WO2023193170A1 - 无线通信方法及设备 - Google Patents

无线通信方法及设备 Download PDF

Info

Publication number
WO2023193170A1
WO2023193170A1 PCT/CN2022/085494 CN2022085494W WO2023193170A1 WO 2023193170 A1 WO2023193170 A1 WO 2023193170A1 CN 2022085494 W CN2022085494 W CN 2022085494W WO 2023193170 A1 WO2023193170 A1 WO 2023193170A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
target
target timer
configuration
timer
Prior art date
Application number
PCT/CN2022/085494
Other languages
English (en)
French (fr)
Inventor
张博源
卢前溪
冷冰雪
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to PCT/CN2022/085494 priority Critical patent/WO2023193170A1/zh
Publication of WO2023193170A1 publication Critical patent/WO2023193170A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements

Definitions

  • the embodiments of the present application relate to the field of communication, and more specifically, to a wireless communication method and device.
  • Communication architectures such as Device to Device (D2D), Vehicle to Vehicle (V2V), and Vehicle to Everything (V2X) can be implemented between devices based on Sidelink (SL) technology. Communication is different from the way communication data is received or sent through network devices in traditional cellular systems. This direct communication method between terminals has higher spectrum efficiency and lower transmission delay.
  • D2D Device to Device
  • V2V Vehicle to Vehicle
  • V2X Vehicle to Everything
  • the sending terminal when the sending terminal transmits data, it will indicate the location of the current transmission resource corresponding to the data and the location of subsequent retransmission resources in the sidelink control information (SCI) sent to the receiving terminal.
  • SCI sidelink control information
  • the sending terminal needs to implement the Listen Before Talk (LBT) mechanism, so the transmission resources indicated in the SCI may not necessarily be successfully used by the sending terminal. occupied. For example: If the sending terminal fails LBT, the sending terminal will not be able to send data on the transmission resources indicated by SCI, but the receiving terminal will continue to monitor on the transmission resources indicated by SCI, resulting in excessive power consumption of the receiving terminal. Big question.
  • LBT Listen Before Talk
  • the embodiments of the present application provide a wireless communication method and device, which can reduce the power consumption of the receiving terminal.
  • a first aspect provides a wireless communication method, which method is applied to a first terminal.
  • the method includes: starting or restarting a target timer; and performing a target operation when the target timer times out, so that the first terminal and the second terminal can communicate with each other.
  • the sidelink resources between are released or reconfigured.
  • a second aspect provides a wireless communication method, which method is applied to a second terminal.
  • the method includes: starting or restarting a target timer; and sending a link response reminder message to the first terminal when the target timer times out, so that the second terminal A side link between one terminal and a second terminal is detected.
  • a terminal device is provided.
  • the terminal device is a first terminal, including: a processing unit and a communication unit; wherein, the processing unit is used to start or restart a target timer; the processing unit or the communication unit is used to start or restart a target timer; A target operation is performed when timeout occurs, so that sidelink resources between the first terminal and the second terminal are released or reconfigured.
  • a terminal device is provided.
  • the terminal device is a second terminal, including: a processing unit and a communication unit, wherein the processing unit is used to start or restart a target timer; the communication unit is used to notify the user when the target timer times out.
  • the first terminal sends a link response reminder message so that the side link between the first terminal and the second terminal is detected.
  • a terminal device including a processor and a memory.
  • the memory is used to store computer programs, and the processor is used to call and run the computer programs stored in the memory to execute the method in the above first aspect or its implementations.
  • a terminal device including a processor and a memory.
  • the memory is used to store computer programs
  • the processor is used to call and run the computer programs stored in the memory, and execute the method in the above second aspect or its respective implementations.
  • a seventh aspect provides a device for implementing the method in any one of the above first to second aspects.
  • the device includes: a processor, configured to call and run a computer program from a memory, so that the device installed with the device executes the method in any one of the above-mentioned first to second aspects or implementations thereof. .
  • An eighth aspect provides a computer-readable storage medium for storing a computer program that causes a computer to execute the method in any one of the above-mentioned first to second aspects or implementations thereof.
  • a computer program product including computer program instructions.
  • the computer program instructions enable a computer to execute the method in any one of the above-mentioned first to second aspects or their respective implementations.
  • a computer program which, when run on a computer, causes the computer to execute the method in any one of the above-mentioned first to second aspects or implementations thereof.
  • the first terminal that is, the receiving terminal
  • the first terminal can be prevented from blindly monitoring, thereby reducing the power consumption of the receiving terminal.
  • FIG. 1 is a schematic diagram of the first mode provided by this application.
  • FIG. 2 is a schematic diagram of the second mode provided by this application.
  • Figure 3 is a schematic diagram of unicast transmission provided by the embodiment of the present application.
  • Figure 4 is a schematic diagram of multicast transmission provided by an embodiment of the present application.
  • Figure 5 is a schematic diagram of broadcast transmission provided by an embodiment of the present application.
  • Figure 6 is a flow chart of a wireless communication method provided by an embodiment of the present application.
  • Figure 7 is a flow chart of another wireless communication method provided by an embodiment of the present application.
  • Figure 8 is a schematic diagram of a terminal device 800 provided by an embodiment of the present application.
  • Figure 9 is a schematic diagram of a terminal device 900 provided by an embodiment of the present application.
  • Figure 10 is a schematic structural diagram of a communication device 1000 provided by an embodiment of the present application.
  • Figure 11 is a schematic structural diagram of a device according to an embodiment of the present application.
  • LTE Long Term Evolution
  • Device-to-device communication is a side link transmission technology based on D2D. It is different from the way communication data is received or sent through network devices in traditional cellular systems, so it has higher spectrum efficiency and lower transmission delay.
  • the Internet of Vehicles system uses end-to-end direct communication, and 3GPP defines two transmission modes: the first mode and the second mode.
  • the transmission resources of the terminal are allocated by the network device.
  • the terminal sends data on the sidelink according to the resources allocated by the network device; the network device can allocate resources for a single transmission to the terminal.
  • semi-static transmission resources can also be allocated to the terminal. Also called Mode 3 in LTE-V2X.
  • Second mode As shown in Figure 2, the terminal selects a resource in the resource pool for data transmission. Also called Mode 4 in LTE-V2X.
  • D2D is divided into different stages for research.
  • Proximity based Service Device-to-device communication in version (Release, Rel) 12/13 is studied for ProSe scenarios, which is mainly targeted at public safety services.
  • ProSe by configuring the position of the resource pool in the time domain, for example, the resource pool is non-continuous in the time domain, so that the terminal can send/receive data non-continuously on the sidelink, thereby achieving the effect of power saving.
  • V2X In Rel14/15, the Internet of Vehicles system is studied for vehicle-to-vehicle communication scenarios, which is mainly oriented to relatively high-speed moving vehicle-to-vehicle and vehicle-to-human communication services; in V2X, because the vehicle system has continuous power supply, Power efficiency is not the main issue, but the delay of data transmission is. Therefore, the system design requires the terminal equipment to transmit and receive continuously.
  • Wearable devices In Rel14, this scenario studies the scenario of wearable devices accessing the network through mobile phones. It is mainly aimed at low mobile speed and low power access scenarios.
  • unicast and multicast transmission methods are introduced.
  • the receiving end is only one terminal.
  • unicast transmission is performed between UE1 and UE2;
  • the receiving end is all terminals in a communication group, or in a certain transmission All terminals within the distance, as shown in Figure 4, UE1, UE2, UE3 and UE4 form a communication group, in which UE1 sends data, and other UEs in the group are receivers; for broadcast transmission, the receiver is the sender.
  • Any terminal around the terminal as shown in Figure 5, UE1 is the transmitter, and other UEs around it, namely UE2-UE6, are receivers.
  • Unlicensed spectrum is a spectrum allocated by countries and regions that can be used for radio equipment communication. This spectrum is usually considered a shared spectrum, that is, communication equipment can use it as long as it meets the regulatory requirements set by the country or region on the spectrum, such as the LTB mechanism. the spectrum.
  • Communication equipment follows the LTB mechanism, that is, when a communication equipment uses unlicensed spectrum, only when the channel monitoring result is that the channel is idle or LBT is successful, the communication equipment can send data through the unlicensed spectrum. When the channel monitoring result is that the channel When busy or LBT fails, the communication device cannot send data through the unlicensed spectrum.
  • the communication device here may be a terminal device, specifically a sending terminal.
  • the sending terminal when the sending terminal transmits data, it will indicate the current transmission resource location corresponding to the data and the location of subsequent retransmission resources in the SCI sent to the receiving terminal.
  • the sending terminal needs to implement the LBT mechanism, so the transmission resources indicated in the SCI may not be successfully occupied by the sending terminal. For example: If the sending terminal fails LBT, the sending terminal will not be able to send data on the transmission resources indicated by SCI, but the receiving terminal will continue to monitor on the transmission resources indicated by SCI, resulting in excessive power consumption of the receiving terminal. Big question.
  • this application can set a timer. As long as the timer expires, it can mean that the sending terminal LBT continues to fail for a long time or even if the LBT is successful, the receiving terminal cannot receive data or the data reception fails for a long time. At this time, the side link resources can be released or reconfigured, or the side link status can be detected, so that the receiving terminal does not need to blindly monitor, thereby reducing the power consumption of the receiving terminal.
  • the terminal equipment in the embodiment of the present application may also be called user equipment (User Equipment, UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device , user terminal, wireless communication equipment, terminal, user agent or user device, etc.
  • the terminal device can be a station (ST) in the WLAN, a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, or a personal digital processing unit.
  • ST station
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • handheld devices with wireless communication capabilities computing devices or other processing devices connected to wireless modems
  • vehicle-mounted devices wearable devices
  • next-generation communication systems such as terminals in NR networks or in the future Terminals in the evolved Public Land Mobile Network (PLMN) network, etc.
  • PLMN Public Land Mobile Network
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices. It is a general term for applying wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes, etc.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable devices are not just hardware devices, but also achieve powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized devices that can achieve complete or partial functions without relying on smartphones, such as smart watches or smart glasses, and those that only focus on a certain type of application function and need to cooperate with other devices such as smartphones.
  • the network device can be a device used to communicate with mobile devices.
  • the network device can be an Access Point (AP) in WLAN, a Base Transceiver Station (BTS) in GSM or CDMA, or a BTS in WCDMA.
  • the base station (NodeB, NB) can also be an evolutionary base station (Evolutional Node B, eNB or eNodeB) in LTE, or a relay station or access point, or a vehicle-mounted device, a wearable device, and a network device or base station ( gNB) or network equipment in future evolved PLMN networks, etc.
  • AP Access Point
  • BTS Base Transceiver Station
  • gNB network device or base station
  • the embodiments of this application are not only applicable to communication frameworks such as D2D, V2V, and V2X, but can also be applied to any other terminal-to-terminal communication framework, and this application is not limited to this.
  • the embodiments of this application are applied to unlicensed spectrum, which may also be called unlicensed spectrum.
  • the "instruction” mentioned in the embodiments of this application may be a direct instruction, an indirect instruction, or an association relationship.
  • a indicates B which can mean that A directly indicates B, for example, B can be obtained through A; it can also mean that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also mean that there is an association between A and B. relation.
  • correlate can mean that there is a direct correspondence or indirect correspondence between the two, it can also mean that there is an associated relationship between the two, or it can mean indicating and being instructed, configuration and being. Configuration and other relationships.
  • Figure 6 is a flow chart of a wireless communication method provided by an embodiment of the present application.
  • the method can be executed by a first terminal, and the first terminal can be a receiving terminal.
  • the method includes the following:
  • S620 Perform a target operation when the target timer times out, so that the sidelink resources between the first terminal and the second terminal are released or reconfigured.
  • the target timer introduces an additional timer in sidelink communication.
  • This timer may be called a sidelink LBT transmission timer, that is, sidelinkLbtTransmissionTimer. Since the sidelink is also called a pass-through link, this timer is also called a pass-through link LBT transmission timer.
  • the first terminal starts or restarts the target timer.
  • start or restart conditions of the target timer include at least one of the following, but are not limited to:
  • the first terminal successfully receives a data packet transmission
  • the first terminal receives the LBT continuous failure indication sent by the second terminal;
  • the first terminal did not receive any data at the transmission resource location indicated in the SCI or data reception failed;
  • the first terminal does not receive any data at the transmission resource location indicated in the SCI for n consecutive times or fails to receive data.
  • the data packet in a data packet transmission successfully received by the first terminal may be an initial transmission data packet or a retransmission data packet, and this application does not limit this.
  • data packets may also be referred to as data, and data may also be referred to as data packets.
  • the second terminal may be the sending terminal.
  • the second terminal needs to execute the LBT mechanism when sending data to the first terminal.
  • the second terminal may send the LBT continuous failure indication to the first terminal to indicate that the LBT continues to fail.
  • the above-mentioned SCI is the SCI sent by the second terminal to the first terminal, and the SCI can indicate the location of resources for this transmission and the location of resources for subsequent retransmissions.
  • the first terminal does not receive any data at the transmission resource location indicated in the SCI or the data reception failure may be due to LBT failure, or it may be that LBT is successful but is due to the first terminal's own failure or other reasons. Caused by.
  • the failure of the first terminal to receive data at the transmission resource location indicated in the SCI includes: not receiving any data, or even if the data is received, the data has been tampered with, and so on.
  • the above n is configured through system message configuration, dedicated signaling configuration, or predefined by the first network device corresponding to the first terminal.
  • n may be an integer greater than 1.
  • the value of n may be 3.
  • the first terminal may stop running the target timer.
  • the stopping condition includes at least one of the following, but is not limited to:
  • the first terminal successfully receives a data packet transmission
  • the first terminal receives the resource pool reconfiguration information sent by the second terminal;
  • the first terminal receives the reconfiguration of the target timer sent by the second terminal;
  • the first terminal and the second terminal switch from the unlicensed carrier to the licensed carrier to work;
  • the first terminal receives the instruction information sent by the second terminal to stop using the target timer
  • the sidelink between the first terminal and the second terminal fails.
  • the data packet in a data packet transmission successfully received by the first terminal may be an initial transmission data packet or a retransmission data packet, and this application does not limit this.
  • the above resource pool reconfiguration information may be the reconfiguration information of the resource pool used by the second terminal to send data.
  • the resource pool reconfiguration information may include: the identifier of the resource pool after reconfiguration, or the resource pool.
  • the pool reconfiguration information is used to indicate that the resource pool used by the second terminal to send data has been reconfigured. In short, this application does not impose restrictions on the resource pool reconfiguration information.
  • the configuration of the target timer may include at least one of the following, but is not limited to: duration of the target timer, allowing the first terminal to continuously not receive any data or data reception failure at the transmission resource location indicated in the SCI number of times.
  • the configuration of the target timer includes: the duration of the target timer, then starting from the start time of the target timer, if the running duration of the target timer reaches or exceeds the duration of the target timer included in the configuration, then The target timer will expire.
  • the configuration of the target timer includes: allowing the first terminal to continuously not receive any data at the transmission resource location indicated in the SCI or the number of data reception failures is n, then starting from the start time of the target timer, If the first terminal does not receive any data continuously at the transmission resource location indicated in the SCI or the number of data reception failures is greater than n, the target timer will time out.
  • the target timer when the configuration of the target timer includes: the duration of the target timer and the number n of times that the first terminal is allowed to continuously not receive any data or data reception fails at the transmission resource location indicated in the SCI, then the target timer is Starting from the start time, if the running duration of the target timer reaches or exceeds the duration of the target timer included in the configuration, and the first terminal continuously does not receive any data or data reception fails at the transmission resource location indicated in the SCI When the number of times is greater than n, the target timer will time out.
  • the target timer before the reconfiguration can be invalidated, and at this time, the target timer before the reconfiguration can be stopped.
  • the premise for setting the target timer is that the first terminal and the second terminal operate on an unlicensed carrier or an unlicensed spectrum. Therefore, once the first terminal and the second terminal switch from an unlicensed carrier to a licensed carrier, the When working, the target timer has no meaning at this time. Based on this, you can stop running the target timer before reconfiguring it.
  • the second terminal determines that the resource pool used to send data has been reconfigured, the target timer has been reconfigured, the first terminal and the second terminal have switched from an unlicensed carrier to a licensed carrier to work on a single carrier.
  • the second terminal may send instruction information to stop using the target timer to the first terminal.
  • the instruction information to stop using the target timer sent by the second terminal can be carried in any of the following, but is not limited to: PC5-radio resource control (Radio Resource Control, RRC), media access layer control unit (Media Access Control Element, MAC-CE), SCI.
