时,可以基于配置信息中的第一指示字段和第二指示字段共同确定第一目标比特和第二目标比特。其中,第二指示字段中可以包括设定个数的比特,该设定个数的比特与第一指示字段中的多个比特的个数和可以等于现有技术中的时隙配置方法在指示上下行传输的时隙数目时需要使用的比特总数。以指示640个时隙(对应SCS为960KHz,传输周期为10ms)的格式为例,在使用现有的时隙配置方法进行指示时,需要使用10个比特指示上行传输的时隙数目,10个比特指示下行传输的时隙数目,若第一指示字段中包括的比特数目为18,则第二指示字段中包括的设定个数的比特为2个比特。
在基于第一指示字段和第二指示字段确定第一目标比特和第二目标比特时,可以基于第三方式从第一指示字段和第二指示字段组合得到的多个比特中确定第一目标比特和第二目标比特。其中,该第一目标比特和第二目标比特在该组合得到的多个比特中互不重叠,且第一目标比特和第二目标比特的个数和等于该组合得到的多个比特的总个数。第三方式可以由网络侧设备预先配置,或由协议预定义,且,第一目标比特和第二目标比特在组合得到的多个比特中的位置也可以由网络侧设备预先配置,或由协议预定义。可选地,网络侧设备和协议可以通过上述第三方式配置或定义第一目标比特和第二目标比特在组合得到的多个比特中的位置,即终端基于第三方式可以确定组合得到的多个比特中具体哪个比特为第一目标比特,哪个比特为第二目标比特。
以第一指示字段中包括18个比特,第二指示字段中包括2个比特为例,在对640个时隙的格式进行指示时,第三方式可以指示将第一指示字段中的前9个比特和第二指示字段中的第一个比特确定为第一目标比特,将第一指示字段中的其余9个比特和第二指示字段中的另一个比特确定为第二目标比 特。或者,第三方式也可以指示将第一指示字段中的前10个比特确定为第一目标比特,将第一指示字段中的其余8个比特和第二指示字段中的2个比特确定为第二目标比特。或者,第三方式可以仅对比特数目进行指示,比特的具体位置由网络侧设备配置或由协议预定义。
S206:基于第一目标比特确定上行传输的时隙数目,以及基于第二目标比特确定下行传输的时隙数目。
终端在通过S204中的方式确定得到第一目标比特和第二目标比特后,可以基于第一目标比特确定上行传输的时隙数目,基于第二目标比特确定下行传输的时隙数目。
比如,网络侧设备需要对640个时隙的格式进行指示,第一指示字段中包括18个比特,那么,在终端基于第一指示方式确定第一目标比特和第二目标比特的情况下,若第一比特为6个,第二比特为6个,第三比特中的第四比特为2个,第五比特为1个,则第一目标比特的个数为8个,第二目标比特为7个,假设第一目标比特的取值为01000010,第二目标比特的取值为0010101,则可以确定上行传输的时隙数目为67,下行传输的时隙数目为22,其余的时隙可以是灵活的时隙。其中,上行传输的67个时隙可以是从最后一个时隙往前连续67个时隙,下行传输的22个时隙可以是从第一个时隙开始的连续22个时隙,中间的时隙可以均作为灵活的时隙。
在本申请实施例中,在对时隙格式进行配置时,网络侧设备可以向终端发送包括第一指示字段的配置信息,该配置信息用于通过第一指示方式或第二指示方式指示上行传输的时隙数目以及下行传输的时隙数目,其中,第一指示方式包括将第一指示字段中的多个比特划分为多组比特,通过多组比特进行联合指示,第二指示方式包括由第一指示字段联合其他字段共同进行指示。这样,在时隙数目较多的情况下,通过将已有的比特数目划分为多组比特后使用多组比特联合指示不同格式的时隙数目,或增加新的比特数目后结合已有的比特数目共同指示不同格式的时隙数目,可以实现对不同格式的时 隙数目的有效指示,从而可以对每个时隙的格式进行有效配置。
如图3所示,本申请实施例提供一种时隙配置方法300,该方法可以由网络侧设备执行,换言之,该方法可以由安装在网络侧设备的软件或硬件来执行,该方法包括如下步骤。
S302:网络侧设备发送配置信息;其中,配置信息中包括第一指示字段,配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,第一目标比特用于指示上行传输的时隙数目,第二目标比特用于指示下行传输的时隙数目,第一指示方式包括将第一指示字段中的多个比特划分为多组比特,通过多组比特进行联合指示,第二指示方式包括由第一指示字段联合其他字段共同进行指示。
网络侧设备在对时隙格式进行配置时,可以向终端发送配置信息,该配置信息用于指示通过第一指示方式或第二指示方式指示用于指示上行传输的时隙数目的比特数目(即第一目标比特),以及用于指示下行传输的时隙数目的比特数目(即第二目标比特)。
上述配置信息中可以包括第一指示字段,该第一指示字段可以由一个指示域组成,或者,也可以由多个指示域组成。上述第一指示方式可以理解为在不增加比特数目的情况下,通过改变比特的指示方式,即改变终端对比特的理解方式,实现使用已有的多个比特对更多时隙的格式进行指示的目的,具体是将已有的多个比特进行分组,使用分组后的多组比特进行联合指示。上述第二指示方式可以理解为在已有的多个比特的基础上新增多个比特以共同指示上下行传输的时隙数目。对第一指示字段、第一指示方式和第二指示方式的详细理解可以参见图2所示实施例中的相应内容,这里不再重复说明。
在配置信息用于通过第一指示方式指示第一目标比特和第二目标比特的情况下,第一指示字段的多个比特中包括第一目标比特和第二目标比特,第一目标比特和第二目标比特互不重叠,且第一目标比特和所述第二目标比特的个数和小于或等于多个比特的总个数。
上述第一指示方式用于通过第一方式指示多个比特中互不重叠的第一比特和第二比特和第三比特,以及通过第二方式指示第三比特中互不重叠的第四比特和第五比特,其中,第四比特和第五比特的个数可以是零个、一个或多个。第一比特、第二比特、第三比特的个数和等于第一指示字段中的多个比特的总个数,第一目标比特包括第一比特和第四比特,第二目标比特包括第二比特和第五比特。
上述第一方式可以由网络侧设备预先配置,或由协议预定义。第一比特、第二比特、第三比特在第一指示字段的多个比特中的位置由网络侧设备预先配置,或由协议预定义。可选地,网络侧设备和协议可以通过第一方式指示第一比特、第二比特、第三比特在第一指示字段的多个比特中的位置,以便终端可以基于第一方式确定第一指示字段的多个比特中哪些比特为第一比特、哪些比特为第二比特、哪些比特为第三比特。
上述第二方式可以由网络侧设备预先配置,或由协议预定义。第四比特和第五比特在第三比特中的位置由网络侧设备预先配置,或由协议预定义。可选地,网络侧设备和协议可以通过第二方式指示第四比特和第五比特在第三比特中的位置,以便终端基于第二方式不仅可以确定第四比特和第五比特各自的个数,还可以确定第四比特和第五比特各自在第三比特中的具体位置。
