WO2024094132A1 - 一种通信的方法和通信装置 - Google Patents

一种通信的方法和通信装置 Download PDF

Info

Publication number
WO2024094132A1
WO2024094132A1 PCT/CN2023/129374 CN2023129374W WO2024094132A1 WO 2024094132 A1 WO2024094132 A1 WO 2024094132A1 CN 2023129374 W CN2023129374 W CN 2023129374W WO 2024094132 A1 WO2024094132 A1 WO 2024094132A1
Authority
WO
WIPO (PCT)
Prior art keywords
resource
dmrs sequence
length
sequence
rbs
Prior art date
Application number
PCT/CN2023/129374
Other languages
English (en)
French (fr)
Inventor
韩成成
郭志恒
龙毅
谢信乾
邹通
龚名新
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2024094132A1 publication Critical patent/WO2024094132A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0453Resources in frequency domain, e.g. a carrier in FDMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2614Peak power aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0048Allocation of pilot signals, i.e. of signals known to the receiver
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal

Definitions

  • the embodiments of the present application relate to the field of communications, and more specifically, to a communication method and a communication device.
  • spectrum expansion can effectively reduce the peak to average power ratio (PAPR) of the signal, thereby improving the coverage capability of the communication link.
  • the terminal device performs spectrum expansion based on the resources allocated by the network device, carries the data to be transmitted on the non-extended resources, and carries the extended data on the extended resources.
  • the network device can send indication information to indicate the use of the allocated resources by the terminal device.
  • the relevant scheme includes two resource configuration methods. The first configuration method is that the network device indicates the ratio of the extended resources and the extended resources to the total resources, and the second configuration method is that the network device indicates the ratio of the non-extended resources and the extended resources to the total resources. Both of the above two resource configuration methods can instruct the terminal device to determine the extended resources and the non-extended resources, etc.
  • the resource usage mode determined by the terminal device based on the above configuration mode may conflict with the requirements of related operations, affecting the performance of the terminal device, which hinders the use of spectrum expansion.
  • the embodiments of the present application provide a communication method and a communication device, which improve the performance of a terminal device and enable the terminal device to improve the coverage capability of a communication link by means of spectrum expansion.
  • a communication method is provided.
  • the method may be executed by a terminal device or by a chip or circuit configured in the terminal device, and the present application does not limit the method.
  • the first data to be transmitted can be obtained by a discrete Fourier transform (DFT) operation.
  • DFT discrete Fourier transform
  • the first resource may be a total resource indicated by the network device.
  • the data carried by the second resource can be obtained through a DFT operation, and the DFT operation can be implemented based on a fast algorithm based on a fast Fourier transform (FFT), and its basis is at least one of 2, 3 or 5.
  • FFT fast Fourier transform
  • the terminal equipment can achieve efficient conversion based on the above-mentioned DFT operation, improve data processing efficiency, that is, improve the processing performance of the terminal equipment, which is conducive to ensuring that the terminal equipment realizes data transmission through spectrum expansion, reduces the PAPR of the signal, and enhances the coverage capability of the communication link.
  • expansion is performed based on the first data to obtain second data, the second data includes the first data, and the second data is carried on a third resource.
  • the extension factor is used to indicate the ratio between the length of the extended resources and the length of the total resources after spectrum expansion, and the values of the extension factor include: 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 1/8, 3/8, 1/9 or 1/10.
  • the extension factor is used to indicate the length of the extended resource and the length of the non-extended resource.
  • the expansion factor can be 1, 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 3/5, 1/8 or 1/9.
  • the extension factor is used to indicate the ratio between the length of non-extended resources and the length of total resources after spectrum expansion, and the values of the extension factor include: 1/2, 2/3, 3/4, 4/5, 5/6, 6/7, 7/8, 5/8, 8/9 or 9/10.
  • Terminal equipment can reduce the PAPR of signals by implementing data transmission through spectrum expansion.
  • spectrum expansion will occupy additional spectrum, resulting in loss of data transmission rate.
  • the above expansion factor can achieve better waveform PAPR performance improvement with less resource overhead, that is, while occupying less additional spectrum resources, it can reduce the PAPR of signals to enhance the coverage capability of communication links.
  • K satisfies any of the following:
  • K' satisfies any of the following:
  • a, b and c are non-negative integers
  • K1 is the number of RBs in the fourth resource
  • the fourth resource is calculated based on the first resource and the expansion factor
  • K2 is the number of RBs in the fifth resource
  • the fifth resource is calculated based on the third resource and the expansion factor
  • K1 is a positive number
  • K2 is a positive number.
  • the length of the second resource can meet the requirement of 2a * 3b * 5c while being as close as possible to the length of the non-extended resource indicated by the network device, which is beneficial to improving transmission performance.
  • the first time domain sequence may be a time domain sequence based on 8-phase shift keying modulation.
  • the first time domain sequence may be a time domain sequence based on ⁇ /2 binary phase shift keying BPSK modulation.
  • the length of the first DMRS sequence can meet the requirement of 2 a *3 b *5 c .
  • the terminal device can implement the DFT operation based on the fast algorithm of FFT, and its basis can be at least one of 2, 3 or 5.
  • efficient conversion can be achieved, and data processing efficiency can be improved, that is, the processing performance of the terminal device can be improved, which is conducive to ensuring that the terminal device can achieve data transmission through spectrum expansion, further reducing the PAPR of the signal, so as to enhance the coverage capability of the communication link.
  • the length of the first DMRS sequence can make the length of the resources it occupies as close as possible to the length of the first resource indicated by the network device while meeting the requirement of 2 a *3 b *5 c , which is conducive to improving transmission performance.
  • J 2a * 3b * 5c .
  • the value of J meets the requirement of the protocol, which can avoid conflicts with the protocol and reduce signaling overhead.
  • the method further includes: generating a second DMRS sequence; based on the second The DMRS sequence is cyclically extended to obtain a first DMRS sequence, where the first DMRS sequence includes a second DMRS sequence, where the second DMRS sequence is obtained by performing a DFT operation on the second time domain sequence, and the second DMRS sequence occupies D RBs; D satisfies any of the following:
  • a, b and c are non-negative integers
  • K1 is the number of RBs in the fourth resource
  • K1 is a positive number
  • the fourth resource is calculated based on the first resource and the extension factor.
  • the second time domain sequence may be a time domain sequence based on 8-phase shift keying modulation.
  • the second time domain sequence may be a time domain sequence based on ⁇ /2 binary phase shift keying modulation.
  • a, b and c are non-negative integers
  • K1 is the number of RBs in the fourth resource
  • K1 is a positive number
  • the fourth resource is calculated based on the first resource and the extension factor.
  • the length of the second DMRS sequence can meet the requirement of 2a * 3b * 5c .
  • the terminal device can implement the DFT operation based on the fast algorithm of FFT, and its basis can be at least one of 2, 3 or 5, so that efficient conversion can be achieved and data processing efficiency can be improved, that is, the processing performance of the terminal device can be improved, so as to ensure that the terminal device can achieve data transmission by spectrum expansion, further reduce the PAPR of the signal, and enhance the coverage capability of the communication link.
  • the length of the second DMRS sequence can satisfy the requirement of 2a * 3b * 5c while making the length of the resources occupied by it as close as possible to the length of the non-extended resources indicated by the network device, which is conducive to improving transmission performance.
  • the method further includes: generating a second DMRS sequence; performing cyclic extension based on the second DMRS sequence to obtain a first DMRS sequence, the first DMRS sequence including a second DMRS sequence, and the second DMRS sequence is obtained by performing a DFT operation on the second time domain sequence; the length D' of the second DMRS sequence satisfies any of the following:
  • a, b and c are non-negative integers
  • K1 is the number of RBs in the fourth resource
  • K1 is a positive number
  • the fourth resource is calculated based on the first resource and the extension factor.
  • the second time domain sequence may be a time domain sequence based on 8-phase shift keying modulation.
  • the second time domain sequence may be a time domain sequence based on ⁇ /2 binary phase shift keying modulation.
  • the method further includes: generating a second DMRS sequence; performing cyclic extension based on the second DMRS sequence to obtain a first DMRS sequence, wherein the first DMRS sequence includes the second DMRS sequence; when the length D' of the second DMRS sequence is 6, the second DMRS sequence is obtained by performing a DFT operation on a time domain sequence modulated based on 8 phase shift keying; when D' is a value other than 6, the second DMRS sequence is obtained by performing a DFT operation on a time domain sequence modulated based on ⁇ /2 binary phase shift keying; and D' satisfies any of the following:
  • a, b and c are non-negative integers
  • K1 is the number of RBs in the fourth resource
  • K1 is a positive number
  • the fourth resource is calculated based on the first resource and the extension factor.
  • the length of the second DMRS sequence can meet the requirement of 2 a *3 b *5 c .
  • the terminal device can implement the DFT operation based on the fast algorithm of FFT, and its basis can be at least one of 2, 3 or 5. This can achieve efficient conversion and improve data processing efficiency, that is, improve the processing performance of the terminal device, which is conducive to ensuring that the terminal device can realize data transmission through spectrum expansion, further reduce the PAPR of the signal, and enhance the coverage capability of the communication link.
  • the length of the second DMRS sequence can meet the requirement of 2a * 3b * 5c while making the length of the resources occupied by it as close as possible to the length of the non-extended resources indicated by the network device, which is conducive to improving transmission performance.
  • the method also includes: generating a second DMRS sequence; performing cyclic extension based on the second DMRS sequence to obtain a first DMRS sequence, the first DMRS sequence including the second DMRS sequence, and when K1 ⁇ 5, the second DMRS sequence is a ZC sequence, and the length D' of the second DMRS sequence is the smallest prime number greater than or equal to K1*6, wherein K1 is the number of RBs in the fourth resource, K1 is a positive number, and the fourth resource is calculated based on the first resource and the expansion factor.
  • the method further includes: generating a second DMRS sequence; performing cyclic extension based on the second DMRS sequence to obtain a first DMRS sequence, the first DMRS sequence including a second DMRS sequence, wherein the second DMRS sequence occupies D RBs, and when K1 ⁇ 5, the second DMRS sequence is a first frequency domain sequence, and D satisfies any of the following:
  • D is the largest integer less than K1;
  • D is the integer closest to K1;
  • K1 is the number of RBs in the fourth resource, K1 is a positive number, and the fourth resource is calculated based on the first resource and the extension factor.
  • the first frequency domain sequence may be a frequency domain sequence obtained without undergoing a DFT operation, or may be a frequency domain sequence obtained by undergoing a DFT operation on a time domain sequence.
  • the first frequency domain sequence may be a frequency domain sequence modulated by QSPK, and the generation process of the frequency domain sequence does not include a DFT operation.
  • the first frequency domain sequence may be a frequency domain sequence obtained by performing a DFT operation on a time domain sequence modulated by ⁇ /2-BPSK.
  • the method further includes: generating a second DMRS sequence; performing cyclic extension based on the second DMRS sequence to obtain a first DMRS sequence, the first DMRS sequence including a second DMRS sequence, wherein the second DMRS sequence occupies D RBs, and when K1 ⁇ 5, the second DMRS sequence is a frequency domain sequence modulated by quadrature phase shift keying QPSK, and D satisfies any of the following:
  • D is the largest integer less than K1;
  • D is the integer closest to K1;
  • K1 is the number of RBs in the fourth resource, K1 is a positive number, and the fourth resource is calculated based on the first resource and the extension factor.
  • a communication method is provided.
  • the method may be executed by a terminal device or by a chip or circuit configured in the terminal device, and the present application does not limit the method.
  • the data carried by the second resource can be obtained through a DFT operation, and the DFT operation can be implemented based on a fast algorithm based on FFT, and its basis is at least one of 2, 3 or 5.
  • the terminal equipment can achieve efficient conversion based on the above-mentioned DFT operation, improve data processing efficiency, that is, improve the processing performance of the terminal equipment, which is conducive to ensuring that the terminal equipment realizes data transmission through spectrum expansion, reduces the PAPR of the signal, and enhances the coverage capability of the communication link.
  • expansion is performed based on the first data to obtain the second data, the second data includes the first data, and the second data is carried on the third resource.
  • the extension factor is used to indicate the ratio between the length of the extended resources and the length of the total resources after spectrum expansion, and the values of the extension factor include: 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 1/8, 3/8, 1/9 or 1/10.
  • the extension factor is used to indicate the ratio between the length of the extended resource and the length of the non-extended resource, and the values of the extension factor include: 1, 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 3/5, 1/8 or 1/9.
  • the extension factor is used to indicate the length of the non-extended resource and the length of the spectrum after the extension.
  • the expansion factor is the ratio of the length of the total resource, and the expansion factor can be: 1/2, 2/3, 3/4, 4/5, 5/6, 6/7, 7/8, 5/8, 8/9 or 9/10.
  • a, b and c are non-negative integers
  • L is the number of RBs in the first resource
  • L is a positive number.
  • the length of the second resource can meet the requirement of 2a * 3b * 5c while being as close as possible to the length of the non-extended resource (ie, the first resource) allocated by the network device, which is beneficial to improving transmission performance.
  • the method further includes: generating a first DMRS sequence, where the first DMRS sequence is obtained by performing a DFT operation on the first time domain sequence,
  • the first DMRS sequence occupies J RBs, where J satisfies any of the following conditions:
  • the length of the first DMRS sequence is J', and J' satisfies any of the following conditions:
  • a, b and c are non-negative integers
  • J1 is the number of RBs in the sixth resource
  • J1 is a positive number
  • the sixth resource is calculated based on the first resource and the expansion factor
  • J2 is the number of RBs in the seventh resource
  • J2 is a positive number
  • the seventh resource is calculated based on the second resource and the expansion factor.
  • the first time domain sequence may be a time domain sequence based on 8-phase shift keying modulation.
  • the first time domain sequence may be a time domain sequence based on ⁇ /2 binary phase shift keying modulation.
  • a, b and c are non-negative integers
  • J1 is the number of RBs in the sixth resource
  • J1 is a positive number
  • the sixth resource is calculated based on the first resource and the expansion factor
  • J2 is the number of RBs in the seventh resource
  • J2 is a positive number
  • the seventh resource is calculated based on the second resource and the expansion factor.
  • the length of the first DMRS sequence can meet the requirement of 2 a *3 b *5 c .
  • the terminal device can implement the DFT operation based on the fast algorithm of FFT, and its basis can be at least one of 2, 3 or 5.
  • efficient conversion can be achieved, and data processing efficiency can be improved, that is, the processing performance of the terminal device can be improved, which is conducive to ensuring that the terminal device can achieve data transmission through spectrum expansion, further reducing the PAPR of the signal, so as to enhance the coverage capability of the communication link.
  • the length of the first DMRS sequence can make the length of the resources it occupies as close as possible to the length of the total resources indicated by the network device while meeting the requirement of 2 a *3 b *5 c , which is conducive to improving transmission performance.
  • J 2a * 3b * 5c .
  • the value of J meets the requirement of the protocol, which can avoid conflicts with the protocol and reduce signaling overhead.
  • the method further includes: generating a second DMRS sequence; performing cyclic extension based on the second DMRS sequence to obtain a first DMRS sequence, the first DMRS sequence including a second DMRS sequence, wherein the second DMRS sequence is obtained by performing a DFT operation on the second time domain sequence, and the second DMRS sequence occupies D RBs; D satisfies any of the following:
  • a, b and c are non-negative integers, L is the number of RBs in the first resource, and L is a positive number.
  • the second time domain sequence may be a time domain sequence based on 8-phase shift keying modulation.
  • the second time domain sequence may be a time domain sequence based on ⁇ /2 binary phase shift keying modulation.
  • a, b and c are non-negative integers, L is the number of RBs in the first resource, and L is a positive number.
  • the length of the second DMRS sequence can meet the requirement of 2a * 3b * 5c .
  • the terminal device can implement the DFT operation based on the fast algorithm of FFT, and its basis can be at least one of 2, 3 or 5, so that efficient conversion can be achieved and data processing efficiency can be improved, that is, the processing performance of the terminal device can be improved, so as to ensure that the terminal device can achieve data transmission by spectrum expansion, further reduce the PAPR of the signal, and enhance the coverage capability of the communication link.
  • the length of the second DMRS sequence can meet the requirement of 2a * 3b * 5c while making the length of the resources it occupies as close as possible to the length of the non-extended resources (ie, the first resources) indicated by the network device, which is conducive to improving transmission performance.
  • the method further includes: generating a second DMRS sequence; performing cyclic extension based on the second DMRS sequence to obtain a first DMRS sequence, the first DMRS sequence including the second DMRS sequence, the second DMRS sequence being obtained by performing a DFT operation on the second time domain sequence; the length D' of the second DMRS sequence satisfies any of the following:
  • a, b and c are non-negative integers
  • L is the number of RBs in the first resource
  • L is a positive number
  • the second time domain sequence may be a time domain sequence based on 8-phase shift keying modulation.
  • the second time domain sequence may be a time domain sequence based on ⁇ /2 binary phase shift keying modulation.
  • the method further includes: generating a second DMRS sequence; performing cyclic extension based on the second DMRS sequence to obtain a first DMRS sequence, wherein the first DMRS sequence includes the second DMRS sequence; when the length D of the second DMRS sequence is 6, the second DMRS sequence is obtained by performing a DFT operation on a time domain sequence modulated based on 8 phase shift keying; when D' is a value other than 6, the second DMRS sequence is obtained by performing a DFT operation on a time domain sequence modulated based on ⁇ /2 binary phase shift keying; and D' satisfies any of the following:
  • a, b and c are non-negative integers
  • L is the number of RBs in the first resource
  • L is a positive number
  • the length of the second DMRS sequence can meet the requirement of 2a * 3b * 5c .
  • the terminal device can implement the DFT operation based on the fast algorithm of FFT, and the basis can be at least one of 2, 3 or 5, so that high Efficient conversion improves data processing efficiency, that is, improves the processing performance of terminal equipment, which is conducive to ensuring that terminal equipment can realize data transmission through spectrum expansion, further reducing the PAPR of the signal, so as to enhance the coverage capability of the communication link.
  • the length of the second DMRS sequence can meet the requirement of 2a * 3b * 5c while making the length of the resources it occupies as close as possible to the length of the non-extended resources (ie, the first resources) allocated by the network device, which is conducive to improving transmission performance.
  • the first frequency domain sequence may be a frequency domain sequence obtained without undergoing a DFT operation, or may be a frequency domain sequence obtained by undergoing a DFT operation on a time domain sequence.
  • the first frequency domain sequence may be a frequency domain sequence modulated by QSPK, and the generation process of the frequency domain sequence does not include a DFT operation.
  • the first frequency domain sequence may be a frequency domain sequence obtained by performing a DFT operation on a time domain sequence modulated by ⁇ /2-BPSK.
  • the first frequency domain sequence may be a frequency domain sequence obtained without undergoing a DFT operation, or may be a frequency domain sequence obtained by undergoing a DFT operation on a time domain sequence.
  • the first frequency domain sequence may be a frequency domain sequence modulated by QSPK, and the generation process of the frequency domain sequence does not include a DFT operation.
  • the first frequency domain sequence may be a frequency domain sequence obtained by performing a DFT operation on a time domain sequence modulated by ⁇ /2-BPSK.
  • the third resource includes J RBs, and J satisfies any of the following conditions:
  • J is the smallest integer greater than or equal to J1, or
  • J is the integer closest to J1.
  • J1 is the number of RBs in the sixth resource, and the sixth resource is calculated based on the first resource and the extension factor.
  • the third resource includes J RBs, and J satisfies any of the following conditions:
  • J is the smallest integer greater than or equal to J2, or
  • J is the integer closest to J2, where J2 is the number of RBs in the seventh resource, and the seventh resource is calculated based on the second resource and the extension factor.
  • a communication method is provided.
  • the method may be executed by a network device or by a chip or circuit configured in the network device, and the present application does not limit the method.
  • the third resource carries second data
  • the second data is obtained by extending the first data
  • the second data includes the first data
  • the extension factor is used to indicate the length of the extension resource and the length of the spectrum after the extension.
  • the expansion factor can be 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 1/8, 3/8, 1/9 or 1/10.
  • the extension factor is used to indicate the ratio between the length of the extended resource and the length of the non-extended resource, and the values of the extension factor include: 1, 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 3/5, 1/8 or 1/9.
  • the extension factor is used to indicate the ratio between the length of non-extended resources and the length of total resources after spectrum expansion, and the values of the extension factor include: 1/2, 2/3, 3/4, 4/5, 5/6, 6/7, 7/8, 5/8, 8/9 or 9/10.
  • K satisfies any of the following:
  • K' satisfies any of the following:
  • a, b and c are non-negative integers
  • K1 is the number of RBs in the fourth resource
  • K1 is a positive number
  • the fourth resource is calculated based on the first resource and the extension factor
  • K2 is the number of RBs in the fifth resource
  • the fifth resource is calculated based on the third resource and the extension factor
  • K2 is a positive number.
  • communicating with the terminal device based on the third resource includes: receiving a first DMRS sequence based on the third resource, the first DMRS sequence is obtained by cyclic extension based on the second DMRS sequence, the first DMRS sequence includes a second DMRS sequence, wherein the second DMRS sequence is obtained by performing a DFT operation on the second time domain sequence, and the second DMRS sequence occupies D RBs, and D satisfies any of the following:
  • a, b and c are non-negative integers
  • K1 is the number of RBs in the fourth resource
  • K1 is a positive number
  • the fourth resource is calculated based on the first resource and the extension factor.
  • a, b and c are non-negative integers
  • K1 is the number of RBs in the fourth resource
  • K1 is a positive number
  • the fourth resource is calculated based on the first resource and the extension factor.
  • communicating with a terminal device based on a third resource includes: receiving a first DMRS sequence based on the third resource, the first DMRS sequence being obtained by cyclically extending the second DMRS sequence, the first DMRS sequence including a second DMRS sequence, and when K1 ⁇ 5, the second DMRS sequence is a ZC sequence, and the length D' of the second DMRS sequence is the smallest prime number greater than or equal to K1*6, wherein K1 is the number of RBs in a fourth resource, K1 is a positive number, and the fourth resource is calculated based on the first resource and the expansion factor.
  • communicating with the terminal device based on the third resource includes: receiving a first DMRS sequence based on the third resource, the first DMRS sequence is obtained by cyclic extension based on the second DMRS sequence, the first DMRS sequence includes a second DMRS sequence, wherein the second DMRS sequence occupies D RBs, and when K1 ⁇ 5, the second DMRS sequence is a first frequency domain sequence, and D satisfies any of the following:
  • D is the largest integer less than K1;
  • D is the integer closest to K1;
  • K1 is the number of RBs in the fourth resource, K1 is a positive number, and the fourth resource is calculated based on the first resource and the extension factor.
  • communicating with the terminal device based on the third resource includes: receiving a first DMRS sequence based on the third resource, the first DMRS sequence is obtained by cyclic extension based on the second DMRS sequence, the first DMRS sequence includes a second DMRS sequence, wherein the second DMRS sequence occupies D RBs, and when K1 ⁇ 5, the second DMRS sequence is a frequency domain sequence modulated by QPSK, and D satisfies any of the following:
  • D is the largest integer less than K1;
  • D is the integer closest to K1;
  • K1 is the number of RBs in the fourth resource, K1 is a positive number, and the fourth resource is calculated based on the first resource and the extension factor.
  • a communication method is provided.
  • the method may be executed by a network device or by a chip or circuit configured in the network device, and the present application does not limit this method.
  • the third resource carries second data
  • the second data is obtained by expanding the first data
  • the second data includes the first data
  • the extension factor is used to indicate the ratio between the length of the extended resources and the length of the total resources after spectrum expansion, and the values of the extension factor include: 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 1/8, 3/8, 1/9 or 1/10.
  • the extension factor is used to indicate the ratio between the length of the extended resource and the length of the non-extended resource, and the values of the extension factor include: 1, 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 3/5, 1/8 or 1/9.
  • the extension factor is used to indicate the ratio between the length of non-extended resources and the length of total resources after spectrum expansion, and the values of the extension factor include: 1/2, 2/3, 3/4, 4/5, 5/6, 6/7, 7/8, 5/8, 8/9 or 9/10.
