WO2023241426A1 - 通信方法及通信装置 - Google Patents

通信方法及通信装置 Download PDF

Info

Publication number
WO2023241426A1
WO2023241426A1 PCT/CN2023/098789 CN2023098789W WO2023241426A1 WO 2023241426 A1 WO2023241426 A1 WO 2023241426A1 CN 2023098789 W CN2023098789 W CN 2023098789W WO 2023241426 A1 WO2023241426 A1 WO 2023241426A1
Authority
WO
WIPO (PCT)
Prior art keywords
dci
aggregation level
time slot
communication method
sequence
Prior art date
Application number
PCT/CN2023/098789
Other languages
English (en)
French (fr)
Inventor
李强
薛丽霞
薛祎凡
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN202210926852.8A external-priority patent/CN117278180A/zh
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023241426A1 publication Critical patent/WO2023241426A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation

Definitions

  • the embodiments of the present application relate to the field of communication technology, and more specifically, to a communication method and a communication device.
  • a terminal device with strong communication capabilities may need to support a communication bandwidth of 100MHz, while a user device with reduced capabilities may only need to support a communication bandwidth of 20MHz or 5MHz.
  • the network device When the network device sends downlink control information (DCI) to the degraded user equipment, in order to ensure that the DCI has high demodulation performance, the network device can use a high aggregation level for DCI transmission.
  • DCI downlink control information
  • the network device can also reduce the aggregation level used by DCI, but needs to repeat the transmission on each of multiple time slots. Same DCI.
  • user equipment with normal capabilities can determine the transmission time slots of the physical downlink shared channel (PDSCH) and/or the physical uplink shared channel (PUSCH) based on the DCI transmission time slots.
  • PDSCH physical downlink shared channel
  • PUSCH physical uplink shared channel
  • the downgraded user equipment since one DCI is transmitted on multiple time slots or the same DCI is repeatedly transmitted in each of multiple time slots, the downgraded user equipment cannot determine DCI transmission time slot, so the existing solution cannot be used to determine the transmission time slot of PDSCH and/or PUSCH.
  • Embodiments of the present application provide a communication method and communication device, so that when a DCI is transmitted in multiple time slots or the same DCI is transmitted in each of multiple time slots, the terminal equipment can correctly determine the PDSCH and/or PUSCH transmission slot.
  • the first aspect provides a communication method, which can be executed by a terminal device, or can also be executed by a component of the terminal device, such as a processor, a chip, or a chip system of the terminal device, or can also be executed by a terminal device.
  • a component of the terminal device such as a processor, a chip, or a chip system of the terminal device, or can also be executed by a terminal device.
  • Logic module or software implementation that can realize all or part of the terminal equipment functions.
  • the communication method includes: blindly checking downlink control information DCI; determining the transmission time slot of the physical downlink shared channel PDSCH and/or the physical uplink shared channel PUSCH according to the target time slot and the DCI, and the target time slot is to carry the A time slot among a plurality of time slots of DCI used to transmit one said DCI or said plurality of time slots Each time slot in is used to transmit the same DCI, and the target time slot is pre-configured.
  • the terminal device when one DCI is transmitted in multiple time slots or the same DCI is transmitted in each of multiple time slots, the terminal device can use the preconfigured target time slot as the DCI
  • the transmission time slot can be correctly determined to determine the transmission time slot of PDSCH and/or PUSCH.
  • the communication method before determining the transmission time slot of PDSCH and/or PUSCH according to the target time slot and the DCI, the communication method further includes: receiving data from the network First configuration information of the device, the first configuration information is used to determine the target time slot.
  • the communication method before the blind detection of downlink control information DCI, the communication method further includes: receiving second configuration information from the network device, the second The configuration information is used to indicate the number of blind detections at multiple aggregation levels.
  • the multiple aggregation levels include a first aggregation level and a second aggregation level.
  • the number of blind detections at the first aggregation level is 0, and the number of blind detections at the second aggregation level is 0.
  • the number of blind detections is not 0, wherein the first aggregation level and the second aggregation level are different, the number of time slots occupied by the DCI using the first aggregation level is the same as the number of time slots occupied by the DCI using the second aggregation level
  • the number of time slots occupied by the DCI is different, or the first aggregation level and the second aggregation level are the same, and the number of repeated transmissions of the DCI using the first aggregation level is different from that using the third aggregation level.
  • the number of repeated transmissions of the DCI at the two aggregation levels is different; the blind detection of downlink control information DCI includes: blind detection of DCI according to the second configuration information.
  • the network device only configures the terminal device to perform blind detection on the second aggregation level among the aggregation levels where confusion may occur, and configures the number of blind detections on the first aggregation level among the aggregation levels where confusion may occur to be 0.
  • the terminal device when the terminal device performs blind detection on DCI, it will only perform blind detection on one aggregation level among possible confusion aggregation levels, and will not perform blind detection on the first aggregation level among possible confusion aggregation levels. This prevents the terminal equipment from confusing the DCI aggregation level during the blind detection of DCI, thereby making the target time slot determined by the terminal equipment more accurate.
  • the target time slot is the last time slot carrying the DCI, or the target time slot is the first time slot carrying the DCI .
  • the communication method further includes: receiving third configuration information from the network device, the third configuration information being used to indicate multiple aggregation levels corresponding to DCI timing cycle, the target time slot is a time slot within the timing cycle, the multiple aggregation levels include a first aggregation level and a second aggregation level, the DCI using the first aggregation level and the DCI using The timing period of the DCI of the second aggregation level is the same; wherein, the first aggregation level and the second aggregation level are different, and the number of time slots occupied by the DCI of the first aggregation level and The DCI using the second aggregation level occupies a different number of time slots, or the first aggregation level and the second aggregation level are the same, and the repeated transmission of the DCI using the first aggregation level The number of times is different from the number of repeated transmissions of the DCI using the second aggregation level.
  • the network device carries the DCI timing cycles corresponding to multiple aggregation levels in the DCI. In this way, during the blind detection of DCI by the terminal device, the target time slot is determined according to the timing cycle of the DCI corresponding to the aggregation level. In this way, even if the terminal device successfully demodulates DCI through some CCEs carrying DCI, the terminal device still needs to determine the target time slot according to the DCI timing cycle corresponding to the aggregation level, so that the target time slot determined by the terminal device is more accurate.
  • the third configuration information is also used to indicate the starting position of the timing cycle.
  • the target time slot is the last time slot in the timing period, or the target time slot is the first time slot in the timing period. time slot.
  • the first aggregation level is 8, and the second aggregation level
  • the aggregation level is 16, the number of time slots occupied by the DCI using the first aggregation level is 2, and the number of time slots occupied by the DCI using the second aggregation level is 4; or, the first aggregation The level is 16, the second aggregation level is 8, the number of time slots occupied by the DCI using the first aggregation level is 4, and the number of time slots occupied by the DCI using the second aggregation level is 2 ; Or, the first aggregation level and the second aggregation level are both 4, the number of time slots occupied by the DCI using the first aggregation level and the second aggregation level respectively is 1, and using The DCI of the second aggregation level is transmitted repeatedly over 4 time slots.
  • the DCI is used to indicate an aggregation level adopted by the DCI.
  • Network devices can carry the aggregation level adopted by the DCI in the DCI. In this way, the terminal device will not confuse the DCI aggregation level during the blind detection of DCI, thereby making the target time slot determined by the terminal device more accurate.
  • the communication method further includes: when the aggregation level of the blindly detected DCI is not equal to the aggregation level indicated by the DCI, determining that the target time slot is The time slot within the DCI transmission cycle.
  • the target time slot is determined to be a time slot within the DCI transmission cycle. In this way, even if the terminal device successfully demodulates DCI through some CCEs carrying DCI, the terminal device still needs to determine the target time slot according to the DCI transmission cycle, so that the target time slot determined by the terminal device is more accurate.
  • the DCI is used to indicate the number of times the DCI is repeatedly transmitted.
  • the network device can carry the number of repeated transmissions of the DCI in the DCI. In this way, during the blind detection of DCI by the terminal equipment, the number of repeated transmissions of DCI will not be confused, thereby making the target time slot determined by the terminal equipment more accurate.
  • the communication method further includes: when blind detection detects that the number of the multiple time slots used to transmit the same DCI is not equal to the DCI indication.
  • the target time slot is determined to be a time slot within the DCI transmission cycle.
  • the target time slot is determined to be within the DCI transmission cycle. gap. In this way, even if the terminal device successfully demodulates DCI through some CCEs carrying DCI, the terminal device still needs to determine the target time slot according to the DCI transmission cycle, so that the target time slot determined by the terminal device is more accurate.
  • the target time slot is the last time slot or the first time slot within the DCI transmission cycle.
  • the blind detection of DCI includes: obtaining a second sequence, the second sequence being a sequence of the demodulated DCI; Perform deinterleaving processing to obtain a first sequence; decode the first sequence to obtain the information carried by the DCI.
  • the terminal device needs to perform deinterleaving processing on the DCI sequence. That is, the network device performs interleaving processing on the DCI sequence after encoding the DCI sequence. In this way, the terminal equipment can avoid the situation where the DCI can be successfully demodulated only through some CCEs carrying DCI. Furthermore, the terminal equipment will not misjudge the target time slot.
  • the second aspect provides a communication method, which can be executed by a network device, or can also be executed by a component of the network device, such as a processor, a chip, or a chip system of the network device, or can also be executed by able Logic modules or software implementations that implement all or part of the network device functions.
  • the communication method includes: sending first configuration information to a terminal device.
  • the first configuration information is used by the terminal device to determine a target time slot.
  • the target time slot is one of multiple time slots carrying downlink control information DCI.
  • One time slot, the multiple time slots are used to transmit one DCI, or each time slot in the multiple time slots is used to transmit the same DCI.
  • the communication method further includes: sending second configuration information to the terminal device, the second configuration information being used to indicate blind detection of multiple aggregation levels times, the plurality of aggregation levels include a first aggregation level and a second aggregation level, the number of blind inspections at the first aggregation level is 0, and the number of blind inspections at the second aggregation level is not 0, wherein, the The first aggregation level and the second aggregation level are different, and the number of time slots occupied by the DCI using the first aggregation level is different from the number of time slots occupied by the DCI using the second aggregation level, or , the first aggregation level and the second aggregation level are the same, and the number of repeated transmissions of the DCI using the first aggregation level is different from the number of repeated transmissions of the DCI using the second aggregation level.
  • the target time slot is the last time slot carrying the DCI, or the target time slot is the first time slot carrying the DCI.
  • the communication method further includes: sending third configuration information to the terminal device, the third configuration information being used to indicate DCI corresponding to multiple aggregation levels.
  • timing period the target time slot is a time slot within the timing period
  • the plurality of aggregation levels include a first aggregation level and a second aggregation level, the DCI of the first aggregation level and the DCI of the aggregation level are used.
  • the timing period of the DCI of the second aggregation level is the same; wherein, the first aggregation level and the second aggregation level are different, and the number of time slots occupied by the DCI using the first aggregation level and the time slot used are the same.
  • the DCI of the second aggregation level occupies a different number of time slots, or the first aggregation level and the second aggregation level are the same, and the number of repeated transmissions of the DCI of the first aggregation level is adopted. The number of repeated transmissions of the DCI using the second aggregation level is different.
  • the third configuration information is also used to indicate the starting position of the timing cycle.
  • the target time slot is the last time slot in the timing period, or the target time slot is the first time slot in the timing period. time slot.
  • the first aggregation level is 8, the second aggregation level is 16, and the number of time slots occupied by the DCI using the first aggregation level is is 2, the number of time slots occupied by the DCI using the second aggregation level is 4; or, the first aggregation level is 16, the second aggregation level is 8, and the first aggregation level is used.
  • the number of time slots occupied by the DCI is 4, and the number of time slots occupied by the DCI using the second aggregation level is 2; or, the first aggregation level and the second aggregation level are both 4, respectively.
  • the number of time slots occupied by the DCI using the first aggregation level and the second aggregation level is both 1, and the DCI using the second aggregation level is repeatedly transmitted on 4 time slots.
  • the communication method further includes: sending the DCI to the terminal device, where the DCI is used to indicate the aggregation level adopted by the DCI or the DCI The number of times the transfer is repeated.
  • the target time slot is the last time slot or the first time slot within the DCI transmission cycle.
  • the communication method further includes: obtaining the first sequence, The first sequence is the sequence of the DCI after matching the encoding and code rate; the first sequence is interleaved to obtain a second sequence; according to the arrangement order of the elements in the second sequence, the Each element in the second sequence is mapped to a corresponding CCE, and the DCI is sent.
  • interleaving the first sequence to obtain the second sequence includes: using a row-wise or column-wise conversion method to convert the first sequence into a second sequence.
  • the sequence is converted into a triangular matrix, the length of the first sequence is E, the number of columns or rows of the triangular matrix is T 1 respectively, and T 1 satisfies The minimum integer of; the sequence obtained by arranging the elements in the triangular matrix by columns or rows is determined as the second sequence.
  • interleaving the first sequence to obtain the second sequence includes: according to the arrangement order of the elements in the first sequence, The first sequence is divided into H 1 subsequences, and the length of each subsequence in the H 1 subsequences is the number of bits transmitted by one CCE; the H 1 subsequences are interleaved to obtain the second sequence.
  • the aggregation level adopted by the DCI is 8, and the DCI is transmitted on 2 time slots; or, the aggregation level adopted by the DCI is 16, And the DCI is transmitted on 4 time slots; or, the aggregation level adopted by the DCI is 4, and the DCI is repeatedly transmitted on 4 time slots.
  • the aggregation level adopted by the DCI is 4, and the DCI is transmitted on 1 time slot; or, the aggregation level adopted by the DCI is 4, And the DCI is transmitted repeatedly on 4 time slots.
  • a communication device which is used to implement the communication method described in the above-mentioned first aspect and any possible implementation manner of the first aspect.
  • the communication device may be the above-mentioned terminal equipment, or a device included in the above-mentioned terminal equipment, such as a chip.
  • the communication device includes corresponding modules, units, or means (means) for implementing the above method.
  • the modules, units, or means can be implemented by hardware, software, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules or units corresponding to the above functions.
  • the communication device may include a processing module and a transceiver module.
  • the transceiver module which may also be called a transceiver unit, is used to implement the sending and/or receiving functions in the above-mentioned first aspect and any possible implementation of the first aspect.
  • the transceiver module can be composed of a transceiver circuit, a transceiver, a transceiver or a communication interface.
  • This processing module can be used to implement the above-mentioned first aspect and the processing in any possible implementation of the first aspect. Function.
  • the transceiver module includes a sending module and a receiving module, respectively configured to implement the sending and receiving functions in the above-mentioned first aspect and any possible implementation of the first aspect.
  • a communication device which is used to implement the communication method described in the above second aspect and any possible implementation manner of the second aspect.
  • the communication device may be the above-mentioned network device, or a device included in the above-mentioned network device, such as a chip.
  • the communication device includes corresponding modules, units, or means (means) for implementing the above method.
  • the modules, units, or means can be implemented by hardware, software, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules or units corresponding to the above functions.
  • the communication device may include a processing module and a transceiver module.
  • the transceiver module which may also be called a transceiver unit, is used to implement the sending and/or receiving functions in the above second aspect and any possible implementation of the second aspect.
  • the transceiver module can be composed of a transceiver circuit, a transceiver, a transceiver or a communication interface.
  • the processing module may be used to implement the processing function in the above second aspect and any possible implementation manner of the second aspect.
  • the transceiver module includes a sending module and a receiving module, respectively configured to implement the sending and receiving functions in the above second aspect and any possible implementation of the second aspect.
  • a communication device including: one or more processors; one or more memories; and one or more computer programs.
  • one or more computer programs are stored in one or more memories.
  • One or more computer programs include instructions that, when executed by the communication device, cause the communication device to perform the communication method described in the above-mentioned first aspect and any possible implementation of the first aspect.
  • the communication device may be the above-mentioned terminal equipment, or a device included in the above-mentioned terminal equipment, such as a chip.
  • a communication device including: one or more processors; one or more memories; and one or more computer programs.
  • one or more computer programs are stored in one or more memories.
  • One or more computer programs include instructions that, when executed by the communication device, cause the communication device to perform the communication method described in the above-mentioned second aspect and any possible implementation of the second aspect.
  • the communication device may be the above-mentioned network device, or a device included in the above-mentioned network device, such as a chip.
  • a seventh aspect provides a communication device, including: a processor and a communication interface; the communication interface is used to communicate with modules outside the communication device; the processor is used to execute computer programs or instructions to enable the communication device The communication method described in the above first aspect and any possible implementation manner of the first aspect is executed.
  • the communication device may be the above-mentioned terminal equipment, or a device included in the above-mentioned terminal equipment, such as a chip.
  • An eighth aspect provides a communication device, including: a processor and a communication interface; the communication interface is used to communicate with modules external to the communication device; the processor is used to execute computer programs or instructions to enable the communication device The communication method described in the above second aspect and any possible implementation manner of the second aspect is executed.
  • the communication device may be the above-mentioned network device, or a device included in the above-mentioned network device, such as a chip.
  • a communication device including: an interface circuit and a processor.
  • the interface circuit is a code/data reading and writing interface circuit.
  • the interface circuit is used to receive computer execution instructions (computer execution instructions are stored in a memory, possibly Read directly from the memory, or possibly through other devices) and transmit it to the processor; the processor is used to execute computer execution instructions to cause the communication device to perform the above-mentioned first aspect and any of the possible implementations of the first aspect. the communication method described above.
  • the communication device may be the above-mentioned terminal equipment, or a device included in the above-mentioned terminal equipment, such as a chip.
  • a communication device including: an interface circuit and a processor.
  • the interface circuit is a code/data According to the read-write interface circuit, the interface circuit is used to receive computer execution instructions (computer execution instructions are stored in the memory, may be read directly from the memory, or may pass through other devices) and transmitted to the processor; the processor is used to execute computer execution The instruction is to cause the communication device to execute the communication method described in the above second aspect and any possible implementation manner of the second aspect.
  • the communication device may be the above-mentioned network device, or a device included in the above-mentioned network device, such as a chip.
  • a communication device including: at least one processor; the processor is configured to execute a computer program or instructions, so that the communication device executes the above first aspect and any possible method of the first aspect. Implement the communication methods described in How.
  • the communication device may be the above-mentioned terminal equipment, or a device included in the above-mentioned terminal equipment, such as a chip.
  • the communication device includes a memory for storing necessary program instructions and data.
  • the memory may be coupled to the processor, or may be independent of the processor.
  • the communication device may be a chip or a system on a chip.
  • the device When the device is a chip system, it may be composed of a chip or may include a chip and other discrete components.
  • a communication device including: at least one processor; the processor is configured to execute a computer program or instructions, so that the communication device performs the above second aspect and any possible method of the second aspect. Implement the communication methods described in How.
  • the communication device may be the above-mentioned network device, or a device included in the above-mentioned network device, such as a chip.
  • the communication device includes a memory for storing necessary program instructions and data.
  • the memory may be coupled to the processor, or may be independent of the processor.
  • the communication device may be a chip or a system on a chip.
  • the device When the device is a chip system, it may be composed of a chip or may include a chip and other discrete components.
  • the above-mentioned sending action/function can be understood as outputting information
  • the above-mentioned receiving action/function can be understood as inputting information
  • a computer-readable storage medium is provided. Instructions are stored in the computer-readable storage medium. When run on a communication device, the communication device can execute the first aspect, the second aspect and the third aspect. The communication method described in any possible implementation manner of the first aspect and the second aspect.
  • a fourteenth aspect provides a computer program product containing instructions that, when run on a communication device, enables the communication device to execute any one of the first aspect, the second aspect, and the first aspect and the second aspect.
  • a chip including at least one processor and an interface circuit.
  • the interface circuit is used to provide program instructions or data to the at least one processor.
  • the at least one processor is used to execute the program. Instructions are provided to implement the communication method described in the first aspect, the second aspect, and any possible implementation manner of the first aspect or the second aspect.
  • a sixteenth aspect provides a communication system, including a terminal device and a network device, the terminal device being configured to perform the communication method described in the first aspect and any possible implementation of the first aspect, and/ Or, the network device is configured to perform the communication method described in the second aspect and any possible implementation manner of the second aspect.
  • FIG. 1 is a schematic diagram of the architecture of an example communication system suitable for embodiments of the present application.
  • Figure 2 is an example of the distribution of PDCCH and PDSCH on a carrier.
  • Figure 3 is a schematic diagram of an example of PDCCH distribution on a carrier.
  • Figure 4 is a schematic flow chart of an example of processing DCI.
  • Figure 5 is a schematic structural diagram of an example of a circular memory.
  • Figure 6 is a schematic diagram of the RB occupied by a CORESET of a degraded user equipment in the frequency domain.
  • Figure 7 is a schematic diagram of an example of DCI transmission on 4 time slots.
  • Figure 8 is a schematic diagram of an example of repeated transmission of the same DCI on 4 time slots.
  • Figure 9 is a schematic flow chart of an example communication method provided by an embodiment of the present application.
  • Figure 10 is a schematic flow chart of another communication method provided by an embodiment of the present application.
  • Figure 11 is a schematic structural diagram of an example of a first interleaver provided by an embodiment of the present application.
  • Figure 12 is a schematic diagram of mapping a first sequence to a CCE provided by an embodiment of the present application.
  • Figure 13 is a schematic diagram of another example of mapping the first sequence to CCE provided by the embodiment of the present application.
  • Figure 14 is a schematic diagram of an example of CCE for blind detection of terminal equipment provided by the embodiment of the present application.
  • Figure 15 is a schematic diagram of another example of CCE for blind detection of terminal equipment provided by the embodiment of the present application.
  • Figure 16 is a schematic structural diagram of an example of a communication device provided by an embodiment of the present application.
  • FIG. 17 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
  • "instruction” may include direct instruction and indirect instruction, and may also include explicit instruction and implicit instruction.
  • the information indicated by a certain piece of information (such as the first configuration information described below) is called information to be indicated.
  • information to be indicated In the specific implementation process, there are many ways to indicate the information to be indicated.
  • direct indication can be The information to be indicated, such as the information to be indicated itself or the index of the information to be indicated, etc.
  • the information to be indicated may also be indirectly indicated by indicating other information, where there is an association relationship between the other information and the information to be indicated. It is also possible to indicate only a part of the information to be indicated, while other parts of the information to be indicated are known or agreed in advance.
  • the indication of specific information can also be achieved by means of a pre-agreed (for example, communication protocol stipulated) arrangement order of each piece of information, thereby reducing the indication overhead to a certain extent.
  • the first, second, and various numerical numbers are only for convenience of description and are not used to limit the scope of the embodiments of the present application. For example, distinguish different configuration information, aggregation levels, sequences, time slots, etc.
  • control channel resource unit involved in the embodiments of this application control channel element, CCE)", etc. are all explained by taking the numbering starting from 0 as an example, which should not limit this application.
  • time slot involved in the embodiments of this application is explained by taking 14 OFDM symbols as an example, which should not limit this application.
  • a time slot can also include 12 OFDM symbols.
  • one time slot can also include 7 OFDM symbols.
  • GSM global system for mobile communications
  • CDMA code division multiple access
  • CDMA wideband code division multiple access
  • WCDMA wideband code division multiple access
  • GPRS general packet radio service
  • LTE LTE system
  • FDD frequency division duplex
  • TDD time division duplex
  • UMTS universal mobile telecommunication system
  • WiMAX global interoperability for microwave access
  • FIG. 1 shows a schematic diagram of a communication system 100 suitable for the communication method provided by the embodiment of the present application.
  • the communication system 100 may include at least one network device, such as a base station (gNB) and a satellite station in the 5G system as shown in Figure 1; the communication system 100 may also include at least one Terminal equipment, user equipment (user equipment, UE) 1 to UE 9 shown in Figure 1.
  • Network equipment and each terminal device can communicate through wireless links.
  • the network device can send configuration information to the terminal device, and the terminal device can send uplink data to the network device based on the configuration information; for another example, the network device can send downlink data to the terminal device, and the terminal device can receive data based on the configuration information sent by the network device.
  • the downstream data can be any data.
  • the gNB and UE 1 to UE6 in Figure 1 can form a communication system; the satellite station and UE 7 to UE 9 in Figure 1 can also form a communication system.
  • base stations and satellite stations are connected to core network equipment in different ways, and data can be sent to each other between base stations, satellite stations and core network equipment.
  • Each communication device such as a base station, a satellite station, or UE 1 to UE 9, may be configured with multiple antennas, which may include at least one transmitting antenna for transmitting signals and at least one receiving antenna for receiving signals.
  • each communication device additionally includes a transmitter chain and a receiver chain.
  • a transmitter chain and a receiver chain may include multiple components related to signal transmission and reception (such as processors, modulators, multiplexers). , demodulator, demultiplexer or antenna, etc.). Therefore, the base station and UEs 11 to UE6 can communicate through multi-antenna technology, and the satellite station and UEs 7 to UE9 can communicate through multi-antenna technology.
  • the terminal devices in the communication system 100 may also constitute a communication system.
  • the links between UE 5 and UE4 and UE6 respectively may be called sidelinks.
  • UE 5 can control UE 4 and UE6 to execute corresponding instructions, which is not limited in this application.
  • FIG. 1 is only a simplified schematic diagram for ease of understanding.
  • the communication system 100 may also include other network devices or other terminal devices, which are not shown in FIG. 1 .
  • the network device in the wireless communication system can be any device with wireless transceiver functions.
  • the equipment includes but is not limited to: evolved NodeB (eNB or eNodeB), radio network controller (RNC), Node B (Node B, NB), base station controller (BSC) ), base transceiver station (BTS), home base station (for example, home evolved NodeB, or home Node B, HNB), base band unit (BBU), wireless fidelity (wireless fidelity, WIFI) system
  • the access point (AP), wireless relay node, wireless backhaul node, transmission point (TP) or transmission and reception point (TRP), etc. can also be 5G, such as , NR, a gNB in the system, or a transmission point (TRP or TP), one or a group (including multiple antenna panels) of antenna panels of a base station in a 5G system, or it can also be a network that constitutes a gNB or transmission point Nodes, such as baseband unit (BBU), or distributed
  • gNB may include centralized units (CUs) and DUs.
  • the gNB may also include a radio unit (RU).
  • CU implements some functions of gNB
  • DU implements some functions of gNB.
  • CU implements radio resource control (RRC), packet data convergence protocol (PDCP) layer functions
  • RLC wireless chain Radio link control
  • MAC media access control
  • PHY physical