本实施例中,第二方式具体用于从第三比特中确定第六比特,第六比特用于指示第四比特和第五比特。这里的从第三比特确定第六比特可以是确定第三比特中具体是哪个比特为第六比特。在通过第六比特指示第四比特和第五比特时,至少可以通过以下两种实现方式进行指示。
在一种实现方式中,第六比特用于通过第一映射关系指示第四比特和第五比特。其中,第一映射关系为第六比特的取值与第四比特的个数、第五比特的个数之间的映射关系,第四比特和第五比特为第三比特中除第六比特以外的其他比特。
以网络侧设备指示第三比特为6个比特为例,假设网络侧设备还指示了 第六比特为第三比特中的前两个比特,则第一映射关系(即第六比特的取值和第四比特的个数、第五比特的个数之间的映射关系)可以由下表3表示。
表3
第六比特的取值 第四比特的个数 第五比特的个数
00 0 4
01 1 3
10 2 2
11 3 1
从表3可以看出,在第六比特取值为00时,用于指示将第三比特的剩余比特均作为第五比特,第四比特的个数为0。在第六比特取值为01时,用于指示将第三比特的剩余比特中的第1个或最后1个比特作为第四比特,其余3个可以作为第五比特。在第六比特取值为10时,用于指示将第三比特的剩余比特中的前2个或后2个比特作为第四比特,其余2个可以作为第五比特。在第六比特取值为11时,用于指示将第三比特的剩余比特中的前3个或后3个比特作为第四比特,其余1个作为第五比特。
当然,在其他实现方式,在第六比特的取值为00/01/10/11时,上述表3中第六比特指示的第四比特和第五比特的个数还可以是其他个数,这里不再一一举例说明。
在另一种实现方式中,第六比特可以指示基于第六比特中的指定比特共同确定第四比特或第五比特。具体地,在第一种方式中,第六比特可以用于指示将第七比特中的第八比特和第六比特中的指定比特确定为第四比特,以及将第七比特中的第九比特确定为第五比特,或,将第八比特确定为第四比特,以及将第九比特和第六比特中的指定比特确定为第五比特。在第二种方式中,第六比特用于在指定比特的取值为第一指定值的情况下,将第八比特和指定比特确定为第四比特,以及将第九比特确定为第五比特,或,将第八比特确定为第四比特,以及将第九比特和指定比特确定为所述第五比特。其 中,第七比特为第三比特中除第六比特以外的其他比特,第八比特和第九比特互不重叠,第八比特的个数、第九比特的个数与第六比特的取值之间存在第二映射关系,且第八比特和第九比特的个数和小于第七比特的总个数。这里的指示第八比特和第九比特可以是指示具体哪个比特为第八比特和第九比特。
第六比特中的指定比特可以是第六比特中的一个或多个比特,具体可以由网络侧设备预先配置或由协议预定义。可选地,在第六比特的个数为固定个数的情况下,上述第二映射关系可以与上述第一映射关系相同(第八比特的个数等于第四比特的个数,第九比特的个数等于第五比特的个数,或,第八比特的个数等于第五比特的个数,第九比特的个数等于第四比特的个数)。
此外,网络侧设备在指示第六比特中的指定比特作为第四比特或第五比特时,还可以指示或由协议预定义该指定比特是第四比特/第五比特的最高位还是最低位,或者,还可以指示该指定比特是最终确定得到的第一目标比特/第二目标比特的最高位还是最低位。
以第三比特为6个比特为例,假设网络侧设备指示第六比特为第三比特中的前2个比特,则第二映射关系(即第六比特的取值和第八比特的个数、第九比特的个数之间的映射关系)可以由下表4表示。
表4
第六比特的取值 第八比特的个数 第九比特的个数
00 0 4
01 1 3
10 2 2
11 3 1
表4中可以指示第六比特中最右侧的比特为上述指定比特,将取值1作为上述第一指定值。这样,以第六比特取值为00和01为例:
在基于上述第一种方式指示第四比特和第五比特时,若第六比特取值为 00,则第六比特用于指示将第六比特中最右侧的比特作为第四比特,将第三比特中剩余的4个比特(即第九比特)作为第五比特,或用于指示将第六比特中最右侧的比特作为第五比特,将第三比特中剩余的4个比特(即第九比特)作为第四比特。若第六比特取值为01,则第六比特用于指示将第六比特中最右侧的比特和第三比特的剩余4个比特中的第1个或最后1个比特(即第八比特)作为第四比特,将剩余的其他3个比特(即第九比特)作为第五比特,或用于指示将第六比特中最右侧的比特和第三比特的剩余4个比特中的前3个或后3个比特(即第九比特)作为第四比特,将剩余的1个比特(即第八比特)作为第五比特。
在基于上述第二种方式指示第四比特和第五比特时,若第六比特取值为00,则第六比特用于指示将第三比特中剩余的4个比特(即第九比特)作为第五比特,第四比特的个数为0,或用于指示将第三比特中剩余的4个比特(即第九比特)作为第四比特,第五比特的个数为0。若第六比特取值为01,则第六比特用于指示将第六比特中最右侧的比特和第三比特的剩余4个比特中的第1个或最后1个比特(即第八比特)作为第四比特,将剩余的3个比特(即第九比特)作为第五比特,或用于指示将第六比特中最右侧的比特和第三比特的剩余4个比特中的前3个或后3个比特(即第九比特)作为第四比特,将剩余的1个比特(即第八比特)作为第五比特。
当然,上述表4中第六比特所指示的第八比特的个数和第九比特的个数仅为示例性说明,在其他实现方式中,还可以指示其他个数,这里不再一一举例说明。
网络侧设备在通过上述第二指示方式指示第一目标比特和第二目标比特时,配置信息中还包括第二指示字段,那么,网络侧设备通过第二指示方式指示第一目标比特和第二目标比特,具体是由第一指示字段联合第二指示字段共同进行指示。
第二指示字段和第一指示字段可以属于同一指示域,即第二指示字段为 第一指示字段所在的指示域中新增加的字段。或者,第二指示字段也可以和第一指示字段属于不同的指示域,其中,第二指示字段所属的指示域可以是新增的指示域,或者,第二指示字段可以是指定指示域中的可用字段。该指定指示域可以由网络侧设备进行配置,也可以由协议预定义,可选地,该指定指示域可以是现有的TDD-UL-DL-ConfigurationCommon配置中的nrofUplinkSymbols或nrofDownlinkSymbols。
需要说明的是,网络侧设备在指示第一目标比特和第二目标比特时,可以通过第一指示方式进行指示,也可以通过第二指示方式进行指示,具体采用哪种指示方式可以由网络侧设备确定,或根据协议预定义。可选地,在满足第一预设条件的情况下,网络侧设备可以通过第二指示方式指示第一目标比特和第二目标比特。
上述第一预设条件包括以下至少一项:SIB1的发送频率范围为指定频率(比如FR2/FR2-2)、SCS为指定频率(比如960KHz)、上行/下行链路的传输周期为指定周期(比如10ms)。