  • communicating with a terminal device based on a third resource includes: receiving a first DMRS sequence based on the third resource, where the first DMRS sequence is obtained by performing a DFT operation on the first time domain sequence, wherein:
  • the first DMRS sequence occupies J RBs, where J satisfies any of the following conditions:
  • the length of the first DMRS sequence is J', and J' satisfies any of the following conditions:
  • a, b and c are non-negative integers
  • J1 is the number of RBs in the sixth resource
  • J1 is a positive number
  • the sixth resource is calculated based on the first resource and the expansion factor
  • J2 is the number of RBs in the seventh resource
  • J2 is a positive number
  • the seventh resource is calculated based on the second resource and the expansion factor.
  • a, b and c are non-negative integers
  • J1 is the number of RBs in the sixth resource
  • J1 is a positive number
  • the sixth resource is calculated based on the first resource and the expansion factor
  • J2 is the number of RBs in the seventh resource
  • J2 is a positive number
  • the seventh resource is calculated based on the second resource and the expansion factor.
  • communicating with the terminal device based on the third resource includes: receiving a first DMRS sequence based on the third resource, the first DMRS sequence is obtained by cyclic extension based on the second DMRS sequence, the first DMRS sequence includes a second DMRS sequence, wherein the second DMRS sequence is obtained by performing a DFT operation on the second time domain sequence, and the second DMRS sequence occupies D RBs; D satisfies any of the following:
  • a, b and c are non-negative integers, L is the number of RBs in the first resource, and L is a positive number.
  • a, b and c are non-negative integers, L is the number of RBs in the first resource, and L is a positive number.
  • communicating with the terminal device based on the third resource includes: receiving a first DMRS sequence based on the third resource, the first DMRS sequence is obtained by cyclic extension based on the second DMRS sequence, the first DMRS sequence includes a second DMRS sequence, and the second DMRS sequence is obtained by performing a DFT operation on the second time domain sequence; the length D' of the second DMRS sequence satisfies any of the following:
  • a, b and c are non-negative integers
  • L is the number of RBs in the first resource
  • L is a positive number
  • communicating with a terminal device based on a third resource includes: receiving a first DMRS sequence based on the third resource, the first DMRS sequence is obtained by cyclic extension based on the second DMRS sequence, and the first DMRS sequence includes a second DMRS sequence; when the length D' of the second DMRS sequence is 6, the second DMRS sequence is obtained by performing a DFT operation on a time domain sequence based on 8 phase shift keying modulation; when D' is a value other than 6, the second DMRS sequence is obtained by performing a DFT operation on a time domain sequence based on ⁇ /2 binary phase shift keying modulation; D' satisfies any of the following:
  • a, b and c are non-negative integers
  • L is the number of RBs in the first resource
  • L is a positive number
  • a communication device which may be a terminal device or may be configured and arranged in the terminal device.
  • the communication device may include a module corresponding to the method/operation/step/action described in the first aspect or the second aspect, and the module may be a hardware circuit, or software, or a combination of a hardware circuit and software.
  • the communication device may include a processing module and a communication module.
  • a communication device which may be a network device, or a device, module, circuit or chip configured in a network device, or a device that can be used in conjunction with a network device.
  • the communication device may include a module that corresponds to executing the method/operation/step/action described in the third aspect or the fourth aspect, and the module may be a hardware circuit, or software, or a combination of a hardware circuit and software.
  • the communication device may include a processing module and a communication module.
  • a communication device including a processor and a storage medium, the storage medium storing instructions, which, when executed by the processor, enables the method in the first aspect or any possible implementation of the first aspect to be implemented, enables the method in the second aspect or any possible implementation of the second aspect to be implemented, enables the method in the third aspect or any possible implementation of the third aspect to be implemented, or enables the method in the fourth aspect or any possible implementation of the fourth aspect to be implemented.
  • a communication device comprising a processor, wherein the processor is used to process data and/or information so that the method in the first aspect or any possible implementation of the first aspect is implemented, the method in the second aspect or any possible implementation of the second aspect is implemented, the method in the third aspect or any possible implementation of the third aspect is implemented, or the method in the fourth aspect or any possible implementation of the fourth aspect is implemented.
  • the communication device may also include a communication interface, wherein the communication interface is used to receive data and/or information and transmit the received data and/or information to the processor.
  • the communication interface is also used to output data and/or information processed by the processor.
  • a chip comprising a processor, the processor being used to run a program or instruction so that the method in the first aspect or any possible implementation of the first aspect is implemented, the method in the second aspect or any possible implementation of the second aspect is implemented, the method in the third aspect or any possible implementation of the third aspect is implemented, or the method in the fourth aspect or any possible implementation of the fourth aspect is implemented.
  • the chip may also include a memory, the memory being used to store programs or instructions.
  • the chip may also include the transceiver.
  • a computer-readable storage medium includes instructions, which, when executed by a processor, enables the method in the first aspect or any possible implementation of the first aspect to be implemented, enables the method in the second aspect or any possible implementation of the second aspect to be implemented, enables the method in the third aspect or any possible implementation of the third aspect to be implemented, or enables the method in the fourth aspect or any possible implementation of the fourth aspect to be implemented.
  • a computer program product comprising computer program code or instructions, which, when executed, enables the method in the first aspect or any possible implementation of the first aspect to be implemented, enables the method in the second aspect or any possible implementation of the second aspect to be implemented, enables the method in the third aspect or any possible implementation of the third aspect to be implemented, or enables the method in the fourth aspect or any possible implementation of the fourth aspect to be implemented.
  • a communication system comprising the communication device in the fifth aspect or any possible implementation of the fifth aspect and the communication device in the sixth aspect or any possible implementation of the sixth aspect.
  • FIG. 1 is a schematic diagram of a communication system applicable to an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a performance curve of a power amplifier.
  • FIG3 is a schematic diagram of the generation process of DFT-S-OFDM.
  • FIG. 4 is a schematic diagram of cyclic extension of a frequency domain signal.
  • FIG5 is a schematic diagram of a windowing filter.
  • FIG. 6 is a schematic diagram of spectrum expansion under two resource configuration modes.
  • FIG. 7 is a schematic flowchart of a communication method provided in the present application.
  • FIG8 is a schematic diagram of a mapping method of a DMRS sequence.
  • FIG9 is a schematic flowchart of another communication method provided by the present application.
  • FIG10 is a schematic flowchart of yet another communication method provided in the present application.
  • FIG. 11 is a schematic block diagram of a communication device provided in an embodiment of the present application.
  • FIG12 is a schematic block diagram of another communication device provided in an embodiment of the present application.
  • the technical solution provided in the present application can be applied to various communication systems, such as: the fifth generation (5G) or new radio (NR) system, long term evolution (LTE) system, LTE frequency division duplex (FDD) system, LTE time division duplex (TDD) system, wireless local area network (WLAN) system, satellite communication system, future communication system, such as the sixth generation (6G) mobile communication system, or a fusion system of multiple systems.
  • 5G fifth generation
  • NR new radio
  • LTE long term evolution
  • FDD frequency division duplex
  • TDD LTE time division duplex
  • WLAN wireless local area network
  • future communication system such as the sixth generation (6G) mobile communication system
  • 6G sixth generation
  • the technical solution provided in the present application can also be applied to device to device (D2D) communication, vehicle to everything (V2X) communication, machine to machine (M2M) communication, machine type communication (MTC), and Internet of things (IoT) communication system or other communication systems.
  • D2D device to device
  • V2X vehicle
  • a network element in a communication system can send a signal to another network element or receive a signal from another network element.
  • the signal may include information, signaling or data, etc.
  • the network element may also be replaced by an entity, a network entity, a device, a communication device, a communication module, a node, a communication node, etc., and the network element is used as an example for description in the present disclosure.
  • the communication system may include at least one terminal device and at least one network device.
  • the network device may send a downlink signal to the terminal device, and/or the terminal device may send an uplink signal to the network device.
  • the terminal device in the present disclosure may be replaced by a first network element, and the network device may be replaced by a second network element, and the two perform the corresponding communication method in the present disclosure.
  • the terminal device may also be referred to as user equipment (UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device.
  • UE user equipment
  • a terminal device can be a device that provides voice/data to users, for example, a handheld device with wireless connection function, a vehicle-mounted device, etc.
  • some examples of terminals are: mobile phones, customer-premises equipment (CPE), tablet computers, laptops, PDAs, mobile internet devices (MID), wearable devices, virtual reality (VR) devices, augmented reality (AR) devices, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical surgery, wireless terminals in smart grids, wireless terminals in transport safety, etc.
  • the present invention relates to wireless terminals in the field of communication and safety, wireless terminals in smart cities, wireless terminals in smart homes, cellular phones, cordless phones, session initiation protocol (SIP) phones, wireless local loop (WLL) stations, personal digital assistants (PDA), handheld devices with wireless communication functions, computing devices or other processing devices connected to wireless modems, wearable devices, terminal devices in 5G networks or terminal devices in future evolved public land mobile communication networks (PLMN), etc., and the embodiments of the present application are not limited to this.
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistants
  • handheld devices with wireless communication functions computing devices or other processing devices connected to wireless modems
  • wearable devices terminal devices in 5G networks or terminal devices in future evolved public land mobile communication networks (PLMN), etc.
  • PLMN public land mobile communication networks
  • the terminal device may also be a wearable device.
  • Wearable devices may also be referred to as wearable smart devices, which are a general term for wearable devices that are intelligently designed and developed using wearable technology for daily wear, such as glasses, gloves, watches, clothing, and shoes.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothes or accessories. Wearable devices are not only hardware devices, but also powerful functions achieved through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized, and fully or partially independent of smartphones, such as smart watches or smart glasses, as well as devices that only focus on a certain type of application function and need to be used in conjunction with other devices such as smartphones, such as various types of smart bracelets and smart jewelry for vital sign monitoring.
  • the device for realizing the function of the terminal device may be a terminal device, or a device capable of supporting the terminal device to realize the function, such as a chip system, which may be installed in the terminal device or used in combination with the terminal device.
  • the chip system may be composed of a chip, or may include a chip and other discrete devices.
  • only the terminal device is used as an example for explanation, and the solution of the embodiment of the present application is not limited.
  • the network device in the embodiment of the present application may be a device for communicating with a terminal device, and the network device may also be referred to as an access network device or a wireless access network device, such as a base station.
  • the network device in the embodiment of the present application may refer to a radio access network (RAN) node (or device) that connects a terminal device to a wireless network.
  • RAN radio access network
  • the base station may broadly cover the following various names, or be replaced with the following names, such as: Node B (NodeB), evolved NodeB (evolved NodeB, eNB), next generation NodeB (next generation NodeB, gNB), relay station, access point, transmission point (transmitting and receiving point, TRP), transmission point (transmitting point, TP), master station, auxiliary station, multi-standard wireless (motor slide retainer, MSR) node, home base station, network controller, access node, wireless node, access point (access point, AP), transmission node, transceiver node, base Band unit (baseband unit, BBU), remote radio unit (remote radio unit, RRU), active antenna unit (active antenna unit, AAU), remote radio head (remote radio head, RRH), central unit (central unit, CU), distributed unit (distributed unit, DU), positioning node, etc.
  • NodeB Node B
  • evolved NodeB evolved NodeB
  • gNB next generation No
  • the base station can be a macro base station, a micro base station, a relay node, a donor node or the like, or a combination thereof.
  • the base station can also refer to a communication module, a modem or a chip used to be set in the aforementioned device or apparatus.
  • the base station can also be a mobile switching center and a device that performs the base station function in D2D, V2X, and M2M communications, a network side device in a 6G network, and a device that performs the base station function in a future communication system.
  • the base station can support networks with the same or different access technologies. The embodiments of the present application do not limit the specific technology and specific device form adopted by the network equipment.
  • Base stations can be fixed or mobile.
  • a helicopter or drone can be configured to act as a mobile base station, and one or more cells can move based on the location of the mobile base station.
  • a helicopter or drone can be configured to act as a device that communicates with another base station.
  • the network device mentioned in the embodiments of the present application may be a device including a CU, or a DU, or a device including a CU and a DU, or a device including a control plane CU node (central unit control plane (central unit-control plane, CU-CP)) and a user plane CU node (central unit user plane (central unit-user plane, CU-UP)) and a DU node.
  • CU-CP central unit control plane
  • CU-UP central unit user plane
  • the device for realizing the function of the network device may be a network device; or it may be a device capable of supporting the network device to realize the function, such as a chip system, a hardware circuit, a software module, or a hardware circuit plus a software module.
  • the device may be installed in the network device or used in combination with the network device.
  • only the device for realizing the function of the network device is a network device as an example for explanation, and the scheme of the embodiment of the present application is not limited.
  • the network equipment and terminal equipment can be deployed on land, including indoors or outdoors, handheld or vehicle-mounted; they can also be deployed on the water surface; they can also be deployed on aircraft, balloons and satellites in the air.
  • the embodiments of the present application do not limit the scenarios in which the network equipment and terminal equipment are located.
  • FIG1 is a schematic diagram of a communication system applicable to the communication method of an embodiment of the present application.
  • the communication system 100 may include at least one network device, such as the network device 110 shown in FIG1 ; the communication system 100 may also include at least one terminal device, such as the terminal device 120 and the terminal device 130 shown in FIG1 .
  • the network device 110 and the terminal device (such as the terminal device 120 and the terminal device 130) may communicate via a wireless link.
  • the communication devices in the communication system for example, the network device 110 and the terminal device 120, may communicate via a multi-antenna technology.
  • FIG. 1 is a simplified schematic diagram for ease of understanding.
  • the communication system may also include other devices, such as wireless relay devices and/or wireless backhaul devices, which are not shown in FIG. 1.
  • the communication system may include multiple network devices and may also include multiple terminal devices. The embodiments of the present application do not limit the number of network devices and terminal devices included in the communication system.
  • frequency domain resources are divided into several sub-resources, each of which is called a subcarrier.
  • a subcarrier can also be understood as the smallest granularity of frequency domain resources.
  • Subcarrier spacing refers to the spacing between the center or peak positions of two adjacent subcarriers in the frequency domain in the OFDM system.
  • the subcarrier spacing in the LTE system is 15kHz
  • the subcarrier spacing in the NR system in 5G can be 15kHz, 30kHz, 60kHz or 120kHz, etc.
  • a resource block in the LTE system includes 12 subcarriers.
  • a resource block in the NR system in 5G includes 12 subcarriers.
  • the number of subcarriers included in a resource block can also be other values.
  • a time slot in the NR system of 5G includes 14 OFDM symbols.
  • the time slot length corresponding to the 15kHz subcarrier spacing is 1ms.
  • the time slot length corresponding to the 30kHz subcarrier spacing is 0.5ms.
  • An OFDM symbol is the smallest time unit in the time domain in an OFDM system.
  • the duration of a subframe in the 5G NR system is 1ms.
  • PA Power amplifier
  • the power amplifier is used to amplify the low-power RF signal generated by the modulated oscillation circuit to support the transmission of the RF signal in the wireless channel.
  • the output power no longer increases with the increase of the input power.
  • the output power is called the saturated output power of the power amplifier.
  • FIG2 is a schematic diagram showing a performance curve of a power amplifier. As shown in FIG2, a low-capability power amplifier has a lower saturated output power, while a high-capability power amplifier has a higher saturated output power. Therefore, a low-capability power amplifier cannot support high-power transmission, while a high-capability power amplifier can support high-power transmission.
  • CP-OFDM waveform i.e. multi-carrier waveform
  • OFDMA orthogonal frequency division multiple access
  • PAPR peak to average power ratio
  • the coverage capability of a communication link can be defined as: the maximum tolerable power attenuation (in dB) when the electromagnetic wave propagates from the transmitter to the receiver under the premise of ensuring the transmission rate target. Therefore, increasing the maximum tolerable power attenuation is to improve the coverage capability of the communication link, that is, coverage enhancement.
  • the evaluation indicators can be PAPR and cubic metric (CM).
  • CM cubic metric
  • the reduction of PAPR and cubic metric (CM) represents the increase of the power amplifier operating point, which means the increase of the maximum transmission power, and can therefore be used to characterize the enhancement of coverage capability.
  • PAPR is defined as the ratio of the peak power to the average power of the signal.
  • the dynamic range of the power amplifier is limited. When the PAPR is too high, it will cause the power amplifier to enter the nonlinear region. In this case, the signal will produce nonlinear distortion after passing through the PA, causing spectrum expansion and in-band signal distortion, reducing system performance.
  • power backoff is required. The higher the PAPR, the higher the power that needs to be backed off. Power backoff will lead to a decrease in coverage. Therefore, reducing PAPR is conducive to improving coverage.
  • the DFT-S-OFDM waveform can effectively reduce the PAPR of the signal, thereby improving the coverage capability.
  • the NR system supports the DFT-S-OFDM waveform, which improves the uplink coverage capability.
  • DFT-S-OFDM Compared with CP-OFDM, DFT-S-OFDM adds a transform precoder to the physical layer processing flow.
  • the data is converted from serial to parallel in sequence, and then discrete Fourier transform (DFT) (transform precoding) is performed in sequence.
  • DFT discrete Fourier transform
  • multiple symbols are modulated together, they are transmitted one after another, which is equivalent to a single carrier.
  • Multi-carrier OFDMA superimposes multiple subcarriers in the time domain, while single carrier orthogonal frequency division multiplexing (SC-OFDM) is equivalent to a single subcarrier in the time domain after DFT transformation, so the PAPR is lower.
  • SC-OFDM single carrier orthogonal frequency division multiplexing
  • FIG3 shows a schematic diagram of the generation process of DFT-S-OFDM.
  • Quadrature phase shift keying (QPSK) modulation uses 4 different phases to represent different information.
  • a QPSK modulation symbol can carry 2 bits of information.
  • the 4 phases of QPSK can usually be ⁇ 0, ⁇ /2, ⁇ , 3 ⁇ /2 ⁇ or ⁇ /4, 3 ⁇ /4, 5 ⁇ /4, 7 ⁇ /4 ⁇ .
  • the following takes QPSK modulation and the number of subcarriers as F as an example, and illustrates the generation process of DFT-S-OFDM in combination with Figure 3.
  • the generation process of DFT-S-OFDM may include the following steps: F is a positive integer.
  • S3 maps the frequency domain signal to F subcarriers, and performs h-point inverse fast Fourier transformation (IFFT) to obtain the time domain signal ⁇ x(0), x(1),..., x(h-1) ⁇ .
  • IFFT inverse fast Fourier transformation
  • h is usually determined by the system bandwidth and is greater than F. h is a positive integer.
  • the frequency domain signal can also be multiplied by the precoding matrix before subcarrier mapping.
  • S4 adds a cyclic prefix (CP) to the time domain signal and performs digital-to-analog conversion to obtain an analog signal, which is then sent through the antenna.
  • CP cyclic prefix
  • uplink power control technology can be used to improve user experience and coverage.
  • the path loss of terminal devices at different distances from the base station varies greatly. The closer the terminal device is to the base station (central user), the smaller its path loss is, and the farther the terminal device is from the base station (edge user), the greater its path loss is.
  • edge users In order to provide edge users with a good user experience, edge users usually use a higher transmission power than central users to send uplink data. This can compensate for the path loss caused by long-distance transmission, so that edge users can also obtain better transmission performance, that is, better transmission rate.
  • the uplink transmission power of central users and edge users is different The mechanism is achieved through uplink power control technology.
  • the transmission power of the terminal device cannot be higher than the maximum output power (MOP).
  • MOP maximum output power
  • the maximum transmission power of the terminal device specified in the current NR standard is 23dBm.
  • SE Spectral extension
  • FDSS frequency-domain spectral shaping
  • Frequency domain expansion refers to cyclic expansion of frequency domain signals.
  • the frequency domain signal ⁇ X(0), X(1), ..., X(F-1) ⁇ occupies F subcarriers.
  • the frequency domain signal containing F elements is cyclically extended.
  • the total number of elements in the extended data is E.
  • P elements are extended to the left (forward) and E-P elements are extended to the right (backward), resulting in a frequency domain signal containing F+E elements ⁇ X(F-P), X(F-P+1), ..., X(F-1), X(0), X(1), ..., X(F-1), X(0), X(1), ..., X(E-P-1) ⁇ .
  • E is a positive integer
  • P is a non-negative integer
  • E-P is a non-negative integer.
  • FIG4 shows a schematic diagram of cyclic extension of a frequency domain signal.
  • the frequency domain signal before extension is ⁇ X(0), X(1), X(2), X(3), X(4), X(5), X(6), X(7) ⁇
  • the frequency domain signal after extension is ⁇ X(6), X(7), X(0), X(1), X(2), X(3), X(4), X(5), X(6), X(7), X(0), X(1) ⁇ , as shown in FIG4.
  • the extended frequency domain signal is mapped to F+E subcarriers.
  • FDSS refers to window filtering of frequency domain signals, that is, each element in the frequency domain signal is multiplied bit by bit with each element in the filter coefficient to obtain a filtered frequency domain signal.
  • FIG5 shows a schematic diagram of a windowed filter.
  • the frequency domain signal ⁇ X(0), X(1), ..., X(F-1) ⁇ occupies F subcarriers.
  • the frequency domain signal ⁇ X(0), X(1), ..., X(F-1) ⁇ is the frequency signal before filtering in FIG5.
  • the filter coefficient is ⁇ W(0), W(1), ..., W(F-1) ⁇ .
  • Windowed filtering refers to multiplying the frequency domain signal by the filter coefficient bit by bit, and the frequency domain signal after filtering is ⁇ X(0)W(0), X(1)W(1), ..., X(F-1)W(F-1) ⁇ , as shown in FIG5.
  • the frequency domain signal is usually first cyclically extended and then multiplied bit by bit with the filter coefficients.
  • the frequency domain signal ⁇ X(0), X(1), ..., X(F-1) ⁇ occupies F subcarriers.
  • the frequency domain signal is first cyclically extended, and the total number of elements in the extended data is E.
  • P elements are extended to the left (forward) and EP elements are extended to the right (backward), and the extended frequency domain signal ⁇ X(F-P), X(F-P+1), ..., X(F-1), X(0), X(1), ..., X(F-1), X(0), X(1), ..., X(E-P-1) ⁇ containing F+E elements is obtained. Then the extended frequency domain signal and the filter coefficients ⁇ W(0), W(1), ..., W(F+E) ⁇ are bit-by-bit multiplied to obtain the final frequency domain signal, which is then mapped to F+E subcarriers.
  • DMRS Demodulation reference signal
  • the frequency domain DMRS sequence can satisfy the following formula.
  • fn represents a frequency domain DMRS sequence
  • M represents the length of the DMRS sequence
  • M is a positive integer
  • n is an integer.
  • the elements in r n represent the time domain sequence of 8PSK modulation. belongs to the set of sequences shown in Table 1, where each row in Table 1 can represent a sequence A possible value of .
  • the -The BPSK modulated time domain sequence performs a DFT operation to obtain a frequency domain DMRS sequence.
  • the frequency domain DMRS sequence is given in Section 5.2.3 of the protocol TS 38.211, and the generation formula can satisfy the following formula.
  • b(n) is an element in the sequence [b(n)].
  • r n represents -BPSK modulated time domain sequence.
  • the sequence [b(n)] belongs to the set of sequences shown in Table 2 to Table 4, respectively, where each row in the table can represent a possible value of the sequence [b(n)].
  • the sequence [b(n)] belongs to the set of sequences shown in Table 2.
  • the sequence [b(n)] belongs to the set of sequences shown in Table 3.
  • the sequence [b(n)] belongs to the set of sequences shown in Table 4.
  • the protocol uses the low-PAPR sequence generation type 1 sequence given in Section 5.2.2 of TS 38.211.
  • the following describes the generation method of the frequency domain DMRS sequence.
  • the Zadoff-Chu (ZC) sequence can be used as the DMRS sequence.
  • fn represents the frequency domain DMRS sequence.
  • the value range of n is 0 to N-1, N is the length of the DMRS sequence, and N ZC is the largest prime number less than N.