  • the network device may be a CU node, a DU node, or a device including a CU node and a DU node.
  • the CU can be divided into network equipment in the access network (radio access network, RAN), or the CU can be divided into network equipment in the core network (core network, CN), which is not limited in this application.
  • the terminal equipment in the wireless communication system may also be called user equipment (UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, User terminal, terminal, wireless communication device, user agent or user device.
  • the terminal device in the embodiment of the present application can be a mobile phone (mobile phone), a tablet computer (pad), a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal Equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, transportation security ( Wireless terminals in transportation safety, wireless terminals in smart cities, wireless terminals in smart homes, etc.
  • the embodiments of this application do not limit application scenarios.
  • the terminal device or network device includes a hardware layer, an operating system layer running on the hardware layer, and an application layer running on the operating system layer.
  • This hardware layer includes hardware such as central processing unit (CPU), memory management unit (MMU) and memory (also called main memory).
  • the operating system can be any one or more computer operating systems that implement business processing through processes, for example, operating system, operating system, operating system, operating system or operating system, etc.
  • This application layer includes applications such as browsers, address books, word processing software, and instant messaging software.
  • the embodiments of the present application do not specifically limit the specific structure of the execution subject of the communication method provided by the embodiments of the present application, as long as it can be implemented according to the present application by running a program that records the code of the communication method provided by the embodiments of the present application. Communication can be performed using the communication method provided by the embodiment of the present application.
  • the execution subject of the communication method provided by the embodiment of the present application can be a terminal device or a network device, or a functional module in the terminal device or network device that can call a program and execute the program.
  • various aspects or features of the present application may be implemented as methods, apparatus, or articles of manufacture using standard programming and/or engineering techniques.
  • article of manufacture encompasses a computer program accessible from any computer-readable device, carrier or medium.
  • computer-readable media may include, but are not limited to: magnetic storage devices (e.g., hard disks, floppy disks, tapes, etc.), optical disks (e.g., compact discs (CD), digital versatile discs (DVD)) etc.), smart cards and flash memory devices (e.g. erasable programmable read-only memory (EPROM), cards, sticks or key drives, etc.).
  • various storage media described herein may represent one or more devices and/or other machine-readable media for storing information.
  • machine-readable medium may include, but is not limited to, wireless channels and various other media capable of storing, containing and/or carrying instructions and/or data.
  • the data comes from the higher layer of the communication protocol and is generally transmitted in PDSCH.
  • the data sent by the user equipment to the network equipment is transmitted in PUSCH.
  • DCI is signaling used by network equipment to control the behavior of terminal equipment.
  • DCI can include scheduling signaling, power control signaling, frame structure indication signaling, etc. It is generally transmitted in the physical downlink control channel (PDCCH).
  • PDCCH physical downlink control channel
  • DCI will carry scheduling signaling, which is used to schedule the terminal device to send uplink data, or the scheduling signaling is used to inform the terminal device that it is about to send downlink data.
  • scheduling signaling the location of the time-frequency resources used for uplink and downlink data transmission, modulation and coding methods, etc. can also be indicated.
  • the terminal equipment first receives the DCI in the PDCCH, and then sends or receives data according to the instructions in the scheduling signaling carried by the DCI.
  • Figure 2 is an example of the distribution of PDCCH and PDSCH on a carrier.
  • the carrier (cell) is divided into 51 RBs in frequency, that is, RBs numbered 0-50 in the vertical direction as shown in Figure 2.
  • Figure 2 shows three time slots of the carrier (cell), namely the first time slot (slot 0) and the second time slot (slot 1) as shown in Figure 2 and the third time slot (slot 2).
  • Each slot is divided into 14 OFDM symbols, namely OFDM symbols numbered 0-13 in the horizontal direction as shown in Figure 2.
  • a commonly used form of resource allocation is to use the first three OFDM symbols of a slot as PDCCH resources.
  • the PDCCH resources are used to transmit DCI, and the remaining OFDM symbols of the slot are used as resources for data transmission.
  • the PDCCH resources occupied by DCI include: the first 3 OFDM symbols in the first time slot (slot 0) in the time domain, and RBs numbered 5-8 in the frequency domain, that is It is said that the PDCCH resources occupied by DCI occupy the length of 3 OFDM symbols in the time domain and the length of 4 RBs in the frequency domain.
  • PDCCH resources and PDSCH resources shown in Figure 2 are only examples, which should not limit the present application.
  • the scheduling signaling may carry the transmission parameters of the PDSCH, such as the time information and frequency information of the PDSCH, the modulation and coding method adopted by the PDSCH, etc.
  • the time information of the PDSCH may include the difference K 0 between the time slot occupied by the DCI and the time slot occupied by the PDSCH.
  • the time slot occupied by DCI is the first time slot (i.e. slot 0)
  • the time slot occupied by PDSCH is the third time slot (i.e. slot 2).
  • the time slot occupied by DCI is the same as that occupied by PDSCH.
  • the terminal equipment can calculate the time slot occupied by the PDSCH according to formula (1):
  • n PDSCH is the number of the time slot occupied by PDSCH
  • n is the number of DCI transmission time slot
  • ⁇ PDSCH is the sub-carrier spacing number of OFDM modulation used by PDSCH
  • ⁇ PDCCH is the sub-carrier spacing of OFDM modulation used by PDCCH. serial number.
  • Table 1 lists the corresponding relationship between subcarrier spacing and numbering.
  • the time information of the PDSCH may also include the starting position and length of the OFDM symbols used by the PDSCH.
  • the frequency information of the PDSCH may include the frequency position occupied by the PDSCH.
  • the frequency positions occupied by PDSCH are RBs numbered 43-48.
  • the modulation and coding method adopted by PDSCH may include: a code rate of 1/3, and 16-order quadrature amplitude modulation (16quadrature amplitude modulation, 16QAM).
  • the terminal equipment After receiving the DCI, the terminal equipment receives data on the corresponding PDSCH resource according to the transmission parameters of the PDSCH indicated by the DCI.
  • the network device Before the network device transmits DCI to the terminal device, the network device needs to configure the resources used to transmit DCI, that is, the control resource set (CORESET).
  • the network device sends CORESET configuration information to the terminal device.
  • the CORESET configuration information may include RBs occupied by CORESET, the number of OFDM symbols, etc.
  • CORESET occupies RBs numbered 1-48; in the time domain, the number of OFDM symbols occupied by CORESET is 3.
  • the network equipment can configure multiple CORESETs for each bandwidth part of each cell.
  • each CCE Within a CORESET, its resources will be divided into multiple CCEs, and each CCE will occupy certain time domain and frequency domain resources. For example, as shown in Figure 3, the resources in CORESET are divided into 24 CCEs. One CCE occupies 3 OFDM symbols in the time domain and two RBs in the frequency domain. In the NR system, each CCE can transmit 108 bits.
  • the DCI can be carried on different numbers of CCEs.
  • network equipment can use 1, 2, 4, 8, and 16 CCEs to carry DCI.
  • the number of CCEs carrying one DCI can be called the aggregation level or aggregation level (aggregation level, AL). It should be understood that the following description takes the aggregation level as an example.
  • the network device selects AL based on the size of the DCI information that needs to be transmitted, channel conditions, etc. For example, if the transmission conditions of the terminal device are good, the network device can use a lower AL (for example, 2) to send DCI, so that less resources can be used to send DCI. If the transmission conditions of the terminal device are poor, the network device needs to use a larger AL (for example, 16) to send DCI. In this way, although the resource overhead is greater, more bits can be transmitted correspondingly. Therefore, the code rate of channel coding can be reduced, which can ensure successful DCI demodulation at a lower signal-to-noise ratio. Generally speaking, using a higher AL will bring better demodulation performance, but the resource overhead will also increase accordingly.
  • AL for example, 2
  • AL for example, 16
  • the symbol is the OFDM symbol numbered 3
  • the PDSCH occupies 11 OFDM symbols starting from the OFDM symbol numbered 3.
  • the indicated frequency information of the PDSCH may include that the frequency positions occupied by the PDSCH are RBs numbered 43-48.
  • PDCCH blind detection When the network equipment sends DCI, what kind of AL is used, and which specific CCEs are sent in CORESET, may change at each PDCCH detection opportunity (monitoring occasion). Therefore, in order to receive the DCI sent to itself, the terminal device needs to try to receive it according to different ALs at different CCE locations in CORESET. This process is called PDCCH blind detection.
  • search space configuration information includes the following three parts:
  • the network device can configure multiple CORESETs for the terminal device, the network device needs to configure the terminal device for which CORESET the search space configuration information is targeted.
  • the search space period can be configured as two slots, that is, retrieved once every two slots.
  • the network device can be configured as AL1:10/AL2:8/AL4:8/AL8:4/AL16:2.
  • the terminal device performs 10 blind detections on AL1, 8 blind detections on AL2, and 8 blind detections on AL4. 8 blind tests, AL8 4 blind tests, AL16 2 blind tests.
  • the terminal equipment needs to perform a total of 32 blind detections.
  • ALX can be understood as the AL adopted by DCI is X, where X is 2 m and m is an integer greater than or equal to 0.
  • AL1 can be understood as using AL equal to 1.
  • AL2 can be understood as using AL of 2.
  • the number of AL detections configured by the network device is determined by the value of AL and the number of CCEs within a PDCCH detection opportunity.
  • the product of the number of AL detection times and the value of AL does not exceed the number of CCEs within one PDCCH detection opportunity.
  • the number of CCEs in one PDCCH detection opportunity is greater than or equal to 32.
  • the network device When the network device sends DCI, it needs to encode and modulate the DCI first, and then send it on the PDCCH resources mapped to the allocation.
  • Figure 4 is a schematic flow chart of an example of DCI processing provided by this application.
  • DCI is a bit sequence of a certain length.
  • CRC cyclic redundancy check
  • the network device will allocate an RNTI to the terminal device, and the length of the RNTI is 24 bits.
  • the network device appends the final check bit sequence a CRC to the original bit sequence a of the DCI as the sequence c to be sent.
  • c [a, a CRC ], the length of c is the sum of the length of a (50 bits) and the length of a CRC (24 bits), that is, the length of c is 74 bits.
  • the terminal device can recalculate the check bit based on the received information bits and the same calculation formula as the network device, and then perform an XOR operation with the received check bit. If the sequence obtained is the same as its own RNTI , then it is judged that the received DCI is sent to itself.
  • the sequence c to be sent is channel-coded to obtain the sequence d.
  • an encoder is used to perform channel coding on the sequence c to be transmitted.
  • the encoder of the control channel usually uses Polar code.
  • redundant information is generally introduced, so the sequence length after encoding is longer than the sequence length before encoding. For example, if sequence c is input to the encoder, sequence d with a length of 512 bits can be output.
  • the third step is to perform code rate matching on sequence d according to the AL adopted by DCI to obtain sequence e.
  • the channel-encoded sequence d is put into a circular buffer, and the encoded bit sequence is truncated or repeated according to the number of bits that the CCE allocated to the DCI can carry, so that the code
  • the length of the bit sequence after rate matching is the same as the bit length that the CCE can carry.
  • the circular memory shown in Figure 5 can store 512 bits of data. Therefore, the circular memory is just filled with elements in sequence d.
  • the four CCEs can carry 432 bits (108 bit ⁇ 4).
  • the length of sequence d is 512 bits
  • the first 432 bits of sequence d stored in the circular memory need to be intercepted and sent in the part shown by the dotted arrow in Figure 5.
  • the length of sequence e is 432 bits, which is smaller than the length of sequence d.
  • the 8 CCEs can carry 864bit (108bit ⁇ 8).
  • the length of sequence d is 512 bits, in the part shown by the solid arrow in Figure 5, in addition to sending all 512 bits of sequence d stored in the circular memory, it is also necessary to send the sequence d stored in the circular memory.
  • the first 352 bits of sequence d are transmitted again, so that the 864 bits transmitted can be placed in 8 CCEs.
  • the length of sequence e is 864 bits, which is greater than the length of sequence d.
  • the fourth step is to modulate the sequence e to obtain the sequence f.
  • the modulation method of quadrature phase shift keying is usually used to modulate the sequence.
  • the fifth step is to map the sequence f to the allocated CCE and send it together with other information.
  • the network device can send DCI to the terminal device.
  • the communication capability of the terminal device does not need to be strong, and its cost control is more important.
  • wearable devices, children's phones and watches, etc. have much lower requirements for communication capabilities than normal terminal devices (which can also be called terminal devices with strong communication capabilities or terminal devices with non-reduced capabilities, such as mobile phones).
  • this type of terminal equipment is called reduced-capability user equipment.
  • the design specifications of its communication capabilities are usually reduced. For example, the communication bandwidth that can be supported, the number of antennas that can be supported, etc. are reduced, so as to achieve the goal of reducing cost and device complexity. For example, a normal 5G mobile phone needs to support a 100MHz communication bandwidth and 4 receiving antennas, while a reduced-capacity user equipment may only need to support a 20MHz or 5MHz communication bandwidth and 1 receiving antenna.
  • a degraded user equipment with a 5MHz communication bandwidth can only support receiving DCI on 12 RBs (RBs numbered 0-11 in Figure 6).
  • a CORESET occupies up to 12 RBs in the frequency domain.
  • a CORESET includes up to 6 complete CCEs.
  • a CORESET cannot accommodate this DCI. If the DCI is forced to be transmitted with an AL of 2 or 4, the DCI demodulation performance of the reduced-capacity user equipment cannot meet the requirements when the channel conditions are poor.
  • the network device can map multiple CCEs carrying one DCI to multiple PDCCH detection opportunities. In this way, even if the narrow communication bandwidth leads to the problem of insufficient CORESET capacity, the network equipment can support the use of high AL for DCI transmission through multiple PDCCH detection opportunities, thereby ensuring that the user equipment with reduced capabilities has better demodulation performance for DCI. .
  • the DCI can be sent in four PDCCH detection opportunities.
  • the first PDCCH detection opportunity is the first three OFDM symbols of the first time slot (slot 0)
  • the second PDCCH detection opportunity is the first three OFDM symbols of the second time slot (slot 1).
  • the third PDCCH detection opportunity is the first three OFDM symbols of the third time slot (slot 2)
  • the fourth PDCCH detection opportunity is the first three OFDM symbols of the fourth time slot (slot 3).
  • the network device sends the content carried by the 0-3 CCEs corresponding to the DCI in CCE0-3 in the first PDCCH detection opportunity, and the network device sends the content carried by the 4-7 CCEs corresponding to the DCI in the second CCE0-3 in the PDCCH detection opportunity is sent, the network device sends the content carried by the 8th-11th CCE corresponding to the DCI in CCE0-3 in the third PDCCH detection opportunity, and the network device sends the 12th-15th CCE corresponding to the DCI.
  • the content carried by each CCE is sent on CCE0-3 in the fourth PDCCH detection opportunity.
  • the network equipment can still use a lower AL to send DCI, so that the DCI can be carried in a CORESET.
  • the network device can compensate for the demodulation performance of DCI by repeatedly sending DCI multiple times.
  • the first PDCCH detection opportunity is the first three OFDM symbols of the first slot (slot 0), and the second PDCCH detection opportunity is the first three OFDM symbols of the second slot (slot 1). OFDM symbols, the third PDCCH detection opportunity is the first three OFDM symbols of the third time slot (slot 2), and the fourth PDCCH detection opportunity is the first three OFDM symbols of the fourth time slot (slot 3).
  • the network device sends the DCI carried by CCE0-3 in the first detection opportunity for the first time, the DCI carried by CCE0-3 in the second detection opportunity for the second time, and the DCI carried by CCE0-3 in the third detection opportunity.
  • CCE0-3 in the first detection opportunity performs the third transmission
  • CCE0-3 in the fourth detection opportunity carries the DCI and performs the fourth transmission.
  • the level of AL involved in this application can be evaluated based on the number of CCEs accommodated by a CORESET. For example, an AL that is less than or equal to the maximum number of CCEs that a CORESET can accommodate can be called a low AL, and an AL that is greater than the maximum number of CCEs that a CORESET can accommodate can be called a high AL.
  • the above solution improves the demodulation performance of degraded user equipment by using a higher aggregation level and more repetitions to transmit a DCI.
  • the time slots sent by DCI occupy 4 time slots, the downgraded user equipment cannot directly use the technology of the non-downgraded terminal equipment (normal user equipment) to determine the time slot occupied by the PDSCH.
  • the time slots sent by DCI include a total of four time slots from slot 0 to slot 3, in this case, the user equipment with reduced capabilities cannot To determine which time slot 1-4 is used for DCI transmission, it is impossible to determine what n in the above formula (1) is. Furthermore, the downgraded user equipment will be unable to calculate the time slot occupied by the PDSCH according to formula (1), so that the downgraded user equipment cannot receive data sent by the network device.
  • embodiments of the present application provide a communication method in which the downgraded user equipment can still use the technology of the non-downgraded terminal equipment to determine the time slot occupied by the PDSCH. Furthermore, the reduced-capability user equipment can receive data sent by the network device.
  • the terminal equipment described in the communication method below is a user equipment with reduced capabilities. Furthermore, the following communication method is explained by taking a communication system including a terminal device and a network device as an example, and this application is not limited thereto. For example, the communication method provided by this application can also be applied to a communication system including two terminal devices. At this time, one of the two terminal devices can perform the steps performed by the network device described in the communication method below, and the other terminal device can perform the steps performed by the terminal device described in the communication method below.
  • FIG. 9 is a schematic flow chart of an example communication method 200 provided by an embodiment of the present application.
  • the communication method 200 includes S210 and S220.
  • S210 and S220 are described in detail below.
  • the network device sends DCI.
  • S220 The terminal device determines the transmission time slot of PDSCH and/or PUSCH according to the target time slot and DCI.
  • the target time slot is one of multiple time slots carrying DCI.
  • the multiple time slots are used to transmit one DCI.
  • one DCI is transmitted in multiple time slots, and the target time slot is one of the multiple time slots carrying the one DCI.
  • a DCI is carried in the first time slot (slot 0), the second time slot (slot 1), the third time slot (slot 2) and the fourth time slot (slot 2). 3), that is, the 4 time slots are used to transmit the one DCI.
  • the target time slot is one of the first time slot (slot 0), the second time slot (slot 1), the third time slot (slot 2), and the fourth time slot (slot 3) .
  • each of the plurality of time slots is used to transmit the same DCI.
  • the same DCI is repeatedly transmitted multiple times on multiple time slots, and the target time slot is one of the multiple time slots carrying the same DCI.
  • the same DCI sequentially operates in the first time slot (slot 0), the second time slot (slot 1), the third time slot (slot 2) and the fourth time slot (slot 2).
  • slot 3) is repeatedly transmitted four times, that is, each of the 4 time slots is used to transmit the same DCI.
  • the target time slot is one of the first time slot (slot 0), the second time slot (slot1), the third time slot (slot 2), and the fourth time slot (slot 3).
  • the target time slot may be the time slot corresponding to n in the above formula (1), that is, in the time slot carrying one DCI, multiple or the same DCI is repeatedly transmitted in multiple time slots.
  • the number corresponding to the target time slot can be used as the number n of the DCI transmission time slot in the above formula (1).
  • the target time slot is one time slot among multiple time slots carrying DCI.
  • the target time slot may be any one time slot among multiple time slots carrying DCI.
  • the network device can still carry the difference K 0 between the time slot sent by the DCI and the time slot occupied by the PDSCH in the DCI. Furthermore, the terminal device can determine the PDSCH occupancy according to the above formula (1). time slot.
  • the target time slot is the n 1th time slot among multiple time slots carrying DCI.
  • n in the above formula (1) is the time slot number corresponding to the n 1th time slot among multiple time slots.
  • n 1 is a positive integer less than or equal to m
  • m is the number of time slots carrying DCI, that is, the number of multiple time slots mentioned above.
  • the target time slot is the first time slot among multiple time slots carrying DCI.
  • the target time slot can be the first time slot (slot 0) as shown in Figure 7.
  • n in the above formula (1) is 0, and the value indicated in the DCI K 0 in the above formula (1) is 4.
  • the target time slot can be the first time slot (slot 0) as shown in Figure 8.
  • n in the above formula (1) is 0, and the DCI indicates K 0 in the above formula (1) is 4.
  • the target time slot is the last time slot among multiple time slots carrying DCI.
  • the target time slot may be the fourth time slot as shown in Figure 7, so that n in the above formula (1) is 3; the above formula (1) indicated in the DCI ) in K 0 is 1.
  • n PDSCH 4, that is, the time slot occupied by PDSCH is the time slot numbered 4, that is, the fifth time slot as shown in Figure 7 time slot.
  • the target time slot can be the fourth time slot as shown in Figure 8, so that n in the above formula (1) is 3; the above formula (1) indicated in the DCI K 0 in 1) is 1.
  • n PDSCH 4, that is, the time slot occupied by PDSCH is the time slot numbered 4, that is, the fifth time slot as shown in Figure 8 time slot.
  • the target time slot is pre-configured.
  • the communication method 200 may also include S230. This S230 is executed between S210 and S220. S230 is introduced in detail below.
  • the terminal device determines the target time slot according to the DCI. That is to say, the terminal device determines the target time slot based on the DCI blindly detected in S210.
  • Method 1 The determination rules of the target time slot are preset or predefined.
  • S230 specifically includes: the terminal device determines the target time slot according to the preset or predefined target time slot determination rules and DCI.
  • the target time slot may be preset or predefined as the n 1th time slot among the plurality of time slots.
  • the terminal device determines the n 1th time slot among the plurality of time slots as the target time slot according to the preset or predefined target time slot determination rules.
  • the embodiments of the present application are not limited to the preset or predefined manner.
  • it may be communication standard protocol provisions or standard definitions.
  • Method 2 The network device configures the determination rule of the target time slot and notifies the terminal device of the determination rule of the target time slot.
  • S230 specifically includes: the terminal device determines the target time slot according to the configuration of the network device and the DCI.
  • the communication method 200 also includes S240, which is executed before S230.
  • S240 will be introduced in detail below.
  • the network device sends the first configuration information to the terminal device.
  • the terminal device receives the first configuration information from the network device.
  • the terminal device determines the target time slot based on the first configuration information and DCI.
  • the first configuration information may directly indicate the target time slot. Alternatively, the first configuration information may also be used to determine the target time slot.
  • This application does not limit how the first configuration information is used to determine the target time slot.
  • the first configuration information includes a first field, and the first field includes one or more bits, and the one or more bits are used to indicate the determination rule of the target time slot.
  • the determination rule of the target time slot may be understood as determining the first time slot among the plurality of time slots as the target time slot;
  • the determination rule of the target time slot can be understood as determining the second time slot among the plurality of time slots as the target time slot; ...;
  • the determination rule of the target time slot can be understood as determining the n 1th time slot among the plurality of time slots as the target time slot; ... ...;
  • the determination rule of the target time slot can be understood as determining the last time slot among the plurality of time slots as the target time slot.
  • Method 3 The network device determines the target time slot according to the target time slot determination rule and notifies the terminal device of the target time slot.
  • the embodiments of this application do not limit the determination rules of how the network device obtains the target time slot.
  • the determination rule for the target time slot may be preset.
  • the terminal device can determine the DCI transmission time slot n in the above formula (1), and then the terminal device can still determine the time slot occupied by PDSCH and/or PUSCH through the above formula (1).
  • the terminal equipment may be able to successfully demodulate DCI through some CCEs carrying DCI.
  • the existing encoding and rate matching mechanism that is, when the network equipment uses the same encoder and cyclic memory, after encoding and rate matching DCI with an AL of 16, the first 1-1 of the bit sequence obtained 864bit, which is exactly the same as 1-864bit of the bit sequence obtained after encoding and rate matching DCI with AL of 8.
  • the terminal equipment misjudges the target time slot mentioned above.
  • the terminal device successfully decodes the content carried by the CCEs in the first two time slots (CCE0-3 in slot 0 and CCE0-3 in slot 1). At this time, the terminal device will mistakenly believe that the AL used by this DCI is 8, and the time slots occupied by this DCI are slot 0 and slot 1 shown in Figure 7.
  • the embodiments of the present application also provide some embodiments, such as Embodiment 1 to Embodiment 5 described below, to avoid the above-mentioned errors in terminal devices. Determine the situation of the target time slot. These embodiments are described in detail below.
  • Embodiment 1 in order to prevent the terminal device from confusing the DCI aggregation level during the blind detection of DCI, the network device can only configure the terminal device to blindly detect one aggregation level among the aggregation levels that may be confused.
  • the number of blind checks of other aggregation levels in the obfuscated aggregation level is configured as 0. In this way, when the terminal device performs blind detection on DCI, it will only perform blind detection on one aggregation level among possible confusion aggregation levels, and will not perform blind detection on other aggregation levels among the possible confusion aggregation levels.
  • the target time slot is the n 1 -th time slot among multiple time slots carrying DCI.
  • the target time slot is the last time slot carrying the DCI, or the target time slot is the first time slot carrying the DCI.
  • the method 200 also includes S201a.
  • S201a will be introduced in detail below.
  • S201a The network device sends second configuration information to the terminal device.
  • the terminal device receives the second configuration information sent from the network device, and then the terminal device blindly detects the DCI according to the second configuration information.
  • the second configuration information is used to indicate the number of blind detections at multiple aggregation levels.
  • the multiple aggregation levels include a first aggregation level and a second aggregation level.
  • the number of blind detections at the first aggregation level is 0, and the number of blind detections at the second aggregation level is 0. Not 0. In this way, in each detection cycle, the terminal device will not use the first aggregation level to blindly detect DCI, but will only use the second aggregation level to blindly detect DCI.
  • the first aggregation level and the second aggregation level are different, and the number of time slots occupied by DCI using the first aggregation level is different from the number of time slots occupied by DCI using the second aggregation level.
  • the first aggregation level and the second aggregation level are the same, and the number of repeated transmissions using DCI at the first aggregation level is different from the number of repeated transmissions using DCI at the second aggregation level.
  • the terminal device only uses the second aggregation level for blind detection of DCI in each time slot, and does not use the first aggregation level for blind detection of DCI.
  • the terminal device also There is no confusion between the second level of aggregation and the first level of aggregation.
  • the first aggregation level may be 8
  • the second aggregation level may be 16
  • the number of time slots occupied by DCI using the first aggregation level is 2
  • the number of time slots occupied by DCI using the second aggregation level is 4. Since the number of blind detections at the first aggregation level is 0 and the number of blind detections at the second aggregation level is not 0, the terminal device will only use the aggregation level 16 for DCI to perform blind detection, and will not use the aggregation level 8 for DCI. For blind detection, naturally, the terminal device will not confuse aggregation levels 16 and 8 during the blind detection of DCI.
  • the first aggregation level may be 16, the second aggregation level may be 8, the number of time slots occupied by DCI using the first aggregation level is 4, and the number of time slots occupied by DCI using the second aggregation level is 2. Since the number of blind detections at the first aggregation level is 0 and the number of blind detections at the second aggregation level is not 0, the terminal device will only use the aggregation level 8 for DCI for blind detection and will not use the aggregation level 16 for DCI. Blind detection is performed. Naturally, the terminal device will not confuse aggregation levels 16 and 8 during the blind detection of DCI.
  • the first aggregation level may be 16, the second aggregation level may be 32, the number of time slots occupied by DCI using the first aggregation level is 4, and the number of time slots occupied by DCI using the second aggregation level is 8. Since the number of blind detections at the first aggregation level is 0 and the number of blind detections at the second aggregation level is not 0, the terminal device will only use the aggregation level 32 for DCI to perform blind detection, and will not use the aggregation level 16 for DCI. For blind detection, naturally, the terminal device will not confuse aggregation levels 16 and 32 during the blind detection of DCI.
  • the first aggregation level may be 32
  • the second aggregation level may be 16
  • the number of time slots occupied by DCI using the first aggregation level is 8
  • the number of time slots occupied by DCI using the second aggregation level is 4. Since the number of blind detections at the first aggregation level is 0 and the number of blind detections at the second aggregation level is not 0, the terminal device only uses the aggregation level 16 for DCI for blind detection and does not use the aggregation level 32 for DCI. For blind detection, naturally, the terminal device will not confuse aggregation levels 16 and 32 during the blind detection of DCI.
  • the first aggregation level and the second aggregation level can both be 4, the number of time slots occupied by the DCI using the first aggregation level and the second aggregation level respectively is 1, and the DCI using the second aggregation level can be used in 4 Transmissions are repeated on the time slot. Since the number of blind detections at the first aggregation level is 0 and the number of blind detections at the second aggregation level is not 0, in this way, the terminal device only performs blind detection on the same DCI that is repeatedly transmitted in 4 time slots, and will not The DCI transmitted on only one time slot is blindly detected. Naturally, the terminal device will not confuse AL4 and AL4 ⁇ 4 during the blind detection of DCI (that is, the aggregation level is 4, and the same DCI is repeatedly transmitted 4 Second-rate).
  • the above specific values for the first aggregation level and the second aggregation level are only examples, which should not limit the present application.
  • the first aggregation level can also be 4, and the second aggregation level can also be 8.
  • the number of time slots occupied by DCI using the first aggregation level is 1, and the number of time slots occupied by DCI using the second aggregation level is 1.