第二指示字段中可以包括设定个数的比特,网络侧设备在通过第二指示方式指示第一目标比特和第二目标比特时,具体地,第二指示方式用于通过第三方式指示第一目标比特和第二目标比特。该第一目标比特和第二目标比特在第一指示字段和第二指示字段组合得到的多个比特中互不重叠,且第一目标比特和第二目标比特的个数和等于该组合得到的多个比特的总个数。第三方式由网络侧设备预先配置,或由协议预定义,第一目标比特和第二目标比特在组合得到的多个比特中的位置由网络侧设备预先配置,或由协议预定义。可选地,网络侧设备和协议可以通过上述第三方式配置或定义第一目标比特和第二目标比特在组合得到的多个比特中的位置,以便终端可以基于第三方式确定第一指示字段和第二指示字段组合得到的多个比特中具体哪个比特为第一目标比特,哪个比特为第二目标比特。具体可以参见图2所示实施例中的相应内容,这里不再重复描述。
本实施例中,网络侧设备在将配置信息发送给终端后,终端可以基于配置信息确定第一目标比特和第二目比特。其中,终端确定第一目标比特和第二目比特具体实现方式可以参见图2所示的实施例,这里不再重复说明。
在本申请实施例中,在对时隙格式进行配置时,网络侧设备可以向终端发送包括第一指示字段的配置信息,该配置信息用于通过第一指示方式或第二指示方式指示上行传输的时隙数目以及下行传输的时隙数目,其中,第一指示方式包括将第一指示字段中的多个比特划分为多组比特,通过多组比特进行联合指示,第二指示方式包括由第一指示字段联合其他字段共同进行指示。这样,在时隙数目较多的情况下,通过将已有的比特数目划分为多组比特后使用多组比特联合指示不同格式的时隙数目,或增加新的比特数目后结合已有的比特数目共同指示不同格式的时隙数目,可以实现对不同格式的时隙数目的有效指示,从而可以对每个时隙的格式进行有效配置。
需要说明的是,本申请实施例提供的时隙配置方法,执行主体可以为时隙配置装置,或者,该时隙配置中的用于执行时隙配置的方法的控制模块。本申请实施例中以时隙配置装置执行时隙配置方法为例,说明本申请实施例提供的时隙配置装置。
图4是根据本申请实施例的时隙配置装置的结构示意图,该装置可以对应于其他实施例中的终端。如图4所示,装置400包括如下模块。
接收模块401,用于接收配置信息,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示;
第一确定模块402,用于基于所述配置信息确定所述第一目标比特和所述第二目标比特;
第二确定模块403,用于基于所述第一目标比特确定上行传输的时隙数目,以及基于所述第二目标比特确定下行传输的时隙数目。
可选的,作为一个实施例,所述第一指示字段由一个或多个指示域组成。
可选的,作为一个实施例,在所述配置信息用于通过所述第一指示方式指示所述第一目标比特和所述第二目标比特的情况下:
所述多个比特中包括所述第一目标比特和所述第二目标比特,所述第一目标比特和所述第二目标比特互不重叠,且所述第一目标比特和所述第二目标比特的个数和小于或等于所述多个比特的总个数。
可选的,作为一个实施例,所述第一确定模块402,还用于:
基于第一方式从所述多个比特中确定互不重叠的第一比特、第二比特和第三比特,所述第一比特、所述第二比特、所述第三比特的个数和等于所述多个比特的总个数;
基于第二方式从所述第三比特中确定互不重叠的第四比特和第五比特;
将所述第一比特和所述第四比特确定为所述第一目标比特,以及将所述第二比特和所述第五比特确定为所述第二目标比特。
可选的,作为一个实施例,所述第一方式和所述第二方式由网络侧设备预先配置,或由协议预定义;
所述第一比特、所述第二比特、所述第四比特和所述第五比特在所述多个比特中的位置由所述网络侧设备预先配置,或由协议预定义。
可选的,作为一个实施例,所述第一确定模块402,还用于:
基于所述第二方式从所述第三比特中确定第六比特,所述第六比特用于指示所述第四比特和所述第五比特;
基于所述第六比特确定所述第四比特和所述第五比特。
可选的,作为一个实施例,所述第一确定模块402,还用于:
基于第一映射关系和所述第六比特确定所述第四比特和所述第五比特;
其中,所述第一映射关系为所述第六比特的取值与所述第四比特的个数、 所述第五比特的个数之间的映射关系,所述第四比特和所述第五比特为所述第三比特中除所述第六比特以外的其他比特。
可选的,作为一个实施例,所述第一确定模块402,还用于:
基于所述第六比特和第二映射关系,从第七比特中确定互不重叠的第八比特和第九比特,所述第二映射关系为所述第六比特的取值与所述第八比特的个数、所述第九比特的个数之间的映射关系,所述第七比特为所述第三比特中除所述第六比特以外的其他比特;
基于以下任一项确定所述第四比特和所述第五比特:
将所述第八比特和所述第六比特中的指定比特确定为所述第四比特,以及将所述第九比特确定为所述第五比特,或,将所述第八比特确定为所述第四比特,以及将所述第九比特和所述指定比特确定为所述第五比特;
在所述指定比特的取值为第一指定值的情况下,将所述第八比特和所述指定比特确定为所述第四比特,以及将所述第九比特确定为所述第五比特,或,将所述第八比特确定为所述第四比特,以及将所述第九比特和所述指定比特确定为所述第五比特。
可选的,作为一个实施例,所述配置信息中还包括第二指示字段,所述第二指示方式包括由所述第一指示字段联合所述第二指示字段共同进行指示;
其中,所述第一确定模块402,还用于:
在满足第一预设条件的情况下,基于所述第二指示方式确定所述第一目标比特和所述第二目标比特。
可选的,作为一个实施例,第二指示字段和所述第一指示字段属于同一指示域;或,
所述第二指示字段和所述第一指示字段属于不同的指示域,其中,所述第二指示字段所属的指示域为新增的指示域,或所述第二指示字段为指定指示域中的可用字段。
可选的,作为一个实施例,所述第一预设条件包括以下至少一项:
系统消息块SIB1的发送频率范围为指定频率;
子载波间隔SCS为指定频率;
上行/下行链路的传输周期为指定周期。
可选的,作为一个实施例,所述第二指示字段中包括设定个数的比特;其中,所述第一确定模块402,还用于:
基于第三方式从所述多个比特和所述设定个数的比特中确定所述第一目标比特和所述第二目标比特,所述第一目标比特和所述第二目标比特互不重叠且所述第一目标比特和所述第二目标比特的个数和等于所述多个比特的个数与所述设定个数的和;
其中,所述第三方式由网络侧设备预先配置,或由协议预定义,所述第一目标比特和所述第二目标比特在所述多个比特和所述设定个数的比特中的位置由所述网络侧设备预先配置,或由协议预定义。
根据本申请实施例的装置400可以参照对应本申请实施例的方法200的流程,并且,该装置400中的各个单元/模块和上述其他操作和/或功能分别为了实现方法200中的相应流程,并且能够达到相同或等同的技术效果,为了简洁,在此不再赘述。
图5是根据本申请实施例的时隙配置装置的结构示意图,该装置可以对应于其他实施例中的网络侧设备。如图5所示,装置500包括如下模块。
发送模块501,用于发送配置信息;
其中,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示。
可选的,作为一个实施例,所述第一指示字段由一个或多个指示域组成。