  • q is the root of the ZC sequence, which is determined by the configuration information of the high-level layer, the position of the symbol, and the sequence length N ZC . Specifically, q can satisfy the following formula:
  • v 0 or 1. u ⁇ 0,1,...29 ⁇ .
  • the DMRS sequence can satisfy the following formula:
  • Mzc represents the length of the sequence.
  • a DMRS sequence with a length of 30 is essentially a truncated ZC sequence, that is, a DMRS sequence with a length of 30 is obtained by truncating an element at the end of a ZC sequence with a length of 31.
  • a frequency domain sequence modulated by QPSK (without DFT operation) can be used as the DMRS sequence.
  • the generation formula can satisfy the following formula:
  • sequence Belongs For sequence For different DMRS sequence lengths, the sequence Belongs to the set of sequences shown in Tables 5 to 8, where each row in the table can represent a sequence A possible value of .
  • the above ZC sequence and frequency domain QSPK sequence have good PAPR/CM performance in the time domain, and are constant amplitude in the frequency domain, so that better channel estimation performance can be obtained. Therefore, when the data channel adopts QPSK modulation or higher order modulation, the DMRS sequence can be obtained based on the low-PAPR sequence generation type 1 sequence.
  • the PAPR/CM of DMRS needs to be less than or equal to the PAPR/CM of the data signal.
  • the CM performance of the ZC sequence without frequency domain extension and FDSS is lower than the CM performance of the data channel with frequency domain extension and FDSS.
  • Frequency domain extension and FDSS processing of the DMRS sequence can reduce the PAPR/CM.
  • the current agreement's requirements for RB include the following:
  • the minimum granularity of resource indication is RB; the transport block size (TBS) is calculated based on the granularity of RB.
  • the number of RBs occupied by the data after the DFT operation needs to satisfy 2a * 3b * 5c , where a, b and c are non-negative integers.
  • spectrum expansion can effectively reduce the PAPR of the signal, thereby improving the coverage of the communication link.
  • the terminal device performs spectrum expansion based on the resources allocated by the network device, carrying the data to be transmitted on the non-expanded resources and carrying the extended data on the extended resources.
  • the data to be transmitted may be modulation symbols to be mapped.
  • the data to be transmitted may be a frequency domain signal obtained after a DFT operation is performed on the modulation symbols to be mapped.
  • the extended data is obtained by extending the data to be transmitted. Specifically, the extended data is obtained by extending the data to be transmitted. Or all of them are copied. Extended data can also be called copied data.
  • the extended data can be obtained by cyclically extending the data to be transmitted.
  • any continuous F elements are the F elements in the data to be transmitted.
  • F is a positive integer.
  • the number of elements in the extended data located on the left side of the data to be transmitted and the number of elements in the extended data located on the right side of the data to be transmitted may be the same or different.
  • the network device may send indication information to indicate the use of the allocated resources by the terminal device.
  • the relevant scheme includes two resource configuration methods.
  • the first configuration method is that the network device indicates the ratio of total resources and extended resources to total resources
  • the second configuration method is that the network device indicates the ratio of non-extended resources and extended resources to total resources. Both of the above resource configuration methods can instruct the UE to determine extended resources and non-extended resources, etc.
  • Fig. 6 shows a schematic diagram of spectrum expansion under two resource configuration modes. Spectrum expansion is described below in conjunction with Fig. 6 .
  • the resources allocated by the network device are total resources.
  • the total resources include non-extended resources and extended resources.
  • the length of the total resources is equal to the sum of the length of the non-extended resources and the length of the extended resources.
  • the terminal device performs spectrum expansion within the resources allocated by the network device. That is, part of the allocated resources is used as extended resources, and the other part is used as non-extended resources.
  • the terminal device may determine the non-extended resources and the extended resources based on the resources allocated by the network device and the ratio of the extended resources to the total resources.
  • the terminal device divides the allocated resources into non-extended resources carrying data to be transmitted and extended resources carrying extended data.
  • the data to be transmitted is the core data in Figure 6.
  • Alpha represents the ratio of extended resources to total resources.
  • alpha (length(SE_right)+length(SE_left))/(length(SE_right)+length(SE_left)+length(Data))
  • the function length(y) measures the length of the resource occupied by y, which can be represented by the number of occupied RBs or the number of REs.
  • Data represents the data to be transmitted.
  • SE_right represents the extended data located on the right side of data, that is, the data extended backward.
  • SE_left represents the extended data located on the left side of data, that is, the data extended forward.
  • the number of elements in SE_right and the number of elements in SE_left can be the same or different.
  • the resources allocated by the network device are non-extended resources.
  • the terminal device performs spectrum expansion outside the resources allocated by the network device. That is, the allocated resources are non-extended resources, and the extended resources are outside the allocated resources.
  • the terminal device can determine the length of the additional resources required for spectrum expansion, i.e., the length of the extended resources, based on the resources allocated by the network device and the ratio of the extended resources to the total resources.
  • the allocated resources are continuously extended in an equal or non-equal proportion on both sides until the length of the additional resources is met, and the extended part is the extended resource.
  • the allocated resources are continuously extended in equal proportion on both sides, that is, the lengths of the extended resources on both sides of the allocated resources are consistent.
  • the allocated resources are continuously extended in a non-proportional manner on both sides, ie the lengths of the extended resources on both sides of the allocated resources are different.
  • the allocated resources are non-extended resources carrying data to be transmitted.
  • the terminal device calculates the extended resources carrying the extended data based on the allocated resources.
  • alpha (length(SE_right)+length(SE_left))/(length(SE_right)+length(SE_left)+length(Data))
  • the function length(y) measures the length of the resource occupied by y, which can be represented by the number of occupied RBs or the number of REs.
  • Data represents the data to be transmitted.
  • SE_right represents the extended data located on the right side of data, that is, the data extended backward.
  • SE_left represents the extended data located on the left side of data, that is, the data extended forward.
  • the number of elements in SE_right and the number of elements in SE_left can be the same or different.
  • the resource usage mode determined by the terminal device based on the above configuration mode may conflict with the requirements of related operations, affecting the processing performance of the terminal device, which hinders the use of spectrum expansion.
  • the terminal device can calculate the length of the non-extended resources based on the length of the total resources and the ratio of the extended resources to the total resources.
  • the protocol for calculating the size of the transmission data block requires that the number of RBs corresponding to the resources carrying the data is an integer.
  • DFT is implemented based on a fast algorithm of the fast Fourier transform FFT, and its basis is at least one of 2, 3 or 5.
  • the number of REs corresponding to the resources carrying the data needs to satisfy 2a * 3b * 5c .
  • the protocol requires that the number of RBs occupied by the data after the DFT operation needs to satisfy 2a * 3b * 5c .
  • the number of RBs corresponding to the non-extended resources needs to satisfy 2a * 3b * 5c .
  • the number of RBs corresponding to the length of the non-extended resources calculated by the above method may conflict with the protocol constraints.
  • the number of RBs occupied by data transmission is 7, that is, the number of RBs corresponding to the length of the total resources is 7, and the ratio of extended resources to the total resources is 1/3.
  • the terminal device can allocate the non-extended resources according to the length of the non-extended resources and the relative length of the extended resources to the total resources.
  • the length of the total resources is calculated based on the ratio of.
  • a DMRS sequence can be generated based on the expanded spectrum.
  • the length of the DMRS sequence needs to adapt to the needs of spectrum expansion.
  • the length of the DMRS sequence can be half the length of the total resources.
  • One RB includes 12 REs.
  • the length of the DMRS sequence is less than 30, the length of the DMRS sequence needs to be a fixed value, that is, 6, 12, 18 or 24; if the length of the DMRS sequence is greater than or equal to 30, the length of the DMRS sequence is an integer.
  • the length of the DMRS sequence is less than 30, and 9 is not the above fixed value, which is inconsistent with the above protocol content.
  • the length of the DMRS sequence is greater than 30, and 480/7 is not an integer, which contradicts the above protocol content.
  • the present application provides a communication method and a communication device, which can improve the processing performance of the device, so that the device can improve the coverage capability of the communication link by spectrum expansion.
  • Fig. 7 is a schematic flow chart of a communication method provided by the present application. As shown in Fig. 7, the method 700 may include the following steps.
  • the terminal device receives first indication information sent by the network device.
  • the first indication information indicates the allocated resources (an example of the first resource) allocated by the network device.
  • Allocating resources may also be referred to as allocating bandwidth.
  • the terminal device determines a first non-extended resource (an example of the second resource) and/or a first total resource (an example of the third resource) according to at least one of the allocated resource and the expansion factor.
  • the expansion factor is used to indicate the proportion of spectrum expansion.
  • the first total resource is the resource after spectrum expansion.
  • the first total resource includes the first non-extended resource.
  • the terminal device communicates with the network device based on the first total resource.
  • the first non-extended resource carries data to be transmitted (an example of first data).
  • method 700 also includes step 740 (not shown in the figure): expansion is performed based on the data to be transmitted to obtain extended data (an example of second data), the extended data includes the data to be transmitted, and the extended data is carried on the first total resource.
  • extended data an example of second data
  • the extended data includes the data to be transmitted
  • the extended data is carried on the first total resource.
  • the expanded data includes the data to be transmitted and the extended data.
  • the extended data is obtained by copying part or all of the data to be transmitted.
  • the extended data can also be called the copied data.
  • the data to be transmitted may also be referred to as data to be mapped.
  • the data to be transmitted may include a frequency domain signal obtained after the modulation symbol to be mapped undergoes DFT.
  • the "first" in the first total resource is only used to limit the first total resource to the total resource actually used by the terminal device, and the “first” in the first non-extended resource is only used to limit the first non-extended resource to the non-extended resource actually used by the terminal device, and has no other limiting effect.
  • Total resources can be understood as the resources occupied by data transmission. Terminal devices can use the resources allocated by network devices to expand the spectrum. Total resources are the resources after spectrum expansion.
  • Extended resources are resources that carry extended data.
  • Non-extended resources are resources that carry data to be transmitted.
  • the total resources can be divided into non-extended resources carrying data to be transmitted and extended resources carrying extended data.
  • the length of the total resources can be the sum of the length of the extended resources and the length of the non-extended resources.
  • the extended resource may also be referred to as extended bandwidth, extended spectrum resource or extended spectrum.
  • the non-extended resource may also be referred to as non-extended bandwidth, non-extended spectrum resource or non-extended spectrum.
  • the expansion factor may be indicated by a network device.
  • the network device may directly indicate the value of the expansion factor.
  • the network device may indicate the index of the expansion factor.
  • the terminal device determines the value of the expansion factor based on the index of the expansion factor.
  • the expansion factor and the length of the allocated bandwidth may be indicated by the same signaling or by different signaling.
  • the expansion factor may also be preset.
  • the extension factor is used to indicate the relationship between the length of the extended resource and the length of the total resource.
  • the extension factor is used to indicate a ratio between the length of the extended resource and the length of the total resource.
  • the extension factor is used to indicate the ratio between the length of the total resource and the length of the extended resource.
  • the extension factor is used to indicate the relationship between the length of the extended resource and the length of the non-extended resource.
  • the extension factor is used to indicate a ratio between the length of the extended resource and the length of the non-extended resource.
  • the extension factor is used to indicate a ratio between the length of the non-extended resource and the length of the extended resource.
  • the extension factor is used to indicate the relationship between the length of the non-extended resource and the length of the total resource.
  • the extension factor is used to indicate a ratio between the length of the non-extended resource and the length of the total resource.
  • the extension factor is used to indicate the ratio between the length of the total resource and the length of the non-extended resource.
  • the specific indication content of the expansion factor may also be other content, as long as it can be used to indicate the ratio of spectrum expansion based on the expansion factor.
  • the present application embodiment mainly uses the expansion factor to indicate the ratio between the length of the extended resource and the length of the total resource as an example for explanation, and does not limit the solution of the present application embodiment.
  • the expansion factor is used to indicate other content, the solution in the following text can be adjusted accordingly.
  • the length of a resource can be characterized by different resource granularities.
  • the resource granularity may be an RB granularity, and the length of the resource may be represented by the number of RBs.
  • the resource granularity may be a RE granularity, and the length of the resource may be represented by the number of REs.
  • the terminal device may generate extended data based on the length of the first total resource and the length of the first non-extended resource.
  • the extended data occupies the first total resource, and the data to be transmitted occupies the first non-extended resource.
  • the terminal device can determine the length of the first total resource and the length of the first non-extended resource, and then expand the resources to be transmitted that occupy the length of the first non-extended resource to data that occupies the length of the first total resource, that is, the extended data.
  • the specific method for determining the length of the first total resource and the length of the first non-extended resource can be referred to the description below.
  • the first non-extended resource includes K RBs, that is, the length of the first non-extended resource is K RBs; the first total resource includes J RBs, that is, the length of the first total resource is J RBs.
  • K is a positive integer.
  • J is a positive integer.
  • the data to be transmitted is data occupying K RBs.
  • the extended data is data occupying J RBs.
  • step 740 may include: extending the data to be transmitted occupying K RBs to obtain data occupying J RBs, that is, the extended data.
  • the expanded data may also be referred to as a spread spectrum signal.
  • step 740 includes: cyclically extending the data to be transmitted to obtain extended data.
  • the data may be expanded in a cyclic manner.
  • the extended data is located on the left and/or right side of the data to be transmitted.
  • the data to be transmitted is ⁇ X(0), X(1), ..., X(F-1) ⁇
  • the extended data includes E elements
  • the elements on the left side of the data to be transmitted in the extended data include P elements
  • the elements on the right side of the data to be transmitted include E-P elements.
  • the extended data is ⁇ X(F-P), ..., X(F-1), X(0), X(1), ..., X(F-1), X(0), ...X(E-P-1) ⁇ . If the number of elements on the left side or the number of elements on the right side of the extended data exceeds the data to be transmitted, the data can be extended in a similar manner.
  • F any F consecutive elements in the extended data obtained after cyclic extension are F elements in the data to be transmitted.
  • F is the number of elements in the data to be transmitted.
  • F is a positive integer.
  • E is a positive integer, P is a non-negative integer, and E-P is a non-negative integer.
  • the number of elements in the extended data located on the left side of the data to be transmitted and the number of elements in the extended data located on the right side of the data to be transmitted may be the same or different.
  • the terminal device may acquire a DMRS sequence based on the length of the first total resources and the length of the first non-extended resources.
  • the method 700 further includes step 750 (not shown in the figure): acquiring a first DMRS sequence.
  • the length of the first DMRS sequence corresponds to the length of the first total resource.
  • the corresponding relationship between the length of the first DMRS sequence and the length of the first total resource is related to the mapping mode of the first DMRS sequence.
  • FIG8 is a schematic diagram showing a mapping method of a DMRS sequence.
  • the DMRS sequence is in a comb-like structure in the resource, that is, the DMRS sequence occupies the resource in a comb-like structure.
  • an element in the DMRS sequence is placed every other resource on the total resource.
  • a DMRS sequence with a length of 12 can occupy a frequency domain resource with a length of 24 REs, or a frequency domain resource with a length of 2 RBs, in a comb-like structure.
  • the length of the first DMRS sequence is the length of the first total resource. Half a degree.
  • the first DMRS sequence is mainly described by taking the first total resource occupied by the comb-shaped structure as an example.
  • step numbers in the embodiments of the present application do not limit the execution order of the steps.
  • the length of the resource needs to meet relevant constraints.
  • the constraint condition may include constraint condition #1.
  • Constraint condition #1 includes: the number of RBs in the first total resource is an integer, and the number of RBs in the first non-extended resource is an integer.
  • the constraint may include constraint #2.
  • Constraint #2 includes: the number of RBs occupied by the data or reference signal sequence after DFT satisfies the condition of 2 a * 3 b * 5 c .
  • a, b and c are non-negative integers.
  • the non-extended resource may be used to carry a frequency domain signal obtained by performing DFT on the modulation symbol to be mapped.
  • the constraint condition may include constraint condition #3.
  • Constraint condition #3 includes: the length of the data or reference signal sequence after DFT satisfies the condition of 2 a *3 b *5 c , where a, b and c are non-negative integers.
  • the non-extended resource can be used to carry the frequency domain signal obtained by performing DFT on the modulation symbol to be mapped.
  • the number of RBs in the first non-extended resource is not necessarily an integer.
  • the total resources and non-extended resources actually used by the terminal device are determined by the terminal device itself.
  • the embodiment of the present application is only described by taking the total resources and non-extended resources actually used determined by the terminal device as an example.
  • the total resources and non-extended resources actually used by the terminal device may be indicated by other devices (such as network devices).
  • Other devices may also determine the configuration mode of resources in the same manner as the terminal device, for example, determining the first total resources and the first non-extended resources.
  • step 720 can also be understood as follows: the terminal device can adjust the configuration mode of the resources calculated based on the allocated resources and the expansion factor according to the constraint condition to obtain the first total resource and the first non-extended resource. For example, the terminal device can calculate the second total resource and/or the second non-extended resource based on the allocated resources and the expansion factor, and adjust the second total resource and/or the second non-extended resource based on the constraint condition to obtain the first total resource and the first non-extended resource.
  • the network device can determine the total resources and non-extended resources actually used by the terminal device in a variety of ways. For example, the terminal device can predetermine in the protocol the adjustment method of the total resources or non-extended resources indicated by the network device. For another example, the terminal device can send indication information to notify the network device of the adjustment method of the total resources or non-extended resources indicated by it. It should be understood that the network device can also determine the total resources and non-extended resources actually used by the terminal device in other ways, and the embodiments of the present application are not limited to this.
  • a suitable expansion factor may be set so that the second total resource and/or the second non-extended resource calculated by the terminal device based on the allocated resource and the expansion factor satisfies the constraint condition. In other words, there is no need to adjust the second total resource and/or the second non-extended resource.
  • the first total resource is the second total resource.
  • the first non-extended resource is the second total resource.
  • the allocated resources may include a first total resource.
  • the allocated resources may be total resources indicated by the network device to the terminal device.
  • the terminal device can perform spectrum extension within the length of the resources allocated by the network device.
  • the extended resources can be located within the resources allocated by the network device.
  • the allocated resources may be used to carry data to be transmitted.
  • the allocated resources may be non-extended resources indicated by the network device to the terminal device.
  • the terminal device may perform spectrum expansion outside the resources allocated by the network device.
  • the expansion resources may be located outside the resources allocated by the network device.
  • FIG. 9 shows a communication method 900 according to an embodiment of the present application.
  • the method 900 may be regarded as a specific implementation of the method 700 .
  • the method 900 includes the following steps.
  • the terminal device receives first indication information sent by the network device.
  • the first indication information indicates the allocated resources allocated by the network device.
  • the terminal device determines a first non-extended resource according to the allocated resource and the expansion factor.
  • the expansion factor is used to indicate a ratio of spectrum expansion.
  • the terminal device communicates with the network device based on the first total resource.
  • the first non-extended resource carries the data to be transmitted.
  • the first total resource is the resource after spectrum expansion.
  • the first total resource includes the first non-extended resource.
  • the method 900 further includes step 940 (not shown in the figure): performing expansion based on the data to be transmitted to obtain expanded data, the expanded data including the data to be transmitted, and the first total resource carrying the expanded data.
  • the method 900 further includes step 950 (not shown in the figure): acquiring a first DMRS sequence.
  • the length of the first DMRS sequence corresponds to the length of the first total resource.
  • the allocated resources may be the total resources allocated to the network device.
  • the first non-extended resource includes K RBs, that is, the data to be transmitted occupies K RBs, or in other words, occupies K' REs.
  • K may be determined according to the above constraint #2.
  • K' can be determined according to constraint #3 above.
  • the expansion factor satisfies the following conditions.
  • the data to be transmitted may be obtained through a DFT operation, and the DFT operation may be implemented based on a fast algorithm based on FFT, with a basis of at least one of 2, 3 or 5.
  • the terminal device may implement efficient conversion based on the above-mentioned DFT operation, improve data processing efficiency, that is, improve the processing performance of the terminal device, thereby facilitating ensuring that the terminal device implements data transmission by spectrum expansion, reducing the PAPR of the signal, and enhancing the coverage capability of the communication link.
  • the length of the first non-extended resource may be determined in the following manner.
  • the allocated resources and the first total resources may be the same, and a detailed description may be found below.
  • the length of the first non-extended resource can meet the requirement of 2a * 3b * 5c while being as close as possible to the length of the non-extended resource indicated by the network device, which is beneficial to improving transmission performance.
  • the expansion factor may satisfy the following conditions.
  • the extension factor is used to indicate the ratio of the length of the extended resource to the length of the total resource after spectrum expansion, and the values of the extension factor include: 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 1/8, 3/8, 1/9 or 1/10.
  • the extension factor is used to indicate the ratio between the length of the extended resource and the length of the non-extended resource, and the values of the extension factor include: 1, 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 3/5, 1/8 or 1/9.
  • the extension factor is used to indicate the ratio between the length of non-extended resources and the length of total resources after spectrum expansion, and the values of the extension factor include: 1/2, 2/3, 3/4, 4/5, 5/6, 6/7, 7/8, 5/8, 8/9 or 9/10.
  • the coverage capability of a communication link can be understood as the maximum tolerable power attenuation of electromagnetic waves when propagating from a transmitter to a receiver while ensuring the transmission rate target.
  • the terminal device achieves data transmission by spectrum expansion, which can reduce the PAPR of the signal.
  • the spectrum expansion method occupies additional spectrum, resulting in a loss of data transmission rate.
  • the above expansion factor can achieve better waveform PAPR performance improvement with less resource overhead, that is, while occupying less additional spectrum resources, it reduces the PAPR of the signal to enhance the coverage capability of the communication link.
  • the extension factor is used to indicate the ratio between the length of the extended resource and the length of the total resource after spectrum expansion, and the values of the extension factor include: 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 1/8, 1/9 or 1/10.
  • the extension factor is used to indicate the ratio between the length of the extended resource and the length of the non-extended resource, and the values of the extension factor include: 1, 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 1/8 or 1/9.
  • the extension factor is used to indicate the ratio between the length of non-extended resources and the length of total resources after spectrum expansion, and the values of the extension factor include: 1/2, 2/3, 3/4, 4/5, 5/6, 6/7, 7/8, 8/9 or 9/10.
  • the above extension factor can adapt to more types of total resources, so that the length of non-extended resources calculated based on more types of total resources meets the above constraint #1, and the amount of calculation is small.
  • the extension factor is used to indicate the length of the extended resource and the total resource after spectrum expansion. The ratio between the lengths of the sources. When the expansion factor is 1/5, the length of the extended resource can be calculated by dividing the total resource by 5. If the expansion factor is 2/5, additional multiplication operations are required, which increases the amount of calculation.
  • the extension factor is used to indicate the ratio of the length of the extended resource to the length of the total resource after spectrum expansion, and the values of the extension factor include: 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 3/8, 1/9 or 1/10.
  • the extension factor is used to indicate the ratio between the length of the extended resource and the length of the non-extended resource, and the values of the extension factor include: 1, 1/2, 1/3, 1/4, 1/5, 1/6, 3/5, 1/8 or 1/9.
  • the extension factor is used to indicate the ratio between the length of non-extended resources and the length of total resources after spectrum expansion, and the values of the extension factor include: 1/2, 2/3, 3/4, 4/5, 5/6, 6/7, 5/8, 8/9 or 9/10.
  • the above expansion factor can adapt to more types of total resources, so that the length of the non-extended resource calculated based on the more types of total resources satisfies the above constraint #2 or constraint #3. In other words, under more types of total resources, there is no need to adjust the calculated non-extended resources. For example, there is no need to perform rounding operations.
  • the total resource can be an allocated resource or a first total resource.
  • extension factor is used to indicate the ratio of the extension resource to the total resource after spectrum extension.
  • the expansion factor is 1/5, so when the length of the total resource is a multiple of 5 (such as the number of RBs in the allocated resources is 5, 10, 15, 20...270, etc.), the calculated length of the non-extended resource can satisfy the above constraint #2 or constraint #3.
  • the calculated length of the non-extended resource can be used as the length of the first non-extended resource.
  • the expansion factor is 1/6.
  • the length of the total resource is a multiple of 6 (e.g., the number of RBs in the allocated resource is 6, 12, 18, 24, ... 270, etc.)