  • RRC Radio Resource Control
  • MAC-CE media access layer control unit
  • the target timer has no meaning at this time. Based on this, the target timer before reconfiguration can be stopped.
  • the above target operations include at least one of the following, but are not limited to:
  • release sidelink resources between the first terminal and the second terminal In unicast communication, release sidelink resources between the first terminal and the second terminal;
  • the first terminal when the target timer times out, the first terminal considers that the side link between it and the second terminal fails. At this time, the first terminal can release the first terminal and the second terminal. sidelink resources between them, so that the first terminal will not monitor on the transmission resources indicated by the SCI.
  • the first network device may trigger the first terminal and the second terminal to release sidelink resources between them, so that the first terminal A terminal will not monitor on the transmission resources indicated by the SCI.
  • the first network device can reconfigure the sidelink between the two, so that the first terminal can effectively monitor on the transmission resources indicated by the SCI.
  • the second terminal can actively release the sidelink resources between it and the first terminal, or the first terminal and the second terminal Both release the sidelink resources between the two, so that the first terminal will not monitor the transmission resources indicated by the SCI.
  • the second terminal can forward the timeout indication to its corresponding second network device. Based on this, the second network device can reconfigure the sidelink between the two, so that the first terminal can indicate when the SCI indicates Effective monitoring is performed on the transmission resources.
  • reconfiguration of the sidelink can be triggered when the T400 times out.
  • the first terminal can send a timeout indication of the target timer to the second terminal and start the T400 timer at the same time.
  • the first terminal can monitor the sidelink. Perform reconfiguration, or trigger the second terminal to reconfigure the sidelink, etc.
  • the first terminal may send the timeout indication of the target timer to the second terminal through the exception sending resource pool of the first terminal.
  • the exception sending resource pool is configured through system messages, dedicated signaling configuration or predefined of the first network device.
  • the abnormal sending resource pool may be configured by the first network device to the first terminal through system signaling.
  • the exception sending resource pool may be configured by the first network device to the first terminal through dedicated signaling.
  • the abnormal sending resource pool is a resource pool on a licensed carrier or an unlicensed carrier.
  • the first terminal that is, the receiving terminal can be prevented from blindly monitoring, thereby reducing the power consumption of the receiving terminal.
  • the configuration method of the target timer includes the following implementation methods, but is not limited to this:
  • Possible implementation method 1 The first terminal independently configures the target timer.
  • Implementation method two the first network device configures a target timer.
  • Implementation method three the second terminal independently configures the target timer.
  • Implementation method four the second network device configures a target timer.
  • the first terminal can synchronize the configuration of the target timer to the second terminal so that the second terminal can use the target timer.
  • the configuration of the target timer is configured by the first network device to the first terminal through dedicated signaling; in the first When a terminal is in the RRC idle state or the RRC inactive state, the configuration of the target timer is configured by the first network device to the first terminal through system signaling.
  • the first terminal may send the configuration of the target timer to the second terminal through PC5-RRC, MAC-CE or SCI, but is not limited thereto.
  • the first terminal in unicast communication, can synchronize the configuration of the target timer to a second terminal in a unicast manner.
  • the first terminal may synchronize the configuration of the target timer to multiple second terminals in a broadcast manner.
  • the first terminal in multicast communication, can synchronize the configuration of the target timer to multiple second terminals through multicast.
  • the first terminal can also receive a feedback message sent by the second terminal.
  • the feedback message is used to indicate the configuration situation of the target timer in the second terminal, including: configuration failure or configuration success. If according to the feedback message If it is determined that the target timer configuration fails, the first terminal autonomously reconfigures the target timer or obtains the target timer reconfiguration from the first network device, and sends the target timer reconfiguration to the second terminal.
  • the above feedback message is also called a configuration failure message. If the target timer is configured successfully, the above feedback message is also called a configuration completion message.
  • the second terminal may send a feedback message to the first terminal.
  • the second terminal may not send a feedback message to the first terminal.
  • it may also send a feedback message to the first terminal.
  • the terminal sends a feedback message, which is not limited by this application.
  • the second terminal after the second terminal receives the configuration of the target timer, it can send the configuration of the target timer to its corresponding second network device; and receive a feedback message sent by the second network device, and the feedback message is used for feedback.
  • the configuration status of the target timer includes: configuration failure or configuration success.
  • the second terminal when the second terminal is in the RRC connected state, the second terminal can directly send the configuration of the target timer to the second network device; when the second terminal is in the RRC idle state or RRC inactive state, the second terminal can The RRC connection process is first triggered. After the RRC connection is completed, the second terminal is in the RRC connection state. At this time, the second terminal can send the configuration of the target timer to the second network device.
  • the second terminal may send the configuration of the target timer to the second network device; and receive a feedback message sent by the second network device.
  • the second terminal may not send the configuration of the target timer to the second network device; and it will not receive the feedback message sent by the second network device.
  • the second terminal may also send the configuration of the target timer to the second network device; and receive a feedback message sent by the second network device. This application does not limit this.
  • the second terminal can synchronize the configuration of the target timer to the first terminal so that the first terminal can use the target timer.
  • the configuration of the target timer is configured by the second network device to the second terminal through dedicated signaling; in the first When the second terminal is in the RRC idle state or the RRC inactive state, the configuration of the target timer is configured by the second network device to the second terminal through system signaling.
  • the second terminal may send the configuration of the target timer to the first terminal through PC5-RRC, MAC-CE or SCI, but is not limited thereto.
  • the second terminal can also receive a feedback message sent by the first terminal.
  • the feedback message is used to indicate the configuration situation of the target timer in the first terminal, including: configuration failure or configuration success. If according to the feedback message If it is determined that the target timer configuration fails, the second terminal can autonomously reconfigure the target timer or obtain the target timer reconfiguration from the second network device, and send the target timer reconfiguration to the first terminal.
  • the above feedback message is also called a configuration failure message. If the target timer is configured successfully, the above feedback message is also called a configuration completion message.
  • the first terminal can send the configuration of the target timer to its corresponding first network device; and receive a feedback message sent by the first network device, where the feedback message is used for feedback.
  • the configuration status of the target timer includes: configuration failure or configuration success.
  • the first terminal when the first terminal is in the RRC connected state, the first terminal can directly send the configuration of the target timer to the first network device; when the first terminal is in the RRC idle state or RRC inactive state, the first terminal can The RRC connection process is first triggered. After the RRC connection is completed, the first terminal is in the RRC connection state. At this time, the first terminal can send the configuration of the target timer to the first network device.
  • the target timer can be configured in multiple ways, thereby ensuring the diversity of target timer configuration methods.
  • the above target timer can be configured for any terminal device, or for terminal devices that meet certain conditions, as follows:
  • the first terminal may obtain association information of the target timer configuration, and determine whether to allow use of the target timer based on the association information. Based on this, the first terminal starts or restarts the target timer only when it is determined according to the association information that the target timer is allowed to be used.
  • the associated information includes at least one of the following, but is not limited to:
  • Target priority or target priority field value
  • Resource pool ID or list of resource pool IDs.
  • the configuration of the target timer is allowed to be used when the data sent by the second terminal to the first terminal corresponds to a target address or a list of target addresses. For example: when the data sent by the second terminal to the first terminal corresponds to the target address A, which is the target address included in the associated information, or it belongs to the target address list included in the associated information, then the first terminal can Use a goal timer.
  • the target address here can be an Internet Protocol (Internet Protocol, IP) address
  • the target address list can be a list of IP addresses.
  • the configuration of the target timer is allowed to be used when the logical channel involved in the data sent by the second terminal to the first terminal corresponds to a logical channel identifier or a logical channel identifier list. For example: when the second terminal sends data to the first terminal through logical channel B, and the identifier of logical channel B is consistent with the logical channel identifier included in the associated information, or the identifier of logical channel B belongs to the logical channel included in the associated information. Channel identification list, then the first terminal can use the target timer.
  • the configuration of the target timer is allowed to be used when the priority of the data sent by the second terminal to the first terminal meets the preset condition corresponding to the target priority or the target priority domain value.
  • the preset conditions include any of the following, but are not limited to:
  • the priority of the data sent by the second terminal to the first terminal is higher than the target priority or the target priority domain value
  • the priority of the data sent by the second terminal to the first terminal is lower than or equal to the target priority or the target priority domain value.
  • the priority of the data sent by the second terminal to the first terminal is 1, and the target priority or target priority field value is 3. The smaller the value corresponding to the priority, the higher the priority level. Assume that the preset priority level is 3. Assume that the condition is item (1) above. Based on this, since the priority of the data sent by the second terminal to the first terminal is higher than the target priority or the target priority domain value, then the first terminal can use the target timing at this time. device.
  • the resource pool identifier or resource pool identifier list included in the above association information is for the sending resource pool of the second terminal, and the sending resource pool is used by the second terminal for data transmission.
  • the configuration of the target timer is allowed when the second terminal uses the resource pool identifier or the resource in the resource pool identifier list to send data to the first terminal.
  • the first terminal can use the target timer at this time.
  • the target timer can be configured to any terminal device or to a terminal device that meets certain conditions, thereby improving the configuration flexibility of the target timer.
  • Figure 7 is a flow chart of another wireless communication method provided by an embodiment of the present application. This method can be executed by a second terminal, and the second terminal can be a sending terminal. As shown in Figure 7, the method includes the following:
  • S720 Send a link response reminder message to the first terminal when the target timer times out, so that the side link between the first terminal and the second terminal is detected.
  • the second terminal can perform resource selection and send a data packet to the first terminal.
  • the second terminal can send a link response reminder to the first terminal. message so that the sidelink between the first terminal and the second terminal is detected. After the sidelink is restored, the second terminal can continue to send data packets to the first terminal.
  • the link response reminder message is used to instruct the first terminal to detect the sidelink. At this time, if the first terminal fails to detect the sidelink, the first terminal can stop performing transmission on the transmission resource indicated by the SCI. Monitoring, thereby reducing the power consumption of the first terminal, that is, the receiving terminal.
  • start condition, stop operation condition and configuration of the target timer on the second terminal are consistent with the target timer on the first terminal. It can be seen from the above starting conditions, stopping conditions and configuration of the target timer that these conditions and configurations are all from the perspective of the first terminal. However, as the sending terminal, the second terminal can estimate or determine its relationship with the first terminal. The data transmission delay between terminals can determine the starting conditions, stop running conditions and configuration of the target timer.
  • the start or restart conditions of the target timer include: the first terminal successfully receives a data packet transmission, then the second terminal can calculate the sum of the sending time of the data packet and the data packet transmission delay to obtain the data packet. Receive time.
  • the start or restart conditions of the target timer include: the first terminal receives the LBT continuous failure indication sent by the second terminal, then the second terminal can calculate the sending time of the LBT continuous failure indication and the transmission time of the LBT continuous failure indication. The sum is extended to obtain the receiving time of the LBT continuous failure indication.
  • the start or restart conditions of the target timer include: the first terminal does not receive any data or data reception fails at the transmission resource location indicated in the SCI, then the second terminal can calculate the LBT performed on the transmission resource.
  • the sum of the failure time and the data transmission delay is the time when data reception fails on the transmission resource.
  • the start or restart conditions of the target timer include: the first terminal does not receive any data or data reception fails for n consecutive times at the transmission resource location indicated in the SCI, then the second terminal can calculate this for the transmission resource
  • the sum of the n-th LBT failure time and the data transmission delay is the time of the n-th data reception failure on the transmission resource.
  • the conditions for stopping the operation include: the first terminal receives the resource pool reconfiguration information sent by the second terminal, then the second terminal can calculate the sum of the sending time of the data packet and the data packet transmission delay to obtain the data packet. Receive time.
  • the conditions for stopping the operation include: the first terminal receives the reconfiguration of the target timer sent by the second terminal, then the second terminal can calculate the sending time of the reconfiguration of the target timer and the transmission delay of the reconfiguration. The sum is obtained to obtain the receiving time of the reconfiguration.
  • the conditions for stopping operation include: the first terminal and the second terminal switch from the unlicensed carrier to the licensed carrier to operate.
  • the conditions for stopping the operation include: the first terminal receives the instruction information sent by the second terminal to stop using the target timer; then the second terminal can calculate the sum of the sending time of the instruction information and the transmission delay of the instruction information. , get the reception time of the indication information.
  • the conditions for stopping operation include: in unicast communication, the sidelink link between the first terminal and the second terminal fails.
  • the first terminal and the second terminal can synchronously learn the sidelink link between them.
  • the link fails. Therefore, there is no need to consider the transmission delay between the first terminal and the second terminal.
  • the sidelink link failure times of the second terminal and the first terminal are exactly the same.
  • the sending terminal may also be set with a target timer, and when the target timer expires, it sends a link response reminder message to the first terminal, so that the sidelink link between the first terminal and the second terminal is detected, thereby allowing the receiving terminal to blindly monitor, thereby reducing the power consumption of the receiving terminal.
  • FIG 8 is a schematic diagram of a terminal device 800 provided by an embodiment of the present application.
  • the terminal device 800 is the above-mentioned first terminal and includes: a processing unit 810 and a communication unit 820; wherein the processing unit 810 is used to start or restart the target timer. ;
  • the processing unit 810 or the communication unit 820 is configured to perform a target operation when the target timer times out, so that the side link resources between the first terminal and the second terminal are released or reconfigured.
  • processing unit 810 is specifically configured to: start or restart the target timer when the start or restart conditions of the target timer are met.
  • start or restart conditions of the target timer include at least one of the following:
  • the first terminal successfully receives a data packet transmission
  • the first terminal receives the LBT continuous failure indication sent by the second terminal;
  • the first terminal did not receive any data at the transmission resource location indicated in the SCI or data reception failed;
  • the first terminal does not receive any data at the transmission resource location indicated in the SCI for n consecutive times or fails to receive data.
  • the above n is configured through system message configuration, dedicated signaling configuration, or predefined by the first network device corresponding to the first terminal.
  • the target operation includes at least one of the following:
  • release sidelink resources between the first terminal and the second terminal In unicast communication, release sidelink resources between the first terminal and the second terminal;
  • the communication unit 820 is specifically configured to: send the timeout indication of the target timer to the second terminal through the exception sending resource pool of the first terminal.
  • the abnormal sending resource pool is a resource pool on a licensed carrier or an unlicensed carrier.
  • the exception sending resource pool is configured through system messages, dedicated signaling configuration or predefined of the first network device corresponding to the first terminal.
  • processing unit 810 is also configured to: stop running the target timer when the stop running condition of the target timer is met.
  • the conditions for stopping operation include at least one of the following:
  • the first terminal successfully receives a data packet transmission
  • the first terminal receives the resource pool reconfiguration information sent by the second terminal;
  • the first terminal receives the reconfiguration of the target timer sent by the second terminal;
  • the first terminal and the second terminal switch from the unlicensed carrier to the licensed carrier to work;
  • the first terminal receives the instruction information sent by the second terminal to stop using the target timer
  • the sidelink between the first terminal and the second terminal fails.
  • the indication information is carried in any of the following: PC5-RRC, MAC-CE, SCI.
  • the configuration of the target timer includes at least one of the following: the duration of the target timer, and the number of times the first terminal is allowed to continuously not receive any data or fail to receive data at the transmission resource location indicated in the SCI.
  • the processing unit 810 is also configured to autonomously configure the target timer, or the communication unit 820 is also configured to obtain the configuration of the target timer from the first network device corresponding to the first terminal; the communication unit 820 is also configured to provide the target timer to the second network device.