可选的,作为一个实施例,在所述配置信息用于通过所述第一指示方式指示所述第一目标比特和所述第二目标比特的情况下:
所述多个比特中包括所述第一目标比特和所述第二目标比特,所述第一目标比特和所述第二目标比特互不重叠,且所述第一目标比特和所述第二目标比特的个数和小于或等于所述多个比特的总个数。
可选的,作为一个实施例,所述第一指示方式用于通过第一方式指示所述多个比特中互不重叠的第一比特和第二比特和第三比特,以及通过第二方式指示所述第三比特中互不重叠的第四比特和第五比特;
其中,所述第一比特、所述第二比特、所述第三比特的个数和等于所述多个比特的总个数,所述第一目标比特包括所述第一比特和所述第四比特,所述第二目标比特包括所述第二比特和所述第五比特。
可选的,作为一个实施例,所述第一方式和所述第二方式由所述网络侧设备预先配置,或由协议预定义;
所述第一比特、所述第二比特、所述第四比特和所述第五比特在所述多个比特中的位置由所述网络侧设备预先配置,或由协议预定义。
可选的,作为一个实施例,所述第二方式用于从所述第三比特中确定第六比特,所述第六比特用于指示所述第四比特和所述第五比特。
可选的,作为一个实施例,所述第六比特用于通过第一映射关系指示所述第四比特和所述第五比特;
其中,所述第一映射关系为所述第六比特的取值与所述第四比特的个数、所述第五比特的个数之间的映射关系,所述第四比特和所述第五比特为所述第三比特中除所述第六比特以外的其他比特。
可选的,作为一个实施例,所述第六比特用于指示将第七比特中的第八比特和所述第六比特中的指定比特确定为所述第四比特,以及将所述第七比特中的第九比特确定为所述第五比特,或,将所述第八比特确定为所述第四比特,以及将所述第九比特和所述指定比特确定为第五比特;
或,所述第六比特用于在所述指定比特的取值为第一指定值的情况下,指示将所述第八比特和所述指定比特确定为所述第四比特,以及将所述第九比特确定为所述第五比特,或,将所述第八比特确定为所述第四比特,以及将所述第九比特和所述指定比特确定为所述第五比特;
其中,所述第七比特为所述第三比特中除所述第六比特以外的其他比特,所述第八比特和所述第九比特互不重叠,所述第八比特的个数、所述第九比特的个数与所述第六比特的取值之间存在第二映射关系。
可选的,作为一个实施例,所述配置信息中还包括第二指示字段,所述第二指示方式包括由所述第一指示字段联合所述第二指示字段共同进行指示;
其中,在满足第一预设条件的情况下,所述配置信息用于通过所述第二指示方式指示所述第一目标比特和所述第二目标比特。
可选的,作为一个实施例,第二指示字段和所述第一指示字段属于同一指示域;或,
所述第二指示字段和所述第一指示字段属于不同的指示域,其中,所述第二指示字段所属的指示域为新增的指示域,或所述第二指示字段为指定指示域中的可用字段。
可选的,作为一个实施例,所述第一预设条件包括以下至少一项:
系统消息块SIB1的发送频率范围为指定频率;
子载波间隔SCS为指定频率;
上行/下行链路的传输周期为指定周期。
可选的,作为一个实施例,所述第二指示字段中包括设定个数的比特,所述第二指示方式用于通过第三方式指示所述第一目标比特和所述第二目标比特,所述第一目标比特和所述第二目标比特互不重叠,且所述第一目标比特和所述第二目标比特的个数和等于所述多个比特的个数与所述设定个数的和;
其中,所述第三方式由所述网络侧设备预先配置,或由协议预定义,所 述第一目标比特和所述第二目标比特在所述多个比特和所述设定个数的比特中的位置由所述网络侧设备预先配置,或由协议预定义。
根据本申请实施例的装置500可以参照对应本申请实施例的方法300的流程,并且,该装置500中的各个单元/模块和上述其他操作和/或功能分别为了实现方法300中的相应流程,并且能够达到相同或等同的技术效果,为了简洁,在此不再赘述。
本申请实施例中的时隙配置装置可以是装置,具有操作系统的装置或电子设备,也可以是终端中的部件、集成电路、或芯片。该装置或电子设备可以是移动终端,也可以为非移动终端。示例性的,移动终端可以包括但不限于上述所列举的终端11的类型,非移动终端可以为服务器、网络附属存储器(Network Attached Storage,NAS)、个人计算机(personal computer,PC)、电视机(television,TV)、柜员机或者自助机等,本申请实施例不作具体限定。
本申请实施例提供的时隙配置装置能够实现图2至图3的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
可选的,如图6所示,本申请实施例还提供一种通信设备600,包括处理器601,存储器602,存储在存储器602上并可在所述处理器601上运行的程序或指令,例如,该通信设备600为终端时,该程序或指令被处理器601执行时实现上述时隙配置方法实施例的各个过程,且能达到相同的技术效果。该通信设备600为网络侧设备时,该程序或指令被处理器601执行时实现上述时隙配置方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种终端,包括处理器和通信接口,通信接口用于接收配置信息,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传 输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示,处理器用于基于所述配置信息确定所述第一目标比特和所述第二目标比特;基于所述第一目标比特确定上行传输的时隙数目,以及基于所述第二目标比特确定下行传输的时隙数目。该终端实施例是与上述终端侧方法实施例对应的,上述方法实施例的各个实施过程和实现方式均可适用于该终端实施例中,且能达到相同的技术效果。具体地,图7为实现本申请实施例的一种终端的硬件结构示意图。
该终端700包括但不限于:射频单元701、网络模块702、音频输出单元703、输入单元704、传感器705、显示单元706、用户输入单元707、接口单元708、存储器709、以及处理器710等中的至少部分部件。
本领域技术人员可以理解,终端700还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器710逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图7中示出的终端结构并不构成对终端的限定,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
