WO2023246562A1 - 非授权频段的旁链路传输处理方法、装置及相关设备 - Google Patents

非授权频段的旁链路传输处理方法、装置及相关设备 Download PDF

Info

Publication number
WO2023246562A1
WO2023246562A1 PCT/CN2023/099896 CN2023099896W WO2023246562A1 WO 2023246562 A1 WO2023246562 A1 WO 2023246562A1 CN 2023099896 W CN2023099896 W CN 2023099896W WO 2023246562 A1 WO2023246562 A1 WO 2023246562A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
information
identification
identifier
preset
Prior art date
Application number
PCT/CN2023/099896
Other languages
English (en)
French (fr)
Inventor
刘思綦
纪子超
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2023246562A1 publication Critical patent/WO2023246562A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0453Resources in frequency domain, e.g. a carrier in FDMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/25Control channels or signalling for resource management between terminals via a wireless link, e.g. sidelink
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/40Resource management for direct mode communication, e.g. D2D or sidelink

Definitions

  • This application belongs to the field of communication technology, and specifically relates to a side-link transmission processing method, device and related equipment in an unlicensed frequency band.
  • SL sidelink
  • ITS Intelligent Transportation System
  • WIFI wireless fidelity
  • network-side equipment usually schedules terminals to monitor the channel. Since the network-side equipment does not receive the SL channel/signal sent by the terminal, it cannot know whether the terminal has actually accessed successfully, resulting in incorrect judgment of the terminal's status by the terminal, resulting in unscheduled operations. Proper Scheduling. Therefore, there is a problem in the existing technology that the reliability of SL transmission in unlicensed frequency bands is poor.
  • Embodiments of the present application provide a side-link transmission processing method, device and related equipment in an unlicensed frequency band, which can solve the problem of poor reliability of SL transmission in the unlicensed frequency band.
  • the first aspect provides a method for processing side-link transmission in unlicensed frequency bands, including:
  • the first terminal obtains first information, the first information includes at least one of first preset information and second preset information; the first preset information and/or the second preset information includes monitoring At least one of the information and the information of the preset resource;
  • the first terminal determines whether a first behavior can be performed or whether a first behavior needs to be performed.
  • the first behavior includes monitoring a first resource object according to the first information and using the first resource according to the first information. at least one of the objects;
  • the first terminal determines that the first behavior can be performed or needs to be performed, and the first preset condition includes at least one of the following: the first terminal belongs to M terminals, the M terminals include at least some of the terminals associated with the first preset information, the first terminal does not belong to the N terminals, the N terminals include those associated with the second preset information Assume that for at least some terminals among the terminals associated with the information, M and N are both positive integers.
  • a method for processing side-link transmission in unlicensed frequency bands including:
  • the fourth terminal When the fourth terminal acquires the target information, the fourth terminal performs a fourth behavior
  • the target information includes at least one of the following: the second terminal determines that the first resource object is idle or available; the second terminal successfully accesses or obtains the first resource object; the second terminal uses the first resource object;
  • the fourth behavior includes at least one of the following: determining that the first resource object is occupied by the second terminal; determining that the first resource object is occupied by a side link system; determining that the first resource object is occupied by a fifth At least part of the terminals corresponding to the identification are occupied, and at least part of the terminals corresponding to the fifth identification include the second terminal; in the case that the fourth terminal belongs to at least part of the terminals corresponding to the fifth identification, determine the second information ;
  • the second information includes at least one of the following: a second resource object that at least partially overlaps with the first resource object; the second resource object can be monitored; the second resource object needs to be monitored; using Second resource object.
  • a method for processing side-link transmission in unlicensed frequency bands including:
  • the network side device sends first information to the first terminal, where the first information includes at least one of first preset information and second preset information; the first preset information and/or the second preset information It is assumed that the information includes at least one of monitoring information and preset resource information.
  • a device for processing side-link transmission in an unlicensed frequency band which is applied to the first terminal and includes:
  • Acquisition module configured to acquire first information, the first information including at least one of first preset information and second preset information; the first preset information and/or the second preset information Includes at least one of monitoring information and preset resource information;
  • the first determination module is used to determine whether the first behavior can be performed or whether the first behavior needs to be performed.
  • the first behavior includes monitoring the first resource object according to the first information and using the first resource object according to the first information. At least one item in a resource object;
  • the first terminal determines that the first behavior can be performed or needs to be performed, and the first preset condition includes at least one of the following: the first terminal belongs to M terminals, the M terminals include at least some of the terminals associated with the first preset information, the first terminal does not belong to the N terminals, the N terminals include those associated with the second preset information Assume that for at least some terminals among the terminals associated with the information, M and N are both positive integers.
  • a side link transmission processing device in an unlicensed frequency band is provided, which is applied to the fourth terminal and includes:
  • a second execution module configured to execute the fourth behavior when the fourth terminal obtains the target information
  • the target information includes at least one of the following: the second terminal determines that the first resource object is idle or available; The second terminal successfully accesses or obtains the first resource object; the second terminal uses the first resource object;
  • the fourth behavior includes at least one of the following: determining that the first resource object is occupied by the second terminal; determining that the first resource object is occupied by a side link system; determining that the first resource object is occupied by a fifth At least part of the terminals corresponding to the identification are occupied, and at least part of the terminals corresponding to the fifth identification include the second terminal; in the case that the fourth terminal belongs to at least part of the terminals corresponding to the fifth identification, determine the second information ;
  • the second information includes at least one of the following: a second resource object; a second resource object that can be monitored, and the second resource object at least partially overlaps with the first resource object; a second resource object needs to be monitored; using a second resource object Resource object.
  • a side-link transmission processing device in an unlicensed frequency band is provided, which is applied to network-side equipment, including:
  • the second sending module is used to send first information to the first terminal, where the first information includes at least one of first preset information and second preset information; the first preset information and/or The second preset information includes at least one of monitoring information and preset resource information.
  • a terminal in a seventh aspect, includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the program or instructions When the program or instructions are executed by the processor, the following implementations are implemented: The steps of the method described in one aspect, or the steps of implementing the method described in the second aspect.
  • a terminal including a processor and a communication interface.
  • the communication interface is used to obtain first information, and the first information includes first preset information and a third At least one of two preset information; the first preset information and/or the second preset information includes at least one of monitoring information and preset resource information; the processor is used to determine whether the second preset information can be executed.
  • the first terminal determines that the first behavior can be performed or needs to be performed, and the first preset condition includes at least one of the following: the first terminal belongs to M terminals, the M terminals include at least some of the terminals associated with the first preset information, the first terminal does not belong to the N terminals, the N terminals include those associated with the second preset information Assume that for at least some of the terminals associated with the information, M and N are both positive integers;
  • the processor is configured to perform a fourth behavior
  • the target information includes at least one of the following: the second terminal determines that the first resource object is idle or available; the second terminal successfully accesses or obtains the first resource object; the second terminal uses the first resource object;
  • the fourth behavior includes at least one of the following: determining that the first resource object is occupied by the second terminal; determining that the first resource object is occupied by a side link system; determining that the first resource object is occupied by a fifth At least part of the terminals corresponding to the identification are occupied, and at least part of the terminals corresponding to the fifth identification include the second terminal; in the case that the fourth terminal belongs to at least part of the terminals corresponding to the fifth identification, determine the second information ;
  • the second information includes at least one of the following: a second resource object that at least partially overlaps with the first resource object; the second resource object can be monitored; the second resource object needs to be monitored; and the second resource object is used to monitor the second resource object.
  • Resource object a second resource object that at least partially overlaps with the first resource object; the second resource object can be monitored; the second resource object needs to be monitored; and the second resource object is used to monitor the second resource object.
  • a network side device in a ninth aspect, includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the program or instructions are executed by the processor.
  • a network side device including a processor and a communication interface, wherein the communication interface is used to send first information to a first terminal, where the first information includes first preset information and a third At least one of two preset information; the first preset information and/or the second preset information includes at least one of monitoring information and preset resource information.
  • a communication system including: a terminal and a network side device.
  • the terminal can be used to perform the steps of the side link transmission processing method in the unlicensed frequency band as described in the first aspect or the second aspect
  • the network side device may be configured to perform the steps of the side link transmission processing method in the unlicensed frequency band as described in the third aspect.
  • a readable storage medium In a twelfth aspect, a readable storage medium is provided. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method are implemented. The steps of the method as described in the second aspect.
  • a chip in a thirteenth aspect, includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the method described in the first aspect. The steps of the method, or the steps of implementing the method as described in the second aspect, or the steps of implementing the method as described in the third aspect.
  • a computer program/program product is provided, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement as described in the first aspect
  • the embodiment of the present application obtains the first information through the first terminal and determines whether the first behavior can be performed or whether the first behavior needs to be performed.
  • the first behavior includes monitoring the first resource object according to the first information and monitoring the first resource object according to the first information.
  • the first information uses at least one of the first resource objects.
  • Figure 1 is a schematic diagram of the network structure applicable to the embodiment of the present application.
  • Figure 2 is a flow chart of a side-link transmission processing method in an unlicensed frequency band provided by an embodiment of the present application
  • Figure 3 is an example diagram of a communication scenario in which a side-link transmission processing method in an unlicensed frequency band is applied according to an embodiment of the present application;
  • Figure 4 is an example diagram of another communication scenario in which a side-link transmission processing method in an unlicensed frequency band is applied according to the embodiment of the present application;
  • Figure 5 is a second flowchart of another side-link transmission processing method in an unlicensed frequency band provided by an embodiment of the present application.
  • Figure 6 is a flow chart of yet another side-link transmission processing method in an unlicensed frequency band provided by an embodiment of the present application.
  • Figure 7 is a structural diagram of a side-link transmission processing device in an unlicensed frequency band provided by an embodiment of the present application.
  • Figure 8 is a structural diagram of another side-link transmission processing device in an unlicensed frequency band provided by an embodiment of the present application.
  • Figure 9 is a structural diagram of another side-link transmission processing device in an unlicensed frequency band provided by an embodiment of the present application.
  • Figure 10 is a structural diagram of a communication device provided by an embodiment of the present application.
  • Figure 11 is a structural diagram of a terminal provided by an embodiment of the present application.
  • Figure 12 is a structural diagram of a network side device provided by an embodiment of the present application.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and that "first" and “second” are distinguished objects It is usually one type, and the number of objects is not limited.
  • the first object can be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the related objects are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced, LTE-A Long Term Evolution
  • LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • NR New Radio
  • FIG. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable.
  • the wireless communication system includes a terminal 11 and a network side device 12.
  • the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer), or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a palmtop computer, a netbook, or a super mobile personal computer.
  • Tablet Personal Computer Tablet Personal Computer
  • laptop computer laptop computer
  • PDA Personal Digital Assistant
  • PDA Personal Digital Assistant
  • UMPC ultra-mobile personal computer
  • UMPC mobile Internet device
  • MID mobile Internet Device
  • AR augmented reality
  • VR virtual reality
  • robots wearable devices
  • WUE Vehicle User Equipment
  • PUE Pedestrian User Equipment
  • smart home home equipment with wireless communication functions, such as refrigerators, TVs, washing machines or furniture, etc.
  • game consoles personal computers (personal computer, PC), teller machine or self-service machine and other terminal-side devices.
  • Wearable devices include: smart watches, smart bracelets, smart headphones, smart glasses, smart jewelry (smart bracelets, smart bracelets, smart rings, smart necklaces, smart anklets) bracelets, smart anklets, etc.), smart wristbands, smart clothing, etc.
  • the network side device 12 may include an access network device or a core network device, where the access network device may also be called a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or a wireless access network unit.
  • Access network equipment may include a base station, a Wireless Local Area Network (WLAN) access point or a WiFi node, etc.
  • WLAN Wireless Local Area Network
  • the base station may be called a Node B, an Evolved Node B (eNB), an access point, a base transceiver station ( Base Transceiver Station (BTS), radio base station, radio transceiver, Basic Service Set (BSS), Extended Service Set (ESS), home B-node, home evolved B-node, transmitting and receiving point ( Transmitting Receiving Point (TRP) or some other appropriate terminology in the field, as long as the same technical effect is achieved, the base station is not limited to specific technical terms. It should be noted that in the embodiment of this application, only in the NR system The base station is introduced as an example, and the specific type of base station is not limited.
  • unlicensed frequency bands can operate in the 5GHz, 37GHz and 60GHz frequency bands. Since the unlicensed frequency band is shared by a variety of wireless access technologies (Radio Access Technology, RAT), such as WiFi and radar, Long Term Evolution License Assisted Access (LTE-LAA), etc., in a certain In some countries or regions, the use of unlicensed frequency bands must comply with regulations to ensure that all devices can use the resource fairly, such as listen before talk (LBT), Maximum Channel Occupancy Time , MCOT) and other rules.
  • RAT Radio Access Technology
  • LTE-LAA Long Term Evolution License Assisted Access
  • the transmission node When the transmission node needs to send information, it needs to perform LBT first and perform power detection (ED) on the surrounding nodes. When the detected power is lower than a threshold, the channel is considered idle and the transmission node can to send. Otherwise, the channel is considered busy and the transmitting node cannot send.
  • Transmission nodes can be base stations, terminals, and WiFi access points (Access Point, AP), etc. After the transmission node starts transmitting, the occupied channel time (Channel Occupancy Time, COT) cannot exceed MCOT.
  • LBT LBT
  • Category1LBT means that the sending node does not perform LBT, that is, there is no LBT or immediate transmission.
  • Category2LBT is a time slot (one-shot) LBT, that is, the node performs an LBT before transmission. If the channel is empty, it will transmit, and if the channel is busy, it will not transmit.
  • Category 4LBT is a channel listening mechanism based on back-off. When the transmission node detects that the channel is busy, it backs off and continues listening until it detects that the channel is empty.
  • the LBT of category 2 is applied to the physical downlink shared channel (Physical Downlink Shared Channel, PDSCH) without a demodulation reference signal (Dedicated Reference Signal, DRS), and the LBT of category 4 is applied to the PDSCH , physical downlink control channel (Physical Downlink Control Channel, PDCCH) and enhanced physical downlink control channel (Enhanced Physical Downlink Control Channel, ePDCCH).
  • the LBT of category 4 corresponds to the type 1 uplink channel access procedure (type 1 UL channel access procedure)
  • the LBT of category 2 corresponds to the type 2 uplink channel access procedure (type 2 UL channel access procedure).
  • LBT includes two types: frame-based equipment (Frame-Based Equipment, FBE) and load-based equipment (Load Based Equipment, LBE).
  • FBE Frame-Based Equipment
  • LBE Load Based Equipment
  • FBE means that the device's transmission/reception timing adopts a periodic structure, and its period is a fixed frame period (Fixed Frame Period, FFP).
  • the FBE node uses the LBT-based channel access mechanism to occupy the channel.
  • the node that initiates a transmission sequence containing one or more consecutive transmissions is called the initiating node (Initiating Device), and the other nodes are called the responding nodes (Responding Device).
  • FBE nodes can be initiating nodes, responding nodes, or support both node functions at the same time.
  • the transmitting node can start LBT at any time until it detects that the channel is empty before transmitting.
  • For transmission nodes there is no fixed listening time, and there is no need to skip when the channel is detected as busy.
  • eCCA enhanced idle channel assessments
  • backoff Continue listening until the eCCA counter reaches zero.
  • LBE in the unlicensed frequency band can be used for channel access and information transmission.
  • NR Vehicle-to-Everything supports two resource allocation modes, namely scheduled resource allocation (Scheduled resource allocation) mode and autonomous resource selection (autonomous resource selection) mode.
  • the former is usually called mode 1 (mode-1), the latter is often called mode 2 (mode-2).
  • mode-1 the latter is often called mode 2 (mode-2).
  • mode-2 mode-2
  • the former is controlled by the network side device and allocates resources to each UE, while the latter allows the UE to select resources independently.
  • the base station can schedule or activate NR SL resources for users through Downlink Control Information (DCI).
  • DCI Downlink Control Information
  • the format of the SL DCI is DCI format 3-0.
  • the base station can use another A DCI format 3-1 activates LTE SL resources for users.
  • Mode-2 can be further divided into multiple sub-modes (sub modes):
  • Mode2d Scheduling UE or header UE can schedule SL transmission of other terminals
  • Terminal A can send auxiliary information to terminal B to assist its SL transmission;
  • Mode2c The terminal obtains static or semi-static pairs of SL resources for transmission.
  • the HARQ feedback mechanism is also introduced in the sidelink technology: the sidelink receiving user receives the Physical SideLink Control Channel (PSCCH) and/or the physical sidelink
  • the Sidelink Hybrid Automatic Repeat request response (Sidelink Hybrid Automatic Repeat) is fed back on the Physical SideLink Shared Channel (PSSCH) on the PSCCH and/or the Physical SideLink Feedback Channel (PSFCH) corresponding to the PSSCH.
  • Request acknowledgment, sidelink HARQ-ACK) information to indicate whether the sidelink data is successful or failed.
  • Sidelink After receiving the sidelink HARQ-ACK information on the sidelink the sending user can know whether the previous transmission was successful or failed.
  • a sidelink user may be a sending or receiving user, that is, the same user can receive or send respectively at different times or frequency domains.
  • the transmission of Sidelink data packets may be carried out on the sidelink between the user and the user, so the control node may not directly know whether the transmission of the sidelink data packet is successful.
  • the user needs to send Sidelink HARQ ACK information (such as side link positive confirmation ( sidelink ACK) or negative acknowledgment (sidelink NACK) is sent to the control node, so that the control node can further determine whether the transmission on the sidelink is successful.
  • Sidelink HARQ ACK information such as side link positive confirmation ( sidelink ACK) or negative acknowledgment (sidelink NACK
  • the user uses the uplink resource Physical Uplink Control Channel (PUCCH) ) or the Physical uplink shared channel (PUSCH) reports SL HARQ information to the control node.
  • PUCCH Physical Uplink Control Channel
  • PUSCH Physical uplink shared channel
  • SL HARQ information reporting supports reporting in the form of codebooks.
  • One of the uplink resources used for SL HARQ information reporting may be associated with one or more PSFCH resources.
  • the priority of PSFCH is related to the priority of other corresponding SL transmissions. But for some special cases, the receiving end does not perform HARQ feedback or the transmitting end does not detect PSFCH, and there is still SL HARQ information.
  • this embodiment of the present application provides a side-link transmission processing method in an unlicensed frequency band.
  • the side-link transmission processing method in an unlicensed frequency band includes:
  • Step 201 The first terminal acquires first information, which includes at least one of first preset information and second preset information; the first preset information and/or the second preset information The information includes at least one of monitoring information and preset resource information;
  • Step 202 The first terminal determines whether a first behavior can be performed or whether a first behavior needs to be performed.
  • the first behavior includes monitoring the first resource object according to the first information and using the first resource object according to the first information. at least one of the first resource objects;
  • the first terminal determines that the first behavior can be performed or needs to be performed, and the first preset condition includes at least one of the following: the first terminal belongs to M terminals, the M terminals include at least some of the terminals associated with the first preset information, the first terminal does not belong to the N terminals, the N terminals include those associated with the second preset information Assume that for at least some terminals among the terminals associated with the information, M and N are both positive integers.
  • the above-mentioned first resource object can be understood as a resource, a channel where the resource is located, or a carrier where the resource is located.
  • the above-mentioned monitoring of the first resource object and/or the second resource object can also be interpreted as trying the corresponding channel, or performing channel access (channel access).
  • the first terminal determines that it is impossible or unnecessary to monitor the first resource object based on the first information and/or it is impossible or unnecessary to use the first resource object based on the first information.
  • Resource object. wherein, the first terminal cannot or does not need to monitor the first resource object according to the first information can be understood as: the first terminal cannot or does not need to monitor the first resource object according to the first information. There is no need to monitor the first resource object, or the first terminal cannot or does not need to monitor the first resource object according to the monitoring method corresponding to the first information, but can monitor the first resource object according to other methods.
  • monitoring the first resource object can be understood as trying to monitor the first resource object, or monitoring whether the first resource object is idle or busy.
  • the terminal determines whether it is necessary or possible to perform the first behavior based on the first information, so that at least some terminals or any terminal that obtains the first information can or needs to perform the first behavior. In this way, since the terminal can independently decide whether to monitor the first resource object according to the first information and/or use the first resource object according to the first information, the terminal's independent selection behavior is increased, thereby avoiding network-side equipment Error scheduling occurs, which improves the reliability of SL transmission by terminals on unlicensed frequency bands.
  • the first preset condition when the first information includes first preset information, the first preset condition may include that the first terminal belongs to M terminals; when the first information includes the second preset information, In the case where information is provided, the first preset condition may include that the first terminal does not belong to N terminals.
  • the embodiment of the present application obtains the first information through the first terminal and determines whether the first behavior can be performed or whether the first behavior needs to be performed.
  • the first behavior includes monitoring the first resource object according to the first information and monitoring the first resource object according to the first information.
  • the first information uses at least one of the first resource objects.
  • the first preset information is associated with at least one first identification
  • the second preset information is associated with at least one second identification
  • the method further includes at least one of the following:
  • the first terminal determines that the first terminal does not satisfy the first preset condition:
  • the first terminal determines that the first terminal satisfies the first preset condition:
  • the first corresponding relationship includes at least one of the following:
  • the first terminal does not correspond to any of the at least one first identifier
  • the first terminal does not correspond to the preset first identifier in the at least one first identifier
  • the first terminal corresponds to the second identifier
  • the second corresponding relationship includes at least one of the following:
  • the first terminal does not correspond to any second identifier among the at least one second identifier
  • the first terminal does not correspond to the preset second identifier in the at least one second identifier
  • the first terminal corresponds to the first identifier.
  • subgroup identifier can also be understood as a subset identifier (subset id).
  • the first terminal if the first terminal obtains the first information, the first terminal does not correspond to any first identifier associated with the first preset information, or does not correspond to the preset first identifier. Corresponding, or corresponding to the second identifier, the first party may not monitor whether the channel is idle/busy, or may not monitor whether the channel is idle/busy based on the first information.
  • the first terminal can/needs to monitor whether the channel is idle/busy, or can monitor whether the channel is idle/busy based on preset information.
  • the first identification includes at least one of the following: source identification (source id), destination identification (destination id), identification corresponding to the terminal group (UE group), and members of the group.
  • Identity identification corresponding to terminal pairing (UE pair), identification corresponding to service, identification corresponding to subscription parameter set (profile), quality of service flow (Quality of Service, Qos) identification, resource pool identification, carrier identification, bandwidth part (Bandwidth) Part, BWP) identification, the subgroup identification (sub group id) to which the terminal belongs, the resource block (Resource Block, RB) set identification, the channel (channel) identification, the sub-channel (sub channel) identification, the first preset information The index, the number of the first preset information and the Radio Network Temporary Identifier (RNTI);
  • RNTI Radio Network Temporary Identifier
  • the second identification includes at least one of the following: source identification, destination identification, identification corresponding to the terminal group, member identification within the group, identification corresponding to terminal pairing, identification corresponding to the service, and identification corresponding to the subscription parameter set.
  • Identity quality of service flow identification, resource pool identification, carrier identification, bandwidth part identification, subgroup identification to which the terminal belongs, resource block set identification, channel identification, sub-channel identification, the index of the second preset information, the third 2. The number of the preset information and the temporary identification of the wireless network.
  • the UE corresponding to a certain destination can monitor the first resource object according to the first preset information.
  • the first identification is an index of the first preset information
  • the first terminal is configured to be associated with the first preset information numbered i, so that the first terminal is configured according to the first preset information numbered i.
  • first identifier and the second identifier are RNTIs
  • they may specifically be terminal-specific RNTIs or public RNTIs.
  • the UE corresponding to a certain destination can determine that it does not need to monitor the first resource object according to the second preset information.
  • the second identification is the index of the second preset information
  • the information determines that it does not need to monitor the first resource object.
  • the first terminal is configured to be associated with the second preset information numbered j, so that the first terminal is configured according to the second preset information numbered j. Assume that the information determines that it does not need to monitor the first resource object.
  • first identification and/or second identification may be configured by the network side device to the first terminal, or may be derived by the first terminal according to rules, or may be agreed upon by a protocol, or may be configured with the first terminal.
  • the first preset information satisfies at least one of the following:
  • the first preset information includes terminal identifiers corresponding to the M terminals;
  • the first preset information is associated with at least one first identification, and the M terminals are at least some of the terminals corresponding to the first identification.
  • the above-mentioned first listening mode may be type 1 LBT, or fallback-based LBT, or counter (counter)-based LBT.
  • being used to instruct the M terminals to use the first resource object can be understood as being used to instruct the M terminals to use the first resource object for transmission.
  • Instructing the M terminals to monitor the first resource object can be understood as instructing the M terminals to monitor the first resource object according to any monitoring method. At this time, some of the M terminals adopt the monitoring method. May be different or determined in other ways.
  • the first preset information includes the terminal identifiers corresponding to the M terminals, which can be understood as the first preset information directly indicating the M terminals that can or need to monitor the first resource object.
  • the first The preset information may also indicate terminals other than the M terminals.
  • the above-mentioned first preset information is associated with at least one first identifier, which can be understood as indirectly indicating through the first preset information M terminals that can or need to monitor the first resource object.
  • at least some terminals/any terminals that obtain the first information can be directly or indirectly instructed through the first preset information to monitor the channel.
  • the second preset information satisfies any of the following:
  • the second preset information includes terminal identifiers corresponding to the N terminals;
  • the second preset information is associated with at least one second identifier, and the N terminals are at least some of the terminals corresponding to the second identifier.
  • the terminal that receives the second preset information belongs to the terminal corresponding to the second preset information
  • the terminal may not monitor the first resource object.
  • not monitoring the first resource object can be understood as not using the first monitoring method to monitor the first resource object, or not performing any monitoring.
  • being used to instruct the N terminals not to use the first resource object can be understood as being used to instruct the N terminals not to use the first resource object for transmission.
  • Instructing the N terminals to monitor the first resource object may be understood as instructing the N terminals not to perform any monitoring on the first resource object.
  • the second preset information includes the terminal identifiers corresponding to the N terminals, which can be understood as the second preset information directly indicating that the N terminals cannot or do not need to monitor the first resource object.
  • the first preset information may also indicate terminals other than N terminals.
  • the above-mentioned second preset information and at least two first targets Identifying association can be understood as indirectly indicating N terminals that can or need to monitor the first resource object through the second preset information.
  • the second preset information can be used to directly or indirectly indicate that at least some terminals/any terminals that obtain the first information cannot/are not required to monitor the channel.
  • the first terminal obtaining the first information includes:
  • the first terminal receives the first information from a network side device
  • the first information is carried through at least one of the following: downlink control information DCI, radio resource control (Radio Resource Control, RRC) and media access control (Medium Access Control, MAC) signaling.
  • DCI downlink control information
  • RRC Radio Resource Control
  • MAC Medium Access Control
  • the above MAC signaling may be a MAC control element (Control Element, CE).
  • CE MAC control element
  • the DCI can be scrambled using a preset RNTI, which can be at least part of the first identifier.
  • the DCI is a public DCI, and the RNTI associated with a certain terminal group is used for scrambling. , then only terminals in the terminal group can decode the DCI.
  • the DCI may carry multiple first preset information and/or second preset information
  • the network side device configures the terminal and which preset information(s) (i.e., the first preset information and/or The second preset information) has a correlation relationship.
  • the DCI is a public DCI and a public RNTI is used for scrambling. After decoding the DCI, the terminal needs to further determine whether there is preset information corresponding to itself.
  • the method further includes:
  • the first terminal receives first indication information from the network side device, and the first indication information is used to indicate any of the following: activating the first information, deactivating the first information, or using the first information. information, not using said first information and stopping using said first information.
  • the network side device can configure one or more first information for at least one terminal, and further activate or deactivate the first information through the first instruction information, that is, through the first information, the terminal can be instructed according to the first information.
  • the network side device configures different resources (the first preset information indicates these resources) for terminals in a group through RRC (which carries the first indication information). And sending DCI activates these resources, that is, the terminal can start to monitor these resources/first resource objects or can directly use these resources or first resource objects.
  • the network side device can configure different resources (preset information indicates these resources) for UEs in a group through RRC, and send DCI (second indication information) to activate these resources.
  • resources that is, the UE can start not to monitor these resources/channels, or it can directly not use these resources/channels.
  • the M terminals satisfy at least one of the following:
  • the target identifier is the largest, the target identifier is the smallest, or the target identifier is the first preset among the terminals corresponding to the first identifier.
  • value terminal the target identifier is a terminal identification, terminal number or terminal index;
  • the third identification includes at least one of the following: source identification, destination identification, identification corresponding to the terminal group, member identification within the group, identification corresponding to terminal pairing, identification corresponding to the service, identification corresponding to the subscription parameter set, Quality of service flow identifier, resource pool identifier, carrier identifier, bandwidth part identifier, subgroup identifier to which the terminal belongs, resource block set identifier, channel identifier, sub-channel identifier, the index of the first preset information, the first preset information Set the number of the information and the temporary identification of the wireless network.
  • the above-mentioned preset processing may be a modulo processing.
  • the first identifier is a group identifier
  • the result of the group identifier moduloing the preset value Q is v
  • the terminals corresponding to v i.e., M Terminal
  • the above second indication information may also be understood or replaced in some embodiments as being used to indicate that the terminal can monitor or needs to monitor the resource object.
  • the network side device uses additional signaling (used to indicate that the first resource object or other resource objects can or needs to be monitored) to indicate that the UE needs to monitor, and the UE will monitor only after obtaining the first information; no additional signaling is used. The UE that has been instructed by the signaling may not listen even if it obtains the first information.
  • the first behavior satisfies any of the following:
  • the monitoring mode of the first resource object is the first monitoring mode monitoring
  • the monitoring mode of the first resource object is determined based on network side device instructions and/or based on the fourth identification corresponding to the first terminal;
  • the fourth identification includes at least one of the following: source identification, destination identification, identification corresponding to the terminal group, member identification within the group, identification corresponding to terminal pairing, identification corresponding to the service, identification corresponding to the subscription parameter set, Quality of service flow identifier, resource pool identifier, carrier identifier, bandwidth part identifier, subgroup identifier to which the terminal belongs, resource block set identifier, channel identifier, sub-channel identifier, the index of the first preset information, the first preset information Set the number of the information and the temporary identification of the wireless network.
  • the above-mentioned M terminals can monitor the first resource object using the first monitoring method; or the monitoring method adopted satisfies at least one of the following:
  • Network-side device configuration/instruction monitoring mode type information
  • both terminal 1 and terminal 2 correspond to the first identifier, so both terminal 1 and terminal 2 will monitor the channel.
  • the sub group identifier i.e., the fourth identifier
  • the sub group identifier corresponding to terminal 2 is 2
  • terminal 1 can determine its monitoring mode based on sub group identifier 1
  • terminal 2 can determine its monitoring mode based on sub group identifier 2.
  • the fourth identifier and the first identifier may correspond to the same or different items.
  • the first terminal when the M terminals include all terminals associated with the first preset information, the first terminal may It can be understood as any terminal associated with the first preset information; when the above N terminals include all terminals associated with the second preset information, the first terminal can be understood as any terminal other than the terminal associated with the second preset information. Any terminal.
  • terminals that belong to M terminals and/or do not belong to N terminals among the multiple terminals that obtain the first information can be called target terminals, and the target terminal can also be understood as obtaining at least part of the first information. Terminal or any terminal.
  • terminal A which may include one or more terminals finds that the first resource object is idle or available, or successfully obtains the first resource object
  • at least some of the other terminals or any terminal may have behavior 1 and/or behavior 2.
  • the other terminals may be terminals other than terminal A among the above target terminals, and may also be understood as terminals corresponding to the same identifier A as terminal A.
  • the range of the identifier A is the same as the range of the first identifier, and the identifier A and the first identifier An identity can have the same or different items.
  • behavior 1 and/or behavior 2 may be performed when at least some of the other terminals or any terminal receives the SL signal/channel sent by A.
  • Behavior 1 includes at least one of the following:
  • the first resource object is considered to be occupied by terminal A;
  • the first resource object is occupied by the SL system
  • the first resource object is occupied by at least part of the terminal corresponding to the identifier A.
  • Behavior 2 includes at least one of the following:
  • the second resource object at least partially overlaps the first resource object.
  • the second monitoring method is different from the first monitoring method.
  • the listening duration of the second listening mode is shorter than the listening duration of the first listening mode.
  • the second listening method may include listening methods such as type2, typ2a, type2b, type2d, and type2c.
  • the other terminals mentioned above also need to satisfy at least one of the following:
  • a message or response needs to be sent to the terminal A;
  • the fourth indication information is used to indicate that the terminal can monitor Or it is necessary to monitor the second resource object.
  • the network side device can indicate which terminals can transmit on the obtained resources (such as within the obtained COT). Specifically, the network side device can indicate the relevant identifiers of these terminals, for example, by indicating source id or destination id, to indicate that the terminals that meet the corresponding requirements can transmit within the obtained COT.
  • the network side device can inform terminal A which terminals can transmit on the resources obtained by terminal A (such as within the obtained COT), and which terminals can or need to monitor the resources obtained by terminal A.
  • the network side device may indicate the relevant identifiers of these terminals to terminal A.
  • the above terminal A and the terminal indicated by the base station are mode-1 terminals, or terminals using the mode scheduled by the base station.
  • the terminal A may consider that at least some of the other terminals or any terminal can or need to use the second resource object, or that it can or needs to listen to the second resource object.
  • terminal A may indicate that at least some of other terminals corresponding to the same identity A as terminal A can use or need to use the second resource object, or indicate that they can or need to monitor the second resource object.
  • terminal A instructs terminal B to share the COT obtained by terminal A; for another example, terminal A can instruct terminal B to transmit to the COT obtained by terminal A; for another example, terminal A instructs terminal B to use the second monitoring method to monitor the second resource. object.
  • At least some of the other terminals mentioned above may use or need the second resource object, or may monitor or need to monitor the second resource object.
  • other terminals automatically assume that they can use the COT of terminal A, or other terminals think that they need to monitor the channel.
  • terminal A seizes the resource object
  • other terminals can directly use the resource object, or provide a second monitoring method to monitor the second resource object, which can improve the success of terminal access. efficiency, and can achieve the effect of power saving and improve resource utilization.
  • a terminal that is instructed by terminal A to use the second resource object and corresponds to the same identity A as terminal A can use the second resource object for transmission.
  • terminal B and terminal A are in a terminal group, and terminal A obtains the first resource object and indicates that terminal B can share the COT, then terminal B can transmit within the COT.
  • terminals corresponding to the same identity A as terminal A may also have the following behaviors:
  • the monitoring method used is related to at least one of the following: 1.
  • the monitoring method type information configured/indicated by the network side device, 2.
  • the identifier corresponding to the terminal may be the same as the range of the first identifier or the second identifier, but may correspond to the same or different items.
  • first terminal may belong to different terminals (terminal A or other terminals) and have different corresponding behaviors, which will be described in detail below.
  • the method further includes:
  • the first terminal When the first terminal acquires the target information, the first terminal performs the second behavior;
  • the target information includes at least one of the following: the second terminal determines that the first resource object is idle or available; the second terminal successfully accesses or obtains the first resource object; the second terminal uses the first resource object. a resource object;
  • the second behavior includes at least one of the following: determining that the first resource object is occupied by the second terminal; determining that the first resource object is occupied by a side link system; determining that the first resource object is occupied by a fifth At least part of the terminals corresponding to the identification are occupied, and at least part of the terminals corresponding to the fifth identification include the second terminal; in the case that the first terminal belongs to at least part of the terminals corresponding to the fifth identification, determine the second information ;
  • the second information includes at least one of the following: a second resource object that at least partially overlaps with the first resource object; the second resource object can be monitored; the second resource object needs to be monitored; using Second resource object.
  • the above-mentioned first terminal may be understood as a terminal among at least part of the above-mentioned other terminals or any terminal among the above-mentioned other terminals.
  • the above-mentioned second terminal can be understood as terminal A.
  • the third indication information indicating the second resource object can be understood as the second terminal instructs the COT to the first terminal. After receiving the instruction from the COT, the first terminal defaults that it can transmit on the COT.
  • the above third instruction information may be type2 when indicating the first terminal's monitoring mode, that is, instructing the first terminal to use the type2 monitoring mode to monitor the second resource object.
  • the second behavior satisfies any of the following:
  • the monitoring mode of the second resource object is the second monitoring mode
  • the monitoring mode of the second resource object is determined based on network side device instructions and/or based on the fourth identification corresponding to the first terminal;
  • the fourth identification includes at least one of the following: source identification, destination identification, identification corresponding to the terminal group, member identification within the group, identification corresponding to terminal pairing, identification corresponding to the service, identification corresponding to the subscription parameter set, Quality of service flow identifier, resource pool identifier, carrier identifier, bandwidth part identifier, subgroup identifier to which the terminal belongs, resource block set identifier, channel identifier, sub-channel identifier, the index of the first preset information, the first preset information Set the number of the information and the temporary identification of the wireless network.
  • the first terminal meets at least one of the following:
  • a message or response needs to be sent to the second terminal
  • the method further includes:
  • the first terminal When the second preset condition is met, the first terminal performs a third behavior
  • the third behavior includes at least one of the following: determining that the third terminal can monitor or needs to monitor a second resource object that at least partially overlaps with the first resource object; can use or needs to use all The second resource object;
  • the second preset condition includes at least one of the following: the first terminal finds that the first resource object is idle or available; the first terminal successfully obtains the first resource object; the first terminal uses the first resource object; a resource object;
  • the third terminal is at least part of the terminals corresponding to the same fourth identification as the first terminal, including a source identification, a destination identification, an identification corresponding to a terminal group, a member identification in the group, an identification corresponding to terminal pairing,
  • the identifier corresponding to the service the identifier corresponding to the subscription parameter set, the service quality flow identifier, the resource pool identifier, the carrier identifier, the bandwidth part identifier, the subgroup identifier to which the terminal belongs, the resource block set identifier, the channel identifier, the sub-channel identifier, the said third An index of preset information, the number of the first preset information and the wireless network temporary identification.
  • the above-mentioned first terminal can be understood as terminal A
  • the above-mentioned third terminal can be understood as a terminal among at least part of the above-mentioned other terminals or any terminal among the above-mentioned other terminals.
  • the method further includes:
  • the first terminal sends fifth indication information to the third terminal.
  • the fifth indication information is used to indicate at least one of the following: the third terminal can monitor the second resource object, and the third terminal needs to monitor
  • the second resource object is used by the third terminal.
  • the second resource object is the monitoring mode of the third terminal.
  • the third terminal can monitor or use the second resource object only after the first terminal instructs the third terminal, thereby improving the pertinence of the transmission and preventing other terminals from maliciously using the second resource object. Improved transmission reliability.
  • the third terminal meets at least one of the following:
  • a message or response needs to be sent to the first terminal
  • the target identifier is the largest, the target identifier is the smallest, or the target identifier is the first preset among the terminals corresponding to the first identifier.
  • value terminal the target identifier is a terminal identification, terminal number or terminal index;
  • the first indication information is used to indicate any of the following: activating the first information, deactivating the first information, or using the first information. , do not use the first information and stop using the first information;
  • the method further includes:
  • the first terminal sends third information to the network side device, where the third information includes at least one of the following:
  • Terminal information of the first terminal
  • Hybrid automatic repeat request response HARQ-ACK information corresponding to the SL transmission of the first terminal
  • Hybrid automatic repeat request response HARQ-ACK information corresponding to the SL transmission failure of the first terminal is provided.
  • the length of time for the first terminal to obtain available channel occupancy time can be indicated by at least one of the following: COT type, COT priority, COT limit (such as maximum COT length, minimum COT length), COT starting point, COT length and COT end point. Since the terminal feeds back the third information to the network-side device, the network-side device can learn the terminal's access channel or resource status, thereby assisting the network-side device in scheduling the terminal, avoiding erroneous scheduling, and further improving the efficiency of SL transmission. reliability.
  • the terminal information of the first terminal may include the identity information of the terminal, thereby informing the network side device which terminal has obtained the COT.
  • a terminal sends the above third information to the network side device, it means that the terminal or some terminals have successfully obtained the first resource object, or it means that the terminal or some terminals have successfully obtained the first resource object. Unsuccessful in acquiring the channel.
  • a terminal does not send the above third information to the network side device, it means that the terminal or some terminals have successfully obtained the first resource object.
  • the monitoring information includes at least one of the following:
  • the number of times of listening or accessing (such as listen-before-talking LBT), or the maximum number of monitoring or accessing (such as LBT);
  • the interception or access (for example, LBT) success interval the maximum interval for interception or access (for example, LBT) success, or the minimum interval for interception or access (for example, LBT) success.
  • the above-mentioned LBT times can be understood as the CCA times or eCCA times or the value of the LBT counter
  • the above-mentioned maximum LBT times can be understood as the maximum CCA times or eCCA times or the maximum value of the LBT counter.
  • the above failures can be understood as cumulative failures or continuous failures.
  • the above-mentioned number of LBT failures can be understood as the number of CCA failures or the number of eCCA failures or the number of times the LBT counter remains unchanged.
  • the above-mentioned maximum number of LBT failures can be understood as the maximum number of CCA failures or the maximum number of eCCA failures or the maximum number of times the LBT counter remains unchanged.
  • the above success interval can be understood as a cumulative success interval or a continuous success interval.
  • the monitoring information may include the interval/maximum interval between two successful CCA or two successful eCCA.
  • the listening information may include the interval between two LBT counter decrements or the number of times the counter remains unchanged, the maximum or minimum interval between two LBT counter decrements or the maximum number of times the LBT counter remains unchanged or the number of times the counter remains unchanged. Constant minimum number of times.
  • the preset resources include at least one of the following:
  • the number of times of monitoring or access (such as LBT), or the resource corresponding to the maximum number of times of monitoring or access (such as LBT);
  • the successful interval for monitoring or accessing for example, LBT
  • the resource corresponding to the maximum successful interval for monitoring or accessing for example, LBT
  • the above time period can be understood as the time period of the above preset resources.
  • the time resource corresponding to the timer during operation is a preset resource, or the corresponding time resource after the timer expires is a preset resource.
  • the information about the preset resources includes at least one of the following:
  • the above time length information may include a time period or a timer duration; the above time point information may include a time period or a start point/end point/start time point/stop time point/pause time point/restart time point of a time period or a timer; the above offset The information can include the offset of the time period or the time point when the timer starts or ends or is paused or restarted relative to a reference time point; the above reference time point information can include Direct Frame Number (DFN) 0, system frame number (System frame number, SFN)0, slot 0, subframe 0 or symbol 0.
  • DFN Direct Frame Number
  • monitoring the first resource object according to the first information includes:
  • the preset resources include at least two resource subsets, each resource subset is associated with at least one terminal or terminal group or terminal pairing or sixth identification, and the first terminal determines whether the first behavior can be performed Or do you need to perform the first act including:
  • the first terminal determines whether the first behavior can be performed on a resource subset associated with the first terminal or whether the first behavior needs to be performed on a resource subset associated with the first terminal.
  • the preset resources include multiple bands, RB sets, carriers, or resource pools.
  • the identifiers corresponding to the terminals may be associated with different bands, RB sets, carriers, or resource pools respectively, so that different terminals may monitor different band or RB set or carrier or resource pool.
  • the preset resources include multiple bands, RB sets, carriers, or resource pools.
  • the identifiers corresponding to the terminals may be associated with different bands, RB sets, carriers, or resource pools respectively, so that different terminals may use different band or RB set or carrier or resource pool.
  • target feedback information can be fed back to the network side device, and the target feedback information is used to indicate at least one of the following: the terminal monitoring or access (such as LBT) reaches or exceeds the corresponding number limit or interval limit, and the terminal No more monitoring or access.
  • terminal 1 and terminal 2 correspond to the same group
  • the group's destination id 1
  • terminal 3 and terminal 4 correspond to the same group
  • terminal 1 and terminal 2 obtained the preset resource information indicated by DCI1 and monitored.
  • the terminal 1LBT successfully obtained COT.
  • terminal 3 and terminal 4 obtained the preset resource information indicated by DCI2 and monitored it.
  • Terminal 3LBT successfully obtained the COT.
  • Each DCI is scrambled with common RNTI respectively.
  • the DCI indicates the information of time period 0, time period 1 to time period n.
  • the base station configures terminal 1 and terminal 2 to associate with the time period 0 indicated by DCI. Therefore, after decoding the DCI, terminal 1 and terminal 2 obtain the information of time period 0 indicated by DCI1 and monitor.
  • the base station configures terminal 3 and terminal 4 with the DCI indication. is associated with the time period n, so terminal 1 and terminal 2 obtain the information of the time period n indicated by DCI1 after decoding the DCI, and monitor it.
  • this embodiment of the present application also provides a side-link transmission processing method in an unlicensed frequency band.
  • the side-link transmission processing method in an unlicensed frequency band may include:
  • Step 501 When the fourth terminal obtains the target information, the fourth terminal performs a fourth behavior
  • the target information includes at least one of the following: the second terminal determines that the first resource object is idle or available; the second terminal successfully accesses or obtains the first resource object; the second terminal uses the first resource object;
  • the fourth behavior includes at least one of the following: determining that the first resource object is occupied by the second terminal; determining that the first resource object is occupied by a side link system; determining that the first resource object is occupied by a fifth At least part of the terminals corresponding to the identification are occupied, and at least part of the terminals corresponding to the fifth identification include the second terminal; in the case that the fourth terminal belongs to at least part of the terminals corresponding to the fifth identification, determine the second information ;
  • the second information includes at least one of the following: a second resource object that at least partially overlaps with the first resource object; the second resource object can be monitored; the second resource object needs to be monitored; using Second resource object.
  • the above-mentioned fourth terminal can be understood as other terminals in the above-mentioned embodiment, and the second terminal can be understood as terminal A.
  • the difference between the fourth terminal and the above-mentioned first terminal is that the fourth terminal does not acquire the above-mentioned first information, while the first terminal acquires the above-mentioned first information.
  • determining the second information includes:
  • the seventh indication information is used to indicate at least one of the following: a second resource object, the fourth terminal can monitor the second resource object, the fourth terminal needs to monitor the second resource object, the fourth terminal Use the second resource object, the second resource object, and the monitoring mode of the fourth terminal.
  • the fourth behavior satisfies any of the following:
  • the monitoring mode of the second resource object is the second monitoring mode
  • the monitoring mode of the second resource object is determined based on the network side device indication and/or based on the fourth identification corresponding to the fourth terminal;
  • the fourth identification includes at least one of the following: source identification, destination identification, identification corresponding to the terminal group, member identification within the group, identification corresponding to terminal pairing, identification corresponding to the service, identification corresponding to the subscription parameter set, Quality of service flow identifier, resource pool identifier, carrier identifier, bandwidth part identifier, subgroup identifier to which the terminal belongs, resource block set identifier, channel identifier, sub-channel identifier, index of the first preset information, number of the first preset information and wireless network temporary identification.
  • the fourth terminal meets at least one of the following:
  • a message or response needs to be sent to the second terminal
  • the first preset information and/or the second preset information includes at least one of monitoring information and preset resource information.
  • this embodiment of the present application also provides a side-link transmission processing method in an unlicensed frequency band.
  • the side-link transmission processing method in an unlicensed frequency band may include:
  • Step 601 The network side device sends first information to the first terminal, where the first information includes at least one of first preset information and second preset information; the first preset information and/or the The second preset information includes at least one of monitoring information and preset resource information.
  • the first identification includes at least one of the following: a source identification, a destination identification, an identification corresponding to a terminal group, a member identification within the group, an identification corresponding to terminal pairing, an identification corresponding to a service, and an identification corresponding to a subscription parameter set.
  • Identity quality of service flow identification, resource pool identification, carrier identification, bandwidth part identification, subgroup identification to which the terminal belongs, resource block set identification, channel identification, sub-channel identification, the index of the first preset information, the third - The number of the preset information and the temporary identification of the wireless network;
  • the second identification includes at least one of the following: source identification, destination identification, identification corresponding to the terminal group, member identification within the group, identification corresponding to terminal pairing, identification corresponding to the service, and identification corresponding to the subscription parameter set.
  • Identity quality of service flow identification, resource pool identification, carrier identification, bandwidth part identification, subgroup identification to which the terminal belongs, resource block set identification, channel identification, sub-channel identification, the index of the second preset information, the third 2. The number of the preset information and the temporary identification of the wireless network.
  • the first preset information satisfies at least one of the following:
  • the M terminals include at least some terminals among the terminals associated with the first preset information, and M is a positive integer;
  • the first preset information includes terminal identifiers corresponding to the M terminals;
  • the first preset information is associated with at least one first identification, and the M terminals are at least some of the terminals corresponding to the first identification.
  • the second preset information satisfies any of the following:
  • the N terminals include at least some terminals among the terminals associated with the second preset information, and N is a positive integer;
  • the second preset information includes terminal identifiers corresponding to the N terminals;
  • the second preset information is associated with at least one second identifier, and the N terminals are at least some of the terminals corresponding to the second identifier.
  • the method also includes:
  • the network side device sends first indication information, and the first indication information is used to indicate any of the following: activating the first information, deactivating the first information, being able to use the first information, and stopping using it. the first information.
  • the method also includes:
  • the network side device receives third information from the first terminal, where the third information includes at least one of the following:
  • Terminal information of the first terminal
  • Hybrid automatic repeat request response HARQ-ACK information corresponding to the SL transmission of the first terminal
  • Hybrid automatic repeat request response HARQ-ACK information corresponding to the SL transmission failure of the first terminal is provided.
  • the monitoring information includes at least one of the following:
  • the number of monitoring or access failures, or the maximum number of monitoring or access failures is the number of monitoring or access failures, or the maximum number of monitoring or access failures
  • Interval for successful monitoring or access or maximum interval for successful monitoring or access, or minimum interval for successful monitoring or access.
  • the preset resources include at least one of the following:
  • the listening or access success interval, or the resource corresponding to the maximum listening or access success interval is the listening or access success interval.
  • the information about the preset resources includes at least one of the following:
  • the execution subject of the side-link transmission processing method in the unlicensed frequency band provided by the embodiment of the present application may be a side-link transmission processing device in the unlicensed frequency band.
  • the side-link transmission processing device of the unlicensed frequency band performs the side-link transmission processing method of the unlicensed frequency band as an example to illustrate the side-link transmission processing device of the unlicensed frequency band provided by the embodiment of the present application.
  • the present application implements a side-link transmission processing device in an unlicensed frequency band.
  • the side-link transmission processing device 700 in an unlicensed frequency band includes:
  • Acquisition module 701 configured to acquire first information, which includes at least one of first preset information and second preset information; the first preset information and/or the second preset information The information includes at least one of monitoring information and preset resource information;
  • the first determination module 702 is used to determine whether the first behavior can be performed or whether the first behavior needs to be performed.
  • the first behavior includes monitoring the first resource object according to the first information and using the first behavior according to the first information. At least one item in the first resource object;
  • the first terminal determines that the first behavior can be performed or needs to be performed, and the first preset condition includes at least one of the following: the first terminal belongs to M terminals, the M terminals include at least some of the terminals associated with the first preset information, the first terminal does not belong to the N terminals, the N terminals include those associated with the second preset information Assume that for at least some terminals among the terminals associated with the information, M and N are both positive integers.
  • the first preset information is associated with at least one first identification