  • the terminal sends the configuration of the target timer.
  • the communication unit 820 is also configured to: receive a feedback message sent by the second terminal; if it is determined that the target timer configuration fails according to the feedback message, the processing unit 810 is also configured to autonomously reconfigure the target timer, or the communication unit 820 further Used to obtain the reconfiguration of the target timer from the first network device and send the reconfiguration of the target timer to the second terminal.
  • the configuration of the target timer is configured by the first network device to the first terminal through dedicated signaling; when the first terminal is in the RRC idle state or the RRC inactive state, The configuration of the target timer is configured by the first network device to the first terminal through system signaling.
  • the communication unit 820 is specifically configured to send the configuration of the target timer to the second terminal through PC5-RRC, MAC-CE or SCI.
  • the communication unit 820 is also configured to receive the configuration of the target timer from the second terminal.
  • the configuration of the target timer is carried in any of the following: PC5-RRC, MAC-CE, SCI.
  • the communication unit 820 is also configured to: send the configuration of the target timer to the first network device corresponding to the first terminal; and receive a feedback message sent by the first network device, where the feedback message is used to feed back the configuration of the target timer.
  • the communication unit 820 is specifically configured to: when the first terminal is in the RRC connected state, send the configuration of the target timer to the first network device; when the first terminal is in the RRC idle state or RRC inactive state, trigger RRC In the connection process, when the first terminal is in the RRC connection state, the configuration of the target timer is sent to the first network device.
  • the communication unit 820 is also configured to send a feedback message to the second terminal.
  • the communication unit 820 is also configured to send a feedback message to the second terminal through PC5-RRC, MAC-CE or SCI.
  • the communication unit 820 is also configured to receive reconfiguration of the target timer from the second terminal.
  • the target timer is configured autonomously by the second terminal or configured by the second network device corresponding to the second terminal.
  • the configuration of the target timer is configured by the second network device to the second terminal through dedicated signaling; when the second terminal is in the RRC idle state or RRC inactive state, The configuration of the target timer is configured by the second network device to the second terminal through system signaling.
  • the processing unit 810 is also configured to: obtain the associated information of the target timer configuration; determine whether to allow the use of the target timer according to the associated information; accordingly, the processing unit 810 is specifically configured to: determine whether to allow the use of the target according to the associated information. timer, starts or restarts the target timer.
  • the associated information includes at least one of the following:
  • Target address or target address list configuration that allows the use of the target timer when the data sent by the second terminal to the first terminal corresponds to the target address or target address list;
  • Logical channel identifier or logical channel identifier list when the logical channel involved in the data sent by the second terminal to the first terminal corresponds to the logical channel identifier or logical channel identifier list, the configuration of the target timer is allowed to be used;
  • Target priority or target priority domain value configuration that allows the use of the target timer when the priority of the data sent by the second terminal to the first terminal meets the preset conditions corresponding to the target priority or target priority domain value;
  • Resource pool identifier or resource pool identifier list the configuration of the target timer is allowed when the second terminal uses the resource pool identifier or resources in the resource pool identifier list to send data to the first terminal.
  • preset conditions include any of the following:
  • the priority of the data sent by the second terminal to the first terminal is higher than the target priority or the target priority field value
  • the priority of the data sent by the second terminal to the first terminal is higher than or equal to the target priority or the target priority domain value
  • the priority of the data sent by the second terminal to the first terminal is lower than the target priority or the target priority domain value
  • the priority of the data sent by the second terminal to the first terminal is lower than or equal to the target priority or the target priority domain value.
  • the above-mentioned communication unit may be a communication interface or transceiver, or an input/output interface of a communication chip or a system on a chip.
  • the above-mentioned processing unit may be one or more processors.
  • terminal device 800 may correspond to the first terminal in the method embodiment, and the above and other operations and/or functions of each unit in the terminal device 800 are respectively to implement the first terminal in the method embodiment.
  • the corresponding process corresponding to the terminal will not be repeated here for the sake of brevity.
  • FIG. 9 is a schematic diagram of a terminal device 900 provided by an embodiment of the present application.
  • the terminal device 900 is a second terminal and includes: a processing unit 910 and a communication unit 920, where the processing unit 910 is used to start or restart the target timer;
  • the communication unit 920 is configured to send a link response reminder message to the first terminal when the target timer times out, so that the side link between the first terminal and the second terminal is detected.
  • processing unit 910 is specifically configured to: start or restart the target timer when the start or restart conditions of the target timer are met.
  • start or restart conditions of the target timer include at least one of the following:
  • the first terminal successfully receives a data packet transmission
  • the first terminal receives the LBT continuous failure indication sent by the second terminal;
  • the first terminal did not receive any data at the transmission resource location indicated in the SCI or data reception failed;
  • the first terminal does not receive any data at the transmission resource location indicated in the SCI for n consecutive times or fails to receive data.
  • the above n is configured through system message configuration, dedicated signaling configuration, or predefined by the first network device corresponding to the first terminal.
  • processing unit 910 is also configured to: stop running the target timer when the stop running condition of the target timer is met.
  • the conditions for stopping operation include at least one of the following:
  • the first terminal successfully receives a data packet transmission
  • the first terminal receives the resource pool reconfiguration information sent by the second terminal;
  • the first terminal receives the reconfiguration of the target timer sent by the second terminal;
  • the first terminal and the second terminal switch from the unlicensed carrier to the licensed carrier to work;
  • the first terminal receives the instruction information sent by the second terminal to stop using the target timer
  • the sidelink between the first terminal and the second terminal fails.
  • the indication information is carried in any of the following: PC5-RRC, MAC-CE, SCI.
  • the configuration of the target timer includes at least one of the following: the duration of the target timer, and the number of times the first terminal is allowed to continuously not receive any data or fail to receive data at the transmission resource location indicated in the SCI.
  • the communication unit 920 is also configured to receive the configuration of the target timer from the first terminal.
  • the configuration of the target timer is carried in any of the following: PC5-RRC, MAC-CE, SCI.
  • the communication unit 920 is further configured to: send the configuration of the target timer to the second network device corresponding to the second terminal; and receive a feedback message sent by the second network device, where the feedback message is used to feed back the configuration of the target timer.
  • the communication unit 920 is specifically configured to: when the second terminal is in the RRC connected state, send the configuration of the target timer to the second network device; when the second terminal is in the RRC idle state or RRC inactive state, trigger RRC In the connection process, when the second terminal is in the RRC connection state, the configuration of the target timer is sent to the second network device.
  • the communication unit 920 is also configured to send a feedback message to the first terminal.
  • the communication unit 920 is specifically configured to send a feedback message to the first terminal through PC5-RRC, MAC-CE or SCI.
  • the communication unit 920 is also configured to receive reconfiguration of the target timer from the first terminal.
  • the target timer is independently configured by the first terminal or configured by the first network device corresponding to the first terminal.
  • the configuration of the target timer is configured by the first network device to the first terminal through dedicated signaling; when the first terminal is in the RRC idle state or the RRC inactive state, The configuration of the target timer is configured by the first network device to the first terminal through system signaling.
  • the processing unit 910 is also configured to autonomously configure the target timer, or the communication unit 920 is also configured to obtain the configuration of the target timer from the second network device corresponding to the second terminal; the communication unit 920 is also configured to provide the first The terminal sends the configuration of the target timer.
  • the communication unit 920 is also configured to receive a feedback message sent by the first terminal; if it is determined that the target timer configuration fails according to the feedback message, the processing unit 910 is also configured to autonomously reconfigure the target timer, or the communication unit 920 is also configured to Used to obtain the reconfiguration of the target timer from the second network device and send the reconfiguration of the target timer to the first terminal.
  • the configuration of the target timer is configured by the second network device to the second terminal through dedicated signaling; when the second terminal is in the RRC idle state or RRC inactive state, The configuration of the target timer is configured by the second network device to the second terminal through system signaling.
  • the communication unit 920 is specifically configured to send the configuration of the target timer to the first terminal through PC5-RRC, MAC-CE or SCI.
  • the processing unit 910 is also configured to: obtain the associated information of the target timer configuration; determine whether to allow the use of the target timer according to the associated information; accordingly, optionally, the processing unit 910 is specifically configured to: based on the associated information When it is determined that the target timer is allowed to be used, start or restart the target timer.
  • the associated information includes at least one of the following:
  • Target address or target address list configuration that allows the use of the target timer when the data sent by the second terminal to the first terminal corresponds to the target address or target address list;
  • Logical channel identifier or logical channel identifier list when the logical channel involved in the data sent by the second terminal to the first terminal corresponds to the logical channel identifier or logical channel identifier list, the configuration of the target timer is allowed to be used;
  • Target priority or target priority domain value configuration that allows the use of the target timer when the priority of the data sent by the second terminal to the first terminal meets the preset conditions corresponding to the target priority or target priority domain value;
  • Resource pool identifier or resource pool identifier list the configuration of the target timer is allowed when the second terminal uses the resource pool identifier or resources in the resource pool identifier list to send data to the first terminal.
  • preset conditions include any of the following:
  • the priority of the data sent by the second terminal to the first terminal is higher than the target priority or the target priority field value
  • the priority of the data sent by the second terminal to the first terminal is higher than or equal to the target priority or the target priority domain value
  • the priority of the data sent by the second terminal to the first terminal is lower than the target priority or the target priority domain value
  • the priority of the data sent by the second terminal to the first terminal is lower than or equal to the target priority or the target priority domain value.
  • the above-mentioned communication unit may be a communication interface or transceiver, or an input/output interface of a communication chip or a system on a chip.
  • the above-mentioned processing unit may be one or more processors.
  • the terminal device 900 may correspond to the second terminal in the method embodiment, and the above and other operations and/or functions of each unit in the terminal device 900 are respectively for realizing the second terminal in the method embodiment.
  • the corresponding process corresponding to the terminal will not be repeated here for the sake of brevity.
  • Figure 10 is a schematic structural diagram of a communication device 1000 provided by an embodiment of the present application.
  • the communication device 1000 shown in Figure 10 includes a processor 1010.
  • the processor 1010 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
  • the communication device 1000 may further include a memory 1020.
  • the processor 1010 can call and run the computer program from the memory 1020 to implement the method in the embodiment of the present application.
  • the memory 1020 may be a separate device independent of the processor 1010, or may be integrated into the processor 1010.
  • the communication device 1000 can also include a transceiver 1030.
  • the processor 1010 can control the transceiver 1030 to communicate with other devices. Specifically, it can send information or data to other devices, or receive other devices. Information or data sent by the device.
  • the transceiver 1030 may include a transmitter and a receiver.
  • the transceiver 1030 may further include an antenna, and the number of antennas may be one or more.
  • the communication device 1000 can be specifically the first terminal in the embodiment of the present application, and the communication device 1000 can implement the corresponding processes implemented by the first terminal in the various methods of the embodiment of the present application. For the sake of brevity, they are not mentioned here. Again.
  • the communication device 1000 may specifically be the second terminal in the embodiment of the present application, and the communication device 1000 may implement the corresponding processes implemented by the second terminal in the various methods of the embodiment of the present application. For the sake of brevity, they are not mentioned here. Again.
  • Figure 11 is a schematic structural diagram of a device according to an embodiment of the present application.
  • the device 1100 shown in Figure 11 includes a processor 1110.
  • the processor 1110 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
  • the device 1100 may further include a memory 1120.
  • the processor 1110 can call and run the computer program from the memory 1120 to implement the method in the embodiment of the present application.
  • the memory 1120 may be a separate device independent of the processor 1110, or may be integrated into the processor 1110.
  • the device 1100 may also include an input interface 1130.
  • the processor 1110 can control the input interface 1130 to communicate with other devices or chips. Specifically, it can obtain information or data sent by other devices or chips.
  • the device 1100 may also include an output interface 1140.
  • the processor 1110 can control the output interface 1140 to communicate with other devices or chips. Specifically, it can output information or data to other devices or chips.
  • the device can be applied to the first terminal in the embodiment of the present application, and the device can implement the corresponding processes implemented by the first terminal in the various methods of the embodiment of the present application.
  • the details will not be described again.
  • the device can be applied to the second terminal in the embodiment of the present application, and the device can implement the corresponding processes implemented by the second terminal in the various methods of the embodiment of the present application.
  • the details will not be described again.
  • the device mentioned in the embodiment of this application may also be a chip.
  • it can be a system-on-a-chip, a system-on-a-chip, a system-on-a-chip or a system-on-a-chip, etc.
  • the processor in the embodiment of the present application may be an integrated circuit chip and has signal processing capabilities.
  • each step of the above method embodiment can be completed through an integrated logic circuit of hardware in the processor or instructions in the form of software.
  • the above-mentioned processor can be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other available processors.
  • DSP Digital Signal Processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field Programmable Gate Array
  • a general-purpose processor may be a microprocessor or the processor may be any conventional processor, etc.
  • the steps of the method disclosed in conjunction with the embodiments of the present application can be directly implemented by a hardware decoding processor, or executed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other mature storage media in this field.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory. Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory. Volatile memory may be Random Access Memory (RAM), which is used as an external cache.
  • RAM Random Access Memory
  • RAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDR SDRAM
  • enhanced SDRAM ESDRAM
  • Synchlink DRAM SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • the memory in the embodiment of the present application can also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is, memories in embodiments of the present application are intended to include, but are not limited to, these and any other suitable types of memories.
  • Embodiments of the present application also provide a computer-readable storage medium for storing computer programs.
  • the computer-readable storage medium can be applied to the network equipment or base station in the embodiment of the present application, and the computer program causes the computer to execute the corresponding processes implemented by the network equipment or the base station in each method of the embodiment of the present application, in order to It’s concise and I won’t go into details here.
  • the computer-readable storage medium can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding processes implemented by the mobile terminal/terminal device in the various methods of the embodiment of the present application. , for the sake of brevity, will not be repeated here.
  • An embodiment of the present application also provides a computer program product, including computer program instructions.
  • the computer program product can be applied to the network equipment or base station in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding processes implemented by the network equipment or the base station in the various methods of the embodiment of the present application.
  • the computer program instructions cause the computer to execute the corresponding processes implemented by the network equipment or the base station in the various methods of the embodiment of the present application.
  • the computer program product can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding processes implemented by the mobile terminal/terminal device in each method of the embodiment of the present application, For the sake of brevity, no further details will be given here.
  • An embodiment of the present application also provides a computer program.
  • the computer program can be applied to the network equipment or base station in the embodiments of the present application.
  • the computer program When the computer program is run on the computer, it causes the computer to execute the corresponding steps implemented by the network equipment or the base station in the various methods of the embodiments of the present application. The process, for the sake of brevity, will not be repeated here.
  • the computer program can be applied to the mobile terminal/terminal device in the embodiments of the present application.
  • the computer program When the computer program is run on the computer, it causes the computer to execute the various methods implemented by the mobile terminal/terminal device in the embodiments of the present application. The corresponding process, for the sake of brevity, will not be repeated here.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of this application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供了一种无线通信方法及设备,该方法包括:启动或重启目标定时器;在目标定时器超时时进行目标操作,以使第一终端与第二终端之间的侧行链路资源被释放或者重配置,从而可以降低接收端终端的功耗。