应理解的是,本申请实施例中,输入单元704可以包括图形处理器(Graphics Processing Unit,GPU)7041和麦克风7042,图形处理器7041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元706可包括显示面板7061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板7061。用户输入单元707包括触控面板7071以及其他输入设备7072。触控面板7071,也称为触摸屏。触控面板7071可包括触摸检测装置和触摸控制器两个部分。其他输入设备7072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
本申请实施例中,射频单元701将来自网络侧设备的下行数据接收后, 给处理器710处理;另外,将上行的数据发送给网络侧设备。通常,射频单元701包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。
存储器709可用于存储软件程序或指令以及各种数据。存储器709可主要包括存储程序或指令区和存储数据区,其中,存储程序或指令区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器709可以包括高速随机存取存储器,还可以包括非易失性存储器,其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。
处理器710可包括一个或多个处理单元;可选的,处理器710可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序或指令等,调制解调处理器主要处理无线通信,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器710中。
其中,射频单元701,用于接收配置信息,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示;
处理器710,用于基于所述配置信息确定所述第一目标比特和所述第二目标比特;基于所述第一目标比特确定上行传输的时隙数目,以及基于所述第二目标比特确定下行传输的时隙数目。
在本申请实施例中,在对时隙格式进行配置时,网络侧设备可以向终端发送包括第一指示字段的配置信息,该配置信息用于通过第一指示方式或第二指示方式指示上行传输的时隙数目以及下行传输的时隙数目,其中,第一指示方式包括将第一指示字段中的多个比特划分为多组比特,通过多组比特进行联合指示,第二指示方式包括由第一指示字段联合其他字段共同进行指示。这样,在时隙数目较多的情况下,通过将已有的比特数目划分为多组比特后使用多组比特联合指示不同格式的时隙数目,或增加新的比特数目后结合已有的比特数目共同指示不同格式的时隙数目,可以实现对不同格式的时隙数目的有效指示,从而可以对每个时隙的格式进行有效配置。
本申请实施例提供的终端700还可以实现上述时隙配置方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种网络侧设备,包括处理器和通信接口,通信接口用于发送配置信息;其中,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示。该网络侧设备实施例是与上述网络侧设备方法实施例对应的,上述方法实施例的各个实施过程和实现方式均可适用于该网络侧设备实施例中,且能达到相同的技术效果。
具体地,本申请实施例还提供了一种网络侧设备。如图8所示,该网络设备800包括:天线81、射频装置82、基带装置83。天线81与射频装置82连接。在上行方向上,射频装置82通过天线81接收信息,将接收的信息发送给基带装置83进行处理。在下行方向上,基带装置83对要发送的信息进行处理,并发送给射频装置82,射频装置82对收到的信息进行处理后经过 天线81发送出去。
上述频带处理装置可以位于基带装置83中,以上实施例中网络侧设备执行的方法可以在基带装置83中实现,该基带装置83包括处理器84和存储器85。
基带装置83例如可以包括至少一个基带板,该基带板上设置有多个芯片,如图8所示,其中一个芯片例如为处理器84,与存储器85连接,以调用存储器85中的程序,执行以上方法实施例中所示的网络设备操作。
该基带装置83还可以包括网络接口86,用于与射频装置82交互信息,该接口例如为通用公共无线接口(common public radio interface,简称CPRI)。
具体地,本发明实施例的网络侧设备还包括:存储在存储器85上并可在处理器84上运行的指令或程序,处理器84调用存储器85中的指令或程序执行图5所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述时隙配置方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述时隙配置方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (40)

  1. 一种时隙配置方法,包括:
    终端接收配置信息,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示;
    基于所述配置信息确定所述第一目标比特和所述第二目标比特;
    基于所述第一目标比特确定上行传输的时隙数目,以及基于所述第二目标比特确定下行传输的时隙数目。
  2. 根据权利要求1所述的方法,其中,
    所述第一指示字段由一个或多个指示域组成。
  3. 根据权利要求1所述的方法,其中,在所述配置信息用于通过所述第一指示方式指示所述第一目标比特和所述第二目标比特的情况下:
    所述多个比特中包括所述第一目标比特和所述第二目标比特,所述第一目标比特和所述第二目标比特互不重叠,且所述第一目标比特和所述第二目标比特的个数和小于或等于所述多个比特的总个数。
  4. 根据权利要求3所述的方法,其中,基于所述配置信息确定所述第一目标比特和所述第二目标比特,包括:
    基于第一方式从所述多个比特中确定互不重叠的第一比特、第二比特和第三比特,所述第一比特、所述第二比特、所述第三比特的个数和等于所述多个比特的总个数;
    基于第二方式从所述第三比特中确定互不重叠的第四比特和第五比特;
    将所述第一比特和所述第四比特确定为所述第一目标比特,以及将所述第二比特和所述第五比特确定为所述第二目标比特。
  5. 根据权利要求4所述的方法,其中,
    所述第一方式和所述第二方式由网络侧设备预先配置,或由协议预定义;
    所述第一比特、所述第二比特、所述第四比特和所述第五比特在所述多个比特中的位置由所述网络侧设备预先配置,或由协议预定义。
  6. 根据权利要求4所述的方法,其中,基于第二方式从所述第三比特中确定互不重叠的第四比特和第五比特,包括:
    基于所述第二方式从所述第三比特中确定第六比特,所述第六比特用于指示所述第四比特和所述第五比特;