  • both the first aggregation level and the second aggregation level may be 4, the number of time slots occupied by DCI using the first aggregation level is 1, and the number of time slots occupied by DCI using the second aggregation level is 2.
  • the multiple aggregation levels may also include other aggregation levels.
  • the other aggregation levels are different from the first aggregation level and the second aggregation level, and the other aggregation levels The number of blind checks is not 0.
  • the second configuration information may be used to indicate that when the aggregation level is 1 (an example of other aggregation levels), the number of blind detections is 10; when the aggregation level is 2 (another example of other aggregation levels), the number of blind detections is 8; when the aggregation level is 4 (another example of other aggregation levels), the number of blind checks is 8; when the aggregation level is 8 (an example of the first aggregation level), the number of blind checks is 4; when the aggregation level is 16 ( (an example of the second aggregation level), the number of blind checks is 0.
  • the second configuration information may be used to indicate: when the aggregation level is 1 (an example of other aggregation levels), the number of blind detections is 10; when the aggregation level is 2 (another example of other aggregation levels), the number of blind detections is 8; when the aggregation level is 4 (another example of the second aggregation level), the number of blind detections is 8; when the aggregation level is 4 (an example of the first aggregation level), and the same DCI is transmitted repeatedly 4 times, the number of blind detections The number of checks is 0.
  • the network device may carry the second configuration information and the first configuration information in two separate messages and send them to the terminal device.
  • the network device may also carry the second configuration information and the first configuration information in one message and send it to the terminal device.
  • this application compares the class of a message carried by the second configuration information and the first configuration information.
  • the type is not limited.
  • the message may be a configuration message of a search space.
  • two new fields may be added to the configuration message of the search space, and the two new fields are respectively used to indicate the content indicated by the second configuration information and the first configuration information.
  • Embodiment 2 In order to prevent the terminal device from confusing the DCI aggregation level or the number of repeated transmissions during the blind detection of DCI, the network device can carry the DCI timing cycles corresponding to multiple aggregation levels in the DCI. In this way, during the blind detection of DCI by the terminal device, the target time slot mentioned above is determined according to the timing cycle of the DCI corresponding to the aggregation level. In this way, even if the terminal device successfully demodulates DCI through some CCEs that carry DCI, the terminal device still needs to determine the target time slot based on the DCI timing cycle corresponding to the aggregation level.
  • the target time slot is the n 1th time slot within the timing period.
  • the target time slot is the last time slot in the timing period, or the target time slot is the first time slot in the timing period.
  • the method 200 also includes S201b.
  • S201b will be introduced in detail below.
  • the network device sends the third configuration information to the terminal device.
  • the terminal device receives the third configuration information sent from the network device, and then the terminal device blindly detects the DCI according to the third configuration information.
  • the third configuration information is used to indicate the timing cycles of DCI corresponding to multiple aggregation levels, and the target time slot is a time slot within the timing cycle.
  • the multiple aggregation levels include a first aggregation level and a second aggregation level, and the DCI using the first aggregation level and the DCI using the second aggregation level have the same timing period.
  • the first aggregation level and the second aggregation level are different, the number of time slots occupied by DCI using the first aggregation level is different from the number of time slots occupied by DCI using the second aggregation level, or the first aggregation level and the second aggregation level are different.
  • the aggregation levels are the same, but the number of repeated transmissions using DCI at the first aggregation level is different from the number of repeated transmissions using DCI at the second aggregation level.
  • This application does not limit the specific values of the timing cycles of DCI using the first aggregation level and DCI using the second aggregation level.
  • the timing period of DCI using the first aggregation level and the DCI using the second aggregation level may be equal to the transmission period of the DCI using the second aggregation level.
  • the number of time slots occupied by the DCI using the second aggregation level is greater than the number of time slots occupied by the DCI using the first aggregation level.
  • the number of repeated transmissions using the DCI at the second aggregation level is greater than the number of repeated transmissions using the DCI at the first aggregation level.
  • the first aggregation level may be 8, the second aggregation level may be 16, the number of time slots occupied by DCI using the first aggregation level is 2, and the number of time slots occupied by DCI using the second aggregation level is 4.
  • the timing period using DCI with aggregation levels 8 and 16 may be equal to the transmission period using DCI with aggregation level 16, that is, the timing period using DCI with aggregation levels 8 and 16 is 4 time slots. At this time, regardless of whether the aggregation level used by the terminal device is 8 or 16, the target time slot is determined from a timing cycle of 4 time slots.
  • the terminal device even if the terminal device completes DCI decoding through the first 8 CCEs (the first two time slots), the terminal device still needs to determine the target time slot according to the timing cycle of 4 time slots. At this time, the terminal device determines the ith time slot among the four time slots as the target time slot. Among them, 1 ⁇ i 1 ⁇ 4, and the specific value of i 1 is determined by the determination rules of the target time slot. This is the same target time slot determined after DCI decoding is completed through 16 CCEs. Therefore, the terminal device will not confuse AL8 and AL16.
  • the first aggregation level and the second aggregation level can both be 4, the number of time slots occupied by the DCI using the first aggregation level and the second aggregation level respectively is 1, and the DCI using the second aggregation level can be used in 4 Transmissions are repeated on the time slot.
  • the timing cycle of DCI using AL4 and AL4 ⁇ 4 may be equal to the transmission cycle of DCI using AL4 ⁇ 4, that is, the timing cycle of DCI using AL4 and AL4 ⁇ 4 is 4 time slots. At this time, regardless of whether the terminal device uses AL4 Whether it is AL4 ⁇ 4, the target time slot is determined from a timing cycle of 4 time slots.
  • the terminal device even if the terminal device completes DCI decoding through the first 4 CCEs (the first time slot), the terminal device still needs to determine the target time slot according to the timing cycle of 4 time slots. At this time, the terminal device determines the i- 2th time slot among the four time slots as the target time slot. Among them, 1 ⁇ i 2 ⁇ 4, and the specific value of i 2 is determined by the determination rules of the target time slot. This is the same target time slot determined after DCI decoding is completed through 16 CCEs. Therefore, the terminal device will not confuse AL4 and AL4 ⁇ 4.
  • the above-mentioned AL4 ⁇ 4 can be understood as the AL used by DCI is 4, and the DCI is repeatedly transmitted 4 times.
  • the multiple aggregation levels may also include other aggregation levels, and the other aggregation levels are different from the first aggregation level and the second aggregation level. , and the timing periods of other aggregation levels are all 1.
  • the third configuration information may be used to indicate: when the aggregation level is 1 (an example of other aggregation levels), the timing period is 1; when the aggregation level is 2 (another example of other aggregation levels), the timing period is 1; When the aggregation level is 4 (another example of other aggregation levels), the timing period is 1; when the aggregation level is 8 (an example of the first aggregation level), the timing period is 4; when the aggregation level is 16 (the second aggregation level) (an example), the timing period is 4.
  • the third configuration information is also used to indicate the starting position of the timing cycle.
  • the third configuration information is also used to indicate that the starting position of the timing cycle is the first time slot (slot0).
  • the network device may carry the third configuration information and the first configuration information in two separate messages and send them to the terminal device.
  • the network device may also carry the third configuration information and the first configuration information in one message and send it to the terminal device.
  • this application does not limit the type of a message carried by the third configuration information and the first configuration information.
  • the message may be a configuration message of a search space.
  • two new fields may be added to the configuration message of the search space, and the two new fields are respectively used to indicate the content indicated by the third configuration information and the first configuration information.
  • the network device can configure the number of detections for each AL in the search space configuration information configured for the terminal device according to the existing solution.
  • Embodiment 3 In order to prevent the terminal device from confusing the DCI aggregation level during the blind detection of DCI, the network device can carry the aggregation level adopted by the DCI in the DCI. In this way, the terminal device will not confuse the aggregation level of DCI during the blind detection of DCI.
  • a new field may be added to the DCI, which field includes one or more bits, and the one or more bits are used to indicate the aggregation level of the DCI. For example, if the aggregation level adopted by the DCI is 8, one or more bits in the newly added fields in the DCI may be in the first state; if the aggregation level adopted by the DCI is 16, the newly added fields in the DCI may be in the first state. One or more bits in the field may be in the second state.
  • the terminal device is between S210 and S220, and the terminal device also needs to execute S250.
  • S250 will be described in detail below.
  • the target time slot is the n 1th time slot within the DCI transmission cycle.
  • the target time slot is the last time slot in the DCI transmission cycle, or the target time slot is the first time slot in the DCI transmission cycle.
  • the DCI transmission cycle described in S250 can be understood as the cycle corresponding to the aggregation level indicated in the DCI. For example, if the aggregation level indicated in the DCI is 8, and the aggregation level corresponds to 2 time slots, then the DCI transmission cycle is 2 time slots. For another example, if the aggregation level indicated in the DCI is 16, and the aggregation level corresponds to 4 time slots, then the DCI transmission cycle is 4 time slots.
  • the DCI transmission period is equal to the number of multiple time slots occupied by the one DCI.
  • the terminal device has completed the decoding of DCI through the first 8 CCEs (the first two time slots), but after decoding the DCI, it is obtained that the aggregation level indicated by the DCI is 16. Then, the terminal device needs to correspond to the aggregation level of 16. time slots (4 time slots), that is, the DCI transmission cycle, determine the target time slot.
  • This application does not limit the triggering subject that triggers the terminal device to execute S250.
  • the triggering subject may be a network device, and the network device sends indication information to the terminal device.
  • the indication information is used to indicate: when the aggregation level of the blindly detected DCI is not equal to the aggregation level indicated by the DCI, determine the target timeslot. It is the time slot within the DCI transmission cycle.
  • the triggering subject may be defined or stipulated by the communication protocol: when the aggregation level of the blindly detected DCI is not equal to the aggregation level indicated by the DCI, the target time slot is determined to be a time slot within the DCI transmission cycle.
  • Embodiment 4 In order to prevent the terminal device from confusing the number of DCI repeated transmissions during the blind detection of DCI, the network device may carry the number of DCI repeated transmissions in the DCI. In this way, during the blind detection of DCI by the terminal device, the number of repeated transmissions of DCI will not be confused.
  • a new field may be added to the DCI.
  • the field includes a bit, and the bit is used to indicate whether the DCI is repeatedly transmitted. For example, if the DCI is not repeatedly transmitted, that is, when the DCI is only transmitted once, a bit in the new field in the DCI can be 0; if there is repeated transmission in the DCI, one of the new fields in the DCI Bits can be 1.
  • the number of times of DCI repeated transmission may be preset. This application does not limit the specific value of the number of times of DCI repeated transmission. For example, the number of times of DCI repeated transmission may be 4.
  • a new field may be added to the DCI.
  • the field includes two bits, and the two bits are used to indicate whether there is repeated transmission in the DCI.
  • the two bits are used not only to indicate whether the DCI is repeatedly transmitted, but also to indicate the number of times the DCI is repeatedly transmitted. For example, if the DCI is not repeatedly transmitted, that is, if the DCI is only transmitted once, the two bits in the newly added field in the DCI can be 00; if there is repeated transmission of the DCI, and the number of repeated transmissions is 4, the The two bits in the new field added to DCI can be 11.
  • the number of repeated transmissions carried in the DCI may be 1.
  • the terminal device is between S210 and S220, and the terminal device also needs to execute S260.
  • S260 will be described in detail below.
  • S260 When the number of repeated transmissions of the blindly detected DCI is not equal to the number of repeated transmissions indicated by the DCI, determine that the target time slot is a time slot within the DCI transmission cycle. In this way, even if the terminal device successfully demodulates DCI through some CCEs carrying DCI, the terminal device still needs to determine the target time slot according to the DCI transmission cycle, so that the terminal device can determine the correct target time slot.
  • the target time slot may be the n 1th time slot within the DCI transmission cycle.
  • the target time slot is DCI transmission The last time slot in the cycle, or the target time slot is the first time slot in the DCI transmission cycle.
  • the DCI transmission cycle described in S260 can be understood as the cycle corresponding to the number of repeated transmissions indicated in the DCI. For example, if the number of repeated transmissions indicated in the DCI is 4, and the number of repeated transmissions corresponds to 4 time slots, then the DCI transmission cycle is 4 time slots.
  • the DCI transmission period is equal to the number of multiple time slots occupied by the same DCI, that is, the number of times the same DCI is repeatedly transmitted.
  • the terminal device has completed the decoding of the DCI through the first 4 CCEs (the first two time slots), but through the interpretation of the DCI, it is obtained that the number of repeated transmissions of the DCI indicated by the DCI is 4, then the terminal device needs to perform the repeated transmission according to the The time slot corresponding to the number of 4 (4 time slots), that is, the DCI transmission cycle, determines the target time slot. In this way, even if the terminal device successfully demodulates DCI through some CCEs carrying DCI, the terminal device still needs to determine the target time slot according to the period corresponding to the number of repeated transmissions indicated by the DCI, so that the terminal device can determine the correct target time slot.
  • This application does not limit the triggering subject that triggers the terminal device to execute S260.
  • the triggering subject may be a network device, and the network device sends indication information to the terminal device.
  • the indication information is used to indicate: when the blindly detected DCI is not equal to the DCI indication, determine the target time slot to be the DCI transmission period. time slot within.
  • the triggering subject may be defined or stipulated by the communication protocol: when the aggregation level of the blindly detected DCI is not equal to the aggregation level indicated by the DCI, the target time slot is determined to be a time slot within the DCI transmission cycle.
  • Embodiment 5 in order to prevent the terminal device from confusing the DCI aggregation level or the number of repeated transmissions during the blind detection of DCI, the network device can interleave the DCI sequence after encoding the DCI sequence. In this way, The terminal equipment can avoid the situation where the DCI can be successfully demodulated only through some CCEs carrying DCI. Furthermore, the terminal equipment will not misjudge the target time slot.
  • the network device before the network device sends DCI, the network device also performs S270 to S290.
  • the following introduces S270 to S290 in detail.
  • the network device can perform S270 to S290 for all DCIs regardless of the aggregation level adopted by the DCIs.
  • the network device may perform S270 to S290 only for DCI using the first aggregation level and the second aggregation level. This application does not limit this.
  • the network device obtains the first sequence.
  • the first sequence is a sequence of DCI obtained after matching the encoding and code rate.
  • S280 The network device interleaves the first sequence to obtain the second sequence.
  • S280 specifically includes: S281a, the network device uses a row-by-row or column-by-column conversion method to convert the first sequence into a triangular matrix.
  • the length of the first sequence is E, and the number of columns or rows of the triangular matrix is respectively T 1 , T 1 satisfies The minimum integer;
  • S282a the network device determines the sequence obtained by arranging the elements in the triangular matrix in columns or rows as the second sequence.
  • the network device may include a first interleaver, the first interleaver having a triangular storage structure, the side length of the storage structure being T 1 .
  • the first interleaver can interleave the first sequence to obtain the second sequence in an interleaving manner of row-by-row (row write and column read) or column-by-row (column write and row read).
  • the first sequence when the first sequence is written into the first interleaver in rows, there may be some positions with no input in the end, and these positions without input are marked as null (null). Then, the contents in the first interleaver are read out in columns. If a null position is encountered, it is skipped, and the second sequence can be obtained. The length of the second sequence is E.
  • This application is for Whether the triangle storage structure of the first interleaver is an upper triangle or a lower triangle is not limited.
  • the storage structure of the first interleaver takes the storage structure of the first interleaver as a triangle as an example, which should not limit the present application.
  • the storage structure of the first interleaver may also be a square, and its interleaving principle is similar to that of the first interleaver with a triangular storage structure, which will not be described again here.
  • S280 specifically includes: S281b, according to the arrangement order of the elements in the first sequence, divide the first sequence into H 1 subsequences, and the length of each subsequence in the H 1 subsequences is one CCE transmission Number of bits; S282b, interleave H 1 subsequences at the sequence level to obtain the second sequence.
  • performing sequence-level interleaving on the H 1 subsequence can be understood as interleaving with each subsequence in the H 1 subsequence as the minimum interleaving unit.
  • the arrangement order of the virtual CCEs is the ordering of the H 1 subsequences described above. Then, the network device maps the subsequence mapped by the virtual CCE to the physical CCE for transmission. Among them, the number i of the virtual CCE, the number j of the PDCCH detection opportunity, and the number k of the physical CCE satisfy the above-mentioned formula.
  • the sequence length after DCI code rate matching is 1728 bits.
  • S290 Map each element in the second sequence to the corresponding CCE according to the arrangement order of the elements in the second sequence, and send the DCI.
  • S270 to S290 are performed before the network device sends DCI.
  • the terminal device specifically executes S211 to S213, that is, S210 specifically includes S211 to S213.
  • S211 to S213 will be introduced in detail below.
  • the terminal device obtains the second sequence, and the second sequence is the sequence of the demodulated DCI.
  • S212 The terminal device performs deinterleaving processing on the second sequence to obtain the first sequence.
  • S212 specifically includes: S2121a, the terminal device uses a column-wise or row-wise conversion method to convert the second sequence into a triangular matrix.
  • the length of the second sequence is E, and the number of columns or rows of the triangular matrix is respectively T 1 , T 1 satisfies The minimum integer;
  • S2122a the terminal device determines the sequence obtained by arranging the elements in the triangular matrix in rows or columns as the first sequence.
  • the terminal device may include a second interleaver, and the storage structure of the second interleaver is the same as the storage structure of the first interleaver included in the network device.
  • the first interleaver has a triangular storage structure
  • the second interleaver also has a triangular storage structure
  • the side length of the storage structure is also T 1 .
  • the second interleaver can deinterleave the second sequence to obtain the first sequence according to the deinterleaving method of row-by-row (column write and row read) or row-by-row (row write and column read).
  • de-interleaving is also a method of interleaving, but the de-interleaving process of the terminal device and the interleaving process of the network device are opposite or opposite. For example, if the first interleaver interleaves by row (row write, column read) or column by row (column write, row read), then the second interleaver interleave by column (column write, row read) or row by row. List (row write column read) interleaving method.
  • S212 specifically includes: S2121b, divide the second sequence into H 2 subsequences according to the arrangement order of the elements in the second sequence.
  • the length of each subsequence in the H 2 subsequences is one CCE transmission.
  • deinterleaving the H 2 subsequences at the sequence level can be understood as deinterleaving with each subsequence in the H 2 subsequences as the minimum interleaving unit.
  • the terminal device first According to the order of PDCCH detection opportunities and the ordering of CCEs on PDCCH detection opportunities, the subsequences transmitted on the physical (physical) CCE are mapped to the virtual (virtual) CCE.
  • the sorting order of the virtual CCEs is the sorting of the H2 subsequences described above.
  • the number i of the virtual CCE, the number j of the PDCCH detection opportunity, and the number k of the physical CCE satisfy the formula described above.
  • the bandwidth occupied by DCI in each time slot is within the communication bandwidth of the terminal device.
  • the channel has frequency selective fading. In this way, when the communication bandwidth of the terminal device is narrow, if the frequency is in deep attenuation, it will affect the transmission performance of the terminal device.
  • the network equipment can In each of the multiple time slots, part of the DCI content that originally needs to be sent in the time slot is transmitted at different frequencies. For the situation where the same DCI is transmitted in each of multiple time slots, the network device can repeatedly send the DCI that originally needs to be sent in the time slot at different frequencies in each of the multiple time slots. .
  • the network device when the network device configures CORESET for the terminal device, it also configures the frequency hopping information of CORESET.
  • the frequency hopping information of CORESET includes: the frequency hopping period of CORESET, the frequency step of frequency hopping, and the frequency step of CORESET in a frequency hopping. The starting frequency within the period.
  • the terminal device before blindly detecting DCI in each time slot of multiple time slots, performs frequency hopping once in each slot within a frequency hopping cycle based on the frequency hopping information of CORESET.
  • the width of the CORESET in frequency does not exceed the communication bandwidth supported by the end device.
  • the network device transmits a DCI on four time slots, specifically, the network device sends the first part of the DCI in RB0-9 of the first time slot (slot0), and in the second time slot RB12-21 of the slot (slot1) sends the second part of the DCI, RB24-33 of the third slot (slot2) sends the third part of the DCI, and RB36-45 of the fourth slot (slot3) sends the DCI.
  • the network device sends the first part of the DCI in RB0-9 of the first time slot (slot0), and in the second time slot RB12-21 of the slot (slot1) sends the second part of the DCI, RB24-33 of the third slot (slot2) sends the third part of the DCI, and RB36-45 of the fourth slot (slot3) sends the DCI.
  • the network device sends the first part of the DCI in RB0-9 of the first time slot (slot0), and in the second time slot RB12-21 of the slot
  • the frequency hopping information of CORESET configured by the network device for the terminal device includes: the frequency hopping period of CORESET is 4 slots, the frequency step size of frequency hopping is 11 RBs, and the starting frequency of CORESET within a frequency hopping period is RB0.
  • the terminal device uses RB0 as the starting frequency and 11 RBs as the frequency hopping frequency step to blindly detect the first part of the DCI on the first time slot (slot0); taking RB12 as Starting frequency, using 11 RBs as the frequency step size of the frequency hopping, blindly detecting the second part of the DCI on the second time slot (slot1); using RB24 as the starting frequency, using 11 RBs as the frequency hopping frequency Step size, blind detection of the third part of DCI on the third time slot (slot2); and, with RB36 as the starting frequency and 11 RBs as the frequency step size of the frequency hopping, blind detection of the fourth time slot ( The fourth part of the DCI on slot3), thereby completing the process of blind detection of DCI within a frequency hopping cycle.
  • the network device if the network device repeatedly transmits the same DCI on each of the four time slots, specifically, the network device performs transmission on RB0-9 of the first time slot (slot0).
  • the first DCI transmission in the second RB12-21 of the slot (slot1) performs the second DCI transmission, RB24-33 of the third time slot (slot2) performs the third DCI transmission, and RB36-45 of the fourth time slot (slot3)
  • the fourth DCI is sent.
  • the frequency hopping information of CORESET configured by the network device for the terminal device includes: the frequency hopping period of CORESET is 4 slots, the frequency step size of frequency hopping is 11 RBs, and the starting frequency of CORESET within a frequency hopping period is RB0.
  • the terminal device uses RB0 as the starting frequency and 11 RBs as the frequency hopping frequency step to blindly detect the DCI sent by the network device for the first time in the first time slot (slot0); Using RB12 as the starting frequency and 11 RBs as the frequency hopping frequency step, blindly detect the DCI sent by the network device for the second time in the second time slot (slot1); using RB24 as the starting frequency and 11 RBs.
  • the network device when the network device configures the search space for the terminal device, it also configures the CORESET part that the terminal device needs to detect at each PDCCH detection opportunity in each blind detection cycle.
  • the width of the CORESET in frequency can exceed the communication bandwidth supported by the end device.
  • the network device transmits a DCI on four time slots, specifically, the network device sends the first part of the DCI in RB0-9 of the first time slot (slot0), and in the second time slot RB12-21 of the slot (slot1) sends the second part of the DCI, RB24-33 of the third slot (slot2) sends the third part of the DCI, and RB36-45 of the fourth slot (slot3) sends the DCI.
  • the network device sends the first part of the DCI in RB0-9 of the first time slot (slot0), and in the second time slot RB12-21 of the slot (slot1) sends the second part of the DCI, RB24-33 of the third slot (slot2) sends the third part of the DCI, and RB36-45 of the fourth slot (slot3) sends the DCI.
  • the network device sends the first part of the DCI in RB0-9 of the first time slot (slot0), and in the second time slot RB12-21 of the slot
  • the network device transmits the first DCI in RB0-9 of the first time slot (slot0)
  • the second DCI transmission is performed on RB12-21 of the second time slot (slot1)
  • the third DCI transmission is performed on RB24-33 of the third time slot (slot2)
  • the third DCI transmission is performed on RB24-33 of the third time slot (slot3).
  • RB36-45 sends the fourth DCI.
  • the network equipment configures the terminal equipment: at the PDCCH detection opportunity of the first time slot (slot0), detect the CCE0-3 of CORESET; at the PDCCH detection opportunity of the second time slot (slot1), detect the CORESET CCE6-9; at the PDCCH detection opportunity of the third time slot (slot2), CCE12-15 of CORESET is detected; and at the PDCCH detection opportunity of the fourth time slot (slot3), CCE18-21 of CORESET is detected.
  • the terminal equipment completes the blind detection process of DCI within one cycle based on the CORESET part that needs to be detected on each PDCCH detection opportunity.
  • FIG. 16 is a schematic structural diagram of an example communication device 1000 provided by an embodiment of the present application.
  • the communication device 1000 includes a processing unit 1010 for performing data processing.
  • the communication device 1000 may also include a transceiver unit 1020 for communicating with the outside.
  • the transceiver unit 1020 may also be called a communication interface or a communication unit.
  • the communication device 1000 may further include a storage unit, which may be used to store instructions and/or data, and the processing unit 1010 may read the instructions and/or data in the storage unit.
  • a storage unit which may be used to store instructions and/or data
  • the processing unit 1010 may read the instructions and/or data in the storage unit.
  • the communication device 1000 can be used to perform the actions performed by the terminal device in the above method embodiment.
  • the communication device 1000 can be a terminal device or a component that can be configured in the terminal device,
  • the processing unit 1010 is configured to perform operations related to processing of the terminal device in the above method embodiment, and the transceiving unit 1020 is used to perform operations related to transmitting and receiving of the terminal device in the above method embodiment.
  • the communication device 1000 can be used to perform the actions performed by the network device in the above method embodiment.
  • the communication device 1000 can be a network device or a component that can be configured in the network device.
  • the processing unit 1010 is configured to perform operations related to processing of the network device in the above method embodiment
  • the transceiving unit 1020 is configured to perform operations related to transceiving and transmitting of the network device in the above method embodiment.
  • Figure 17 shows a schematic structural diagram of a communication device 1100 provided by an embodiment of the present application.
  • the communication device 1100 may be the terminal device or network device described in the above embodiment.
  • the communication device 1100 includes: one or more processors 1110, one or more memories 1120, the one or more memories 1120 store one or more computer programs, the one or more computers Programs include instructions.
  • the communication device 1100 is caused to execute the technical solution executed by the terminal device in the above embodiment or the device 1100 is caused to execute the technical solution executed by the network device in the above embodiment.
  • Technical solutions include: one or more processors 1110, one or more memories 1120, the one or more memories 1120 store one or more computer programs, the one or more computers Programs include instructions.
  • the communication device 1100 is caused to execute the technical solution executed by the terminal device in the above embodiment or the device 1100 is caused to execute the technical solution executed by the network device in the above embodiment.
  • the embodiment of the present application provides a communication system, including a terminal device and a network device, and the system is used to implement the technical solution in the above embodiment.
  • the implementation principles and technical effects are similar to the above-mentioned method-related embodiments, and will not be described again here.
  • Embodiments of the present application provide a computer program product.
  • the computer program product When the computer program product is run on a device, it causes the device to execute the technical solutions in the above embodiments.
  • the implementation principles and technical effects are similar to the above-mentioned method-related embodiments, and will not be described again here.
  • the device may include the terminal device or network device described in the above embodiment.
  • Embodiments of the present application provide a readable storage medium.
  • the readable storage medium contains instructions. When the instructions are run on a device, they cause the device to execute the technical solutions of the above embodiments. The implementation principles and technical effects are similar and will not be described again here.
  • the device may include the terminal device or network device described in the above embodiment.
  • Embodiments of the present application provide a chip.
  • the chip is used to execute instructions.
  • the technical solutions in the above embodiments are executed.
  • the implementation principles and technical effects are similar and will not be described again here.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the embodiments of the present application is essentially or contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium and includes a number of instructions to cause a computer device (which can be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of this application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program code. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供了一种通信方法及通信装置。该通信方法包括:终端设备盲检下行控制信息DCI;终端设备根据目标时隙和DCI,确定物理下行共享信道PDSCH和/或物理上行共享信道PUSCH的发送时隙,目标时隙为承载DCI的多个时隙中的一个时隙,多个时隙用于传输一个DCI或多个时隙中的每个时隙用于传输同一个DCI,目标时隙是预先配置的。这样,在一个DCI在多个时隙传输或同一个DCI在多个时隙中的每个时隙传输的情况下,终端设备可以将预先配置的目标时隙作为该DCI的发送时隙,进而能够正确地确定出PDSCH和/或PUSCH的发送时隙。