Description

无线通信方法及设备 技术领域
本申请实施例涉及通信领域,并且更具体地,涉及一种无线通信方法及设备。
背景技术
设备到设备(Device to Device,D2D)、车辆到车辆(Vehicle to Vehicle,V2V)、车联网(Vehicle to Everything,V2X)等通信架构可以基于侧行链路(Sidelink,SL)技术实现设备之间的通信,与传统的蜂窝系统中通信数据通过网络设备接收或者发送的方式不同。这种终端与终端之间的直接通信方式,具有更高的频谱效率以及更低的传输时延。
目前发送端终端在进行数据发送时,会在发送给接收端终端的侧行链路控制信息(Sidelink Control Information,SCI)内指示该数据对应的本次传输资源位置与之后重传资源的位置。但是如果发送端终端和接收端终端工作在非授权频谱上时,发送端终端需要执行先听后说(Listen Before Talk,LBT)机制,因此SCI中指示的传输资源不一定能被发送端终端成功占用。例如:如果发送端终端发生LBT失败,那么发送端终端将无法在SCI所指示的传输资源上发送数据,但是接收端终端会在SCI指示的传输资源上持续监听,从而导致接收端终端功耗过大的问题。
发明内容
本申请实施例提供了一种无线通信方法及设备,从而可以降低接收端终端的功耗。
第一方面,提供一种无线通信方法,该方法应用于第一终端,该方法包括:启动或重启目标定时器;在目标定时器超时时进行目标操作,以使第一终端与第二终端之间的侧行链路资源被释放或者重配置。
第二方面,提供一种无线通信方法,该方法应用于第二终端,该方法包括:启动或重启目标定时器;在目标定时器超时时向第一终端发送链路响应提醒消息,以使第一终端与第二终端之间的侧行链路被检测。
第三方面,提供一种终端设备,该终端设备为第一终端,包括:处理单元和通信单元;其中,处理单元用于启动或重启目标定时器;处理单元或通信单元用于在目标定时器超时时进行目标操作,以使第一终端与第二终端之间的侧行链路资源被释放或者重配置。
第四方面,提供一种终端设备,该终端设备为第二终端,包括:处理单元和通信单元,其中,处理单元用于启动或重启目标定时器;通信单元用于在目标定时器超时时向第一终端发送链路响应提醒消息,以使第一终端与第二终端之间的侧行链路被检测。
第五方面,提供了一种终端设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第一方面或其各实现方式中的方法。
第六方面,提供了一种终端设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第二方面或其各实现方式中的方法。
第七方面,提供了一种装置,用于实现上述第一方面至第二方面中任一项中的方法。
具体地,该装置包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该装置的设备执行如上述第一方面至第二方面中任一个方面或其各实现方式中的方法。
第八方面,提供了一种计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述第一方面至第二方面中任一方面或其各实现方式中的方法。
第九方面,提供了一种计算机程序产品,包括计算机程序指令,计算机程序指令使得计算机执行上述第一方面至第二方面中任一方面或其各实现方式中的方法。
第十方面,提供了一种计算机程序,当其在计算机上运行时,使得计算机执行上述第一方面至第二方面中任一方面或其各实现方式中的方法。
在本申请中,通过设置目标定时器可以防止第一终端,即接收端终端进行盲目监听,从而可以降低接收端终端的功耗。
附图说明
图1为本申请提供的第一模式的示意图;
图2为本申请提供的第二模式的示意图;
图3为本申请实施例提供的单播传输示意图;
图4为本申请实施例提供的组播传输示意图;
图5为本申请实施例提供的广播传输示意图;
图6为本申请实施例提供的一种无线通信方法的流程图;
图7为本申请实施例提供的另一种无线通信方法的流程图;
图8为本申请实施例提供的一种终端设备800的示意图;
图9为本申请实施例提供的一种终端设备900的示意图;
图10是本申请实施例提供的一种通信设备1000示意性结构图;
图11是本申请实施例的装置的示意性结构图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。针对本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
在介绍本申请技术方案之前,下面先对本申请的相关概念进行阐述:
一、长期演进(Long Term Evolution,LTE)D2D/V2X
设备到设备通信是基于D2D的一种侧行链路传输技术,与传统的蜂窝系统中通信数据通过网络设备接收或者发送的方式不同,因此具有更高的频谱效率以及更低的传输时延。车联网系统采用终端到终端直接通信的方式,在3GPP定义了两种传输模式:第一模式和第二模式。
第一模式:如图1所示,终端的传输资源是由网络设备分配的,终端根据网络设备分配的资源在侧行链路上进行数据的发送;网络设备可以为终端分配单次传输的资源,也可以为终端分配半静态传输的资源。在LTE-V2X中又称为模式3。
第二模式:如图2所示,终端在资源池中选取一个资源进行数据的传输。在LTE-V2X中又称为模式4。
在第三代合作伙伴计划(3rd Generation Partnership Project,3GPP)中,D2D分成了不同的阶段进行研究。
邻近服务(Proximity based Service,ProSe):在版本(Release,Rel)12/13中设备到设备通信,是针对ProSe的场景进行了研究,其主要针对公共安全类的业务。在ProSe中,通过配置资源池在时域上的位置,例如资源池在时域上非连续,达到终端在侧行链路上非连续发送/接收数据,从而达到省电的效果。
V2X:在Rel14/15中,车联网系统针对车车通信的场景进行了研究,其主要面向相对高速移动的车车、车人通信的业务;在V2X中,由于车载系统具有持续的供电,因此功率效率不是主要问题,而数据传输的时延是主要问题,因此在系统设计上要求终端设备进行连续的发送和接收。
可穿戴设备(FeD2D):在Rel14中,这个场景对于可穿戴设备通过手机接入网络的场景进行了研究,其主要面向是低移动速度以及低功率接入的场景。
二、新空口(New Radio,NR)-V2X
在NR-V2X中,需要支持自动驾驶,因此对车辆之间数据交互提出了更高的要求,如更高的吞吐量、更低的时延、更高的可靠性、更大的覆盖范围、更灵活的资源分配等。
在NR-V2X中,引入了单播和组播的传输方式。对于单播传输,其接收端只有一个终端,如图3所示,UE1、UE2之间进行单播传输;对于组播传输,其接收端是一个通信组内的所有终端,或者是在一定传输距离内的所有终端,如图4所示,UE1、UE2、UE3和UE4构成一个通信组,其中UE1发送数据,该组内的其他UE都是接收端;对于广播传输方式,其接收端是发送端周围的任意一个终端,如图5,UE1是发送端,其周围的其他UE,即UE2-UE6都是接收端。
三、非授权频谱和LBT机制
非授权频谱是国家和地区划分的可用于无线电设备通信的频谱,该频谱通常被认为是共享频谱,即通信设备只要满足国家或地区在该频谱上设置的法规要求,例如LTB机制,就可以使用该频谱。通信设备遵循LTB机制,即通信设备在使用非授权频谱时,只有当信道监听结果为信道空闲或者说LBT成功时,该通信设备才可以通过该非授权频谱进行数据发送,当信道监听结果为信道忙或者说LBT失败时,该通信设备不可以通过该非授权频谱进行数据发送。
应理解的是,在终端与终端之间的直接通信方式中,这里的通信设备可以是终端设备,具体可以是发送端终端。
目前发送端终端在进行数据发送时,会在发送给接收端终端的SCI内指示该数据对应的本次传输资源位置与之后重传资源的位置。但是如果发送端终端和接收端终端工作在非授权频谱上时,发送端终端需要执行LBT机制,因此SCI中指示的传输资源不一定能被发送端终端成功占用。例如:如果发送端终端发生LBT失败,那么发送端终端将无法在SCI所指示的传输资源上发送数据,但是接收 端终端会在SCI指示的传输资源上持续监听,从而导致接收端终端功耗过大的问题。
为了解决上述技术问题,本申请可以设置定时器,只要该定时器超时可以说明发送端终端LBT持续失败时间较长或者即使LBT成功,但是接收端终端无法接收到数据或者数据接收失败的持续时间较长,这时可以释放或者重配置侧行链路资源,又或者可以检测侧行链路的情况,从而使得接收端终端无需盲目监听,进而可以降低接收端终端的功耗。
应理解的是,本申请实施例中的终端设备也可以称为用户设备(User Equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、无线通信设备、终端、用户代理或用户装置等。终端设备可以是WLAN中的站点(STAION,ST),可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)设备、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备以及下一代通信系统,例如,NR网络中的终端或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)网络中的终端等。
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。
网络设备可以是用于与移动设备通信的设备,网络设备可以是WLAN中的接入点(Access Point,AP),GSM或CDMA中的基站(Base Transceiver Station,BTS),也可以是WCDMA中的基站(NodeB,NB),还可以是LTE中的演进型基站(Evolutional Node B,eNB或eNodeB),或者中继站或接入点,或者车载设备、可穿戴设备以及NR网络中的网络设备或者基站(gNB)或者未来演进的PLMN网络中的网络设备等。
应理解的是,本申请实施例不仅适用于D2D、V2V、V2X等通信框架,还可以适用于其他任何终端到终端的通信框架,本申请对此不作限制。本申请实施例应用于非授权频谱,该非授权频谱也可以被称为免授权频谱。
应理解,在本申请的实施例中提到的“指示”可以是直接指示,也可以是间接指示,还可以是表示具有关联关系。举例说明,A指示B,可以表示A直接指示B,例如B可以通过A获取;也可以表示A间接指示B,例如A指示C,B可以通过C获取;还可以表示A和B之间具有关联关系。
在本申请实施例的描述中,术语“对应”可表示两者之间具有直接对应或间接对应的关系,也可以表示两者之间具有关联关系,也可以是指示与被指示、配置与被配置等关系。
下面将对本申请技术方案进行详细阐述:
图6为本申请实施例提供的一种无线通信方法的流程图,该方法可以由第一终端执行,该第一终端可以是接收端终端,如图6所示,该方法包括如下:
S610:启动或重启目标定时器;
S620:在目标定时器超时时进行目标操作,以使第一终端与第二终端之间的侧行链路资源被释放或者重配置。
可选地,该目标定时器侧行链路通信中引入的额外定时器,该定时器可以被称为侧行链路LBT发送定时器,即sidelinkLbtTransmissionTimer。由于侧行链路也被称为直通链路,因此,该定时器也被称为直通链路LBT发送定时器。
可选地,在满足目标定时器的启动或重启条件时,第一终端启动或重启目标定时器。
可选地,目标定时器的启动或重启条件包括以下至少一项,但不限于此:
第一终端成功接收到一次数据包传输;
第一终端接收到第二终端发送的LBT持续失败指示;
第一终端在SCI中指示的传输资源位置上未接收到任何数据或数据接收失败;
第一终端在SCI中指示的传输资源位置上连续n次未接收到任何数据或数据接收失败。
可选地,第一终端成功接收到一次数据包传输中的数据包可以是初传数据包或者重传数据包,本申请对此不做限制。
应理解的是,在本申请中,数据包也可以被称为数据,数据也可以被称为数据包。
应理解的是,第二终端可以是发送端终端。
可选地,当第一终端和第二终端工作在非授权频谱上时,第二终端在向第一终端发送数据时需要执行LBT机制,一旦LBT失败并且LBT失败持续时长达到预设时长时,第二终端可以向第一终端发送LBT持续失败指示,以指示LBT持续失败。
可选地,上述SCI是第二终端发送给第一终端的SCI,该SCI可以指示本次传输资源位置与之后重传资源的位置。
应理解的是,第一终端在SCI中指示的传输资源位置上未接收到任何数据或数据接收失败可能是由于LBT失败导致的,也可能是LBT成功,但是是由于第一终端自身故障或者其他原因导致的。此外,第一终端在SCI中指示的传输资源位置上数据接收失败包括:未接收到任何数据,或者即使接收到了数据,但是该数据被篡改了等等。
可选地,上述n是通过第一终端对应的第一网络设备的系统消息配置、专有信令配置或者预定义的。
可选地,上述n可以是大于1的整数,例如:n的取值可以是3。
可选地,在满足目标定时器的停止运行条件时,第一终端可以停止运行目标定时器。
可选地,该停止运行条件包括以下至少一项,但不限于此:
第一终端成功接收到一次数据包传输;
第一终端接收到第二终端发送的资源池重配信息;
第一终端接收到第二终端发送的目标定时器的重配置;
第一终端与第二终端从非授权载波切换至授权载波上进行工作;
第一终端接收到第二终端发送的停止使用目标定时器的指示信息;
在单播通信中,第一终端与第二终端之间的侧行链路失败。
可选地,第一终端成功接收到一次数据包传输中的数据包可以是初传数据包或者重传数据包,本申请对此不做限制。
可选地,上述资源池重配信息可以是第二终端用于发送数据的资源池的重配信息,该资源池重配信息可以包括:重配后的资源池的标识等,或者,该资源池重配信息用于指示第二终端用于发送数据的资源池已被重配置,总之,本申请对资源池重配信息不做限制。
应理解的是,一旦第二终端用于发送数据的资源池发生了重配置,可以说明第二终端与第一终端之间的侧行链路资源发生了重配置,那么从上述目标定时器的作用可知,这时可以停止运行目标定时器。
可选地,目标定时器的配置可以包括以下至少一项,但不限于此:目标定时器的时长、允许第一终端在SCI中指示的传输资源位置上连续未接收到任何数据或数据接收失败的次数。
例如:当目标定时器的配置包括:目标定时器的时长时,那么从目标定时器的启动时间开始,如果目标定时器的运行时长达到或者超过该配置中包括的目标定时器的时长时,那么目标定时器将超时。再例如:当目标定时器的配置包括:允许第一终端在SCI中指示的传输资源位置上连续未接收到任何数据或数据接收失败的次数是n时,那么从目标定时器的启动时间开始,如果第一终端在SCI中指示的传输资源位置上连续未接收到任何数据或数据接收失败的次数大于n时,那么目标定时器将超时。又例如:当目标定时器的配置包括:目标定时器的时长和允许第一终端在SCI中指示的传输资源位置上连续未接收到任何数据或数据接收失败的次数n时,那么从目标定时器的启动时间开始,如果目标定时器的运行时长达到或者超过该配置中包括的目标定时器的时长,并且第一终端在SCI中指示的传输资源位置上连续未接收到任何数据或数据接收失败的次数大于n时,那么目标定时器将超时。
应理解的是,一旦目标定时器被重配置,可以说明重配置之前的目标定时器作废,这时可以停止运行重配置之前的目标定时器。