    基于所述第六比特确定所述第四比特和所述第五比特。
  7. 根据权利要求6所述的方法,其中,基于所述第六比特确定所述第四比特和所述第五比特,包括:
    基于第一映射关系和所述第六比特确定所述第四比特和所述第五比特;
    其中,所述第一映射关系为所述第六比特的取值与所述第四比特的个数、所述第五比特的个数之间的映射关系,所述第四比特和所述第五比特为所述第三比特中除所述第六比特以外的其他比特。
  8. 根据权利要求6所述的方法,其中,基于所述第六比特确定所述第四比特和所述第五比特,包括:
    基于所述第六比特和第二映射关系,从第七比特中确定互不重叠的第八比特和第九比特,所述第二映射关系为所述第六比特的取值与所述第八比特的个数、所述第九比特的个数之间的映射关系,所述第七比特为所述第三比特中除所述第六比特以外的其他比特;
    基于以下任一项确定所述第四比特和所述第五比特:
    将所述第八比特和所述第六比特中的指定比特确定为所述第四比特,以及将所述第九比特确定为所述第五比特,或,将所述第八比特确定为所述第四比特,以及将所述第九比特和所述指定比特确定为所述第五比特;
    在所述指定比特的取值为第一指定值的情况下,将所述第八比特和所述指定比特确定为所述第四比特,以及将所述第九比特确定为所述第五比特, 或,将所述第八比特确定为所述第四比特,以及将所述第九比特和所述指定比特确定为所述第五比特。
  9. 根据权利要求1所述的方法,其中,所述配置信息中还包括第二指示字段,所述第二指示方式包括由所述第一指示字段联合所述第二指示字段共同进行指示;
    其中,基于所述配置信息确定所述第一目标比特和所述第二目标比特,还包括:
    在满足第一预设条件的情况下,基于所述第二指示方式确定所述第一目标比特和所述第二目标比特。
  10. 根据权利要求9所述的方法,其中,
    第二指示字段和所述第一指示字段属于同一指示域;或,
    所述第二指示字段和所述第一指示字段属于不同的指示域,其中,所述第二指示字段所属的指示域为新增的指示域,或所述第二指示字段为指定指示域中的可用字段。
  11. 根据权利要求9所述的方法,其中,所述第一预设条件包括以下至少一项:
    系统消息块SIB1的发送频率范围为指定频率;
    子载波间隔SCS为指定频率;
    上行/下行链路的传输周期为指定周期。
  12. 根据权利要求9所述的方法,其中,所述第二指示字段中包括设定个数的比特;其中,基于所述第二指示方式确定所述第一目标比特和所述第二目标比特,包括:
    基于第三方式从所述多个比特和所述设定个数的比特中确定所述第一目标比特和所述第二目标比特,所述第一目标比特和所述第二目标比特互不重叠且所述第一目标比特和所述第二目标比特的个数和等于所述多个比特的个数与所述设定个数的和;
    其中,所述第三方式由网络侧设备预先配置,或由协议预定义,所述第 一目标比特和所述第二目标比特在所述多个比特和所述设定个数的比特中的位置由所述网络侧设备预先配置,或由协议预定义。
  13. 一种时隙配置方法,包括:
    网络侧设备发送配置信息;
    其中,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示。
  14. 根据权利要求13所述的方法,其中,
    所述第一指示字段由一个或多个指示域组成。
  15. 根据权利要求13所述的方法,其中,在所述配置信息用于通过所述第一指示方式指示所述第一目标比特和所述第二目标比特的情况下:
    所述多个比特中包括所述第一目标比特和所述第二目标比特,所述第一目标比特和所述第二目标比特互不重叠,且所述第一目标比特和所述第二目标比特的个数和小于或等于所述多个比特的总个数。
  16. 根据权利要求15所述的方法,其中,
    所述第一指示方式用于通过第一方式指示所述多个比特中互不重叠的第一比特和第二比特和第三比特,以及通过第二方式指示所述第三比特中互不重叠的第四比特和第五比特;
    其中,所述第一比特、所述第二比特、所述第三比特的个数和等于所述多个比特的总个数,所述第一目标比特包括所述第一比特和所述第四比特,所述第二目标比特包括所述第二比特和所述第五比特。
  17. 根据权利要求16所述的方法,其中,
    所述第一方式和所述第二方式由所述网络侧设备预先配置,或由协议预定义;
    所述第一比特、所述第二比特、所述第四比特和所述第五比特在所述多个比特中的位置由所述网络侧设备预先配置,或由协议预定义。
  18. 根据权利要求16所述的方法,其中,
    所述第二方式用于从所述第三比特中确定第六比特,所述第六比特用于指示所述第四比特和所述第五比特。
  19. 根据权利要求18所述的方法,其中,
    所述第六比特用于通过第一映射关系指示所述第四比特和所述第五比特;
    其中,所述第一映射关系为所述第六比特的取值与所述第四比特的个数、所述第五比特的个数之间的映射关系,所述第四比特和所述第五比特为所述第三比特中除所述第六比特以外的其他比特。
  20. 根据权利要求18所述的方法,其中,
    所述第六比特用于指示将第七比特中的第八比特和所述第六比特中的指定比特确定为所述第四比特,以及将所述第七比特中的第九比特确定为所述第五比特,或,将所述第八比特确定为所述第四比特,以及将所述第九比特和所述指定比特确定为第五比特;
    或,所述第六比特用于在所述指定比特的取值为第一指定值的情况下,指示将所述第八比特和所述指定比特确定为所述第四比特,以及将所述第九比特确定为所述第五比特,或,将所述第八比特确定为所述第四比特,以及将所述第九比特和所述指定比特确定为所述第五比特;
    其中,所述第七比特为所述第三比特中除所述第六比特以外的其他比特,所述第八比特和所述第九比特互不重叠,所述第八比特的个数、所述第九比特的个数与所述第六比特的取值之间存在第二映射关系。
  21. 根据权利要求13所述的方法,其中,所述配置信息中还包括第二指示字段,所述第二指示方式包括由所述第一指示字段联合所述第二指示字段共同进行指示;
    其中,在满足第一预设条件的情况下,所述配置信息用于通过所述第二指示方式指示所述第一目标比特和所述第二目标比特。
  22. 根据权利要求21所述的方法,其中,
    第二指示字段和所述第一指示字段属于同一指示域;或,
    所述第二指示字段和所述第一指示字段属于不同的指示域,其中,所述第二指示字段所属的指示域为新增的指示域,或所述第二指示字段为指定指示域中的可用字段。
  23. 根据权利要求21所述的方法,其中,所述第一预设条件包括以下至少一项:
    系统消息块SIB1的发送频率范围为指定频率;
    子载波间隔SCS为指定频率;
    上行/下行链路的传输周期为指定周期。