Description

通信方法及通信装置
本申请要求于2022年6月13日提交中国专利局、申请号为202210665435.2、申请名称为“一种控制信息的发送方法”的中国专利申请的优先权,以及2022年8月3日提交中国专利局、申请号为202210926852.8、申请名称为“通信方法及通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及通信技术领域,并且更具体地,涉及一种通信方法及通信装置。
背景技术
在一些移动通信的应用场景下,例如,可穿戴设备、儿童电话手表等降能力用户设备(reduced capability user equipment),其通信能力不需要很强,成本控制更为重要。例如,通信能力较强的终端设备(如手机)可能需要支持100MHz的通信带宽,而降能力用户设备可能只需要支持20MHz或5MHz的通信带宽。
当网络设备向降能力用户设备发送下行控制信息(downlink control information,DCI)时,为了保证DCI具有高的解调性能,网络设备可以采用高聚合级别进行DCI的传输,但是由于降能力用户设备所支持的通信带宽较窄,需将DCI分散在多个时隙上传输;或者,网络设备也可以降低DCI所采用的聚合级别,但是需要在多个时隙中的每个时隙上重复传输该同一个DCI。
一般而言,正常能力的用户设备根据DCI的发送时隙,可以确定物理下行共享信道(physcial downlink shared channel,PDSCH)和/或物理上行共享信道(physcial uplink shared channel,PUSCH)的发送时隙。
但是,在降能力用户设备的移动通信的应用场景下,由于一个DCI在多个时隙上传输或同一个DCI在多个时隙中的每个时隙重复传输,这样降能力用户设备无法确定DCI的发送时隙,故无法继续沿用现有的方案来确定PDSCH和/或PUSCH的发送时隙。
发明内容
本申请实施例提供一种通信方法及通信装置,这样,当一个DCI在多个时隙传输或同一个DCI在多个时隙中的每个时隙传输时,终端设备能够正确地确定出PDSCH和/或PUSCH的发送时隙。
第一方面,提供了一种通信方法,该通信方法可以由终端设备执行,或者,也可以由终端设备的部件,例如终端设备的处理器、芯片、或芯片系统等执行,或者,还可以由能实现全部或部分终端设备功能的逻辑模块或软件实现。
所述通信方法包括:盲检下行控制信息DCI;根据目标时隙和所述DCI,确定物理下行共享信道PDSCH和/或物理上行共享信道PUSCH的发送时隙,所述目标时隙为承载所述DCI的多个时隙中的一个时隙,所述多个时隙用于传输一个所述DCI或所述多个时隙 中的每个时隙用于传输同一个所述DCI,所述目标时隙是预先配置的。
在本申请实施例中,在一个DCI在多个时隙传输或同一个DCI在多个时隙中的每个时隙传输的情况下,终端设备可以将预先配置的目标时隙作为该DCI的发送时隙,进而能够正确地确定出PDSCH和/或PUSCH的发送时隙。
结合第一方面,在第一方面的某些实现方式中,在所述根据目标时隙和所述DCI,确定PDSCH和/或PUSCH的发送时隙之前,所述通信方法还包括:接收来自网络设备的第一配置信息,所述第一配置信息用于确定所述目标时隙。
结合第一方面,在第一方面的某些实现方式中,在所述盲检下行控制信息DCI之前,所述通信方法还包括:接收来自所述网络设备的第二配置信息,所述第二配置信息用于指示多个聚合级别的盲检次数,所述多个聚合级别包括第一聚合级别和第二聚合级别,所述第一聚合级别的盲检次数为0,所述第二聚合级别的盲检次数不为0,其中,所述第一聚合级别和所述第二聚合级别不相同,采用所述第一聚合级别的所述DCI占用的时隙数量和采用所述第二聚合级别的所述DCI占用的时隙的数量不同,或者,所述第一聚合级别和所述第二聚合级别相同,采用所述第一聚合级别的所述DCI的重复传输的次数与采用所述第二聚合级别的所述DCI的重复传输次数不同;所述盲检下行控制信息DCI包括:根据所述第二配置信息,盲检DCI。
网络设备通过只配置终端设备对可能出现混淆聚合级别中的第二聚合级别进行盲检,而对可能出现混淆的聚合级别中的第一聚合级别的盲检次数配置为0。这样,终端设备对DCI进行盲检的过程中,只会对可能出现混淆聚合级别中的一个聚合级别进行盲检,不会对该可能出现混淆聚合级别中的第一聚合级别进行盲检,可以避免终端设备在盲检DCI的过程中,不会混淆DCI的聚合级别,进而使得终端设备确定的目标时隙比较准确。
结合第一方面,在第一方面的某些实现方式中,所述目标时隙为承载所述DCI的最后一个时隙,或者,所述目标时隙为承载所述DCI的第一个时隙。
结合第一方面,在第一方面的某些实现方式中,所述通信方法还包括:接收来自所述网络设备的第三配置信息,所述第三配置信息用于指示多个聚合级别对应的DCI的计时周期,所述目标时隙为所述计时周期内的时隙,所述多个聚合级别包括第一聚合级别和第二聚合级别,采用所述第一聚合级别的所述DCI和采用所述第二聚合级别的所述DCI的计时周期相同;其中,所述第一聚合级别和所述第二聚合级别不相同,采用所述第一聚合级别的所述DCI占用的时隙数量和采用所述第二聚合级别的所述DCI占用的时隙数量不同,或者,所述第一聚合级别和所述第二聚合级别相同,采用所述第一聚合级别的所述DCI的重复传输的次数与采用所述第二聚合级别的所述DCI的重复传输次数不同。
网络设备通过在DCI中携带多个聚合级别对应的DCI的计时周期。这样,终端设备对DCI进行盲检的过程中,按照聚合级别对应的DCI的计时周期,确定目标时隙。这样,即使终端设备通过承载DCI的部分CCE成功解调DCI,终端设备仍然需要根据聚合级别对应的DCI的计时周期,确定目标时隙,进而使得终端设备确定的目标时隙比较准确。
结合第一方面,在第一方面的某些实现方式中,所述第三配置信息还用于指示所述计时周期的起始位置。
结合第一方面,在第一方面的某些实现方式中,所述目标时隙为所述计时周期内的最后一个时隙,或者,所述目标时隙为所述计时周期内的第一个时隙。
结合第一方面,在第一方面的某些实现方式中,所述第一聚合级别为8,所述第二聚 合级别为16,采用所述第一聚合级别的所述DCI占用的时隙数量为2,采用所述第二聚合级别的所述DCI占用的时隙数量为4;或者,所述第一聚合级别为16,所述第二聚合级别为8,采用所述第一聚合级别的所述DCI占用的时隙数量为4,采用所述第二聚合级别的所述DCI占用的时隙数量为2;或者,所述第一聚合级别和所述第二聚合级别均为4,分别采用所述第一聚合级别和所述第二聚合级别的所述DCI占用的时隙数量均为1,且采用所述第二聚合级别的所述DCI在4个时隙上重复传输。
结合第一方面,在第一方面的某些实现方式中,所述DCI用于指示所述DCI采用的聚合级别。
网络设备可以在DCI中携带该DCI采用的聚合级别。这样,终端设备对DCI进行盲检的过程中,将不会混淆DCI的聚合级别,进而使得终端设备确定的目标时隙比较准确。
结合第一方面,在第一方面的某些实现方式中,所述通信方法还包括:当盲检到的DCI的聚合级别不等于所述DCI指示的聚合级别时,确定所述目标时隙为所述DCI发送周期内的时隙。
终端设备对DCI进行盲检的过程中,当盲检到的DCI的聚合级别不等于DCI指示的聚合级别时,确定目标时隙为DCI发送周期内的时隙。这样,即使终端设备通过承载DCI的部分CCE成功解调DCI,终端设备仍然需要根据DCI发送周期内,确定目标时隙,进而使得终端设备确定的目标时隙比较准确。
结合第一方面,在第一方面的某些实现方式中,所述DCI用于指示所述DCI重复传输的次数。
网络设备可以在DCI中携带该DCI重复传输的次数。这样,终端设备对DCI进行盲检的过程中,将不会混淆DCI的重复传输的次数,进而使得终端设备确定的目标时隙比较准确。
结合第一方面,在第一方面的某些实现方式中,所述通信方法还包括:当盲检到用于传输同一个所述DCI的所述多个时隙的数量不等于所述DCI指示的重复传输的次数时,确定所述目标时隙为所述DCI发送周期内的时隙。
终端设备对DCI进行盲检的过程中,当盲检到用于传输同一个DCI的多个时隙的数量不等于DCI指示的重复传输的次数时,确定目标时隙为DCI发送周期内的时隙。这样,即使终端设备通过承载DCI的部分CCE成功解调DCI,终端设备仍然需要根据DCI发送周期内,确定目标时隙,进而使得终端设备确定的目标时隙比较准确。
结合第一方面,在第一方面的某些实现方式中,所述目标时隙为所述DCI发送周期内的最后一个时隙或第一个时隙。
结合第一方面,在第一方面的某些实现方式中,所述盲检DCI包括:获取第二序列,所述第二序列为解调后的所述DCI的序列;对所述第二序列进行反交织处理,得到第一序列;对所述第一序列进行解码,得到所述DCI携带的信息。
终端设备在盲检DCI的过程中,需要对DCI的序列进行反交织处理,也即网络设备在对DCI的序列进行编码之后,对DCI的序列进行了交织处理。这样,终端设备可以避免仅通过承载DCI的部分CCE就能够成功解调DCI的情况,进而,终端设备也就不会存在误判目标时隙的情况。
第二方面,提供了一种通信方法,该通信方法可以由网络设备执行,或者,也可以由网络设备的部件,例如网络设备的处理器、芯片、或芯片系统等执行,或者,还可以由能 实现全部或部分网络设备功能的逻辑模块或软件实现。
所述通信方法包括:向终端设备发送第一配置信息,所述第一配置信息用于所述终端设备确定目标时隙,所述目标时隙为承载下行控制信息DCI的多个时隙中的一个时隙,所述多个时隙用于传输一个所述DCI或所述多个时隙中的每个时隙用于传输同一个所述DCI。
结合第二方面,在第二方面的某些实现方式中,所述通信方法还包括:向所述终端设备发送第二配置信息,所述第二配置信息用于指示多个聚合级别的盲检次数,所述多个聚合级别包括第一聚合级别和第二聚合级别,所述第一聚合级别的盲检次数为0,所述第二聚合级别的盲检次数不为0,其中,所述第一聚合级别和所述第二聚合级别不相同,采用所述第一聚合级别的所述DCI占用的时隙数量和采用所述第二聚合级别的所述DCI占用的时隙数量不同,或者,所述第一聚合级别和所述第二聚合级别相同,采用所述第一聚合级别的所述DCI的重复传输的次数与采用所述第二聚合级别的所述DCI的重复传输次数不同。
结合第二方面,在第二方面的某些实现方式中,所述目标时隙为承载所述DCI的最后一个时隙,或者,所述目标时隙为承载所述DCI的第一个时隙。
结合第二方面,在第二方面的某些实现方式中,所述通信方法还包括:向所述终端设备发送第三配置信息,所述第三配置信息用于指示多个聚合级别对应的DCI的计时周期,所述目标时隙为所述计时周期内的时隙,所述多个聚合级别包括第一聚合级别和第二聚合级别,采用所述第一聚合级别的所述DCI和采用所述第二聚合级别的所述DCI的计时周期相同;其中,所述第一聚合级别和所述第二聚合级别不相同,采用所述第一聚合级别的所述DCI占用的时隙数量和采用所述第二聚合级别的所述DCI占用的时隙数量不同,或者,所述第一聚合级别和所述第二聚合级别相同,采用所述第一聚合级别的所述DCI的重复传输的次数与采用所述第二聚合级别的所述DCI的重复传输次数不同。
结合第二方面,在第二方面的某些实现方式中,所述第三配置信息还用于指示所述计时周期的起始位置。
结合第二方面,在第二方面的某些实现方式中,所述目标时隙为所述计时周期内的最后一个时隙,或者,所述目标时隙为所述计时周期内的第一个时隙。
结合第二方面,在第二方面的某些实现方式中,所述第一聚合级别为8,所述第二聚合级别为16,采用所述第一聚合级别的所述DCI占用的时隙数量为2,采用所述第二聚合级别的所述DCI占用的时隙数量为4;或者,所述第一聚合级别为16,所述第二聚合级别为8,采用所述第一聚合级别的所述DCI占用的时隙数量为4,采用所述第二聚合级别的所述DCI占用的时隙数量为2;或者,所述第一聚合级别和所述第二聚合级别均为4,分别采用所述第一聚合级别和所述第二聚合级别的所述DCI占用的时隙数量均为1,且采用所述第二聚合级别的所述DCI在4个时隙上重复传输。
结合第二方面,在第二方面的某些实现方式中,所述通信方法还包括:向所述终端设备发送所述DCI,所述DCI用于指示所述DCI采用的聚合级别或所述DCI重复传输的次数。
结合第二方面,在第二方面的某些实现方式中,所述目标时隙为所述DCI发送周期内的最后一个时隙或第一个时隙。
结合第二方面,在第二方面的某些实现方式中,所述通信方法还包括:获取第一序列, 所述第一序列为编码和码率匹配后的所述DCI的序列;对所述第一序列进行交织处理,得到第二序列;按照所述第二序列中的元素的排列顺序,将所述第二序列中的每个元素分别映射至相应的CCE上,并发送所述DCI。
结合第二方面,在第二方面的某些实现方式中,所述对所述第一序列进行交织处理,得到第二序列,包括:采用按行或按列的转换方式,将所述第一序列转换为三角矩阵,所述第一序列的长度为E,所述三角矩阵的列数或行数分别为T1,所述T1为满足的最小整数;将所述三角矩阵中的元素依次按列或行排列后得到的序列确定为所述第二序列。
结合第二方面,在第二方面的某些实现方式中,所述对所述第一序列进行交织处理,得到第二序列,包括:按照所述第一序列中元素的排列顺序,将所述第一序列划分为H1个子序列,所述H1个子序列中的每个子序列的长度均为一个CCE传输的比特数;将所述H1个子序列进行交织,得到所述第二序列。
结合第二方面,在第二方面的某些实现方式中,所述将所述H1个子序列交织,得到所述第二序列包括:将所述H1个子序列中的第i个子序列,映射至第j个PDCCH检测时机中的第k个CCE,所述j=mod(v,N),所述所述v为所述第i个子序列在所述H1个子序列中的编号,所述N为所述DCI占用的时隙数;按照PDCCH检测时机的排列顺序以及PDCCH检测时机中每个CCE的排列顺序,将映射至每个CCE的子序列进行排列,得到所述第二序列。
结合第二方面,在第二方面的某些实现方式中,所述DCI采用的聚合级别为8,且所述DCI在2个时隙上传输;或者,所述DCI采用的聚合级别为16,且所述DCI在4个时隙上传输;或者,所述DCI采用的聚合级别为4,且所述DCI在4个时隙上重复传输。
结合第二方面,在第二方面的某些实现方式中,所述对所述第一序列进行交织处理,得到第二序列,包括:将所述H1个子序列中的第i个子序列,映射至第k个CCE,所述k=mod(i+m,M),所述m和M为正整数;按照PDCCH检测时机中每个CCE的排列顺序,将映射至每个CCE的子序列进行排列,得到所述第二序列。
结合第二方面,在第二方面的某些实现方式中,所述DCI采用的聚合级别为4,且所述DCI在1个时隙上传输;或者,所述DCI采用的聚合级别为4,且所述DCI在4个时隙上重复传输。
第二方面中任一项可能的实现方式的技术效果可以参考相应第一方面的实现方式的技术效果,这里不再赘述。
第三方面,提供了一种通信装置,该通信装置用于实现上述第一方面以及第一方面的任一项可能的实现方式中所述的通信方法。该通信装置可以为上述的终端设备,或者上述的终端设备中包含的装置,比如芯片。该通信装置包括实现上述方法相应的模块、单元、或手段(means),该模块、单元、或means可以通过硬件实现,软件实现,或者通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块或单元。
在一些可能的设计中,该通信装置可以包括处理模块和包括收发模块。该收发模块,也可以称为收发单元,用以实现上述第一方面以及第一方面的任一项可能的实现方式中的发送和/或接收功能。该收发模块可以由收发电路,收发机,收发器或者通信接口构成。该处理模块,可以用于实现上述第一方面以及第一方面的任一项可能的实现方式中的处理 功能。
在一些可能的设计中,收发模块包括发送模块和接收模块,分别用于实现上述第一方面以及第一方面的任一项可能的实现方式中的发送和接收功能。
第四方面,提供了一种通信装置,该通信装置用于实现上述第二方面以及第二方面的任一项可能的实现方式中所述的通信方法。该通信装置可以为上述的网络设备,或者上述的网络设备中包含的装置,比如芯片。该通信装置包括实现上述方法相应的模块、单元、或手段(means),该模块、单元、或means可以通过硬件实现,软件实现,或者通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块或单元。
在一些可能的设计中,该通信装置可以包括处理模块和包括收发模块。该收发模块,也可以称为收发单元,用以实现上述第二方面以及第二方面的任一项可能的实现方式中的发送和/或接收功能。该收发模块可以由收发电路,收发机,收发器或者通信接口构成。该处理模块,可以用于实现上述第二方面以及第二方面的任一项可能的实现方式中的处理功能。
在一些可能的设计中,收发模块包括发送模块和接收模块,分别用于实现上述第二方面以及第二方面的任一项可能的实现方式中的发送和接收功能。
第五方面,提供了一种通信装置,包括:一个或多个处理器;一个或多个存储器;以及一个或多个计算机程序。其中,一个或多个计算机程序被存储在一个或多个存储器中。一个或多个计算机程序包括指令,当指令被通信装置执行时,使得通信装置执行上述第一方面以及第一方面的任一项可能的实现方式中所述的通信方法。
该通信装置可以为上述的终端设备,或者上述的终端设备中包含的装置,比如芯片。
第六方面,提供了一种通信装置,包括:一个或多个处理器;一个或多个存储器;以及一个或多个计算机程序。其中,一个或多个计算机程序被存储在一个或多个存储器中。一个或多个计算机程序包括指令,当指令被通信装置执行时,使得通信装置执行上述第二方面以及第二方面的任一项可能的实现方式中所述的通信方法。
该通信装置可以为上述的网络设备,或者上述的网络设备中包含的装置,比如芯片。
第七方面,提供一种通信装置,包括:处理器和通信接口;该通信接口,用于与该通信装置之外的模块通信;所述处理器用于执行计算机程序或指令,以使该通信装置执行上述第一方面以及第一方面的任一项可能的实现方式中所述的通信方法。
该通信装置可以为上述的终端设备,或者上述的终端设备中包含的装置,比如芯片。
第八方面,提供一种通信装置,包括:处理器和通信接口;该通信接口,用于与该通信装置之外的模块通信;所述处理器用于执行计算机程序或指令,以使该通信装置执行上述第二方面以及第二方面的任一项可能的实现方式中所述的通信方法。
该通信装置可以为上述的网络设备,或者上述的网络设备中包含的装置,比如芯片。
第九方面,提供了一种通信装置,包括:接口电路和处理器,该接口电路为代码/数据读写接口电路,该接口电路用于接收计算机执行指令(计算机执行指令存储在存储器中,可能直接从存储器读取,或可能经过其他器件)并传输至该处理器;处理器用于执行计算机执行指令以使该通信装置执行上述第一方面以及第一方面的任一项可能的实现方式中所述的通信方法。
该通信装置可以为上述的终端设备,或者上述的终端设备中包含的装置,比如芯片。
第十方面,提供了一种通信装置,包括:接口电路和处理器,该接口电路为代码/数 据读写接口电路,该接口电路用于接收计算机执行指令(计算机执行指令存储在存储器中,可能直接从存储器读取,或可能经过其他器件)并传输至该处理器;处理器用于执行计算机执行指令以使该通信装置执行上述第二方面以及第二方面的任一项可能的实现方式中所述的通信方法。
该通信装置可以为上述的网络设备,或者上述的网络设备中包含的装置,比如芯片。
第十一方面,提供了一种通信装置,包括:至少一个处理器;所述处理器用于执行计算机程序或指令,以使该通信装置执行上述第一方面以及第一方面的任一项可能的实现方式中所述的通信方法。
该通信装置可以为上述的终端设备,或者上述的终端设备中包含的装置,比如芯片。
在一些可能的设计中,该通信装置包括存储器,该存储器,用于保存必要的程序指令和数据。该存储器可以与处理器耦合,或者,也可以独立于该处理器。
在一些可能的设计中,该通信装置可以是芯片或芯片系统。该装置是芯片系统时,可以由芯片构成,也可以包含芯片和其他分立器件。
第十二方面,提供了一种通信装置,包括:至少一个处理器;所述处理器用于执行计算机程序或指令,以使该通信装置执行上述第二方面以及第二方面的任一项可能的实现方式中所述的通信方法。
该通信装置可以为上述的网络设备,或者上述的网络设备中包含的装置,比如芯片。
在一些可能的设计中,该通信装置包括存储器,该存储器,用于保存必要的程序指令和数据。该存储器可以与处理器耦合,或者,也可以独立于该处理器。
在一些可能的设计中,该通信装置可以是芯片或芯片系统。该装置是芯片系统时,可以由芯片构成,也可以包含芯片和其他分立器件。
可以理解的是,第三方面至第十二方面中任一方面提供的通信装置是芯片时,上述的发送动作/功能可以理解为输出信息,上述的接收动作/功能可以理解为输入信息。
第十三方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在通信装置上运行时,使得通信装置可以执行上述第一方面、第二方面以及第一方面、第二方面的任一项可能的实现方式中所述的通信方法。
第十四方面,提供了一种包含指令的计算机程序产品,当其在通信装置上运行时,使得该通信装置可以执行上述第一方面、第二方面以及第一方面、第二方面的任一项可能的实现方式中所述的通信方法。
第十五方面,提供了一种芯片,包括至少一个处理器和接口电路,所述接口电路用于为所述至少一个处理器提供程序指令或者数据,所述至少一个处理器用于执行所述程序指令,以实现上述第一方面、第二方面以及第一方面、第二方面的任一项可能的实现方式中所述的通信方法。
第十六方面,提供了一种通信系统,包括终端设备和网络设备,所述终端设备用于执行第一方面以及第一方面的任一项可能的实现方式中所述的通信方法,和/或,所述网络设备用于执行第二方面以及第二方面的任一项可能的实现方式中所述的通信方法。
附图说明
图1为适用于本申请实施例的一例通信系统的架构的示意图。
图2为一例PDCCH和PDSCH在一个载波上的分布示意图。
图3为一例PDCCH在一个载波上的分布示意图。
图4为一例对DCI进行处理的示意流程图。
图5为一例循环存储器的示意性结构图。
图6为降能力用户设备的一个CORESET在频域上占据的RB的示意图。
图7为一例一个DCI在4个时隙上传输的示意图。
图8为一例同一个DCI在4个时隙上重复传输的示意图。
图9为本申请实施例提供的一例通信方法的示意性流程图。
图10为本申请实施例提供的另一例通信方法的示意性流程图。
图11为本申请实施例提供的一例第一交织器的示意结构图。
图12为本申请实施例提供的一例将第一序列映射至CCE的示意图。
图13为本申请实施例提供的另一例将第一序列映射至CCE的示意图。
图14为本申请实施例提供的一例终端设备盲检的CCE的示意图。
图15为本申请实施例提供的另一例终端设备盲检的CCE的示意图。
图16为本申请实施例提供的一例通信装置的示意性结构图。
图17为本申请实施例提供的另一例通信装置的示意性结构图。
具体实施方式
下面将结合附图,对本申请实施例中的技术方案进行描述。
为了便于理解本申请实施例,在介绍本申请实施例之前,先作出以下几点说明。
第一,在本申请实施例中,“指示”可以包括直接指示和间接指示,也可以包括显式指示和隐式指示。将某一信息(如下文所述的第一配置信息)所指示的信息称为待指示信息,则具体实现过程中,对待指示信息进行指示的方式有很多种,例如但不限于,可以直接指示待指示信息,如待指示信息本身或者该待指示信息的索引等。也可以通过指示其他信息来间接指示待指示信息,其中该其他信息与待指示信息之间存在关联关系。还可以仅仅指示待指示信息的一部分,而待指示信息的其他部分则是已知的或者提前约定的。例如,还可以借助预先约定(例如通信协议规定)的各个信息的排列顺序来实现对特定信息的指示,从而在一定程度上降低指示开销。
第二,在下文示出的实施例中第一、第二以及各种数字编号仅为描述方便进行的区分,并不用来限制本申请实施例的范围。例如,区分不同的配置信息、聚合级别、序列、时隙等。
第三,本申请实施例中涉及的“多个”是指两个或两个以上。
第四,本申请实施例中涉及的“资源块(resource block,RB)”、“时隙”、“正交频分复用(orthogonal frequency division multiplexing,OFDM)符号”、“控制信道资源单元(control channel element,CCE)”等均是以从0开始编号为例进行说明,其不应对本申请构成限制。
第五,本申请实施例中涉及的“时隙”均是以其包括14个OFDM符号为例进行说明,其不应对本申请构成限制。例如,在新无线(new radio,NR)下,一个时隙也可以包括12个OFDM符号。又如,在长期演进(longterm evolution,LTE)下,一个时隙也可以包括7个OFDM符号。
第六,本申请实施例中涉及的一个CCE均以传输108bit为例进行说明,其不应对本申请构成限制。
第七,本申请实施例中涉及的编号还可以称为序号。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通信(global system formobile communications,GSM)系统、码分多址(code division multiple access,CDMA)系统、宽带码分多址(wideband code division multiple access,WCDMA)系统、通用分组无线业务(general packet radio service,GPRS)、LTE系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统、第五代(5th generation,5G)系统或NR等。
为便于理解本申请实施例,首先结合图1详细说明适用于本申请实施例提供的通信方法的通信系统。图1示出了适用于本申请实施例提供的通信方法的通信系统100的示意图。
在一个示例中,如图1所示,该通信系统100可以包括至少一个网络设备,如图1中所示的5G系统中的基站(gNB)和卫星站;该通信系统100还可以包括至少一个终端设备,如图1中所示的用户设备(user equipment,UE)1至UE 9。网络设备与各终端设备之间可以通过无线链路通信。例如,网络设备可以向终端设备发送配置信息,终端设备可以基于该配置信息向网络设备发送上行数据;又例如,网络设备可以向终端设备发送下行数据,终端设备可以基于网络设备发送的配置信息接收该下行数据。因此,图1中的gNB和UE 1至UE6可以构成一个通信系统;图1中的卫星站和UE 7至UE 9也可以构成一个通信系统。此外,基站和卫星站通过不同的方式连接到核心网设备,基站和卫星站与核心网设备之间可以进行相互的数据发送。本架构中可以为多个卫星站或者多个基站,卫星站也可以服务类似UE 1至UE6的UE。本申请对此不作限定。各通信设备,如基站、卫星站或UE 1至UE 9,可以配置多个天线,该多个天线可以包括至少一个用于发送信号的发射天线和至少一个用于接收信号的接收天线。另外,各通信设备还附加地包括发射机链和接收机链,本领域普通技术人员可以理解,它们均可包括与信号发送和接收相关的多个部件(例如处理器、调制器、复用器、解调器、解复用器或天线等)。因此,基站与UE 11至UE6可通过多天线技术通信,卫星站与UE 7至UE9可通过多天线技术通信。
在另一个示例中,该通信系统100中的终端设备,如,UE4至UE6,也可以构成一个通信系统。示例性地,UE 5分别与UE4、UE6之间的链路可以称为侧行链路(sidelink)。例如,UE 5可以控制UE 4和UE6执行相应的指令,本申请对此不作限定。
还应理解,图1仅为便于理解而示例的简化示意图,该通信系统100中还可以包括其他网络设备或者还可以包括其他终端设备,图1中未予以画出。
应理解,该无线通信系统中的网络设备可以是任意一种具有无线收发功能的设备。该设备包括但不限于:演进型节点B(evolved NodeB,eNB或eNodeB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved NodeB,或home Node B,HNB)、基带单元(base band unit,BBU),无线保真(wireless fidelity,WIFI)系统中的接入点(access point,AP)、无线中继节点、无线回传节点、传输点(transmission point,TP)或者发送接收点(transmission and reception point,TRP)等,还可以为5G,如,NR,系统中的gNB,或,传输点(TRP或TP),5G系统中的基站的一个或一组(包括多个天线面板)天线面板,或者,还可以为构成gNB或传输点的网络 节点,如基带单元(BBU),或,分布式单元(distributed unit,DU)等。
在一些部署中,gNB可以包括集中式单元(centralized unit,CU)和DU。gNB还可以包括射频单元(radio unit,RU)。CU实现gNB的部分功能,DU实现gNB的部分功能,例如,CU实现无线资源控制(radio resource control,RRC),分组数据汇聚层协议(packet data convergence protocol,PDCP)层的功能,DU实现无线链路控制(radio link control,RLC)层、媒体接入控制(media access control,MAC)层和物理(physical,PHY)层的功能。由于RRC层的信息最终会变成PHY层的信息,或者,由PHY层的信息转变而来,因而,在这种架构下,高层信令,如RRC层信令,也可以认为是由DU发送的,或者,由DU+CU发送的。可以理解的是,网络设备可以为CU节点、或DU节点、或包括CU节点和DU节点的设备。此外,CU可以划分为接入网(radio access network,RAN)中的网络设备,也可以将CU划分为核心网(core network,CN)中的网络设备,本申请对此不做限定。
还应理解,该无线通信系统中的终端设备也可以称为用户设备(user equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。本申请的实施例中的终端设备可以是手机(mobile phone)、平板电脑(pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等等。本申请的实施例对应用场景不做限定。
在本申请实施例中,终端设备或网络设备包括硬件层、运行在硬件层之上的操作系统层,以及运行在操作系统层上的应用层。该硬件层包括中央处理器(central processing unit,CPU)、内存管理单元(memory management unit,MMU)和内存(也称为主存)等硬件。该操作系统可以是任意一种或多种通过进程(process)实现业务处理的计算机操作系统,例如,操作系统、操作系统、操作系统、操作系统或操作系统等。该应用层包含浏览器、通讯录、文字处理软件、即时通信软件等应用。并且,本申请实施例并未对本申请实施例提供的通信方法的执行主体的具体结构特别限定,只要能够通过运行记录有本申请实施例的提供的通信方法的代码的程序,以根据本申请实施例提供的通信方法进行通信即可,例如,本申请实施例提供的通信方法的执行主体可以是终端设备或网络设备,或者,是终端设备或网络设备中能够调用程序并执行程序的功能模块。
另外,本申请的各个方面或特征可以实现成方法、装置或使用标准编程和/或工程技术的制品。本申请中使用的术语“制品”涵盖可从任何计算机可读器件、载体或介质访问的计算机程序。例如,计算机可读介质可以包括,但不限于:磁存储器件(例如,硬盘、软盘或磁带等),光盘(例如,压缩盘(compact disc,CD)、数字通用盘(digital versatile disc,DVD)等),智能卡和闪存器件(例如,可擦写可编程只读存储器(erasable programmable read-only memory,EPROM)、卡、棒或钥匙驱动器等)。另外,本文描述的各种存储介质可代表用于存储信息的一个或多个设备和/或其它机器可读介质。术语“机器可读介质”可包括但不限于,无线信道和能够存储、包含和/或承载指令和/或数据的各种其它介质。
在第四代(4th generation,4G)系统或5G通信系统中,网络设备除了给终端设备发 送数据外,还需要发送DCI。
其中,数据来自通信协议的高层,一般在PDSCH中传输。而用户设备发送给网络设备的数据在PUSCH中传输。
DCI是网络设备用于控制终端设备行为的信令,例如DCI可以包括调度信令,功率控制信令,帧结构指示信令等。其一般在物理下行控制信道(physical downlink control channel,PDCCH)中传输。
最为常见的,DCI会携带调度信令,该调度信令用于调度终端设备发送上行数据,或者,该调度信令用于告知终端设备即将发送下行数据。在调度信令中,还可以指示上下行数据传输所使用的时频资源的位置,调制编码方式等。这样,终端设备先在PDCCH中接收DCI,然后根据DCI所携带的调度信令中的指示来发送或接收数据。
图2为一例PDCCH和PDSCH在一个载波上的分布示意图。
例如,如图2所示,该载波(cell)在频率上分为51个RB,即如图2中所示的竖直方向上的编号为0-50的RB。此外,图2中示出了该载波(cell)在时间上的3个时隙(slot),即如图2中所示的第一时隙(slot 0)、第二时隙(slot 1)和第三时隙(slot 2)。每个slot又分为14个OFDM符号,即如图2中所示的水平方向上的编号为0-13的OFDM符号。
一种常用的资源分配形式是,将一个slot的前3个OFDM符号作为PDCCH资源,该PDCCH资源用于发送DCI,该slot剩余的OFDM符号作为数据发送的资源。例如,如图2所示,DCI占用的PDCCH资源包括:时域上的第一个时隙(slot 0)中的前3个OFDM符号,以及频率上的编号为5-8的RB,也就是说,DCI占用的PDCCH资源在时域上占用了3个OFDM符号的长度,在频域上占用了4个RB的长度。
需要说明的是,图2中所示的PDCCH资源和PDSCH资源仅为示例,其不应对本申请构成限制。
在一个示例中,调度信令可以携带PDSCH的传输参数,例如PDSCH的时间信息、频率信息,PDSCH采用的调制编码方式等。
示例性地,PDSCH的时间信息可以包括DCI占用的时隙与PDSCH占用的时隙之间的差值K0。如图2所示,DCI占用的时隙为第一个时隙(即slot 0),PDSCH占用的时隙为第三个时隙(即slot 2),这里,DCI占用的时隙与PDSCH占用的时隙之间的差值为2,即K0=2。
这样,终端设备可以根据公式(1),可计算PDSCH占用的时隙:
其中,nPDSCH为PDSCH所占用的时隙的编号,n为DCI的发送时隙的编号,μPDSCH为PDSCH使用的OFDM调制的子载波间隔编号,μPDCCH为PDCCH使用的OFDM调制的子载波间隔编号。
表1列出了子载波间隔和编号的对应关系。
表1