应理解的是,设置目标定时器的前提是第一终端与第二终端工作在非授权载波或者非授权频谱上,因此,一旦第一终端与第二终端从非授权载波切换至授权载波上进行工作时,这时目标定时器就没有存在的意义,基于此,可以停止运行重配置之前的目标定时器。
可选地,在第二终端确定用于发送数据的资源池发生了重配置、目标定时器发生了重配置、第一终端与第二终端从非授权载波切换至授权载波上进行工作或者在单播通信中,第一终端与第二终端之间的侧行链路失败等情况下,第二终端可以向第一终端发送停止使用目标定时器的指示信息。
可选地,第二终端发送的停止使用目标定时器的指示信息可以携带在以下任一项中,但不限于此:PC5-无线资源控制(Radio Resource Control,RRC)、媒体接入层控制单元(Media Access Control Control Element,MAC-CE)、SCI。
应理解的是,在单播通信中,当第一终端与第二终端之间的侧行链路失败时,这时第一终端不会 在该侧行链路上在SCI指示的传输资源上进行监听,因此,这时目标定时器就没有存在的意义,基于此,可以停止运行重配置之前的目标定时器。
可选地,上述目标操作包括以下至少一项,但不限于此:
在单播通信中,释放第一终端与第二终端之间的侧行链路资源;
向第一终端对应的第一网络设备上报目标定时器的超时事件;
向第二终端发送目标定时器的超时指示;
启动T400定时器。
应理解的是,在单播通信中,当目标定时器超时时,第一终端认为它与第二终端之间的侧行链路失败,这时第一终端可以释放第一终端与第二终端之间的侧行链路资源,以使第一终端不会在SCI指示的传输资源上进行监听。
可选地,当第一终端向第一网络设备上报目标定时器的超时事件后,第一网络设备可以触发第一终端和第二终端释放二者之间的侧行链路资源,以使第一终端不会在SCI指示的传输资源上进行监听。或者,第一网络设备可以对二者之间的侧行链路进行重配置,使得第一终端可以在SCI指示的传输资源上进行有效监听。
可选地,当第一终端向第二终端发送目标定时器的超时指示后,第二终端可以主动释放它与第一终端之间的侧行链路资源,或者,第一终端和第二终端均释放二者之间的侧行链路资源,以使第一终端不会在SCI指示的传输资源上进行监听。或者,第二终端可以将该超时指示转发给它对应的第二网络设备,基于此,第二网络设备可以对二者之间的侧行链路进行重配置,使得第一终端可以在SCI指示的传输资源上进行有效监听。
应理解的是,T400定时器的配置如表1所示:
表1
Figure PCTCN2022085494-appb-000001
可选地,当T400超时时,可以触发侧行链路的重配置。
可选地,第一终端在目标定时器超时时,可以向第二终端发送目标定时器的超时指示,同时启动T400定时器,一旦该T400定时器超时时,第一终端可以对侧行链路进行重配置,或者触发第二终端对侧行链路进行重配置等。
可选地,第一终端可以通过第一终端的异常发送资源池向第二终端发送目标定时器的超时指示。
可选地,该异常发送资源池是通过第一网络设备的系统消息配置、专有信令配置或者预定义的。
可选地,在第一终端处于RRC空闲态或RRC非活跃态时,异常发送资源池可以是第一网络设备通过系统信令配置给第一终端的。在第一终端处于RRC连接态时,异常发送资源池可以是第一网络设备通过专有信令配置给第一终端的。
可选地,异常发送资源池是授权载波或者非授权载波上的资源池。
综上,在本申请中,通过设置目标定时器可以防止第一终端,即接收端终端进行盲目监听,从而可以降低接收端终端的功耗。
可选地,目标定时器的配置方式包括以下几种可实现方式,但不限于此:
可实现方式一:第一终端自主配置目标定时器。
可实现方式二:第一网络设备配置目标定时器。
可实现方式三:第二终端自主配置目标定时器。
可实现方式四:第二网络设备配置目标定时器。
下面对可实现方式一和可实现方式二进行说明:
可选地,第一终端自主配置或者第一网络设备配置了目标定时器之后,第一终端可以将目标定时器的配置同步给第二终端,以使第二终端可以使用该目标定时器。
可选地,在第一网络设备配置目标定时器的情况下,在第一终端处于RRC连接态时,目标定时器的配置是第一网络设备通过专用信令配置给第一终端的;在第一终端处于RRC空闲态或RRC非活跃态时,目标定时器的配置是第一网络设备通过系统信令配置给第一终端的。
可选地,第一终端可以通过PC5-RRC、MAC-CE或SCI向第二终端发送目标定时器的配置,但不限于此。
可选地,在单播通信中,第一终端可以通过单播方式将目标定时器的配置同步给一个第二终端。 在广播通信中,第一终端可以通过广播方式将目标定时器的配置同步给多个第二终端。类似的,在组播通信中,第一终端可以通过组播方式将目标定时器的配置同步给多个第二终端。
可选地,第一终端还可以接收第二终端发送的反馈消息,该反馈消息用于指示在第二终端目标定时器的配置情况,包括:配置失败或者配置成功两种情况,若根据反馈消息确定目标定时器配置失败,则第一终端自主重配置目标定时器或者从第一网络设备获取目标定时器的重配置,并向第二终端发送目标定时器的重配置。
应理解的是,在第二终端侧,若目标定时器配置失败,那么上述反馈消息也被称为配置失败消息。若目标定时器配置成功,那么上述反馈消息也被称为配置完成消息。
可选地,在单播通信中,第二终端可以向第一终端发送反馈消息,在广播或者组播方式中,第二终端可以不向第一终端发送反馈消息,当然,也可以向第一终端发送反馈消息,本申请对此不做限制。
可选地,第二终端在接收到目标定时器的配置之后,其可以向自己对应的第二网络设备发送目标定时器的配置;并接收第二网络设备发送的反馈消息,反馈消息用于反馈目标定时器的配置情况,包括:配置失败或者配置成功两种情况。
可选地,在第二终端处于RRC连接态时,第二终端可以直接向第二网络设备发送目标定时器的配置;在第二终端处于RRC空闲态或RRC非活跃态时,第二终端可以先触发RRC连接过程,当完成RRC连接之后,第二终端处于RRC连接态,这时第二终端可以向第二网络设备发送目标定时器的配置。
可选地,在单播通信中,第二终端可以向第二网络设备发送目标定时器的配置;并接收第二网络设备发送的反馈消息。在广播或者组播通信中,第二终端可以不向第二网络设备发送目标定时器的配置;并且也不会接收到第二网络设备发送的反馈消息,当然,在广播或者组播通信中,第二终端也可以向第二网络设备发送目标定时器的配置;并且接收第二网络设备发送的反馈消息,本申请对此不做限制。
下面对可实现方式三和可实现方式四进行说明:
可选地,第二终端自主配置或者第二网络设备配置了目标定时器之后,第二终端可以将目标定时器的配置同步给第一终端,以使第一终端可以使用该目标定时器。
可选地,在第二网络设备配置目标定时器的情况下,在第二终端处于RRC连接态时,目标定时器的配置是第二网络设备通过专用信令配置给第二终端的;在第二终端处于RRC空闲态或RRC非活跃态时,目标定时器的配置是第二网络设备通过系统信令配置给第二终端的。
可选地,第二终端可以通过PC5-RRC、MAC-CE或SCI向第一终端发送目标定时器的配置,但不限于此。
可选地,第二终端还可以接收第一终端发送的反馈消息,该反馈消息用于指示在第一终端目标定时器的配置情况,包括:配置失败或者配置成功两种情况,若根据反馈消息确定目标定时器配置失败,则第二终端可以自主重配置目标定时器或者从第二网络设备获取目标定时器的重配置,并向第一终端发送目标定时器的重配置。
应理解的是,在第一终端侧,若目标定时器配置失败,那么上述反馈消息也被称为配置失败消息。若目标定时器配置成功,那么上述反馈消息也被称为配置完成消息。
可选地,第一终端在接收到目标定时器的配置之后,其可以向自己对应的第一网络设备发送目标定时器的配置;并接收第一网络设备发送的反馈消息,反馈消息用于反馈目标定时器的配置情况,包括:配置失败或者配置成功两种情况。
可选地,在第一终端处于RRC连接态时,第一终端可以直接向第一网络设备发送目标定时器的配置;在第一终端处于RRC空闲态或RRC非活跃态时,第一终端可以先触发RRC连接过程,当完成RRC连接之后,第一终端处于RRC连接态,这时第一终端可以向第一网络设备发送目标定时器的配置。
综上,在本申请中,可以通过多种方式来配置目标定时器,从而保证了目标定时器配置方式的多样性。
可选地,上述目标定时器可以配置给任何终端设备,也可以配置给满足一定条件的终端设备,具体如下:
可选地,第一终端可以获取目标定时器的配置的关联信息,根据该关联信息确定是否允许使用目标定时器。基于此,在根据关联信息确定允许使用目标定时器时,第一终端才启动或重启目标定时器。
可选地,关联信息包括以下至少一项,但不限于此:
目标地址或目标地址列表;
逻辑信道标识或逻辑信道标识列表;
目标优先级或目标优先级域值;
资源池标识或资源池标识列表。
应理解的是,当第二终端发送给第一终端的数据对应于目标地址或目标地址列表时允许使用目标定时器的配置。例如:当第二终端发送给第一终端的数据对应的是目标地址A,它是关联信息所包括的目标地址,或者它属于关联信息所包括的目标地址列表,那么这时第一终端才可以使用目标定时器。
可选地,这里的目标地址可以是互联网协议(Internet Protocol,IP)地址,目标地址列表可以是IP地址列表。
应理解的是,当第二终端发送给第一终端的数据所涉及的逻辑信道对应于逻辑信道标识或逻辑信道标识列表时允许使用目标定时器的配置。例如:当第二终端通过逻辑信道B向第一终端发送数据时,且该逻辑信道B的标识与关联信息所包括的逻辑信道标识一致,或者该逻辑信道B的标识属于关联信息所包括的逻辑信道标识列表,那么这时第一终端才可以使用目标定时器。
应理解的是,当第二终端发送给第一终端的数据的优先级满足目标优先级或目标优先级域值对应的预设条件时允许使用目标定时器的配置。
可选地,该预设条件包括以下任一项,但不限于此:
(1)第二终端发送给第一终端的数据的优先级高于目标优先级或目标优先级域值;
(2)第二终端发送给第一终端的数据的优先级高于或等于目标优先级或目标优先级域值;
(3)第二终端发送给第一终端的数据的优先级低于目标优先级或目标优先级域值;
(4)第二终端发送给第一终端的数据的优先级低于或等于目标优先级或目标优先级域值。
例如:假设第二终端发送给第一终端的数据的优先级是1,目标优先级或目标优先级域值是3,其中,优先级对应的数值越小,表示优先级等级越高,假设预设条件是上述第(1)条,基于此,由于第二终端发送给第一终端的数据的优先级高于目标优先级或目标优先级域值,那么这时第一终端才可以使用目标定时器。
应理解的是,上述关联信息包括的资源池标识或资源池标识列表是针对第二终端的发送资源池而言的,该发送资源池用于第二终端进行数据发送。当第二终端使用资源池标识或资源池标识列表中的资源向第一终端发送数据时允许使用目标定时器的配置。
例如:当第二终端使用资源C向第一终端发送数据,而该资源C的标识与关联信息所包括的资源池标识标识一致,或者该资源C的标识属于关联信息所包括的资源池标识列表,那么这时第一终端才可以使用目标定时器。
综上,在本申请中,目标定时器可以被配置给任何终端设备,也可以配置给满足一定条件的终端设备,从而提高了目标定时器的配置灵活性。
图7为本申请实施例提供的另一种无线通信方法的流程图,该方法可以由第二终端执行,该第二终端可以是发送端终端,如图7所示,该方法包括如下:
S710:启动或重启目标定时器;
S720:在目标定时器超时时向第一终端发送链路响应提醒消息,以使第一终端与第二终端之间的侧行链路被检测。
可选地,在目标定时器的运行时长内,第二终端可以进行资源选择,并且向第一终端发送数据包,一旦该定时器超时,那么第二终端可以向第一终端发送链路响应提醒消息,以使第一终端与第二终端之间的侧行链路被检测。当该侧行链路得到恢复之后,第二终端可以继续向第一终端发送数据包。
应理解的是,该链路响应提醒消息用于指示第一终端检测侧行链路,这时如果第一终端检测侧行链路失败,那么第一终端可以停止在SCI指示的传输资源上进行监听,从而可以降低第一终端,即接收端终端的功耗。
需要说明的是,在第二终端的目标定时器的启动条件、停止运行条件以及配置与第一终端的目标定时器保持一致。从上述目标定时器的启动条件、停止运行条件以及配置可知,这些条件以及配置都是从第一终端角度来讲的,但是第二终端作为发送端终端,它可以预估或者确定它与第一终端之间的数据传输时延,从而可以确定目标定时器的启动条件、停止运行条件以及配置等。
例如,假设目标定时器的启动或重启条件包括:第一终端成功接收到一次数据包传输,那么第二终端可以计算该数据包的发送时间与数据包传输时延之和,得到该数据包的接收时间。再例如,假设目标定时器的启动或重启条件包括:第一终端接收到第二终端发送的LBT持续失败指示,那么第二终端可以计算该LBT持续失败指示的发送时间与LBT持续失败指示传输时延之和,得到该LBT持续失败指示的接收时间。又例如,假设目标定时器的启动或重启条件包括:第一终端在SCI中指示的传输资源位置上未接收到任何数据或数据接收失败,那么第二终端可以计算这对该传输资源进行的LBT失败时间与数据传输时延之和,得到在该传输资源上数据接收失败的时间。又例如,假设目标定时器 的启动或重启条件包括:第一终端在SCI中指示的传输资源位置上连续n次未接收到任何数据或数据接收失败,那么第二终端可以计算这对该传输资源进行的第n次LBT失败时间与数据传输时延之和,得到在该传输资源上第n次数据接收失败的时间。
例如,假设停止运行条件包括:第一终端接收到第二终端发送的资源池重配信息,那么第二终端可以计算该数据包的发送时间与数据包传输时延之和,得到该数据包的接收时间。再例如,假设停止运行条件包括:第一终端接收到第二终端发送的目标定时器的重配置,那么第二终端可以计算该目标定时器的重配置的发送时间与该重配置的传输时延之和,得到该重配置的接收时间。又例如,假设停止运行条件包括:第一终端与第二终端从非授权载波切换至授权载波上进行工作,这时由于第一终端与第二终端同步从非授权载波切换至授权载波上,因此,这里无需考虑第一终端与第二终端之间的传输时延,第二终端与第一终端的载波切换时间完全一致。再例如,假设停止运行条件包括:第一终端接收到第二终端发送的停止使用目标定时器的指示信息;那么第二终端可以计算该指示信息的发送时间与该指示信息的传输时延之和,得到该指示信息的接收时间。最后,假设停止运行条件包括:在单播通信中,第一终端与第二终端之间的侧行链路失败,这时由于第一终端与第二终端可以同步获知二者之间的侧行链路失败,因此,这里无需考虑第一终端与第二终端之间的传输时延,第二终端与第一终端的侧行链路失败时间完全一致。
应理解的是,关于目标定时器的启动条件、停止运行条件、配置以及配置方式可参考图6对应的方法实施例,本申请对此不再赘述。
在本申请中,发送端终端可以也可以被设置目标定时器,在目标定时器超时时向第一终端发送链路响应提醒消息,以使第一终端与第二终端之间的侧行链路被检测,从而方式接收端终端进行盲目监听,进而可以降低接收端终端的功耗。
图8为本申请实施例提供的一种终端设备800的示意图,该终端设备800为上述第一终端,包括:处理单元810和通信单元820;其中,处理单元810用于启动或重启目标定时器;处理单元810或通信单元820用于在目标定时器超时时进行目标操作,以使第一终端与第二终端之间的侧行链路资源被释放或者重配置。
可选地,处理单元810具体用于:在满足目标定时器的启动或重启条件时,启动或重启目标定时器。
可选地,目标定时器的启动或重启条件包括以下至少一项:
第一终端成功接收到一次数据包传输;
第一终端接收到第二终端发送的LBT持续失败指示;
第一终端在SCI中指示的传输资源位置上未接收到任何数据或数据接收失败;