  24. 根据权利要求21所述的方法,其中,所述第二指示字段中包括设定个数的比特,所述第二指示方式用于通过第三方式指示所述第一目标比特和所述第二目标比特,所述第一目标比特和所述第二目标比特互不重叠,且所述第一目标比特和所述第二目标比特的个数和等于所述多个比特的个数与所述设定个数的和;
    其中,所述第三方式由所述网络侧设备预先配置,或由协议预定义,所述第一目标比特和所述第二目标比特在所述多个比特和所述设定个数的比特中的位置由所述网络侧设备预先配置,或由协议预定义。
  25. 一种时隙配置装置,包括:
    接收模块,用于接收配置信息,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示;
    第一确定模块,用于基于所述配置信息确定所述第一目标比特和所述第二目标比特;
    第二确定模块,用于基于所述第一目标比特确定上行传输的时隙数目,以及基于所述第二目标比特确定下行传输的时隙数目。
  26. 根据权利要求25所述的装置,其中,在所述配置信息用于通过所述第一指示方式指示所述第一目标比特和所述第二目标比特的情况下:
    所述多个比特中包括所述第一目标比特和所述第二目标比特,所述第一目标比特和所述第二目标比特互不重叠,且所述第一目标比特和所述第二目标比特的个数和小于或等于所述多个比特的总个数。
  27. 根据权利要求26所述的装置,其中,所述第一确定模块,还用于:
    基于第一方式从所述多个比特中确定互不重叠的第一比特、第二比特和第三比特,所述第一比特、所述第二比特、所述第三比特的个数和等于所述多个比特的总个数;
    基于第二方式从所述第三比特中确定互不重叠的第四比特和第五比特;
    将所述第一比特和所述第四比特确定为所述第一目标比特,以及将所述第二比特和所述第五比特确定为所述第二目标比特。
  28. 根据权利要求27所述的装置,其中,所述第一确定模块,还用于:
    基于所述第二方式从所述第三比特中确定第六比特,所述第六比特用于指示所述第四比特和所述第五比特;
    基于所述第六比特确定所述第四比特和所述第五比特。
  29. 根据权利要求28所述的装置,其中,所述第一确定模块,还用于:
    基于第一映射关系和所述第六比特确定所述第四比特和所述第五比特;
    其中,所述第一映射关系为所述第六比特的取值与所述第四比特的个数、所述第五比特的个数之间的映射关系,所述第四比特和所述第五比特为所述第三比特中除所述第六比特以外的其他比特。
  30. 根据权利要求28所述的装置,其中,所述第一确定模块,还用于:
    基于所述第六比特和第二映射关系,从第七比特中确定互不重叠的第八比特和第九比特,所述第二映射关系为所述第六比特的取值与所述第八比特的个数、所述第九比特的个数之间的映射关系,所述第七比特为所述第三比 特中除所述第六比特以外的其他比特;
    基于以下任一项确定所述第四比特和所述第五比特:
    将所述第八比特和所述第六比特中的指定比特确定为所述第四比特,以及将所述第九比特确定为所述第五比特,或,将所述第八比特确定为所述第四比特,以及将所述第九比特和所述指定比特确定为所述第五比特;
    在所述指定比特的取值为第一指定值的情况下,将所述第八比特和所述指定比特确定为所述第四比特,以及将所述第九比特确定为所述第五比特,或,将所述第八比特确定为所述第四比特,以及将所述第九比特和所述指定比特确定为所述第五比特。
  31. 根据权利要求25所述的装置,其中,所述配置信息中还包括第二指示字段,所述第二指示方式包括由所述第一指示字段联合所述第二指示字段共同进行指示;
    其中,所述第一确定模块,还用于:
    在满足第一预设条件的情况下,基于所述第二指示方式确定所述第一目标比特和所述第二目标比特。
  32. 根据权利要求31所述的装置,其中,
    第二指示字段和所述第一指示字段属于同一指示域;或,
    所述第二指示字段和所述第一指示字段属于不同的指示域,其中,所述第二指示字段所属的指示域为新增的指示域,或所述第二指示字段为指定指示域中的可用字段。
  33. 根据权利要求31所述的装置,其中,所述第二指示字段中包括设定个数的比特;其中,所述第一确定模块,还用于:
    基于第三方式从所述多个比特和所述设定个数的比特中确定所述第一目标比特和所述第二目标比特,所述第一目标比特和所述第二目标比特互不重叠且所述第一目标比特和所述第二目标比特的个数和等于所述多个比特的个数与所述设定个数的和;
    其中,所述第三方式由网络侧设备预先配置,或由协议预定义,所述第 一目标比特和所述第二目标比特在所述多个比特和所述设定个数的比特中的位置由所述网络侧设备预先配置,或由协议预定义。
  34. 一种时隙配置装置,包括:
    发送模块,用于发送配置信息;
    其中,所述配置信息中包括第一指示字段,所述配置信息用于通过第一指示方式或第二指示方式指示第一目标比特和第二目标比特,所述第一目标比特用于指示上行传输的时隙数目,所述第二目标比特用于指示下行传输的时隙数目,所述第一指示方式包括将所述第一指示字段中的多个比特划分为多组比特,通过所述多组比特进行联合指示,所述第二指示方式包括由所述第一指示字段联合其他字段共同进行指示。
  35. 根据权利要求34所述的装置,其中,在所述配置信息用于通过所述第一指示方式指示所述第一目标比特和所述第二目标比特的情况下:
    所述多个比特中包括所述第一目标比特和所述第二目标比特,所述第一目标比特和所述第二目标比特互不重叠,且所述第一目标比特和所述第二目标比特的个数和小于或等于所述多个比特的总个数。
  36. 根据权利要求35所述的装置,其中,
    所述第一指示方式用于通过第一方式指示所述多个比特中互不重叠的第一比特和第二比特和第三比特,以及通过第二方式指示所述第三比特中互不重叠的第四比特和第五比特;
    其中,所述第一比特、所述第二比特、所述第三比特的个数和等于所述多个比特的总个数,所述第一目标比特包括所述第一比特和所述第四比特,所述第二目标比特包括所述第二比特和所述第五比特。
  37. 根据权利要求34所述的装置,其中,所述配置信息中还包括第二指示字段,所述第二指示方式包括由所述第一指示字段联合所述第二指示字段共同进行指示;
    其中,在满足第一预设条件的情况下,所述配置信息用于通过所述第二指示方式指示所述第一目标比特和所述第二目标比特。
  38. 一种终端,包括处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1-12任一项所述的时隙配置方法的步骤。
  39. 一种网络侧设备,包括处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求13-24任一项所述的时隙配置方法的步骤。