根据表1可知,若PDSCH使用的OFDM调制的子载波间隔和PDDCH使用的OFDM调制的子载波间隔都是30kHz,那么,μPDSCH=1,μPDCCH=1。此外,根据图2可知,公式(1)中的n=0,K0=2。这样,根据公式(1)可得,nPDSCH=2,即PDSCH所占用的时隙的编号为2(即第三个时隙)。
此外,PDSCH的时间信息还可以包括PDSCH使用的OFDM符号的起始位置、长度。例如,如图2所示,DCI还会指示PDSCH使用的OFDM符号的起始位置S为3,长度L=11,也就是说,PDSCH使用的OFDM符号的起始符号为编号为3的OFDM符号,且PDSCH占用了从编号为3的OFDM符号开始的11个OFDM符号。
示例性地,PDSCH的频率信息可以包括PDSCH占用的频率位置。例如,如图2所示,PDSCH占用的频率位置为编号为43-48的RB。
示例性地,PDSCH采用的调制编码方式可以包括:采用的码率为1/3,以及阶数为16的正交幅度调制(16quadrature amplitude modulation,16QAM)。
这样,终端设备在接收到DCI之后,根据DCI所指示的PDSCH的传输参数,在相应的PDSCH资源上接收数据。
在网络设备向终端设备传输DCI之前,网络设备需要配置传输DCI使用的资源,即控制资源集合(control resource set,CORESET)。通常,网络设备向终端设备发送CORESET配置信息。示例性地,该CORESET配置信息可以包括CORESET所占用的RB、OFDM符号的数量等。例如,如图3所示,在频域上,CORESET占用编号1-48的RB;在时域上,CORESET占用的OFDM符号的数量为3。
需要说明的是,网络设备可以为每个小区的每个带宽部分(bandwidth part)配置多个CORESET。
在一个CORESET内,其资源会被切分成多个CCE,每个CCE会占用一定的时域和频域资源。例如,如图3所示,CORESET内的资源被划分为24个CCE,一个CCE在时域上占用3个OFDM符号,在频域上占用两个RB。在NR系统中,每个CCE可以传输108bit。
网络设备向终端设备发送DCI的过程中,可以将DCI承载在不同数量的CCE上。例如,在NR中,网络设备可以使用1、2、4、8、16个CCE来承载DCI。其中,承载一个DCI的CCE的数量可以称为汇聚级别或聚合级别(aggregation level,AL)。应理解,下文均以聚合级别为例进行说明。
通常,网络设备根据需要传输的DCI的信息的大小和信道条件等来选择AL。例如,若终端设备的传输条件较好,网络设备可以使用较低的AL(例如2)来发送DCI,这样可以使用较少的资源发送DCI。若终端设备的传输条件较差,网络设备需要使用更大的AL(例如16)来发送DCI,这样虽然资源开销更大,但是相应的可以传输更多的比特, 因此,可以降低信道编码的码率,这样可以保证在更低的信噪比下实现DCI的成功解调。一般而言,采用更高的AL会带来更好的解调性能,但是资源开销也相应变大。
例如,如图3所示,在slot 0中,网络设备使用AL=2发送DCI,承载该DCI的CCE包括两个CCE(CCE2和CCE3)。在slot 2中,网络设备使用AL=4发送DCI,承载该DCI的CCE包括四个CCE(CCE0、CCE1、CCE2和CCE3)。此外,slot 0或slot 2中发送的DCI,指示的PDSCH的时间信息可以包括PDSCH使用的OFDM符号的起始位置S为3,长度L=11,也就是说,PDSCH使用的OFDM符号的起始符号为编号为3的OFDM符号,且PDSCH占用了从编号为3的OFDM符号开始的11个OFDM符号。指示的PDSCH的频率信息可以包括PDSCH占用的频率位置为编号为43-48的RB。
网络设备在发送DCI的时候,采用怎样的AL,以及在CORESET的具体哪几个CCE发送,在每个PDCCH检测时机(monitoring occasion)都可能发生变化。因此,终端设备为了接收发送给自己的DCI,需要在CORESET内不同的CCE位置,按照不同AL进行尝试接收,这一过程称为PDCCH盲检测(blind detection)。
为了避免终端设备遍历所有可能的CCE位置和AL,网络设备会先给终端设备发送搜索空间(search space)配置信息,从而降低终端设备盲检测的次数。通常,搜索空间配置信息包括以下三部分内容:
(1)搜索空间对应的CORESET,即该搜索空间是在哪个CORESET上进行检索。
因为网络设备配置给终端设备的CORESET可以为多个,因此网络设备需要给终端设备配置搜索空间配置信息针对的是哪个CORESET。
(2)搜索空间的周期。
例如,搜索空间的周期可以配置为两个slot,即每两个slot检索一次。
(3)搜索空间中每个AL的检测次数。
例如,网络设备可以配置,AL1:10/AL2:8/AL4:8/AL8:4/AL16:2,换句话说,终端设备按照AL1做10次盲检测、AL2做8次盲检测、AL4做8次盲检测、AL8做4次盲检测、AL16做2次盲检测。这样,每个PDCCH检测时机内,终端设备需要总共做32次盲检测。
需要说明的是,第一,ALX可以理解为DCI采用的AL为X,其中,X为2m,m为大于等于0的整数。例如,AL1可以理解为采用的AL为1。又例如,AL2可以理解为采用的AL为2。
第二,网络设备配置的AL的检测次数由AL的取值和一个PDCCH检测时机内的CCE的数量决定。AL的检测次数与AL的取值的乘积不超过一个PDCCH检测时机内的CCE的数量。这样,如上文(3)中的举例,一个PDCCH检测时机内的CCE的数量大于或等于32。
网络设备在发送DCI的时候,需要先对DCI进行编码和调制,然后在映射到分配的PDCCH资源上进行发送。
图4为本申请提供的一例对DCI进行处理的示意流程图。
DCI为一定长度的bit序列。例如DCI的长度为50bit,bit序列可以表示为a={0,1,1,0,1,0,……,1}。如图4所示,第一步,在DCI的bit序列a后加入循环冗余校验(cyclic redundancy check,CRC)bit,得到待发送的序列c。
示例性地,首先,根据计算公式,对DCI的原始bit序列a进行计算,得到长度为24bit的CRC序列。其次,将CRC序列和终端设备(接收该DCI的终端设备)的无线网络临时 标识符(radio network temporary identifier,RNTI)进行异或运算,得到最终的检验bit序列aCRC。其中,终端设备在接入网络后,网络设备便会给终端设备分配一个RNTI,该RNTI的长度为24bit。最后,网络设备将最终的检验bit序列aCRC附在DCI的原始bit序列a之后,作为待发送的序列c。其中,c=[a,aCRC],c的长度为a的长度(50bit)与aCRC的长度(24bit)之和,即c的长度为74bit。这样,终端设备可以根据接收到的信息bit,按照网络设备相同的计算公式,重新计算校验bit,再与接收到的校验bit进行异或运算后,得到的序列,如果与自己的RNTI相同,则判断接收到的DCI是发送给自己的。
第二步,对待发送的序列c进行信道编码,得到序列d。
示例性地,使用编码器对待发送的序列c进行信道编码。在5G系统中,控制信道的编码器通常使用的是Polar码。在信道编码的过程中,为了提升信息在低信噪比条件下的解码成功率,一般会引入冗余信息,故而编码后的序列长度长于编码前的序列长度。例如,若将序列c输入该编码器,可输出长度为512bit的序列d。
第三步,根据DCI采用的AL,对序列d进行码率匹配,得到序列e。
示例性地,将信道编码后的序列d,放入一个循环存储器(circular buffer)内,按照给DCI分配的CCE可以承载的bit的数量,将编码后的bit序列截短,或重复,使得码率匹配后的bit序列的长度与CCE可以承载的bit长度相同。
例如,如图5所示的循环存储器可以存储512bit的数据,因此,该循环存储器刚好被序列d中的元素存满。
若DCI使用的AL=4,则该4个CCE可以承载432bit(108bit×4)。这样,由于序列d的长度为512bit,则如图5中虚线箭头所示的部分,需要截取循环存储器中存储的序列d的前432个bit进行发送。此时,序列e的长度为432bit,其小于序列d的长度。
若DCI使用的AL=8,则该8个CCE可以承载864bit(108bit×8)。此时,由于序列d的长度为512bit,则如图5中实线箭头所示的部分,需要将循环存储器中存储的序列d的全部512个bit进行发送之外,还需要将循环存储器中存储的序列d的前352个bit再传一遍,这样传输的864bit正好可以放置在8个CCE中。此时,序列e的长度为864bit,其大于序列d的长度。
第四步,对序列e进行调制,得到序列f。
在5G NR系统中,通常采用正交相移键控(quadrature phase shift keying,QPSK)的调制方式对序列进行调制。
第五步,将序列f映射至分配的CCE上,随其他信息一起进行发送。
通过上文所述的五步,网络设备便可向终端设备发送DCI。
在一些移动通信的应用场景下,终端设备的通信能力不需要很强,其成本控制更为重要。例如,可穿戴设备、儿童电话手表等,对于通信能力的要求会比正常的终端设备(也可以称为通信能力较强的终端设备或非降能力终端设备,如手机)低很多。5G网络中将该类终端设备称为降能力用户设备。
对于降能力用户设备,通常会降低其通信能力的设计规格,示例性地,降低可以支持的通信带宽,可以支持的天线数量等,从而达到降低成本和设备复杂度的目标。例如,正常的5G手机需要支持100MHz的通信带宽和4个接收天线,而降能力用户设备可以只需要支持20MHz或5MHz的通信带宽和1个接收天线。
由于降能力用户设备的复杂度和成本较低,因此,其可以满足很多通信场景的需求, 故在某些行业领域有广泛需求。
但是,由于降能力用户设备所支持的通信带宽较窄,因此,存在一个CORESET可能无法容纳一个DCI的情况。例如,如图6所示,在30kHz子载波间隔的系统中,5MHz通信带宽的降能力用户设备只能支持在12个RB上接收DCI(如图6中编号为0-11的RB)。这样,一个CORESET最多在频域上占据12个RB。例如,如图6所示,若一个CCE在时域上占据3个OFDM符号,在频域上占据2个RB,那么一个CORESET最多包括6个完整的CCE。此时,若网路设备仍然采用AL为8或16进行DCI的传输,则一个CORESET无法容纳这个DCI。如果被迫采用AL为2或4进行该DCI的传输,则在信道条件较差时,降能力用户设备对DCI的解调性能无法达到要求。
为了不降低降能力用户设备对DCI的解调性能,网络设备可以将承载一个DCI的多个CCE映射到多个PDCCH检测时机。这样,即使通信窄带宽导致了CORESET容量不足的问题,但是网络设备可以通过多个PDCCH检测时机,支持采用高的AL进行DCI的传输,进而保证降能力用户设备对DCI具有较好的解调性能。
例如,若采用了AL=16发送DCI,但是一个CORESET最多仅能容纳6个CCE,此时可以将该DCI分散在4个PDCCH检测时机中发送。如图7所示,第一个PDCCH检测时机为第一个时隙(slot 0)的前三个OFDM符号,第二个PDCCH检测时机为第二个时隙(slot 1)的前三个OFDM符号,第三个PDCCH检测时机为第三个时隙(slot 2)的前三个OFDM符号,第四个PDCCH检测时机为第四个时隙(slot 3)的前三个OFDM符号。那么,网络设备将DCI对应的第0-3个CCE承载的内容在第一个PDCCH检测时机中的CCE0-3发送,网络设备将DCI对应的第4-7个CCE承载的内容在第二个PDCCH检测时机中的CCE0-3发送,网络设备将DCI对应的第8-11个CCE承载的内容在第三个PDCCH检测时机中的CCE0-3发送,以及网络设备将DCI对应的第12-15个CCE承载的内容在第四个PDCCH检测时机中的CCE0-3发送。
此外,为了不降低降能力用户设备对DCI的解调性能,网络设备还可以仍然采用较低的AL发送DCI,使得该DCI可以在一个CORESET中承载。此时,网络设备可以通过重复发送多次DCI来达到补偿DCI的解调性能的目的。
例如,如图8所示,第一个PDCCH检测时机为第一个时隙(slot 0)的前三个OFDM符号,第二个PDCCH检测时机为第二个时隙(slot 1)的前三个OFDM符号,第三个PDCCH检测时机为第三个时隙(slot 2)的前三个OFDM符号,第四个PDCCH检测时机为第四个时隙(slot 3)的前三个OFDM符号。那么,网络设备将DCI承载在第一个检测时机中的CCE0-3进行第一次发送,将DCI承载在第二个检测时机中的CCE0-3进行第二次发送,将DCI承载在第三个检测时机中的CCE0-3进行第三次发送,以及将DCI承载在第四个检测时机中的CCE0-3进行第四次发送。
需要说明的是,本申请涉及的AL的高低可以是根据一个CORESET所容纳的CCE的数量评定。例如,小于或等于一个CORESET所容纳的最多CCE数量的AL可以称为低AL,大于一个CORESET所容纳的最多CCE数量的AL可以称为高AL。上述方案通过采用更高的汇聚级别和更多的重复次数来传输一个DCI,提升了降能力用户设备的解调性能。但是,由于DCI发送的时隙占据了4个时隙,降能力用户设备无法直接沿用非降能力终端设备(正常的用户设备)确定PDSCH占用的时隙的技术。具体而言,如图7或图8所示,由于DCI发送的时隙包括slot 0-slot 3共四个时隙,这种情况下,即降能力用户设备无法 确定DCI发送的时隙是1-4中的哪一个,即无法确定上述公式(1)中的n是多少。进而,降能力用户设备将无法根据公式(1)计算PDSCH占用的时隙,以致降能力用户设备无法接收网络设备发送的数据。
基于此,本申请实施例提供了一种通信方法,在该通信方法中,降能力用户设备依然可以沿用非降能力终端设备确定PDSCH占用的时隙的技术。进而,降能力用户设备可以接收网络设备发送的数据。
需要说明的是,下文通信方法中所述的终端设备为降能力用户设备。以及,下文通信方法是以包括终端设备和网络设备的通信系统为例进行说明,本申请对此不作限定。例如,本申请提供的通信方法也可以应用于包括两个终端设备的通信系统。此时,该两个终端设备中的一个终端设备可以执行下文通信方法中所述的网络设备执行的步骤,另一个终端设备可以执行下文通信方法中所述的终端设备执行的步骤。
下面结合附图,对本申请实施例提供的通信方法进行说明。
图9为本申请实施例提供的一例通信方法200的示意流程图。
例如,如图9所示,该通信方法200包括S210和S220。下面对S210和S220进行详细的描述。
S210,终端设备盲检DCI。
相应地,网络设备发送DCI。
S220,终端设备根据目标时隙和DCI,确定PDSCH和/或PUSCH的发送时隙。
其中,目标时隙为承载DCI的多个时隙中的一个时隙。
在一个示例中,该多个时隙用于传输一个DCI。此时,一个DCI在多个时隙中传输,目标时隙是承载该一个DCI的多个时隙中的一个时隙。
例如,如图7所示,一个DCI依次承载在第一个时隙(slot 0)、第二个时隙(slot 1)、第三个时隙(slot 2)和第四个时隙(slot 3),即该4个时隙用于传输该一个DCI。这样,目标时隙为第一个时隙(slot 0)、第二个时隙(slot 1)、第三个时隙(slot 2)和第四个时隙(slot 3)中的一个时隙。
在另一个示例中,该多个时隙中的每个时隙用于传输同一个DCI。此时,同一个DCI在多个时隙上被重复传输了多次,目标时隙是承载该同一个DCI的多个时隙中的一个时隙。
又例如,如图8所示,同一个DCI依次在第一个时隙(slot 0)、第二个时隙(slot 1)、第三个时隙(slot 2)和第四个时隙(slot 3)被重复传输了四次,即该4个时隙中的每个时隙都用于传输该同一个DCI。这样,目标时隙为第一个时隙(slot 0)、第二个时隙(slot1)、第三个时隙(slot 2)和第四个时隙(slot 3)中的一个时隙。
在本申请实施例中,该目标时隙可以为是上述公式(1)中的n对应的时隙,即在承载一个DCI的时隙为多个或同一个DCI在多个时隙重复传输了多次的情况下,该目标时隙对应的编号可作为上述公式(1)中DCI的发送时隙的编号n。
该目标时隙为承载DCI的多个时隙中的一个时隙可以为目标时隙为承载DCI的多个时隙中的任意一个时隙。
需要说明的是,网络设备依然可以将DCI发送的时隙与PDSCH占用的时隙之间的差值K0携带在DCI中,进而,终端设备可按照上文的公式(1),确定PDSCH占用的时隙。
示例性地,该目标时隙为承载DCI的多个时隙中的第n1个时隙。这样,上文公式(1)中的n为多个时隙中该第n1个时隙对应的时隙编号。其中,n1为小于或等于m的正整数, m为承载DCI的时隙数,即上文所述的多个时隙的数量。
在一个示例中,当n1等于1时,该目标时隙为承载DCI的多个时隙中的第一个时隙。
例如,如图7所示,该目标时隙可以为如图7中所示的第一个时隙(slot 0),这样,上文公式(1)中的n为0,该DCI中指示的上述公式(1)中的K0为4。此时,若μPDSCH=1,μPDCCH=1,通过上述公式(1)可知,nPDSCH=4,即PDSCH占用的时隙为编号为4的时隙,即如图7所示的第五个时隙slot 4。
又例如,如图8所示,该目标时隙可以为如图8中所示的第一个时隙(slot 0),这样,上文公式(1)中的n为0,该DCI中指示的上述公式(1)中的K0为4。此时,若μPDSCH=1,μPDCCH=1,通过上述公式(1)可知,nPDSCH=4,即PDSCH占用的时隙为编号为4的时隙,即如图8所示的第五个时隙。
在另一示例中,当n1等于m时,该目标时隙为承载DCI的多个时隙中的最后一个时隙。
例如,如图7所示,该目标时隙可以为如图7中所示的第四个时隙,这样,上文公式(1)中的n为3;该DCI中指示的上述公式(1)中的K0为1。此时,若μPDSCH=1,μPDCCH=1,通过上述公式(1)可知,nPDSCH=4,即PDSCH占用的时隙为编号为4的时隙,即如图7所示的第五个时隙。
又例如,如图8所示,该目标时隙可以为如图8中所示的第四个时隙,这样,上文公式(1)中的n为3;该DCI中指示的上述公式(1)中的K0为1。此时,若μPDSCH=1,μPDCCH=1,通过上述公式(1)可知,nPDSCH=4,即PDSCH占用的时隙为编号为4的时隙,即如图8所示的第五个时隙。
此外,该目标时隙是预先配置的。此时,如图10所示,通信方法200还可以包括S230。该S230在S210和S220之间执行,下面详细介绍S230。
S230,终端设备根据DCI,确定目标时隙。也就是说,终端设备根据S210盲检到的DCI,确定目标时隙。
本申请对目标时隙预先配置的方式不作限定。以下,以方式1、方式2和方式3为例,对如何预先配置目标时隙进行描述。
方式1,预先设定或预先定义了目标时隙的确定规则。
这样,S230具体包括:终端设备根据预先设定或预先定义的目标时隙的确定规则和DCI,确定目标时隙。
示例性地,可以预先设定或预先定义目标时隙为多个时隙中的第n1个时隙。这样,终端设备根据预先设定或预先定义的目标时隙的确定规则,便将多个时隙中的第n1个时隙确定为目标时隙。
本申请实施例对预先设定或预先定义的方式不作限定,例如,可以是通信标准协议规定或标准定义。
方式2,网络设备配置目标时隙的确定规则,并将目标时隙的确定规则告知终端设备。
这样,S230具体包括:终端设备根据网络设备的配置和DCI,确定目标时隙。
在该示例中,如图10所示,通信方法200还包括S240,该S240在S230之前执行,本申请实施例对S240和S210之间的执行顺序不作限定,下面详细介绍S240。
S240,网络设备向终端设备发送第一配置信息。相应地,终端设备接收来自网络设备的第一配置信息。这样,终端设备根据第一配置信息和DCI,确定目标时隙。
其中,第一配置信息可以直接指示目标时隙。或者,第一配置信息也可以用于确定目标时隙。
本申请对第一配置信息如何用于确定目标时隙的方式不作限定。
在一个示例中,第一配置信息包括第一字段,第一字段包括一个或多个比特,该一个或多个比特用于指示目标时隙的确定规则。
例如,当第一配置信息的第一字段的一个或多个比特指示第一状态时,目标时隙的确定规则可以理解为将多个时隙中的第一个时隙确定为目标时隙;当第一配置信息的第一字段的一个或多个比特指示第二状态,目标时隙的确定规则可以理解为将多个时隙中的第二个时隙确定为目标时隙;……;当第一配置信息的第一字段的一个或多个比特指示第n1状态,目标时隙的确定规则可以理解为将多个时隙中的第n1个时隙确定为目标时隙;……;当第一配置信息的第一字段的一个或多个比特指示第m状态,目标时隙的确定规则可以理解为将多个时隙中的最后一个时隙确定为目标时隙。
方式3,网络设备根据目标时隙的确定规则,确定出目标时隙,并将目标时隙告知终端设备。
本申请实施例对网络设备如何获知目标时隙的确定规则不作限定。例如,该目标时隙的确定规则可以是预先设定的。
通过上文对通信方法200的说明,如图7所示,在一个DCI在多个时隙上传输的情况下,或者,如图8所示,在同一个DCI在多个时隙中的每个时隙上重复传输的情况下,终端设备可以确定上述公式(1)中的DCI的发送时隙n,进而终端设备依然可以通过上述公式(1)确定PDSCH和/或PUSCH占用的时隙。
结合上文对DCI的编码和调制的说明,在现有的编码和码率匹配机制下,终端设备有可能通过承载DCI的部分CCE便能够成功解调DCI。
示例性地,若网络设备采用AL=16对DCI进行编码,可得到长度为1728bit(108bit×16)的序列;若网络设备采用AL=8对同一个DCI进行编码,可得到长度为864bit(108bit×8)的序列。这样,在现有的编码和码率匹配机制下,即网络设备采用相同的编码器和循环存储器下,对采用AL为16的DCI进行编码和码率匹配后,得到的bit序列的前1-864bit,其与对采用AL为8的DCI进行编码和码率匹配后,得到的bit序列的1-864bit是完全相同的。因此,终端设备在盲检DCI的过程中,终端设备对采用AL为16的DCI的前8个CCE,按照AL=8进行解码,也有可能成功解码。此时,终端设备便会误认为网络设备是采用AL=8发送该DCI的。这样,造成终端设备误判上文所述的目标时隙。