第一终端在SCI中指示的传输资源位置上连续n次未接收到任何数据或数据接收失败。
可选地,上述n是通过第一终端对应的第一网络设备的系统消息配置、专有信令配置或者预定义的。
可选地,目标操作包括以下至少一项:
在单播通信中,释放第一终端与第二终端之间的侧行链路资源;
向第一终端对应的第一网络设备上报目标定时器的超时事件;
向第二终端发送目标定时器的超时指示;
启动T400定时器。
可选地,通信单元820具体用于:通过第一终端的异常发送资源池向第二终端发送目标定时器的超时指示。
可选地,异常发送资源池是授权载波或者非授权载波上的资源池。
可选地,异常发送资源池是通过第一终端对应的第一网络设备的系统消息配置、专有信令配置或者预定义的。
可选地,处理单元810还用于:在满足目标定时器的停止运行条件时,停止运行目标定时器。
可选地,停止运行条件包括以下至少一项:
第一终端成功接收到一次数据包传输;
第一终端接收到第二终端发送的资源池重配信息;
第一终端接收到第二终端发送的目标定时器的重配置;
第一终端与第二终端从非授权载波切换至授权载波上进行工作;
第一终端接收到第二终端发送的停止使用目标定时器的指示信息;
在单播通信中,第一终端与第二终端之间的侧行链路失败。
可选地,指示信息携带在以下任一项中:PC5-RRC、MAC-CE、SCI。
可选地,目标定时器的配置包括以下至少一项:目标定时器的时长、允许第一终端在SCI中指示的传输资源位置上连续未接收到任何数据或数据接收失败的次数。
可选地,处理单元810还用于自主配置目标定时器,或者,通信单元820还用于从第一终端对应的第一网络设备获取目标定时器的配置;通信单元820还用于向第二终端发送目标定时器的配/置。
可选地,通信单元820还用于:接收第二终端发送的反馈消息;若根据反馈消息确定目标定时器配置失败,则处理单元810还用于自主重配置目标定时器,或者通信单元820还用于从第一网络设备获取目标定时器的重配置,并向第二终端发送目标定时器的重配置。
可选地,在第一终端处于RRC连接态时,目标定时器的配置是第一网络设备通过专用信令配置给第一终端的;在第一终端处于RRC空闲态或RRC非活跃态时,目标定时器的配置是第一网络设备通过系统信令配置给第一终端的。
可选地,通信单元820具体用于:通过PC5-RRC、MAC-CE或SCI向第二终端发送目标定时器的配置。
可选地,通信单元820还用于:接收来自于第二终端的目标定时器的配置。
可选地,目标定时器的配置携带在以下任一项中:PC5-RRC、MAC-CE、SCI。
可选地,通信单元820还用于:向第一终端对应的第一网络设备发送目标定时器的配置;接收第一网络设备发送的反馈消息,反馈消息用于反馈目标定时器的配置情况。
可选地,通信单元820具体用于:在第一终端处于RRC连接态时,向第一网络设备发送目标定时器的配置;在第一终端处于RRC空闲态或RRC非活跃态时,触发RRC连接过程,在第一终端处于RRC连接态时,向第一网络设备发送目标定时器的配置。
可选地,通信单元820还用于:向第二终端发送反馈消息。
可选地,通信单元820还用于:通过PC5-RRC、MAC-CE或SCI向第二终端发送反馈消息。
可选地,通信单元820还用于:接收来自于第二终端的目标定时器的重配置。
可选地,目标定时器是第二终端自主配置的或者是第二终端对应的第二网络设备配置的。
可选地,在第二终端处于RRC连接态时,目标定时器的配置是第二网络设备通过专用信令配置给第二终端的;在第二终端处于RRC空闲态或RRC非活跃态时,目标定时器的配置是第二网络设备通过系统信令配置给第二终端的。
可选地,处理单元810还用于:获取目标定时器的配置的关联信息;根据关联信息确定是否允许使用目标定时器;相应的,处理单元810具体用于:在根据关联信息确定允许使用目标定时器时,启动或重启目标定时器。
可选地,关联信息包括以下至少一项:
目标地址或目标地址列表;当第二终端发送给第一终端的数据对应于目标地址或目标地址列表时允许使用目标定时器的配置;
逻辑信道标识或逻辑信道标识列表;当第二终端发送给第一终端的数据所涉及的逻辑信道对应于逻辑信道标识或逻辑信道标识列表时允许使用目标定时器的配置;
目标优先级或目标优先级域值;当第二终端发送给第一终端的数据的优先级满足目标优先级或目标优先级域值对应的预设条件时允许使用目标定时器的配置;
资源池标识或资源池标识列表;当第二终端使用资源池标识或资源池标识列表中的资源向第一终端发送数据时允许使用目标定时器的配置。
可选地,预设条件包括以下任一项:
第二终端发送给第一终端的数据的优先级高于目标优先级或目标优先级域值;
第二终端发送给第一终端的数据的优先级高于或等于目标优先级或目标优先级域值;
第二终端发送给第一终端的数据的优先级低于目标优先级或目标优先级域值;
第二终端发送给第一终端的数据的优先级低于或等于目标优先级或目标优先级域值。
可选地,在一些实施例中,上述通信单元可以是通信接口或收发器,或者是通信芯片或者片上系统的输入输出接口。上述处理单元可以是一个或多个处理器。
应理解,根据本申请实施例的终端设备800可对应于方法实施例中的第一终端,并且终端设备800中的各个单元的上述和其它操作和/或功能分别为了实现方法实施例中第一终端对应的相应流程,为了简洁,在此不再赘述。
图9为本申请实施例提供的一种终端设备900的示意图,该终端设备900为第二终端,包括:处理单元910和通信单元920,其中,处理单元910用于启动或重启目标定时器;通信单元920用于在目标定时器超时时向第一终端发送链路响应提醒消息,以使第一终端与第二终端之间的侧行链路被检测。
可选地,处理单元910具体用于:在满足目标定时器的启动或重启条件时,启动或重启目标定时器。
可选地,目标定时器的启动或重启条件包括以下至少一项:
第一终端成功接收到一次数据包传输;
第一终端接收到第二终端发送的LBT持续失败指示;
第一终端在SCI中指示的传输资源位置上未接收到任何数据或数据接收失败;
第一终端在SCI中指示的传输资源位置上连续n次未接收到任何数据或数据接收失败。
可选地,上述n是通过第一终端对应的第一网络设备的系统消息配置、专有信令配置或者预定义的。
可选地,处理单元910还用于:在满足目标定时器的停止运行条件时,停止运行目标定时器。
可选地,停止运行条件包括以下至少一项:
第一终端成功接收到一次数据包传输;
第一终端接收到第二终端发送的资源池重配信息;
第一终端接收到第二终端发送的目标定时器的重配置;
第一终端与第二终端从非授权载波切换至授权载波上进行工作;
第一终端接收到第二终端发送的停止使用目标定时器的指示信息;
在单播通信中,第一终端与第二终端之间的侧行链路失败。
可选地,指示信息携带在以下任一项中:PC5-RRC、MAC-CE、SCI。
可选地,目标定时器的配置包括以下至少一项:目标定时器的时长、允许第一终端在SCI中指示的传输资源位置上连续未接收到任何数据或数据接收失败的次数。
可选地,通信单元920还用于:接收来自于第一终端的目标定时器的配置。
可选地,目标定时器的配置携带在以下任一项中:PC5-RRC、MAC-CE、SCI。
可选地,通信单元920还用于:向第二终端对应的第二网络设备发送目标定时器的配置;接收第二网络设备发送的反馈消息,反馈消息用于反馈目标定时器的配置情况。
可选地,通信单元920具体用于:在第二终端处于RRC连接态时,向第二网络设备发送目标定时器的配置;在第二终端处于RRC空闲态或RRC非活跃态时,触发RRC连接过程,在第二终端处于RRC连接态时,向第二网络设备发送目标定时器的配置。
可选地,通信单元920还用于:向第一终端发送反馈消息。
可选地,通信单元920具体用于:通过PC5-RRC、MAC-CE或SCI向第一终端发送反馈消息。
可选地,通信单元920还用于:接收来自于第一终端的目标定时器的重配置。
可选地,目标定时器是第一终端自主配置的或者是第一终端对应的第一网络设备配置的。
可选地,在第一终端处于RRC连接态时,目标定时器的配置是第一网络设备通过专用信令配置给第一终端的;在第一终端处于RRC空闲态或RRC非活跃态时,目标定时器的配置是第一网络设备通过系统信令配置给第一终端的。
可选地,处理单元910还用于自主配置目标定时器,或者,通信单元920还用于从第二终端对应的第二网络设备获取目标定时器的配置;通信单元920还用于向第一终端发送目标定时器的配置。
可选地,通信单元920还用于接收第一终端发送的反馈消息;若根据反馈消息确定目标定时器配置失败,则处理单元910还用于自主重配置目标定时器,或者,通信单元920还用于从第二网络设备获取目标定时器的重配置,并向第一终端发送目标定时器的重配置。
可选地,在第二终端处于RRC连接态时,目标定时器的配置是第二网络设备通过专用信令配置给第二终端的;在第二终端处于RRC空闲态或RRC非活跃态时,目标定时器的配置是第二网络设备通过系统信令配置给第二终端的。
可选地,通信单元920具体用于:通过PC5-RRC、MAC-CE或SCI向第一终端发送目标定时器的配置。
可选地,处理单元910还用于:获取目标定时器的配置的关联信息;根据关联信息确定是否允许使用目标定时器;相应的,可选地,处理单元910具体用于:在根据关联信息确定允许使用目标定时器时,启动或重启目标定时器。
可选地,关联信息包括以下至少一项:
目标地址或目标地址列表;当第二终端发送给第一终端的数据对应于目标地址或目标地址列表时允许使用目标定时器的配置;
逻辑信道标识或逻辑信道标识列表;当第二终端发送给第一终端的数据所涉及的逻辑信道对应于逻辑信道标识或逻辑信道标识列表时允许使用目标定时器的配置;
目标优先级或目标优先级域值;当第二终端发送给第一终端的数据的优先级满足目标优先级或目标优先级域值对应的预设条件时允许使用目标定时器的配置;
资源池标识或资源池标识列表;当第二终端使用资源池标识或资源池标识列表中的资源向第一终端发送数据时允许使用目标定时器的配置。
可选地,预设条件包括以下任一项:
第二终端发送给第一终端的数据的优先级高于目标优先级或目标优先级域值;
第二终端发送给第一终端的数据的优先级高于或等于目标优先级或目标优先级域值;
第二终端发送给第一终端的数据的优先级低于目标优先级或目标优先级域值;
第二终端发送给第一终端的数据的优先级低于或等于目标优先级或目标优先级域值。
可选地,在一些实施例中,上述通信单元可以是通信接口或收发器,或者是通信芯片或者片上系统的输入输出接口。上述处理单元可以是一个或多个处理器。
应理解,根据本申请实施例的终端设备900可对应于方法实施例中的第二终端,并且终端设备900中的各个单元的上述和其它操作和/或功能分别为了实现方法实施例中第二终端对应的相应流程,为了简洁,在此不再赘述。
图10是本申请实施例提供的一种通信设备1000示意性结构图。图10所示的通信设备1000包括处理器1010,处理器1010可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图10所示,通信设备1000还可以包括存储器1020。其中,处理器1010可以从存储器1020中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器1020可以是独立于处理器1010的一个单独的器件,也可以集成在处理器1010中。
可选地,如图10所示,通信设备1000还可以包括收发器1030,处理器1010可以控制该收发器1030与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器1030可以包括发射机和接收机。收发器1030还可以进一步包括天线,天线的数量可以为一个或多个。
可选地,该通信设备1000具体可为本申请实施例的第一终端,并且该通信设备1000可以实现本申请实施例的各个方法中由第一终端实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备1000具体可为本申请实施例的第二终端,并且该通信设备1000可以实现本申请实施例的各个方法中由第二终端实现的相应流程,为了简洁,在此不再赘述。
图11是本申请实施例的装置的示意性结构图。图11所示的装置1100包括处理器1110,处理器1110可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图11所示,装置1100还可以包括存储器1120。其中,处理器1110可以从存储器1120中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器1120可以是独立于处理器1110的一个单独的器件,也可以集成在处理器1110中。
可选地,该装置1100还可以包括输入接口1130。其中,处理器1110可以控制该输入接口1130与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该装置1100还可以包括输出接口1140。其中,处理器1110可以控制该输出接口1140与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
可选地,该装置可应用于本申请实施例中的第一终端,并且该装置可以实现本申请实施例的各个方法中由第一终端实现的相应流程,为了简洁,在此不再赘述。
可选地,该装置可应用于本申请实施例中的第二终端,并且该装置可以实现本申请实施例的各个方法中由第二终端实现的相应流程,为了简洁,在此不再赘述。
可选地,本申请实施例提到的装置也可以是芯片。例如可以是系统级芯片,系统芯片,芯片系统或片上系统芯片等。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于 存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。
可选的,该计算机可读存储介质可应用于本申请实施例中的网络设备或者基站,并且该计算机程序使得计算机执行本申请实施例的各个方法中由网络设备或者基站实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机可读存储介质可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。
可选的,该计算机程序产品可应用于本申请实施例中的网络设备或者基站,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备或者基站实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序产品可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序。
可选的,该计算机程序可应用于本申请实施例中的网络设备或者基站,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备或者基站实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序可应用于本申请实施例中的移动终端/终端设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是 或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。针对这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (64)

  1. 一种无线通信方法,其特征在于,所述方法应用于第一终端,所述方法包括:
    启动或重启目标定时器;
    在所述目标定时器超时时进行目标操作,以使所述第一终端与第二终端之间的侧行链路资源被释放或者重配置。
  2. 根据权利要求1所述的方法,其特征在于,所述启动或重启目标定时器,包括:
    在满足所述目标定时器的启动或重启条件时,启动或重启所述目标定时器。
  3. 根据权利要求2所述的方法,其特征在于,所述目标定时器的启动或重启条件包括以下至少一项:
    所述第一终端成功接收到一次数据包传输;
    所述第一终端接收到所述第二终端发送的先听后说LBT持续失败指示;
    所述第一终端在侧行链路控制信息SCI中指示的传输资源位置上未接收到任何数据或数据接收失败;
    所述第一终端在SCI中指示的传输资源位置上连续n次未接收到任何数据或数据接收失败。
  4. 根据权利要求3所述的方法,其特征在于,n是通过所述第一终端对应的第一网络设备的系统消息配置、专有信令配置或者预定义的。
  5. 根据权利要求1-4中任一项所述的方法,其特征在于,所述目标操作包括以下至少一项:
    在单播通信中,释放所述第一终端与第二终端之间的侧行链路资源;
    向所述第一终端对应的第一网络设备上报所述目标定时器的超时事件;
    向所述第二终端发送所述目标定时器的超时指示;
    启动T400定时器。
  6. 根据权利要求5所述的方法,其特征在于,所述向所述第二终端发送所述目标定时器的超时指示,包括:
    通过所述第一终端的异常发送资源池向所述第二终端发送所述目标定时器的超时指示。
  7. 根据权利要求6所述的方法,其特征在于,所述异常发送资源池是授权载波或者非授权载波上的资源池。
  8. 根据权利要求7所述的方法,其特征在于,所述异常发送资源池是通过所述第一终端对应的第一网络设备的系统消息配置、专有信令配置或者预定义的。
  9. 根据权利要求1-8中任一项所述的方法,其特征在于,还包括:
    在满足所述目标定时器的停止运行条件时,停止运行所述目标定时器。
  10. 根据权利要求9所述的方法,其特征在于,所述停止运行条件包括以下至少一项:
    所述第一终端成功接收到一次数据包传输;
    所述第一终端接收到所述第二终端发送的资源池重配信息;
    所述第一终端接收到所述第二终端发送的所述目标定时器的重配置;
    所述第一终端与所述第二终端从非授权载波切换至授权载波上进行工作;
    所述第一终端接收到所述第二终端发送的停止使用所述目标定时器的指示信息;
    在单播通信中,所述第一终端与第二终端之间的侧行链路失败。
  11. 根据权利要求10所述的方法,其特征在于,所述指示信息携带在以下任一项中:PC5-RRC、媒体接入层控制单元MAC-CE、侧行链路控制信息SCI。
  12. 根据权利要求1-11中任一项所述的方法,其特征在于,所述目标定时器的配置包括以下至少一项:所述目标定时器的时长、允许所述第一终端在SCI中指示的传输资源位置上连续未接收到任何数据或数据接收失败的次数。
  13. 根据权利要求1-12中任一项所述的方法,其特征在于,还包括:
    自主配置所述目标定时器或者从所述第一终端对应的第一网络设备获取所述目标定时器的配置;
    向所述第二终端发送所述目标定时器的配置。
  14. 根据权利要求13所述的方法,其特征在于,还包括:
    接收所述第二终端发送的反馈消息;
    若根据所述反馈消息确定所述目标定时器配置失败,则自主重配置所述目标定时器或者从所述第一网络设备获取所述目标定时器的重配置,并向所述第二终端发送所述目标定时器的重配置。
  15. 根据权利要求13或14所述的方法,其特征在于,
    在所述第一终端处于无线资源控制RRC连接态时,所述目标定时器的配置是所述第一网络设备通过专用信令配置给所述第一终端的;
    在所述第一终端处于RRC空闲态或RRC非活跃态时,所述目标定时器的配置是所述第一网络设备通过系统信令配置给所述第一终端的。
  16. 根据权利要求13-15中任一项所述的方法,其特征在于,所述向所述第二终端发送所述目标定时器的配置,包括:
    通过PC5-RRC、MAC-CE或SCI向所述第二终端发送所述目标定时器的配置。
  17. 根据权利要求1-12中任一项所述的方法,其特征在于,还包括:
    接收来自于所述第二终端的所述目标定时器的配置。
  18. 根据权利要求17所述的方法,其特征在于,所述目标定时器的配置携带在以下任一项中:PC5-RRC、MAC-CE、SCI。
  19. 根据权利要求17或18所述的方法,其特征在于,还包括:
    向所述第一终端对应的第一网络设备发送所述目标定时器的配置;
    接收所述第一网络设备发送的反馈消息,所述反馈消息用于反馈所述目标定时器的配置情况。
  20. 根据权利要求19所述的方法,其特征在于,所述向所述第一终端对应的第一网络设备发送所述目标定时器的配置,包括:
    在所述第一终端处于RRC连接态时,向所述第一网络设备发送所述目标定时器的配置;
    在所述第一终端处于RRC空闲态或RRC非活跃态时,触发RRC连接过程,在所述第一终端处于RRC连接态时,向所述第一网络设备发送所述目标定时器的配置。
  21. 根据权利要求19或20所述的方法,其特征在于,所述接收所述第一网络设备发送的反馈消息之后,还包括:
    向所述第二终端发送所述反馈消息。
  22. 根据权利要求21所述的方法,其特征在于,所述向所述第二终端发送所述反馈消息,包括:
    通过PC5-RRC、MAC-CE或SCI向所述第二终端发送所述反馈消息。
  23. 根据权利要求21或22所述的方法,其特征在于,所述向所述第二终端发送所述反馈消息之后,还包括:
    接收来自于所述第二终端的所述目标定时器的重配置。
  24. 根据权利要求17-23中任一项所述的方法,其特征在于,所述目标定时器是所述第二终端自主配置的或者是所述第二终端对应的第二网络设备配置的。
  25. 根据权利要求24所述的方法,其特征在于,
    在所述第二终端处于RRC连接态时,所述目标定时器的配置是所述第二网络设备通过专用信令配置给所述第二终端的;
    在所述第二终端处于RRC空闲态或RRC非活跃态时,所述目标定时器的配置是所述第二网络设备通过系统信令配置给所述第二终端的。
  26. 根据权利要求1-25中任一项所述的方法,其特征在于,还包括:
    获取所述目标定时器的配置的关联信息;
    根据所述关联信息确定是否允许使用所述目标定时器;
    所述启动或重启目标定时器,包括:
    在根据所述关联信息确定允许使用所述目标定时器时,启动或重启所述目标定时器。
  27. 根据权利要求26所述的方法,其特征在于,所述关联信息包括以下至少一项:
    目标地址或目标地址列表;当所述第二终端发送给所述第一终端的数据对应于所述目标地址或目标地址列表时允许使用所述目标定时器的配置;
    逻辑信道标识或逻辑信道标识列表;当所述第二终端发送给所述第一终端的数据所涉及的逻辑信道对应于所述逻辑信道标识或逻辑信道标识列表时允许使用所述目标定时器的配置;
    目标优先级或目标优先级域值;当所述第二终端发送给所述第一终端的数据的优先级满足所述目标优先级或目标优先级域值对应的预设条件时允许使用所述目标定时器的配置;
    资源池标识或资源池标识列表;当所述第二终端使用所述资源池标识或资源池标识列表中的资源向所述第一终端发送数据时允许使用所述目标定时器的配置。
  28. 根据权利要求27所述的方法,其特征在于,所述预设条件包括以下任一项:
    所述第二终端发送给所述第一终端的数据的优先级高于所述目标优先级或目标优先级域值;
    所述第二终端发送给所述第一终端的数据的优先级高于或等于所述目标优先级或目标优先级域值;
    所述第二终端发送给所述第一终端的数据的优先级低于所述目标优先级或目标优先级域值;
    所述第二终端发送给所述第一终端的数据的优先级低于或等于所述目标优先级或目标优先级域 值。
  29. 一种无线通信方法,其特征在于,所述方法应用于第二终端,所述方法包括:
    启动或重启目标定时器;
    在所述目标定时器超时时向第一终端发送链路响应提醒消息,以使所述第一终端与第二终端之间的侧行链路被检测。
  30. 根据权利要求29所述的方法,其特征在于,所述启动或重启目标定时器,包括:
    在满足所述目标定时器的启动或重启条件时,启动或重启所述目标定时器。
  31. 根据权利要求30所述的方法,其特征在于,所述目标定时器的启动或重启条件包括以下至少一项:
    所述第一终端成功接收到一次数据包传输;
    所述第一终端接收到所述第二终端发送的LBT持续失败指示;
    所述第一终端在SCI中指示的传输资源位置上未接收到任何数据或数据接收失败;
    所述第一终端在SCI中指示的传输资源位置上连续n次未接收到任何数据或数据接收失败。
  32. 根据权利要求31所述的方法,其特征在于,n是通过所述第一终端对应的第一网络设备的系统消息配置、专有信令配置或者预定义的。
  33. 根据权利要求29-31中任一项所述的方法,其特征在于,还包括:
    在满足所述目标定时器的停止运行条件时,停止运行所述目标定时器。
  34. 根据权利要求33所述的方法,其特征在于,所述停止运行条件包括以下至少一项:
    所述第一终端成功接收到一次数据包传输;
    所述第一终端接收到所述第二终端发送的资源池重配信息;
    所述第一终端接收到所述第二终端发送的所述目标定时器的重配置;
    所述第一终端与所述第二终端从非授权载波切换至授权载波上进行工作;
    所述第一终端接收到所述第二终端发送的停止使用所述目标定时器的指示信息;
    在单播通信中,所述第一终端与第二终端之间的侧行链路失败。
  35. 根据权利要求34所述的方法,其特征在于,所述指示信息携带在以下任一项中:PC5-RRC、MAC-CE、SCI。
  36. 根据权利要求29-35中任一项所述的方法,其特征在于,所述目标定时器的配置包括以下至少一项:所述目标定时器的时长、允许所述第一终端在SCI中指示的传输资源位置上连续未接收到任何数据或数据接收失败的次数。
  37. 根据权利要求29-36中任一项所述的方法,其特征在于,还包括:
    接收来自于所述第一终端的所述目标定时器的配置。
  38. 根据权利要求37所述的方法,其特征在于,所述目标定时器的配置携带在以下任一项中:PC5-RRC、MAC-CE、SCI。
  39. 根据权利要求37或38所述的方法,其特征在于,还包括:
    向所述第二终端对应的第二网络设备发送所述目标定时器的配置;
    接收所述第二网络设备发送的反馈消息,所述反馈消息用于反馈所述目标定时器的配置情况。
  40. 根据权利要求39所述的方法,其特征在于,所述向所述第二终端对应的第二网络设备发送所述目标定时器的配置,包括:
    在所述第二终端处于RRC连接态时,向所述第二网络设备发送所述目标定时器的配置;
    在所述第二终端处于RRC空闲态或RRC非活跃态时,触发RRC连接过程,在所述第二终端处于RRC连接态时,向所述第二网络设备发送所述目标定时器的配置。
  41. 根据权利要求39或40所述的方法,其特征在于,所述接收所述第二网络设备发送的反馈消息之后,还包括:
    向所述第一终端发送所述反馈消息。
  42. 根据权利要求41所述的方法,其特征在于,所述向所述第一终端发送所述反馈消息,包括:
    通过PC5-RRC、MAC-CE或SCI向所述第一终端发送所述反馈消息。
  43. 根据权利要求41或42所述的方法,其特征在于,所述向所述第一终端发送所述反馈消息之后,还包括:
    接收来自于所述第一终端的所述目标定时器的重配置。
  44. 根据权利要求37-43中任一项所述的方法,其特征在于,所述目标定时器是所述第一终端自主配置的或者是所述第一终端对应的第一网络设备配置的。
  45. 根据权利要求44所述的方法,其特征在于,
    在所述第一终端处于RRC连接态时,所述目标定时器的配置是所述第一网络设备通过专用信令配置给所述第一终端的;
    在所述第一终端处于RRC空闲态或RRC非活跃态时,所述目标定时器的配置是所述第一网络设备通过系统信令配置给所述第一终端的。
  46. 根据权利要求29-36中任一项所述的方法,其特征在于,还包括:
    自主配置所述目标定时器或者从所述第二终端对应的第二网络设备获取所述目标定时器的配置;
    向所述第一终端发送所述目标定时器的配置。
  47. 根据权利要求46所述的方法,其特征在于,还包括:
    接收所述第一终端发送的反馈消息;
    若根据所述反馈消息确定所述目标定时器配置失败,则自主重配置所述目标定时器或者从所述第二网络设备获取所述目标定时器的重配置,并向所述第一终端发送所述目标定时器的重配置。
  48. 根据权利要求46或47所述的方法,其特征在于,
    在所述第二终端处于RRC连接态时,所述目标定时器的配置是所述第二网络设备通过专用信令配置给所述第二终端的;
    在所述第二终端处于RRC空闲态或RRC非活跃态时,所述目标定时器的配置是所述第二网络设备通过系统信令配置给所述第二终端的。
  49. 根据权利要求46-48中任一项所述的方法,其特征在于,所述向所述第一终端发送所述目标定时器的配置,包括:
    通过PC5-RRC、MAC-CE或SCI向所述第一终端发送所述目标定时器的配置。
  50. 根据权利要求29-49中任一项所述的方法,其特征在于,还包括:
    获取所述目标定时器的配置的关联信息;
    根据所述关联信息确定是否允许使用所述目标定时器;
    所述启动或重启目标定时器,包括:
    在根据所述关联信息确定允许使用所述目标定时器时,启动或重启所述目标定时器。
  51. 根据权利要求50所述的方法,其特征在于,所述关联信息包括以下至少一项:
    目标地址或目标地址列表;当所述第二终端发送给所述第一终端的数据对应于所述目标地址或目标地址列表时允许使用所述目标定时器的配置;
    逻辑信道标识或逻辑信道标识列表;当所述第二终端发送给所述第一终端的数据所涉及的逻辑信道对应于所述逻辑信道标识或逻辑信道标识列表时允许使用所述目标定时器的配置;
    目标优先级或目标优先级域值;当所述第二终端发送给所述第一终端的数据的优先级满足所述目标优先级或目标优先级域值对应的预设条件时允许使用所述目标定时器的配置;
    资源池标识或资源池标识列表;当所述第二终端使用所述资源池标识或资源池标识列表中的资源向所述第一终端发送数据时允许使用所述目标定时器的配置。
  52. 根据权利要求51所述的方法,其特征在于,所述预设条件包括以下任一项:
    所述第二终端发送给所述第一终端的数据的优先级高于所述目标优先级或目标优先级域值;
    所述第二终端发送给所述第一终端的数据的优先级高于或等于所述目标优先级或目标优先级域值;
    所述第二终端发送给所述第一终端的数据的优先级低于所述目标优先级或目标优先级域值;
    所述第二终端发送给所述第一终端的数据的优先级低于或等于所述目标优先级或目标优先级域值。
  53. 一种终端设备,其特征在于,所述终端设备为第一终端,包括:处理单元和通信单元;
    所述处理单元用于启动或重启目标定时器;
    所述处理单元或所述通信单元用于在所述目标定时器超时时进行目标操作,以使所述第一终端与第二终端之间的侧行链路资源被释放或者重配置。
  54. 一种终端设备,其特征在于,所述终端设备为第二终端,包括:
    处理单元,用于启动或重启目标定时器;
    通信单元,用于在所述目标定时器超时时向第一终端发送链路响应提醒消息,以使所述第一终端与第二终端之间的侧行链路被检测。
  55. 一种终端设备,其特征在于,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至28中任一项所述的方法。
  56. 一种终端设备,其特征在于,包括:处理器和存储器,该存储器用于存储计算机程序,所述 处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求29至52中任一项所述的方法。
  57. 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至28中任一项所述的方法。
  58. 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求29至52中任一项所述的方法。
  59. 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至28中任一项所述的方法。
  60. 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求29至52中任一项所述的方法。
  61. 一种计算机程序产品,其特征在于,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至28中任一项所述的方法。
  62. 一种计算机程序产品,其特征在于,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求29至52中任一项所述的方法。
  63. 一种计算机程序,其特征在于,所述计算机程序使得计算机执行如权利要求1至28中任一项所述的方法。
  64. 一种计算机程序,其特征在于,所述计算机程序使得计算机执行如权利要求29至52中任一项所述的方法。
PCT/CN2022/085494 2022-04-07 2022-04-07 无线通信方法及设备 WO2023193170A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/085494 WO2023193170A1 (zh) 2022-04-07 2022-04-07 无线通信方法及设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/085494 WO2023193170A1 (zh) 2022-04-07 2022-04-07 无线通信方法及设备

Publications (1)

Publication Number Publication Date
WO2023193170A1 true WO2023193170A1 (zh) 2023-10-12

Family

ID=88243774

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/085494 WO2023193170A1 (zh) 2022-04-07 2022-04-07 无线通信方法及设备

Country Status (1)

Country Link
WO (1) WO2023193170A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104284449A (zh) * 2013-07-08 2015-01-14 电信科学技术研究院 一种资源释放方法和装置
CN111034255A (zh) * 2019-09-24 2020-04-17 北京小米移动软件有限公司 资源处理方法、装置及计算机存储介质
WO2020228821A1 (zh) * 2019-05-15 2020-11-19 华为技术有限公司 管理链路的方法和装置
CN113645680A (zh) * 2020-04-27 2021-11-12 华为技术有限公司 一种确定侧行链路资源的方法、装置以及系统
CN113661745A (zh) * 2019-05-14 2021-11-16 Oppo广东移动通信有限公司 侧行链路监测的方法和设备
CN114222267A (zh) * 2019-04-30 2022-03-22 华为技术有限公司 用于释放连接的方法和装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104284449A (zh) * 2013-07-08 2015-01-14 电信科学技术研究院 一种资源释放方法和装置
CN114222267A (zh) * 2019-04-30 2022-03-22 华为技术有限公司 用于释放连接的方法和装置
CN113661745A (zh) * 2019-05-14 2021-11-16 Oppo广东移动通信有限公司 侧行链路监测的方法和设备
WO2020228821A1 (zh) * 2019-05-15 2020-11-19 华为技术有限公司 管理链路的方法和装置
CN111034255A (zh) * 2019-09-24 2020-04-17 北京小米移动软件有限公司 资源处理方法、装置及计算机存储介质
CN113645680A (zh) * 2020-04-27 2021-11-12 华为技术有限公司 一种确定侧行链路资源的方法、装置以及系统

Similar Documents

Publication Publication Date Title
US11470518B2 (en) Relaying between a user equipment and a network
JP6272988B2 (ja) ミリ波(mmw)デュアル接続のための不連続受信(drx)方式
EP3014908B1 (en) Communications in an ad-hoc multicast network
EP2408234B1 (en) Method and apparatus for device initiated offloading to unlicensed bands
CA2891506C (en) Methods and apparatuses for enabling direct mode communication between user equipments
EP4106358A1 (en) Wireless communication method and communication apparatus
WO2020143730A1 (zh) 一种通信方法和通信装置
CN111741498B (zh) 用于切换的随机接入过程
WO2021081838A1 (zh) 一种drx配置方法及装置、终端设备、网络设备
JP7498850B2 (ja) D2d通信用の複数のdrx設定
WO2020164025A1 (zh) 状态转移的方法和设备
EP3949201A1 (en) Harq process for cells configured for multiple configured uplink grants
CN115885575A (zh) 无线通信方法和通信装置
JP2023510385A (ja) 間欠受信パラメータの処理方法、記憶媒体、及びプロセッサ
CN113728663B (zh) 一种drx配置方法及装置、终端设备、网络设备
WO2023193170A1 (zh) 无线通信方法及设备
TW202025842A (zh) 一種切換定時方法、終端設備及網路設備
WO2022205095A1 (zh) 无线通信的方法及终端设备
WO2022142337A1 (zh) 无线通信的方法和终端设备
WO2022183356A1 (zh) 一种定时器运行方法、终端设备和网络设备
WO2022077395A1 (zh) 侧行链路的传输方法和终端
CN114667769B (zh) 基于drx的侧行反馈方法及相关装置
WO2024020859A1 (zh) 中继链路之间切换的方法及设备
WO2023123229A1 (zh) 无线通信的方法、终端设备和网络设备
WO2022126412A1 (zh) 一种重置配置方法及装置、终端设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22936117

Country of ref document: EP

Kind code of ref document: A1