  40. 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1-12任一项所述的时隙配置方法,或者实现如权利要求13-24任一项所述的时隙配置方法的步骤。
PCT/CN2022/117345 2021-09-07 2022-09-06 时隙配置方法、终端及网络侧设备 WO2023036142A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111045970.XA CN115776727A (zh) 2021-09-07 2021-09-07 时隙配置方法、终端及网络侧设备
CN202111045970.X 2021-09-07

Publications (1)

Publication Number Publication Date
WO2023036142A1 true WO2023036142A1 (zh) 2023-03-16

Family

ID=85387794

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/117345 WO2023036142A1 (zh) 2021-09-07 2022-09-06 时隙配置方法、终端及网络侧设备

Country Status (2)

Country Link
CN (1) CN115776727A (zh)
WO (1) WO2023036142A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111954243A (zh) * 2020-08-14 2020-11-17 中兴通讯股份有限公司 信息指示方法、装置、设备和存储介质
WO2021088112A1 (zh) * 2019-11-06 2021-05-14 Oppo广东移动通信有限公司 系统信息接收方法、发送方法、装置、终端及存储介质
CN113194434A (zh) * 2020-02-14 2021-07-30 华为技术有限公司 一种配置信息的指示方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021088112A1 (zh) * 2019-11-06 2021-05-14 Oppo广东移动通信有限公司 系统信息接收方法、发送方法、装置、终端及存储介质
CN113194434A (zh) * 2020-02-14 2021-07-30 华为技术有限公司 一种配置信息的指示方法及装置
CN111954243A (zh) * 2020-08-14 2020-11-17 中兴通讯股份有限公司 信息指示方法、装置、设备和存储介质

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CATT: "Feature lead summary on AI 7.2.4.3 Sidelink synchronization mechanism", 3GPP DRAFT; R1-2000832, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG1, no. e-Meeting; 20200224 - 20200306, 17 February 2020 (2020-02-17), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051853629 *

Also Published As

Publication number Publication date
CN115776727A (zh) 2023-03-10

Similar Documents

Publication Publication Date Title
US20210168834A1 (en) Determining method, terminal, and network device
EP3595383B1 (en) Resource mapping method, network device and terminal device
US20230362924A1 (en) Transmission processing method and related device
WO2023025016A1 (zh) 传输处理方法、装置及设备
WO2022083634A1 (zh) 资源配置方法、装置、设备及可读存储介质
WO2021249476A1 (zh) Srs资源指示方法、srs资源确定方法及相关设备
US20230354369A1 (en) Method for processing pdcch monitoring capability, terminal, and network-side device
WO2023078327A1 (zh) 上行传输信息确定、上行传输以及上行传输配置的方法
WO2023284796A1 (zh) Tci状态的指示方法、装置、终端和网络侧设备
WO2022206554A1 (zh) 传输方向的确定方法、装置、终端及网络侧设备
WO2022017409A1 (zh) 上行传输方法、装置及相关设备
WO2022028524A1 (zh) 物理下行控制信道的监听方法、装置和设备
WO2023036142A1 (zh) 时隙配置方法、终端及网络侧设备
WO2023036151A1 (zh) 时隙配置方法、终端及网络侧设备
WO2023051609A1 (zh) 下行控制信道监测方法、装置及通信设备
WO2022242677A1 (zh) 波束应用时间的确定方法、装置及通信设备
WO2023134668A1 (zh) Srs端口映射方法、装置及终端
WO2022206593A1 (zh) Pdcch监听处理方法、监听配置方法及相关设备
WO2022179498A1 (zh) 初始下行bwp的scs的指示方法和设备
WO2023131288A1 (zh) 资源确定方法、装置、终端和网络侧设备
WO2022028458A1 (zh) 确定数据处理时间的方法、终端设备和网络设备
WO2022242557A1 (zh) 控制信道监测方法和设备
WO2022033424A1 (zh) 资源传输方法、装置及通信设备
WO2022237743A1 (zh) Pusch重复传输方法和设备
CN114585067B (zh) Srs的功控指示方法、资源集簇的划分方法和设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22866605

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE