WO2023274314A1 - Data transmission method and related apparatus - Google Patents

Data transmission method and related apparatus Download PDF

Info

Publication number
WO2023274314A1
WO2023274314A1 PCT/CN2022/102463 CN2022102463W WO2023274314A1 WO 2023274314 A1 WO2023274314 A1 WO 2023274314A1 CN 2022102463 W CN2022102463 W CN 2022102463W WO 2023274314 A1 WO2023274314 A1 WO 2023274314A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
link
resource
terminal device
priority
Prior art date
Application number
PCT/CN2022/102463
Other languages
French (fr)
Chinese (zh)
Inventor
刘星
Original Assignee
展讯通信(上海)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 展讯通信(上海)有限公司 filed Critical 展讯通信(上海)有限公司
Publication of WO2023274314A1 publication Critical patent/WO2023274314A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0446Resources in time domain, e.g. slots or frames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0453Resources in frequency domain, e.g. a carrier in FDMA

Definitions

  • the present application relates to the technical field of communications, and in particular to a data transmission method and a related device.
  • a terminal device can send uplink data to a base station on an uplink (UL), and send sidelink data (sidelink data) to another terminal device on a sidelink (SL). ).
  • UL uplink
  • SL sidelink
  • Embodiments of the present application provide a data transmission method and a related device, which can improve resource utilization.
  • the embodiment of the present application provides a data transmission method, the method includes: the terminal device detects that the first resource and the second resource overlap in the time domain, the first resource is the resource occupied by the first link, The first link is used to carry the first data, the second resource is the resource occupied by the second link, the second link is used to carry the second data, and the first resource is located in an unlicensed frequency band; when the first link When the listen-before-talk LBT interception succeeds, the terminal device sends the first data on the first link.
  • this method makes the terminal device overlap the resources occupied by the first link and the resources occupied by the second link, and when the resources occupied by the first link are located in the unlicensed frequency band, according to the LBT interception result of the first link, Judging whether to send the first data or the second data can avoid judging whether to send the first data or the second data according to the priority of the first data and the second data, resulting in waste of resources caused by neither the first data nor the second data being sent , which can improve resource utilization.
  • the terminal device when the listen-before-talk LBT interception of the first link succeeds, the terminal device sends the first data on the first link, including: when the listen-before-talk of the first link When the LBT interception is successful and the priority of the first data is higher than the priority of the second data, the terminal device sends the first data on the first link.
  • the terminal device determines whether to send the first data or the second data according to the LBT interception result on the first link and the priority of the first data and the second data, not only based on the first data and the second data The priority of the first data or the second data is judged to be sent, thereby helping to avoid waste of resources caused by neither the first data nor the second data being sent.
  • the terminal device when the first resource is located on an unlicensed frequency band, the second resource is located on a licensed frequency band, and the LBT interception of the first link succeeds, the terminal device sends first data.
  • the terminal A device sends first data on a first link.
  • the second resource may be located on the licensed frequency band.
  • the terminal device when the first resource is located on an unlicensed frequency band, the second resource is located on a licensed frequency band, and the LBT interception of the first link fails, the terminal device sends a second data.
  • the terminal device when the first resource is located in the unlicensed frequency band and the second resource is located in the licensed frequency band, if the LBT interception of the first link is successful, the terminal device will send the first data on the first link; if the first link If the LBT interception of the link fails, the second data is sent on the second link. That is to say, at this time, whether the terminal device determines to send the first data or the second data according to the LBT interception result of the first link can prevent the terminal device from determining whether to send the first data or the second data according to the priorities of the first data and the second data. For the second data, resource waste caused by neither the first data nor the second data being sent.
  • the terminal device in the second link send the second data on the road.
  • the terminal device does not consider the priority of the first data as long as the priority of the first data is lower than the priority of the second data.
  • the terminal device does not consider the priority of the first data as long as the priority of the first data is lower than the priority of the second data.
  • the LBT interception it is directly determined to send the second data with a high priority, which can ensure that the high-priority data carried on the licensed frequency band is sent.
  • the terminal device when the first resource is located on an unlicensed frequency band and the second resource is located on a licensed frequency band, the LBT interception of the first link succeeds, and the priority of the first data is lower than that of the second data When the priority is , the terminal device sends the second data on the second link.
  • the terminal device when both the first resource and the second resource are located in the unlicensed frequency band, the terminal device sends data corresponding to the link on the link where the LBT interception succeeds.
  • the first resource is located in an unlicensed frequency band
  • the second resource is located in an unlicensed frequency band.
  • the terminal device sends the first data with high priority.
  • the first link is an uplink UL
  • the second link is a sidelink SL
  • the first link is a sidelink SL
  • the second link is an uplink road ul. It can be seen that one of the first link and the second link is a UL link, and the other is an SL link.
  • both the first link and the second link are UL, or both the first link and the second link are SL.
  • the embodiment of the present application provides a data transmission device, the data transmission device includes:
  • the first resource is a resource occupied by a first link, the first link is used to carry first data, and the The second resource is a resource occupied by a second link, the second link is used to carry second data, and the first resource is located on an unlicensed frequency band;
  • the processing unit is further configured to send the first data on the first link when the listen-before-talk LBT interception of the first link succeeds.
  • an embodiment of the present application provides a terminal device, where the terminal device includes:
  • a processor calling a computer program, to:
  • the first resource and the second resource overlap in the time domain;
  • the first resource is a resource occupied by the first link, the first link is used to carry the first data, and the second resource is the resource occupied by the first link.
  • the first data is sent on the first link.
  • an embodiment of the present application provides a chip, the chip is configured to: detect that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by the first link, so The first link is used to carry the first data, the second resource is a resource occupied by the second link, the second link is used to carry the second data, and the first resource is located on an unlicensed frequency band ; When the listen-before-talk LBT interception of the first link succeeds, sending the first data on the first link.
  • the embodiment of the present application provides a module device, the module device includes a processor and a communication interface, the processor is connected to the communication interface, the communication interface is used to send and receive signals, and the processing The device is used to: detect that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by the first link, the first link is used to carry the first data, and the second The resource is the resource occupied by the second link, the second link is used to carry the second data, and the first resource is located on the unlicensed frequency band; when the listen before talk LBT of the first link intercepts On success, sending the first data on the first link.
  • an embodiment of the present application provides a computer-readable storage medium for storing computer software instructions used by the above-mentioned terminal, which includes a program for executing the method described in any one of the above-mentioned first aspects.
  • FIG. 1 is a schematic diagram of a system structure of a communication system provided by an embodiment of the present application
  • FIG. 2 is a flow diagram of a data transmission method provided in an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of a data transmission device provided in an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of a terminal device provided in an embodiment of the present application.
  • the communication system involved in the embodiment of the present application is shown in Figure 1.
  • the communication system may include but is not limited to one network device and two terminal devices. However, the actual application may include more than one network device and more than two terminal devices.
  • the communication system shown in FIG. 1 is described by taking a network device 101, a terminal device 1021, and a terminal device 1022 as an example.
  • the network device 101 can provide network services to the terminal device 1021 and the terminal device 1022. Between the terminal device 1021 and the terminal device 1022 Communication is possible.
  • the terminal equipment in the embodiment of the present application may also be referred to as a terminal, and may refer to various forms of user equipment (user equipment, UE), access terminal, user unit, user station, mobile station, mobile station (mobile station, MS ), remote station, remote terminal, mobile device, user terminal, wireless communication device, user agent or user device.
  • user equipment user equipment
  • UE user equipment
  • access terminal user unit
  • user station mobile station
  • mobile station mobile station
  • remote station remote terminal
  • mobile device user terminal
  • wireless communication device user agent or user device.
  • the terminal device may also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, terminal devices in the fifth generation mobile communication (5th generation mobile communication, 5G) network or future evolution of public land mobile communication
  • the terminal devices in the network public land mobile network, PLMN), etc., are not limited in this embodiment of the present application.
  • the network equipment in this embodiment of the present application includes a base station and a base station controller of an access network, and may also include terminal equipment.
  • the base station (base station, BS) in the embodiment of the present application may also be referred to as a base station device, and is a device deployed in a wireless access network (wireless access network, RAN) to provide a wireless communication function.
  • equipment providing base station functions in a second generation mobile communication (2th generation mobile communication, 2G) network includes a base transceiver station (base transceiver station, BTS).
  • a device providing a base station function in a third generation mobile communication (3th generation mobile communication, 3G) network includes a node B (NodeB).
  • Devices providing base station functions in a 4th generation mobile communication (4th generation mobile communication, 4G) network include an evolved Node B (evolved NodeB, eNB).
  • the device that provides the base station function is an access point (Access Point, AP).
  • Access Point AP
  • 5G New Radio New Radio
  • E-UTRA evolved universal terrestrial radio access
  • the base station in the embodiment of the present application also includes devices that provide base station functions in future new communication systems, and the like.
  • the base station controller in the embodiment of the present application may also be called a base station controller device, which is a device for managing a base station.
  • a base station controller base station controller (base station controller, BSC) in a 2G network
  • a radio network controller radio network controller, RNC
  • RNC radio network controller
  • This application is applicable to 5G communication systems, 4G communication systems, 3G communication systems, and various new communication systems in the future, such as the sixth generation (6th Generation, 6G) mobile communication, the seventh generation ( 7th Generation, 7G) mobile communications, etc., which are not limited in this embodiment of the present application.
  • This application is also applicable to different network architectures, including but not limited to relay network architecture, dual-link architecture, vehicle-to-everything (V2X) architecture, device-to-device communication (Device-to- Device, D2D) and other architectures.
  • relay network architecture dual-link architecture
  • V2X vehicle-to-everything
  • D2D device-to-device communication
  • D2D device-to-device communication
  • terminal device 1021 can send uplink data to network device 101 on the uplink (uplink, UL), and send uplink data to another terminal on the sidelink (sidelink, SL).
  • Device 1022 transmits sidelink data.
  • the terminal device can only send data on one link at a time. For example, when a terminal device needs to send UL data and SL data at the same time, the terminal device can only send data on one of the links.
  • the terminal device sends the data on one of the links according to the priority rules of the data. Data, that is, the data with higher priority among the data on the UL and the data on the SL sent by the terminal device.
  • the data with higher priority can be determined in the following manner:
  • the priority value of the data on the UL is directly compared with the priority value of the data on the SL, and the data with a larger or smaller value is the data with a higher priority;
  • the data on SL is data with higher priority; otherwise, the data on UL is data with higher priority;
  • the priority value of the data on the SL is less than the first threshold, and the priority of the data on the UL is greater than the second threshold, and the data on the SL is data with a higher priority , otherwise, the data on UL is data with higher priority;
  • the data on the UL has a higher priority.
  • the terminal device needs to check the links located in the unlicensed frequency band.
  • the channel performs a listen before talk (LBT) operation, that is, judges whether the channel is idle based on the LBT interception result, and the terminal device can only transmit data on the link where the channel is idle. Then, it may happen that the high-priority data cannot be transmitted, and the LBT detection result of the link corresponding to the low-priority data is that the channel is idle, and the low-priority data can be transmitted.
  • LBT listen before talk
  • the transmitted data is still determined according to the priority, then May lead to waste of resources.
  • the LBT detection result of the link corresponding to the high-priority data is that the channel is busy, the high-priority data cannot be sent, resulting in low communication efficiency.
  • An embodiment of the present application provides a data transmission method 100 .
  • the terminal device detects that the first resource and the second resource overlap in the time domain, the first resource is the resource occupied by the first link, the first link is used to carry the first data, and the second resource is the resource occupied by the first link.
  • the resources occupied by the two links, the second link is used to carry the second data, and the first resource is located in the unlicensed frequency band; when the listen-before-talk LBT interception of the first link succeeds, the terminal Send the first data on the road.
  • This method enables the terminal device to judge the transmission according to the LBT interception result of the first link when the resources occupied by the first link overlap with the resources occupied by the second link, and the resources occupied by the first link are located in the unlicensed frequency band. Whether the first data or the second data can avoid resource waste caused by neither the first data nor the second data being sent when determining whether to send the first data or the second data according to the priorities of the first data and the second data, Thus, resource utilization can be improved.
  • FIG. 2 may include S201-S202:
  • the terminal device detects that the first resource and the second resource overlap in the time domain; the first resource is the resource occupied by the first link, the first link is used to carry the first data, and the second resource is the resource occupied by the second link resources occupied by the link, the second link is used to carry the second data, and the first resource is located on an unlicensed frequency band.
  • the overlap between the first resource and the second resource in the time domain means that the resource for transmitting the first data by the terminal device and the resource for transmitting the second data by the transmission source overlap in the time domain.
  • the terminal device needs to transmit the first data on the 0th slot (slot) to the 6th slot of the time domain resource, and also needs to transmit the second data on the 4th slot to the 9th slot of the time domain resource, then The transmission resources of the first data and the second data on the 4th slot to the 6th slot overlap, that is, the first resource and the second resource overlap in the time domain.
  • the terminal device After determining the first data to be sent on the first link and the second data to be sent on the second link, the terminal device detects the first resource for transmitting the first data and the resource for transmitting the second The second resource of data overlaps in the time domain. At this time, due to the limited capability of the terminal device, the terminal device can only send one of the first data and the second data.
  • the successful LBT interception of the first link means that the terminal device performs LBT interception on the first link, and detects that the channel on the first link is idle. When the terminal device detects that the channel on the first link is idle, it indicates that data can be transmitted on the first link. Send the first data on the road.
  • the terminal device sends the first data on the first link, which can be understood as: the terminal device determines the first data to be sent on the first link After the first data and the second data to be sent on the second link, the first data and the second data are respectively packaged to generate the first data packet and the second data packet, and then LBT detection is performed on the first link Listening, when the LBT interception of the first link succeeds, the first data packet is sent.
  • the terminal The device sends the first data on the first link, including: when the listen-before-talk LBT interception of the first link succeeds, and the priority of the first data is higher than the priority of the second data, the terminal device Send the first data on a link.
  • the terminal device sends the first data on the first link only when the listen-before-talk LBT interception of the first link succeeds and the priority of the first data is higher than the priority of the second data. That is, the terminal device determines whether to send the first data or the second data based on the LBT interception result of the first link and the priority of the first data and the second data, not only according to the priority of the first data and the second data Whether to send the first data or the second data is determined, thereby avoiding resource waste caused by the terminal device determining that neither the first data nor the second data is sent.
  • the terminal device when the first resource is located on an unlicensed frequency band, the second resource is located on a licensed frequency band, and the LBT interception of the first link succeeds, the terminal device sends first data.
  • the terminal device First data is sent on the first link.
  • the second resource may be located on the licensed frequency band.
  • the terminal device at the Sending the first data on a link includes: when the LBT interception of the first link succeeds and the LBT interception of the second link fails, the terminal device sends the first data on the first link .
  • the terminal device sends the data on the link whose LBT interception is successful, so as to ensure that the data on the link with an idle channel is sent.
  • the terminal device when the first resource is located on an unlicensed frequency band and the second resource is located on an unlicensed frequency band, when the listen-before-talk LBT interception of the first link succeeds, and the priority of the first data When the priority is higher than the priority of the second data, the terminal device sends the first data on the first link, including: when the LBT interception of the first link is successful, the LBT interception of the second link is successful , and when the priority of the first data is higher than the priority of the second data, the terminal device sends the first data on the first link.
  • the terminal device sends the first resource with higher priority. data.
  • the terminal device in the first link send the first data on the road.
  • the terminal device when the resources occupied by the first link and the resources occupied by the second link overlap, and the resources occupied by the first link are located in the unlicensed frequency band, the terminal device does not consider the priority of the first data and the second data , as long as the LBT interception of the first link is successful, the first data is sent, which can avoid the first data and the second data caused by determining whether to send the first data or the second data according to the priority
  • the waste of resources caused by none of the data being sent can improve resource utilization.
  • the terminal device when the first resource is located on an unlicensed frequency band, the second resource is located on a licensed frequency band, and the LBT listening of the first link fails, the terminal device sends the second link on the second link. Second data.
  • the terminal device when the first resource is located in the unlicensed frequency band and the second resource is located in the licensed frequency band, if the LBT interception of the first link is successful, the terminal device will send the first data on the first link; if the first link If the LBT interception of the link fails, the second data is sent on the second link. That is to say, at this time, whether the terminal device determines to send the first data or the second data according to the LBT interception result of the first link can prevent the terminal device from determining whether to send the first data or the second data according to the priorities of the first data and the second data. For the second data, resource waste caused by neither the first data nor the second data being sent.
  • the terminal device in the second link Send the second data on the road. It can be seen that when the first resource is located in the unlicensed frequency band and the second resource is located in the licensed frequency band, the terminal device does not consider the priority of the first data as long as the priority of the first data is lower than the priority of the second data. As a result of the LBT interception, it is directly determined to send the second data with a high priority, which can ensure that the high-priority data carried on the licensed frequency band is sent.
  • the terminal device when the first resource is located on an unlicensed frequency band and the second resource is located on a licensed frequency band, and when the LBT interception of the first link succeeds, and the priority of the first data is lower than that of the first data When the priority of the second data, the terminal device sends the second data on the second link.
  • the above-mentioned first link is an uplink UL
  • the second link is a side link SL
  • the above-mentioned first link is a side link SL
  • the second link is an uplink UL
  • both the above-mentioned first link and the second link are uplinks UL
  • both the above-mentioned first link and the second link are side links SL.
  • the embodiment of the present application does not limit the specific implementation manners of the first link and the second link.
  • the first link as UL and the second link as SL as an example, and considering that the resources occupied by UL are located on the unlicensed frequency band, and the resources occupied by SL are located on the licensed frequency band or on the unlicensed frequency band, the above-mentioned implementation is described:
  • the resources occupied by UL are located in the unlicensed frequency band, and the resources occupied by SL are located in the licensed frequency band.
  • the terminal device when the LBT interception on the UL succeeds, the terminal device sends the first data on the UL.
  • the terminal device Since the resources occupied by the UL are located in the unlicensed frequency band, the terminal device needs to perform LBT interception on the UL. Then, only when the channel on the UL is detected to be idle, the terminal device can send the first data on the UL, that is, the terminal device is on the UL.
  • the probability of transmitting data on the UL is small, so as long as the terminal device detects that the UL is idle, that is, when the LBT on the UL intercepts successfully, the terminal device will send the first data on the UL to ensure that the UL idle channel is fully utilized , can improve resource utilization.
  • the terminal device when the LBT interception on the UL succeeds and the priority of the first data is higher than that of the second data, the terminal device sends the first data on the UL.
  • the terminal device when the UL resource is located in the unlicensed frequency band, the terminal device will only send the first data on the UL when it detects that the channel on the UL is idle and the priority of the first data is higher than that of the second data. Otherwise, send the second data on the SL to ensure that the data on the SL is sent first.
  • the terminal device when the UL LBT interception succeeds and the priority of the first data is lower than the priority of the second data, the terminal device sends the first data on the UL. It can be seen that even if the priority of the first data is low, as long as the LBT interception on the UL is successful, the terminal device will send the first data to ensure that the data on the link corresponding to the idle channel is sent, which can improve resource utilization.
  • the terminal device when the UL LBT interception fails, the terminal device sends the second data on the SL. That is, when the UL LBT interception succeeds, the terminal device sends the first data on the UL; when the UL LBT interception fails, it sends the second data on the SL.
  • the terminal device when the UL LBT interception fails and the priority of the first data is lower than the priority of the second data, the terminal device sends the second data on the SL. It can be seen that when the priority of the first data is lower than that of the second data and the UL LBT interception fails, the terminal device sends the second data to ensure that one of the first data and the second data is sent Therefore, resource waste caused by neither the first data nor the second data being sent is avoided.
  • the terminal device when the UL LBT interception succeeds and the priority of the first data is lower than the priority of the second data, the terminal device sends the second data on the SL. It can be seen that even though the UL LBT interception is successful, the terminal device still sends the second data on the SL because the priority of the first data is lower than that of the second data.
  • the resources occupied by UL are located in the unlicensed frequency band, and the resources occupied by SL are located in the unlicensed frequency band.
  • the terminal device when the UL LBT interception succeeds, the SL LBT interception succeeds, and the priority of the first data is higher than that of the second data, the terminal device sends the first data on the UL.
  • the terminal device when the UL LBT interception is successful, the SL LBT interception is successful, and the priority of the first data is lower than the priority of the second data, the terminal device sends the second data on the SL .
  • the terminal device sends the first data and the second data with higher priority. data to ensure that the data with higher priority among the first data and the second data is sent, that is, one of the first data and the second data is sent, which is beneficial to improve communication efficiency and resource utilization.
  • the LBT interception of the UL succeeds, but the LBT interception of the SL fails, and the terminal device sends the first data on the UL.
  • the LBT interception of the UL fails, the LBT interception of the SL succeeds, and the terminal device sends the first data on the SL.
  • the implementation method for the terminal device to determine whether to send the first data or the second data can be found in The implementation manner when the above-mentioned first link is UL, the second link is SL, and the resource occupied by UL is located in an unlicensed frequency band will not be repeated here.
  • FIG. 3 is a schematic structural diagram of a data transmission device provided by an embodiment of the present invention, and the data transmission device is used in a terminal device.
  • the data transmission device 300 may include:
  • the processing unit 301 is configured to detect that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by a first link, and the first link is used to carry first data, so The second resource is a resource occupied by a second link, the second link is used to carry second data, and the first resource is located on an unlicensed frequency band;
  • the processing unit 301 is further configured to send the first data on the first link when the listen-before-talk LBT interception of the first link succeeds.
  • the processing unit 301 sends the first data on the first link, specifically Used for: when the listen-before-talk LBT interception of the first link is successful, and the priority of the first data is higher than the priority of the second data, sending on the first link the first data.
  • the second resource is located on a licensed frequency band.
  • the processing unit 301 may further send the second data on the second link.
  • the second resource is located on a licensed frequency band, and when the priority of the first data is lower than the priority of the second data, the processing unit 301 may further sending the second data on the second link.
  • the second resource is located on the authorized frequency band, when the LBT interception of the first link is successful, and the priority of the first data is lower than that of the second data priority, the processing unit 301 sends the second data on the second link.
  • the second resource is located on an unlicensed frequency band
  • the processing unit 301 Sending the first data on a link is specifically used for: when the listen-before-talk LBT interception of the first link succeeds and the LBT interception of the second link fails, on the second link Send the first data over a link.
  • the second resource is located on an unlicensed frequency band, and when the listen-before-talk LBT interception of the first link succeeds, and the priority of the first data is high
  • the processing unit 301 sends the first data on the first link, specifically for: when the listen-before-talk LBT of the first link listens If successful, the LBT interception of the second link is successful, and the priority of the first data is higher than the priority of the second data, sending the first data on the first link.
  • the first link is an uplink UL
  • the second link is a side link SL; or, the first link is a side link SL, The second link is an uplink UL.
  • the data transmission device 300 further includes a communication unit 302, which can be used to send the first data or the second data, and the communication unit 302 can also be used to communicate with other communication devices.
  • a communication unit 302 which can be used to send the first data or the second data, and the communication unit 302 can also be used to communicate with other communication devices.
  • FIG. 4 is a schematic structural diagram of a terminal device 400 provided in an embodiment of the present application.
  • the terminal device 400 described in the embodiment of the present application includes: a processor 401 and a memory 402, and the processor 401 and the memory 402 are connected through one or more communication buses.
  • the above-mentioned processor 401 may be a central processing unit (Central Processing Unit, CPU), and the processor may also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC) ), off-the-shelf programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
  • the processor 401 is configured to support the terminal device to execute corresponding functions of the terminal device in the method described in FIG. 2 .
  • the above-mentioned memory 402 may include a read-only memory and a random-access memory, and provides computer programs and data to the processor 401 .
  • a portion of memory 402 may also include non-volatile random access memory.
  • the processor 401 invokes the computer program, it is used to execute:
  • the first resource and the second resource overlap in the time domain;
  • the first resource is a resource occupied by the first link, the first link is used to carry the first data, and the second resource is the resource occupied by the first link.
  • the first data is sent on the first link.
  • processor 401 when the processor 401 calls the computer program, it is used to execute:
  • the first resource and the second resource overlap in the time domain;
  • the first resource is a resource occupied by the first link, the first link is used to carry the first data, and the second resource is the resource occupied by the first link.
  • the embodiment of the present application also provides a chip, the chip is configured to detect that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by the first link, and the first The link is used to carry the first data, the second resource is a resource occupied by the second link, the second link is used to carry the second data, and the first resource is located on an unlicensed frequency band; when the When the listen-before-talk LBT interception of the first link succeeds, the first data is sent on the first link.
  • An embodiment of the present application provides a module device, the module device includes a processor and a communication interface, the processor is connected to the communication interface, the communication interface is used for sending and receiving signals, and the processor is used for:
  • the first resource and the second resource overlap in the time domain;
  • the first resource is a resource occupied by the first link, the first link is used to carry the first data, and the second resource is the resource occupied by the first link.
  • the first data is sent on the first link.
  • the embodiment of the present application also provides a computer-readable storage medium.
  • the readable storage medium stores a computer program.
  • the computer program When executed by a processor, it can be used to implement the embodiment corresponding to FIG. 2 of the embodiment of the present application.
  • the wireless network search method described above will not be repeated here.
  • the computer-readable storage medium may be an internal storage unit of the terminal described in any of the foregoing embodiments, such as a hard disk or memory of the device.
  • the computer-readable storage medium can also be an external storage device of the terminal device, such as a plug-in hard disk equipped on the device, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) card, flash card (Flash Card), etc.
  • the computer-readable storage medium may also include both an internal storage unit of the terminal device and an external storage device.
  • the computer-readable storage medium is used to store the computer program and other programs and data required by the terminal device.
  • the computer-readable storage medium can also be used to temporarily store data that has been output or will be output.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM) or a random access memory (Random Access Memory, RAM), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed in the embodiments of the present application are a data transmission method and a related apparatus. The method comprises: a terminal device detecting that a first resource and a second resource overlap in a time domain, wherein the first resource is a resource occupied by a first link which is used for bearing first data, the second resource is a resource occupied by a second link which is used for bearing second data, and the first resource is located on an unlicensed frequency band; and when listen before talk (LBT) monitoring of the first link succeeds, the terminal device sending the first data on the first link. By means of the method, a terminal device determines, according to an LBT monitoring result of a first link, whether to send first data or second data, such that a resource waste, which is caused by both the first data and the second data not being sent since whether to send the first data or the second data is determined according to the priorities of the first data and the second data, can be avoided, thereby improving the resource utilization rate.

Description

一种数据传输方法及相关装置A data transmission method and related device 技术领域technical field
本申请涉及通信技术领域,尤其涉及一种数据传输方法及相关装置。The present application relates to the technical field of communications, and in particular to a data transmission method and a related device.
背景技术Background technique
在蜂窝网络通信中,终端设备可以在上行链路(uplink,UL)上向基站发送上行数据,在侧行链路(sidelink,SL)上向另一个终端设备发送侧行链路数据(sidelink data)。In cellular network communication, a terminal device can send uplink data to a base station on an uplink (UL), and send sidelink data (sidelink data) to another terminal device on a sidelink (SL). ).
然而,对于在同一时间仅支持在一个链路上发送数据的终端设备来说,该终端设备无法在UL和SL上同时发送数据。因此,在终端设备的数据发送能力受限的情况下,在非授权频段上如何实现UL和SL上数据的传输,以提高资源的利用率,是目前亟需解决的问题之一。However, for a terminal device that only supports data transmission on one link at a time, the terminal device cannot simultaneously transmit data on UL and SL. Therefore, in the case that the data transmission capability of the terminal equipment is limited, how to implement data transmission on the UL and SL on the unlicensed frequency band to improve resource utilization is one of the problems that need to be solved urgently.
发明内容Contents of the invention
本申请实施例提供了一种数据传输方法及相关装置,可提高资源利用率。Embodiments of the present application provide a data transmission method and a related device, which can improve resource utilization.
第一方面,本申请实施例提供了一种数据传输方法,该方法包括:终端设备检测到第一资源与第二资源在时域上存在重叠,第一资源为第一链路占用的资源,第一链路用于承载第一数据,第二资源为第二链路占用的资源,第二链路用于承载第二数据,且第一资源位于非授权频段上;当第一链路的先听后说LBT侦听成功时,终端设备在第一链路上发送第一数据。In the first aspect, the embodiment of the present application provides a data transmission method, the method includes: the terminal device detects that the first resource and the second resource overlap in the time domain, the first resource is the resource occupied by the first link, The first link is used to carry the first data, the second resource is the resource occupied by the second link, the second link is used to carry the second data, and the first resource is located in an unlicensed frequency band; when the first link When the listen-before-talk LBT interception succeeds, the terminal device sends the first data on the first link.
可见,该方式使得终端设备在第一链路占用的资源和第二链路占用的资源重叠,第一链路占用的资源位于非授权频段上时,根据第一链路的LBT侦听结果,判断发送第一数据还是第二数据,可避免根据第一数据和第二数据的优先级判断发送第一数据还是第二数据,导致的第一数据和第二数据均未被发送造成的资源浪费,从而可提高资源利用率。It can be seen that this method makes the terminal device overlap the resources occupied by the first link and the resources occupied by the second link, and when the resources occupied by the first link are located in the unlicensed frequency band, according to the LBT interception result of the first link, Judging whether to send the first data or the second data can avoid judging whether to send the first data or the second data according to the priority of the first data and the second data, resulting in waste of resources caused by neither the first data nor the second data being sent , which can improve resource utilization.
一种可选的实施方式中,当第一链路的先听后说LBT侦听成功时,终端设备在第一链路上发送第一数据,包括:当第一链路的先听后说LBT侦听成功,且第一数据的优先级高于第二数据的优先级时,终端设备在第一链路上发送第一数据。In an optional implementation manner, when the listen-before-talk LBT interception of the first link succeeds, the terminal device sends the first data on the first link, including: when the listen-before-talk of the first link When the LBT interception is successful and the priority of the first data is higher than the priority of the second data, the terminal device sends the first data on the first link.
可见,终端设备是根据第一链路上的LBT侦听结果,以及第一数据和第二数据的优先级,确定发送第一数据还是第二数据,而不仅是根据第一数据和第二数据的优先级,判断发送第一数据还是第二数据,从而有利于避免第一数据和第二数据均未被发送造成的资源浪费。It can be seen that the terminal device determines whether to send the first data or the second data according to the LBT interception result on the first link and the priority of the first data and the second data, not only based on the first data and the second data The priority of the first data or the second data is judged to be sent, thereby helping to avoid waste of resources caused by neither the first data nor the second data being sent.
另一种可选的实施方式中,当第一资源位于非授权频段上,上述第二资源位于授权频段上,且第一链路的LBT侦听成功时,终端设备在第一链路上 发送第一数据。In another optional implementation manner, when the first resource is located on an unlicensed frequency band, the second resource is located on a licensed frequency band, and the LBT interception of the first link succeeds, the terminal device sends first data.
可选的,当第一资源位于非授权频段上,第二资源位于授权频段上,第一链路的LBT侦听成功,且第一数据的优先级高于第二数据的优先级时,终端设备在第一链路上发送第一数据。Optionally, when the first resource is located on an unlicensed frequency band, the second resource is located on a licensed frequency band, the LBT interception of the first link is successful, and the priority of the first data is higher than that of the second data, the terminal A device sends first data on a first link.
可见,当第一资源和第二资源在时域上存在重叠,且第一资源位于非授权频段上时,第二资源可位于授权频段上。It can be seen that when the first resource and the second resource overlap in the time domain, and the first resource is located on the unlicensed frequency band, the second resource may be located on the licensed frequency band.
另一种可选的实施方式中,当第一资源位于非授权频段上,第二资源位于授权频段上,第一链路的LBT侦听失败时,终端设备在第二链路上发送第二数据。In another optional implementation manner, when the first resource is located on an unlicensed frequency band, the second resource is located on a licensed frequency band, and the LBT interception of the first link fails, the terminal device sends a second data.
可见,终端设备在第一资源位于非授权频段上,第二资源位于授权频段上时,若第一链路的LBT侦听成功,则在第一链路上发送第一数据;若第一链路的LBT侦听失败,则在第二链路上发送第二数据。也就是说,此时终端设备是根据第一链路的LBT侦听结果确定发送第一数据还是第二数据,可避免终端设备根据第一数据和第二数据的优先级确定发送第一数据还是第二数据时,第一数据和第二数据均未被发送导致的资源浪费。It can be seen that when the first resource is located in the unlicensed frequency band and the second resource is located in the licensed frequency band, if the LBT interception of the first link is successful, the terminal device will send the first data on the first link; if the first link If the LBT interception of the link fails, the second data is sent on the second link. That is to say, at this time, whether the terminal device determines to send the first data or the second data according to the LBT interception result of the first link can prevent the terminal device from determining whether to send the first data or the second data according to the priorities of the first data and the second data. For the second data, resource waste caused by neither the first data nor the second data being sent.
又一种可选的实施方式中,当第一资源位于非授权频段上,第二资源位于授权频段上,第一数据的优先级低于第二数据的优先级时,终端设备在第二链路上发送第二数据。In yet another optional implementation manner, when the first resource is located on an unlicensed frequency band, the second resource is located on a licensed frequency band, and the priority of the first data is lower than the priority of the second data, the terminal device in the second link Send the second data on the road.
可见,终端设备在第一资源位于非授权频段上,第二资源位于授权频段上时,只要第一数据的优先级低于第二数据的优先级时,终端设备不考虑第一链路上的LBT侦听结果,直接确定发送优先级高的第二数据,可确保承载在授权频段上的高优先级的数据被发送。It can be seen that when the first resource is located in the unlicensed frequency band and the second resource is located in the licensed frequency band, the terminal device does not consider the priority of the first data as long as the priority of the first data is lower than the priority of the second data. As a result of the LBT interception, it is directly determined to send the second data with a high priority, which can ensure that the high-priority data carried on the licensed frequency band is sent.
又一种可选的实施方式中,当第一资源位于非授权频段上,第二资源位于授权频段上,第一链路的LBT侦听成功,且第一数据的优先级低于第二数据的优先级时,终端设备在第二链路上发送第二数据。In yet another optional implementation manner, when the first resource is located on an unlicensed frequency band and the second resource is located on a licensed frequency band, the LBT interception of the first link succeeds, and the priority of the first data is lower than that of the second data When the priority is , the terminal device sends the second data on the second link.
可见,当第一资源位于非授权频段上,第二资源位于授权频段上,即使第一链路的LBT侦听成功,但第一数据的优先级低于第二数据的优先级,所以终端设备在第二链路上发送第二数据。It can be seen that when the first resource is located on the unlicensed frequency band and the second resource is located on the licensed frequency band, even if the LBT interception of the first link is successful, the priority of the first data is lower than that of the second data, so the terminal device Second data is sent on the second link.
又一种可选的实施方式中,第一资源位于非授权频段上,第二资源位于非授权频段上,当第一链路的先听后说LBT侦听成功时,终端设备在第一链路上发送第一数据,包括:当第一链路的先听后说LBT侦听成功,且第二链路的LBT侦听失败时,终端设备在第一链路上发送第一数据。In yet another optional implementation manner, the first resource is located on an unlicensed frequency band, and the second resource is located on an unlicensed frequency band. When the listen-before-talk LBT interception of the first link succeeds, the terminal device Sending the first data on the road includes: when the LBT interception of the first link succeeds and the LBT interception of the second link fails, the terminal device sends the first data on the first link.
也就是说,当第一资源和第二资源均位于非授权频段上时,终端设备在LBT侦听成功的链路上发送该链路对应的数据。That is to say, when both the first resource and the second resource are located in the unlicensed frequency band, the terminal device sends data corresponding to the link on the link where the LBT interception succeeds.
又一种可选的实施方式中,第一资源位于非授权频段,第二资源位于非授权频段上,当第一链路的先听后说LBT侦听成功,且第一数据的优先级高 于第二数据的优先级时,终端设备在第一链路上发送第一数据,包括:当第一链路的先听后说LBT侦听成功,第二链路的LBT侦听成功,且第一数据的优先级高于第二数据的优先级时,终端设备在第一链路上发送第一数据。In yet another optional implementation manner, the first resource is located in an unlicensed frequency band, and the second resource is located in an unlicensed frequency band. When the listen-before-talk LBT interception of the first link is successful, and the priority of the first data is high When the priority of the second data is given, the terminal device sends the first data on the first link, including: when the LBT interception of the first link is successful, the LBT interception of the second link is successful, and When the priority of the first data is higher than the priority of the second data, the terminal device sends the first data on the first link.
可见,终端设备在第一资源和第二资源均位于非授权频段上,第一链路和第二链路的LBT侦听均成功时,发送优先级高的第一数据。It can be seen that when both the first resource and the second resource are located in the unlicensed frequency band, and the LBT interception of the first link and the second link succeeds, the terminal device sends the first data with high priority.
一种可选的实施方式中,第一链路为上行链路UL,第二链路为侧行链路SL;或者,第一链路为侧行链路SL,第二链路为上行链路UL。可见,第一链路和第二链路中的一个为UL,另一个为SL链路。In an optional implementation manner, the first link is an uplink UL, and the second link is a sidelink SL; or, the first link is a sidelink SL, and the second link is an uplink road ul. It can be seen that one of the first link and the second link is a UL link, and the other is an SL link.
另一种可选的实施方式中,第一链路和第二链路均为UL,或者,第一链路和第二链路均为SL。In another optional implementation manner, both the first link and the second link are UL, or both the first link and the second link are SL.
第二方面,本申请实施例提供了一种数据传输装置,所述数据传输装置包括:In the second aspect, the embodiment of the present application provides a data transmission device, the data transmission device includes:
处理单元,用于检测到第一资源与第二资源在时域上存在重叠;所述第一资源为第一链路占用的资源,所述第一链路用于承载第一数据,所述第二资源为第二链路占用的资源,所述第二链路用于承载第二数据,且所述第一资源位于非授权频段上;a processing unit, configured to detect that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by a first link, the first link is used to carry first data, and the The second resource is a resource occupied by a second link, the second link is used to carry second data, and the first resource is located on an unlicensed frequency band;
处理单元,还用于当所述第一链路的先听后说LBT侦听成功时,在所述第一链路上发送所述第一数据。The processing unit is further configured to send the first data on the first link when the listen-before-talk LBT interception of the first link succeeds.
另外,该方面中,数据传输装置其他可选的实施方式可参见上述第一方面的相关内容,此处不再详述。In addition, in this aspect, for other optional implementation manners of the data transmission device, reference may be made to the relevant content of the above-mentioned first aspect, which will not be described in detail here.
第三方面,本申请实施例提供了一种终端设备,所述终端设备包括:In a third aspect, an embodiment of the present application provides a terminal device, where the terminal device includes:
存储器,用于存储计算机程序;memory for storing computer programs;
处理器,调用计算机程序,用于执行以下操作:A processor, calling a computer program, to:
检测到第一资源与第二资源在时域上存在重叠;所述第一资源为第一链路占用的资源,所述第一链路用于承载第一数据,所述第二资源为第二链路占用的资源,所述第二链路用于承载第二数据,且所述第一资源位于非授权频段上;It is detected that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by the first link, the first link is used to carry the first data, and the second resource is the resource occupied by the first link. Resources occupied by two links, the second link is used to carry the second data, and the first resource is located on an unlicensed frequency band;
当所述第一链路的先听后说LBT侦听成功时,在所述第一链路上发送所述第一数据。When the listen-before-talk LBT interception of the first link is successful, the first data is sent on the first link.
另外,该方面中,终端设备其他可选的实施方式可参见上述第一方面的相关内容,此处不再详述。In addition, in this aspect, for other optional implementation manners of the terminal device, reference may be made to the related content of the above-mentioned first aspect, which will not be described in detail here.
第四方面,本申请实施例提供一种芯片,所述芯片用于:检测到第一资源与第二资源在时域上存在重叠;所述第一资源为第一链路占用的资源,所述第一链路用于承载第一数据,所述第二资源为第二链路占用的资源,所述第二链路用于承载第二数据,且所述第一资源位于非授权频段上;当所述第一链路的先听后说LBT侦听成功时,在所述第一链路上发送所述第一数据。In a fourth aspect, an embodiment of the present application provides a chip, the chip is configured to: detect that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by the first link, so The first link is used to carry the first data, the second resource is a resource occupied by the second link, the second link is used to carry the second data, and the first resource is located on an unlicensed frequency band ; When the listen-before-talk LBT interception of the first link succeeds, sending the first data on the first link.
另外,该方面中,芯片其他可选的实施方式可参见上述第一方面的相关内容,此处不再详述。In addition, in this aspect, for other optional implementation manners of the chip, reference may be made to the relevant content of the above-mentioned first aspect, which will not be described in detail here.
第五方面,本申请实施例提供一种模组设备,所述模组设备包括处理器和通信接口,所述处理器与所述通信接口相连,所述通信接口用于收发信号,所述处理器用于:检测到第一资源与第二资源在时域上存在重叠;所述第一资源为第一链路占用的资源,所述第一链路用于承载第一数据,所述第二资源为第二链路占用的资源,所述第二链路用于承载第二数据,且所述第一资源位于非授权频段上;当所述第一链路的先听后说LBT侦听成功时,在所述第一链路上发送所述第一数据。In the fifth aspect, the embodiment of the present application provides a module device, the module device includes a processor and a communication interface, the processor is connected to the communication interface, the communication interface is used to send and receive signals, and the processing The device is used to: detect that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by the first link, the first link is used to carry the first data, and the second The resource is the resource occupied by the second link, the second link is used to carry the second data, and the first resource is located on the unlicensed frequency band; when the listen before talk LBT of the first link intercepts On success, sending the first data on the first link.
另外,该方面中,模组设备其他可选的实施方式可参见上述第一方面的相关内容,此处不再详述。In addition, in this aspect, for other optional implementation manners of the module device, reference may be made to the relevant content of the above-mentioned first aspect, which will not be described in detail here.
第六方面,本申请实施例提供一种计算机可读存储介质,用于储存上述终端所用的计算机软件指令,其包括用于执行上述第一方面任一所述的方法所涉及的程序。In a sixth aspect, an embodiment of the present application provides a computer-readable storage medium for storing computer software instructions used by the above-mentioned terminal, which includes a program for executing the method described in any one of the above-mentioned first aspects.
附图说明Description of drawings
图1为本申请实施例提供的一种通信系统的系统结构示意图;FIG. 1 is a schematic diagram of a system structure of a communication system provided by an embodiment of the present application;
图2为本申请实施例提供的一种数据传输方法的流程意图;FIG. 2 is a flow diagram of a data transmission method provided in an embodiment of the present application;
图3为本申请实施例提供的一种数据传输装置的结构示意图;FIG. 3 is a schematic structural diagram of a data transmission device provided in an embodiment of the present application;
图4为本申请实施例提供的一种终端设备的结构示意图。FIG. 4 is a schematic structural diagram of a terminal device provided in an embodiment of the present application.
具体实施方式detailed description
下面将结合本申请实施例中的附图,对本申请实施例进行阐述。The embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
本申请实施例涉及的通信系统如图1所示,该通信系统可包括但不限于一个网络设备和两个终端设备,图1所示的设备数量和形态用于举例并不构成对本申请实施例的限定,实际应用中可以包括一个以上的网络设备,两个以上的终端设备。图1所示的通信系统以一个网络设备101和终端设备1021、终端设备1022为例进行阐述,网络设备101可向终端设备1021和终端设备1022提供网络服务,终端设备1021和终端设备1022之间可进行通信。The communication system involved in the embodiment of the present application is shown in Figure 1. The communication system may include but is not limited to one network device and two terminal devices. However, the actual application may include more than one network device and more than two terminal devices. The communication system shown in FIG. 1 is described by taking a network device 101, a terminal device 1021, and a terminal device 1022 as an example. The network device 101 can provide network services to the terminal device 1021 and the terminal device 1022. Between the terminal device 1021 and the terminal device 1022 Communication is possible.
本申请实施例中的终端设备,也可以称为终端,可以指各种形式的用户设备(user equipment,UE)、接入终端、用户单元、用户站、移动站、移动台(mobile station,MS)、远方站、远程终端、移动设备、用户终端、无线通信设备、用户代理或用户装置。终端设备还可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理 设备、车载设备、可穿戴设备,第五代移动通信(5th generation mobile communication,5G)网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等,本申请实施例对此并不限定。The terminal equipment in the embodiment of the present application may also be referred to as a terminal, and may refer to various forms of user equipment (user equipment, UE), access terminal, user unit, user station, mobile station, mobile station (mobile station, MS ), remote station, remote terminal, mobile device, user terminal, wireless communication device, user agent or user device. The terminal device may also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, terminal devices in the fifth generation mobile communication (5th generation mobile communication, 5G) network or future evolution of public land mobile communication The terminal devices in the network (public land mobile network, PLMN), etc., are not limited in this embodiment of the present application.
本申请实施例中的网络设备包括接入网的基站和基站控制器,还可以包含终端设备。The network equipment in this embodiment of the present application includes a base station and a base station controller of an access network, and may also include terminal equipment.
本申请实施例中的基站(base station,BS),也可称为基站设备,是一种部署在无线接入网(wireless access network,RAN)中用以提供无线通信功能的装置。例如,在第二代移动通信(2th generation mobile communication,2G)网络中提供基站功能的设备包括基地无线收发站(base transceiver station,BTS)。第三代移动通信(3th generation mobile communication,3G)网络中提供基站功能的设备包括节点B(NodeB)。在第四代移动通信(4th generation mobile communication,4G)网络中提供基站功能的设备包括演进的节点B(evolved NodeB,eNB)。在无线局域网络(Wireless Local Area Networks,WLAN)中,提供基站功能的设备为接入点(Access Point,AP)。5G新无线(New Radio,NR)中的提供基站功能的设备gNB,以及继续演进的节点B(ng-eNB),其中gNB和终端设备之间采用NR技术进行通信,ng-eNB和终端之间采用演进的通用地面无线接入(evolved universal terrestrial radio access,E-UTRA)技术进行通信,gNB和ng-eNB均可连接到5G核心网。本申请实施例中的基站还包含在未来新的通信系统中提供基站功能的设备等。The base station (base station, BS) in the embodiment of the present application may also be referred to as a base station device, and is a device deployed in a wireless access network (wireless access network, RAN) to provide a wireless communication function. For example, equipment providing base station functions in a second generation mobile communication (2th generation mobile communication, 2G) network includes a base transceiver station (base transceiver station, BTS). A device providing a base station function in a third generation mobile communication (3th generation mobile communication, 3G) network includes a node B (NodeB). Devices providing base station functions in a 4th generation mobile communication (4th generation mobile communication, 4G) network include an evolved Node B (evolved NodeB, eNB). In a wireless local area network (Wireless Local Area Networks, WLAN), the device that provides the base station function is an access point (Access Point, AP). In 5G New Radio (New Radio, NR), the device gNB that provides base station functions, and the node B (ng-eNB) that continues to evolve, in which gNB and terminal equipment use NR technology for communication, and between ng-eNB and the terminal Using evolved universal terrestrial radio access (E-UTRA) technology for communication, both gNB and ng-eNB can be connected to the 5G core network. The base station in the embodiment of the present application also includes devices that provide base station functions in future new communication systems, and the like.
本申请实施例中的基站控制器,也可以称为基站控制器设备,是一种管理基站的装置。例如,2G网络中的基站控制器(base station controller,BSC)、3G网络中的无线网络控制器(radio network controller,RNC)、未来新的通信系统中控制管理基站的装置。The base station controller in the embodiment of the present application may also be called a base station controller device, which is a device for managing a base station. For example, a base station controller (base station controller, BSC) in a 2G network, a radio network controller (radio network controller, RNC) in a 3G network, and a device for controlling and managing a base station in a new communication system in the future.
本申请可适用于5G通信系统,还可适用于4G通信系统、3G通信系统,还可适用于未来新的各种通信系统,例如第六代(6th Generation,6G)移动通信、第七代(7th Generation,7G)移动通信等,本申请实施例对此并不限定。This application is applicable to 5G communication systems, 4G communication systems, 3G communication systems, and various new communication systems in the future, such as the sixth generation (6th Generation, 6G) mobile communication, the seventh generation ( 7th Generation, 7G) mobile communications, etc., which are not limited in this embodiment of the present application.
本申请也适用于不同的网络架构,包括但不限于中继网络架构、双链接架构、车辆到任何物体的通信(vehicle-to-everything,V2X)架构、设备到设备的通信(Device-to-Device,D2D)等架构。This application is also applicable to different network architectures, including but not limited to relay network architecture, dual-link architecture, vehicle-to-everything (V2X) architecture, device-to-device communication (Device-to- Device, D2D) and other architectures.
如上述图1所示,在蜂窝网络通信中,终端设备1021可以在上行链路(uplink,UL)上向网络设备101发送上行数据,在侧行链路(sidelink,SL)上向另一个终端设备1022发送侧行链路数据(sidelink data)。As shown in Figure 1 above, in cellular network communication, terminal device 1021 can send uplink data to network device 101 on the uplink (uplink, UL), and send uplink data to another terminal on the sidelink (sidelink, SL). Device 1022 transmits sidelink data.
通常情况下,由于终端设备的能力限制,终端设备在同一时间只能发送一个链路上的数据。例如,当终端设备在同一时间有UL的数据和SL的数据 需要发送时,终端设备只能发送其中一条链路上的数据。目前,当UL占用的资源和SL占用的资源均位于授权频段上,且在同一时间需发送UL上的数据和SL上的数据时,终端设备按照数据的优先级规则发送其中一条链路上的数据,即终端设备发送UL上的数据和SL上的数据中优先级更高的数据。Usually, due to the capability limitation of the terminal device, the terminal device can only send data on one link at a time. For example, when a terminal device needs to send UL data and SL data at the same time, the terminal device can only send data on one of the links. Currently, when the resources occupied by the UL and the resources occupied by the SL are located in the licensed frequency band, and the data on the UL and the data on the SL need to be sent at the same time, the terminal device sends the data on one of the links according to the priority rules of the data. Data, that is, the data with higher priority among the data on the UL and the data on the SL sent by the terminal device.
需要说明的是,本发明中提到的UL上的数据和SL上的数据中优先级更高的数据,可以通过以下方式确定:It should be noted that, among the data on the UL and the data on the SL mentioned in the present invention, the data with higher priority can be determined in the following manner:
1.UL上数据的优先级数值和SL上数据的优先级数值直接比较,数值更大或更小的为优先级更高的数据;1. The priority value of the data on the UL is directly compared with the priority value of the data on the SL, and the data with a larger or smaller value is the data with a higher priority;
2.当配置有第一阈值,SL上的数据的优先级数值小于第一阈值,SL上的数据为优先级更高的数据,否则,UL上的数据为优先级更高的数据;2. When the first threshold is configured and the priority value of the data on SL is less than the first threshold, the data on SL is data with higher priority; otherwise, the data on UL is data with higher priority;
3.当配置有第一阈值及第二阈值,SL上的数据的优先级数值小于第一阈值,且UL上的数据的优先级大于第二阈值,SL上的数据为优先级更高的数据,否则,UL上的数据为优先级更高的数据;3. When the first threshold and the second threshold are configured, the priority value of the data on the SL is less than the first threshold, and the priority of the data on the UL is greater than the second threshold, and the data on the SL is data with a higher priority , otherwise, the data on UL is data with higher priority;
4.对于随机接入中的第一消息和第三消息,以及紧急情况消息,UL上的数据为优先级更高的数据。4. For the first message and the third message in the random access, and the emergency message, the data on the UL has a higher priority.
上述确定UL数据还是SL数据优先级哪一个更高的方式仅为本发明的一种示例,本发明不限制其他确定更高优先级数据的方式。The above manner of determining which one has higher priority, UL data or SL data, is only an example of the present invention, and the present invention does not limit other manners of determining higher priority data.
然而,当UL占用的资源和SL占用的资源中的其中一个资源位于非授权频段上,且在同一时间需发送UL上的数据和SL上的数据时,终端设备需对位于非授权频段的链路进行先听后说(listen before talk,LBT)操作,即通过LBT侦听结果判断信道是否空闲,终端设备只能在信道空闲的链路上才可以传输数据。那么,可能发生高优先级数据无法传输,低优先级数据对应的链路的LBT侦听结果为信道空闲,低优先级的数据可以传输的情况,如果仍然按照优先级确定被传输的数据,则可能导致资源浪费。另外,若高优先级的数据对应链路的LBT侦听结果为信道繁忙时,高优先级数据也不能被发送,从而导致通信效率较低。However, when one of the resources occupied by the UL and the resources occupied by the SL is located in the unlicensed frequency band, and the data on the UL and the data on the SL need to be sent at the same time, the terminal device needs to check the links located in the unlicensed frequency band. The channel performs a listen before talk (LBT) operation, that is, judges whether the channel is idle based on the LBT interception result, and the terminal device can only transmit data on the link where the channel is idle. Then, it may happen that the high-priority data cannot be transmitted, and the LBT detection result of the link corresponding to the low-priority data is that the channel is idle, and the low-priority data can be transmitted. If the transmitted data is still determined according to the priority, then May lead to waste of resources. In addition, if the LBT detection result of the link corresponding to the high-priority data is that the channel is busy, the high-priority data cannot be sent, resulting in low communication efficiency.
本申请实施例提供一种数据传输方法100。该方法中,终端设备检测到第一资源与第二资源在时域上存在重叠,第一资源为第一链路占用的资源,第一链路用于承载第一数据,第二资源为第二链路占用的资源,第二链路用于承载第二数据,且第一资源位于非授权频段上;当第一链路的先听后说LBT侦听成功时,终端设备在第一链路上发送第一数据。An embodiment of the present application provides a data transmission method 100 . In this method, the terminal device detects that the first resource and the second resource overlap in the time domain, the first resource is the resource occupied by the first link, the first link is used to carry the first data, and the second resource is the resource occupied by the first link. The resources occupied by the two links, the second link is used to carry the second data, and the first resource is located in the unlicensed frequency band; when the listen-before-talk LBT interception of the first link succeeds, the terminal Send the first data on the road.
该方式使得终端设备在第一链路占用的资源和第二链路占用的资源重叠,第一链路占用的资源位于非授权频段上时,根据第一链路的LBT侦听结果,判断发送第一数据还是第二数据,可避免根据第一数据和第二数据的优先级确定发送第一数据还是第二数据时,导致的第一数据和第二数据均未被发送造成的资源浪费,从而可提高资源利用率。This method enables the terminal device to judge the transmission according to the LBT interception result of the first link when the resources occupied by the first link overlap with the resources occupied by the second link, and the resources occupied by the first link are located in the unlicensed frequency band. Whether the first data or the second data can avoid resource waste caused by neither the first data nor the second data being sent when determining whether to send the first data or the second data according to the priorities of the first data and the second data, Thus, resource utilization can be improved.
基于上述描述,本申请实施例提出一种如图2所示的数据传输方法100,该方法可以包括S201-S202:Based on the above description, the embodiment of the present application proposes a data transmission method 100 as shown in FIG. 2, which may include S201-S202:
S201:终端设备检测到第一资源与第二资源在时域上存在重叠;第一资源为第一链路占用的资源,第一链路用于承载第一数据,第二资源为第二链路占用的资源,第二链路用于承载第二数据,且第一资源位于非授权频段上。S201: The terminal device detects that the first resource and the second resource overlap in the time domain; the first resource is the resource occupied by the first link, the first link is used to carry the first data, and the second resource is the resource occupied by the second link resources occupied by the link, the second link is used to carry the second data, and the first resource is located on an unlicensed frequency band.
可理解的,第一资源与第二资源在时域上存在重叠,是指终端设备传输第一数据的资源和传源输第二数据的资在时域上存在重叠。例如,终端设备需在时域资源第0个时隙(slot)到第6个slot上传输第一数据,也需在时域资源第4个slot到第9个slot上传输第二数据,则第一数据和第二数据在第4个slot到第6个slot上的传输资源是重叠的,即第一资源和第二资源在时域上存在重叠。It can be understood that the overlap between the first resource and the second resource in the time domain means that the resource for transmitting the first data by the terminal device and the resource for transmitting the second data by the transmission source overlap in the time domain. For example, the terminal device needs to transmit the first data on the 0th slot (slot) to the 6th slot of the time domain resource, and also needs to transmit the second data on the 4th slot to the 9th slot of the time domain resource, then The transmission resources of the first data and the second data on the 4th slot to the 6th slot overlap, that is, the first resource and the second resource overlap in the time domain.
可见,终端设备在确定第一链路上待发送的第一数据,以及第二链路上待发送的第二数据后,检测到用于传输第一数据的第一资源和用于传输第二数据的第二资源在时域上存在重叠,此时由于终端设备的能力受限,终端设备只能发送第一数据和第二数据中的一个数据。It can be seen that after determining the first data to be sent on the first link and the second data to be sent on the second link, the terminal device detects the first resource for transmitting the first data and the resource for transmitting the second The second resource of data overlaps in the time domain. At this time, due to the limited capability of the terminal device, the terminal device can only send one of the first data and the second data.
S202:当第一链路的先听后说LBT侦听成功时,终端设备在第一链路上发送第一数据。S202: When the listen-before-talk LBT interception of the first link succeeds, the terminal device sends the first data on the first link.
其中,第一链路的LBT侦听成功,是指终端设备对第一链路进行LBT侦听,且侦听出第一链路上的信道空闲。当终端设备侦听出第一链路上的信道空闲时,表明可在第一链路上传输数据,因此终端设备在第一链路的先听后说LBT侦听成功时,在第一链路上发送第一数据。Wherein, the successful LBT interception of the first link means that the terminal device performs LBT interception on the first link, and detects that the channel on the first link is idle. When the terminal device detects that the channel on the first link is idle, it indicates that data can be transmitted on the first link. Send the first data on the road.
另外,当第一链路的先听后说LBT侦听成功时,终端设备在第一链路上发送第一数据,可理解为:终端设备在确定了在第一链路上待发送的第一数据和在第二链路上待发送的第二数据后,将第一数据和第二数据分别进行组包,生成第一数据包和第二数据包,然后对第一链路进行LBT侦听,在第一链路的LBT侦听成功时,发送第一数据包。In addition, when the listen-before-talk LBT interception of the first link is successful, the terminal device sends the first data on the first link, which can be understood as: the terminal device determines the first data to be sent on the first link After the first data and the second data to be sent on the second link, the first data and the second data are respectively packaged to generate the first data packet and the second data packet, and then LBT detection is performed on the first link Listening, when the LBT interception of the first link succeeds, the first data packet is sent.
一种可选的实现方式中,在第一资源与第二资源在时域上存在重叠,第一资源位于非授权频段时,当第一链路的先听后说LBT侦听成功时,终端设备在第一链路上发送第一数据,包括:当第一链路的先听后说LBT侦听成功,且第一数据的优先级高于第二数据的优先级时,终端设备在第一链路上发送第一数据。In an optional implementation manner, when the first resource overlaps with the second resource in the time domain, and the first resource is located in an unlicensed frequency band, when the listen-before-talk LBT interception of the first link succeeds, the terminal The device sends the first data on the first link, including: when the listen-before-talk LBT interception of the first link succeeds, and the priority of the first data is higher than the priority of the second data, the terminal device Send the first data on a link.
可见,终端设备在第一链路的先听后说LBT侦听成功且第一数据的优先级高于第二数据的优先级时,才在第一链路上发送第一数据的。即终端设备是结合第一链路的LBT侦听结果,以及第一数据和第二数据的优先级,确定发送第一数据还是第二数据,而不仅根据第一数据和第二数据的优先级确定 发送第一数据还是第二数据,从而可避免终端设备确定第一数据和第二数据均不发送而导致的资源浪费。It can be seen that the terminal device sends the first data on the first link only when the listen-before-talk LBT interception of the first link succeeds and the priority of the first data is higher than the priority of the second data. That is, the terminal device determines whether to send the first data or the second data based on the LBT interception result of the first link and the priority of the first data and the second data, not only according to the priority of the first data and the second data Whether to send the first data or the second data is determined, thereby avoiding resource waste caused by the terminal device determining that neither the first data nor the second data is sent.
另一种可选的实施方式中,当第一资源位于非授权频段上,上述第二资源位于授权频段上,且第一链路的LBT侦听成功时,终端设备在第一链路上发送第一数据。In another optional implementation manner, when the first resource is located on an unlicensed frequency band, the second resource is located on a licensed frequency band, and the LBT interception of the first link succeeds, the terminal device sends first data.
可选的,第一资源位于非授权频段上,第二资源位于授权频段上,第一链路的LBT侦听成功,且第一数据的优先级高于第二数据的优先级时,终端设备在第一链路上发送第一数据。Optionally, when the first resource is located on the unlicensed frequency band, the second resource is located on the authorized frequency band, the LBT interception of the first link is successful, and the priority of the first data is higher than that of the second data, the terminal device First data is sent on the first link.
可见,当第一资源和第二资源在时域上存在重叠,且第一资源位于非授权频段上时,第二资源可位于授权频段上。It can be seen that when the first resource and the second resource overlap in the time domain, and the first resource is located on the unlicensed frequency band, the second resource may be located on the licensed frequency band.
另一种可选的实施方式中,当第一资源位于非授权频段上,第二资源位于非授权频段上时,当第一链路的先听后说LBT侦听成功时,终端设备在第一链路上发送第一数据,包括:当第一链路的先听后说LBT侦听成功,且第二链路的LBT侦听失败时,终端设备在第一链路上发送第一数据。In another optional implementation manner, when the first resource is located on an unlicensed frequency band and the second resource is located on an unlicensed frequency band, when the listen-before-talk LBT interception of the first link succeeds, the terminal device at the Sending the first data on a link includes: when the LBT interception of the first link succeeds and the LBT interception of the second link fails, the terminal device sends the first data on the first link .
也就是说,终端设备在第一资源和第二资源均位于非授权频段上时,发送的是LBT侦听成功的链路上的数据,以保证信道空闲的链路上的数据被发送。That is to say, when both the first resource and the second resource are located in the unlicensed frequency band, the terminal device sends the data on the link whose LBT interception is successful, so as to ensure that the data on the link with an idle channel is sent.
又一种可选的实施方式中,第一资源位于非授权频段上,第二资源位于非授权频段上时,当第一链路的先听后说LBT侦听成功,且第一数据的优先级高于第二数据的优先级时,终端设备在第一链路上发送第一数据,包括:当第一链路的先听后说LBT侦听成功,第二链路的LBT侦听成功,且第一数据的优先级高于第二数据的优先级时,终端设备在第一链路上发送第一数据。In yet another optional implementation manner, when the first resource is located on an unlicensed frequency band and the second resource is located on an unlicensed frequency band, when the listen-before-talk LBT interception of the first link succeeds, and the priority of the first data When the priority is higher than the priority of the second data, the terminal device sends the first data on the first link, including: when the LBT interception of the first link is successful, the LBT interception of the second link is successful , and when the priority of the first data is higher than the priority of the second data, the terminal device sends the first data on the first link.
也就是说,终端设备在第一资源和第二资源均位于非授权频段上,第一链路和第二链路的LBT侦听均成功时,根据优先级原则,发送优先级高的第一数据。That is to say, when the first resource and the second resource are located in the unlicensed frequency band, and the LBT interception of the first link and the second link is successful, according to the principle of priority, the terminal device sends the first resource with higher priority. data.
可见,本申请实施例中,在第一资源与第二资源在时域上存在重叠,第一资源位于非授权频段时,只要第一链路的LBT侦听成功,则终端设备在第一链路上发送第一数据。也就是说,终端设备在第一链路占用的资源和第二链路占用的资源重叠,第一链路占用的资源位于非授权频段上时,不考虑第一数据和第二数据的优先级,只要第一链路的LBT侦听成功,就发送第一数据,可避免根据第一数据和第二数据的优先级确定发送第一数据还是第二数据时,导致的第一数据和第二数据均未被发送造成的资源浪费,从而可提高资源利用率。It can be seen that in the embodiment of the present application, when the first resource and the second resource overlap in the time domain, and the first resource is located in the unlicensed frequency band, as long as the LBT interception of the first link is successful, the terminal device in the first link Send the first data on the road. That is to say, when the resources occupied by the first link and the resources occupied by the second link overlap, and the resources occupied by the first link are located in the unlicensed frequency band, the terminal device does not consider the priority of the first data and the second data , as long as the LBT interception of the first link is successful, the first data is sent, which can avoid the first data and the second data caused by determining whether to send the first data or the second data according to the priority The waste of resources caused by none of the data being sent can improve resource utilization.
另外,一种可选的实施方式中,当第一资源位于非授权频段上,第二资源位于授权频段上,第一链路的LBT侦听失败时,终端设备在第二链路上发送第二数据。In addition, in an optional implementation manner, when the first resource is located on an unlicensed frequency band, the second resource is located on a licensed frequency band, and the LBT listening of the first link fails, the terminal device sends the second link on the second link. Second data.
可见,终端设备在第一资源位于非授权频段上,第二资源位于授权频段上时,若第一链路的LBT侦听成功,则在第一链路上发送第一数据;若第一链路的LBT侦听失败,则在第二链路上发送第二数据。也就是说,此时终端设备是根据第一链路的LBT侦听结果确定发送第一数据还是第二数据,可避免终端设备根据第一数据和第二数据的优先级确定发送第一数据还是第二数据时,第一数据和第二数据均未被发送导致的资源浪费。It can be seen that when the first resource is located in the unlicensed frequency band and the second resource is located in the licensed frequency band, if the LBT interception of the first link is successful, the terminal device will send the first data on the first link; if the first link If the LBT interception of the link fails, the second data is sent on the second link. That is to say, at this time, whether the terminal device determines to send the first data or the second data according to the LBT interception result of the first link can prevent the terminal device from determining whether to send the first data or the second data according to the priorities of the first data and the second data. For the second data, resource waste caused by neither the first data nor the second data being sent.
又一种可选的实施方式中,当第一资源位于非授权频段上,第二资源位于授权频段上,第一数据的优先级低于第二数据的优先级时,终端设备在第二链路上发送第二数据。可见,终端设备在第一资源位于非授权频段上,第二资源位于授权频段上时,只要第一数据的优先级低于第二数据的优先级时,终端设备不考虑第一链路上的LBT侦听结果,直接确定发送优先级高的第二数据,可确保承载在授权频段上的高优先级的数据被发送。In yet another optional implementation manner, when the first resource is located on an unlicensed frequency band, the second resource is located on a licensed frequency band, and the priority of the first data is lower than the priority of the second data, the terminal device in the second link Send the second data on the road. It can be seen that when the first resource is located in the unlicensed frequency band and the second resource is located in the licensed frequency band, the terminal device does not consider the priority of the first data as long as the priority of the first data is lower than the priority of the second data. As a result of the LBT interception, it is directly determined to send the second data with a high priority, which can ensure that the high-priority data carried on the licensed frequency band is sent.
又一种可选的实施方式中,在第一资源位于非授权频段上,第二资源位于授权频段上,且当第一链路的LBT侦听成功,且第一数据的优先级低于第二数据的优先级时,终端设备在第二链路上发送第二数据。In yet another optional implementation manner, when the first resource is located on an unlicensed frequency band and the second resource is located on a licensed frequency band, and when the LBT interception of the first link succeeds, and the priority of the first data is lower than that of the first data When the priority of the second data, the terminal device sends the second data on the second link.
可见,当第一资源位于非授权频段上,第二资源位于授权频段上,即使第一链路的LBT侦听成功,但第一数据的优先级低于第二数据的优先级,所以终端设备在第二链路上发送第二数据。It can be seen that when the first resource is located on the unlicensed frequency band and the second resource is located on the licensed frequency band, even if the LBT interception of the first link is successful, the priority of the first data is lower than that of the second data, so the terminal device Second data is sent on the second link.
本申请实施例中,上述第一链路为上行链路UL,第二链路为侧行链路SL。或者,上述第一链路为侧行链路SL,第二链路为上行链路UL。再或者,上述第一链路和第二链路均为上行链路UL。再或者,上述第一链路和第二链路均为侧行链路SL。本申请实施例对第一链路和第二链路的具体实施方式不做限定。In the embodiment of the present application, the above-mentioned first link is an uplink UL, and the second link is a side link SL. Alternatively, the above-mentioned first link is a side link SL, and the second link is an uplink UL. Alternatively, both the above-mentioned first link and the second link are uplinks UL. Alternatively, both the above-mentioned first link and the second link are side links SL. The embodiment of the present application does not limit the specific implementation manners of the first link and the second link.
以下以第一链路为UL,第二链路为SL为例,结合UL占用的资源位于非授权频段上,SL占用的资源位于授权频段上,或位于非授权频段上,阐述上述实施方式:Taking the first link as UL and the second link as SL as an example, and considering that the resources occupied by UL are located on the unlicensed frequency band, and the resources occupied by SL are located on the licensed frequency band or on the unlicensed frequency band, the above-mentioned implementation is described:
1.UL占用的资源位于非授权频段上,SL占用的资源位于授权频段上。1. The resources occupied by UL are located in the unlicensed frequency band, and the resources occupied by SL are located in the licensed frequency band.
一种可选的实施方式中,当UL上的LBT侦听成功,则终端设备在UL上发送第一数据。In an optional implementation manner, when the LBT interception on the UL succeeds, the terminal device sends the first data on the UL.
由于UL占用的资源位于非授权频段上,终端设备需对UL进行LBT侦听,那么只有在侦听出UL上的信道空闲时,终端设备才能在UL上发送第一数据,即终端设备在UL上传输数据的几率较小,那么只要终端设备侦听出UL上的空闲,即UL上的LBT侦听成功时,终端设备就在UL上发送第一数据,以保证UL上空闲信道被充分利用,可提高资源利用率。Since the resources occupied by the UL are located in the unlicensed frequency band, the terminal device needs to perform LBT interception on the UL. Then, only when the channel on the UL is detected to be idle, the terminal device can send the first data on the UL, that is, the terminal device is on the UL. The probability of transmitting data on the UL is small, so as long as the terminal device detects that the UL is idle, that is, when the LBT on the UL intercepts successfully, the terminal device will send the first data on the UL to ensure that the UL idle channel is fully utilized , can improve resource utilization.
另一种可选的实施方式中,当UL上的LBT侦听成功,且第一数据的优先级高于第二数据的优先级时,终端设备在UL上发送第一数据。In another optional implementation manner, when the LBT interception on the UL succeeds and the priority of the first data is higher than that of the second data, the terminal device sends the first data on the UL.
也就是说,终端设备在UL的资源位于非授权频段上时,只有侦听出UL上的信道空闲,且第一数据的优先级高于第二数据的优先级时,才在UL上发送第一数据,否则在SL上发送第二数据,以保证SL上的数据被优先发送。That is to say, when the UL resource is located in the unlicensed frequency band, the terminal device will only send the first data on the UL when it detects that the channel on the UL is idle and the priority of the first data is higher than that of the second data. Otherwise, send the second data on the SL to ensure that the data on the SL is sent first.
又一种可选的实施方式中,当UL的LBT侦听成功,且第一数据的优先级低于第二数据的优先级时,终端设备在UL上发送第一数据。可见,即使第一数据的优先级较低,但只要UL上的LBT侦听成功,终端设备就发送第一数据,以保证空闲信道对应的链路上的数据被发送,可提高资源利用率。In yet another optional implementation manner, when the UL LBT interception succeeds and the priority of the first data is lower than the priority of the second data, the terminal device sends the first data on the UL. It can be seen that even if the priority of the first data is low, as long as the LBT interception on the UL is successful, the terminal device will send the first data to ensure that the data on the link corresponding to the idle channel is sent, which can improve resource utilization.
又一种可选的实施方式中,当UL的LBT侦听失败,终端设备在SL上发送第二数据。即终端设备在UL的LBT侦听成功时,在UL上发送第一数据;在UL的LBT侦听失败时,在SL上发送第二数据。In yet another optional implementation manner, when the UL LBT interception fails, the terminal device sends the second data on the SL. That is, when the UL LBT interception succeeds, the terminal device sends the first data on the UL; when the UL LBT interception fails, it sends the second data on the SL.
又一种可选的实施方式中,当UL的LBT侦听失败,且第一数据的优先级低于第二数据的优先级时,终端设备在SL上发送第二数据。可见,终端设备在第一数据的优先级低于第二数据的优先级,且UL的LBT侦听失败时,发送了第二数据,以保证第一数据和第二数据中的一个数据被发送了,从而避免第一数据和第二数据均未被发送而导致的资源浪费。In yet another optional implementation manner, when the UL LBT interception fails and the priority of the first data is lower than the priority of the second data, the terminal device sends the second data on the SL. It can be seen that when the priority of the first data is lower than that of the second data and the UL LBT interception fails, the terminal device sends the second data to ensure that one of the first data and the second data is sent Therefore, resource waste caused by neither the first data nor the second data being sent is avoided.
又一种可选的实施方式中,当UL的LBT侦听成功,且第一数据的优先级低于第二数据的优先级时,终端设备在SL上发送第二数据。可见,即使UL的LBT侦听成功,但由于第一数据的优先级低于第二数据的优先级,所以终端设备仍发送SL上的第二数据。In yet another optional implementation manner, when the UL LBT interception succeeds and the priority of the first data is lower than the priority of the second data, the terminal device sends the second data on the SL. It can be seen that even though the UL LBT interception is successful, the terminal device still sends the second data on the SL because the priority of the first data is lower than that of the second data.
2.UL占用的资源位于非授权频段上,SL占用的资源位于非授权频段上。2. The resources occupied by UL are located in the unlicensed frequency band, and the resources occupied by SL are located in the unlicensed frequency band.
一种可选的实施方式中,UL的LBT侦听成功,SL的LBT侦听成功,且第一数据的优先级高于第二数据的优先级时,终端设备在UL上发送第一数据。In an optional implementation manner, when the UL LBT interception succeeds, the SL LBT interception succeeds, and the priority of the first data is higher than that of the second data, the terminal device sends the first data on the UL.
另一种可选的实施方式中,UL的LBT侦听成功,SL的LBT侦听成功,且第一数据的优先级低于第二数据的优先级时,终端设备在SL上发送第二数据。In another optional implementation manner, when the UL LBT interception is successful, the SL LBT interception is successful, and the priority of the first data is lower than the priority of the second data, the terminal device sends the second data on the SL .
也就是说,终端设备在UL占用的资源和SL占用的资源均位于非授权频段上,且UL和SL的LBT侦听均成功时,终端设备发送第一数据和第二数据中优先级高的数据,以保证第一数据和第二数据中优先级较高的数据被发送,即使得第一数据和第二数据中的其中一个数据被发送,有利于提高通信效率和资源利用率。That is to say, when the resources occupied by the UL and the resources occupied by the SL of the terminal device are located in the unlicensed frequency band, and the LBT interception of both UL and SL is successful, the terminal device sends the first data and the second data with higher priority. data to ensure that the data with higher priority among the first data and the second data is sent, that is, one of the first data and the second data is sent, which is beneficial to improve communication efficiency and resource utilization.
又一种可选的实施方式中,UL的LBT侦听成功,SL的LBT侦听失败,终端设备在UL上发送第一数据。In yet another optional implementation manner, the LBT interception of the UL succeeds, but the LBT interception of the SL fails, and the terminal device sends the first data on the UL.
又一种可选的实施方式中,UL的LBT侦听失败,SL的LBT侦听成功,终端设备在SL上发送第一数据。In yet another optional implementation manner, the LBT interception of the UL fails, the LBT interception of the SL succeeds, and the terminal device sends the first data on the SL.
可见,当UL占用的资源和SL占用的资源均位于非授权频段上时,若其中一个链路的LBT侦听成功,那么终端设备就在LBT侦听成功的链路上发送 对应的数据,以保证信道空闲的链路被充分利用,以提高资源利用率。It can be seen that when the resources occupied by UL and the resources occupied by SL are located in the unlicensed frequency band, if the LBT interception of one of the links is successful, then the terminal device will send the corresponding data on the link where the LBT interception is successful, so as to Ensure that links with idle channels are fully utilized to improve resource utilization.
本申请实施例中,当上述第一链路为SL,第二链路为UL,SL占用的资源位于非授权频段上时,终端设备确定发送第一数据还是第二数据的实施方式,可参见上述第一链路为UL,第二链路为SL,UL占用的资源位于非授权频段上时的实施方式,不再赘述。In the embodiment of this application, when the above-mentioned first link is SL, the second link is UL, and the resources occupied by SL are located in the unlicensed frequency band, the implementation method for the terminal device to determine whether to send the first data or the second data can be found in The implementation manner when the above-mentioned first link is UL, the second link is SL, and the resource occupied by UL is located in an unlicensed frequency band will not be repeated here.
参见图3,图3是本发明实施例提供的一种数据传输装置的结构示意图,所述数据传输装置用于终端设备中。所述数据传输装置300可以包括:Referring to FIG. 3 , FIG. 3 is a schematic structural diagram of a data transmission device provided by an embodiment of the present invention, and the data transmission device is used in a terminal device. The data transmission device 300 may include:
处理单元301,用于检测到第一资源与第二资源在时域上存在重叠;所述第一资源为第一链路占用的资源,所述第一链路用于承载第一数据,所述第二资源为第二链路占用的资源,所述第二链路用于承载第二数据,且所述第一资源位于非授权频段上;The processing unit 301 is configured to detect that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by a first link, and the first link is used to carry first data, so The second resource is a resource occupied by a second link, the second link is used to carry second data, and the first resource is located on an unlicensed frequency band;
处理单元301,还用于当所述第一链路的先听后说LBT侦听成功时,在所述第一链路上发送所述第一数据。The processing unit 301 is further configured to send the first data on the first link when the listen-before-talk LBT interception of the first link succeeds.
一种可选的实施方式中,所述当所述第一链路的先听后说LBT侦听成功时,所述处理单元301在所述第一链路上发送所述第一数据,具体用于:当所述第一链路的先听后说LBT侦听成功,且所述第一数据的优先级高于所述第二数据的优先级时,在所述第一链路上发送所述第一数据。In an optional implementation manner, when the listen-before-talk LBT interception of the first link succeeds, the processing unit 301 sends the first data on the first link, specifically Used for: when the listen-before-talk LBT interception of the first link is successful, and the priority of the first data is higher than the priority of the second data, sending on the first link the first data.
另一种可选的实施方式中,所述第二资源位于授权频段上。In another optional implementation manner, the second resource is located on a licensed frequency band.
又一种可选的实施方式中,当所述第一链路的LBT侦听失败时,所述处理单元301还可在所述第二链路上发送所述第二数据。In yet another optional implementation manner, when the LBT interception of the first link fails, the processing unit 301 may further send the second data on the second link.
又一种可选的实施方式中,所述第二资源位于授权频段上,当所述第一数据的优先级低于所述第二数据的优先级时,所述处理单元301还可在所述第二链路上发送所述第二数据。In yet another optional implementation manner, the second resource is located on a licensed frequency band, and when the priority of the first data is lower than the priority of the second data, the processing unit 301 may further sending the second data on the second link.
另一种可选的实施方式中,所述第二资源位于授权频段上,当所述第一链路的LBT侦听成功,且所述第一数据的优先级低于所述第二数据的优先级时,所述处理单元301在所述第二链路上发送所述第二数据。In another optional implementation manner, the second resource is located on the authorized frequency band, when the LBT interception of the first link is successful, and the priority of the first data is lower than that of the second data priority, the processing unit 301 sends the second data on the second link.
又一种可选的实施方式中,所述第二资源位于非授权频段上,所述当所述第一链路的先听后说LBT侦听成功时,所述处理单元301在所述第一链路上发送所述第一数据,具体用于:当所述第一链路的先听后说LBT侦听成功,且所述第二链路的LBT侦听失败时,在所述第一链路上发送所述第一数据。In yet another optional implementation manner, the second resource is located on an unlicensed frequency band, and when the listen-before-talk LBT interception of the first link succeeds, the processing unit 301 Sending the first data on a link is specifically used for: when the listen-before-talk LBT interception of the first link succeeds and the LBT interception of the second link fails, on the second link Send the first data over a link.
又一种可选的实施方式中,所述第二资源位于非授权频段上,所述当所述第一链路的先听后说LBT侦听成功,且所述第一数据的优先级高于所述第二数据的优先级时,所述处理单元301在所述第一链路上发送所述第一数据,具体用于:当所述第一链路的先听后说LBT侦听成功,所述第二链路的LBT侦听成功,且所述第一数据的优先级高于所述第二数据的优先级时,在所述 第一链路上发送所述第一数据。In yet another optional implementation manner, the second resource is located on an unlicensed frequency band, and when the listen-before-talk LBT interception of the first link succeeds, and the priority of the first data is high In accordance with the priority of the second data, the processing unit 301 sends the first data on the first link, specifically for: when the listen-before-talk LBT of the first link listens If successful, the LBT interception of the second link is successful, and the priority of the first data is higher than the priority of the second data, sending the first data on the first link.
又一种可选的实施方式中,所述第一链路为上行链路UL,所述第二链路为侧行链路SL;或者,所述第一链路为侧行链路SL,所述第二链路为上行链路UL。In yet another optional implementation manner, the first link is an uplink UL, and the second link is a side link SL; or, the first link is a side link SL, The second link is an uplink UL.
可选的,上述数据传输装置300还包括通信单元302,所述通信单元302可用于发送上述第一数据或第二数据,所述通信单元302还可用于与其他通信装置进行通信。Optionally, the data transmission device 300 further includes a communication unit 302, which can be used to send the first data or the second data, and the communication unit 302 can also be used to communicate with other communication devices.
本申请实施例和上述方法实施例基于同一构思,其带来的技术效果也相同,具体原理请参照上述方法实施例的描述,在此不赘述。The embodiment of the present application and the above-mentioned method embodiment are based on the same idea, and the technical effects brought about by them are also the same. For specific principles, please refer to the description of the above-mentioned method embodiment, and details are not repeated here.
请参见图4,图4为本申请实施例提供的一种终端设备400的结构示意图。本申请实施例中所描述的终端设备400,包括:处理器401、存储器402,处理器401和存储器402通过一条或多条通信总线连接。Please refer to FIG. 4 , which is a schematic structural diagram of a terminal device 400 provided in an embodiment of the present application. The terminal device 400 described in the embodiment of the present application includes: a processor 401 and a memory 402, and the processor 401 and the memory 402 are connected through one or more communication buses.
上述处理器401可以是中央处理单元(Central Processing Unit,CPU),该处理器还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。处理器401被配置为支持终端设备执行图2所述方法中终端设备相应的功能。The above-mentioned processor 401 may be a central processing unit (Central Processing Unit, CPU), and the processor may also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC) ), off-the-shelf programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like. The processor 401 is configured to support the terminal device to execute corresponding functions of the terminal device in the method described in FIG. 2 .
上述存储器402可以包括只读存储器和随机存取存储器,并向处理器401提供计算机程序和数据。存储器402的一部分还可以包括非易失性随机存取存储器。一种可选的实施方式中,所述处理器401调用所述计算机程序时用于执行:The above-mentioned memory 402 may include a read-only memory and a random-access memory, and provides computer programs and data to the processor 401 . A portion of memory 402 may also include non-volatile random access memory. In an optional implementation manner, when the processor 401 invokes the computer program, it is used to execute:
检测到第一资源与第二资源在时域上存在重叠;所述第一资源为第一链路占用的资源,所述第一链路用于承载第一数据,所述第二资源为第二链路占用的资源,所述第二链路用于承载第二数据,且所述第一资源位于非授权频段上;It is detected that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by the first link, the first link is used to carry the first data, and the second resource is the resource occupied by the first link. Resources occupied by two links, the second link is used to carry the second data, and the first resource is located on an unlicensed frequency band;
当所述第一链路的先听后说LBT侦听成功时,在所述第一链路上发送所述第一数据。When the listen-before-talk LBT interception of the first link is successful, the first data is sent on the first link.
另一种可选的实施方式中,所述处理器401调用所述计算机程序时用于执行:In another optional implementation manner, when the processor 401 calls the computer program, it is used to execute:
检测到第一资源与第二资源在时域上存在重叠;所述第一资源为第一链路占用的资源,所述第一链路用于承载第一数据,所述第二资源为第二链路占用的资源,所述第二链路用于承载第二数据,且所述第一资源位于非授权频段上;It is detected that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by the first link, the first link is used to carry the first data, and the second resource is the resource occupied by the first link. Resources occupied by two links, the second link is used to carry the second data, and the first resource is located on an unlicensed frequency band;
当所述第一链路的先听后说LBT侦听成功时,在所述第一链路上发送所 述第一数据。When the listen-before-talk LBT interception of the first link succeeds, sending the first data on the first link.
本申请实施例和上述方法实施例基于同一构思,其带来的技术效果也相同,具体原理请参照上述方法实施例的描述,在此不赘述。The embodiment of the present application and the above-mentioned method embodiment are based on the same idea, and the technical effects brought about by them are also the same. For specific principles, please refer to the description of the above-mentioned method embodiment, and details are not repeated here.
本申请实施例还提供一种芯片,所述芯片,用于检测到第一资源与第二资源在时域上存在重叠;所述第一资源为第一链路占用的资源,所述第一链路用于承载第一数据,所述第二资源为第二链路占用的资源,所述第二链路用于承载第二数据,且所述第一资源位于非授权频段上;当所述第一链路的先听后说LBT侦听成功时,在所述第一链路上发送所述第一数据。The embodiment of the present application also provides a chip, the chip is configured to detect that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by the first link, and the first The link is used to carry the first data, the second resource is a resource occupied by the second link, the second link is used to carry the second data, and the first resource is located on an unlicensed frequency band; when the When the listen-before-talk LBT interception of the first link succeeds, the first data is sent on the first link.
该芯片的其他实现方式可参见上述方法实施例的相关内容。此处不再详述。For other implementation manners of the chip, reference may be made to relevant content in the foregoing method embodiments. No more details here.
本申请实施例和上述方法实施例基于同一构思,其带来的技术效果也相同,具体原理请参照上述方法实施例的描述,在此不赘述。The embodiment of the present application and the above-mentioned method embodiment are based on the same idea, and the technical effects brought about by them are also the same. For specific principles, please refer to the description of the above-mentioned method embodiment, and details are not repeated here.
本申请实施例提供一种模组设备,所述模组设备包括处理器和通信接口,所述处理器与所述通信接口相连,所述通信接口用于收发信号,所述处理器用于:An embodiment of the present application provides a module device, the module device includes a processor and a communication interface, the processor is connected to the communication interface, the communication interface is used for sending and receiving signals, and the processor is used for:
检测到第一资源与第二资源在时域上存在重叠;所述第一资源为第一链路占用的资源,所述第一链路用于承载第一数据,所述第二资源为第二链路占用的资源,所述第二链路用于承载第二数据,且所述第一资源位于非授权频段上;It is detected that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by the first link, the first link is used to carry the first data, and the second resource is the resource occupied by the first link. Resources occupied by two links, the second link is used to carry the second data, and the first resource is located on an unlicensed frequency band;
当所述第一链路的先听后说LBT侦听成功时,在所述第一链路上发送所述第一数据。When the listen-before-talk LBT interception of the first link is successful, the first data is sent on the first link.
该模组设备的其他实现方式可参见上述方法实施例的相关内容。此处不再详述。For other implementation manners of the module device, reference may be made to relevant content in the foregoing method embodiments. No more details here.
本申请实施例和上述方法实施例基于同一构思,其带来的技术效果也相同,具体原理请参照上述方法实施例的描述,在此不赘述。The embodiment of the present application and the above-mentioned method embodiment are based on the same idea, and the technical effects brought about by them are also the same. For specific principles, please refer to the description of the above-mentioned method embodiment, and details are not repeated here.
本申请实施例还提供一种计算机可读存储介质,所述可读存储介质存储有计算机程序,所述计算机程序被处理器执行时,可以用于实现本申请实施例图2所对应实施例中描述的无线网络搜索方法,在此不再赘述。The embodiment of the present application also provides a computer-readable storage medium. The readable storage medium stores a computer program. When the computer program is executed by a processor, it can be used to implement the embodiment corresponding to FIG. 2 of the embodiment of the present application. The wireless network search method described above will not be repeated here.
所述计算机可读存储介质可以是前述任一实施例所述的终端的内部存储单元,例如设备的硬盘或内存。所述计算机可读存储介质也可以是所述终端设备的外部存储设备,例如所述设备上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,所述计算机可读存储介质还可以既包括所述终端设备的内部存储单元也包括外部存储设备。所述计算机可读存储介质用于存储所述计算机程序以及所述终端设备所需的其他程序和数据。所述计算机可读存储介质还可以用于暂时地存储已经输出或者将要输出的数据。The computer-readable storage medium may be an internal storage unit of the terminal described in any of the foregoing embodiments, such as a hard disk or memory of the device. The computer-readable storage medium can also be an external storage device of the terminal device, such as a plug-in hard disk equipped on the device, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) card, flash card (Flash Card), etc. Further, the computer-readable storage medium may also include both an internal storage unit of the terminal device and an external storage device. The computer-readable storage medium is used to store the computer program and other programs and data required by the terminal device. The computer-readable storage medium can also be used to temporarily store data that has been output or will be output.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于可读取存储介质中,所述程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。Those of ordinary skill in the art can understand that all or part of the processes in the methods of the above embodiments can be implemented through computer programs to instruct related hardware, and the programs can be stored in readable storage media. During execution, it may include the processes of the embodiments of the above-mentioned methods. Wherein, the storage medium may be a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM) or a random access memory (Random Access Memory, RAM), etc.
以上所揭露的仅为本申请较佳实施例而已,当然不能以此来限定本申请之权利范围,因此依本申请权利要求所作的等同变化,仍属本申请所涵盖的范围。The above disclosures are only preferred embodiments of the present application, which certainly cannot limit the scope of the present application. Therefore, equivalent changes made according to the claims of the present application still fall within the scope of the present application.

Claims (20)

  1. 一种数据传输方法,其特征在于,所述方法包括:A data transmission method, characterized in that the method comprises:
    终端设备检测到第一资源与第二资源在时域上存在重叠;所述第一资源为第一链路占用的资源,所述第一链路用于承载第一数据,所述第二资源为第二链路占用的资源,所述第二链路用于承载第二数据,且所述第一资源位于非授权频段上;The terminal device detects that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by a first link, the first link is used to carry the first data, and the second resource is a resource occupied by a second link, the second link is used to carry second data, and the first resource is located on an unlicensed frequency band;
    当所述第一链路的先听后说LBT侦听成功时,所述终端设备在所述第一链路上发送所述第一数据。When the listen-before-talk LBT interception of the first link succeeds, the terminal device sends the first data on the first link.
  2. 根据权利要求1所述的方法,其特征在于,所述当所述第一链路的先听后说LBT侦听成功时,所述终端设备在所述第一链路上发送所述第一数据,包括:The method according to claim 1, wherein when the listen-before-talk LBT interception of the first link succeeds, the terminal device sends the first data, including:
    当所述第一链路的先听后说LBT侦听成功,且所述第一数据的优先级高于所述第二数据的优先级时,所述终端设备在所述第一链路上发送所述第一数据。When the listen-before-talk LBT interception of the first link is successful, and the priority of the first data is higher than the priority of the second data, the terminal device is on the first link Send the first data.
  3. 根据权利要求1或2所述的方法,其特征在于,所述第二资源位于授权频段上。The method according to claim 1 or 2, wherein the second resource is located on a licensed frequency band.
  4. 根据权利要求3所述的方法,其特征在于,所述方法还包括:The method according to claim 3, further comprising:
    当所述第一链路的LBT侦听失败时,所述终端设备在所述第二链路上发送所述第二数据。When the LBT interception of the first link fails, the terminal device sends the second data on the second link.
  5. 根据权利要求1所述的方法,其特征在于,所述第二资源位于授权频段上,所述方法还包括:The method according to claim 1, wherein the second resource is located on an authorized frequency band, and the method further comprises:
    当所述第一数据的优先级低于所述第二数据的优先级时,所述终端设备在所述第二链路上发送所述第二数据。When the priority of the first data is lower than the priority of the second data, the terminal device sends the second data on the second link.
  6. 根据权利要求1或2所述的方法,其特征在于,所述第二资源位于授权频段上,所述方法还包括:The method according to claim 1 or 2, wherein the second resource is located on an authorized frequency band, and the method further comprises:
    当所述第一链路的LBT侦听成功,且所述第一数据的优先级低于所述第二数据的优先级时,所述终端设备在所述第二链路上发送所述第二数据。When the LBT interception of the first link succeeds and the priority of the first data is lower than the priority of the second data, the terminal device sends the first data on the second link Second data.
  7. 根据权利要求1所述的方法,其特征在于,所述第二资源位于非授权频段上,所述当所述第一链路的先听后说LBT侦听成功时,所述终端设备在所述第一链路上发送所述第一数据,包括:The method according to claim 1, wherein the second resource is located on an unlicensed frequency band, and when the listen-before-talk LBT interception of the first link succeeds, the terminal device sending the first data on the first link, including:
    当所述第一链路的先听后说LBT侦听成功,且所述第二链路的LBT侦听失败时,所述终端设备在所述第一链路上发送所述第一数据。When the LBT interception of the first link succeeds and the LBT interception of the second link fails, the terminal device sends the first data on the first link.
  8. 根据权利要求2所述的方法,其特征在于,所述第二资源位于非授权频段上,所述当所述第一链路的先听后说LBT侦听成功,且所述第一数据的优先级高于所述第二数据的优先级时,所述终端设备在所述第一链路上发送所述第一数据,包括:The method according to claim 2, wherein the second resource is located on an unlicensed frequency band, and when the listen-before-talk LBT interception of the first link succeeds, and the first data When the priority is higher than the priority of the second data, the terminal device sends the first data on the first link, including:
    当所述第一链路的先听后说LBT侦听成功,所述第二链路的LBT侦听成功,且所述第一数据的优先级高于所述第二数据的优先级时,所述终端设备在所述第一链路上发送所述第一数据。When the LBT interception of the first link is successful, the LBT interception of the second link is successful, and the priority of the first data is higher than the priority of the second data, The terminal device sends the first data on the first link.
  9. 根据权利要求1所述的方法,其特征在于,所述第一链路为上行链路UL,所述第二链路为侧行链路SL;或者,The method according to claim 1, wherein the first link is an uplink UL, and the second link is a side link SL; or,
    所述第一链路为侧行链路SL,所述第二链路为上行链路UL。The first link is a side link SL, and the second link is an uplink UL.
  10. 一种数据传输装置,其特征在于,所述数据传输装置包括:A data transmission device, characterized in that the data transmission device comprises:
    处理单元,用于检测到第一资源与第二资源在时域上存在重叠;所述第一资源为第一链路占用的资源,所述第一链路用于承载第一数据,所述第二资源为第二链路占用的资源,所述第二链路用于承载第二数据,且所述第一资源位于非授权频段上;a processing unit, configured to detect that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by a first link, the first link is used to carry first data, and the The second resource is a resource occupied by a second link, the second link is used to carry second data, and the first resource is located on an unlicensed frequency band;
    处理单元,还用于当所述第一链路的先听后说LBT侦听成功时,在所述第一链路上发送所述第一数据。The processing unit is further configured to send the first data on the first link when the listen-before-talk LBT interception of the first link succeeds.
  11. 根据权利要求10所述的装置,其特征在于,所述当所述第一链路的先听后说LBT侦听成功时,所述处理单元在所述第一链路上发送所述第一数据,具体用于:The device according to claim 10, wherein when the listen-before-talk LBT interception of the first link succeeds, the processing unit sends the first Data, specifically for:
    当所述第一链路的先听后说LBT侦听成功,且所述第一数据的优先级高于所述第二数据的优先级时,在所述第一链路上发送所述第一数据。When the listen-before-talk LBT interception of the first link succeeds, and the priority of the first data is higher than the priority of the second data, sending the first data on the first link a data.
  12. 根据权利要求10或11所述的装置,其特征在于,所述第二资源位于授权频段上。The device according to claim 10 or 11, wherein the second resource is located on a licensed frequency band.
  13. 根据权利要求12所述的装置,其特征在于,所述处理单元,还用于:The device according to claim 12, wherein the processing unit is further configured to:
    当所述第一链路的LBT侦听失败时,在所述第二链路上发送所述第二数据。When the LBT interception of the first link fails, the second data is sent on the second link.
  14. 根据权利要求10所述的装置,其特征在于,所述第二资源位于授权频段上,所述处理单元还用于:The device according to claim 10, wherein the second resource is located on an authorized frequency band, and the processing unit is further configured to:
    当所述第一数据的优先级低于所述第二数据的优先级时,在所述第二链路上发送所述第二数据。When the priority of the first data is lower than the priority of the second data, sending the second data on the second link.
  15. 根据权利要求10或11所述的装置,其特征在于,所述第二资源位于授权频段上,所述处理单元还用于:The device according to claim 10 or 11, wherein the second resource is located on a licensed frequency band, and the processing unit is further configured to:
    当所述第一链路的LBT侦听成功,且所述第一数据的优先级低于所述第二数据的优先级时,在所述第二链路上发送所述第二数据。When the LBT interception of the first link is successful and the priority of the first data is lower than the priority of the second data, the second data is sent on the second link.
  16. 根据权利要求10所述的装置,其特征在于,所述第二资源位于非授权频段上,所述当所述第一链路的先听后说LBT侦听成功时,所述处理单元在所述第一链路上发送所述第一数据,具体用于:The device according to claim 10, wherein the second resource is located on an unlicensed frequency band, and when the listen-before-talk LBT interception of the first link succeeds, the processing unit sending the first data on the first link, specifically for:
    当所述第一链路的先听后说LBT侦听成功,且所述第二链路的LBT侦听失败时,在所述第一链路上发送所述第一数据。When the LBT interception of the first link succeeds and the LBT interception of the second link fails, the first data is sent on the first link.
  17. 一种终端设备,其特征在于,所述终端设备包括处理器和存储器,所述处理器和所述存储器相互连接,其中,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令,执行如权利要求1至9项任一项所述的方法。A terminal device, characterized in that the terminal device includes a processor and a memory, the processor and the memory are connected to each other, wherein the memory is used to store a computer program, the computer program includes program instructions, and the The processor is configured to call the program instructions to execute the method according to any one of claims 1 to 9.
  18. 一种芯片,其特征在于,A chip, characterized in that,
    所述芯片,用于检测到第一资源与第二资源在时域上存在重叠;所述第一资源为第一链路占用的资源,所述第一链路用于承载第一数据,所述第二资源为第二链路占用的资源,所述第二链路用于承载第二数据,且所述第一资源位于非授权频段上;The chip is configured to detect that there is an overlap between the first resource and the second resource in the time domain; the first resource is a resource occupied by a first link, and the first link is used to carry first data, so The second resource is a resource occupied by a second link, the second link is used to carry second data, and the first resource is located on an unlicensed frequency band;
    所述芯片,还用于当所述第一链路的先听后说LBT侦听成功时,在所述第一链路上发送所述第一数据。The chip is further configured to send the first data on the first link when the listen-before-talk LBT interception of the first link succeeds.
  19. 一种模组设备,其特征在于,所述模组设备包括处理器和通信接口,所述处理器与所述通信接口相连,所述通信接口用于收发信号,所述处理器用于:A module device, characterized in that the module device includes a processor and a communication interface, the processor is connected to the communication interface, the communication interface is used for sending and receiving signals, and the processor is used for:
    检测到第一资源与第二资源在时域上存在重叠;所述第一资源为第一链路占用的资源,所述第一链路用于承载第一数据,所述第二资源为第二链路占用的资源,所述第二链路用于承载第二数据,且所述第一资源位于非授权频段上;It is detected that the first resource and the second resource overlap in the time domain; the first resource is a resource occupied by the first link, the first link is used to carry the first data, and the second resource is the resource occupied by the first link. Resources occupied by two links, the second link is used to carry the second data, and the first resource is located on an unlicensed frequency band;
    当所述第一链路的先听后说LBT侦听成功时,在所述第一链路上发送所述第一数据。When the listen-before-talk LBT interception of the first link is successful, the first data is sent on the first link.
  20. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时使所述处理器执行如权利要求1至9任一项所述的方法。A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program, the computer program includes program instructions, and when executed by a processor, the program instructions cause the processor to execute The method described in any one of 1 to 9 is required.
PCT/CN2022/102463 2021-06-30 2022-06-29 Data transmission method and related apparatus WO2023274314A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110742658.XA CN115551086A (en) 2021-06-30 2021-06-30 Data transmission method and related device
CN202110742658.X 2021-06-30

Publications (1)

Publication Number Publication Date
WO2023274314A1 true WO2023274314A1 (en) 2023-01-05

Family

ID=84691480

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/102463 WO2023274314A1 (en) 2021-06-30 2022-06-29 Data transmission method and related apparatus

Country Status (2)

Country Link
CN (1) CN115551086A (en)
WO (1) WO2023274314A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180323917A1 (en) * 2015-12-29 2018-11-08 Electronics And Telecommunications Research Institute Method and apparatus for transmitting sounding reference signal in wireless communication system of unlicensed band and method and apparatus for triggering sounding reference signal transmission
CN109845383A (en) * 2019-01-18 2019-06-04 北京小米移动软件有限公司 Sending method, device, equipment and the storage medium of uplink
CN110214467A (en) * 2017-02-01 2019-09-06 夏普株式会社 Base station apparatus, terminal installation and communication means
CN111316737A (en) * 2017-11-17 2020-06-19 华为技术有限公司 Data transmission method, terminal equipment and network equipment
CN111434063A (en) * 2017-12-27 2020-07-17 Oppo广东移动通信有限公司 Information transmission method, equipment and computer storage medium
US20210092769A1 (en) * 2016-05-20 2021-03-25 Telefonaktiebolaget Lm Ericsson (Publ) Scheduling multiple subframes in unlicensed spectrum

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180323917A1 (en) * 2015-12-29 2018-11-08 Electronics And Telecommunications Research Institute Method and apparatus for transmitting sounding reference signal in wireless communication system of unlicensed band and method and apparatus for triggering sounding reference signal transmission
US20210092769A1 (en) * 2016-05-20 2021-03-25 Telefonaktiebolaget Lm Ericsson (Publ) Scheduling multiple subframes in unlicensed spectrum
CN110214467A (en) * 2017-02-01 2019-09-06 夏普株式会社 Base station apparatus, terminal installation and communication means
CN111316737A (en) * 2017-11-17 2020-06-19 华为技术有限公司 Data transmission method, terminal equipment and network equipment
CN111434063A (en) * 2017-12-27 2020-07-17 Oppo广东移动通信有限公司 Information transmission method, equipment and computer storage medium
CN109845383A (en) * 2019-01-18 2019-06-04 北京小米移动软件有限公司 Sending method, device, equipment and the storage medium of uplink

Also Published As

Publication number Publication date
CN115551086A (en) 2022-12-30

Similar Documents

Publication Publication Date Title
WO2012038912A1 (en) Autonomous unlicensed band reuse in mixed cellular and device-to-device network
WO2022152329A1 (en) Psfch transmission method and device for sidelink, and storage medium
US20220159696A1 (en) Wireless communication method, terminal device, and network device
CN113574952A (en) Wireless communication method, terminal equipment and network equipment
US20210160936A1 (en) Method and device for establishing session
WO2021217363A1 (en) Wireless communication method, terminal device, and network device
WO2021128350A1 (en) Automatic transmission processing method for ue and device therefor
WO2023274314A1 (en) Data transmission method and related apparatus
US20220338044A1 (en) Method and apparatus for determining evaluation time for downlink transmission quality monitoring
CN114125914B (en) Wireless communication method and terminal device
CN113647171A (en) Method and apparatus for wireless communication
WO2022218416A1 (en) Feedback method, apparatus and device
WO2023029323A1 (en) Cell reselection method and apparatus, and terminal device
WO2022027460A1 (en) Wireless communication method, terminal device, and network device
US20230371064A1 (en) Communication method and communication apparatus
WO2021159599A1 (en) Transmission priority determining method and terminal device
WO2021155606A1 (en) Signal transmission method and apparatus, and device therefor
CN113014370B (en) Signaling sending method and device, storage medium, base station equipment and user equipment
EP4255094A1 (en) Configuration reset method and apparatus, and terminal device
WO2024067587A1 (en) Communication method and communication apparatus
WO2022188512A1 (en) Transmission method and apparatus, storage medium, and terminal
CN113517954B (en) Method, device, equipment and storage medium for transmitting side link data
WO2024022418A1 (en) Data transmission method and apparatus, and computer-readable storage medium and terminal
US20230199712A1 (en) Wireless communication method and terminal
WO2022052095A1 (en) Communication method, device, system, and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22832126

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22832126

Country of ref document: EP

Kind code of ref document: A1