例如,如图7所示,假设网络设备发送的DCI实际采用的AL为16,且该DCI分别通过四个时隙(如图7所示的slot 0、slot 1、slot 2和slot 3)进行发送。终端设备在盲检DCI的过程中,若对前两个时隙中的CCE(slot 0中的CCE0-3和slot 1中的CCE0-3)所承载的内容解码成功了。此时,终端设备会误认为这个DCI采用的AL为8,且该DCI占用的时隙为图7中所示的slot 0和slot 1。若网络设备发送给终端设备的第一配置信息中指示DCI的目标时隙为承载DCI的最后一个时隙,此时,终端设备会认为目标时隙为slot 1,即n=1。但是,在实际情况中,如上文所述此时的n应该为3。
示例性地,若网络设备采用AL=4对DCI进行编码,可得到长度为432bit(108bit×4)的序列;若网络设备同样采用AL=4对同一个DCI进行编码,并且该DCI在不同的时隙上被重复传输了4次。这样,每次传输的都是前述的432bit信息。因此,终端设备在盲检 DCI的过程中,终端设备对采用AL为4,且被重复传输了4次的DCI的前4个CCE,按照AL=4进行解码,也有可能成功解码。此时,终端设备便会误认为网络设备采用AL=4发送该DCI的,而不知道其进行了多次重复。这样,造成终端设备误判上文所述的目标时隙。
例如,如图8所示,假设网络设备发送的DCI实际采用的AL为4,且该DCI分别通过四个时隙(如图8所示的slot 0、slot 1、slot 2和slot 3)进行4次重复发送。终端设备在盲检DCI的过程中,若对第一个时隙中的CCE(slot 0中的CCE0-3)所承载的内容解码成功了。此时,终端设备会误认为这个DCI使用的AL为4,且该DCI占用的时隙为图8中所示的slot 0。若网络设备发送给终端设备的配置信息中指示DCI的目标时隙为承载DCI的最后一个时隙,此时,终端设备会认为目标时隙为slot 0,即n=0。但是,在实际情况中,如上文所述此时的n应该为3。
进一步,在上文所述的通信方法200的基础上,本申请实施例还提供了一些实施例,如下文所述的实施例1至实施例5,来避免终端设备出现上文所述的误判目标时隙的情况。下面对这些实施例进行详细说明。
实施例1,为了避免终端设备在盲检DCI的过程中,会混淆DCI的聚合级别,网络设备可以只配置终端设备对可能出现混淆的聚合级别中的一个聚合级别进行盲检,而对可能出现混淆的聚合级别中的其他聚合级别的盲检次数配置为0。这样,终端设备对DCI进行盲检的过程中,只会对可能出现混淆聚合级别中的一个聚合级别进行盲检,不会对该可能出现混淆聚合级别中的其他聚合级别进行盲检。
在该实施例1中,目标时隙为承载DCI的多个时隙中的第n1个时隙。例如,目标时隙为承载DCI的最后一个时隙,或者,目标时隙为承载所述DCI的第一个时隙。
例如,在该实施例1中,如图10所示,在S210之前,方法200还包括S201a,下面详细介绍S201a。
S201a,网络设备向终端设备发送第二配置信息。相应地,终端设备接收来自网络设备发送的第二配置信息,进而终端设备根据第二配置信息,盲检DCI。
第二配置信息用于指示多个聚合级别的盲检次数,多个聚合级别包括第一聚合级别和第二聚合级别,第一聚合级别的盲检次数为0,第二聚合级别的盲检次数不为0。这样,在每个检测周期内,终端设备不会采用第一聚合级别对DCI进行盲检,只会采用第二聚合级别对DCI进行盲检。
其中,第一聚合级别和第二聚合级别不相同,采用第一聚合级别的DCI占用的时隙数量和采用第二聚合级别的DCI占用的时隙数量不同。或者,第一聚合级别和第二聚合级别相同,采用第一聚合级别的DCI的重复传输的次数与采用第二聚合级别的DCI的重复传输次数不同。这样,终端设备在每个时隙内,就只对DCI采用第二汇聚级别进行盲检,不会对DCI采用第一汇聚级别进行盲检,自然,终端设备在盲检DCI的过程中,也不会混淆第二聚合级别和第一聚合级别。
例如,第一聚合级别可以为8,第二聚合级别可以为16,采用第一聚合级别的DCI占用的时隙数量为2,采用第二聚合级别的DCI占用的时隙数量为4。由于第一聚合级别的盲检次数为0,第二聚合级别的盲检次数不为0,这样,终端设备就只对DCI采用汇聚级别为16进行盲检,不会对DCI采用汇聚级别为8进行盲检,自然,终端设备在盲检DCI的过程中,不会混淆聚合级别16和8。
或者,第一聚合级别可以为16,第二聚合级别可以为8,采用第一聚合级别的DCI占用的时隙数量为4,采用第二聚合级别的DCI占用的时隙数量为2。由于第一聚合级别的盲检次数为0,第二聚合级别的盲检次数不为0,这样,终端设备就只对DCI采用汇聚级别为8进行盲检,不会对DCI采用汇聚级别为16进行盲检,自然,终端设备在盲检DCI的过程中,不会混淆聚合级别16和8。
又例如,第一聚合级别可以为16,第二聚合级别可以为32,采用第一聚合级别的DCI占用的时隙数量为4,采用第二聚合级别的DCI占用的时隙数量为8。由于第一聚合级别的盲检次数为0,第二聚合级别的盲检次数不为0,这样,终端设备就只对DCI采用汇聚级别为32进行盲检,不会对DCI采用汇聚级别为16进行盲检,自然,终端设备在盲检DCI的过程中,不会混淆聚合级别16和32。
或者,第一聚合级别可以为32,第二聚合级别可以为16,采用第一聚合级别的DCI占用的时隙数量为8,采用第二聚合级别的DCI占用的时隙数量为4。由于第一聚合级别的盲检次数为0,第二聚合级别的盲检次数不为0,这样,终端设备就只对DCI采用汇聚级别为16进行盲检,不会对DCI采用汇聚级别为32进行盲检,自然,终端设备在盲检DCI的过程中,不会混淆聚合级别16和32。
又例如,第一聚合级别和第二聚合级别可以均为4,分别采用第一聚合级别和第二聚合级别的DCI占用的时隙数量均为1,且采用第二聚合级别的DCI在4个时隙上重复传输。由于第一聚合级别的盲检次数为0,第二聚合级别的盲检次数不为0,这样,终端设备就只对在4个时隙上重复传输的同一个DCI进行盲检,不会对只在1个时隙上传输的DCI进行盲检,自然,终端设备在盲检DCI的过程中,不会混淆AL4和AL4×4(即聚合级别为4,且同一个DCI被重复传输了4次)。
需要说明的是,在该示例中,第一,上文关于第一聚合级别和第二聚合级别的具体取值仅为示例,其不应对本申请构成限制。例如,第一聚合级别还可以为4,第二聚合级别还可以为8,此时,采用第一聚合级别的DCI占用的时隙数量为1,采用第二聚合级别的DCI占用的时隙数量为2。又例如,第一聚合级别和第二聚合级别均还可以为4,采用第一聚合级别的DCI占用的时隙数量为1,采用第二聚合级别的DCI占用的时隙数量为2。
第二,上文是以第一聚合级别的数量为一个示例,其不应对本申请构成限制。
第三,多个聚合级别除了包括第一聚合级别和第二聚合级别外,还可以包括其他聚合级别,该其他聚合级别和第一聚合级别、第二聚合级别均不相同,且该其他聚合级别的盲检次数不为0。例如,第二配置信息可以用于指示:当聚合级别为1(其他聚合级别的一例)时,盲检次数为10;当聚合级别为2(其他聚合级别的另一例)时,盲检次数为8;当聚合级别为4(其他聚合级别的又一例)时,盲检次数为8;当聚合级别为8(第一聚合级别的一例)时,盲检次数为4;当聚合级别为16(第二聚合级别的一例)时,盲检次数为0。又例如,第二配置信息可以用于指示:当聚合级别为1(其他聚合级别的一例)时,盲检次数为10;当聚合级别为2(其他聚合级别的另一例)时,盲检次数为8;当聚合级别为4(第二聚合级别的又一例)时,盲检次数为8;当聚合级别为4(第一聚合级别的一例),且同一个DCI重复传输4次时,盲检次数为0。
第四,网络设备可以将第二配置信息和第一配置信息分别承载在两个单独的消息中,发送给终端设备。或者,网络设备也可以将第二配置信息和第一配置信息承载在一个消息中发送给终端设备。此时,本申请对该第二配置信息和第一配置信息承载的一个消息的类 型不作限定,例如,该消息可以是搜索空间(search space)的配置消息。可选地,该搜索空间的配置消息中可以新增两个字段,该新增的两个字段分别用于指示第二配置信息和第一配置信息所指示的内容。
实施例2,为了避免终端设备在盲检DCI的过程中,会混淆DCI的聚合级别或重复传输的次数,网络设备可以在DCI中携带多个聚合级别对应的DCI的计时周期。这样,终端设备对DCI进行盲检的过程中,按照聚合级别对应的DCI的计时周期,确定上文所述的目标时隙。这样,即使终端设备通过承载DCI的部分CCE成功解调DCI,终端设备仍然需要根据聚合级别对应的DCI的计时周期,确定目标时隙。
在该实施例2中,目标时隙为计时周期内的第n1个时隙。例如,目标时隙为计时周期内的最后一个时隙,或者,目标时隙为计时周期内的第一个时隙。
例如,在该实施例2中,如图10所示,在S210之前,方法200还包括S201b,下面详细介绍S201b。
S201b,网络设备向终端设备发送第三配置信息。相应地,终端设备接收来自网络设备发送的第三配置信息,进而终端设备根据第三配置信息,盲检DCI。
第三配置信息用于指示多个聚合级别对应的DCI的计时周期,目标时隙为计时周期内的时隙。多个聚合级别包括第一聚合级别和第二聚合级别,采用第一聚合级别的DCI和采用第二聚合级别的DCI的计时周期相同。其中,第一聚合级别和第二聚合级别不相同,采用第一聚合级别的DCI占用的时隙数量和采用第二聚合级别的DCI占用的时隙数量不同,或者,第一聚合级别和第二聚合级别相同,采用第一聚合级别的DCI的重复传输的次数与采用第二聚合级别的DCI的重复传输次数不同。
本申请对采用第一聚合级别的DCI和采用第二聚合级别的DCI的计时周期的具体取值不作限定。
在一个示例中,采用第一聚合级别的DCI和采用第二聚合级别的DCI的计时周期可以等于采用第二聚合级别的DCI的传输周期。其中,在第一聚合级别和第二聚合级别不相同的情况下,该采用第二聚合级别的DCI占用的时隙数量大于采用第一聚合级别的DCI占用的时隙数。或者,在第一聚合级别和第二聚合级别相同的情况下,该采用第二聚合级别的DCI的重复传输的次数大于采用第一聚合级别的DCI的重复传输次数。
例如,第一聚合级别可以为8,第二聚合级别可以为16,采用第一聚合级别的DCI占用的时隙数量为2,采用第二聚合级别的DCI占用的时隙数量为4。此外,采用聚合级别为8和16的DCI的计时周期可以等于采用聚合级别为16的DCI的传输周期,即采用聚合级别为8和16的DCI的计时周期为4个时隙。此时,无论终端设备是采用的聚合级别是8还是16,目标时隙都是从周期为4个时隙的计时周期内确定。这样,即使终端设备通过前8个CCE(前两个时隙)完成了DCI的解码,终端设备仍然需要根据周期为4个时隙的计时周期,确定目标时隙。此时,终端设备将4个时隙中的第i1个时隙确定为目标时隙。其中,1≤i1≤4,且i1的具体取值由目标时隙的确定规则而定。这与通过16个CCE完成DCI的解码后确定的目标时隙是相同,因此,终端设备不会混淆AL8和AL16。
又例如,第一聚合级别和第二聚合级别可以均为4,分别采用第一聚合级别和第二聚合级别的DCI占用的时隙数量均为1,且采用第二聚合级别的DCI在4个时隙上重复传输。此外,采用AL4和AL4×4的DCI的计时周期可以等于采用AL4×4的DCI的传输周期,即采用AL4和AL4×4的DCI的计时周期为4个时隙。此时,无论终端设备是采用AL4 还是AL4×4,目标时隙都是从周期为4个时隙的计时周期内确定。这样,即使终端设备通过前4个CCE(第一个时隙)完成了DCI的解码,终端设备仍然需要根据周期为4个时隙的计时周期,确定目标时隙。此时,终端设备将4个时隙中的第i2个时隙确定为目标时隙。其中,1≤i2≤4,且i2的具体取值由目标时隙的确定规则而定。这与通过16个CCE完成DCI的解码后确定的目标时隙是相同,因此,终端设备不会混淆AL4和AL4×4。
其中,上文所述的AL4×4可以理解为DCI采用的AL为4,且该DCI被重复传输了4次。
可选地,在该示例中,多个聚合级别除了包括第一聚合级别和第二聚合级别外,还可以包括其他聚合级别,该其他聚合级别和第一聚合级别、第二聚合级别均不相同,且该其他聚合级别的计时周期均为1。例如,第三配置信息可以用于指示:当聚合级别为1(其他聚合级别的一例)时,计时周期为1;当聚合级别为2(其他聚合级别的另一例)时,计时周期为1;当聚合级别为4(其他聚合级别的又一例)时,计时周期为1;当聚合级别为8(第一聚合级别的一例)时,计时周期为4;当聚合级别为16(第二聚合级别的一例)时,计时周期为4。
可选地,该第三配置信息还用于指示计时周期的起始位置。例如,如图7和如图8所示,该第三配置信息还用于指示计时周期的起始位置为第一个时隙(slot0)。
关于该第三配置信息中涉及的第一聚合级别和第二聚合级别的其他示例以及相关描述,可以参见上文第二配置信息中涉及的第一聚合级别和第二聚合级别的示例以及相关描述,这里不再赘述。
需要说明的,第一,网络设备可以将第三配置信息和第一配置信息分别承载在两个单独的消息中,发送给终端设备。或者,网络设备也可以将第三配置信息和第一配置信息承载在一个消息中发送给终端设备。此时,本申请对该第三配置信息和第一配置信息承载的一个消息的类型不作限定,例如,该消息可以是搜索空间(search space)的配置消息。可选地,该搜索空间的配置消息中可以新增两个字段,该新增的两个字段分别用于指示第三配置信息和第一配置信息所指示的内容。
第二,在该实施例3中,网络设备可以按照现有的方案,在给终端设备配置搜索空间配置信息中,配置每个AL的检测次数。
实施例3,为了避免终端设备在盲检DCI的过程中,会混淆DCI的聚合级别,网络设备可以在DCI中携带该DCI采用的聚合级别。这样,终端设备对DCI进行盲检的过程中,将不会混淆DCI的聚合级别。
例如,可以在DCI中新增一个字段,该字段包括一个或多个比特,该一个或多个比特用于指示DCI的聚合级别。例如,若该DCI采用的汇聚级别为8时,该DCI中新增的字段中的一个或多个比特可以为第一状态;若该DCI采用的汇聚级别为16时,该DCI中新增的字段中的一个或多个比特可以为第二状态。
在该实施例3中,终端设备在S210和S220之间,终端设备还需执行S250,下面对S250进行详细说明。
S250,当盲检到的DCI的聚合级别不等于DCI指示的聚合级别时,确定目标时隙为DCI发送周期内的时隙。这样,即使终端设备通过承载DCI的部分CCE成功解调DCI,终端设备仍然需要根据DCI发送周期,确定目标时隙,进而终端设备可以确定出正确的目标时隙。
其中,目标时隙为DCI发送周期内的第n1个时隙。例如,目标时隙为DCI发送周期内的最后一个时隙,或者,目标时隙为DCI发送周期内的第一个时隙。
需要说明的是,S250中所述的DCI发送周期可以理解为DCI中所指示的聚合级别对应的周期。例如,若DCI中所指示的聚合级别为8,且该聚合级别对应2个时隙,那么DCI发送周期即为2个时隙。又例如,若DCI中所指示的聚合级别为16,且该聚合级别对应4个时隙,那么DCI发送周期即为4个时隙。
此外,当一个DCI在多个时隙传输时,DCI发送周期等于该一个DCI所占用的多个时隙的数量。
例如,终端设备通过前8个CCE(前两个时隙)完成了DCI的解码,但是通过对DCI的解码,得到该DCI指示的聚合级别为16,那么,终端设备需要根据聚合级别为16对应的时隙(4个时隙),即DCI发送周期,确定目标时隙。
本申请对触发终端设备执行S250的触发主体不作限定。
在一个示例中,触发主体可以是网络设备,网络设备向终端设备发送指示信息,该指示信息用于指示:当盲检到的DCI的聚合级别不等于DCI指示的聚合级别时,确定目标时隙为DCI发送周期内的时隙。
在另一个示例中,触发主体可以是由通信协议定义或规定:当盲检到的DCI的聚合级别不等于DCI指示的聚合级别时,确定目标时隙为DCI发送周期内的时隙。
实施例4,为了避免终端设备在盲检DCI的过程中,会混淆DCI的重复传输的次数,网络设备可以在DCI中携带该DCI重复传输的次数。这样,终端设备对DCI进行盲检的过程中,将不会混淆DCI的重复传输的次数。
例如,可以在DCI中新增一个字段,该字段包括一个比特,该一个比特用于指示该DCI是否重复传输。例如,若该DCI没有重复传输,即该DCI只传输一次时,该DCI中新增的字段中的一个比特可以为0;若该DCI存在重复传输时,该DCI中新增的字段中的一个比特可以为1。此时,该DCI重复传输的次数可以是预先设定的,本申请对该DCI重复传输的次数的具体取值不作限定,如该DCI重复传输的次数可以是4。
又例如,可以在DCI中新增一个字段,该字段包括两个比特,该两个比特用于指示该DCI是否存在重复传输。此外,在该DCI存在重复传输的情况下,该两个比特不仅用于指示该DCI是否存在重复传输,还用于指示该DCI重复传输的次数。例如,若该DCI没有重复传输,即该DCI只传输一次时,该DCI中新增的字段中的两个比特可以为00;若该DCI存在重复传输,且重复传输的次数为4时,该DCI中新增的字段中的两个比特可以为11。
需要说明的是,如果该DCI没有重复传输,那么该DCI中携带的重复传输的次数可以为1。
在该示例中,终端设备在S210和S220之间,终端设备还需执行S260,下面对S260进行详细说明。
S260,当盲检到的DCI的重复传输的次数不等于DCI指示的重复传输的次数时,确定目标时隙为DCI发送周期内的时隙。这样,即使终端设备通过承载DCI的部分CCE成功解调DCI,终端设备仍然需要根据DCI发送周期,确定目标时隙,进而终端设备可以确定出正确的目标时隙。
其中,目标时隙可以为DCI发送周期内的第n1个时隙。例如,目标时隙为DCI发送 周期内的最后一个时隙,或者,目标时隙为DCI发送周期内的第一个时隙。
需要说明的是,S260中所述的DCI发送周期可以理解为DCI中所指示的重复传输的次数对应的周期。例如,若DCI中所指示的重复传输的次数为4,且该重复传输的次数对应4个时隙,那么DCI发送周期即为4个时隙。
此外,当同一个DCI在多个时隙中的每个时隙重复传输时,DCI发送周期等于该同一个DCI所占用的多个时隙的数量,也即该同一个DCI重复传输的次数。
例如,终端设备通过前4个CCE(前两个时隙)完成了DCI的解码,但是通过对DCI的解读,得到该DCI指示的DCI的重复传输次数为4,那么,终端设备需要根据重复传输次数为4对应的时隙(4个时隙),即DCI发送周期,确定目标时隙。这样,即使终端设备通过承载DCI的部分CCE成功解调DCI,终端设备仍然需要根据DCI指示的重复传输的次数对应的周期,确定目标时隙,进而终端设备可以确定出正确的目标时隙。
本申请对触发终端设备执行S260的触发主体不作限定。
在一个示例中,触发主体可以是网络设备,网络设备向终端设备发送指示信息,该指示信息用于指示:当盲检到的DCI的不等于DCI指示的时,确定目标时隙为DCI发送周期内的时隙。
在另一个示例中,触发主体可以由通信协议定义或规定:当盲检到的DCI的聚合级别不等于DCI指示的聚合级别时,确定目标时隙为DCI发送周期内的时隙。
实施例5,为了避免终端设备在盲检DCI的过程中,会混淆DCI的聚合级别或重复传输的次数,网络设备可以在对DCI的序列进行编码之后,对DCI的序列进行交织处理,这样,终端设备可以避免仅通过承载DCI的部分CCE就能够成功解调DCI的情况,进而,终端设备也就不会存在误判目标时隙的情况。
在该实施例5中,在网络设备发送DCI之前,网络设备还执行S270至S290。下面详细介绍S270至S290。
需要说明的是,在一个示例中,无论DCI采用的聚合级别如何,网络设备都可以对所有DCI都执行S270至S290。在另一个示例中,网络设备可以只针对采用第一聚合级别和第二聚合级别的DCI执行S270至S290。本申请对此不作限定。
S270,网络设备获取第一序列。其中,该第一序列为编码和码率匹配后得到的DCI的序列。
S280,网络设备对第一序列进行交织处理,得到第二序列。
在一个示例中,S280具体包括:S281a,网络设备采用按行或按列的转换方式,将第一序列转换为三角矩阵,第一序列的长度为E,三角矩阵的列数或行数分别为T1,T1为满足的最小整数;S282a,网络设备将三角矩阵中的元素依次按列或行排列后得到的序列确定为第二序列。
示例性地,该网络设备可以包括第一交织器,该第一交织器具有一个三角形的存储结构,该存储结构的边长为T1。该第一交织器可以按照行进列出(行写列读)或列进行出(列写行读)的交织方式,对第一序列进行交织得到第二序列。
例如,如图11所示,将第一序列按行写入该第一交织器,最后可能会有一些位置没有输入,这些无输入的位置,标识为无(null)。然后,再将第一交织器中的内容按列读出,遇到有null的位置,则跳过,便可得到第二序列,该第二序列的长度为E。本申请对 该第一交织器的三角形的存储结构是上三角还是下三角不作限定。
需要说明的是,上文是以第一交织器的存储结构为三角形为例进行说明,其不应对本申请构成限制。例如,第一交织器的存储的结构也可以为正方形,其交织的原理和三角形的存储结构的第一交织器的原理类似,这里不再赘述。
如果网络设备采用AL为8发送DCI,其码率匹配后的序列长度为E=864bit,则第一交织器的边长为T1=42。而如果网络设备采用AL为16发送DCI,其码率匹配后的序列长度为E=1728bit,则第一交织器的边长为T1=42。由于第一交织器采用了不同边长的三角形的存储结构,因此,采用AL为16的DCI交织后的bit序列的前864bit,与采用AL为8的DCI交织后的bit序列不再相同。这样,终端设备按照AL=8,对于AL=16的前8个CCE进行解码,将无法成功。
在另一个示例中,S280具体包括:S281b,按照第一序列中元素的排列顺序,将第一序列划分为H1个子序列,H1个子序列中的每个子序列的长度均为一个CCE传输的比特数;S282b,将H1个子序列进行序列级别的交织,得到第二序列。
需要说明的是,将H1个子序列进行序列级别的交织可以理解为是以H1个子序列中的每个子序列为最小交织单元进行交织。
示例性地,S282b具体包括:将H1个子序列中的第i个子序列,映射至第j个PDCCH检测时机中的第k个CCE,j=mod(v,N),v为第i个子序列在H1个子序列中的编号,N为DCI占用的时隙数;按照PDCCH检测时机的排列顺序以及PDCCH检测时机中每个CCE的排列顺序,将映射至每个CCE的子序列进行排列,得到第二序列。此时,可以理解为:网络设备先将第一序列按顺序映射至虚拟(virtual)CCE中。虚拟CCE的排列顺序为上文所述的H1个子序列的排序。然后,网络设备将虚拟的CCE所映射的子序列映射至物理(physcial)CCE上传输。其中,虚拟CCE的编号i、PDCCH检测时机的编号j和物理CCE的编号k满足上文所述的公式。
例如,如图12所示,若DCI占用的时隙数N=4,DCI采用的AL为16,则该DCI码率匹配后的序列长度为1728bit。此外,若一个CCE可以传输108bit,这样,DCI码率匹配后的序列可以分为16(H1取值的一例)个子序列。那么,根据j=mod(v,N),便可得到j和k的取值,具体如表2所示。
表2

这样,采用AL为16的DCI交织后的bit序列的前864bit,与采用AL为8的DCI交织后的bit序列不再相同。这样,终端设备按照AL=8,对于AL=16的前8个CCE进行解码,将无法成功。
例如,如图13所示的,若DCI采用的AL为4,在第一个时隙和第二个时隙上都分别传输了该DCI,即该DCI的重复传输次数为2,则该DCI码率匹配后的序列长度为864bit。此外,若一个CCE可以传输108bit,这样,DCI码率匹配后的序列可以分为8(H1取值的一例)个子序列。那么,根据j=mod(v,N),便可得到j和k的取值,具体如表3所示。
表3
在DCI有重复传输或DCI在一个时隙传输的情况下,例如DCI采用的聚合级别为4,且DCI在1个时隙上传输;或者,DCI采用的聚合级别为4,且DCI在4个时隙上重复传输,S282b还可以具体包括:将H1个子序列中的第i个子序列,映射至第k个CCE,k=mod(i+m,M),m和M为正整数;按照PDCCH检测时机中每个CCE的排列顺序,将映射至每个CCE的子序列进行排列,得到第二序列。
本申请实施例对m和M的具体取值不作限定。
例如,如图13所示的,若DCI采用的聚合级别为4,在第一个时隙和第二个时隙上都分别传输了该DCI,即该DCI的重复传输次数为2,则该DCI码率匹配后的序列长度为864bit。此外,若一个CCE可以传输108bit,这样,DCI码率匹配后的序列可以分为8(H1取值的一例)个子序列。若m取2,M取4,那么,根据k=mod(i+m,M),便可得到k的取值,具体如表4所示。
表4

这样,采用AL为4的DCI交织后的bit序列的前432bit,与采用AL为4,且重复传输次数为2的DCI交织后的bit序列不再相同。这样,终端设备按照AL=4,对于AL4×4的前8个CCE进行解码,将无法成功。
S290,按照第二序列中的元素的排列顺序,将第二序列中的每个元素分别映射至相应的CCE上,并发送DCI。
在该实施例5中,网络设备发送DCI之前执行了S270至S290。相应地,终端设备在盲检DCI的过程中,终端设备具体执行S211至S213,即S210具体包括S211至S213,下面详细介绍S211至S213。
S211,终端设备获取第二序列,第二序列为解调后的DCI的序列。
S212,终端设备对第二序列进行反交织处理,得到第一序列。
在一个示例中,S212具体包括:S2121a,终端设备采用按列或按行的转换方式,将第二序列转换为三角矩阵,第二序列的长度为E,三角矩阵的列数或行数分别为T1,T1为满足的最小整数;S2122a,终端设备将三角矩阵中的元素依次按行或列排列后得到的序列确定为第一序列。
示例性地,该终端设备可以包括第二交织器,该第二交织器的存储结构和网络设备包括的第一交织器的存储结构相同。例如,若第一交织器具有一个三角形的存储结构,那么第二交织器也是具有一个三角形的存储结构,该存储结构的边长也为T1。且该第二交织器可以按照列进行出(列写行读)或行进列出(行写列读)的反交织方式,对第二序列进行反交织得到第一序列。
需要说明的是,反交织也是一种交织处理的方式,只是终端设备反交织的过程和网络设备交织的过程是相反的或相逆的。例如,若第一交织器是按照行进列出(行写列读)或列进行出(列写行读)的交织方式,那么第二交织器就是按照列进行出(列写行读)或行进列出(行写列读)的交织方式。
如果网络设备采用AL为8发送DCI,其码率匹配后的序列长度为E=864bit,则第二交织器的边长为T1=42。而如果网络设备采用AL1为6发送DCI,其码率匹配后的序列长度为E=1728bit,则第二交织器的边长为T1=42。由于第二交织器采用了不同边长的三角形的存储结构,因此,采用AL为16的DCI交织后的bit序列的前864bit,与采用AL为8的DCI交织后的bit序列不再相同。这样,终端设备按照AL=8,对于AL=16的前8个CCE进行解码,将无法成功。
在另一个示例中,S212具体包括:S2121b,按照第二序列中元素的排列顺序,将第二序列划分为H2个子序列,H2个子序列中的每个子序列的长度均为一个CCE传输的比特数;S2122b,将H2个子序列进行序列级别的反交织,得到第一序列。
需要说明的是,将H2个子序列进行序列级别的反交织可以理解为是以H2个子序列中的每个子序列为最小交织单元进行反交织。
示例性地,S2122b具体包括:将H2个子序列中第j个PDCCH检测时机中的第k个CCE所承载的子序列,确定为第一序列的第i个子序列,j=mod(v,N),v为第i个子序列在第一序列中的编号,N为DCI占用的时隙数。此时,可以理解为:终端设备先 按照PDCCH检测时机的先后顺序和PDCCH检测时机上的CCE的排序,将物理(physcial)CCE上传输的子序列映射至虚拟(virtual)CCE。然后,再按照虚拟CCE的排列顺序,将每个虚拟CCE上映射的子序列进行排列得到第一序列。其中,虚拟CCE的排列顺序为上文所述的H2个子序列的排序。虚拟CCE的编号i、PDCCH检测时机的编号j和物理CCE的编号k满足上文所述的公式。
在DCI有重复传输或DCI在一个时隙传输的情况下,例如DCI采用的聚合级别为4,且DCI在1个时隙上传输;或者,DCI采用的聚合级别为4,且DCI在4个时隙上重复传输,S2122b还可以具体包括:将H2个子序列中第k个CCE所承载的子序列,确定为第一序列的第i个子序列,k=mod(i+m,M),m和M为正整数。这样,采用AL为4的DCI交织后的bit序列的前432bit,与采用AL为4,且重复传输次数为2的DCI交织后的bit序列不再相同。这样,终端设备按照AL=4,对于AL4×4的前8个CCE进行解码,将无法成功。
S213,对第一序列进行解码,得到DCI携带的信息。
上文所述的实施例1至实施例5,从频率上而言,DCI在每个时隙上所占的带宽都在终端设备的通信带宽内。而在无线通信系统中,信道存在频率选择性衰落。这样,当终端设备的通信带宽较窄时,如果频率处于深衰,便会影响终端设备的传输性能。
因此,在保证终端设备的解调性能的基础上,即在上文通信方法200的基础上,为了提升终端设备的传输性能,针对一个DCI在多个时隙上传输的情况,网络设备可以在该多个时隙的每个时隙上,以不同的频率发送该时隙上原本需要发送的DCI的部分内容。针对同一个DCI在多个时隙中的每个时隙传输的情况,网络设备可以在该多个时隙的每个时隙上,以不同的频率重复发送该时隙上原本需要发送的DCI。
在一个示例中,网络设备在给终端设备进行CORESET配置时,同时配置CORESET的跳频信息,该CORESET的跳频信息包括:CORESET的跳频周期、跳频的频率步长以及CORESET在一个跳频期内的起始频率。这样,终端设备在多个时隙上的每个时隙盲检DCI之前,根据CORESET的跳频信息,在一个跳频周期内的每个slot,跳频一次。在该示例中,CORESET在频率上的宽度不超过终端设备所支持的通信带宽。
例如,如图14所示,若网络设备在四个时隙上传输一个DCI,具体的,网络设备在第一个时隙(slot0)的RB0-9发送DCI的第一部分,在第二个时隙(slot1)的RB12-21发送DCI的第二部分,在第三个时隙(slot2)的RB24-33发送DCI的第三部分,在第四个时隙(slot3)的RB36-45发送DCI的第四部分。此时,网络设备给终端设备配置的CORESET的跳频信息包括:CORESET的跳频周期为4个slot、跳频的频率步长为11个RB以及CORESET在一个跳频周期内的起始频率为RB0。这样,终端设备根据CORESET的跳频信息,以RB0为起始频率,以11个RB为跳频的频率步长,盲检第一个时隙(slot0)上的DCI的第一部分;以RB12为起始频率,以11个RB为跳频的频率步长,盲检第二个时隙(slot1)上的DCI的第二部分;以RB24为起始频率,以11个RB为跳频的频率步长,盲检第三个时隙(slot2)上的DCI的第三部分;以及,以RB36为起始频率,以11个RB为跳频的频率步长,盲检第四个时隙(slot3)上的DCI的第四部分,进而完成一个跳频周期内对DCI盲检的过程。
又例如,如图14所示,若网络设备在四个时隙上中的每个时隙上重复传输同一个DCI,具体的,网络设备在第一个时隙(slot0)的RB0-9进行第一次DCI的发送,在第二个时 隙(slot1)的RB12-21进行第二次DCI的发送,在第三个时隙(slot2)的RB24-33进行第三次DCI的发送,在第四个时隙(slot3)的RB36-45进行第四次DCI的发送。此时,网络设备给终端设备配置的CORESET的跳频信息包括:CORESET的跳频周期为4个slot、跳频的频率步长为11个RB以及CORESET在一个跳频周期内的起始频率为RB0。这样,终端设备根据CORESET的跳频信息,以RB0为起始频率,以11个RB为跳频的频率步长,盲检第一个时隙(slot0)上网络设备第一次发送的DCI;以RB12为起始频率,以11个RB为跳频的频率步长,盲检第二个时隙(slot1)上网络设备第二次发送的DCI;以RB24为起始频率,以11个RB为跳频的频率步长,盲检第三个时隙(slot2)上网络设备第三次发送的DCI;以及,以RB36为起始频率,以11个RB为跳频的频率步长,盲检第四个时隙(slot3)上网络设备第四次发送的DCI,进而完成一个跳频周期内对DCI盲检的过程。
在另一个示例中,网络设备在给终端设备进行搜索空间配置时,同时配置在每个盲检周期内,每个PDCCH检测时机上终端设备需检测的CORESET部分。在该示例中,CORESET在频率上的宽度可以超过终端设备所支持的通信带宽。
例如,如图15所示,若网络设备在四个时隙上传输一个DCI,具体的,网络设备在第一个时隙(slot0)的RB0-9发送DCI的第一部分,在第二个时隙(slot1)的RB12-21发送DCI的第二部分,在第三个时隙(slot2)的RB24-33发送DCI的第三部分,在第四个时隙(slot3)的RB36-45发送DCI的第四部分。或者,若网络设备在四个时隙上中的每个时隙上重复传输同一个DCI,具体的,网络设备在第一个时隙(slot0)的RB0-9进行第一次DCI的发送,在第二个时隙(slot1)的RB12-21进行第二次DCI的发送,在第三个时隙(slot2)的RB24-33进行第三次DCI的发送,在第四个时隙(slot3)的RB36-45进行第四次DCI的发送。
此时,网络设备给终端设备配置:在第一个时隙(slot0)的PDCCH检测时机上,检测CORESET的CCE0-3;在第二个时隙(slot1)的PDCCH检测时机上,检测CORESET的CCE6-9;在第三个时隙(slot2)的PDCCH检测时机上,检测CORESET的CCE12-15;以及在第四个时隙(slot3)的PDCCH检测时机上,检测CORESET的CCE18-21。这样,终端设备根据每个PDCCH检测时机上需检测的CORESET部分,完成一个周期内对DCI盲检的过程。
下面,结合图16至图17,详细描述本申请实施例提供的通信装置。
图16为本申请实施例提供的一例通信装置1000的示意性结构图。
例如,如图16所示,该通信装置1000包括处理单元1010,用于进行数据处理。
可选地,该通信装置1000还可以包括收发单元1020,用于与外部进行通信。收发单元1020还可以称为通信接口或通信单元。
可选地,该通信装置1000还可以包括存储单元,该存储单元可以用于存储指令或者和/或数据,处理单元1010可以读取存储单元中的指令或者和/或数据。
在一种可实现的方式中,该通信装置1000可以用于执行上文方法实施例中终端设备所执行的动作,这时,该通信装置1000可以为终端设备或者可配置于终端设备的部件,处理单元1010用于执行上文方法实施例中终端设备的处理相关的操作,收发单元1020用于执行上文方法实施例中终端设备的收发相关的操作。
在另一种可实现的方式中,该通信装置1000可以用于执行上文方法实施例中网络设备所执行的动作,这时,该通信装置1000可以为网络设备或者可配置于网络设备的部件, 处理单元1010用于执行上文方法实施例中网络设备的处理相关的操作,收发单元1020用于执行上文方法实施例中网络设备的收发相关的操作。
图17示出了本申请实施例提供的通信装置1100的示意性结构图。
示例性地,该通信装置1100可以为上文实施例中所述的终端设备或网络设备。
如图17所示,该通信装置1100包括:一个或多个处理器1110,一个或多个存储器1120,该一个或多个存储器存储1120存储有一个或多个计算机程序,该一个或多个计算机程序包括指令。当该指令被所述一个或多个处理器1110运行时,使得所述的通信装置1100执行上述实施例中终端设备执行的技术方案或使得所述的装置1100执行上述实施例中网络设备执行的技术方案。
本申请实施例提供了一种通信系统,包括终端设备和网络设备,该系统用于执行上述实施例中的技术方案。其实现原理和技术效果与上述方法相关实施例类似,此处不再赘述。
本申请实施例提供一种计算机程序产品,当所述计算机程序产品在设备运行时,使得设备执行上述实施例中的技术方案。其实现原理和技术效果与上述方法相关实施例类似,此处不再赘述。其中,设备可以包括上文实施例中所述的终端设备或网络设备。
本申请实施例提供一种可读存储介质,所述可读存储介质包含指令,当所述指令在设备运行时,使得所述设备执行上述实施例的技术方案。其实现原理和技术效果类似,此处不再赘述。其中,设备可以包括上文实施例中所述的终端设备或网络设备。
本申请实施例提供一种芯片,所述芯片用于执行指令,当所述芯片运行时,执行上述实施例中的技术方案。其实现原理和技术效果类似,此处不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请实施例的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该 计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (35)

  1. 一种通信方法,其特征在于,所述通信方法应用于终端设备,所述通信方法包括:
    盲检下行控制信息DCI;
    根据目标时隙和所述DCI,确定物理下行共享信道PDSCH和/或物理上行共享信道PUSCH的发送时隙,所述目标时隙为承载所述DCI的多个时隙中的一个时隙,所述多个时隙用于传输一个所述DCI或所述多个时隙中的每个时隙用于传输同一个所述DCI,所述目标时隙是预先配置的。
  2. 根据权利要求1所述的通信方法,其特征在于,在所述根据目标时隙和所述DCI,确定PDSCH和/或PUSCH的发送时隙之前,所述通信方法还包括:
    接收来自网络设备的第一配置信息,所述第一配置信息用于确定所述目标时隙。
  3. 根据权利要求2所述的通信方法,其特征在于,在所述盲检下行控制信息DCI之前,所述通信方法还包括:
    接收来自所述网络设备的第二配置信息,所述第二配置信息用于指示多个聚合级别的盲检次数,所述多个聚合级别包括第一聚合级别和第二聚合级别,所述第一聚合级别的盲检次数为0,所述第二聚合级别的盲检次数不为0,
    其中,所述第一聚合级别和所述第二聚合级别不相同,采用所述第一聚合级别的所述DCI占用的时隙数量和采用所述第二聚合级别的所述DCI占用的时隙的数量不同,或者,
    所述第一聚合级别和所述第二聚合级别相同,采用所述第一聚合级别的所述DCI的重复传输的次数与采用所述第二聚合级别的所述DCI的重复传输次数不同;
    所述盲检下行控制信息DCI包括:
    根据所述第二配置信息,盲检DCI。
  4. 根据权利要求1至3中任一项所述的通信方法,其特征在于,所述目标时隙为承载所述DCI的最后一个时隙,或者,
    所述目标时隙为承载所述DCI的第一个时隙。
  5. 根据权利要求2所述的通信方法,其特征在于,所述通信方法还包括:
    接收来自所述网络设备的第三配置信息,所述第三配置信息用于指示多个聚合级别对应的DCI的计时周期,所述目标时隙为所述计时周期内的时隙,所述多个聚合级别包括第一聚合级别和第二聚合级别,采用所述第一聚合级别的所述DCI和采用所述第二聚合级别的所述DCI的计时周期相同;
    其中,所述第一聚合级别和所述第二聚合级别不相同,采用所述第一聚合级别的所述DCI占用的时隙数量和采用所述第二聚合级别的所述DCI占用的时隙数量不同,或者,
    所述第一聚合级别和所述第二聚合级别相同,采用所述第一聚合级别的所述DCI的重复传输的次数与采用所述第二聚合级别的所述DCI的重复传输次数不同。
  6. 根据权利要求5所述的通信方法,其特征在于,所述第三配置信息还用于指示所述计时周期的起始位置。
  7. 根据权利要求5或6所述的通信方法,其特征在于,所述目标时隙为所述计时周期内的最后一个时隙,或者,
    所述目标时隙为所述计时周期内的第一个时隙。
  8. 根据权利要求3、5-7中任一项所述的通信方法,其特征在于,
    所述第一聚合级别为8,所述第二聚合级别为16,采用所述第一聚合级别的所述DCI占用的时隙数量为2,采用所述第二聚合级别的所述DCI占用的时隙数量为4;或者,
    所述第一聚合级别为16,所述第二聚合级别为8,采用所述第一聚合级别的所述DCI占用的时隙数量为4,采用所述第二聚合级别的所述DCI占用的时隙数量为2;或者,
    所述第一聚合级别和所述第二聚合级别均为4,分别采用所述第一聚合级别和所述第二聚合级别的所述DCI占用的时隙数量均为1,且采用所述第二聚合级别的所述DCI在4个时隙上重复传输。
  9. 根据权利要求1或2所述的通信方法,其特征在于,所述DCI用于指示所述DCI采用的聚合级别。
  10. 根据权利要求9所述的通信方法,其特征在于,所述通信方法还包括:
    当盲检到的DCI的聚合级别不等于所述DCI指示的聚合级别时,确定所述目标时隙为所述DCI发送周期内的时隙。
  11. 根据权利要求1或2所述的通信方法,其特征在于,所述DCI用于指示所述DCI重复传输的次数。
  12. 根据权利要求11所述的通信方法,其特征在于,所述通信方法还包括:
    当盲检到用于传输同一个所述DCI的所述多个时隙的数量不等于所述DCI指示的重复传输的次数时,确定所述目标时隙为所述DCI发送周期内的时隙。
  13. 根据权利要求10或12所述的通信方法,其特征在于,所述目标时隙为所述DCI发送周期内的最后一个时隙或第一个时隙。
  14. 根据权利要求1或2所述的通信方法,其特征在于,所述盲检DCI包括:
    获取第二序列,所述第二序列为解调后的所述DCI的序列;
    对所述第二序列进行反交织处理,得到第一序列;
    对所述第一序列进行解码,得到所述DCI携带的信息。
  15. 一种通信方法,其特征在于,所述通信方法应用于网络设备,所述通信方法包括:
    向终端设备发送第一配置信息,所述第一配置信息用于所述终端设备确定目标时隙,所述目标时隙为承载下行控制信息DCI的多个时隙中的一个时隙,所述多个时隙用于传输一个所述DCI或所述多个时隙中的每个时隙用于传输同一个所述DCI。
  16. 根据权利要求15所述的通信方法,其特征在于,所述通信方法还包括:
    向所述终端设备发送第二配置信息,所述第二配置信息用于指示多个聚合级别的盲检次数,所述多个聚合级别包括第一聚合级别和第二聚合级别,所述第一聚合级别的盲检次数为0,所述第二聚合级别的盲检次数不为0,
    其中,所述第一聚合级别和所述第二聚合级别不相同,采用所述第一聚合级别的所述DCI占用的时隙数量和采用所述第二聚合级别的所述DCI占用的时隙数量不同,或者,
    所述第一聚合级别和所述第二聚合级别相同,采用所述第一聚合级别的所述DCI的重复传输的次数与采用所述第二聚合级别的所述DCI的重复传输次数不同。
  17. 根据权利要求15或16所述的通信方法,其特征在于,所述目标时隙为承载所述DCI的最后一个时隙,或者,
    所述目标时隙为承载所述DCI的第一个时隙。
  18. 根据权利要求15所述的通信方法,其特征在于,所述通信方法还包括:
    向所述终端设备发送第三配置信息,所述第三配置信息用于指示多个聚合级别对应的DCI的计时周期,所述目标时隙为所述计时周期内的时隙,所述多个聚合级别包括第一聚合级别和第二聚合级别,采用所述第一聚合级别的所述DCI和采用所述第二聚合级别的所述DCI的计时周期相同;
    其中,所述第一聚合级别和所述第二聚合级别不相同,采用所述第一聚合级别的所述DCI占用的时隙数量和采用所述第二聚合级别的所述DCI占用的时隙数量不同,或者,
    所述第一聚合级别和所述第二聚合级别相同,采用所述第一聚合级别的所述DCI的重复传输的次数与采用所述第二聚合级别的所述DCI的重复传输次数不同。
  19. 根据权利要求18所述的通信方法,其特征在于,所述第三配置信息还用于指示所述计时周期的起始位置。
  20. 根据权利要求18或19所述的通信方法,其特征在于,所述目标时隙为所述计时周期内的最后一个时隙,或者,
    所述目标时隙为所述计时周期内的第一个时隙。
  21. 根据权利要求16、18至20中任一项所述的通信方法,其特征在于,
    所述第一聚合级别为8,所述第二聚合级别为16,采用所述第一聚合级别的所述DCI占用的时隙数量为2,采用所述第二聚合级别的所述DCI占用的时隙数量为4;或者,
    所述第一聚合级别为16,所述第二聚合级别为8,采用所述第一聚合级别的所述DCI占用的时隙数量为4,采用所述第二聚合级别的所述DCI占用的时隙数量为2;或者,
    所述第一聚合级别和所述第二聚合级别均为4,分别采用所述第一聚合级别和所述第二聚合级别的所述DCI占用的时隙数量均为1,且采用所述第二聚合级别的所述DCI在4个时隙上重复传输。
  22. 根据权利要求15所述的通信方法,其特征在于,所述通信方法还包括:
    向所述终端设备发送所述DCI,所述DCI用于指示所述DCI采用的聚合级别或所述DCI重复传输的次数。
  23. 根据权利要求22所述的通信方法,其特征在于,所述目标时隙为所述DCI发送周期内的最后一个时隙或第一个时隙。
  24. 根据权利要求15或16所述的通信方法,其特征在于,所述通信方法还包括:
    获取第一序列,所述第一序列为编码和码率匹配后的所述DCI的序列;
    对所述第一序列进行交织处理,得到第二序列;
    按照所述第二序列中的元素的排列顺序,将所述第二序列中的每个元素分别映射至相应的CCE上,并发送所述DCI。
  25. 根据权利要求24所述的通信方法,其特征在于,所述对所述第一序列进行交织处理,得到第二序列,包括:
    采用按行或按列的转换方式,将所述第一序列转换为三角矩阵,所述第一序列的长度为E,所述三角矩阵的列数或行数分别为T1,所述T1为满足的最小整数;
    将所述三角矩阵中的元素依次按列或行排列后得到的序列确定为所述第二序列。
  26. 根据权利要求24所述的通信方法,其特征在于,所述对所述第一序列进行交织处理,得到第二序列,包括:
    按照所述第一序列中元素的排列顺序,将所述第一序列划分为H1个子序列,所述H1 个子序列中的每个子序列的长度均为一个CCE传输的比特数;
    将所述H1个子序列进行交织,得到所述第二序列。
  27. 根据权利要求26所述的通信方法,其特征在于,所述将所述H1个子序列交织,得到所述第二序列包括:
    将所述H1个子序列中的第i个子序列,映射至第j个PDCCH检测时机中的第k个CCE,所述j=mod(v,N),所述所述v为所述第i个子序列在所述H1个子序列中的编号,所述N为所述DCI占用的时隙数;
    按照PDCCH检测时机的排列顺序以及PDCCH检测时机中每个CCE的排列顺序,将映射至每个CCE的子序列进行排列,得到所述第二序列。
  28. 根据权利要求25或27所述的通信方法,其特征在于,
    所述DCI采用的聚合级别为8,且所述DCI在2个时隙上传输;或者,
    所述DCI采用的聚合级别为16,且所述DCI在4个时隙上传输;或者,
    所述DCI采用的聚合级别为4,且所述DCI在4个时隙上重复传输。
  29. 根据权利要求26所述的通信方法,其特征在于,所述对所述第一序列进行交织处理,得到第二序列,包括:
    将所述H1个子序列中的第i个子序列,映射至第k个CCE,所述k=mod(i+m,M),所述m和M为正整数;
    按照PDCCH检测时机中每个CCE的排列顺序,将映射至每个CCE的子序列进行排列,得到所述第二序列。
  30. 根据权利要求29所述的通信方法,其特征在于,
    所述DCI采用的聚合级别为4,且所述DCI在1个时隙上传输;或者,
    所述DCI采用的聚合级别为4,且所述DCI在4个时隙上重复传输。
  31. 一种通信系统,其特征在于,所述通信系统包括终端设备和网络设备,所述终端设备用于执行权利要求1至14中任一项所述的通信方法,和/或,所述网络设备用于执行权利要求15至30中任一项所述的通信方法。
  32. 一种通信装置,其特征在于,包括:
    一个或多个处理器;
    一个或多个存储器;
    以及一个或多个计算机程序,其中所述一个或多个计算机程序被存储在所述一个或多个存储器中,所述一个或多个计算机程序包括指令,当所述指令被所述一个或多个处理器执行时,使得所述通信装置执行如权利要求1至30中任一项所述的通信方法。
  33. 一种计算机可读存储介质,其特征在于,包括计算机指令,当所述计算机指令在通信装置上运行时,使得所述通信装置执行如权利要求1至30中任一项所述的通信方法。
  34. 一种芯片,其特征在于,包括至少一个处理器和接口电路,所述接口电路用于为所述至少一个处理器提供程序指令或者数据,所述至少一个处理器用于执行所述程序指令,以实现如权利要求1至30中任一项所述的通信方法。
  35. 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机指令;当部分或全部所述计算机指令在计算机上运行时,使得如权利要求1至30中任一项所述的通信方法被执行。
PCT/CN2023/098789 2022-06-13 2023-06-07 通信方法及通信装置 WO2023241426A1 (zh)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202210665435.2 2022-06-13
CN202210665435 2022-06-13
CN202210926852.8 2022-08-03
CN202210926852.8A CN117278180A (zh) 2022-06-13 2022-08-03 通信方法及通信装置

Publications (1)

Publication Number Publication Date
WO2023241426A1 true WO2023241426A1 (zh) 2023-12-21

Family

ID=89192119

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/098789 WO2023241426A1 (zh) 2022-06-13 2023-06-07 通信方法及通信装置

Country Status (1)

Country Link
WO (1) WO2023241426A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110536451A (zh) * 2019-09-03 2019-12-03 中兴通讯股份有限公司 信息增强方法、装置、设备和存储介质
CN112368972A (zh) * 2018-07-12 2021-02-12 高通股份有限公司 利用pdcch重复的pdsch调度的时隙的确定规则
US20210360667A1 (en) * 2020-05-13 2021-11-18 Electronics And Telecommunications Research Institute Method and apparatus for transmitting and receiving downlink control channel in communication system
CN113709870A (zh) * 2020-05-22 2021-11-26 大唐移动通信设备有限公司 一种确定信息传输位置的方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112368972A (zh) * 2018-07-12 2021-02-12 高通股份有限公司 利用pdcch重复的pdsch调度的时隙的确定规则
CN110536451A (zh) * 2019-09-03 2019-12-03 中兴通讯股份有限公司 信息增强方法、装置、设备和存储介质
US20210360667A1 (en) * 2020-05-13 2021-11-18 Electronics And Telecommunications Research Institute Method and apparatus for transmitting and receiving downlink control channel in communication system
CN113709870A (zh) * 2020-05-22 2021-11-26 大唐移动通信设备有限公司 一种确定信息传输位置的方法及装置

Similar Documents

Publication Publication Date Title
JP7449974B2 (ja) ダウンリンク制御情報伝送方法
CN111431685B (zh) 传输下行信道的方法和装置
US20240080853A1 (en) Techniques for improved control channels
US11700097B2 (en) Transport block segmentation and signaling
KR102216224B1 (ko) 데이터 공유 채널의 전송 파라미터의 결정 방법, 장치 및 시스템
TWI554137B (zh) 控制通道配置方法與控制通道搜尋方法及其通信裝置
WO2020143428A1 (zh) 传输上行信息的方法和通信装置
KR102542993B1 (ko) 무선 셀룰라 통신 시스템에서 제어 정보 송수신 방법 및 장치
US11930506B2 (en) Method and apparatus for transmitting and receiving data in wireless communication system
EP3952157A1 (en) Resource scheduling method and apparatus, and computer-readable storage medium
KR20200015285A (ko) 무선 통신 시스템에서 데이터를 송수신하기 위한 방법 및 장치
KR20210092593A (ko) 무선 통신 시스템에서 하향링크 제어 정보를 송수신하는 방법 및 장치
US20230370195A1 (en) Method and apparatus for transmission or reception of data in communication system
CN112636886B (zh) 无线通信的方法、芯片和通信装置
JP2020530744A (ja) 情報送信方法及びデバイス
CN111164942B (zh) 比特到符号的映射方法和通信装置
WO2019192411A1 (en) Control and data transmission
WO2023241426A1 (zh) 通信方法及通信装置
US20220210811A1 (en) Method and apparatus for decoding downlink control signal in wireless cellular communication system
WO2020156002A1 (zh) 通信方法及通信装置
CN112398573A (zh) 一种加扰、解扰方法、网络设备以及终端设备
CN117278180A (zh) 通信方法及通信装置
WO2022206579A1 (zh) 一种上行控制信息传输方法和装置
WO2022206893A1 (zh) 一种通信方法及通信装置
WO2022028588A1 (en) Coverage recovery in reduced capability wireless devices

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23822995

Country of ref document: EP

Kind code of ref document: A1