  • the second preset information is associated with at least one second identification
  • the method further includes at least one of the following:
  • the first terminal determines that the first terminal does not satisfy the first preset condition:
  • the first terminal determines that the first terminal satisfies the first preset condition:
  • the first corresponding relationship includes at least one of the following:
  • the first terminal does not correspond to any of the at least one first identifier
  • the first terminal does not correspond to the preset first identifier in the at least one first identifier
  • the first terminal corresponds to the second identifier
  • the second corresponding relationship includes at least one of the following:
  • the first terminal does not correspond to any second identifier among the at least one second identifier
  • the first terminal does not correspond to the preset second identifier in the at least one second identifier
  • the first terminal corresponds to the first identifier.
  • the first identification includes at least one of the following: a source identification, a destination identification, an identification corresponding to a terminal group, a member identification within the group, an identification corresponding to terminal pairing, an identification corresponding to a service, and an identification corresponding to a subscription parameter set.
  • Identity quality of service flow identification, resource pool identification, carrier identification, bandwidth part identification, subgroup identification to which the terminal belongs, resource block set identification, channel identification, sub-channel identification, the index of the first preset information, the third - The number of the preset information and the temporary identification of the wireless network;
  • the second identification includes at least one of the following: source identification, destination identification, identification corresponding to the terminal group, member identification within the group, identification corresponding to terminal pairing, identification corresponding to the service, and identification corresponding to the subscription parameter set.
  • Identity quality of service flow identification, resource pool identification, carrier identification, bandwidth part identification, subgroup identification to which the terminal belongs, resource block set identification, channel identification, sub-channel identification, the index of the second preset information, the third 2. The number of the preset information and the temporary identification of the wireless network.
  • the first preset information satisfies at least one of the following:
  • the first preset information includes terminal identifiers corresponding to the M terminals;
  • the first preset information is associated with at least one first identification, and the M terminals are corresponding to the first identification. At least some of the terminals.
  • the second preset information satisfies any of the following:
  • the second preset information includes terminal identifiers corresponding to the N terminals;
  • the second preset information is associated with at least one second identifier, and the N terminals are at least some of the terminals corresponding to the second identifier.
  • the obtaining module 701 is specifically configured to: receive the first information from a network side device,
  • the first information is carried through at least one of the following: downlink control information DCI, radio resource control RRC and media access control MAC signaling.
  • the side link transmission processing device 700 of the unlicensed frequency band also includes:
  • a first receiving module configured to receive first indication information from a network side device, where the first indication information is used to indicate any of the following: activating the first information, deactivating the first information, or using the first information, not using the first information and stopping using the first information.
  • the M terminals satisfy at least one of the following:
  • the third identification includes at least one of the following: source identification, destination identification, identification corresponding to the terminal group, member identification within the group, identification corresponding to terminal pairing, identification corresponding to the service, identification corresponding to the subscription parameter set, Quality of service flow identifier, resource pool identifier, carrier identifier, bandwidth part identifier, subgroup identifier to which the terminal belongs, resource block set identifier, channel identifier, sub-channel identifier, the index of the first preset information, the first preset information Set the number of the information and the temporary identification of the wireless network.
  • the first behavior satisfies any of the following:
  • the monitoring mode of the first resource object is the first monitoring mode monitoring
  • the monitoring mode of the first resource object is determined based on network side device instructions and/or based on the fourth identification corresponding to the first terminal;
  • the fourth identification includes at least one of the following: source identification, destination identification, identification corresponding to the terminal group, Member identification in the group, identification corresponding to terminal pairing, identification corresponding to the service, identification corresponding to the subscription parameter set, quality of service flow identification, resource pool identification, carrier identification, bandwidth part identification, subgroup identification to which the terminal belongs, resource block set identification, channel identification, sub-channel identification, the index of the first preset information, the number of the first preset information and the wireless network temporary identification.
  • the side link transmission processing device 700 of the unlicensed frequency band also includes:
  • a first execution module configured to cause the first terminal to perform a second behavior when the first terminal obtains the target information
  • the target information includes at least one of the following: the second terminal determines that the first resource object is idle or available; the second terminal successfully accesses or obtains the first resource object; the second terminal uses the first resource object. a resource object;
  • the second behavior includes at least one of the following: determining that the first resource object is occupied by the second terminal; determining that the first resource object is occupied by a side link system; determining that the first resource object is occupied by a fifth At least part of the terminals corresponding to the identification are occupied, and at least part of the terminals corresponding to the fifth identification include the second terminal; in the case that the first terminal belongs to at least part of the terminals corresponding to the fifth identification, determine the second information ;
  • the second information includes at least one of the following: a second resource object that at least partially overlaps with the first resource object; the second resource object can be monitored; the second resource object needs to be monitored; using Second resource object.
  • determining the second information includes:
  • the third indication information is used to indicate at least one of the following: a second resource object, the first terminal can monitor the second resource object, the first terminal needs to monitor the second resource object, the first terminal Use the second resource object, the second resource object, and the monitoring mode of the first terminal.
  • the second behavior satisfies any of the following:
  • the monitoring mode of the second resource object is the second monitoring mode
  • the monitoring mode of the second resource object is determined based on network side device instructions and/or based on the fourth identification corresponding to the first terminal;
  • the fourth identification includes at least one of the following: source identification, destination identification, identification corresponding to the terminal group, member identification within the group, identification corresponding to terminal pairing, identification corresponding to the service, identification corresponding to the subscription parameter set, Quality of service flow identifier, resource pool identifier, carrier identifier, bandwidth part identifier, subgroup identifier to which the terminal belongs, resource block set identifier, channel identifier, sub-channel identifier, the index of the first preset information, the first preset information Set the number of the information and the temporary identification of the wireless network.
  • the first terminal meets at least one of the following:
  • a message or response needs to be sent to the second terminal
  • the side link transmission processing device 700 of the unlicensed frequency band also includes:
  • the first execution module is used to execute the third behavior when the second preset condition is met
  • the third behavior includes at least one of the following: determining that the third terminal can monitor or needs to monitor a second resource object that at least partially overlaps with the first resource object; can use or needs to use all The second resource object;
  • the second preset condition includes at least one of the following: the first terminal finds that the first resource object is idle or available; the first terminal successfully obtains the first resource object; the first terminal uses the first resource object; a resource object;
  • the third terminal is at least part of the terminals corresponding to the same fourth identification as the first terminal, including a source identification, a destination identification, an identification corresponding to a terminal group, a member identification in the group, an identification corresponding to terminal pairing,
  • the identifier corresponding to the service the identifier corresponding to the subscription parameter set, the service quality flow identifier, the resource pool identifier, the carrier identifier, the bandwidth part identifier, the subgroup identifier to which the terminal belongs, the resource block set identifier, the channel identifier, the sub-channel identifier, the said third An index of preset information, the number of the first preset information and the wireless network temporary identification.
  • the method further includes:
  • the first terminal sends fifth indication information to the third terminal.
  • the fifth indication information is used to indicate at least one of the following: the third terminal can monitor the second resource object, and the third terminal needs to monitor
  • the second resource object is used by the third terminal.
  • the second resource object is the monitoring mode of the third terminal.
  • the third terminal meets at least one of the following:
  • a message or response needs to be sent to the first terminal
  • the target identifier is the largest, the target identifier is the smallest, or the target identifier is the first preset among the terminals corresponding to the first identifier.
  • value terminal the target identifier is a terminal identification, terminal number or terminal index;
  • the first indication information is used to indicate any of the following: activating the first information, deactivating the first information, or using the first information. , do not use the first information and stop using the first information;
  • the side link transmission processing device 700 of the unlicensed frequency band also includes:
  • the first sending module is configured to send third information to the network side device, where the third information includes at least one of the following:
  • Terminal information of the first terminal
  • Hybrid automatic repeat request response HARQ-ACK information corresponding to the SL transmission of the first terminal
  • Hybrid automatic repeat request response HARQ-ACK information corresponding to the SL transmission failure of the first terminal is provided.
  • the monitoring information includes at least one of the following:
  • the number of monitoring or access failures, or the maximum number of monitoring or access failures is the number of monitoring or access failures, or the maximum number of monitoring or access failures
  • Interval for successful monitoring or access or maximum interval for successful monitoring or access, or minimum interval for successful monitoring or access.
  • the preset resources include at least one of the following:
  • the listening or access success interval, or the resource corresponding to the maximum listening or access success interval is the listening or access success interval.
  • the information about the preset resources includes at least one of the following:
  • monitoring the first resource object according to the first information includes:
  • the preset resources include at least two resource subsets, each resource subset is associated with at least one terminal or terminal End group or terminal pairing or sixth identification association, the first determination module 702 is specifically configured to: determine whether the first behavior can be performed on the resource subset associated with the first terminal or whether it needs to be associated on the first terminal A subset of resources executes the first behavior.
  • the present application embodiment provides a side-link transmission processing device in an unlicensed frequency band.
  • the side-link transmission processing device 800 in an unlicensed frequency band includes:
  • the second execution module 801 is configured to execute the fourth behavior when the fourth terminal obtains the target information
  • the target information includes at least one of the following: the second terminal determines that the first resource object is idle or available; the second terminal successfully accesses or obtains the first resource object; the second terminal uses the first resource object;
  • the fourth behavior includes at least one of the following: determining that the first resource object is occupied by the second terminal; determining that the first resource object is occupied by a side link system; determining that the first resource object is occupied by a fifth At least part of the terminals corresponding to the identification are occupied, and at least part of the terminals corresponding to the fifth identification include the second terminal; in the case that the fourth terminal belongs to at least part of the terminals corresponding to the fifth identification, determine the second information ;
  • the second information includes at least one of the following: a second resource object that at least partially overlaps with the first resource object; the second resource object can be monitored; the second resource object needs to be monitored; and the second resource object is used to monitor the second resource object.
  • Resource object a second resource object that at least partially overlaps with the first resource object; the second resource object can be monitored; the second resource object needs to be monitored; and the second resource object is used to monitor the second resource object.
  • determining the second information includes:
  • the seventh indication information is used to indicate at least one of the following: a second resource object, the fourth terminal can monitor the second resource object, the fourth terminal needs to monitor the second resource object, the fourth terminal Use the second resource object, the second resource object, and the monitoring mode of the fourth terminal.
  • the fourth behavior satisfies any of the following:
  • the monitoring mode of the second resource object is the second monitoring mode
  • the monitoring mode of the second resource object is determined based on the network side device indication and/or based on the fourth identification corresponding to the fourth terminal;
  • the fourth identification includes at least one of the following: source identification, destination identification, identification corresponding to the terminal group, member identification within the group, identification corresponding to terminal pairing, identification corresponding to the service, identification corresponding to the subscription parameter set, Quality of service flow identifier, resource pool identifier, carrier identifier, bandwidth part identifier, subgroup identifier to which the terminal belongs, resource block set identifier, channel identifier, sub-channel identifier, index of the first preset information, number of the first preset information and wireless network temporary identification.
  • the fourth terminal meets at least one of the following:
  • a message or response needs to be sent to the second terminal
  • the first preset information and/or the second preset information includes at least one of monitoring information and preset resource information.
  • the present application embodiment provides a side-link transmission processing device in an unlicensed frequency band.
  • the side-link transmission processing device 900 in an unlicensed frequency band includes:
  • the second sending module 901 is configured to send first information to the first terminal, where the first information includes at least one of first preset information and second preset information; the first preset information and/or The second preset information includes at least one of monitoring information and preset resource information.
  • the first preset information is associated with at least one first identifier
  • the second preset information is associated with at least one second identifier
  • the side link transmission processing device 900 of the unlicensed frequency band further includes a third Two determination modules, the second determination module is used to perform at least one of the following:
  • the first terminal determines that the first terminal does not satisfy the first preset condition:
  • the first terminal determines that the first terminal satisfies the first preset condition:
  • the first corresponding relationship includes at least one of the following:
  • the first terminal does not correspond to any of the at least one first identifier
  • the first terminal does not correspond to the preset first identifier in the at least one first identifier
  • the first terminal corresponds to the second identifier
  • the second corresponding relationship includes at least one of the following:
  • the first terminal does not correspond to any second identifier among the at least one second identifier
  • the first terminal does not correspond to the preset second identifier in the at least one second identifier
  • the first terminal corresponds to the first identifier.
  • the first identification includes at least one of the following: a source identification, a destination identification, an identification corresponding to a terminal group, a member identification within the group, an identification corresponding to terminal pairing, an identification corresponding to a service, and an identification corresponding to a subscription parameter set.
  • Identity quality of service flow identification, resource pool identification, carrier identification, bandwidth part identification, subgroup identification to which the terminal belongs, resource block set identification, channel identification, sub-channel identification, the index of the first preset information, the third - The number of the preset information and the temporary identification of the wireless network;
  • the second identification includes at least one of the following: source identification, destination identification, identification corresponding to the terminal group, member identification within the group, identification corresponding to terminal pairing, identification corresponding to the service, and identification corresponding to the subscription parameter set.
  • logo service Quality stream identifier, resource pool identifier, carrier identifier, bandwidth part identifier, subgroup identifier to which the terminal belongs, resource block set identifier, channel identifier, sub-channel identifier, index of the second preset information, the second preset The number of the message and the temporary identification of the wireless network.
  • the first preset information satisfies at least one of the following:
  • the M terminals include at least some terminals among the terminals associated with the first preset information, and M is a positive integer;
  • the first preset information includes terminal identifiers corresponding to the M terminals;
  • the first preset information is associated with at least one first identification, and the M terminals are at least some of the terminals corresponding to the first identification.
  • the second preset information satisfies any of the following:
  • the N terminals include at least some terminals among the terminals associated with the second preset information, and N is a positive integer;
  • the second preset information includes terminal identifiers corresponding to the N terminals;
  • the second preset information is associated with at least one second identifier, and the N terminals are at least some of the terminals corresponding to the second identifier.
  • the second sending module 901 is also configured to send first indication information, where the first indication information is used to indicate any of the following: activating the first information, deactivating the first information, The first information can be used and the first information can be stopped.
  • the side link transmission processing device 900 of the unlicensed frequency band also includes:
  • the second receiving module is configured to receive third information from the first terminal, where the third information includes at least one of the following:
  • Terminal information of the first terminal
  • Hybrid automatic repeat request response HARQ-ACK information corresponding to the SL transmission of the first terminal
  • Hybrid automatic repeat request response HARQ-ACK information corresponding to the SL transmission failure of the first terminal is provided.
  • the monitoring information includes at least one of the following:
  • the number of monitoring or access failures, or the maximum number of monitoring or access failures is the number of monitoring or access failures, or the maximum number of monitoring or access failures
  • Interval for successful monitoring or access or maximum interval for successful monitoring or access, or minimum interval for successful monitoring or access.
  • the preset resources include at least one of the following:
  • the listening or access success interval, or the resource corresponding to the maximum listening or access success interval is the listening or access success interval.
  • the information about the preset resources includes at least one of the following:
  • the device for processing side-link transmission in the unlicensed frequency band in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
  • the apparatus for processing side-link transmission in unlicensed frequency bands provided by the embodiments of this application can implement each process implemented by the method embodiments in Figures 2 to 6 and achieve the same technical effect. To avoid duplication, the details will not be described here.
  • this embodiment of the present application also provides a communication device 1000, which includes a processor 1001 and a memory 1002.
  • the memory 1002 stores programs or instructions that can be run on the processor 1001.
  • each step of the device embodiment of the above-mentioned side-link transmission processing in the unlicensed frequency band is implemented, and the same technical effect can be achieved. To avoid duplication, the details will not be described here.
  • An embodiment of the present application also provides a terminal, including a processor and a communication interface.
  • the communication interface is used to obtain first information, where the first information includes first preset information and second preset information. Assume at least one item of information; the first preset information and/or the second preset information includes at least one of monitoring information and preset resource information; the processor is configured to determine whether the first behavior can be performed Or whether it is necessary to perform a first behavior, the first behavior including at least one of monitoring a first resource object according to the first information and using the first resource object according to the first information;
  • the first terminal determines that the first behavior can be performed or needs to be performed, and the first preset condition includes at least one of the following: the first terminal belongs to M terminals, the M terminals include at least some of the terminals associated with the first preset information, the first terminal does not belong to the N terminals, the N terminals include those associated with the second preset information Assume that for at least some of the terminals associated with the information, M and N are both positive integers;
  • the processor is configured to perform a fourth behavior
  • the target information includes at least one of the following: the second terminal determines that the first resource object is idle or available; The second terminal successfully accesses or obtains the first resource object; the second terminal uses the first resource object;
  • the fourth behavior includes at least one of the following: determining that the first resource object is occupied by the second terminal; determining that the first resource object is occupied by a side link system; determining that the first resource object is occupied by a fifth At least part of the terminals corresponding to the identification are occupied, and at least part of the terminals corresponding to the fifth identification include the second terminal; in the case that the fourth terminal belongs to at least part of the terminals corresponding to the fifth identification, determine the second information ;
  • the second information includes at least one of the following: a second resource object that at least partially overlaps with the first resource object; the second resource object can be monitored; the second resource object needs to be monitored; and the second resource object is used to monitor the second resource object.
  • Resource object a second resource object that at least partially overlaps with the first resource object; the second resource object can be monitored; the second resource object needs to be monitored; and the second resource object is used to monitor the second resource object.
  • FIG. 11 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
  • the terminal 1100 includes but is not limited to: a radio frequency unit 1101, a network module 1102, an audio output unit 1103, an input unit 1104, a sensor 1105, a display unit 1106, a user input unit 1107, an interface unit 1108, a memory 1109, a processor 1110, etc. At least some parts.
  • the terminal 1100 may also include a power supply (such as a battery) that supplies power to various components.
  • the power supply may be logically connected to the processor 1110 through a power management system, thereby managing charging, discharging, and power consumption through the power management system. Management and other functions.
  • the terminal structure shown in FIG. 11 does not constitute a limitation on the terminal.
  • the terminal may include more or fewer components than shown in the figure, or some components may be combined or arranged differently, which will not be described again here.
  • the input unit 1104 may include a graphics processing unit (Graphics Processing Unit, GPU) 11041 and a microphone 11042.
  • the graphics processor 11041 is responsible for the image capture device (GPU) in the video capture mode or the image capture mode. Process the image data of still pictures or videos obtained by cameras (such as cameras).
  • the display unit 1106 may include a display panel 11061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 1107 includes at least one of a touch panel 11071 and other input devices 11072 .
  • Touch panel 11071 also called touch screen.
  • the touch panel 11071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 11072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
  • the radio frequency unit 1101 after receiving downlink data from the network side device, the radio frequency unit 1101 can transmit it to the processor 1110 for processing; in addition, the radio frequency unit 1101 can send uplink data to the network side device.
  • the radio frequency unit 1101 includes, but is not limited to, an antenna, amplifier, transceiver, coupler, low noise amplifier, duplexer, etc.
  • Memory 1109 may be used to store software programs or instructions as well as various data.
  • the memory 1109 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.) etc.
  • memory 1109 may include volatile memory or nonvolatile memory, or memory 1109 may include both volatile and nonvolatile memory.
  • the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • ROM Read-Only Memory
  • PROM programmable read-only memory
  • Erasable PROM Erasable PROM
  • EPROM electrically erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
  • RAM Random Access Memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM Double Data Rate SDRAM
  • DDRSDRAM double data rate synchronous dynamic random access memory
  • Enhanced SDRAM, ESDRAM enhanced synchronous dynamic random access memory
  • Synch link DRAM synchronous link dynamic random access memory
  • SLDRAM direct memory bus
  • the processor 1110 may include one or more processing units; optionally, the processor 1110 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 1110.
  • the radio frequency unit 1101 is used to obtain first information, where the first information includes at least one of first preset information and second preset information; the first preset information The information and/or the second preset information includes at least one of monitoring information and preset resource information; the processor 1110 is used to determine whether the first behavior can be performed or whether the first behavior needs to be performed, the first The behavior includes at least one of monitoring a first resource object according to the first information and using the first resource object according to the first information;
  • the first terminal determines that the first behavior can be performed or needs to be performed, and the first preset condition includes at least one of the following: the first terminal belongs to M terminals, the M terminals include at least some of the terminals associated with the first preset information, the first terminal does not belong to the N terminals, the N terminals include those associated with the second preset information Assume that for at least some of the terminals associated with the information, M and N are both positive integers;
  • the processor 1110 is configured to perform a fourth behavior
  • the target information includes at least one of the following: the second terminal determines that the first resource object is idle or available; the second terminal successfully accesses or obtains the first resource object; the second terminal uses the first resource object;
  • the fourth behavior includes at least one of the following: determining that the first resource object is occupied by the second terminal; determining that the first resource object is occupied by a side link system; determining that the first resource object is occupied by a fifth At least part of the terminals corresponding to the identification are occupied, and at least part of the terminals corresponding to the fifth identification include the second terminal; in the case that the fourth terminal belongs to at least part of the terminals corresponding to the fifth identification, determine the second information ;
  • the second information includes at least one of the following: a second resource object that at least partially overlaps with the first resource object; the second resource object can be monitored; the second resource object needs to be monitored; and the second resource object is used to monitor the second resource object.
  • Resource object a second resource object that at least partially overlaps with the first resource object; the second resource object can be monitored; the second resource object needs to be monitored; and the second resource object is used to monitor the second resource object.
  • An embodiment of the present application also provides a network side device, including a processor and a communication interface.
  • the communication interface is used to send first information to the first terminal, where the first information includes first preset information and second preset information. At least one of: the first preset information and/or the second preset information includes at least one of monitoring information and preset resource information.
  • This network-side device embodiment corresponds to the above-mentioned network-side device method embodiment. Each implementation process and implementation manner of the above-mentioned method embodiment can be applied to this network-side device embodiment, and can achieve the same technical effect.
  • the embodiment of the present application also provides a network side device.
  • the network side device 1200 includes: an antenna 1201, a radio frequency device 1202, a baseband device 1203, a processor 1204 and a memory 1205.
  • Antenna 1201 is connected to radio frequency device 1202.
  • the radio frequency device 1202 receives information through the antenna 1201 and sends the received information to the baseband device 1203 for processing.
  • the baseband device 1203 processes the information to be sent and sends it to the radio frequency device 1202.
  • the radio frequency device 1202 processes the received information and then sends it out through the antenna 1201.
  • the method performed by the network side device in the above embodiment can be implemented in the baseband device 1203, which includes a baseband processor.
  • the baseband device 1203 may include, for example, at least one baseband board on which multiple chips are disposed, as shown in FIG. Program to perform the network device operations shown in the above method embodiments.
  • the network side device may also include a network interface 1206, which is, for example, a common public radio interface (CPRI).
  • a network interface 1206, which is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the network side device 1200 in the embodiment of the present application also includes: instructions or programs stored in the memory 1205 and executable on the processor 1204.
  • the processor 1204 calls the instructions or programs in the memory 1205 to execute each of the steps shown in Figure 9
  • the method of module execution and achieving the same technical effect will not be described in detail here to avoid duplication.
  • Embodiments of the present application also provide a readable storage medium, which stores a program or instructions.
  • the program or instructions are executed by a processor, the above-mentioned side-link transmission processing method in the unlicensed frequency band is implemented.
  • Method Embodiment Each process can achieve the same technical effect. To avoid repetition, we will not go into details here.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium includes computer readable storage media, such as computer read-only memory ROM, random access memory RAM, magnetic disk or optical disk, etc.
  • An embodiment of the present application further provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the side chain of the unlicensed frequency band.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
  • Embodiments of the present application further provide a computer program/program product.
  • the computer program/program product is stored in a storage medium.
  • the computer program/program product is executed by at least one processor to implement the above-mentioned bypassing of unlicensed frequency bands.
  • Each process of the link transmission processing method embodiment can achieve the same technical effect. To avoid duplication, it will not be described again here.
  • Embodiments of the present application also provide a communication system, including: a terminal and a network-side device.
  • the terminal is used to perform various processes of the method embodiments corresponding to Figures 2 to 5 and the above-mentioned terminals.
  • the network-side device Used to perform e.g. The various processes of the method embodiment corresponding to each network side device in Figure 6 and above can achieve the same technical effect. To avoid duplication, they will not be described again here.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to the existing technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk , CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of this application.

Abstract

本申请公开了一种非授权频段的旁链路传输处理方法、装置及相关设备,属于通信技术领域,本申请实施例的方法包括:第一终端获取第一信息,第一信息包括第一预设信息和第二预设信息中的至少一项;第一终端确定是否可执行第一行为或是否需要执行第一行为,第一行为包括根据第一信息监听第一资源对象和根据第一信息使用第一资源对象中的至少一项;其中,在满足第一预设条件的情况下,第一终端确定可执行第一行为或需要执行第一行为,第一预设条件包括以下至少一项:第一终端属于M个终端,M个终端包括与第一预设信息关联的终端中的至少部分终端,第一终端不属于N个终端,N个终端包括与第二预设信息关联的终端中的至少部分终端。

Description

非授权频段的旁链路传输处理方法、装置及相关设备
相关申请的交叉引用
本申请主张在2022年6月20日在中国提交的中国专利申请No.202210701660.7的优先权,其全部内容通过引用包含于此。
技术领域
本申请属于通信技术领域,具体涉及一种非授权频段的旁链路传输处理方法、装置及相关设备。
背景技术
随着通信技术的发展,在未来通信系统中,共享频谱例如非授权频段(unlicensed band)可以作为授权频段(licensed band)的补充帮助运营商对服务进行扩容。在旁链路(Sidelink,SL)通信系统中,为了获得更多的资源来满足SL传输的业务需求(例如基于SL的扩展现实、虚拟现实或定位等业务),可能需要在未授权频段上进行SL传输,而目前的SL技术框架多是针对授权频段或智能交通系统(Intelligent Transportation System,ITS)频段设计的.在未授权频段上,可能存在其他无线技术,比如无线保真(WIFI),因此需要先监听资源是否空闲,并确定是空闲的后尝试发起信道接入。
目前通常由网络侧设备调度终端对信道进行监控,由于网络侧设备并不接收终端发送的SL信道/信号,因此无法得知终端是否实际接入成功,导致终端对终端的状态判断错误从而进行不合适的调度。因此,现有技术中存在非授权频段上进行SL传输的可靠性较差的问题。
发明内容
本申请实施例提供一种非授权频段的旁链路传输处理方法、装置及相关设备,能够解决非授权频段上进行SL传输的可靠性较差的问题。
第一方面,提供了一种非授权频段的旁链路传输处理方法,包括:
第一终端获取第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项;
所述第一终端确定是否可执行第一行为或是否需要执行第一行为,所述第一行为包括根据所述第一信息监听第一资源对象和根据所述第一信息使用所述第一资源对象中的至少一项;
其中,在满足第一预设条件的情况下,所述第一终端确定可执行第一行为或需要执行第一行为,所述第一预设条件包括以下至少一项:所述第一终端属于M个终端,所述M个终端包括与所述第一预设信息关联的终端中的至少部分终端,所述第一终端不属于N个终端,所述N个终端包括与所述第二预设信息关联的终端中的至少部分终端,M和N均为正整数。
第二方面,提供了一种非授权频段的旁链路传输处理方法,包括:
在第四终端获知目标信息的情况下,所述第四终端执行第四行为;
其中,所述目标信息包括以下至少一项:第二终端确定第一资源对象空闲或可用;所述第二终端成功接入或获取所述第一资源对象;第二终端使用所述第一资源对象;
所述第四行为包括以下至少一项:确定所述第一资源对象被所述第二终端占用;确定所述第一资源对象被旁链路系统占用;确定所述第一资源对象被第五标识对应的至少部分终端占用,所述第五标识对应的至少部分终端包括所述第二终端;在所述第四终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息;
所述第二信息包括以下至少一项:第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;可监听所述第二资源对象;需要监听第二资源对象;使用第二资源对象。
第三方面,提供了一种非授权频段的旁链路传输处理方法,包括:
网络侧设备向第一终端发送第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项。
第四方面,提供了一种非授权频段的旁链路传输处理的装置,应用于第一终端,包括:
获取模块,用于获取第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项;
第一确定模块,用于确定是否可执行第一行为或是否需要执行第一行为,所述第一行为包括根据所述第一信息监听第一资源对象和根据所述第一信息使用所述第一资源对象中的至少一项;
其中,在满足第一预设条件的情况下,所述第一终端确定可执行第一行为或需要执行第一行为,所述第一预设条件包括以下至少一项:所述第一终端属于M个终端,所述M个终端包括与所述第一预设信息关联的终端中的至少部分终端,所述第一终端不属于N个终端,所述N个终端包括与所述第二预设信息关联的终端中的至少部分终端,M和N均为正整数。
第五方面,提供了一种非授权频段的旁链路传输处理装置,应用于第四终端,包括:
第二执行模块,用于在所述第四终端获知目标信息的情况下,执行第四行为;
其中,所述目标信息包括以下至少一项:第二终端确定第一资源对象空闲或可用;所 述第二终端成功接入或获取所述第一资源对象;第二终端使用所述第一资源对象;
所述第四行为包括以下至少一项:确定所述第一资源对象被所述第二终端占用;确定所述第一资源对象被旁链路系统占用;确定所述第一资源对象被第五标识对应的至少部分终端占用,所述第五标识对应的至少部分终端包括所述第二终端;在所述第四终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息;
所述第二信息包括以下至少一项:第二资源对象;可监听第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;需要监听第二资源对象;使用第二资源对象。
第六方面,提供了一种非授权频段的旁链路传输处理装置,应用于网络侧设备,包括:
第二发送模块,用于向第一终端发送的第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项。
第七方面,提供了一种终端,该终端包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤,或者实现如第二方面所述的方法的步骤。
第八方面,提供了一种终端,包括处理器及通信接口,其中,所述终端为第一终端时,通信接口用于获取第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项;处理器用于确定是否可执行第一行为或是否需要执行第一行为,所述第一行为包括根据所述第一信息监听第一资源对象和根据所述第一信息使用所述第一资源对象中的至少一项;
其中,在满足第一预设条件的情况下,所述第一终端确定可执行第一行为或需要执行第一行为,所述第一预设条件包括以下至少一项:所述第一终端属于M个终端,所述M个终端包括与所述第一预设信息关联的终端中的至少部分终端,所述第一终端不属于N个终端,所述N个终端包括与所述第二预设信息关联的终端中的至少部分终端,M和N均为正整数;
或者,所述终端为第四终端时,在所述第四终端获知目标信息的情况下,处理器用于执行第四行为;
其中,所述目标信息包括以下至少一项:第二终端确定第一资源对象空闲或可用;所述第二终端成功接入或获取所述第一资源对象;第二终端使用所述第一资源对象;
所述第四行为包括以下至少一项:确定所述第一资源对象被所述第二终端占用;确定所述第一资源对象被旁链路系统占用;确定所述第一资源对象被第五标识对应的至少部分终端占用,所述第五标识对应的至少部分终端包括所述第二终端;在所述第四终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息;
所述第二信息包括以下至少一项:第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;可监听第二资源对象;需要监听第二资源对象;使用第二资源对象。
第九方面,提供了一种网络侧设备,该网络侧设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第二方面所述的方法的步骤。
第十方面,提供了一种网络侧设备,包括处理器及通信接口,其中,所述通信接口用于向第一终端发送的第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项。
第十一方面,提供了一种通信系统,包括:终端及网络侧设备,所述终端可用于执行如第一方面或第二方面所述的非授权频段的旁链路传输处理方法的步骤,所述网络侧设备可用于执行如第三方面所述的非授权频段的旁链路传输处理方法的步骤。
第十二方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤,或者实现如第二方面所述的方法的步骤。
第十三方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法的步骤,或实现如第二方面所述的方法的步骤,或实现如第三方面所述的方法的步骤。
第十四方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现如第一方面所述的方法的步骤,或实现如第二方面所述的方法的步骤,或实现如第三方面所述的方法的步骤。
本申请实施例通过第一终端获取第一信息,并确定是否可执行第一行为或是否需要执行第一行为,所述第一行为包括根据所述第一信息监听第一资源对象和根据所述第一信息使用所述第一资源对象中的至少一项。这样,由于终端可以自主决定是否根据所述第一信息监听第一资源对象和/或根据所述第一信息使用所述第一资源对象,从而增加了终端的自主选择行为,进而避免网络侧设备出现错误调度,提高了终端在非授权频段上进行SL传输的可靠性。
附图说明
图1是本申请实施例可应用的网络结构示意图;
图2是本申请实施例提供的一种非授权频段的旁链路传输处理方法的流程图;
图3是本申请实施例提供的一种非授权频段的旁链路传输处理方法应用的一种通信场景示例图;
图4是本申请实施例提供的一种非授权频段的旁链路传输处理方法应用的另一种通信场景示例图;
图5是本申请实施例提供的另一种非授权频段的旁链路传输处理方法的流程图之二;
图6是本申请实施例提供的又一种非授权频段的旁链路传输处理方法的流程图;
图7是本申请实施例提供的一种非授权频段的旁链路传输处理装置的结构图;
图8是本申请实施例提供的另一种非授权频段的旁链路传输处理装置的结构图;
图9是本申请实施例提供的又一种非授权频段的旁链路传输处理装置的结构图;
图10是本申请实施例提供的一种通信设备的结构图;
图11是本申请实施例提供的一种终端的结构图;
图12是本申请实施例提供的一种网络侧设备的结构图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,如第6代(6th Generation,6G)通信系统。
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11和网络侧设备12。其中,终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴式设备(Wearable Device)、车载设备(Vehicle User Equipment,VUE)、行人终端(Pedestrian User Equipment,PUE)、智能家居(具有无线通信功能的家居设备,如冰箱、电视、洗衣机或者家具等)、游戏机、个人计算机(personal  computer,PC)、柜员机或者自助机等终端侧设备,可穿戴式设备包括:智能手表、智能手环、智能耳机、智能眼镜、智能首饰(智能手镯、智能手链、智能戒指、智能项链、智能脚镯、智能脚链等)、智能腕带、智能服装等。需要说明的是,在本申请实施例并不限定终端11的具体类型。网络侧设备12可以包括接入网设备或核心网设备,其中,接入网设备也可以称为无线接入网设备、无线接入网(Radio Access Network,RAN)、无线接入网功能或无线接入网单元。接入网设备可以包括基站、无线局域网(Wireless Local Area Network,WLAN)接入点或WiFi节点等,基站可被称为节点B、演进节点B(eNB)、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、家用B节点、家用演进型B节点、发送接收点(Transmitting Receiving Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例进行介绍,并不限定基站的具体类型。
为了方便理解,以下对本申请实施例涉及的一些内容进行说明:
一、共享频谱或非授权频段。
在未来通信系统中,共享频谱例如非授权频段可以作为授权频段的补充帮助运营商对服务进行扩容。为了与NR部署保持一致并尽可能的最大化基于NR的非授权接入,非授权频段可以工作在5GHz,37GHz和60GHz频段。由于非授权频段由多种无线接入技术(Radio Access Technology,RAT)共用,例如WiFi和雷达,长期演进型的授权辅助接入(Long Term Evolution License Assisted Access,LTE-LAA)等,因此在某些国家或者区域,非授权频段在使用时必须符合规则(regulation)以保证所有设备可以公平的使用该资源,例如先听后说(listen before talk,LBT),最大信道占用时间(Maximum Channel Occupancy Time,MCOT)等规则。当传输节点需要发送信息时,需要先做LBT时,对周围的节点进行功率检测(energy detection,ED),当检测到的功率低于一个门限时,认为信道为空(idle),传输节点可以进行发送。反之,则认为信道为忙,传输节点不能进行发送。传输节点可以是基站、终端和WiFi接入点(Access Point,AP)等。传输节点开始传输后,占用的信道时间(Channel Occupancy Time,COT)不能超过MCOT。
常用的LBT的类型(category)可以分为category 1,category 2和category4。Category1LBT是发送节点不做LBT,即没有LBT或者立即发送(immediate transmission)。Category2LBT是一个时隙(one-shot)LBT,即节点在传输前做一次LBT,信道为空则进行传输,信道为忙则不传输。Category 4LBT是基于回退(back-off)的信道侦听机制,当传输节点侦听到信道为忙时,进行回退,继续做侦听,直到侦听到信道为空。对于NR节点(NR Node B,gNB),Category 2的LBT应用于没有解调参考信号(Dedicated Reference Signal,DRS)的物理下行共享信道(Physical Downlink Shared Channel,PDSCH),category 4的LBT应用于PDSCH、物理下行控制信道(Physical Downlink Control Channel,PDCCH)和增强的物理下行控制信道(Enhanced Physical Downlink Control Channel,ePDCCH)。对于终端, category4的LBT对应于类型1的上行信道接入流程(type1UL channel access procedure),category2的LBT对应于类型2的上行信道接入流程(type2UL channel access procedure)。
LBT包含基于帧的设备(Frame-Based Equipment,FBE)和基于负载的设备(Load Based Equipment,LBE)两类。
FBE是指设备的发送/接收定时采用周期结构,其周期为固定帧周期(Fixed Frame Period,FFP)。FBE节点采用基于LBT的信道接入机制占用信道。其中发起包含一次或多次连续传输的传输序列的节点称之为发起节点(Initiating Device),其它节点称之为响应节点(Responding Device)。FBE节点可以是发起节点、响应节点、或者同时支持两种节点功能。
对于LBE,传输节点可以从任意时刻开始进行LBT,直到侦听到信道为空方可进行传输。对传输节点来说,不存在固定的侦听时间,当侦听到信道为忙时也不需要跳过,可以通过回退(backoff)若干个增强的空闲信道评估(Enhanced Clear Channel Assessment,eCCA)继续进行侦听,直到eCCA的counter为零。
在SL上,可以采用非授权频段中的LBE的方式进行信道接入,进行信息的传输。
二、NR SL资源分配模式。
NR车联万物(NR Vehicle-to-Everything,NR V2X)支持两种资源分配模式,分别是调度资源分配(Scheduled resource allocation)模式和自主资源选择(autonomous resource selection)模式,前者通常称为模式1(mode-1),后者通常称为模式2(mode-2)。前者由网络侧设备控制并为每个UE分配资源,后者由UE自主选择资源。
Mode-1下基站可以通过下行控制信息(Downlink Control Information,DCI)为用户调度或者激活NR SL资源,该SL DCI的格式(format)为DCI format 3-0.Mode-1下基站可以通过另一种DCI format 3-1为用户激活LTE SL资源。
而mode-2下又可以进一步分为多个子模式(sub mode):
Mode2d:调度终端(scheduling UE)或头终端(header UE)可以调度其他终端的SL传输
Mode2b:终端A可以给终端B发送辅助信息以协助其SL传输;
Mode2c:终端获取静态或者半静态对的SL资源用于传输。
三、旁链路混合自动重传请求(Sidelink Hybrid Automatic Repeat Request,Sidelink HARQ)信息上报。
为了提高sidelink上数据传输的可靠度和资源利用率,在sidelink技术中也引入了HARQ反馈机制:sidelink接收用户收到物理旁链路控制信道(Physical SideLink Control Channel,PSCCH)和/或物理旁链路共享信道(Physical SideLink Shared Channel,PSSCH)后在PSCCH和/或PSSCH对应的物理旁链路反馈信道(Physical SideLink Feedback Channel,PSFCH)上反馈旁链路混合自动重传请求应答(Sidelink Hybrid Automatic Repeat Request acknowledgement,sidelink HARQ-ACK)信息来指示sidelink数据是成功还是失败。Sidelink 发送用户在sidelink上收到sidelink HARQ-ACK信息后则能知道之前的传输是成功还是失败。需要注意的是,一个sidelink用户可能是发送也可能是接收用户,即同一个用户在不同的时间或者频域上可以分别进行收或者发。
Sidelink数据包的传输可能在用户和用户之间的sidelink上进行的,因此控制节点可能无法直接知道该sidelink数据包的传输是否成功,需要由用户将Sidelink HARQ ACK信息(例如旁链路肯定确认(sidelink ACK)或否定确认(sidelink NACK)发送给控制节点,从而控制节点才可以进一步确定sidelink上的传输是否成功.Mode-1的情况下用户通过上行资源物理上行控制信道(Physical Uplink Control Channel,PUCCH)或者物理上行链路共享信道(Physical uplink shared channel,PUSCH)向控制节点报告SL HARQ信息。
SL HARQ信息上报支持通过码本形式上报,其中一个用于SL HARQ信息上报的上行资源可能关联了一个或者多个PSFCH资源,PSFCH的优先级和其他对应的SL传输的优先级有关。但是对于一些特殊的情况,接收端没有进行HARQ反馈或者发端没有检测到PSFCH,依然有SL HARQ信息。
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的非授权频段的旁链路传输处理方法进行详细地说明。
如图2所示,本申请实施例提供了一种非授权频段的旁链路传输处理方法,如图2所示,该非授权频段的旁链路传输处理方法包括:
步骤201,第一终端获取第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项;
步骤202,所述第一终端确定是否可执行第一行为或是否需要执行第一行为,所述第一行为包括根据所述第一信息监听所述第一资源对象和根据所述第一信息使用所述第一资源对象中的至少一项;
其中,在满足第一预设条件的情况下,所述第一终端确定可执行第一行为或需要执行第一行为,所述第一预设条件包括以下至少一项:所述第一终端属于M个终端,所述M个终端包括与所述第一预设信息关联的终端中的至少部分终端,所述第一终端不属于N个终端,所述N个终端包括与所述第二预设信息关联的终端中的至少部分终端,M和N均为正整数。
本申请实施例中,上述第一资源对象可以理解为资源,资源所在的信道或资源所在的载波(carrier)。
本申请实施例中,上述监听第一资源对象和/或第二资源对象也可以解释为尝试对应的信道,或者解释进行信道接入(channel access)。
应理解,在不满足第一预设条件的情况下,所述第一终端确定不可以或不需要根据第一信息监听第一资源对象和/或不可以或不需要根据第一信息使用第一资源对象。其中,第一终端不可以或不需要根据第一信息监听第一资源对象可以理解为:第一终端不可以或 不需要监听第一资源对象,或者第一终端不可以或不需要按照第一信息对应的监听方式监听第一资源对象,但是可以按照其他监听第一资源对象。
可选地,监听第一资源对象可以理解为尝试去监听第一资源对象,或者去监听第一资源对象是否空闲(idle)或者繁忙(busy)。
应理解,终端在获取到第一信息后,根据第一信息确定是否需要或者是否可以执行第一行为,从而使得获得第一信息的至少部分终端或任意终端都可以或都需要执行第一行为。这样,由于终端可以自主决定是否根据所述第一信息监听第一资源对象和/或根据所述第一信息使用所述第一资源对象,从而增加了终端的自主选择行为,进而避免网络侧设备出现错误调度,提高了终端在非授权频段上进行SL传输的可靠性。
需要说明的是,在一些实施例中,当第一信息包括第一预设信息的情况下,第一预设条件可以包括所述第一终端属于M个终端;当第一信息包括第二预设信息的情况下,第一预设条件可以包括所述第一终端不属于N个终端。
本申请实施例通过第一终端获取第一信息,并确定是否可执行第一行为或是否需要执行第一行为,所述第一行为包括根据所述第一信息监听第一资源对象和根据所述第一信息使用所述第一资源对象中的至少一项。这样,由于终端可以自主决定是否根据所述第一信息监听第一资源对象和/或根据所述第一信息使用所述第一资源对象,从而增加了终端的自主选择行为,进而避免网络侧设备出现错误调度,提高了终端在非授权频段上进行SL传输的可靠性。
可选地,在一些实施例中,所述第一预设信息与至少一个第一标识关联,所述第二预设信息与至少一个第二标识关联,所述方法还包括以下至少一项:
在所述第一终端满足第一对应关系时,所述第一终端确定所述第一终端不满足所述第一预设条件:
在所述第一终端满足第二对应关系时,所述第一终端确定所述第一终端满足所述第一预设条件:
其中,所述第一对应关系包括以下至少一项:
所述第一终端与所述至少一个第一标识中的任一个第一标识均不对应;
所述第一终端与所述至少一个第一标识中预设的第一标识不对应;
所述第一终端与所述第二标识对应;
所述第二对应关系包括以下至少一项:
所述第一终端与所述至少一个第二标识中的任一个第二标识不对应;
所述第一终端与所述至少一个第二标识中预设的第二标识不对应;
所述第一终端与所述第一标识对应。
本申请实施例中,上述子组标识也可以理解为子集标识(sub set id)。
可选地,在一些实施例中,若第一终端获得了第一信息,但第一终端和第一预设信息关联的任意第一标识都不对应,或者,和预设的第一标识不对应,或者,和第二标识对应, 则该第一可以不监听信道的是否idle/busy,或,可以不根据第一信息监听信道的是否idle/busy。
在一些实施例中,若第一终端获得了第一信息,但第一终端和第二预设信息关联的任意第二标识都不对应,或者,和预设的第二标识不对应,或者,和第一标识对应,则该第一终端可以/需要监听信道的是否idle/busy,或,可以根据预设信息监听信道的是否idle/busy。
可选地,在一些实施例中,所述第一标识包括以下至少一项:源标识(source id)、目的地标识(destination id)、终端组(UE group)对应的标识、组内的成员标识、终端配对(UE pair)对应的标识、业务对应的标识、签约参数集(profile)对应的标识、服务质量流(Quality of Service,Qos)标识、资源池标识、载波标识、带宽部分(Bandwidth Part,BWP)标识、终端所属的子组标识(sub group id)、资源块(Resource Block,RB)集合标识、信道(channel)标识、子信道(sub channel)标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识(Radio Network Temporary Identifier,RNTI);
和/或,所述第二标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第二预设信息的索引、所述第二预设信息的编号和无线网络临时标识。
例如,当第一标识destination标识时,为对于组播,对应某个destination的UE可以根据第一预设信息监听第一资源对象。
可选地,当第一标识为第一预设信息的索引(index)时,假设配置第一终端和index=1的第一预设信息关联,从而第一终端根据index=1的第一预设信息进行监听。
可选地,当第一标识为第一预设信息的编号(index)时,假设配置第一终端和编号为i的第一预设信息关联,从而第一终端根据编号为i的第一预设信息进行监听。
可选地,当第一标识和第二标识为RNTI时,具体可以为终端专用RNTI或者公共RNTI。
例如,当第二标识destination标识时,为对于组播,对应某个destination的UE可以根据第二预设信息确定其不需要进行监听第一资源对象。
可选地,当第二标识为第二预设信息的索引(index)时,假设配置第一终端和index=2的第二预设信息关联,从而第一终端根据index=1的第二预设信息确定其不需要进行监听第一资源对象。
可选地,当第二标识为第二预设信息的编号(index)时,假设配置第一终端和编号为j的第二预设信息关联,从而第一终端根据编号为j的第二预设信息确定其不需要进行监听第一资源对象。
需要说明的是,上述第一标识和/或第二标识可以是网络侧设备配置给第一终端的,也可以是第一终端根据规则推出的,或者是协议约定的,或者是与配置的。
可选地,在一些实施例中所述第一预设信息满足以下至少一项:
用于指示所述M个终端按照第一监听方式监听所述第一资源对象;
用于指示所述M个终端使用所述第一资源对象;
用于指示所述M个终端监听所述第一资源对象;
所述第一预设信息包括所述M个终端对应的终端标识;
所述第一预设信息与至少一个第一标识关联,所述M个终端为所述第一标识对应的终端中的至少部分终端。
可选地,上述第一监听方式可以为类型1的LBT,或者基于回退的LBT,或者基于计数器(counter)的LBT。其中,用于指示所述M个终端使用所述第一资源对象,可以理解为用于指示所述M个终端使用所述第一资源对象传输。用于指示所述M个终端监听所述第一资源对象可以理解为,用于指示所述M个终端按照任意监听方式监听第一资源对象,此时M个终端中的部分终端采用的监听方式可能不同或者根据其他方式另行决定的。
本申请实施例中,所述第一预设信息包括所述M个终端对应的终端标识可以理解为第一预设信息直接指示可以或者需要监听第一资源对象的M个终端,当然在第一预设信息中还可以指示除M个终端之外的其他终端。此外,上述第一预设信息与至少一个第一标识关联,可以理解为通过第一预设信息间接指示可以或者需要监听第一资源对象的M个终端。换句话说,在本申请实施例中,可以通过第一预设信息直接或间接指示获得第一信息的至少部分终端/任意终端都可以/需要去监听信道。
可选地,所述第二预设信息满足以下任一项:
用于指示所述N个终端不按照第一监听方式监听所述第一资源对象;
用于指示不使用所述第一资源对象;
用于指示所述N个终端不监听所述第一资源对象;
所述第二预设信息包括所述N个终端对应的终端标识;
所述第二预设信息与至少一个第二标识关联,所述N个终端为所述第二标识对应的终端中的至少部分终端。
应理解,在本申请实施例中,接收到第二预设信息的终端属于第二预设信息对应的终端时,该终端可以不监听第一资源对象。其中,不监听第一资源对象可以理解为不采用第一监听方式监听第一资源对象,或者不进行任何监听。
可选地,用于指示所述N个终端不使用所述第一资源对象,可以理解为用于指示所述N个终端不使用所述第一资源对象传输。用于指示所述N个终端监听所述第一资源对象可以理解为,用于指示所述N个终端针对第一资源对象不进行任何监听。
本申请实施例中,所述第二预设信息包括所述N个终端对应的终端标识可以理解为第二预设信息直接指示不可以或者不需要监听第一资源对象的N个终端,当然在第一预设信息中还可以指示除N个终端之外的其他终端。此外,上述第二预设信息与至少二个第一标 识关联,可以理解为通过第二预设信息间接指示可以或者需要监听第一资源对象的N个终端。换句话说,在本申请实施例中,可以通过第二预设信息直接或间接指示获得第一信息的至少部分终端/任意终端都不可以/不需要去监听信道。
可选地,在一些实施例中,所述第一终端获取第一信息包括:
所述第一终端从网络侧设备接收所述第一信息,
其中,所述第一信息通过以下至少一项承载:下行控制信息DCI、无线资源控制(Radio Resource Control,RRC)和媒体接入控制(Medium Access Control,MAC)信令。
本申请实施例中,上述MAC信令可以为MAC控制单元(Control Element,CE)。以下以网络侧设备通过DCI发送第一信息为例进行说明。
在一些实施例中,DCI可以通过预设RNTI进行加扰,所述预设RNTI可以为上述第一标识的至少部分,例如DCI为公共DCI,采用与某个终端组相关的RNTI进行加扰时,则只有该终端组内的终端可以解码该DCI。
在一些实施例中,该DCI可以携带多个第一预设信息和/或第二预设信息,且网络侧设备配置了终端和哪个或哪些预设信息(即第一预设信息和/或第二预设信息)存在关联关系。例如DCI为公共DCI,采用公共RNTI进行加扰,则终端解码该DCI后,需要进一步确定是否有和自己对应的预设信息。
进一步地,在一些实施例中,所述方法还包括:
所述第一终端从网络侧设备接收第一指示信息,所述第一指示信息用于指示以下任一项:激活所述第一信息、去激活所述第一信息、可使用所述第一信息、不使用所述第一信息和停止使用所述第一信息。
本申请实施例中,网络侧设备可以给至少一个终端配置一个或者多个第一信息,进一步地通过第一指示信息激活或者去激活第一信息,即通过第一信息指示终端可以根据第一信息去监听或者不监听第一资源对象。例如,网络侧设备通过RRC(该承载了第一指示信息)给一个组内的终端配置不同的资源(第一预设信息指示了这些资源)。并发送DCI激活了这些资源,即终端可以开始去监听这些资源/第一资源对象或者可以直接使用这些资源或第一资源对象。
可选地,在一些实施例中,网络侧设备可以通过RRC给一个组内的UE配置了不同的资源(预设信息指示了这些资源),并发送DCI(第二指示信息)去激活了这些资源,即UE可以开始不去监听这些资源/信道,或者可以直接不使用这些资源/信道。
可选地,在一些实施例中,所述M个终端满足以下至少一项:
为组内的头终端;
与预设的第三标识对应;
与所述第一预设信息关联的第一标识对应;
不与所述第二预设信息关联的第二标识对应;
为与所述第一标识对应的终端中目标标识最大、目标标识最小或目标标识为第一预设 值的终端,所述目标标识为终端标识、终端编号或终端索引;
与所述第一标识经过预设处理的结果对应;
为从网络侧设备接收到第二指示信息的终端,所述第二指示信息用于指示终端可监听或需要监听第一资源对象;
其中,所述第三标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识。
本申请实施例中,上述预设处理可以为求模处理,例如,第一标识为组标识,组标识对预设值Q求模后的结果为v,则和v对应的终端(即M个终端)可以或需要去监听第一资源。
针对上述第二指示信息在一些实施例还可以理解或替换为,用于指示终端可监听或需要监听资源对象。例如,网络侧设备采用额外的信令(用于指示可以或需要监听第一资源对象或其他资源对象)指示过UE需要监听,当UE获取了第一信息后,才会去监听;没有被额外的信令指示过的UE,即使获取了第一信息,也可能不会去监听。
可选地,在一些实施例中,所述第一行为满足以下任一项:
所述第一资源对象的监听方式为第一监听方式监听;
所述第一资源对象的监听方式基于网络侧设备指示和/或基于所述第一终端对应的第四标识确定;
其中,所述第四标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识。
本申请实施例中,上述M个终端可以采用第一监听方式监听第一资源对象;或者采用的监听方式满足以下至少一项:
网络侧设备配置/指示的监听方式类型信息;
与终端对应的第四标识关联。
例如终端1和终端2都和第一标识对应,从而终端1和终端2都会去监听信道,进一步地,终端1对应的sub group标识(即第四标识)为1,终端2对应的sub group标识为2,从而终端1可以基于sub group标识1确定其监听方式,终端2可以基于sub group标识2确定其监听方式。
需要说明的是,上述第四标识与第一标识可能对应相同或者不同的项。
可选地,当上述M个终端包括第一预设信息关联的全部终端时,该上述第一终端可 以理解为与第一预设信息关联的任意终端;上述N个终端包括与第二预设信息关联的全部终端时,第一终端可以理解为除与第二预设信息关联的终端之外的任意终端。在一些实施例中,获取第一信息的多个终端中属于M个终端和/或不属于N个终端的终端可以称之为目标终端,该目标终端也可以理解为获得第一信息的至少部分终端或任意终端。
在一些实施例中,获得第一信息的至少部分终端或任意终端进行箭头后,若其中终端A(可以包括一个或者多个终端)发现第一资源对象idle或可用,或者成功获取第一资源对象时,其他终端中的至少部分终端或者任意终端可以具有行为1和或行为2。其中,其他终端可以为上述目标终端中除终端A之外的终端,也可以理解为与终端A对应相同标识A的终端,该标识A的范围与第一标识的范围相同,且标识A和第一标识可以具有相同或者不同的项。
可选地,在一些实施例中,可以在其他终端中的至少部分终端或者任意终端接收到A发送的SL信号/信道时,执行行为1和/或行为2。
可选地,行为1包括以下至少一项:
认为该第一资源对象被终端A占用;
认为该第一资源对象被SL系统占用;
认为该第一资源对象被和标识A对应的至少部分终端占用。
可选地,行为2包括以下至少一项:
确定可以或需要使用第二监听方式去监听第二资源对象。该第二资源对象与第一资源对象至少部分重叠。
可选地,该第二监听方式与第一监听方式不同。在一些实施例中,第二监听方式的监听时长小于第一监听方式的监听时长。例如,该第二监听方式可以包括type2、typ2a,type2b、type2d和type2c等监听方式。
本申请实施例中,上述其他终端还需要满足以下至少一项:
需要向所述终端A发送消息或响应;
为所述终端A所属的终端组内的成员终端;
与预设的第三标识对应;
与所述第一预设信息关联的第一标识对应;
不与所述第二预设信息关联的第二标识对应;
为与所述第一标识对应的终端中目标标识最大、目标标识最小或目标标识为第一预设值的终端,所述目标标识为终端标识、终端编号或终端索引;
与所述第一标识经过预设处理的结果对应;
为从网络侧设备接收到第一指示信息的终端,所述第一指示信息用于指示所述第一指示信息用于指示以下任一项:激活所述第一信息、去激活所述第一信息、可使用所述第一信息、不使用所述第一信息和停止使用所述第一信息;
为从网络侧设备接收到第四指示信息的终端,所述第四指示信息用于指示终端可监听 或需要监听所述第二资源对象。
本申请实施例中,网络侧设备可以指示哪些终端可以在获得的资源上(比如获得的COT内)传输。具体地,网络侧设备可以指示这些终端的相关标识,例如通过指示source id或destination id,来指示符合相应的终端可以在获得的COT内传输。可选地,网络侧设备可以告知终端A哪些终端可以在终端A获得的资源上(比如获得的COT内)传输,哪些终端可以或需要去监听终端A获得的资源。具体地,网络侧设备可以将这些终端的相关标识指示给终端A。
可选地,上述终端A和被基站指示的终端为mode-1终端,或者使用被基站调度模式的终端。
可选地,在一些实施例中,上述终端A可以认为上述其他终端中的至少部分终端或者任意终端可以或者需要使用第二资源对象,或者认为可以监听或者需要监听第二资源对象。
进一步地,终端A可以指示和该终端A对应相同标识A的其他终端的至少部分可以使用或者需要使用第二资源对象,或者指示可以监听或者需要监听第二资源对象。
例如终端A指示终端B去共享终端A获得的COT;又例如,终端A可以指示终端B去终端A获得的COT进行传输;又例如,终端A指示终端B使用第二监听方式去监听第二资源对象。
进一步地,上述其他终端中的至少部分可以使用或需要第二资源对象,或者可以监听或者需要去监听第二资源对象。例如其他终端自动默认自己可以使用终端A的COT,或者其他终端认为自己需要去监听信道。
需要说明的是,在本申请实施例中,当终端A抢占了资源对象后,其他终端可以直接使用该资源对象,或者提供第二监听方式监听第二资源对象,这样可以提高终端接入的成功率,并且可以达到省电的效果,提高了资源利用率。
在一些实施例中,被终端A指示了可以使用第二资源对象的和与终端A对应相同标识A的终端可以使用该第二资源对象传输。例如,终端B和终端A在一个终端组内,终端A获得了第一资源对象,并指示终端B可以共享COT,则终端B可以在COT内进行传输。
在一些实施例中,和终端A对应相同标识A的其他终端还可以具有以下行为:
使用第二监听方式去监听第二资源对象,进一步地,监听成功后认为自己也可以使用该第二资源对象。
采用的监听方式和以下至少一项有关:1、网络侧设备配置/指示的监听方式类型信息,2、终端对应的标识。
其中,终端对应的标识可以与第一标识或第二标识的范围一项,但是可能对应相同或者不同项。
需要说明的是,针对上述第一终端可以属于不同的终端(终端A或其他终端),对应的行为不同,以下对此进行详细说明。
可选地,在一些实施例中,所述第一终端确定是否可执行第一行为或是否需要执行第一行为之后,所述方法还包括:
在所述第一终端获知目标信息的情况下,所述第一终端执行第二行为;
其中,所述目标信息包括以下至少一项:第二终端确定所述第一资源对象空闲或可用;所述第二终端成功接入或获取所述第一资源对象;第二终端使用所述第一资源对象;
所述第二行为包括以下至少一项:确定所述第一资源对象被所述第二终端占用;确定所述第一资源对象被旁链路系统占用;确定所述第一资源对象被第五标识对应的至少部分终端占用,所述第五标识对应的至少部分终端包括所述第二终端;在所述第一终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息;
所述第二信息包括以下至少一项:第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;可监听所述第二资源对象;需要监听第二资源对象;使用第二资源对象。
本申请实施例中,上述第一终端可以理解为上述其他终端的至少部分终端中的终端或者上述其他终端中的任意终端。上述第二终端可以理解为终端A。
第三指示信息指示第二资源对象可以理解为,第二终端指示COT给第一终端,第一终端收到COT的指示后,就默认自己可以在COT上传输。上述第三指示信息指示第一终端的监听方式时可以type2,即指示第一终端采用type2的监听方式监听第二资源对象。
可选地,所述第二行为满足以下任一项:
所述第二资源对象的监听方式为第二监听方式;
所述第二资源对象的监听方式基于网络侧设备指示和/或基于所述第一终端对应的第四标识确定;
其中,所述第四标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识。
可选地,所述第一终端满足以下至少一项:
需要向所述第二终端发送消息或响应;
为所述第二终端所属的终端组内的成员终端;
与预设的第三标识对应;
与所述第一预设信息关联的第一标识对应;
不与所述第二预设信息关联的第二标识对应;
为与所述第一标识对应的终端中目标标识最大、目标标识最小或目标标识为第一预设值的终端,所述目标标识为终端标识、终端编号或终端索引;
与所述第一标识经过预设处理的结果对应;
为从网络侧设备接收到第一指示信息的终端,所述第一指示信息用于指示所述第一指示信息用于指示以下任一项:激活所述第一信息、去激活所述第一信息、可使用所述第一信息、不使用所述第一信息和停止使用所述第一信息;
为从网络侧设备接收到第四指示信息的终端,所述第四指示信息用于指示终端可监听或需要监听所述第二资源对象。
可选地,在一些实施例中,所述第一终端确定是否可执行第一行为或是否需要执行第一行为之后,所述方法还包括:
在满足第二预设条件的情况下,所述第一终端执行第三行为;
其中,所述第三行为包括以下至少一项:确定第三终端可监听或需要监听第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;可使用或需要使用所述第二资源对象;
所述第二预设条件包括以下至少一项:第一终端发现所述第一资源对象空闲或可用;所述第一终端成功获取所述第一资源对象,所述第一终端使用所述第一资源对象;
所述第三终端为与所述第一终端对应相同第四标识的终端中的至少部分终端,源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识。
本申请实施例中,上述第一终端可以理解为终端A,上述第三终端可以理解为上述其他终端的至少部分终端中的终端或者上述其他终端中的任意终端。
可选地,在满足第二预设条件的情况下,所述第一终端确定第三终端可监听或需要监听所述第二资源对象之后,所述方法还包括:
所述第一终端向所述第三终端发送第五指示信息,所述第五指示信息用于指示以下至少一项:所述第三终端可监听第二资源对象,所述第三终端需要监听第二资源对象,所述第三终端使用第二资源对象,所述第二资源对象,所述第三终端的监听方式。
本申请实施例中,由于通过第一终端指示第三终端后,第三终端才可以进行监听或者使用第二资源对象,从而可以提高传输的针对性,避免其他终端恶意使用第二资源对象,进而提升了传输的可靠性。
可选地,所述第三终端满足以下至少一项:
需要向所述第一终端发送消息或响应;
为所述第一终端所属的终端组内的成员终端;
与预设的第三标识对应;
与所述第一预设信息关联的第一标识对应;
不与所述第二预设信息关联的第二标识对应;
为与所述第一标识对应的终端中目标标识最大、目标标识最小或目标标识为第一预设 值的终端,所述目标标识为终端标识、终端编号或终端索引;
与所述第一标识经过预设处理的结果对应;
为从网络侧设备接收到第一指示信息的终端,所述第一指示信息用于指示以下任一项:激活所述第一信息、去激活所述第一信息、可使用所述第一信息、不使用所述第一信息和停止使用所述第一信息;
为从网络侧设备接收到第六指示信息的终端,所述第六指示信息用于指示所述第三终端可监听或需要监听所述第二资源对象。
可选地,在一些实施例中,所述方法还包括:
所述第一终端向网络侧设备发送第三信息,所述第三信息包括以下至少一项:
所述第一终端获得可用的信道占用时间的时长;
是否成功获得或使用所述第一资源对象的第四指示信息;
监听所述第一资源对象的监听方式
所述第一终端的终端信息;
所述第一终端的SL传输对应的混合自动重传请求应答HARQ-ACK信息;
所述第一终端的SL传输失败对应的混合自动重传请求应答HARQ-ACK信息。
本申请实施例中,上述第一终端获得可用的信道占用时间的时长可以通过以下至少一项进行指示:COT类型、COT优先级,COT限制(比如最大COT长度,最小COT长度),COT起点、COT长度和COT终点。由于终端向网络侧设备反馈了第三信息,使得网络侧设备可以获知终端接入信道或资源的情况,从而可以辅助网络侧设备对终端的调度,避免出现错误的调度,以进一步提高SL传输的可靠性。
可选地,上述第一终端的终端信息可以包括终端的身份信息,从而告知网络侧设备哪个终端获得了COT。
可选地,在一些实施例中,可以设计一个终端给网络侧设备发送了上述第三信息,则表示该终端或某些终端成功获得了第一资源对象,或,表示该终端或某些终端没有成功获得该信道。
可选地,在一些实施例中,还可以设计一个终端若没有给网络侧设备发送上述第三信息,则表示该终端或某些终端成功获得了第一资源对象。
可选地,在一些实施例中,所述监听信息包括以下至少一项:
监听或接入(例如先听后说LBT)次数,或,监听或接入(例如LBT)最大次数;
监听或接入(例如LBT)失败次数,或,监听或接入(例如LBT)失败最大次数;
监听或接入(例如LBT)成功间隔、监听或接入(例如LBT)成功最大间隔,或,监听或接入(例如LBT)成功最小间隔。
本申请实施例中,上述LBT次数可以理解为CCA次数或者eCCA次数或者LBT计数器的值,上述LBT最大次数可以理解为CCA最大次数或者eCCA最大次数或者LBT计数器的最大值。
上述失败可以理解为累计失败或连续失败。上述LBT失败次数可以理解为CCA失败次数或者eCCA失败次数或者LBT计数器保持不变的次数,上述LBT失败最大次数可以理解为CCA失败最大次数或者eCCA失败最大次数或者LBT计数器保持不变的最大次数。
上述成功间隔可以理解为累计成功间隔或者连续成功间隔。例如间隔值为2,则监听信息可以包括2次成功的CCA或2次成功的eCCA之间的间隔/最大间隔。或者,监听信息可以包括2次LBT计数器(counter)减少时之间的间隔或counter保持不变的次数,两次LBT counter减少时之间的最大间隔或最小间隔或保持不变的最大次数或保持不变的最小次数。
可选地,在一些实施例中,所述预设资源包括以下至少一项:
时间段;
定时器对应的时间资源;
监听或接入(例如LBT)次数,或,监听或接入(例如LBT)最大次数对应的资源;
监听或接入(例如LBT)失败次数,或,监听或接入(例如LBT)最大失败次数对应的资源;
监听或接入(例如LBT)成功间隔,或,监听或接入(例如LBT)成功最大间隔对应的资源。
针对上述时间段可以理解为上述预设资源的时间段。
针对上述定时器,可以认为该定时器运行期间对应的时间资源为预设资源,或者该定时器结束后对应的时间资源为预设资源。
可选地,在一些实施例中,所述预设资源的信息包括以下至少一项:
时间长度信息;
时间点信息;
偏移信息;
参考时间点信息。
上述时间长度信息可以包括时间段或定时器时长;上述时间点信息可以为可以包括时间段或定时器的起点/终点/开始时间点/停止时间点/暂停时间点/重启时间点;上述偏移信息可以包括时间段或定时器开启或结束或暂停或重启的时间点相对某个参考时间点的偏移;上述参考时间点信息可以包括直接帧数(Direct Frame Number,DFN)0、系统帧号(System frame number,SFN)0、时隙0、子帧0或符号0。
可选地,在一些实施例中,所述根据所述第一信息监听所述第一资源对象包括:
监听所述预设资源是否空闲或者繁忙;
在所述预设资源的范围内监听所述第一资源对象所否空闲或者繁忙。
可选地,所述预设资源包括至少两个资源子集,每一资源子集与至少一个终端或终端组或终端配对或第六标识关联,所述第一终端确定是否可执行第一行为或是否需要执行第一行为包括:
所述第一终端确定是否可在所述第一终端关联的资源子集执行第一行为或是否需要在所述第一终端关联的资源子集执行第一行为。
例如,在一些实施例中,预设资源包含多个band或RB set或carrier或资源池,终端对应的标识可能分别关联不同的band或RB set或carrier或资源池,从而不同终端可能监听不同的band或RB set或carrier或资源池。
例如,在一些实施例中,预设资源包含多个band或RB set或carrier或资源池,终端对应的标识可能分别关联不同的band或RB set或carrier或资源池,从而不同终端可能使用不同的band或RB set或carrier或资源池。
需要说明的是,在根据所述第一信息监听所述第一资源对象的过程中,若达到或超过了监听或接入(例如LBT)对应的次数限制或间隔限制,则终端可以不再监听或接入。进一步地,可以向网络侧设备反馈目标反馈信息,所述目标反馈信息用于指示以下至少一项:终端监听或接入(例如LBT)达到或超过了对应的次数限制或间隔限制,所述终端不再进行监听或接入。
为了更好的理解本申请,以下通过一些具体实例进行说明。
在一些实施例中,如图3所示,终端1和终端2对应同一个组,组的destination id=1,终端3和终端4对应同一个组,组的destination id=2,RNTI1和destination id=1关联,RNTI2和destination id=2关联,基站发送了两个DCI,分别用RNTI1和RNTI2加扰,终端1和终端2解码DCI1后获得了DCI1指示的预设资源信息,并进行监听,终端1LBT成功获得了COT。终端3和终端4解码DCI2后获得了DCI2指示的预设资源信息,并进行监听,终端3LBT成功获得了COT。
在一些实施例中,如图4所示,终端1和终端2对应同一个组,组的destination id=1,终端3和终端4对应同一个组,组的destination id=2,基站发送了1个DCI,分别用common RNTI加扰,该DCI指示了时间段0、时间段1至时间段n的信息。基站配置终端1和终端2和DCI指示的时间段0关联,因此终端1和终端2解码DCI后获得了DCI1指示的时间段0的信息,并进行监听,基站配置终端3和终端4和DCI指示的时间段n关联,因此终端1和终端2解码DCI后获得了DCI1指示的时间段n的信息,并进行监听。
参照图5,本申请实施例还提供了一种非授权频段的旁链路传输处理方法,如图5所示,该非授权频段的旁链路传输处理方法可以包括:
步骤501,在第四终端获知目标信息的情况下,所述第四终端执行第四行为;
其中,所述目标信息包括以下至少一项:第二终端确定第一资源对象空闲或可用;所述第二终端成功接入或获取所述第一资源对象;第二终端使用所述第一资源对象;
所述第四行为包括以下至少一项:确定所述第一资源对象被所述第二终端占用;确定所述第一资源对象被旁链路系统占用;确定所述第一资源对象被第五标识对应的至少部分终端占用,所述第五标识对应的至少部分终端包括所述第二终端;在所述第四终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息;
所述第二信息包括以下至少一项:第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;可监听所述第二资源对象;需要监听第二资源对象;使用第二资源对象。
本申请实施例中,上述第四终端可以理解为上述实施例中的其他终端,第二终端可以理解为终端A。该第四终端与上述第一终端的区别是第四终端未获取到上述第一信息,而第一终端获取到了上述第一信息。
可选地,在所述第四终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息包括:
在所述第四终端属于所述第五标识对应的至少部分终端、且接收到所述第二终端发送的第七指示信息的情况下,确定第二信息;
其中,所述第七指示信息用于指示以下至少一项:第二资源对象,所述第四终端可监听第二资源对象,所述第四终端需要监听第二资源对象,所述第四终端使用第二资源对象,所述第二资源对象,所述第四终端的监听方式。
可选地,所述第四行为满足以下任一项:
所述第二资源对象的监听方式为第二监听方式;
所述第二资源对象的监听方式基于网络侧设备指示和/或基于所述第四终端对应的第四标识确定;
其中,所述第四标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、第一预设信息的索引、第一预设信息的编号和无线网络临时标识。
可选地,所述第四终端满足以下至少一项:
需要向所述第二终端发送消息或响应;
为所述第二终端所属的终端组内的成员终端;
与预设的第三标识对应;
与第一预设信息关联的第一标识对应;
不与第二预设信息关联的第二标识对应;
为与所述第一标识对应的终端中目标标识最大、目标标识最小或目标标识为第一预设值的终端,所述目标标识为终端标识、终端编号或终端索引;
与所述第一标识经过预设处理的结果对应;
为从网络侧设备接收到第八指示信息的终端,所述第八指示信息用于指示终端可监听或需要监听所述第二资源对象;
其中,所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项。
参照图6,本申请实施例还提供了一种非授权频段的旁链路传输处理方法,如图6所示,该非授权频段的旁链路传输处理方法可以包括:
步骤601,网络侧设备向第一终端发送第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项。
可选地,所述第一标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识;
和/或,所述第二标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第二预设信息的索引、所述第二预设信息的编号和无线网络临时标识。
可选地,所述第一预设信息满足以下至少一项:
用于指示M个终端按照第一监听方式监听第一资源对象,所述M个终端包括与所述第一预设信息关联的终端中的至少部分终端,M为正整数;
用于指示所述M个终端使用所述第一资源对象;
用于指示所述M个终端监听所述第一资源对象;
所述第一预设信息包括所述M个终端对应的终端标识;
所述第一预设信息与至少一个第一标识关联,所述M个终端为所述第一标识对应的终端中的至少部分终端。
可选地,所述第二预设信息满足以下任一项:
用于指示N个终端不按照第一监听方式监听第一资源对象,所述N个终端包括与所述第二预设信息关联的终端中的至少部分终端,N为正整数;
用于指示不使用所述第一资源对象;
用于指示所述N个终端不监听所述第一资源对象;
所述第二预设信息包括所述N个终端对应的终端标识;
所述第二预设信息与至少一个第二标识关联,所述N个终端为所述第二标识对应的终端中的至少部分终端。
可选地,所述方法还包括:
所述网络侧设备发送第一指示信息,所述第一指示信息用于指示以下任一项:激活所述第一信息、去激活所述第一信息、可使用所述第一信息和停止使用所述第一信息。
可选地,所述方法还包括:
所述网络侧设备从第一终端接收第三信息,所述第三信息包括以下至少一项:
所述第一终端获得可用的信道占用时间的时长;
是否成功获得或使用第一资源对象的第四指示信息;
监听所述第一资源对象的监听方式
所述第一终端的终端信息;
所述第一终端的SL传输对应的混合自动重传请求应答HARQ-ACK信息;
所述第一终端的SL传输失败对应的混合自动重传请求应答HARQ-ACK信息。
可选地,所述监听信息包括以下至少一项:
监听或接入次数,或者,监听或接入最大次数;
监听或接入失败次数,或者,监听或接入失败最大次数;
监听或接入成功间隔,或者,监听或接入成功最大间隔,或者,监听或接入成功最小间隔。
可选地,所述预设资源包括以下至少一项:
时间段;
定时器对应的时间资源;
监听或接入次数,或者,监听或接入最大次数对应的资源;
监听或接入失败次数,或者,监听或接入最大失败次数对应的资源;
监听或接入成功间隔,或者,监听或接入成功最大间隔对应的资源。
可选地,所述预设资源的信息包括以下至少一项:
时间长度信息;
时间点信息;
偏移信息;
参考时间点信息。
本申请实施例提供的非授权频段的旁链路传输处理方法,执行主体可以为非授权频段的旁链路传输处理装置。本申请实施例中以非授权频段的旁链路传输处理装置执行非授权频段的旁链路传输处理方法为例,说明本申请实施例提供的非授权频段的旁链路传输处理装置。
参照图7、本申请实施例了一种非授权频段的旁链路传输处理装置,如图7所示,该非授权频段的旁链路传输处理装置700包括:
获取模块701,用于获取第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项;
第一确定模块702,用于确定是否可执行第一行为或是否需要执行第一行为,所述第一行为包括根据所述第一信息监听第一资源对象和根据所述第一信息使用所述第一资源对象中的至少一项;
其中,在满足第一预设条件的情况下,所述第一终端确定可执行第一行为或需要执行第一行为,所述第一预设条件包括以下至少一项:所述第一终端属于M个终端,所述M个终端包括与所述第一预设信息关联的终端中的至少部分终端,所述第一终端不属于N个终端,所述N个终端包括与所述第二预设信息关联的终端中的至少部分终端,M和N均为正整数。
可选地,所述第一预设信息与至少一个第一标识关联,所述第二预设信息与至少一个第二标识关联,所述方法还包括以下至少一项:
在所述第一终端满足第一对应关系时,所述第一终端确定所述第一终端不满足所述第一预设条件:
在所述第一终端满足第二对应关系时,所述第一终端确定所述第一终端满足所述第一预设条件:
其中,所述第一对应关系包括以下至少一项:
所述第一终端与所述至少一个第一标识中的任一个第一标识均不对应;
所述第一终端与所述至少一个第一标识中预设的第一标识不对应;
所述第一终端与所述第二标识对应;
所述第二对应关系包括以下至少一项:
所述第一终端与所述至少一个第二标识中的任一个第二标识不对应;
所述第一终端与所述至少一个第二标识中预设的第二标识不对应;
所述第一终端与所述第一标识对应。
可选地,所述第一标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识;
和/或,所述第二标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第二预设信息的索引、所述第二预设信息的编号和无线网络临时标识。
可选地,所述第一预设信息满足以下至少一项:
用于指示所述M个终端按照第一监听方式监听所述第一资源对象;
用于指示所述M个终端使用所述第一资源对象;
用于指示所述M个终端监听所述第一资源对象;
所述第一预设信息包括所述M个终端对应的终端标识;
所述第一预设信息与至少一个第一标识关联,所述M个终端为所述第一标识对应的 终端中的至少部分终端。
可选地,所述第二预设信息满足以下任一项:
用于指示所述N个终端不按照第一监听方式监听所述第一资源对象;
用于指示不使用所述第一资源对象;
用于指示所述N个终端不监听所述第一资源对象;
所述第二预设信息包括所述N个终端对应的终端标识;
所述第二预设信息与至少一个第二标识关联,所述N个终端为所述第二标识对应的终端中的至少部分终端。
可选地,所述获取模块701具体用于:从网络侧设备接收所述第一信息,
其中,所述第一信息通过以下至少一项承载:下行控制信息DCI、无线资源控制RRC和媒体接入控制MAC信令。
可选地,所述非授权频段的旁链路传输处理装置700还包括:
第一接收模块,用于从网络侧设备接收第一指示信息,所述第一指示信息用于指示以下任一项:激活所述第一信息、去激活所述第一信息、可使用所述第一信息、不使用所述第一信息和停止使用所述第一信息。
可选地,所述M个终端满足以下至少一项:
为组内的头终端;
与预设的第三标识对应;
与所述第一预设信息关联的第一标识对应;
不与所述第二预设信息关联的第二标识对应;
为与所述第一标识对应的终端中目标标识最大、目标标识最小或目标标识为第一预设值的终端,所述目标标识为终端标识、终端编号或终端索引;
与所述第一标识经过预设处理的结果对应;
为从网络侧设备接收到第二指示信息的终端,所述第二指示信息用于指示终端可监听或需要监听第一资源对象;
其中,所述第三标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识。
可选地,所述第一行为满足以下任一项:
所述第一资源对象的监听方式为第一监听方式监听;
所述第一资源对象的监听方式基于网络侧设备指示和/或基于所述第一终端对应的第四标识确定;
其中,所述第四标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、 组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识。
可选地,所述非授权频段的旁链路传输处理装置700还包括:
第一执行模块,用于在所述第一终端获知目标信息的情况下,所述第一终端执行第二行为;
其中,所述目标信息包括以下至少一项:第二终端确定所述第一资源对象空闲或可用;所述第二终端成功接入或获取所述第一资源对象;第二终端使用所述第一资源对象;
所述第二行为包括以下至少一项:确定所述第一资源对象被所述第二终端占用;确定所述第一资源对象被旁链路系统占用;确定所述第一资源对象被第五标识对应的至少部分终端占用,所述第五标识对应的至少部分终端包括所述第二终端;在所述第一终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息;
所述第二信息包括以下至少一项:第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;可监听所述第二资源对象;需要监听第二资源对象;使用第二资源对象。
可选地,在所述第一终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息包括:
在所述第一终端属于所述第五标识对应的至少部分终端、且接收到所述第二终端发送的第三指示信息的情况下,确定第二信息;
其中,所述第三指示信息用于指示以下至少一项:第二资源对象,所述第一终端可监听第二资源对象,所述第一终端需要监听第二资源对象,所述第一终端使用第二资源对象,所述第二资源对象,所述第一终端的监听方式。
可选地,所述第二行为满足以下任一项:
所述第二资源对象的监听方式为第二监听方式;
所述第二资源对象的监听方式基于网络侧设备指示和/或基于所述第一终端对应的第四标识确定;
其中,所述第四标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识。
可选地,所述第一终端满足以下至少一项:
需要向所述第二终端发送消息或响应;
为所述第二终端所属的终端组内的成员终端;
与预设的第三标识对应;
与所述第一预设信息关联的第一标识对应;
不与所述第二预设信息关联的第二标识对应;
为与所述第一标识对应的终端中目标标识最大、目标标识最小或目标标识为第一预设值的终端,所述目标标识为终端标识、终端编号或终端索引;
与所述第一标识经过预设处理的结果对应;
为从网络侧设备接收到第一指示信息的终端,所述第一指示信息用于指示所述第一指示信息用于指示以下任一项:激活所述第一信息、去激活所述第一信息、可使用所述第一信息、不使用所述第一信息和停止使用所述第一信息;
为从网络侧设备接收到第四指示信息的终端,所述第四指示信息用于指示终端可监听或需要监听所述第二资源对象。
可选地,非授权频段的旁链路传输处理装置700还包括:
第一执行模块,用于在满足第二预设条件的情况下,执行第三行为;
其中,所述第三行为包括以下至少一项:确定第三终端可监听或需要监听第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;可使用或需要使用所述第二资源对象;
所述第二预设条件包括以下至少一项:第一终端发现所述第一资源对象空闲或可用;所述第一终端成功获取所述第一资源对象,所述第一终端使用所述第一资源对象;
所述第三终端为与所述第一终端对应相同第四标识的终端中的至少部分终端,源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识。
可选地,在满足第二预设条件的情况下,所述第一终端确定第三终端可监听或需要监听所述第二资源对象之后,所述方法还包括:
所述第一终端向所述第三终端发送第五指示信息,所述第五指示信息用于指示以下至少一项:所述第三终端可监听第二资源对象,所述第三终端需要监听第二资源对象,所述第三终端使用第二资源对象,所述第二资源对象,所述第三终端的监听方式。
可选地,所述第三终端满足以下至少一项:
需要向所述第一终端发送消息或响应;
为所述第一终端所属的终端组内的成员终端;
与预设的第三标识对应;
与所述第一预设信息关联的第一标识对应;
不与所述第二预设信息关联的第二标识对应;
为与所述第一标识对应的终端中目标标识最大、目标标识最小或目标标识为第一预设 值的终端,所述目标标识为终端标识、终端编号或终端索引;
与所述第一标识经过预设处理的结果对应;
为从网络侧设备接收到第一指示信息的终端,所述第一指示信息用于指示以下任一项:激活所述第一信息、去激活所述第一信息、可使用所述第一信息、不使用所述第一信息和停止使用所述第一信息;
为从网络侧设备接收到第六指示信息的终端,所述第六指示信息用于指示所述第三终端可监听或需要监听所述第二资源对象。
可选地,非授权频段的旁链路传输处理装置700还包括:
第一发送模块,用于向网络侧设备发送第三信息,所述第三信息包括以下至少一项:
所述第一终端获得可用的信道占用时间的时长;
是否成功获得或使用所述第一资源对象的第四指示信息;
监听所述第一资源对象的监听方式
所述第一终端的终端信息;
所述第一终端的SL传输对应的混合自动重传请求应答HARQ-ACK信息;
所述第一终端的SL传输失败对应的混合自动重传请求应答HARQ-ACK信息。
可选地,所述监听信息包括以下至少一项:
监听或接入次数,或者,监听或接入最大次数;
监听或接入失败次数,或者,监听或接入失败最大次数;
监听或接入成功间隔,或者,监听或接入成功最大间隔,或者,监听或接入成功最小间隔。
可选地,所述预设资源包括以下至少一项:
时间段;
定时器对应的时间资源;
监听或接入次数,或者,监听或接入最大次数对应的资源;
监听或接入失败次数,或者,监听或接入最大失败次数对应的资源;
监听或接入成功间隔,或者,监听或接入成功最大间隔对应的资源。
可选地,所述预设资源的信息包括以下至少一项:
时间长度信息;
时间点信息;
偏移信息;
参考时间点信息。
可选地,所述根据所述第一信息监听所述第一资源对象包括:
监听所述预设资源是否空闲或者繁忙;
在所述预设资源的范围内监听所述第一资源对象所否空闲或者繁忙。
可循阿迪,所述预设资源包括至少两个资源子集,每一资源子集与至少一个终端或终 端组或终端配对或第六标识关联,所述第一确定模块702具体用于:确定是否可在所述第一终端关联的资源子集执行第一行为或是否需要在所述第一终端关联的资源子集执行第一行为。
参照图8、本申请实施例了一种非授权频段的旁链路传输处理装置,如图8所示,该非授权频段的旁链路传输处理装置800包括:
第二执行模块801,用于在所述第四终端获知目标信息的情况下,执行第四行为;
其中,所述目标信息包括以下至少一项:第二终端确定第一资源对象空闲或可用;所述第二终端成功接入或获取所述第一资源对象;第二终端使用所述第一资源对象;
所述第四行为包括以下至少一项:确定所述第一资源对象被所述第二终端占用;确定所述第一资源对象被旁链路系统占用;确定所述第一资源对象被第五标识对应的至少部分终端占用,所述第五标识对应的至少部分终端包括所述第二终端;在所述第四终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息;
所述第二信息包括以下至少一项:第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;可监听第二资源对象;需要监听第二资源对象;使用第二资源对象。
可选地,在所述第四终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息包括:
在所述第四终端属于所述第五标识对应的至少部分终端、且接收到所述第二终端发送的第七指示信息的情况下,确定第二信息;
其中,所述第七指示信息用于指示以下至少一项:第二资源对象,所述第四终端可监听第二资源对象,所述第四终端需要监听第二资源对象,所述第四终端使用第二资源对象,所述第二资源对象,所述第四终端的监听方式。
可选地,所述第四行为满足以下任一项:
所述第二资源对象的监听方式为第二监听方式;
所述第二资源对象的监听方式基于网络侧设备指示和/或基于所述第四终端对应的第四标识确定;
其中,所述第四标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、第一预设信息的索引、第一预设信息的编号和无线网络临时标识。
可选地,所述第四终端满足以下至少一项:
需要向所述第二终端发送消息或响应;
为所述第二终端所属的终端组内的成员终端;
与预设的第三标识对应;
与第一预设信息关联的第一标识对应;
不与第二预设信息关联的第二标识对应;
为与所述第一标识对应的终端中目标标识最大、目标标识最小或目标标识为第一预设值的终端,所述目标标识为终端标识、终端编号或终端索引;
与所述第一标识经过预设处理的结果对应;
为从网络侧设备接收到第八指示信息的终端,所述第八指示信息用于指示终端可监听或需要监听所述第二资源对象;
其中,所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项。
参照图9、本申请实施例了一种非授权频段的旁链路传输处理装置,如图9所示,该非授权频段的旁链路传输处理装置900包括:
第二发送模块901,用于向第一终端发送第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项。
可选地,所述第一预设信息与至少一个第一标识关联,所述第二预设信息与至少一个第二标识关联,所述非授权频段的旁链路传输处理装置900还包括第二确定模块,所述第二确定模块用于执行以下至少一项:
在所述第一终端满足第一对应关系时,所述第一终端确定所述第一终端不满足所述第一预设条件:
在所述第一终端满足第二对应关系时,所述第一终端确定所述第一终端满足所述第一预设条件:
其中,所述第一对应关系包括以下至少一项:
所述第一终端与所述至少一个第一标识中的任一个第一标识均不对应;
所述第一终端与所述至少一个第一标识中预设的第一标识不对应;
所述第一终端与所述第二标识对应;
所述第二对应关系包括以下至少一项:
所述第一终端与所述至少一个第二标识中的任一个第二标识不对应;
所述第一终端与所述至少一个第二标识中预设的第二标识不对应;
所述第一终端与所述第一标识对应。
可选地,所述第一标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识;
和/或,所述第二标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务 质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第二预设信息的索引、所述第二预设信息的编号和无线网络临时标识。
可选地,所述第一预设信息满足以下至少一项:
用于指示M个终端按照第一监听方式监听第一资源对象,所述M个终端包括与所述第一预设信息关联的终端中的至少部分终端,M为正整数;
用于指示所述M个终端使用所述第一资源对象;
用于指示所述M个终端监听所述第一资源对象;
所述第一预设信息包括所述M个终端对应的终端标识;
所述第一预设信息与至少一个第一标识关联,所述M个终端为所述第一标识对应的终端中的至少部分终端。
可选地,所述第二预设信息满足以下任一项:
用于指示N个终端不按照第一监听方式监听第一资源对象,所述N个终端包括与所述第二预设信息关联的终端中的至少部分终端,N为正整数;
用于指示不使用所述第一资源对象;
用于指示所述N个终端不监听所述第一资源对象;
所述第二预设信息包括所述N个终端对应的终端标识;
所述第二预设信息与至少一个第二标识关联,所述N个终端为所述第二标识对应的终端中的至少部分终端。
可选地,所述第二发送模块901还用于:发送第一指示信息,所述第一指示信息用于指示以下任一项:激活所述第一信息、去激活所述第一信息、可使用所述第一信息和停止使用所述第一信息。
可选地,所述非授权频段的旁链路传输处理装置900还包括:
第二接收模块,用于从第一终端接收第三信息,所述第三信息包括以下至少一项:
所述第一终端获得可用的信道占用时间的时长;
是否成功获得或使用第一资源对象的第四指示信息;
监听所述第一资源对象的监听方式
所述第一终端的终端信息;
所述第一终端的SL传输对应的混合自动重传请求应答HARQ-ACK信息;
所述第一终端的SL传输失败对应的混合自动重传请求应答HARQ-ACK信息。
可选地,所述监听信息包括以下至少一项:
监听或接入次数,或者,监听或接入最大次数;
监听或接入失败次数,或者,监听或接入失败最大次数;
监听或接入成功间隔,或者,监听或接入成功最大间隔,或者,监听或接入成功最小间隔。
可选地,所述预设资源包括以下至少一项:
时间段;
定时器对应的时间资源;
监听或接入次数,或者,监听或接入最大次数对应的资源;
监听或接入失败次数,或者,监听或接入最大失败次数对应的资源;
监听或接入成功间隔,或者,监听或接入成功最大间隔对应的资源。
可选地,所述预设资源的信息包括以下至少一项:
时间长度信息;
时间点信息;
偏移信息;
参考时间点信息。
本申请实施例中的非授权频段的旁链路传输处理的装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,终端可以包括但不限于上述所列举的终端11的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。
本申请实施例提供的非授权频段的旁链路传输处理的装置能够实现图2至图6的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
可选的,如图10所示,本申请实施例还提供一种通信设备1000,包括处理器1001和存储器1002,存储器1002上存储有可在所述处理器1001上运行的程序或指令,该程序或指令被处理器1001执行时实现上述非授权频段的旁链路传输处理的装置实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种终端,包括处理器和通信接口,所述终端为第一终端时,通信接口用于获取第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项;处理器用于确定是否可执行第一行为或是否需要执行第一行为,所述第一行为包括根据所述第一信息监听第一资源对象和根据所述第一信息使用所述第一资源对象中的至少一项;
其中,在满足第一预设条件的情况下,所述第一终端确定可执行第一行为或需要执行第一行为,所述第一预设条件包括以下至少一项:所述第一终端属于M个终端,所述M个终端包括与所述第一预设信息关联的终端中的至少部分终端,所述第一终端不属于N个终端,所述N个终端包括与所述第二预设信息关联的终端中的至少部分终端,M和N均为正整数;
或者,所述终端为第四终端时,在所述第四终端获知目标信息的情况下,处理器用于执行第四行为;
其中,所述目标信息包括以下至少一项:第二终端确定第一资源对象空闲或可用;所 述第二终端成功接入或获取所述第一资源对象;第二终端使用所述第一资源对象;
所述第四行为包括以下至少一项:确定所述第一资源对象被所述第二终端占用;确定所述第一资源对象被旁链路系统占用;确定所述第一资源对象被第五标识对应的至少部分终端占用,所述第五标识对应的至少部分终端包括所述第二终端;在所述第四终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息;
所述第二信息包括以下至少一项:第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;可监听第二资源对象;需要监听第二资源对象;使用第二资源对象。
上述终端实施例与上述终端侧方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该终端实施例中,且能达到相同的技术效果。具体地,图11为实现本申请实施例的一种终端的硬件结构示意图。
该终端1100包括但不限于:射频单元1101、网络模块1102、音频输出单元1103、输入单元1104、传感器1105、显示单元1106、用户输入单元1107、接口单元1108、存储器1109以及处理器1110等中的至少部分部件。
本领域技术人员可以理解,终端1100还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器1110逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图11中示出的终端结构并不构成对终端的限定,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
应理解的是,本申请实施例中,输入单元1104可以包括图形处理单元(Graphics Processing Unit,GPU)11041和麦克风11042,图形处理器11041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元1106可包括显示面板11061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板11061。用户输入单元1107包括触控面板11071以及其他输入设备11072中的至少一种。触控面板11071,也称为触摸屏。触控面板11071可包括触摸检测装置和触摸控制器两个部分。其他输入设备11072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
本申请实施例中,射频单元1101接收来自网络侧设备的下行数据后,可以传输给处理器1110进行处理;另外,射频单元1101可以向网络侧设备发送上行数据。通常,射频单元1101包括但不限于天线、放大器、收发信机、耦合器、低噪声放大器、双工器等。
存储器1109可用于存储软件程序或指令以及各种数据。存储器1109可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器1109可以包括易失性存储器或非易失性存储器,或者,存储器1109可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器 (Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器1109包括但不限于这些和任意其它适合类型的存储器。
处理器1110可包括一个或多个处理单元;可选的,处理器1110集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器1110中。
其中,所述终端为第一终端时,射频单元1101用于获取第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项;处理器1110用于确定是否可执行第一行为或是否需要执行第一行为,所述第一行为包括根据所述第一信息监听第一资源对象和根据所述第一信息使用所述第一资源对象中的至少一项;
其中,在满足第一预设条件的情况下,所述第一终端确定可执行第一行为或需要执行第一行为,所述第一预设条件包括以下至少一项:所述第一终端属于M个终端,所述M个终端包括与所述第一预设信息关联的终端中的至少部分终端,所述第一终端不属于N个终端,所述N个终端包括与所述第二预设信息关联的终端中的至少部分终端,M和N均为正整数;
或者,所述终端为第四终端时,在所述第四终端获知目标信息的情况下,处理器1110用于执行第四行为;
其中,所述目标信息包括以下至少一项:第二终端确定第一资源对象空闲或可用;所述第二终端成功接入或获取所述第一资源对象;第二终端使用所述第一资源对象;
所述第四行为包括以下至少一项:确定所述第一资源对象被所述第二终端占用;确定所述第一资源对象被旁链路系统占用;确定所述第一资源对象被第五标识对应的至少部分终端占用,所述第五标识对应的至少部分终端包括所述第二终端;在所述第四终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息;
所述第二信息包括以下至少一项:第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;可监听第二资源对象;需要监听第二资源对象;使用第二资源对象。
本申请实施例还提供一种网络侧设备,包括处理器和通信接口,通信接口用于向第一终端发送的第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项。 该网络侧设备实施例与上述网络侧设备方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该网络侧设备实施例中,且能达到相同的技术效果。
具体地,本申请实施例还提供了一种网络侧设备。如图12所示,该网络侧设备1200包括:天线1201、射频装置1202、基带装置1203、处理器1204和存储器1205。天线1201与射频装置1202连接。在上行方向上,射频装置1202通过天线1201接收信息,将接收的信息发送给基带装置1203进行处理。在下行方向上,基带装置1203对要发送的信息进行处理,并发送给射频装置1202,射频装置1202对收到的信息进行处理后经过天线1201发送出去。
以上实施例中网络侧设备执行的方法可以在基带装置1203中实现,该基带装置1203包括基带处理器。
基带装置1203例如可以包括至少一个基带板,该基带板上设置有多个芯片,如图12所示,其中一个芯片例如为基带处理器,通过总线接口与存储器1205连接,以调用存储器1205中的程序,执行以上方法实施例中所示的网络设备操作。
该网络侧设备还可以包括网络接口1206,该接口例如为通用公共无线接口(common public radio interface,CPRI)。
具体地,本申请实施例的网络侧设备1200还包括:存储在存储器1205上并可在处理器1204上运行的指令或程序,处理器1204调用存储器1205中的指令或程序执行图9所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述非授权频段的旁链路传输处理方法方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述非授权频段的旁链路传输处理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
本申请实施例另提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现上述非授权频段的旁链路传输处理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供了一种通信系统,包括:终端及网络侧设备,所述终端用于执行如图2至图5及上述各个终端对应的方法实施例的各个过程,所述网络侧设备用于执行如 图6及上述各个网络侧设备对应的方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (42)

  1. 一种非授权频段的旁链路传输处理方法,包括:
    第一终端获取第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项;
    所述第一终端确定是否可执行第一行为或是否需要执行第一行为,所述第一行为包括根据所述第一信息监听第一资源对象和根据所述第一信息使用所述第一资源对象中的至少一项;
    其中,在满足第一预设条件的情况下,所述第一终端确定可执行第一行为或需要执行第一行为,所述第一预设条件包括以下至少一项:所述第一终端属于M个终端,所述M个终端包括与所述第一预设信息关联的终端中的至少部分终端,所述第一终端不属于N个终端,所述N个终端包括与所述第二预设信息关联的终端中的至少部分终端,M和N均为正整数。
  2. 根据权利要求1所述的方法,其中,所述第一预设信息与至少一个第一标识关联,所述第二预设信息与至少一个第二标识关联,所述方法还包括以下至少一项:
    在所述第一终端满足第一对应关系时,所述第一终端确定所述第一终端不满足所述第一预设条件:
    在所述第一终端满足第二对应关系时,所述第一终端确定所述第一终端满足所述第一预设条件:
    其中,所述第一对应关系包括以下至少一项:
    所述第一终端与所述至少一个第一标识中的任一个第一标识均不对应;
    所述第一终端与所述至少一个第一标识中预设的第一标识不对应;
    所述第一终端与所述第二标识对应;
    所述第二对应关系包括以下至少一项:
    所述第一终端与所述至少一个第二标识中的任一个第二标识不对应;
    所述第一终端与所述至少一个第二标识中预设的第二标识不对应;
    所述第一终端与所述第一标识对应。
  3. 根据权利要求2所述的方法,其中,所述第一标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识;
    和/或,所述第二标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务 质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第二预设信息的索引、所述第二预设信息的编号和无线网络临时标识。
  4. 根据权利要求1所述的方法,其中,所述第一预设信息满足以下至少一项:
    用于指示所述M个终端按照第一监听方式监听所述第一资源对象;
    用于指示所述M个终端使用所述第一资源对象;
    用于指示所述M个终端监听所述第一资源对象;
    所述第一预设信息包括所述M个终端对应的终端标识;
    所述第一预设信息与至少一个第一标识关联,所述M个终端为所述第一标识对应的终端中的至少部分终端。
  5. 根据权利要求1所述的方法,其中,所述第二预设信息满足以下任一项:
    用于指示所述N个终端不按照第一监听方式监听所述第一资源对象;
    用于指示不使用所述第一资源对象;
    用于指示所述N个终端不监听所述第一资源对象;
    所述第二预设信息包括所述N个终端对应的终端标识;
    所述第二预设信息与至少一个第二标识关联,所述N个终端为所述第二标识对应的终端中的至少部分终端。
  6. 根据权利要求1所述的方法,其中,所述第一终端获取第一信息包括:
    所述第一终端从网络侧设备接收所述第一信息,
    其中,所述第一信息通过以下至少一项承载:下行控制信息DCI、无线资源控制RRC和媒体接入控制MAC信令。
  7. 根据权利要求1所述的方法,其中,所述方法还包括:
    所述第一终端从网络侧设备接收第一指示信息,所述第一指示信息用于指示以下任一项:激活所述第一信息、去激活所述第一信息、可使用所述第一信息、不使用所述第一信息和停止使用所述第一信息。
  8. 根据权利要求1所述的方法,其中,所述M个终端满足以下至少一项:
    为组内的头终端;
    与预设的第三标识对应;
    与所述第一预设信息关联的第一标识对应;
    不与所述第二预设信息关联的第二标识对应;
    为与所述第一标识对应的终端中目标标识最大、目标标识最小或目标标识为第一预设值的终端,所述目标标识为终端标识、终端编号或终端索引;
    与所述第一标识经过预设处理的结果对应;
    为从网络侧设备接收到第二指示信息的终端,所述第二指示信息用于指示终端可监听或需要监听第一资源对象;
    其中,所述第三标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识。
  9. 根据权利要求1所述的方法,其中,所述第一行为满足以下任一项:
    所述第一资源对象的监听方式为第一监听方式监听;
    所述第一资源对象的监听方式基于网络侧设备指示和/或基于所述第一终端对应的第四标识确定;
    其中,所述第四标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识。
  10. 根据权利要求1所述的方法,其中,所述第一终端确定是否可执行第一行为或是否需要执行第一行为之后,所述方法还包括:
    在所述第一终端获知目标信息的情况下,所述第一终端执行第二行为;
    其中,所述目标信息包括以下至少一项:第二终端确定所述第一资源对象空闲或可用;所述第二终端成功接入或获取所述第一资源对象;第二终端使用所述第一资源对象;
    所述第二行为包括以下至少一项:确定所述第一资源对象被所述第二终端占用;确定所述第一资源对象被旁链路系统占用;确定所述第一资源对象被第五标识对应的至少部分终端占用,所述第五标识对应的至少部分终端包括所述第二终端;在所述第一终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息;
    所述第二信息包括以下至少一项:第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;可监听所述第二资源对象;需要监听第二资源对象;使用第二资源对象。
  11. 根据权利要求10所述的方法,其中,在所述第一终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息包括:
    在所述第一终端属于所述第五标识对应的至少部分终端、且接收到所述第二终端发送的第三指示信息的情况下,确定第二信息;
    其中,所述第三指示信息用于指示以下至少一项:第二资源对象,所述第一终端可监听第二资源对象,所述第一终端需要监听第二资源对象,所述第一终端使用第二资源对象,所述第二资源对象,所述第一终端的监听方式。
  12. 根据权利要求10所述的方法,其中,所述第二行为满足以下任一项:
    所述第二资源对象的监听方式为第二监听方式;
    所述第二资源对象的监听方式基于网络侧设备指示和/或基于所述第一终端对应的第四标识确定;
    其中,所述第四标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识。
  13. 根据权利要求10所述的方法,其中,所述第一终端满足以下至少一项:
    需要向所述第二终端发送消息或响应;
    为所述第二终端所属的终端组内的成员终端;
    与预设的第三标识对应;
    与所述第一预设信息关联的第一标识对应;
    不与所述第二预设信息关联的第二标识对应;
    为与所述第一标识对应的终端中目标标识最大、目标标识最小或目标标识为第一预设值的终端,所述目标标识为终端标识、终端编号或终端索引;
    与所述第一标识经过预设处理的结果对应;
    为从网络侧设备接收到第一指示信息的终端,所述第一指示信息用于指示所述第一指示信息用于指示以下任一项:激活所述第一信息、去激活所述第一信息、可使用所述第一信息、不使用所述第一信息和停止使用所述第一信息;
    为从网络侧设备接收到第四指示信息的终端,所述第四指示信息用于指示终端可监听或需要监听所述第二资源对象。
  14. 根据权利要求1所述的方法,其中,所述第一终端确定是否可执行第一行为或是否需要执行第一行为之后,所述方法还包括:
    在满足第二预设条件的情况下,所述第一终端执行第三行为;
    其中,所述第三行为包括以下至少一项:确定第三终端可监听或需要监听第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;可使用或需要使用所述第二资源对象;
    所述第二预设条件包括以下至少一项:第一终端发现所述第一资源对象空闲或可用;所述第一终端成功获取所述第一资源对象,所述第一终端使用所述第一资源对象;
    所述第三终端为与所述第一终端对应相同第四标识的终端中的至少部分终端,源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识。
  15. 根据权利要求14所述的方法,其中,在满足第二预设条件的情况下,所述第一终 端确定第三终端可监听或需要监听所述第二资源对象之后,所述方法还包括:
    所述第一终端向所述第三终端发送第五指示信息,所述第五指示信息用于指示以下至少一项:所述第三终端可监听第二资源对象,所述第三终端需要监听第二资源对象,所述第三终端使用第二资源对象,所述第二资源对象,所述第三终端的监听方式。
  16. 根据权利要求15所述的方法,其中,所述第三终端满足以下至少一项:
    需要向所述第一终端发送消息或响应;
    为所述第一终端所属的终端组内的成员终端;
    与预设的第三标识对应;
    与所述第一预设信息关联的第一标识对应;
    不与所述第二预设信息关联的第二标识对应;
    为与所述第一标识对应的终端中目标标识最大、目标标识最小或目标标识为第一预设值的终端,所述目标标识为终端标识、终端编号或终端索引;
    与所述第一标识经过预设处理的结果对应;
    为从网络侧设备接收到第一指示信息的终端,所述第一指示信息用于指示以下任一项:激活所述第一信息、去激活所述第一信息、可使用所述第一信息、不使用所述第一信息和停止使用所述第一信息;
    为从网络侧设备接收到第六指示信息的终端,所述第六指示信息用于指示所述第三终端可监听或需要监听所述第二资源对象。
  17. 根据权利要求1所述的方法,其中,所述方法还包括:
    所述第一终端向网络侧设备发送第三信息,所述第三信息包括以下至少一项:
    所述第一终端获得可用的信道占用时间的时长;
    是否成功获得或使用所述第一资源对象的第四指示信息;
    监听所述第一资源对象的监听方式
    所述第一终端的终端信息;
    所述第一终端的SL传输对应的混合自动重传请求应答HARQ-ACK信息;
    所述第一终端的SL传输失败对应的混合自动重传请求应答HARQ-ACK信息。
  18. 根据权利要求1所述的方法,其中,所述监听信息包括以下至少一项:
    监听或接入次数,或者,监听或接入最大次数;
    监听或接入失败次数,或者,监听或接入失败最大次数;
    监听或接入成功间隔,或者,监听或接入成功最大间隔或,或者,监听或接入成功最小间隔。
  19. 根据权利要求1所述的方法,其中,所述预设资源包括以下至少一项:
    时间段;
    定时器对应的时间资源;
    监听或接入次数,或者,监听或接入最大次数对应的资源;
    监听或接入失败次数,或者,监听或接入最大失败次数对应的资源;
    监听或接入成功间隔,或者,监听或接入成功最大间隔对应的资源。
  20. 根据权利要求1所述的方法,其中,所述预设资源的信息包括以下至少一项:
    时间长度信息;
    时间点信息;
    偏移信息;
    参考时间点信息。
  21. 根据权利要求1所述的方法,其中,所述根据所述第一信息监听所述第一资源对象包括:
    监听所述预设资源是否空闲或者繁忙;
    在所述预设资源的范围内监听所述第一资源对象所否空闲或者繁忙。
  22. 根据权利要求1所述的方法,其中,所述预设资源包括至少两个资源子集,每一资源子集与至少一个终端或终端组或终端配对或第六标识关联,所述第一终端确定是否可执行第一行为或是否需要执行第一行为包括:
    所述第一终端确定是否可在所述第一终端关联的资源子集执行第一行为或是否需要在所述第一终端关联的资源子集执行第一行为。
  23. 一种非授权频段的旁链路传输处理方法,包括:
    在第四终端获知目标信息的情况下,所述第四终端执行第四行为;
    其中,所述目标信息包括以下至少一项:第二终端确定第一资源对象空闲或可用;所述第二终端成功接入或获取所述第一资源对象;第二终端使用所述第一资源对象;
    所述第四行为包括以下至少一项:确定所述第一资源对象被所述第二终端占用;确定所述第一资源对象被旁链路系统占用;确定所述第一资源对象被第五标识对应的至少部分终端占用,所述第五标识对应的至少部分终端包括所述第二终端;在所述第四终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息;
    所述第二信息包括以下至少一项:第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;可监听所述第二资源对象;需要监听第二资源对象;使用第二资源对象。
  24. 根据权利要求23所述的方法,其中,在所述第四终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息包括:
    在所述第四终端属于所述第五标识对应的至少部分终端、且接收到所述第二终端发送的第七指示信息的情况下,确定第二信息;
    其中,所述第七指示信息用于指示以下至少一项:第二资源对象,所述第四终端可监听第二资源对象,所述第四终端需要监听第二资源对象,所述第四终端使用第二资源对象,所述第二资源对象,所述第四终端的监听方式。
  25. 根据权利要求23所述的方法,其中,所述第四行为满足以下任一项:
    所述第二资源对象的监听方式为第二监听方式;
    所述第二资源对象的监听方式基于网络侧设备指示和/或基于所述第四终端对应的第四标识确定;
    其中,所述第四标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、第一预设信息的索引、第一预设信息的编号和无线网络临时标识。
  26. 根据权利要求23所述的方法,其中,所述第四终端满足以下至少一项:
    需要向所述第二终端发送消息或响应;
    为所述第二终端所属的终端组内的成员终端;
    与预设的第三标识对应;
    与第一预设信息关联的第一标识对应;
    不与第二预设信息关联的第二标识对应;
    为与所述第一标识对应的终端中目标标识最大、目标标识最小或目标标识为第一预设值的终端,所述目标标识为终端标识、终端编号或终端索引;
    与所述第一标识经过预设处理的结果对应;
    为从网络侧设备接收到第八指示信息的终端,所述第八指示信息用于指示终端可监听或需要监听所述第二资源对象;
    其中,所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项。
  27. 一种非授权频段的旁链路传输处理方法,包括:
    网络侧设备向第一终端发送第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项。
  28. 根据权利要求27所述的方法,其中,所述第一预设信息与至少一个第一标识关联,所述第二预设信息与至少一个第二标识关联,所述方法还包括以下至少一项:
    在所述第一终端满足第一对应关系时,所述第一终端确定所述第一终端不满足所述第一预设条件:
    在所述第一终端满足第二对应关系时,所述第一终端确定所述第一终端满足所述第一预设条件:
    其中,所述第一对应关系包括以下至少一项:
    所述第一终端与所述至少一个第一标识中的任一个第一标识均不对应;
    所述第一终端与所述至少一个第一标识中预设的第一标识不对应;
    所述第一终端与所述第二标识对应;
    所述第二对应关系包括以下至少一项:
    所述第一终端与所述至少一个第二标识中的任一个第二标识不对应;
    所述第一终端与所述至少一个第二标识中预设的第二标识不对应;
    所述第一终端与所述第一标识对应。
  29. 根据权利要求28所述的方法,其中,所述第一标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第一预设信息的索引、所述第一预设信息的编号和无线网络临时标识;
    和/或,所述第二标识包括以下至少一项:源标识、目的地标识、终端组对应的标识、组内的成员标识、终端配对对应的标识、业务对应的标识、签约参数集对应的标识、服务质量流标识、资源池标识、载波标识、带宽部分标识、终端所属的子组标识、资源块集合标识、信道标识、子信道标识、所述第二预设信息的索引、所述第二预设信息的编号和无线网络临时标识。
  30. 根据权利要求27所述的方法,其中,所述第一预设信息满足以下至少一项:
    用于指示M个终端按照第一监听方式监听第一资源对象,所述M个终端包括与所述第一预设信息关联的终端中的至少部分终端,M为正整数;
    用于指示所述M个终端使用所述第一资源对象;
    用于指示所述M个终端监听所述第一资源对象;
    所述第一预设信息包括所述M个终端对应的终端标识;
    所述第一预设信息与至少一个第一标识关联,所述M个终端为所述第一标识对应的终端中的至少部分终端。
  31. 根据权利要求27所述的方法,其中,所述第二预设信息满足以下任一项:
    用于指示N个终端不按照第一监听方式监听第一资源对象,所述N个终端包括与所述第二预设信息关联的终端中的至少部分终端,N为正整数;
    用于指示不使用所述第一资源对象;
    用于指示所述N个终端不监听所述第一资源对象;
    所述第二预设信息包括所述N个终端对应的终端标识;
    所述第二预设信息与至少一个第二标识关联,所述N个终端为所述第二标识对应的终端中的至少部分终端。
  32. 根据权利要求27所述的方法,其中,所述方法还包括:
    所述网络侧设备发送第一指示信息,所述第一指示信息用于指示以下任一项:激活所述第一信息、去激活所述第一信息、可使用所述第一信息和停止使用所述第一信息。
  33. 根据权利要求27所述的方法,其中,所述方法还包括:
    所述网络侧设备从第一终端接收第三信息,所述第三信息包括以下至少一项:
    所述第一终端获得可用的信道占用时间的时长;
    是否成功获得或使用第一资源对象的第四指示信息;
    监听所述第一资源对象的监听方式
    所述第一终端的终端信息;
    所述第一终端的SL传输对应的混合自动重传请求应答HARQ-ACK信息;
    所述第一终端的SL传输失败对应的混合自动重传请求应答HARQ-ACK信息。
  34. 根据权利要求27所述的方法,其中,所述监听信息包括以下至少一项:
    监听或接入次数,或者,监听或接入最大次数;
    监听或接入失败次数,或者,监听或接入失败最大次数;
    监听或接入成功间隔,或者,监听或接入成功最大间隔,或者,监听或接入成功最小间隔。
  35. 根据权利要求27所述的方法,其中,所述预设资源包括以下至少一项:
    时间段;
    定时器对应的时间资源;
    监听或接入次数,或者,监听或接入最大次数对应的资源;
    监听或接入失败次数,或者,监听或接入最大失败次数对应的资源;
    监听或接入成功间隔,或者,监听或接入成功最大间隔对应的资源。
  36. 根据权利要求27所述的方法,其中,所述预设资源的信息包括以下至少一项:
    时间长度信息;
    时间点信息;
    偏移信息;
    参考时间点信息。
  37. 一种非授权频段的旁链路传输处理的装置,应用于第一终端,包括:
    获取模块,用于获取第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项;
    第一确定模块,用于确定是否可执行第一行为或是否需要执行第一行为,所述第一行为包括根据所述第一信息监听第一资源对象和根据所述第一信息使用所述第一资源对象中的至少一项;
    其中,在满足第一预设条件的情况下,所述第一终端确定可执行第一行为或需要执行第一行为,所述第一预设条件包括以下至少一项:所述第一终端属于M个终端,所述M个终端包括与所述第一预设信息关联的终端中的至少部分终端,所述第一终端不属于N个终端,所述N个终端包括与所述第二预设信息关联的终端中的至少部分终端,M和N均为正整数。
  38. 一种非授权频段的旁链路传输处理装置,应用于第四终端,包括:
    第二执行模块,用于在所述第四终端获知目标信息的情况下,执行第四行为;
    其中,所述目标信息包括以下至少一项:第二终端确定第一资源对象空闲或可用;所述第二终端成功接入或获取所述第一资源对象;第二终端使用所述第一资源对象;
    所述第四行为包括以下至少一项:确定所述第一资源对象被所述第二终端占用;确定所述第一资源对象被旁链路系统占用;确定所述第一资源对象被第五标识对应的至少部分终端占用,所述第五标识对应的至少部分终端包括所述第二终端;在所述第四终端属于所述第五标识对应的至少部分终端的情况下,确定第二信息;
    所述第二信息包括以下至少一项:第二资源对象;可监听第二资源对象,所述第二资源对象与所述第一资源对象至少部分重叠;需要监听第二资源对象;使用第二资源对象。
  39. 一种非授权频段的旁链路传输处理装置,应用于网络侧设备,包括:
    第二发送模块,用于向第一终端发送的第一信息,所述第一信息包括第一预设信息和第二预设信息中的至少一项;所述第一预设信息和/或所述第二预设信息包括监听信息和预设资源的信息中的至少一项。
  40. 一种终端,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至26任一项所述的非授权频段的旁链路传输处理方法的步骤。
  41. 一种网络侧设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求27至36任一项所述的非授权频段的旁链路传输处理方法的步骤。
  42. 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1至36任一项所述的非授权频段的旁链路传输处理方法。
PCT/CN2023/099896 2022-06-20 2023-06-13 非授权频段的旁链路传输处理方法、装置及相关设备 WO2023246562A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210701660.7A CN117320166A (zh) 2022-06-20 2022-06-20 非授权频段的旁链路传输处理方法、装置及相关设备
CN202210701660.7 2022-06-20

Publications (1)

Publication Number Publication Date
WO2023246562A1 true WO2023246562A1 (zh) 2023-12-28

Family

ID=89254020

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/099896 WO2023246562A1 (zh) 2022-06-20 2023-06-13 非授权频段的旁链路传输处理方法、装置及相关设备

Country Status (2)

Country Link
CN (1) CN117320166A (zh)
WO (1) WO2023246562A1 (zh)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110784874A (zh) * 2018-07-31 2020-02-11 索尼公司 用于无线通信的电子设备和方法、计算机可读存储介质
WO2021081700A1 (zh) * 2019-10-28 2021-05-06 华为技术有限公司 数据的发送、接收方法及装置
WO2021088028A1 (zh) * 2019-11-08 2021-05-14 华为技术有限公司 一种资源配置方法及装置
CN113892276A (zh) * 2021-09-02 2022-01-04 北京小米移动软件有限公司 一种信息传输方法和装置
CN114071739A (zh) * 2020-08-06 2022-02-18 维沃移动通信有限公司 免授权频谱的信道接入方法、终端及网络侧设备
CN114424640A (zh) * 2019-09-25 2022-04-29 高通股份有限公司 用于侧行链路的信道占用时间(cot)共享
WO2022110233A1 (zh) * 2020-11-30 2022-06-02 Oppo广东移动通信有限公司 无线通信的方法、终端设备和网络设备

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110784874A (zh) * 2018-07-31 2020-02-11 索尼公司 用于无线通信的电子设备和方法、计算机可读存储介质
CN114424640A (zh) * 2019-09-25 2022-04-29 高通股份有限公司 用于侧行链路的信道占用时间(cot)共享
WO2021081700A1 (zh) * 2019-10-28 2021-05-06 华为技术有限公司 数据的发送、接收方法及装置
WO2021088028A1 (zh) * 2019-11-08 2021-05-14 华为技术有限公司 一种资源配置方法及装置
CN114071739A (zh) * 2020-08-06 2022-02-18 维沃移动通信有限公司 免授权频谱的信道接入方法、终端及网络侧设备
WO2022110233A1 (zh) * 2020-11-30 2022-06-02 Oppo广东移动通信有限公司 无线通信的方法、终端设备和网络设备
CN113892276A (zh) * 2021-09-02 2022-01-04 北京小米移动软件有限公司 一种信息传输方法和装置

Also Published As

Publication number Publication date
CN117320166A (zh) 2023-12-29

Similar Documents

Publication Publication Date Title
US11751245B2 (en) Method and wireless communication system for handling timer operation
CN111585730B (zh) 传输方法和通信装置
WO2020143745A1 (zh) V2x的通信方法及装置、存储介质和电子装置
US20230180292A1 (en) Channel access method for unlicensed spectrum, terminal, and network side device
US20230208563A1 (en) Discontinuous reception control method and apparatus, terminal, and readable storage medium
US20230095844A1 (en) Beam failure recovery method and apparatus, and device
US20230217322A1 (en) Transmission processing method and apparatus and terminal
US20230262664A1 (en) Data transmission method and apparatus, terminal, network-side device, and storage medium
US11399387B2 (en) System and method for scheduling for redundant layer 2 control messages
US20240040595A1 (en) Method and Apparatus for Determining Sidelink Feedback Resource, Terminal, and Storage Medium
WO2022063235A1 (zh) 信道接入选择方法、装置、通信设备及可读存储介质
WO2023246562A1 (zh) 非授权频段的旁链路传输处理方法、装置及相关设备
WO2024012302A1 (zh) 旁链路反馈处理方法、装置、终端及网络侧设备
WO2024012236A1 (zh) 旁链路反馈处理方法、装置、终端及网络侧设备
WO2023131304A1 (zh) 旁链路资源选择方法及装置
WO2022222879A1 (zh) Pdsch传输、接收方法、装置及通信设备
WO2023274118A1 (zh) 信息传输方法、装置及存储介质
EP4325762A1 (en) Sidelink feedback resource determination method, terminal, and network-side device
EP4274295A1 (en) Sidelink discontinuous reception configuration method and apparatus, device, and readable storage medium
CN115189828B (zh) 传输处理方法、装置及相关设备
CN113972965B (zh) 业务的处理方法、装置及相关设备
WO2022171005A1 (zh) 信道测量方法、lbt失败上报方法、装置及设备
WO2023083304A1 (zh) 随机接入的方法、终端及网络侧设备
US20230291611A1 (en) Reference signal determining method, reference signal processing method, and related device
WO2022148397A1 (zh) 共享频谱的信息传输方法、装置及节点

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23826211

Country of ref document: EP

Kind code of ref document: A1