  • the calculated length of the non-extended resource can satisfy the above constraint #2 or constraint #3.
  • the calculated length of the non-extended resource can be used as the length of the first non-extended resource.
  • the expansion factor is 1/9.
  • the calculated length of the non-extended resource can satisfy the above constraint #2 or constraint #3.
  • the calculated length of the non-extended resource can be used as the length of the first non-extended resource.
  • extension factor can also be other values.
  • the extension factor when the extension factor is used to indicate the ratio between the extended resources and the total resources after spectrum expansion, the extension factor can also be 1/11, 2/11, 3/11, 2/5, 3/7, 4/9, 2/7 or 5/11, etc.
  • the first total resource is based on the allocated resource.
  • the terminal device may use the allocated resources as the first total resource actually used. If the length of the allocated resources does not meet the constraint condition, the terminal device may determine the length of the total resource actually used based on the constraint condition and the length of the allocated resources.
  • the terminal device when the length of the allocated resources does not satisfy the constraint condition, the terminal device does not directly use the allocated resources as the first total resources actually used, but determines the first total resources actually used based on the constraint condition and the allocated resources.
  • step 750 may include: generating a first DMRS sequence.
  • the length of the first DMRS sequence corresponds to the length of the first total resource.
  • the first DMRS sequence may occupy J RBs in a comb structure.
  • the number of elements included in the DMRS sequence may be referred to as the length of the DMRS.
  • the first DMRS sequence may be obtained by performing a DFT operation on the first time domain sequence.
  • the first time domain sequence may be based on -BPSK modulated time domain sequence or 8PSK modulated time domain sequence.
  • the length of the first DMRS sequence can meet the requirement of 2a * 3b * 5c .
  • the terminal device can implement the DFT operation based on the fast algorithm of FFT, and its basis can be at least one of 2, 3 or 5.
  • efficient conversion can be achieved and data processing efficiency can be improved, that is, the processing performance of the terminal device can be improved, which is conducive to ensuring that the terminal device can realize data transmission through spectrum expansion, further reducing the PAPR of the signal, so as to enhance the coverage capability of the communication link.
  • J 2a * 3b * 5c .
  • the value of J meets the requirement of the protocol, which can avoid conflicts with the protocol and reduce signaling overhead.
  • the length of the first DMRS sequence can meet the requirement of 2a * 3b * 5c while making the length of the resources occupied by it as close as possible to
  • the length of the total resources (ie, allocated resources) indicated by the network device is beneficial to improving transmission performance.
  • step 750 may include: generating a second DMRS sequence; and performing extension based on the second DMRS sequence to obtain the first DMRS sequence.
  • the second DMRS sequence may occupy D RBs in a comb-like structure.
  • the length of the second DMRS sequence is D*6.
  • the length of the second DMRS sequence is D', that is, the second DMRS sequence occupies D'/6 RBs.
  • the second DMRS sequence may be obtained by performing a DFT operation on the second time domain sequence.
  • the second time domain sequence may be based on -BPSK modulated time domain sequence or 8PSK modulated time domain sequence.
  • the terminal device can implement the DFT operation based on the fast algorithm of FFT, and its basis can be at least one of 2, 3 or 5.
  • efficient conversion can be achieved and data processing efficiency can be improved, that is, the processing performance of the terminal device can be improved, which is conducive to ensuring that the terminal device can realize data transmission through spectrum expansion, further reducing the PAPR of the signal, so as to enhance the coverage capability of the communication link.
  • the length of the second DMRS sequence may be determined according to the above conditions and the length of the non-extended resources calculated based on the allocated resources and the extension factor.
  • the length of the second DMRS sequence can meet the requirement of 2a * 3b * 5c while making the length of the resources occupied by it as close as possible to the length of the non-extended resources indicated by the network device, which is conducive to improving transmission performance.
  • K may be used as D, or K*6 may be used as D′.
  • the length of the second DMRS sequence can meet the requirement of 2a * 3b * 5c and correspond to the length of the non-extended resource indicated by the network device as much as possible, which is conducive to improving transmission performance.
  • this method can reduce the amount of calculation.
  • the second DMRS sequence can be obtained based on the ZC sequence or the first frequency domain sequence.
  • the length of the second DMRS sequence can meet the following conditions: when D' is greater than or equal to 30, D' is the smallest prime number greater than or equal to 30; when D' is less than 30, D' is 6, 12, 18 or 24.
  • the first frequency domain sequence may be a frequency domain sequence obtained without undergoing a DFT operation, or may be a frequency domain sequence obtained by undergoing a DFT operation on a time domain sequence.
  • the first frequency domain sequence may be a frequency domain sequence modulated by QSPK, and the generation process of the frequency domain sequence does not include a DFT operation.
  • the first frequency domain sequence may be a frequency domain sequence obtained by performing a DFT operation on a time domain sequence modulated by ⁇ /2-BPSK.
  • the length of the second DMRS sequence can meet the protocol requirements, which is conducive to ensuring that the terminal device can achieve data transmission through spectrum expansion, further reducing the PAPR of the signal, and enhancing the coverage capability of the communication link.
  • the configuration method 1 is described below using two cases (case 1 and case 2).
  • the first DMRS sequence is determined based on a frequency domain sequence obtained after a DFT operation is performed on a time domain sequence.
  • the first DMRS sequence is obtained based on a ZC sequence or other frequency domain sequences.
  • step 950 includes: generating a first DMRS sequence.
  • the terminal device can directly generate a first DMRS sequence occupying the length of the first total resource. No extension operation is performed during the generation of the first DMRS sequence.
  • step 950 includes: generating a second DMRS sequence; and performing expansion based on the second DMRS sequence to obtain a first DMRS sequence, wherein the first DMRS sequence includes the second DMRS sequence.
  • the generation process of the first DMRS sequence includes an expansion operation.
  • performing extension based on the second DMRS sequence to obtain the first DMRS sequence includes: performing cyclic extension based on the second DMRS sequence to obtain the first DMRS sequence.
  • Example 1 the first DMRS sequence is generated without undergoing an expansion operation.
  • Example 2 the generation process of the first DMRS sequence includes an expansion operation.
  • Example 1 the first DMRS sequence is obtained by performing a DFT operation on the first time domain sequence.
  • the first time domain sequence may be based on -BPSK modulated time domain sequence or 8PSK modulated time domain sequence.
  • the first time domain sequence may also be other time domain sequences.
  • a DFT operation is performed on the 8PSK modulated time domain sequence to obtain a DMRS sequence of length 6, ie, the first DMRS sequence.
  • a DMRS sequence of length 6 ie, the first DMRS sequence.
  • the length of the first DMRS sequence is a value other than 6, -Perform a DFT operation on the BPSK modulated time domain sequence to obtain a DMRS sequence of corresponding length, that is, the first DMRS sequence.
  • the length of the first DMRS sequence is greater than or equal to 30, -Perform a DFT operation on the BPSK-modulated time-domain gold sequence to obtain a DMRS sequence of corresponding length, that is, the first DMRS sequence.
  • the computer searches for - Perform DFT operation on the BPSK modulated time domain sequence to obtain a DMRS sequence of corresponding length, that is, a first DMRS sequence.
  • a DMRS sequence of corresponding length that is, a first DMRS sequence.
  • the first DMRS sequence is obtained after the DFT operation.
  • the length of the first DMRS sequence corresponds to the length of the total resources.
  • the terminal device can adjust the length of the total resources (i.e., the allocated resources) based on constraint #2, or determine the length of the first DMRS sequence based on constraint #3.
  • the first total resource is described below.
  • the first DMRS sequence may occupy J RBs, that is, the first total resources include J RBs.
  • the first DMRS sequence may occupy J RBs in a comb structure.
  • the length of the first DMRS sequence J' J*6.
  • the constraint condition includes constraint condition #2, the number of RBs occupied by the first DMRS sequence, that is, the number of RBs in the first total resources satisfies 2 a *3 b *5 c .
  • the length of the first DMRS sequence satisfies 2 a *3 b *5 c .
  • a, b and c are non-negative integers, and L is the number of RBs in the allocated resources.
  • L is a positive number.
  • the data to be transmitted is obtained after the DFT operation.
  • the terminal device can adjust the length of the non-extended resource based on constraint #2 or constraint #3, so that the length of the first non-extended resource satisfies constraint #2 or constraint #3.
  • the first non-extension resource is described below.
  • the first non-extended resource includes K RBs, that is, the data to be transmitted occupies K RBs, or in other words, occupies K' REs.
  • K may be determined according to the above constraint #2, that is, the number of RBs in the first non-extended resource satisfies 2a * 3b * 5c .
  • K' may be determined according to the above constraint #3, that is, the number of REs in the first non-extended resource satisfies 2a * 3b * 5c .
  • the terminal device may adjust the length of the non-extended resources calculated based on the allocated resources and the extension factor according to constraint #2 to obtain K.
  • the terminal device may adjust the length of the non-extended resources calculated based on the allocated resources and the extension factor according to constraint #3 to obtain K'.
  • K1 is the number of RBs in the second non-extended resource (an example of the fourth resource), and the second non-extended resource is calculated based on the allocated resource and the extension factor.
  • K1 is a positive number.
  • K1 is obtained by calculation and may be an integer or a non-integer, which is not limited in the embodiment of the present application.
  • the expansion factor alpha is used to indicate the ratio of the expansion resources to the total resources.
  • K1 L*(1-alpha).
  • L is the number of RBs in the allocated resources.
  • K satisfies any of the following:
  • K' satisfies any of the following:
  • the terminal device may adjust the length of the non-extended resources calculated based on the first total resources and the extension factor according to constraint #2 to obtain K.
  • the terminal device may adjust the length of the non-extended resources calculated based on the first total resources and the extension factor according to constraint #3 to obtain K'.
  • K2 is the number of RBs in the third non-extended resource (an example of the fifth resource), and the third non-extended resource is calculated based on the first total resource and the extension factor.
  • K2 is a positive number.
  • K2 is obtained by calculation and may be an integer or a non-integer, which is not limited in the embodiment of the present application.
  • the extension factor alpha is used to indicate the ratio of the extension resources to the total resources.
  • K2 J*(1-alpha).
  • J is the number of RBs in the first total resources determined above.
  • K satisfies any of the following:
  • K' satisfies any of the following:
  • step 940 may include: cyclically extending the to-be-transmitted data occupying K RBs into extended data occupying J RBs.
  • step 940 or step 740 in the previous text please refer to the relevant description of step 940 or step 740 in the previous text, which will not be repeated here.
  • the following describes a method for acquiring the first DMRS sequence.
  • step 950 may include: generating a DMRS sequence occupying J RBs, that is, a first DMRS sequence.
  • Example 2 the first DMRS sequence is obtained by performing an extension operation on the second DMRS sequence.
  • the second DMRS sequence is obtained by performing a DFT operation on the second time domain sequence.
  • the second time domain sequence may be based on -BPSK modulated time domain sequence or 8PSK modulated time domain sequence.
  • Example 2 mainly uses The second time domain sequence may be other time domain sequences.
  • a DFT operation is performed on the 8PSK modulated time domain sequence to obtain a DMRS sequence of length 6, ie, the second DMRS sequence.
  • a DMRS sequence of length 6 ie, the second DMRS sequence.
  • the length of the second DMRS sequence is a value other than 6, -Perform a DFT operation on the BPSK modulated time domain sequence to obtain a DMRS sequence of corresponding length, that is, a second DMRS sequence.
  • the length of the second DMRS sequence is greater than or equal to 30, -Perform a DFT operation on the BPSK-modulated time-domain gold sequence to obtain a DMRS sequence of corresponding length, that is, a second DMRS sequence.
  • the computer searches for - Perform DFT operation on the BPSK modulated time domain sequence to obtain a DMRS sequence of corresponding length, that is, a second DMRS sequence.
  • a DMRS sequence of corresponding length that is, a second DMRS sequence.
  • the second DMRS sequence is obtained after the DFT operation.
  • the terminal device can determine the resources occupied by the second DMRS sequence based on constraint condition #2, or determine the length of the second DMRS sequence based on constraint condition #3.
  • the first total resource is described below.
  • the terminal device can determine the length of the first total resource based on constraint condition 1#.
  • the number L of RBs in the allocated resource is a positive integer.
  • the allocated resource can be used as the first total resource.
  • the length of the first total resource is the length of the allocated resource.
  • the first total resource includes J RBs, and the allocated resource includes L RBs. J is equal to L.
  • the first non-extension resource is described below.
  • the first non-extended resource includes K RBs, that is, the data to be transmitted occupies K RBs, or in other words, occupies K' REs.
  • K may be determined based on the above constraint #2, that is, the number of RBs in the first non-extended resource satisfies 2a * 3b * 5c .
  • K' may be determined based on the above constraint #3, that is, the number of REs in the first non-extended resource satisfies 2a * 3b * 5c .
  • the terminal device may adjust the length of the non-extended resource calculated based on the allocated resource (first total resource) and the extension factor according to constraint #2 or constraint #3.
  • the allocated resource is the same as the first total resource.
  • K1 is the number of RBs in the second non-extended resource (an example of the fourth resource), and the second non-extended resource is calculated based on the allocated resource and the extension factor.
  • the expansion factor alpha is used to indicate the ratio of the expansion resources to the total resources.
  • K1 L*(1-alpha).
  • L is the number of RBs in the allocated resources.
  • K satisfies any of the following:
  • K' satisfies any of the following:
  • K1 may also be replaced by K2 in Example 1.
  • the second DMRS sequence is described below.
  • the second DMRS sequence occupies D RBs.
  • the second DMRS sequence may occupy D RBs in a comb structure.
  • the length of the second DMRS sequence is D*6.
  • the length of the second DMRS sequence is D', that is, the second DMRS sequence occupies D'/6 RBs.
  • the constraint condition includes constraint condition #2
  • the number of RBs occupied by the second DMRS sequence that is, the number of RBs in the second total resources satisfies 2 a *3 b *5 c .
  • the length of the second DMRS sequence satisfies 2 a *3 b *5 c .
  • the terminal device may determine D according to constraint #2 and the length of the non-extended resources calculated based on the allocated resources and the extension factor.
  • the terminal device may determine D' based on constraint #3 and the length of the non-extended resources calculated based on the allocated resources and the extension factor.
  • K1 is the number of RBs in the second non-extended resource (an example of the fourth resource), and the second non-extended resource is calculated based on the allocated resource and the extension factor.
  • the expansion factor alpha is used to indicate the ratio of the expansion resources to the total resources.
  • K1 L*(1-alpha).
  • L is the number of RBs in the allocated resources.
  • D satisfies any of the following:
  • a, b and c are non-negative integers.
  • D K. That is, the length of the second DMRS sequence corresponds to the length of the first non-extended resource, which can reduce the amount of calculation.
  • D' satisfies any of the following:
  • a, b and c are non-negative integers.
  • step 940 may include: cyclically extending the to-be-transmitted data occupying K RBs into extended data occupying J RBs.
  • J L.
  • step 940 or step 740 can refer to the relevant description of step 940 or step 740 above, which will not be repeated here.
  • the following describes a method for acquiring the first DMRS sequence.
  • step 950 may include: generating a DMRS sequence occupying D RBs, that is, a second DMRS sequence; and cyclically extending the second DMRS sequence into a DMRS sequence occupying J RBs, that is, the first DMRS sequence.
  • step 950 may include: generating a DMRS sequence of length D’, i.e., a second DMRS sequence; and cyclically extending the second DMRS sequence to a DMRS sequence occupying J RBs, i.e., the first DMRS sequence.
  • Step 950 includes: generating a second DMRS sequence; and extending based on the second DMRS sequence to obtain a first DMRS sequence, wherein the first DMRS sequence includes the second DMRS sequence.
  • performing extension based on the second DMRS sequence to obtain the first DMRS sequence includes: performing cyclic extension based on the second DMRS sequence to obtain the first DMRS sequence.
  • the first DMRS sequence is obtained by performing an expansion operation on the second DMRS sequence.
  • the second DMRS sequence may be a ZC sequence or a first frequency domain sequence.
  • the first frequency domain sequence may be a frequency domain sequence obtained without undergoing a DFT operation, or may be a frequency domain sequence obtained by undergoing a DFT operation on a time domain sequence.
  • the first frequency domain sequence may be a frequency domain sequence modulated by QSPK, and the generation process of the frequency domain sequence does not include a DFT operation.
  • the first frequency domain sequence may be a frequency domain sequence obtained by performing a DFT operation on a time domain sequence modulated by ⁇ /2-BPSK.
  • the ZC sequence or the frequency domain sequence modulated by QPSK is mainly used as an example for explanation, and does not constitute a limitation on the solution of the embodiment of the present application.
  • a ZC sequence with a length of 31 is generated, that is, the second DMRS sequence.
  • the first total resource is described below.
  • the terminal device can determine the length of the first total resource based on constraint condition 1#.
  • the number L of RBs in the allocated resource is a positive integer.
  • the allocated resource can be used as the first total resource.
  • the length of the first total resource is the length of the allocated resource.
  • the first total resource includes J RBs, and the allocated resource includes L RBs. J is equal to L.
  • the first non-extension resource is described below.
  • the first non-extended resource includes K RBs, that is, the data to be transmitted occupies K RBs, or in other words, occupies K' REs.
  • K may be determined according to the above constraint #2, that is, the number of RBs in the first non-extended resource satisfies 2a * 3b * 5c .
  • K' may be determined according to the above constraint #3, that is, the number of REs in the first non-extended resource satisfies 2a * 3b * 5c .
  • the terminal device may adjust the length of the non-extended resource calculated based on the allocated resource (first total resource) and the extension factor according to constraint #2 or constraint #3.
  • the allocated resource is the same as the first total resource.
  • K1 is the number of RBs in the second non-extended resource (an example of the fourth resource), and the second non-extended resource is calculated based on the allocated resource and the extension factor.
  • the expansion factor alpha is used to indicate the ratio of the expansion resources to the total resources.
  • K1 L*(1-alpha).
  • L is the number of RBs in the allocated resources.
  • K satisfies any of the following:
  • K' satisfies any of the following:
  • K1 may also be replaced by K2 in the above example 1.
  • the second DMRS sequence is described below.
  • the second DMRS sequence occupies D RBs, that is, the length of the second DMRS sequence is D*6.
  • the length of the second DMRS sequence is D’, that is, the second DMRS sequence occupies D’/6 RBs.
  • D’ is the smallest prime number greater than or equal to K1*6.
  • D satisfies any of the following:
  • D is the largest integer less than K1, or
  • D is the integer closest to K1.
  • K1 is the number of RBs in the second non-extended resource (an example of the fourth resource), and the second non-extended resource is calculated based on the allocated resource and the extension factor.
  • the expansion factor alpha is used to indicate the ratio of the expansion resources to the total resources.
  • K1 L*(1-alpha).
  • L is the number of RBs in the allocated resources.
  • step 940 or step 740 in the previous text please refer to the relevant description of step 940 or step 740 in the previous text, which will not be repeated here.
  • the following describes a method for acquiring the first DMRS sequence.
  • step 950 may include: generating a DMRS sequence occupying D RBs, that is, a second DMRS sequence; and cyclically extending the second DMRS sequence into a DMRS sequence occupying J RBs, that is, the first DMRS sequence.
  • a frequency domain sequence of QPSK modulation occupying D RBs ie, a second DMRS sequence, is generated.
  • step 950 may include: generating a DMRS sequence of length D’, i.e., a second DMRS sequence; and cyclically extending the second DMRS sequence to a DMRS sequence occupying J RBs, i.e., the first DMRS sequence.
  • a ZC sequence with a length of D’ is generated, that is, the second DMRS sequence.
  • FIG. 10 shows a communication method 1000 according to an embodiment of the present application.
  • the method 1000 may be regarded as a specific implementation of the method 700 .
  • the method 1000 includes the following steps.
  • a terminal device receives first indication information sent by a network device.
  • the first indication information indicates allocated resources allocated by the network device.
  • the allocated resources are resources used to carry data to be transmitted.
  • the terminal device determines a first total resource according to the allocated resource and the expansion factor.
  • the expansion factor is used to indicate a ratio of spectrum expansion.
  • the terminal device communicates with the network device based on the first total resource.
  • the first non-extended resource carries the data to be transmitted.
  • the resources are resources after spectrum expansion.
  • the first total resources include first non-expanded resources.
  • method 1000 further includes step 1040 (not shown in the figure): performing expansion based on the data to be transmitted to obtain expanded data, the expanded data including the data to be transmitted, and the first total resource carrying the expanded data.
  • the method 1000 further includes step 1050 (not shown in the figure): acquiring a first DMRS sequence.
  • the length of the first DMRS sequence corresponds to the length of the first total resource.
  • the allocated resources are non-extended resources allocated by the network device, that is, resources allocated by the network device for carrying data to be transmitted.
  • the first non-extended resource is based on the allocated resource.
  • the terminal device can use the allocated resource as the first non-extended resource actually used.
  • the terminal device can determine the length of the first non-extended resource actually used based on the constraint condition and the length of the allocated resource.
  • the terminal device when the length of the allocated resources does not meet the constraint condition, the terminal device does not directly use the allocated resources as the first non-extended resources actually used, but determines the first non-extended resources actually used based on the constraint condition and the allocated resources.
  • the first non-extended resource includes K RBs, that is, the data to be transmitted occupies K RBs, or in other words, occupies K' REs.
  • K may be determined according to the above constraint #2.
  • K' may be determined based on constraint #3 above.
  • the data to be transmitted carried by the first non-extended resource can be obtained through a DFT operation, and the DFT operation can be implemented based on a fast algorithm based on FFT, and its basis is at least one of 2, 3 or 5.
  • the terminal equipment can achieve efficient conversion based on the above-mentioned DFT operation, improve data processing efficiency, that is, improve the processing performance of the terminal equipment, thereby ensuring that the terminal equipment realizes data transmission through spectrum expansion, reduces the PAPR of the signal, and enhances the coverage capability of the communication link.
  • the length of the first non-extended resource may be determined in the following manner.
  • the RB in the first non-extended resource can meet the requirement of 2a * 3b * 5c while being as close as possible to the length of the non-extended resource allocated by the network device, which is beneficial to improving transmission performance.
  • the expansion factor may satisfy the following conditions.
  • the extension factor is used to indicate the ratio of the length of the extended resource to the length of the total resource after spectrum expansion, and the values of the extension factor include: 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 1/8, 3/8, 1/9 or 1/10.
  • the extension factor is used to indicate the ratio between the length of the extended resource and the length of the non-extended resource, and the values of the extension factor include: 1, 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 3/5, 1/8 or 1/9.
  • the extension factor is used to indicate the ratio between the length of non-extended resources and the length of total resources after spectrum expansion, and the values of the extension factor include: 1/2, 2/3, 3/4, 4/5, 5/6, 6/7, 7/8, 5/8, 8/9 or 9/10.
  • the above expansion factor can achieve better waveform PAPR performance improvement with less resource overhead, that is, while occupying less additional spectrum resources, reduce the PAPR of the signal to enhance the coverage capability of the communication link.
  • the specific description can be referred to above and will not be repeated here.
  • the extension factor is used to indicate the ratio between the length of the extended resource and the length of the total resource after spectrum expansion, and the values of the extension factor include: 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 1/8, 1/9 or 1/10.
  • the extension factor is used to indicate the ratio between the length of the extended resource and the length of the non-extended resource, and the values of the extension factor include: 1, 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 1/8 or 1/9.
  • the extension factor is used to indicate the ratio between the length of non-extended resources and the length of total resources after spectrum expansion, and the values of the extension factor include: 1/2, 2/3, 3/4, 4/5, 5/6, 6/7, 7/8, 8/9 or 9/10.
  • the above expansion factor can adapt to non-extended resources of greater length, that is, the length of the total resources calculated based on non-extended resources of greater length can satisfy the above constraint #1.
  • the length of the total resources only needs to satisfy constraint #1, there is no need to adjust the calculated total resources. For example, there is no need to perform rounding operations, and the calculated resources can be used as the first total resources.
  • the extension factor is used to indicate the ratio between the length of the extended resource and the length of the total resource after spectrum expansion. Possible values are: 1/2, 1/3, 1/4, 1/5, 1/6, 1/7, 3/8, 1/9 or 1/10.
  • the extension factor is used to indicate the ratio between the length of the extended resource and the length of the non-extended resource, and the values of the extension factor include: 1, 1/2, 1/3, 1/4, 1/5, 1/6, 3/5, 1/8 or 1/9.
  • the extension factor is used to indicate the ratio between the length of non-extended resources and the length of total resources after spectrum expansion, and the values of the extension factor include: 1/2, 2/3, 3/4, 4/5, 5/6, 6/7, 5/8, 8/9 or 9/10.
  • the above expansion factor can adapt to non-extended resources of longer lengths.
  • the calculated length of the total resources is more likely to satisfy the above constraint #1.
  • the length of the total resources only needs to satisfy constraint #1, there is no need to adjust the calculated total resources. For example, there is no need to perform rounding operations, and the calculated resources can be used as the first total resources.
  • the configuration method 2 is described below using two cases (case 3 and case 4) respectively.
  • the first DMRS sequence is determined based on a frequency domain sequence obtained after a DFT operation is performed on the time domain sequence.
  • the first DMRS sequence is obtained based on a ZC sequence or other frequency domain sequences.
  • step 1050 includes: generating a first DMRS sequence.
  • the terminal device can directly generate a first DMRS sequence occupying the length of the first total resource. No extension operation is performed during the generation of the first DMRS sequence.
  • step 1050 includes: generating a second DMRS sequence; and extending based on the second DMRS sequence to obtain a first DMRS sequence, wherein the first DMRS sequence includes the second DMRS sequence.
  • the generation process of the first DMRS sequence includes an expansion operation.
  • performing extension based on the second DMRS sequence to obtain the first DMRS sequence includes: performing cyclic extension based on the second DMRS sequence to obtain the first DMRS sequence.
  • Example 3 the first DMRS sequence is generated without undergoing an expansion operation.
  • Example 4 the generation process of the first DMRS sequence includes an expansion operation.
  • Example 3 the first DMRS sequence is obtained by performing a DFT operation on the first time domain sequence.
  • the first time domain sequence may be based on -BPSK modulated time domain sequence or 8PSK modulated time domain sequence.
  • the first time domain sequence may also be other time domain sequences.
  • a DFT operation is performed on the 8PSK modulated time domain sequence to obtain a DMRS sequence with a length of 6, namely, the first DMRS sequence.
  • the length of the first DMRS sequence is a value other than 6, -Perform a DFT operation on the BPSK modulated time domain sequence to obtain a DMRS sequence of corresponding length, that is, the first DMRS sequence.
  • the length of the first DMRS sequence is greater than or equal to 30, -Perform a DFT operation on the BPSK-modulated time-domain gold sequence to obtain a DMRS sequence of corresponding length, that is, the first DMRS sequence.
  • the computer searches for - Perform DFT operation on the BPSK modulated time domain sequence to obtain a DMRS sequence of corresponding length, that is, a first DMRS sequence.
  • a DMRS sequence of corresponding length that is, a first DMRS sequence.
  • the first DMRS sequence is obtained after the DFT operation.
  • the length of the first DMRS sequence corresponds to the length of the total resource.
  • the terminal device can adjust the length of the total resource based on constraint #2, or determine the length of the first DMRS sequence based on constraint #3.
  • the first non-extension resource is described below.
  • the first non-extended resource includes K RBs, that is, the data to be transmitted occupies K RBs, or in other words, occupies K' REs.
  • K may be determined according to the above constraint #2, that is, the number of RBs in the first non-extended resource satisfies 2a * 3b * 5c .
  • K' may be determined according to the above constraint #3, that is, the number of REs in the first non-extended resource satisfies 2a * 3b * 5c .
  • the terminal device may adjust the length based on the allocated resources according to constraint #2 or constraint #3.
  • a, b and c are non-negative integers, and L is the number of RBs in the allocated resources.
  • K may also be other values.
  • the first total resource is described below.
  • the first DMRS sequence occupies J RBs, that is, the first total resources include J RBs.
  • the first DMRS sequence may occupy J RBs in a comb-like structure.
  • the constraint condition includes constraint condition #2, the number of RBs occupied by the first DMRS sequence, that is, the number of RBs in the first total resources satisfies 2 a *3 b *5 c .
  • the length of the first DMRS sequence satisfies 2 a *3 b *5 c .
  • J may be determined according to the above constraint #2 and the length of the total resources calculated based on the allocated resources and the expansion factor.
  • the terminal device may determine the length of the total resources based on constraint #2 and calculated based on the allocated resources and the extension factor.
  • J1 is the number of RBs in the third total resource (an example of the sixth resource), and the third total resource is calculated based on the allocated resources and the extension factor.
  • J1 is a positive number. J1 is obtained by calculation and may be an integer or a non-integer, which is not limited in the embodiment of the present application.
  • the expansion factor alpha is used to indicate the ratio of the expansion resources to the total resources.
  • J1 L/(1-alpha).
  • L is the number of RBs in the allocated resources.
  • J satisfies any of the following:
  • J' satisfies any of the following:
  • a, b and c are non-negative integers.
  • the terminal device may determine the number of RBs in the first total resources according to constraint condition #2 and the length of the total resources calculated based on the first non-extended resources and the extension factor.
  • the terminal device may determine the length of the first DMRS sequence according to constraint #3 and the length of the total resources calculated based on the first non-extended resources and the extension factor.
  • J2 is the number of RBs in the fourth total resource (an example of the seventh resource), and the fourth total resource is calculated based on the first non-extended resource and the extension factor.
  • J2 is a positive number. J2 is obtained by calculation and may be an integer or a non-integer. The embodiment of the present application does not limit this.
  • the expansion factor alpha is used to represent the ratio of the expansion resources to the total resources.
  • J2 K/(1-alpha)
  • J satisfies any of the following:
  • J' satisfies any of the following:
  • a, b and c are non-negative integers.
  • J may also be other values.
  • step 1040 may include: cyclically extending the to-be-transmitted data occupying K RBs into extended data occupying J RBs.
  • step 1040 or step 740 in the previous text please refer to the relevant description of step 1040 or step 740 in the previous text, which will not be repeated here.
  • the following describes a method for acquiring the first DMRS sequence.
  • step 1050 may include: generating a DMRS sequence occupying J RBs, that is, a first DMRS sequence.
  • the first DMRS sequence is obtained by performing an extension operation on the second DMRS sequence.
  • the second DMRS sequence is obtained by performing a DFT operation on the second time domain sequence.
  • the second time domain sequence may be based on -BPSK modulated time domain sequence or 8PSK modulated time domain sequence.
  • Example 4 mainly uses The second time domain sequence may be other time domain sequences.
  • a DFT operation is performed on the 8PSK modulated time domain sequence to obtain a DMRS sequence of length 6, ie, the second DMRS sequence.
  • a DMRS sequence of length 6 ie, the second DMRS sequence.
  • the length of the second DMRS sequence is a value other than 6, -Perform a DFT operation on the BPSK modulated time domain sequence to obtain a DMRS sequence of corresponding length, that is, a second DMRS sequence.
  • the length of the second DMRS sequence is greater than or equal to 30, -Perform a DFT operation on the BPSK-modulated time-domain gold sequence to obtain a DMRS sequence of corresponding length, that is, a second DMRS sequence.
  • the computer searches for - Perform DFT operation on the BPSK modulated time domain sequence to obtain a DMRS sequence of corresponding length, that is, a second DMRS sequence.
  • a DMRS sequence of corresponding length that is, a second DMRS sequence.
  • the second DMRS sequence is obtained after the DFT operation.
  • the terminal device can determine the resources occupied by the second DMRS sequence based on constraint condition #2, or determine the length of the second DMRS sequence based on constraint condition #3.
  • the first non-extension resource is described below.
  • the first non-extended resource includes K RBs, that is, the data to be transmitted occupies K RBs, or in other words, occupies K' REs.
  • K may be determined according to the above constraint #2, that is, the number of RBs in the first non-extended resource satisfies 2a * 3b * 5c .
  • K' may be determined according to the above constraint #3, and the number of REs in the first non-extended resource satisfies 2a * 3b * 5c .
  • K may be determined based on the above constraint #2 and the length of the allocated resources.
  • K' may be determined based on constraint #3 above and the length of the allocated resources.
  • a, b and c are non-negative integers, and L is the number of RBs in the allocated resources.
  • K may also be other values.
  • the first total resource is described below.
  • the terminal device can determine the length of the first total resource based on constraint condition 1#.
  • the first total resource includes J RBs.
  • J may be determined according to the above constraint #1 and the length of the total resources calculated based on the allocated resources and the expansion factor.
  • J1 is the number of RBs in the third total resource (an example of the sixth resource), and the third total resource is calculated based on the allocated resources and the extension factor.
  • the expansion factor alpha is used to indicate the ratio of the expansion resources to the total resources.
  • J1 L/(1-alpha).
  • L is the number of RBs in the allocated resources.
  • J satisfies any of the following conditions:
  • J is the smallest integer greater than or equal to J1, or
  • J is the integer closest to J1.
  • J may be determined according to the above constraint #1 and the length of the total resources calculated based on the first non-extended resources and the extension factor.
  • J2 is the number of RBs in the fourth total resource (an example of the seventh resource), and the fourth total resource is calculated based on the first non-extended resource and the extension factor.
  • the expansion factor alpha is used to indicate the ratio of the expansion resources to the total resources.
  • J2 K/(1-alpha).
  • J satisfies any of the following conditions:
  • J is the smallest integer greater than or equal to J2, or
  • J is the integer closest to J2.
  • J may also be other values.
  • the second DMRS sequence is described below.
  • the second DMRS sequence is obtained after the DFT operation.
  • the terminal device can adjust the length of the resources occupied by the second DMRS sequence based on constraint #2, so that the length of the resources occupied by the second DMRS sequence satisfies constraint #2.
  • the terminal device can adjust the length of the second DMRS sequence based on constraint #3, so that the length of the second DMRS sequence satisfies constraint #3.
  • the second DMRS sequence occupies D RBs.
  • the second DMRS sequence may occupy D RBs in a comb structure.
  • the length of the second DMRS sequence is D*6.
  • the length of the second DMRS sequence is D', that is, the second DMRS sequence occupies D'/6 RBs.
  • the constraint condition includes constraint condition #2
  • the number of RBs occupied by the second DMRS sequence that is, the number of RBs in the second total resources satisfies 2 a *3 b *5 c .
  • the length of the second DMRS sequence satisfies 2 a *3 b *5 c .
  • D K. That is, the length of the second DMRS sequence corresponds to the length of the first non-extended resource, which can reduce the amount of calculation.
  • D may be determined based on the above constraint #2 and the length of the allocated resources.
  • D satisfies any of the following:
  • a, b and c are non-negative integers, and L is the number of RBs in the allocated resources.
  • D' may be determined based on constraint #3 above and the length of the allocated resources.
  • D' satisfies any of the following:
  • a, b and c are non-negative integers, and L is the number of RBs in the allocated resources.
  • step 1040 may include: cyclically extending the to-be-transmitted data occupying K RBs into extended data occupying J RBs.
  • step 1040 or step 740 in the previous text please refer to the relevant description of step 1040 or step 740 in the previous text, which will not be repeated here.
  • the following describes a method for acquiring the first DMRS sequence.
  • step 1050 may include: generating a DMRS sequence occupying D RBs, that is, a second DMRS sequence; and cyclically extending the second DMRS sequence into a DMRS sequence occupying J RBs, that is, the first DMRS sequence.
  • step 1050 may include: generating a DMRS sequence with a length of D’, i.e., a second DMRS sequence; and cyclically extending the second DMRS sequence to a DMRS sequence occupying J RBs, i.e., the first DMRS sequence.
  • Step 1050 includes: generating a second DMRS sequence; and extending based on the second DMRS sequence to obtain a first DMRS sequence, wherein the first DMRS sequence includes the second DMRS sequence.
  • performing extension based on the second DMRS sequence to obtain the first DMRS sequence includes: performing cyclic extension based on the second DMRS sequence to obtain the first DMRS sequence.
  • the first DMRS sequence is obtained by performing an expansion operation on the second DMRS sequence.
  • the first DMRS sequence is obtained by performing an expansion operation on the second DMRS sequence.
  • the second DMRS sequence may be a ZC sequence or a first frequency domain sequence.
  • the first frequency domain sequence may be a frequency domain sequence obtained without undergoing a DFT operation, or may be a frequency domain sequence obtained by undergoing a DFT operation on a time domain sequence.
  • the first frequency domain sequence may be a frequency domain sequence modulated by QSPK, and the generation process of the frequency domain sequence does not include a DFT operation.
  • the first frequency domain sequence may be a frequency domain sequence obtained by performing a DFT operation on a time domain sequence modulated by ⁇ /2-BPSK.
  • the ZC sequence or the frequency domain sequence modulated by QPSK is mainly used as an example for explanation, and does not constitute a limitation on the solution of the embodiment of the present application.
  • a ZC sequence with a length of 31 is generated, that is, the second DMRS sequence.
  • the first non-extension resource is described below.
  • the first non-extended resource includes K RBs, that is, the data to be transmitted occupies K RBs, or in other words, occupies K' REs.
  • K may be determined according to the above constraint #2, that is, the number of RBs in the first non-extended resource satisfies 2a * 3b * 5c .
  • K' may be determined according to the above constraint #3, that is, the number of REs in the first non-extended resource satisfies 2a * 3b * 5c .
  • K may be determined based on the above constraint #2 and the length of the allocated resources.
  • K' can be determined based on the above constraint #3 and the length of the allocated resources.
  • a, b and c are non-negative integers, and L is the number of RBs in the allocated resources.
  • K may also be other values.
  • the first total resource is described below.
  • the terminal device can determine the length of the first total resource based on constraint condition 1#.
  • the first total resource includes J RBs.
  • J may be determined according to the above constraint #1 and the length of the total resources calculated based on the allocated resources and the expansion factor.
  • J1 is the number of RBs in the third total resource (an example of the sixth resource), and the third total resource is calculated based on the allocated resources and the extension factor.
  • the expansion factor alpha is used to indicate the ratio of the expansion resources to the total resources.
  • J1 L/(1-alpha).
  • L is the number of RBs in the allocated resources.
  • J satisfies any of the following conditions:
  • J is the smallest integer greater than or equal to J1, or
  • J is the integer closest to J1.
  • J may be determined according to the above constraint #1 and the length of the total resources calculated based on the first non-extended resources and the extension factor.
  • J2 is the number of RBs in the fourth total resource (an example of the seventh resource), and the fourth total resource is calculated based on the first non-extended resource and the extension factor.
  • the expansion factor alpha is used to indicate the ratio of the expansion resources to the total resources.
  • J2 K/(1-alpha).
  • J satisfies any of the following conditions:
  • J is the smallest integer greater than or equal to J2, or
  • J is the integer closest to J2.
  • J may also be other values.
  • the second DMRS sequence is described below.
  • the second DMRS sequence occupies D RBs, that is, the length of the second DMRS sequence is D*6.
  • the length of the second DMRS sequence is D’, that is, the second DMRS sequence occupies D’/6 RBs.
  • D' satisfies any of the following:
  • D’ is the smallest prime number greater than or equal to L*6;
  • L is the number of RBs in the allocated resources.
  • D' satisfies any of the following:
  • D’ is the smallest prime number greater than or equal to K*6;
  • step 1040 may include: cyclically extending the to-be-transmitted data occupying K RBs into extended data occupying J RBs.
  • step 1040 or step 740 in the previous text please refer to the relevant description of step 1040 or step 740 in the previous text, which will not be repeated here.
  • the following describes a method for acquiring the first DMRS sequence.
  • step 1050 may include: generating a DMRS sequence occupying D RBs, that is, a second DMRS sequence; and cyclically extending the second DMRS sequence into a DMRS sequence occupying J RBs, that is, the first DMRS sequence.
  • a frequency domain sequence of QPSK modulation occupying D RBs ie, a second DMRS sequence, is generated.
  • step 1050 may include: generating a DMRS sequence with a length of D’, i.e., a second DMRS sequence; and cyclically extending the second DMRS sequence to a DMRS sequence occupying J RBs, i.e., the first DMRS sequence.
  • a ZC sequence with a length of D’ is generated, that is, the second DMRS sequence.
  • indication includes direct indication (also called explicit indication) and implicit indication.
  • direct indication of information A means including the information A;
  • implicit indication of information A means indicating information A through the correspondence between information A and information B and direct indication of information B.
  • the correspondence between information A and information B can be predefined, pre-stored, pre-burned, or pre-configured.
  • information C is used to determine information D, which includes information D being determined based only on information C, and information D being determined based on information C and other information.
  • information C is used to determine information D, and it can also be indirectly determined, for example, information D is determined based on information E, and information E is determined based on information C.
  • the methods and operations implemented by the device can also be implemented by components (such as chips or circuits) of the device.
  • the embodiments of the present application also provide corresponding devices, which include modules for executing the corresponding methods in the above-mentioned method embodiments.
  • the module can be software, hardware, or a combination of software and hardware. It can be understood that the technical features described in the above-mentioned method embodiments are also applicable to the following device embodiments.
  • FIG11 is a schematic diagram of a communication device 1700 provided in an embodiment of the present application.
  • the device 1700 includes a transceiver unit 1710 and a processing unit 1720.
  • the transceiver unit 1710 can be used to implement corresponding communication functions.
  • the transceiver unit 1710 can also be called a communication interface or a communication unit, etc.
  • the processing unit 1720 can be used to implement corresponding processing functions, such as configuring resources.
  • the processing unit 1720 can also be called a processor, etc.
  • the device 1700 also includes a storage unit, which can be used to store instructions and/or data, and the processing unit 1720 can read the instructions and/or data in the storage unit so that the device implements the actions of the device or network element in the aforementioned method embodiments.
  • a storage unit which can be used to store instructions and/or data
  • the processing unit 1720 can read the instructions and/or data in the storage unit so that the device implements the actions of the device or network element in the aforementioned method embodiments.
  • the communication device 1700 can be a terminal device, or a communication device applied to a terminal device or used in combination with a terminal device to implement a communication method executed on the terminal device side; or, the communication device 1700 can be a network device, or a communication device applied to a network device or used in combination with a network device to implement a communication method executed on the network device side.
  • the device 1700 can implement the steps or processes performed by the terminal device in the above method embodiment.
  • the transceiver unit 1710 can be used to perform the operations related to the transceiver of the terminal device in the above method embodiment
  • the processing unit 1720 can be used to perform the operations related to the processing of the terminal device in the above method embodiment.
  • the device 1700 can implement steps or processes corresponding to those performed by the network device in the above method embodiment, wherein the transceiver unit 1710 can be used to perform transceiver-related operations of the network device in the above method embodiment, and the processing unit 1720 can be used to perform processing-related operations of the network device in the above method embodiment.
  • the device 1700 here is embodied in the form of a functional unit.
  • the term "unit” here may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (such as a shared processor, a dedicated processor or a group processor, etc.) and a memory for executing one or more software or firmware programs, a merged logic circuit and/or other suitable components that support the described functions.
  • ASIC application specific integrated circuit
  • processor such as a shared processor, a dedicated processor or a group processor, etc.
  • memory for executing one or more software or firmware programs, a merged logic circuit and/or other suitable components that support the described functions.
  • the device 1700 can be specifically a terminal device in the above-mentioned embodiment, and can be used to execute the various processes and/or steps corresponding to the terminal device in the above-mentioned method embodiments; or, the device 1700 can be specifically a network device in the above-mentioned embodiment, and can be used to execute the various processes and/or steps corresponding to the network device in the above-mentioned method embodiments. To avoid repetition, it will not be repeated here.
  • the apparatus 1700 of each of the above-mentioned schemes has the function of implementing the corresponding steps performed by the device (such as a terminal device, or a network device) in the above-mentioned method.
  • the function can be implemented by hardware, or by hardware executing the corresponding software implementation.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions; for example, the transceiver unit can be replaced by a transceiver (for example, the sending unit in the transceiver unit can be replaced by a transmitter, and the receiving unit in the transceiver unit can be replaced by a receiver), and other units, such as the processing unit, can be replaced by a processor, respectively performing the sending and receiving operations and related processing operations in each method embodiment.
  • transceiver unit 1710 can also be a transceiver circuit (for example, can include a receiving circuit and a sending circuit), and the processing unit can be a processing circuit.
  • the device in FIG. 11 may be a network element or device in the aforementioned embodiment, or may be a chip or a chip system, such as a system on chip (SoC).
  • the transceiver unit may be an input and output circuit or a communication interface; the processing unit may be a processor or a microprocessor or an integrated circuit integrated on the chip. This is not limited here.
  • FIG12 is a schematic diagram of another communication device 1800 provided in an embodiment of the present application.
  • the device 1800 includes a processor 1810, and the processor 1810 is used to execute a computer program or instruction stored in a memory 1820, or read data/signaling stored in the memory 1820 to execute the method in each method embodiment above.
  • processors 1810 there are one or more processors 1810.
  • the device 1800 further includes a memory 1820, and the memory 1820 is used to store computer programs or instructions and/or data.
  • the memory 1820 may be integrated with the processor 1810, or may be separately arranged.
  • the memory 1820 is one or more.
  • the device 1800 further includes a transceiver 1830, and the transceiver 1830 is used for receiving and/or sending signals.
  • the processor 1810 is used to control the transceiver 1830 to receive and/or send signals.
  • the communication device 1800 can be applied to a terminal device.
  • the communication device 1800 can be a terminal device, or a device that can support a terminal device and implement the functions of the terminal device in any of the above examples.
  • the device 1800 is used to implement the operations performed by the terminal device in the above various method embodiments.
  • the processor 1810 is used to execute the computer program or instructions stored in the memory 1820 to implement the relevant operations of the terminal device in the above various method embodiments.
  • the communication device 1800 can be applied to a network device.
  • the communication device 1800 can be a network device, or a device that can support a network device and implement the functions of the network device in any of the above examples.
  • the device 1800 is used to implement the operations performed by the network device in the above various method embodiments.
  • the processor 1810 is used to execute the computer program or instructions stored in the memory 1820 to implement the relevant operations of the network device in the above various method embodiments.
  • processors mentioned in the embodiments of the present application may be a central processing unit (CPU), or other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (ASIC), field programmable gate arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • DSP digital signal processors
  • ASIC application-specific integrated circuits
  • FPGA field programmable gate arrays
  • a general-purpose processor may be a microprocessor or the processor may also be any conventional processor, etc.
  • the memory mentioned in the embodiments of the present application may be a volatile memory and/or a non-volatile memory.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
  • the volatile memory may be a random access memory (RAM).
  • a RAM may be used as an external cache.
  • RAM includes the following forms: static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronous link DRAM (SLDRAM), and direct rambus RAM (DR RAM).
  • SRAM static RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDR SDRAM double data rate SDRAM
  • ESDRAM enhanced SDRAM
  • SLDRAM synchronous link DRAM
  • DR RAM direct rambus RAM
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, the memory (storage module) can be integrated into the processor.
  • memory described herein is intended to include, but is not limited to, these and any other suitable types of memory.
  • An embodiment of the present application also provides a computer-readable storage medium on which computer instructions for implementing the methods executed by the communication device in the above-mentioned method embodiments are stored.
  • the computer when the computer program is executed by a computer, the computer can implement the method executed by the terminal device in each embodiment of the above method.
  • the computer when the computer program is executed by a computer, the computer can implement the method performed by the network device in each embodiment of the above method.
  • An embodiment of the present application also provides a computer program product, comprising instructions, which, when executed by a computer, implement the methods performed by a device (such as a terminal device or a network device) in the above-mentioned method embodiments.
  • a device such as a terminal device or a network device
  • the embodiment of the present application further provides a communication system, including the aforementioned terminal device and network device.
  • the terminal device and the network device can implement the communication method shown in any example in the aforementioned FIG. 7 , FIG. 9 or FIG. 10 .
  • the system also includes a device for communicating with the above-mentioned terminal device and/or network device.
  • the disclosed devices and methods can be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a logical function division. There may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.
  • the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer can be a personal computer, a server, or a network device, etc.
  • the computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
  • the computer-readable storage medium can be any available medium that a computer can access or a data storage device such as a server or data center that contains one or more available media integrations.
  • the available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a solid state disk (SSD)).
  • the available medium includes, but is not limited to, a USB flash drive, a mobile hard disk, a read-only memory (ROM), a random access memory (RRAM), or a memory card. memory, RAM), disks, or optical disks, etc., which can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供了一种通信的方法和通信装置,该方法包括:根据网络设备分配的第一资源和扩展因子确定第三资源,扩展因子用于指示频谱扩展的比例;基于第三资源与网络设备进行通信,第三资源为频谱扩展后的总资源,第三资源包括第二资源,第二资源上承载第一数据,第二资源包括K个资源块RB,K为满足K=2a*3b*5c的整数,或者,第二资源包括K'个资源单元RE,K'为满足K'=2a*3b*5c的整数,a,b和c为非负整数。本申请实施例的方案能够提高设备的处理性能,使得设备能够通过频谱扩展的方式提高通信链路的覆盖能力。

Description

一种通信的方法和通信装置
本申请要求在2022年11月06日提交中国国家知识产权局、申请号为202211381137.7的中国专利申请的优先权,发明名称为“一种通信的方法和通信装置”的中国专利申请的优先权,在2023年01月16日提交中国国家知识产权局、申请号为202310086024.2的中国专利申请的优先权,发明名称为“一种通信的方法和通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及通信领域,更具体地,涉及一种通信的方法和通信装置。
背景技术
在通信系统中,频谱扩展的方式能够有效降低信号的峰值平均功率比(peak to average power ratio,PAPR),进而提高通信链路的覆盖能力。终端设备基于网络设备分配的资源来进行频谱扩展,在非扩展资源上承载待传输的数据,在扩展资源上承载扩展数据。网络设备可以发送指示信息以指示终端设备对已分配资源的使用。相关方案中包括两种资源配置方式。第一种配置方式为网络设备指示扩展后的资源和扩展资源相对总资源的比例,第二种配置方式为网络设备指示非扩展资源和扩展资源相对总资源的比例。上述两种资源配置方式均可以指示终端设备确定扩展资源以及非扩展资源等。
然而,终端设备基于上述配置方式确定的资源使用方式可能会与相关操作的要求发生冲突,影响终端设备的性能,这阻碍了频谱扩展的使用。
发明内容
本申请实施例提供一种通信的方法和通信装置,提高了终端设备的性能,使得终端设备能够通过频谱扩展的方式提高通信链路的覆盖能力。
第一方面,提供了一种通信的方法,该方法可以由终端设备执行,也可以由配置于终端设备中的芯片或电路执行,本申请不作限定。
该方法包括:接收来自网络设备的第一指示信息,第一指示信息指示网络设备分配的第一资源;根据第一资源和扩展因子确定第二资源,扩展因子用于指示频谱扩展的比例,第二资源包括K个资源块RB,K为满足K=2a*3b*5c的整数,或者,第二资源包括K’个资源单元(resource element,RE),K’为满足K’=2a*3b*5c的整数,a,b和c为非负整数;基于第三资源与网络设备进行通信,第三资源为频谱扩展后的总资源,第一资源包括第三资源,第三资源包括第二资源,第二资源上承载待传输的第一数据。
示例性地,待传输的第一数据可以是经过离散傅里叶变换(discrete fourier transform,DFT)操作得到的。
第一资源可以为网络设备指示的总资源。
根据本申请实施例的方案,第二资源承载的数据可以是经过DFT操作得到的,DFT操作可以是基于快速傅立叶变换(fast fourier transformation,FFT)的快速算法实现的,其基为2,3或5中的至少一项,对于满足2a*3b*5c条件的待传输数据终端设备可以基于上述DFT操作实现高效的转换,提高数据处理效率,即提高终端设备的处理性能,从而有利于保证终端设备通过频谱扩展的方式实现数据传输,降低信号的PAPR,以增强通信链路的覆盖能力。
此外,在K=2a*3b*5c的情况下,K的值满足协议的要求,这样可以避免与协议发生冲突,同时,减少信令开销。
结合第一方面,在第一方面的某些实现方式中,基于第一数据进行扩展,以得到第二数据,第二数据包括第一数据,第三资源上承载第二数据。
结合第一方面,在第一方面的某些实现方式中,扩展因子用于指示扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,1/3,1/4,1/5,1/6,1/7,1/8,3/8,1/9或1/10。
结合第一方面,在第一方面的某些实现方式中,扩展因子用于指示扩展资源的长度与非扩展资源的 长度之间的比值,扩展因子的取值包括:1,1/2,1/3,1/4,1/5,1/6,1/7,3/5,1/8或1/9。
结合第一方面,在第一方面的某些实现方式中,扩展因子用于指示非扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,2/3,3/4,4/5,5/6,6/7,7/8,5/8,8/9或9/10。
终端设备通过频谱扩展的方式实现数据传输,能够降低信号的PAPR。然而,频谱扩展的方式会占用额外的频谱,从而导致数据传输速率的损失。上述扩展因子能够以较小的资源开销实现较好的波形PAPR性能提升,即在占用较少的额外的频谱资源的同时,降低信号的PAPR,以增强通信链路的覆盖能力。
结合第一方面,在第一方面的某些实现方式中,K满足以下任一项:
K为满足K=2a*3b*5c的整数中小于或等于K1的最大整数;
K为满足K=2a*3b*5c的整数中距离K1最近的整数;
K为满足K=2a*3b*5c的整数中小于或等于K2的最大整数;或者
K为满足K=2a*3b*5c的整数中距离K2最近的整数;或者
K’满足以下任一项:
K’为满足K’=2a*3b*5c的整数中距离K1*12最近的整数;
K’为满足K’=2a*3b*5c的整数中小于或等于K1*12的最大整数;
K’为满足K’=2a*3b*5c的整数中小于或等于K2*12的最大整数;或者
K’为满足K’=2a*3b*5c的整数中距离K2*12最近的整数;
其中,a,b和c为非负整数,K1为第四资源中的RB的数量,第四资源是基于第一资源和扩展因子计算得到的,K2为第五资源中的RB的数量,第五资源是基于第三资源和扩展因子计算得到的,K1为正数,K2为正数。
这样,第二资源的长度能够在满足2a*3b*5c要求的同时,尽可能接近网络设备指示的非扩展资源的长度,有利于提高传输性能。
结合第一方面,在第一方面的某些实现方式中,扩展因子alpha用于表示扩展资源相对总资源的比例,K1=L*(1-alpha),L为分配资源中的RB的数量,L为正数。
结合第一方面,在第一方面的某些实现方式中,扩展因子alpha用于表示扩展资源相对总资源的比例,K2=J*(1-alpha),J为第三资源中的RB的数量,J为正数。
结合第一方面,在第一方面的某些实现方式中,方法还包括:生成第一DMRS序列,第一DMRS序列为第一时域序列经过DFT操作得到的,第一DMRS序列占用J个RB,J为满足J=2a*3b*5c的整数中小于或等于L的最大整数;或者第一DMRS序列的长度为J’,J’为满足J’=2a*3b*5c的整数中小于或等于L*6的最大整数;其中,a,b和c为非负整数,L为第一资源中的RB的数量,L为正数。
示例性地,在J=1或J’=6的情况下,第一时域序列可以为基于8移相键控调制的时域序列。
示例性地,在J为除1以外的其他值或J’为除6以外的其他值的情况下,第一时域序列可以为基于π/2二进制相移键控BPSK调制的时域序列。
结合第一方面,在第一方面的某些实现方式中,方法还包括:生成第一DMRS序列,第一DMRS序列占用J个RB,或者,第一DMRS序列的长度为J’;在J=1或J’=6的情况下,第一DMRS序列是基于8移相键控调制的时域序列经过DFT操作得到的;在J为除1以外的其他值或J’为除6以外的其他值的情况下,第一DMRS序列是基于π/2二进制相移键控BPSK调制的时域序列经过DFT操作得到的;J为满足J=2a*3b*5c的整数中小于或等于L的最大整数;或者J’为满足J’=2a*3b*5c的整数中小于或等于L*6的最大整数;其中,a,b和c为非负整数,L为第一资源中的RB的数量,L为正数。
这样,第一DMRS序列的长度能够满足2a*3b*5c要求,对于满足2a*3b*5c要求的第一DMRS序列,终端设备可以基于FFT的快速算法实现DFT操作,其基可以为2,3或5中的至少一项,这样可以实现高效的转换,提高数据处理效率,即提高终端设备的处理性能,从而有利于保证终端设备通过频谱扩展的方式实现数据传输,进一步降低信号的PAPR,以增强通信链路的覆盖能力。而且,第一DMRS序列长度能够在满足2a*3b*5c要求的同时,尽可能使得其占用的资源的长度接近于网络设备指示的第一资源的长度,有利于提高传输性能。
此外,在J=2a*3b*5c的情况下,J的值满足协议的要求,这样可以避免与协议发生冲突,同时,减少信令开销。
结合第一方面,在第一方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二 DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列为第二时域序列经过DFT操作得到的,第二DMRS序列占用D个RB;D满足以下任一项:
D=K;
D为满足D=2a*3b*5c的整数中小于或等于K1的最大整数;或者
D为满足D=2a*3b*5c的整数中距离K1最近的整数;
其中,a,b和c为非负整数,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的。
示例性地,在D=1的情况下,第二时域序列可以为基于8移相键控调制的时域序列。
示例性地,在D为除1以外的其他值的情况下,第二时域序列可以是基于π/2二进制相移键控调制的时域序列。
结合第一方面,在第一方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列占用D个RB;在D=1的情况下,第二DMRS序列是基于8移相键控调制的时域序列经过DFT操作得到的;在D为除1以外的其他值的情况下,第二DMRS序列是基于π/2二进制相移键控调制的时域序列经过DFT操作得到的;D满足以下任一项:
D=K;
D为满足D=2a*3b*5c的整数中小于或等于K1的最大整数;或者
D为满足D=2a*3b*5c的整数中距离K1最近的整数;
其中,a,b和c为非负整数,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的。
这样,第二DMRS序列的长度能够满足2a*3b*5c要求,对于满足2a*3b*5c要求的第二DMRS序列,终端设备可以基于FFT的快速算法实现DFT操作,其基可以为2,3或5中的至少一项,这样可以实现高效的转换,提高数据处理效率,即提高终端设备的处理性能,从而有利于保证终端设备通过频谱扩展的方式实现数据传输,进一步降低信号的PAPR,以增强通信链路的覆盖能力。同时,在D=2a*3b*5c的情况下,D的值满足协议的要求,这样可以避免与协议发生冲突,同时,减少信令开销。
而且,第二DMRS序列的长度能够在满足2a*3b*5c要求的同时,使得其占用的资源的长度尽可能接近网络设备指示的非扩展资源的长度,有利于提高传输性能。
结合第一方面,在第一方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列,第二DMRS序列为第二时域序列经过DFT操作得到的;第二DMRS序列的长度D’满足以下任一项:
D’为满足D’=2a*3b*5c的整数中小于或等于K1*6的最大整数;或者
D’为满足D’=2a*3b*5c的整数中距离K1*6最近的整数;
其中,a,b和c为非负整数,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的。
示例性地,在第二DMRS序列的长度D’为6的情况下,第二时域序列可以为基于8移相键控调制的时域序列。
示例性地,在D’为除6以外的其他值的情况下,第二时域序列可以是基于π/2二进制相移键控调制的时域序列。
结合第一方面,在第一方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列;在第二DMRS序列的长度D’为6的情况下,第二DMRS序列是基于8移相键控调制的时域序列经过DFT操作得到的;在D’为除6以外的其他值的情况下,第二DMRS序列是基于π/2二进制相移键控调制的时域序列经过DFT操作得到的;D’满足以下任一项:
D’为满足D’=2a*3b*5c的整数中小于或等于K1*6的最大整数;或者
D’为满足D’=2a*3b*5c的整数中距离K1*6最近的整数;
其中,a,b和c为非负整数,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的。
这样,第二DMRS序列的长度能够满足2a*3b*5c要求,对于满足2a*3b*5c要求的第二DMRS序列, 终端设备可以基于FFT的快速算法实现DFT操作,其基可以为2,3或5中的至少一项,这样可以实现高效的转换,提高数据处理效率,即提高终端设备的处理性能,从而有利于保证终端设备通过频谱扩展的方式实现数据传输,进一步降低信号的PAPR,以增强通信链路的覆盖能力。
同时,第二DMRS序列的长度能够在满足2a*3b*5c要求的同时,使得其占用的资源的长度尽可能接近网络设备指示的非扩展资源的长度,有利于提高传输性能。
结合第一方面,在第一方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列,在K1≥5的情况下,第二DMRS序列为ZC序列,第二DMRS序列的长度D’为大于或等于K1*6的最小素数,其中,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的。
结合第一方面,在第一方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列占用D个RB,在K1<5的情况下,第二DMRS序列为第一频域序列,且D满足以下任一项:
D=K;
D为小于K1的最大整数;或者
D为距离K1最近的整数;
其中,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的。
示例性地,第一频域序列可以为未经过DFT操作得到的频域序列,或者也可以是由时域序列经过DFT操作得到的频域序列。
例如,第一频域序列可以为QSPK调制的频域序列,该频域序列的生成过程不包括DFT操作。或者,第一频域序列可以为π/2-BPSK调制的时域序列经过DFT操作后得到的频域序列。
结合第一方面,在第一方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列占用D个RB,在K1<5的情况下,第二DMRS序列为四相相移键控QPSK调制的频域序列,且D满足以下任一项:
D=K;
D为小于K1的最大整数;或者
D为距离K1最近的整数;
其中,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的。
第二方面,提供了一种通信的方法,该方法可以由终端设备执行,也可以由配置于终端设备中的芯片或电路执行,本申请不作限定。
该方法包括:接收来自网络设备的第一指示信息,第一指示信息指示网络设备分配的第一资源,第一资源为用于承载待传输的第一数据的资源;根据第一资源和扩展因子确定第三资源,扩展因子用于指示频谱扩展的比例;基于第三资源与网络设备进行通信,第三资源为频谱扩展后的总资源,第三资源包括第二资源,第二资源上承载第一数据,第二资源包括K个资源块RB,K为满足K=2a*3b*5c的整数,或者,第二资源包括K’个资源单元RE,K’为满足K’=2a*3b*5c的整数,a,b和c为非负整数。
根据本申请实施例的方案,第二资源承载的数据可以是经过DFT操作得到的,DFT操作可以是基于FFT的快速算法实现的,其基为2,3或5中的至少一项,对于满足2a*3b*5c条件的待传输数据终端设备可以基于上述DFT操作实现高效的转换,提高数据处理效率,即提高终端设备的处理性能,从而有利于保证终端设备通过频谱扩展的方式实现数据传输,降低信号的PAPR,以增强通信链路的覆盖能力。
此外,在K=2a*3b*5c的情况下,K的值满足协议的要求,这样可以避免与协议发生冲突,同时,减少信令开销。
结合第二方面,在第二方面的某些实现方式中,基于第一数据进行扩展,以得到第二数据,第二数据包括第一数据,第三资源上承载第二数据。
结合第二方面,在第二方面的某些实现方式中,扩展因子用于指示扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,1/3,1/4,1/5,1/6,1/7,1/8,3/8,1/9或1/10。
结合第二方面,在第二方面的某些实现方式中,扩展因子用于指示扩展资源的长度与非扩展资源的长度之间的比值,扩展因子的取值包括:1,1/2,1/3,1/4,1/5,1/6,1/7,3/5,1/8或1/9。
结合第二方面,在第二方面的某些实现方式中,扩展因子用于指示非扩展资源的长度与频谱扩展后 的总资源的长度之间的比值,扩展因子的取值包括:1/2,2/3,3/4,4/5,5/6,6/7,7/8,5/8,8/9或9/10。
结合第二方面,在第二方面的某些实现方式中,K为满足K=2a*3b*5c的整数中小于或等于L的最大整数,或者,K’为满足K’=2a*3b*5c的整数中小于或等于L*12的最大整数,其中,a,b和c为非负整数,L为第一资源中的RB的数量,L为正数。
这样,第二资源的长度能够在满足2a*3b*5c要求的同时,尽可能接近网络设备分配的非扩展资源(即第一资源)的长度,有利于提高传输性能。
结合第二方面,在第二方面的某些实现方式中,方法还包括:生成第一DMRS序列,第一DMRS序列是第一时域序列经过DFT操作得到的,
第一DMRS序列占用J个RB,J满足以下任一项:
J为满足J=2a*3b*5c的整数中大于或等于J1的最小整数;
J为满足J=2a*3b*5c的整数中距离J1最近的整数;
J为满足J=2a*3b*5c的整数中大于或等于J2的最小整数;或者
J为满足J=2a*3b*5c的整数中距离J2最近的整数;或者
第一DMRS序列的长度为J’,J’满足以下任一项:
J’为满足J’=2a*3b*5c的整数中大于或等于J1*6的最小整数;
J’为满足J’=2a*3b*5c的整数中距离J1*6最近的整数;
J’为满足J’=2a*3b*5c的整数中大于或等于J2*6的最小整数;或者
J’为满足J’=2a*3b*5c的整数中距离J2*6最近的整数;
其中,a,b和c为非负整数,J1为第六资源中的RB的数量,J1为正数,第六资源基于第一资源和扩展因子计算得到,J2为第七资源中的RB的数量,J2为正数,第七资源基于第二资源和扩展因子计算得到。
示例性地,在J=1或J’=6的情况下,第一时域序列可以是基于8移相键控调制的时域序列。
示例性地,在J为除1以外的其他值或者J’为除6以外其他值的情况下,第一时域序列可以是基于π/2二进制相移键控调制的时域序列。
结合第二方面,在第二方面的某些实现方式中,方法还包括:生成第一DMRS序列,第一DMRS序列占用J个RB,或者,第一DMRS序列的长度为J’;在J=1或J’=6的情况下,第一DMRS序列是基于8移相键控调制的时域序列经过DFT操作得到的;在J为除1以外的其他值或者J’为除6以外其他值的情况下,第一DMRS序列是基于π/2二进制相移键控调制的时域序列经过DFT操作得到的;
J满足以下任一项:
J为满足J=2a*3b*5c的整数中大于或等于J1的最小整数;
J为满足J=2a*3b*5c的整数中距离J1最近的整数;
J为满足J=2a*3b*5c的整数中大于或等于J2的最小整数;或者
J为满足J=2a*3b*5c的整数中距离J2最近的整数;或者
J’满足以下任一项:
J’为满足J’=2a*3b*5c的整数中大于或等于J1*6的最小整数;
J’为满足J’=2a*3b*5c的整数中距离J1*6最近的整数;
J’为满足J’=2a*3b*5c的整数中大于或等于J2*6的最小整数;或者
J’为满足J’=2a*3b*5c的整数中距离J2*6最近的整数;
其中,a,b和c为非负整数,J1为第六资源中的RB的数量,J1为正数,第六资源基于第一资源和扩展因子计算得到,J2为第七资源中的RB的数量,J2为正数,第七资源基于第二资源和扩展因子计算得到。
这样,第一DMRS序列的长度能够满足2a*3b*5c要求,对于满足2a*3b*5c要求的第一DMRS序列,终端设备可以基于FFT的快速算法实现DFT操作,其基可以为2,3或5中的至少一项,这样可以实现高效的转换,提高数据处理效率,即提高终端设备的处理性能,从而有利于保证终端设备通过频谱扩展的方式实现数据传输,进一步降低信号的PAPR,以增强通信链路的覆盖能力。而且,第一DMRS序列长度能够在满足2a*3b*5c要求的同时,尽可能使得其占用的资源的长度接近于网络设备指示的总资源的长度,有利于提高传输性能。
此外,在J=2a*3b*5c的情况下,J的值满足协议的要求,这样可以避免与协议发生冲突,同时,减少信令开销。
结合第二方面,在第二方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列为第二时域序列经过DFT操作得到的,第二DMRS序列占用D个RB;D满足以下任一项:
D=K;
D为满足D=2a*3b*5c的整数中小于或等于L的最大整数;或者
D为满足D=2a*3b*5c的整数中距离L最近的整数;
a,b和c为非负整数,L为第一资源中的RB的数量,L为正数。
示例性地,在D=1的情况下,第二时域序列可以是基于8移相键控调制的时域序列。
示例性地,在D为除1以外的其他值的情况下,第二时域序列可以是基于π/2二进制相移键控调制的时域序列。
结合第二方面,在第二方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列占用D个RB;在D=1的情况下,第二DMRS序列是基于8移相键控调制的时域序列经过DFT操作得到的;在D为除1以外的其他值的情况下,第二DMRS序列是基于π/2二进制相移键控调制的时域序列经过DFT操作得到的;D满足以下任一项:
D=K;
D为满足D=2a*3b*5c的整数中小于或等于L的最大整数;或者
D为满足D=2a*3b*5c的整数中距离L最近的整数;
a,b和c为非负整数,L为第一资源中的RB的数量,L为正数。
这样,第二DMRS序列的长度能够满足2a*3b*5c要求,对于满足2a*3b*5c要求的第二DMRS序列,终端设备可以基于FFT的快速算法实现DFT操作,其基可以为2,3或5中的至少一项,这样可以实现高效的转换,提高数据处理效率,即提高终端设备的处理性能,从而有利于保证终端设备通过频谱扩展的方式实现数据传输,进一步降低信号的PAPR,以增强通信链路的覆盖能力。同时,在D=2a*3b*5c的情况下,D的值满足协议的要求,这样可以避免与协议发生冲突,同时,减少信令开销。
而且,第二DMRS序列的长度能够在满足2a*3b*5c要求的同时,使得其占用的资源的长度尽可能接近网络设备指示的非扩展资源(即第一资源)的长度,有利于提高传输性能。
结合第二方面,在第二方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列,第二DMRS序列为第二时域序列经过DFT操作得到的;第二DMRS序列的长度D’满足以下任一项:
D’为满足D’=2a*3b*5c的整数中小于或等于L*6的最大整数;或者
D’为满足D’=2a*3b*5c的整数中距离L*6最近的整数;
其中,a,b和c为非负整数,L为第一资源中的RB的数量,L为正数。
示例性地,在第二DMRS序列的长度D为6的情况下,第二时域序列可以是基于8移相键控调制的时域序列。
示例性地,在D’为除6以外的其他值的情况下,第二时域序列可以是基于π/2二进制相移键控调制的时域序列。
结合第二方面,在第二方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列;在第二DMRS序列的长度D为6的情况下,第二DMRS序列是基于8移相键控调制的时域序列经过DFT操作得到的;在D’为除6以外的其他值的情况下,第二DMRS序列是基于π/2二进制相移键控调制的时域序列经过DFT操作得到的;D’满足以下任一项:
D’为满足D’=2a*3b*5c的整数中小于或等于L*6的最大整数;或者
D’为满足D’=2a*3b*5c的整数中距离L*6最近的整数;
其中,a,b和c为非负整数,L为第一资源中的RB的数量,L为正数。
这样,第二DMRS序列的长度能够满足2a*3b*5c要求,对于满足2a*3b*5c要求的第二DMRS序列,终端设备可以基于FFT的快速算法实现DFT操作,其基可以为2,3或5中的至少一项,这样可以实现高 效的转换,提高数据处理效率,即提高终端设备的处理性能,从而有利于保证终端设备通过频谱扩展的方式实现数据传输,进一步降低信号的PAPR,以增强通信链路的覆盖能力。
同时,第二DMRS序列的长度能够在满足2a*3b*5c要求的同时,使得其占用的资源的长度尽可能接近网络设备分配的非扩展资源(即第一资源)的长度,有利于提高传输性能。
结合第二方面,在第二方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列的长度D’满足以下任一项:在L≥5的情况下,第二DMRS序列为ZC序列,且D’为大于或等于L*6的最小素数;或者在L<5的情况下,第二DMRS序列为第一频域序列,且D’=L*6;其中,L为第一资源中的RB的数量,L为正数。
示例性地,第一频域序列可以为未经过DFT操作得到的频域序列,或者也可以是由时域序列经过DFT操作得到的频域序列。
例如,第一频域序列可以为QSPK调制的频域序列,该频域序列的生成过程不包括DFT操作。或者,第一频域序列可以为π/2-BPSK调制的时域序列经过DFT操作后得到的频域序列。
结合第二方面,在第二方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列的长度D’满足以下任一项:在L≥5的情况下,第二DMRS序列为ZC序列,且D’为大于或等于L*6的最小素数;或者在L<5的情况下,第二DMRS序列为QPSK调制的频域序列,且D’=L*6;其中,L为第一资源中的RB的数量,L为正数。
结合第二方面,在第二方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列的长度为D’满足以下任一项:在K≥5的情况下,第二DMRS序列为ZC序列,且D’为大于或等于K*6的最小素数;或者在K<5的情况下,第二DMRS序列为第一频域序列,且D’=K*6。
示例性地,第一频域序列可以为未经过DFT操作得到的频域序列,或者也可以是由时域序列经过DFT操作得到的频域序列。
例如,第一频域序列可以为QSPK调制的频域序列,该频域序列的生成过程不包括DFT操作。或者,第一频域序列可以为π/2-BPSK调制的时域序列经过DFT操作后得到的频域序列。
结合第二方面,在第二方面的某些实现方式中,方法还包括:生成第二DMRS序列;基于第二DMRS序列进行循环扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列的长度为D’满足以下任一项:在K≥5的情况下,第二DMRS序列为ZC序列,且D’为大于或等于K*6的最小素数;或者在K<5的情况下,第二DMRS序列为QPSK调制的频域序列,且D’=K*6。
结合第二方面,在第二方面的某些实现方式中,第三资源包括J个RB,J满足以下任一条件:
J为大于或等于J1的最小整数,或者
J为距离J1最近的整数。
J1为第六资源中的RB的数量,第六资源基于第一资源和扩展因子计算得到。
结合第二方面,在第二方面的某些实现方式中,第三资源包括J个RB,J满足以下任一条件:
J为大于或等于J2的最小整数,或者
J为距离J2最近的整数,其中,J2为第七资源中的RB的数量,第七资源基于第二资源和扩展因子计算得到。
第三方面,提供了一种通信的方法,该方法可以由网络设备执行,也可以由配置于网络设备中的芯片或电路执行,本申请不作限定。
该方法包括:向终端设备发送第一指示信息,第一指示信息指示为终端设备分配的第一资源;基于第三资源与终端设备进行通信,第三资源为频谱扩展后的总资源,第一资源包括第三资源,第三资源包括第二资源,第二资源上承载待传输的第一数据,第二资源基于第一资源和扩展因子,扩展因子用于指示频谱扩展的比例,第二资源包括K个资源块RB,K为满足K=2a*3b*5c的整数,或者,第二资源包括K’个资源单元RE,K’为满足K’=2a*3b*5c的整数,a,b和c为非负整数。
结合第三方面,在第三方面的某些实现方式中,第三资源上承载第二数据,第二数据是基于第一数据进行扩展得到的,第二数据包括第一数据。
结合第三方面,在第三方面的某些实现方式中,扩展因子用于指示扩展资源的长度与频谱扩展后的 总资源的长度之间的比值,扩展因子的取值包括:1/2,1/3,1/4,1/5,1/6,1/7,1/8,3/8,1/9或1/10。
结合第三方面,在第三方面的某些实现方式中,扩展因子用于指示扩展资源的长度与非扩展资源的长度之间的比值,扩展因子的取值包括:1,1/2,1/3,1/4,1/5,1/6,1/7,3/5,1/8或1/9。
结合第三方面,在第三方面的某些实现方式中,扩展因子用于指示非扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,2/3,3/4,4/5,5/6,6/7,7/8,5/8,8/9或9/10。
结合第三方面,在第三方面的某些实现方式中,K满足以下任一项:
K为满足K=2a*3b*5c的整数中小于或等于K1的最大整数;
K为满足K=2a*3b*5c的整数中距离K1最近的整数;
K为满足K=2a*3b*5c的整数中小于或等于K2的最大整数;或者
K为满足K=2a*3b*5c的整数中距离K2最近的整数;或者
K’满足以下任一项:
K’为满足K’=2a*3b*5c的整数中距离K1*12最近的整数;
K’为满足K’=2a*3b*5c的整数中小于或等于K1*12的最大整数;
K’为满足K’=2a*3b*5c的整数中小于或等于K2*12的最大整数;或者
K’为满足K’=2a*3b*5c的整数中距离K2*12最近的整数;
其中,a,b和c为非负整数,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的,K2为第五资源中的RB的数量,第五资源是基于第三资源和扩展因子计算得到的,K2为正数。
结合第三方面,在第三方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是第一时域序列经过DFT操作得到的,第一DMRS序列占用J个RB,J为满足J=2a*3b*5c的整数中小于或等于L的最大整数;或者第一DMRS序列的长度为J’,J’为满足J’=2a*3b*5c的整数中小于或等于L*6的最大整数;其中,a,b和c为非负整数,L为第一资源中的RB的数量,L为正数。
结合第三方面,在第三方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列占用J个RB,或者,第一DMRS序列的长度为J’;在J=1或J’=6的情况下,第一DMRS序列是基于8移相键控调制的时域序列经过DFT操作得到的;在J为除1以外的其他值或J’为除6以外的其他值的情况下,第一DMRS序列是基于π/2二进制相移键控调制的时域序列经过DFT操作得到的;J为满足J=2a*3b*5c的整数中小于或等于L的最大整数;或者J’为满足J’=2a*3b*5c的整数中小于或等于L*6的最大整数;其中,a,b和c为非负整数,L为第一资源中的RB的数量,L为正数。
结合第三方面,在第三方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列是第二时域序列经过DFT操作得到的,第二DMRS序列占用D个RB,D满足以下任一项:
D=K,
D为满足D=2a*3b*5c的整数中小于或等于K1的最大整数;或者
D为满足D=2a*3b*5c的整数中距离K1最近的整数;
其中,a,b和c为非负整数,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的。
结合第三方面,在第三方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列占用D个RB;在D=1的情况下,第二DMRS序列是基于8移相键控调制的时域序列经过DFT操作得到的;在D为除1以外的其他值的情况下,第二DMRS序列是基于π/2二进制相移键控调制的时域序列经过DFT操作得到的;D满足以下任一项:
D=K,
D为满足D=2a*3b*5c的整数中小于或等于K1的最大整数;或者
D为满足D=2a*3b*5c的整数中距离K1最近的整数;
其中,a,b和c为非负整数,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的。
结合第三方面,在第三方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列,第二DMRS序列是第二时域序列经过DFT操作得到的;第二DMRS序列的长度D’满足以下任一项:D’为满足D’=2a*3b*5c的整数中小于或等于K1*6的最大整数;或者D’为满足D’=2a*3b*5c的整数中距离K1*6最近的整数;其中,a,b和c为非负整数,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的。
结合第三方面,在第三方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列;在第二DMRS序列的长度D’为6的情况下,第二DMRS序列是基于8移相键控调制的时域序列经过DFT操作得到的;在D’为除6以外的其他值的情况下,第二DMRS序列是基于π/2二进制相移键控调制的时域序列经过DFT操作得到的;D’满足以下任一项:D’为满足D’=2a*3b*5c的整数中小于或等于K1*6的最大整数;或者D’为满足D’=2a*3b*5c的整数中距离K1*6最近的整数;其中,a,b和c为非负整数,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的。
结合第三方面,在第三方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列,在K1≥5的情况下,第二DMRS序列为ZC序列,第二DMRS序列的长度D’为大于或等于K1*6的最小素数,其中,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的。
结合第三方面,在第三方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列占用D个RB,在K1<5的情况下,第二DMRS序列为第一频域序列,且D满足以下任一项:
D=K;
D为小于K1的最大整数;或者
D为距离K1最近的整数;
其中,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的。
结合第三方面,在第三方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列占用D个RB,在K1<5的情况下,第二DMRS序列为QPSK调制的频域序列,且D满足以下任一项:
D=K;
D为小于K1的最大整数;或者
D为距离K1最近的整数;
其中,K1为第四资源中的RB的数量,K1为正数,第四资源是基于第一资源和扩展因子计算得到的。
第四方面,提供了一种通信的方法,该方法可以由网络设备执行,也可以由配置于网络设备中的芯片或电路执行,本申请不作限定。
该方法包括:向终端设备发送第一指示信息,第一指示信息指示为终端设备分配的第一资源,第一资源为用于承载待传输的第一数据的资源;基于第三资源与终端设备进行通信,第三资源为频谱扩展后的总资源,第三资源包括第二资源,第二资源上承载待传输的第一数据,第三资源基于第一资源和扩展因子,扩展因子用于指示频谱扩展的比例,第二资源包括K个资源块RB,K为满足K=2a*3b*5c的整数,或者,第二资源包括K’个资源单元RE,K’为满足K’=2a*3b*5c的整数,a,b和c为非负整数。
结合第四方面,在第四方面的某些实现方式中,第三资源上承载第二数据,第二数据是基于第一数据进行扩展得到的,第二数据包括第一数据。
结合第四方面,在第四方面的某些实现方式中,扩展因子用于指示扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,1/3,1/4,1/5,1/6,1/7,1/8,3/8,1/9或1/10。
结合第四方面,在第四方面的某些实现方式中,扩展因子用于指示扩展资源的长度与非扩展资源的长度之间的比值,扩展因子的取值包括:1,1/2,1/3,1/4,1/5,1/6,1/7,3/5,1/8或1/9。
结合第四方面,在第四方面的某些实现方式中,扩展因子用于指示非扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,2/3,3/4,4/5,5/6,6/7,7/8,5/8,8/9或9/10。
结合第四方面,在第四方面的某些实现方式中,K为满足K=2a*3b*5c的整数中小于或等于L的最大整数;或者K’为满足K’=2a*3b*5c的整数中小于或等于L*12的最大整数,其中,a,b和c为非负整数,L为第一资源中的RB的数量,L为正数。
结合第四方面,在第四方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是第一时域序列经过DFT操作得到的,其中,
第一DMRS序列占用J个RB,J满足以下任一项:
J为满足J=2a*3b*5c的整数中大于或等于J1的最小整数;
J为满足J=2a*3b*5c的整数中距离J1最近的整数;
J为满足J=2a*3b*5c的整数中大于或等于J2的最小整数;或者
J为满足J=2a*3b*5c的整数中距离J2最近的整数;或者
第一DMRS序列的长度为J’,J’满足以下任一项:
J’为满足J’=2a*3b*5c的整数中大于或等于J1*6的最小整数;
J’为满足J’=2a*3b*5c的整数中距离J1*6最近的整数;
J’为满足J’=2a*3b*5c的整数中大于或等于J2*6的最小整数;或者
J’为满足J’=2a*3b*5c的整数中距离J2*6最近的整数;
其中,a,b和c为非负整数,J1为第六资源中的RB的数量,J1为正数,第六资源基于第一资源和扩展因子计算得到,J2为第七资源中的RB的数量,J2为正数,第七资源基于第二资源和扩展因子计算得到。
结合第四方面,在第四方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列占用J个RB,或者,第一DMRS序列的长度为J’;在J=1或J’=6的情况下,第一DMRS序列是基于8移相键控调制的时域序列经过DFT操作得到的;在J为除1以外的其他值或者J’为除6以外其他值的情况下,第一DMRS序列是基于π/2二进制相移键控调制的时域序列经过DFT操作得到的;
J满足以下任一项:
J为满足J=2a*3b*5c的整数中大于或等于J1的最小整数;
J为满足J=2a*3b*5c的整数中距离J1最近的整数;
J为满足J=2a*3b*5c的整数中大于或等于J2的最小整数;或者
J为满足J=2a*3b*5c的整数中距离J2最近的整数;或者
J’满足以下任一项:
J’为满足J’=2a*3b*5c的整数中大于或等于J1*6的最小整数;
J’为满足J’=2a*3b*5c的整数中距离J1*6最近的整数;
J’为满足J’=2a*3b*5c的整数中大于或等于J2*6的最小整数;或者
J’为满足J’=2a*3b*5c的整数中距离J2*6最近的整数;
其中,a,b和c为非负整数,J1为第六资源中的RB的数量,J1为正数,第六资源基于第一资源和扩展因子计算得到,J2为第七资源中的RB的数量,J2为正数,第七资源基于第二资源和扩展因子计算得到。
结合第四方面,在第四方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列是第二时域序列经过DFT操作得到的,第二DMRS序列占用D个RB;D满足以下任一项:
D=K;
D为满足D=2a*3b*5c的整数中小于或等于L的最大整数;或者
D为满足D=2a*3b*5c的整数中距离L最近的整数,
a,b和c为非负整数,L为第一资源中的RB的数量,L为正数。
结合第四方面,在第四方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列占用D个RB;在D=1的情况下,第二DMRS序列是基于8移相键控调制的时域序列经过DFT操作得到的;在D为除1以外的其他值的情况下,第二DMRS序列是基于π/2二进制相移键控调制的时域序列经过DFT操作得到的;D满足以下任一项:
D=K;
D为满足D=2a*3b*5c的整数中小于或等于L的最大整数;或者
D为满足D=2a*3b*5c的整数中距离L最近的整数,
a,b和c为非负整数,L为第一资源中的RB的数量,L为正数。
结合第四方面,在第四方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列,第二DMRS序列是第二时域序列经过DFT操作得到的;第二DMRS序列的长度D’满足以下任一项:
D’为满足D’=2a*3b*5c的整数中小于或等于L*6的最大整数;或者
D’为满足D’=2a*3b*5c的整数中距离L*6最近的整数;
其中,a,b和c为非负整数,L为第一资源中的RB的数量,L为正数。
结合第四方面,在第四方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列;在第二DMRS序列的长度D’为6的情况下,第二DMRS序列是基于8移相键控调制的时域序列经过DFT操作得到的;在D’为除6以外的其他值的情况下,第二DMRS序列是基于π/2二进制相移键控调制的时域序列经过DFT操作得到的;D’满足以下任一项:
D’为满足D’=2a*3b*5c的整数中小于或等于L*6的最大整数;或者
D’为满足D’=2a*3b*5c的整数中距离L*6最近的整数;
其中,a,b和c为非负整数,L为第一资源中的RB的数量,L为正数。
结合第四方面,在第四方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列的长度D’满足以下任一项:在L≥5的情况下,第二DMRS序列为ZC序列,且D’为大于或等于L*6的最小素数;或者在L<5的情况下,第二DMRS序列为第一频域序列,且D’=L*6;其中,L为第一资源中的RB的数量,L为正数。
结合第四方面,在第四方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列的长度D’满足以下任一项:在L≥5的情况下,第二DMRS序列为ZC序列,且D’为大于或等于L*6的最小素数;或者在L<5的情况下,第二DMRS序列为QPSK调制的频域序列,且D’=L*6;其中,L为第一资源中的RB的数量,L为正数。
结合第四方面,在第四方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列的长度D’满足以下任一项:在K≥5的情况下,第二DMRS序列为ZC序列,且D’为大于或等于K*6的最小素数;或者在K<5的情况下,第二DMRS序列为第一频域序列,且D’=K*6。
结合第四方面,在第四方面的某些实现方式中,基于第三资源与终端设备进行通信,包括:基于第三资源接收第一DMRS序列,第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,第一DMRS序列包括第二DMRS序列,其中,第二DMRS序列的长度D’满足以下任一项:在K≥5的情况下,第二DMRS序列为ZC序列,且D’为大于或等于K*6的最小素数;或者在K<5的情况下,第二DMRS序列为QPSK调制的频域序列,且D’=K*6。
应理解,在上述第一方面中对相关内容的扩展、限定、解释和说明也适用于第二方面、第三方面和第四方面中相同的内容。
第五方面,提供了一种通信装置,该通信装置可以是终端设备,也可以是被配置设置于终端设备中 的装置、模块、电路或芯片等,或者是能够和终端设备匹配使用的装置。一种设计中,该通信装置可以包括执行第一方面或第二方面所描述的方法/操作/步骤/动作所一一对应的模块,该模块可以是硬件电路,也可是软件,也可以是硬件电路结合软件实现。一种设计中,该通信装置可以包括处理模块和通信模块。
第六方面,提供了一种通信装置,该通信装置可以是网络设备,也可以是被配置设置于网络设备中的装置、模块、电路或芯片等,或者是能够和网络设备匹配使用的装置。一种设计中,该通信装置可以包括执行第三方面或第四方面所描述的方法/操作/步骤/动作所一一对应的模块,该模块可以是硬件电路,也可是软件,也可以是硬件电路结合软件实现。一种设计中,该通信装置可以包括处理模块和通信模块。
第七方面,提供一种通信装置,包括处理器和存储介质,该存储介质存储有指令,该指令被处理器运行时,以使得如第一方面或第一方面的任一可能的实现方式中的方法被实现,使得如第二方面或第二方面的任一可能的实现方式中的方法被实现,使得如第三方面或第三方面的任一可能的实现方式中的方法被实现,或者使得如第四方面或第四方面的任一可能的实现方式中的方法被实现。
第八方面,提供一种通信装置,包括处理器,所述处理器用于处理数据和/或信息,以使得如第一方面或第一方面的任一可能的实现方式中的方法被实现,使得如第二方面或第二方面的任一可能的实现方式中的方法被实现,使得如第三方面或第三方面的任一可能的实现方式中的方法被实现,或者使得如第四方面或第四方面的任一可能的实现方式中的方法被实现。可选地,所述通信装置还可以包括通信接口,所述通信接口用于接收数据和/或信息,并将接收到的数据和/或信息传输至所述处理器。可选地,所述通信接口还用于输出经处理器处理之后的数据和/或信息。
第九方面,提供一种芯片,包括处理器,所述处理器用于运行程序或指令,以使得如第一方面或第一方面的任一可能的实现方式中的方法被实现,使得如第二方面或第二方面的任一可能的实现方式中的方法被实现,使得如第三方面或第三方面的任一可能的实现方式中的方法被实现,或者使得如第四方面或第四方面的任一可能的实现方式中的方法被实现。可选地,所述芯片还可以包括存储器,所述存储器用于存储程序或指令。可选地,所述芯片还可以包括所述收发器。
第十方面,提供一种计算机可读存储介质,所述计算机可读存储介质包括指令,当该指令被处理器运行时,使得如第一方面或第一方面的任一可能的实现方式中的方法被实现,使得如第二方面或第二方面的任一可能的实现方式中的方法被实现,使得如第三方面或第三方面的任一可能的实现方式中的方法被实现,或者使得如第四方面或第四方面的任一可能的实现方式中的方法被实现。
第十一方面,提供一种计算机程序产品,所述计算机程序产品包括计算机程序代码或指令,当所述计算机程序代码或指令被运行时,使得如第一方面或第一方面的任一可能的实现方式中的方法被实现,使得如第二方面或第二方面的任一可能的实现方式中的方法被实现,使得如第三方面或第三方面的任一可能的实现方式中的方法被实现,或者使得如第四方面或第四方面的任一可能的实现方式中的方法被实现。
第十二方面,提供一种通信系统,包括第五方面或第五方面的任一可能的实现方式中的通信装置和第六方面或第六方面的任一可能的实现方式中的通信装置。
附图说明
图1为适用于本申请实施例的一种通信系统的示意图。
图2为功率放大器的性能曲线的示意图。
图3为DFT-S-OFDM的生成流程的示意图。
图4为一种频域信号循环扩展的示意图。
图5为一种加窗滤波的示意图。
图6为两种资源配置方式下的频谱扩展的示意图。
图7为本申请提供的一种通信的方法的示意性流程图。
图8为一种DMRS序列的映射方式的示意图。
图9为本申请提供的另一种通信的方法的示意性流程图。
图10为本申请提供的又一种通信的方法的示意性流程图。
图11是本申请实施例提供的一种通信装置的示意性框图。
图12是本申请实施例提供的另一种通信装置的示意性框图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
本申请提供的技术方案可以应用于各种通信系统,例如:第五代(5th generation,5G)或新无线(new radio,NR)系统、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)系统、无线局域网(wireless local area network,WLAN)系统、卫星通信系统、未来的通信系统,如第六代(6th generation,6G)移动通信系统,或者多种系统的融合系统等。本申请提供的技术方案还可以应用于设备到设备(device to device,D2D)通信,车到万物(vehicle-to-everything,V2X)通信,机器到机器(machine to machine,M2M)通信,机器类型通信(machine type communication,MTC),以及物联网(internet of things,IoT)通信系统或者其他通信系统。
通信系统中的一个网元可以向另一个网元发送信号或从另一个网元接收信号。其中信号可以包括信息、信令或者数据等。其中,网元也可以被替换为实体、网络实体、设备、通信设备、通信模块、节点、通信节点等等,本公开中以网元为例进行描述。例如,通信系统可以包括至少一个终端设备和至少一个网络设备。网络设备可以向终端设备发送下行信号,和/或终端设备可以向网络设备发送上行信号。可以理解的是,本公开中的终端设备可以替换为第一网元,网络设备可以替换为第二网元,二者执行本公开中相应的通信方法。
在本申请实施例中,终端设备也可以称为用户设备(user equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。
终端设备可以是一种向用户提供语音/数据的设备,例如,具有无线连接功能的手持式设备、车载设备等。目前,一些终端的举例为:手机(mobile phone)、客户端设备(customer-premises equipment,CPE)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、可穿戴设备,5G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等,本申请实施例对此并不限定。
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。
本申请实施例中,用于实现终端设备的功能的装置可以是终端设备,也可以是能够支持终端设备实现该功能的装置,例如芯片系统,该装置可以被安装在终端设备中或者和终端设备匹配使用。本申请实施例中,芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。在本申请实施例中仅以用于实现终端设备的功能的装置为终端设备为例进行说明,不对本申请实施例的方案构成限定。
本申请实施例中的网络设备可以是用于与终端设备通信的设备,该网络设备也可以称为接入网设备或无线接入网设备,如网络设备可以是基站。本申请实施例中的网络设备可以是指将终端设备接入到无线网络的无线接入网(radio access network,RAN)节点(或设备)。基站可以广义的覆盖如下中的各种名称,或与如下名称进行替换,比如:节点B(NodeB)、演进型基站(evolved NodeB,eNB)、下一代基站(next generation NodeB,gNB)、中继站、接入点、传输点(transmitting and receiving point,TRP)、发射点(transmitting point,TP)、主站、辅站、多制式无线(motor slide retainer,MSR)节点、家庭基站、网络控制器、接入节点、无线节点、接入点(access point,AP)、传输节点、收发节点、基 带单元(baseband unit,BBU)、射频拉远单元(remote radio unit,RRU)、有源天线单元(active antenna unit,AAU)、射频头(remote radio head,RRH)、中心单元(central unit,CU)、分布式单元(distributed unit,DU)、定位节点等。基站可以是宏基站、微基站、中继节点、施主节点或类似物,或其组合。基站还可以指用于设置于前述设备或装置内的通信模块、调制解调器或芯片。基站还可以是移动交换中心以及D2D、V2X、M2M通信中承担基站功能的设备、6G网络中的网络侧设备、未来的通信系统中承担基站功能的设备等。基站可以支持相同或不同接入技术的网络。本申请的实施例对网络设备所采用的具体技术和具体设备形态不做限定。
基站可以是固定的,也可以是移动的。例如,直升机或无人机可以被配置成充当移动基站,一个或多个小区可以根据该移动基站的位置移动。在其他示例中,直升机或无人机可以被配置成用作与另一基站通信的设备。
在一些部署中,本申请实施例所提及的网络设备可以为包括CU、或DU、或包括CU和DU的设备、或者控制面CU节点(中央单元控制面(central unit-control plane,CU-CP))和用户面CU节点(中央单元用户面(central unit-user plane,CU-UP))以及DU节点的设备。
本申请实施例中,用于实现网络设备的功能的装置可以是网络设备;也可以是能够支持网络设备实现该功能的装置,例如芯片系统、硬件电路、软件模块、或硬件电路加软件模块。该装置可以被安装在网络设备中或者和网络设备匹配使用。在本申请实施例中仅以用于实现网络设备的功能的装置为网络设备为例进行说明,不对本申请实施例的方案构成限定。
网络设备和终端设备可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上;还可以部署在空中的飞机、气球和卫星上。本申请实施例中对网络设备和终端设备所处的场景不做限定。
图1是适用于本申请实施例的通信方法的一种通信系统的示意图。如图1所示,通信系统100可以包括至少一个网络设备,例如图1所示的网络设备110;通信系统100还可以包括至少一个终端设备,例如图1所示的终端设备120和终端设备130。网络设备110与终端设备(如终端设备120和终端设备130)可通过无线链路通信。该通信系统中的各通信设备之间,例如,网络设备110与终端设备120之间,可通过多天线技术通信。
需要说明的是,图1仅为便于理解而示例的简化示意图,例如,通信系统中还可以包括其它设备,如还可以包括无线中继设备和/或无线回传设备等,图1中未予以画出。在实际应用中,该通信系统可以包括多个网络设备,也可以包括多个终端设备。本申请实施例对通信系统中包括的网络设备和终端设备的数量不做限定。
为了便于理解本申请实施例的方案,下面对本申请实施例可能涉及的术语进行解释。
(1)子载波;
正交频分复用(orthogonal frequency division multiplexing,OFDM)系统中将频域资源划分为若干个子资源,每个频域上的子资源可称为一个子载波。子载波也可以理解为频域资源的最小粒度。
子载波间隔指的是OFDM系统中频域上相邻的两个子载波的中心位置或峰值位置之间的间隔值。例如,LTE系统中的子载波间隔为15kHz,5G中NR系统的子载波间隔可以是15kHz、30kHz、60kHz或120kHz等。
(2)资源块(resource block,RB);
频域上连续的多个子载波可称为一个资源块。例如,LTE系统中的一个资源块包括12个子载波。再如,5G中NR系统中的一个资源块包括12子载波。随着通信系统的演进,一个资源块包括的子载波个数也可以是其他值。
(3)时隙;
5G中NR系统的一个时隙包括14个OFDM符号。15kHz子载波间隔对应的时隙长度为1ms。30kHz子载波间隔对应的时隙长度为0.5ms。
OFDM符号是OFDM系统中时域上最小的时间单元。
(4)子帧;
5G中NR系统的一个子帧的时间长度为1ms。
(5)功率放大器(power amplifer,PA);
功率放大器用于将调制震荡电路所产生的低功率射频信号进行功率放大,以支持射频信号在无线信道中的传输。当功率放大器的输入功率加大到一定值后,输出功率不再随输入功率的增加而增加,这时 的输出功率称为功率放大器的饱和输出功率。
图2示出了功率放大器的性能曲线的示意图。如图2所示,低能力的功率放大器的饱和输出功率较低,而高能力的功率放大器的饱和输出功率较高。因此,低能力的功率放大器无法支持高功率的传输,而高能力的功率放大器可以支持高功率的传输。
(6)循环前缀正交频分复用(cyclic prefix orthogonal frequency division multiplexing,CP-OFDM)波形;
CP-OFDM波形,即多载波波形,在时域上,多个调制符号同时传输。正交频分多址(orthogonal frequency division multiple access,OFDMA)将多个正交的子载波重叠在一个窄带里。虽然这些子载波彼此正交,但时域上这些子载波叠加后会产生高的峰值平均功率比(peak to average power ratio,PAPR)。而电子元件放大器的线性响应范围是有限的,高PAPR会导致信号产生非线性失真。
(7)覆盖增强;
通信链路的覆盖能力可以定义为:在保证传输速率目标的前提下,电磁波从发射机传播到接收机时的最大可容忍功率衰减(以dB为单位)。因此,提升最大可容忍功率衰减即为提高通信链路的覆盖能力,即覆盖增强。评价指标可以为PAPR和立方度量(cubic metric,CM)。PAPR和立方度量(cubic metric,CM)的降低表征功率放大器工作点的抬升,这意味着最大发送功率的提升,因而可以用于表征覆盖能力的增强。
以PAPR为例,PAPR的定义为信号的峰值功率与平均功率的比值。功率放大器的动态范围是有限的,当PAPR过高会导致功率放大器进入非线性区,在该情况下,信号经过PA后会产生非线性失真,造成频谱扩展和带内信号畸变,降低系统性能。为了避免PA进入非线性区,需要进行功率回退。PAPR越高,需要回退的功率也就越高。功率回退会导致覆盖能力下降。因此,降低PAPR有利于提高覆盖能力。
相对于OFDM波形,DFT-S-OFDM波形可以有效降低信号的PAPR,从而提高覆盖能力。NR系统中支持DFT-S-OFDM波形,提高了上行的覆盖能力。
(8)离散傅里叶变换扩频的正交频分复用(discrete fourier transform spread orthogonal frequency division multiplexing,DET-S-OFDM)波形;
相较于CP-OFDM,DFT-S-OFDM的物理层处理流程中增加了转换预编码器(transform precoder)。将数据依次做串并变换,变成并行的数据,再依次进行离散傅里叶变换(discrete fourier transform,DFT)(转换预编码)。虽然多个符号一起调制,但一个接着一个传送,等同于单载波。多载波OFDMA在时域上多个子载波叠加,而单载波正交频分复用(single carrier OFDM,SC-OFDM)经过DFT变换,时域上等同于单个子载波,因此PAPR较低。
图3示出了DFT-S-OFDM的生成流程的示意图。
四相相移键控(quadrature phase shift keying,QPSK)调制使用4种不同相位来表示不同的信息。一个QPSK的调制符号可以承载2比特信息。QPSK的4个相位通常可以为{0,π/2,π,3π/2}或{π/4,3π/4,5π/4,7π/4}。
下面以QPSK调制,子载波个数为F为例,结合图3对DFT-S-OFDM的生成流程进行示例性说明。DFT-S-OFDM的生成流程可以包括以下步骤。F为正整数。
S1,2F个数据比特{b(0),b(1),…,b(2F-1)},经过QPSK调制后,得到F个调制符号{s(0),s(1),…,s(F-1)}。
S2,F个调制符号经过F点的DFT后得到频域信号{X(0),X(1),…,X(F-1)}。
S3,将频域信号映射到F个子载波上,并进行h点的快速傅立叶反变换(inverse fast fourier transformation,IFFT)得到时域信号{x(0),x(1),…,x(h-1)}。
h通常由系统带宽决定,且h大于F。h为正整数。在存在发射多天线时,频域信号还可以乘以预编码矩阵后再进行子载波映射。
S4,对时域信号加循环前缀(cyclic prefix,CP)后进行数模转换得到模拟信号,并通过天线发送。
(9)上行功率控制(uplink power control);
在上行传输中,可以通过上行功率控制技术来提高用户体验和覆盖能力。例如,与基站的距离不同的终端设备的路径损耗存在极大差异。距离基站越近的终端设备(中心用户)其路径损耗越小,距离基站越远的终端设备(边缘用户)其路径损耗越大。为了使边缘用户获得良好的用户体验,边缘用户通常会采用比中心用户更大的发射功率来发送上行数据。这样可以补偿由于远距离传输而造成的路径损耗,使边缘用户也可以获得较好的传输性能,即较好的传输速率。中心用户和边缘用户的上行发射功率不同 的机制就是通过上行功率控制技术实现的。
但终端设备的发射功率不能高于最高发送功率(maximum output power,MOP)。目前NR标准中规定的终端设备的最高发送功率为23dBm。
(10)频谱扩展和频谱塑形;
频谱扩展(spectral extension,SE)和频域频谱整形(frequency-domain spectral shaping,FDSS)可以降低DFT-S-OFDM的PAPR,从而进一步提高覆盖能力。
频域扩展是指对频域信号进行循环扩展。
例如,原始的DFT-S-OFDM中,频域信号{X(0),X(1),…,X(F-1)}占F个子载波。将包含F个元素的频域信号进行循环扩展。扩展数据中的元素的总数为E个,向左(向前)扩展P个元素,向右(向后)扩展E-P个元素,得到包含F+E个元素的频域信号{X(F-P),X(F-P+1),…,X(F-1),X(0),X(1),…,X(F-1),X(0),X(1),…,X(E-P-1)}。E为正整数,P为非负整数,E-P为非负整数。这样,在经过循环扩展后的频域信号中,任意连续的F个元素均为扩展前的频域信号中的F个元素。F为正整数。
图4示出了一种频域信号循环扩展的示意图。例如,如图4所示,F=8,E=4,P=2。扩展前的频域信号为{X(0),X(1),X(2),X(3),X(4),X(5),X(6),X(7)},扩展后的频域信号为{X(6),X(7),X(0),X(1),X(2),X(3),X(4),X(5),X(6),X(7),X(0),X(1)},如图4所示。扩展后的频域信号映射到F+E个子载波上。
FDSS是指对频域信号进行加窗滤波,即将频域信号中的各个元素与滤波器系数中的各个元素逐位相乘,以得到滤波后的频域信号。
图5示出了一种加窗滤波的示意图。例如,原始的DFT-S-OFDM中,频域信号{X(0),X(1),…,X(F-1)}占F个子载波。频域信号{X(0),X(1),…,X(F-1)}即为图5中的滤波前的频率信号。滤波器系数为{W(0),W(1),…,W(F-1)}。加窗滤波就是指将频域信号与滤波器系数逐位相乘,滤波后的频域信号为{X(0)W(0),X(1)W(1),…,X(F-1)W(F-1)},如图5所示。
SE和FDSS同时使用时,通常是先将频域信号进行循环扩展,然后再与滤波器系数逐位相乘。例如,原始的DFT-S-OFDM中,频域信号{X(0),X(1),…,X(F-1)}占F个子载波。先将频域信号进行循环扩展,扩展数据中的元素的总数为E个,向左(向前)扩展P个元素,向右(向后)扩展EP个元素,得到包含F+E个元素的扩展后的频域信号{X(F-P),X(F-P+1),…,X(F-1),X(0),X(1),…,X(F-1),X(0),X(1),…,X(E-P-1)}。然后将扩展后的频域信号和滤波器系数{W(0),W(1),…,W(F+E)}逐位相乘得到最终的频域信号,再映射到F+E个子载波上。
(11)解调参考信号(demodulation reference signal,DMRS);
当数据比特采用-二进制相移键控(-inary phase shift keying,-BPSK)调制时,可以对采用-BPSK调制的低PAPR时域序列或者采用8移相键控(8 phase shift keying,8PSK)调制的低PAPR时域序列执行DFT操作以得到频域DMRS序列。下面对频域DMRS序列的生成方式进行说明。
当DMRS序列的长度大于或等于30时,对采用-BPSK调制的时域Gold序列执行DFT操作以得到生成频域DMRS序列。
当DMRS序列的长度为6时,对采用8PSK调制的时域序列执行DFT操作以生成频域DMRS序列。频域DMRS序列可以满足如下公式。

其中,fn表示频域DMRS序列,M表示DMRS序列的长度,M为正整数,n为整数。为序列中的元素。rn表示8PSK调制的时域序列。序列属于表1所示的序列的集合,其中,表1中的每一行可以表示序列的一种可能的取值。
表1
当DMRS序列的长度为12、18或者24时,对采用计算机搜索得到的-BPSK调制的时域序列执行DFT操作以得到频域DMRS序列。该频域DMRS序列在协议TS 38.211 5.2.3节中给出,生成公式可以满足如下公式。

b(n)为序列[b(n)]中的元素。rn表示-BPSK调制的时域序列。对于不同的DMRS序列的长度,序列[b(n)]分别属于表2至表4所示的序列的集合,其中,表中的每一行可以表示序列[b(n)]的一种可能的取值。
DMRS序列的长度为12时,序列[b(n)]属于表2所示的序列的集合。
表2
DMRS序列的长度为18时,序列[b(n)]属于表3所示的序列的集合。
表3
DMRS序列的长度为24时,序列[b(n)]属于表4所示的序列的集合。
表4
当数据比特采用其他调制方式时,例如,采用QPSK调制时,协议采用TS 38.211中5.2.2小节给出的低PAPR序列生成类型1(low-PAPR sequence generation type 1)序列。下面对频域DMRS序列的生成方式进行说明。
当DMRS序列的长度大于或等于36时,可以采用Zadoff-Chu(ZC)序列作为DMRS序列。DMRS序列可以满足如下公式:
fn=xq(n mod NZC);
其中,fn表示频域DMRS序列。n的取值范围为0到N-1,N为DMRS序列的长度,NZC为小于N的最大质数。q是ZC序列的根,由高层的配置信息、符号的位置和序列长度NZC确定。具体地,q可以满足如下公式:

其中,v=0或1。u∈{0,1,...29}。
当DMRS序列的长度等于30时,DMRS序列可以满足如下公式:
其中,Mzc表示序列的长度。长度为30的DMRS序列本质上是截断的ZC序列,即长度为30的DMRS序列是将长度为31的ZC序列截断末尾的一个元素得到的。
当DMRS序列的长度为6、12、18或者24时,可以采用QPSK调制的频域序列(未经过DFT操作)作为DMRS序列。例如,生成公式可以满足如下公式:
为序列中的元素。对于不同的DMRS序列的长度,序列属于表5至表8所示的序列的集合,其中,表中每一行可以表示序列的一种可能的取值。
DMRS序列的长度为6时,序列属于表5所示的序列的集合。
表5
DMRS序列的长度为12时,序列属于表6所示的序列的集合。
表6
DMRS序列的长度为18时,序列属于表7所示的序列的集合。
表7
DMRS序列的长度为24时,序列属于表8所示的序列的集合。
表8
上述ZC序列以及频域QSPK序列,在时域上均具有良好的PAPR/CM性能,同时在频域上都是恒幅的从而可以得到较优的信道估计性能。因此,当数据信道采用QPSK调制或采用更高阶调制时,可以基于low-PAPR sequence generation type 1序列得到DMRS序列。
在使用频域扩展和FDSS的情况下,DMRS的PAPR/CM需要小于或等于数据信号的PAPR/CM。以ZC序列为例,不使用频域扩展和FDSS的ZC序列的CM性能低于使用频域扩展和FDSS的数据信道的CM性能。对DMRS序列进行频域扩展和FDSS处理能够降低PAPR/CM。
(12)对RB的相关要求;
目前协议对RB的相关要求包括以下几项:
1.资源指示的最小粒度为RB;传输块大小(transport block size,TBS)以RB为粒度计算。
2.经过DFT操作的数据占用的RB数量需要满足2a*3b*5c,其中,a,b和c为非负整数。
在通信系统中,频谱扩展的方式能够有效降低信号的PAPR,进而提高通信链路的覆盖能力。终端设备基于网络设备分配的资源来进行频谱扩展,在非扩展资源上承载待传输的数据,在扩展资源上承载扩展数据。
例如,待传输的数据可以为待映射的调制符号。再如,待传输的数据可以为待映射的调制符号经过DFT操作后得到的频域信号。
扩展数据是基于待传输的数据进行扩展得到的。具体地,扩展数据是通过对待传输的数据中的部分 或全部进行复制得到的。扩展数据也可以称为复制数据。
扩展数据可以基于对待传输的数据进行循环扩展得到的。这样,在扩展数据和待传输的数据构成的数据序列中,任意连续的F个元素均为待传输的数据中的F个元素。F为正整数。
位于待传输的数据的左侧的扩展数据中的元素的数量和位于待传输的数据的右侧的扩展数据中的元素的数量可以相同,也可以不同。
网络设备可以发送指示信息以指示终端设备对已分配资源的使用。相关方案中包括两种资源配置方式。第一种配置方式为网络设备指示总资源和扩展资源相对总资源的比例,第二种配置方式为网络设备指示非扩展资源和扩展资源相对总资源的比例。上述两种资源配置方式均可以指示UE确定扩展资源以及非扩展资源等。
图6示出了两种资源配置方式下的频谱扩展的示意图。下面结合图6对频谱扩展进行说明。
在第一种资源配置方式下,网络设备分配的资源为总资源。总资源包括非扩展资源和扩展资源。总资源的长度等于非扩展资源的长度和扩展资源的长度之和。终端设备在网络设备分配的资源内部进行频谱扩展。即分配的资源中的一部分作为扩展资源,另一部分作为非扩展资源。
终端设备可以基于网络设备分配的资源和扩展资源相对总资源的比例确定非扩展资源以及扩展资源。
示例性地,如图6的(a)所示,终端设备将分配的资源划分为承载待传输的数据的非扩展资源和承载扩展数据的扩展资源。待传输的数据即为图6中的核心数据。Alpha表示扩展资源相对总资源的比例。
alpha=(length(SE_right)+length(SE_left))/(length(SE_right)+length(SE_left)+length(Data))
其中,函数length(y)衡量y占用的资源长度,可以由占用的RB的数量或RE的数量来表征。Data表示待传输的数据。SE_right表示位于data右侧的扩展数据,即向后扩展的数据。SE_left表示位于data左侧的扩展数据,即向前扩展的数据。SE_right中的元素的数量和SE_left中的元素的数量可以相同,也可以不同。
在第二种资源配置方式下,网络设备分配的资源为非扩展资源。终端设备在网络设备分配的资源以外进行频谱扩展。即分配的资源为非扩展资源,扩展资源位于分配的资源以外。
终端设备可以基于网络设备分配的资源和扩展资源相对总资源的比例确定频谱扩展所需要的额外的资源的长度,即扩展资源的长度。在分配的资源两侧以等比例或非等比例的方式连续扩展,直至满足该额外的资源的长度,扩展的部分即为扩展资源。
示例性地,在分配的资源两侧以等比例的方式连续扩展,即分配的资源两侧的扩展资源的长度一致。
可替换地,在分配的资源两侧以非等比例的方式连续扩展,即分配的资源两侧的扩展资源的长度不同。
示例性地,如图6的(b)所示,分配的资源为承载待传输的数据的非扩展资源。终端设备基于分配的资源计算得到承载扩展数据的扩展资源。
alpha=(length(SE_right)+length(SE_left))/(length(SE_right)+length(SE_left)+length(Data))
其中,函数length(y)衡量y占用的资源长度,可以由占用的RB的数量或RE的数量来表征。Data表示待传输的数据。SE_right表示位于data右侧的扩展数据,即向后扩展的数据。SE_left表示位于data左侧的扩展数据,即向前扩展的数据。SE_right中的元素的数量和SE_left中的元素的数量可以相同,也可以不同。
然而,终端设备基于上述配置方式确定的资源使用方式可能会与相关操作的要求发生冲突,影响终端设备的处理性能,这阻碍了频谱扩展的使用。
示例性地,在第一种资源配置方式下,终端设备可以根据总资源的长度和扩展资源相对总资源的比例计算非扩展资源的长度。计算传输数据块大小的协议要求承载数据的资源对应的RB的数量为整数。DFT是基于快速傅里叶变换FFT的快速算法实现的,其基为2,3或5中的至少一项,承载数据的资源对应的RE的数量需要满足2a*3b*5c。协议要求经过DFT操作后的数据占用的RB的数量需要满足2a*3b*5c。若非扩展资源用于承载经过DFT操作后的数据,非扩展资源对应的RB的数量需要满足2a*3b*5c。上述方式该方式计算得到的非扩展资源的长度对应的RB的数量可能与协议约束矛盾。
例如,频谱扩展后数据传输占用的RB的个数为7,即总资源的长度对应的RB的数量为7,扩展资源相对总资源的比例为1/3,计算得到的非扩展资源的长度对应的RB的数量为7*(1-1/3)=14/3,14/3不是整数,与计算传输数据块大小的协议约束以及DFT相关协议的约束矛盾。
示例性地,在第一种资源配置方式下,终端设备可以根据非扩展资源的长度和扩展资源相对总资源 的比例计算总资源的长度。在频谱扩展后,可以基于扩展后的频谱生成DMRS序列。DMRS序列的长度需要适配频谱扩展的需要。例如,DMRS序列的长度可以为总资源的长度的一半。一个RB包括12个RE。当DMRS序列采用π/2-BPSK调制序列时,若DMRS序列的长度小于30时,DMRS序列的长度需要为固定值,即6,12,18或24;若DMRS序列的长度大于或等于30时,DMRS序列的长度为整数。
例如,频谱扩展前数据传输占用的RB的个数为1,即非扩展资源的长度对应的RB的数量为1,扩展资源相对总资源的比例为1/3,计算得到的总资源的长度对应的RB的数量为1/(1-1/3)=3/2,DMRS序列的长度为3/2*6=9。在该情况下,DMRS序列的长度小于30,9不是上述固定值,与上述协议内容矛盾。
再如,频谱扩展前数据传输占用的RB的个数为10,即非扩展资源的长度对应的RB的数量为10,扩展资源相对总资源的比例为1/8,计算得到的总资源的长度对应的RB的数量为10/(1-1/8)=80/7,DMRS序列的长度为80/7*6=480/7。在该情况下,DMRS序列的长度大于30,480/7不是整数,与上述协议内容矛盾。
有鉴于此,本申请提供一种通信的方法和通信装置,能够提高设备的处理性能,使得设备能够通过频谱扩展的方式提高通信链路的覆盖能力。
图7是本申请提供的一种通信的方法的示意性流程图。如图7所示,该方法700可以包括以下步骤。
710,终端设备接收网络设备发送的第一指示信息。第一指示信息指示网络设备分配的分配资源(第一资源的一例)。
分配资源也可以称为分配带宽。
720,终端设备根据分配资源和扩展因子中的至少一项确定第一非扩展资源(第二资源的一例)和/或第一总资源(第三资源的一例)。扩展因子用于指示频谱扩展的比例。第一总资源为经过频谱扩展后的资源。第一总资源包括第一非扩展资源。
730,终端设备基于第一总资源与网络设备进行通信。第一非扩展资源上承载待传输数据(第一数据的一例)。
可选地,方法700还包括步骤740(图中未示出):基于待传输数据进行扩展,以得到扩展后的数据(第二数据的一例),扩展后的数据包括待传输数据,第一总资源上承载扩展后的数据。
具体地,扩展后的数据包括待传输数据和扩展数据。扩展数据是通过对待传输数据中的部分或全部进行复制得到的。扩展数据也可以称为复制数据。
待传输数据也可以称为待映射的数据。例如,待传输数据可以包括待映射的调制符号经过DFT后得到的频域信号。
需要说明的是,第一总资源中的“第一”仅用于限定第一总资源为终端设备实际使用的总资源,第一非扩展资源中的“第一”仅用于限定第一非扩展资源为终端设备实际使用的非扩展资源,不具有其他限定作用。
总资源可以理解为数据传输所占用的资源。终端设备可以利用网络设备分配的资源进行频谱扩展。总资源即为频谱扩展后的资源。
总资源中的一部分为扩展资源,另一部分为非扩展资源。扩展资源为承载扩展数据的资源。非扩展资源为承载待传输数据的资源。
换言之,总资源可以分为承载待传输数据的非扩展资源和承载扩展数据的扩展资源。总资源的长度可以为扩展资源的长度和非扩展资源的长度之和。
在本申请实施例中,扩展资源也可以称为扩展带宽、扩展频谱资源或扩展频谱。非扩展资源也可以称为非扩展带宽、非扩展频谱资源或非扩展频谱。
示例性地,扩展因子可以是由网络设备指示。
例如,网络设备可以直接指示扩展因子的值。再如,网络设备可以指示扩展因子的索引。终端设备基于扩展因子的索引确定扩展因子的值。
扩展因子和分配带宽的长度可以由同一个信令指示,也可以由不同的信令指示。
可替换地,扩展因子也可以是预先设置的。
可选地,扩展因子用于指示扩展资源的长度和总资源的长度之间的关系。
示例性地,扩展因子用于指示扩展资源的长度和总资源的长度之间的比值。
可替换地,扩展因子用于指示总资源的长度和扩展资源的长度之间的比值。
可选地,扩展因子用于指示扩展资源的长度和非扩展资源的长度之间的关系。
示例性地,扩展因子用于指示扩展资源的长度和非扩展资源的长度之间的比值。
可替换地,扩展因子用于指示非扩展资源的长度和扩展资源的长度之间的比值。
可选地,扩展因子用于指示非扩展资源的长度和总资源的长度之间的关系。
示例性地,扩展因子用于指示非扩展资源的长度和总资源的长度之间的比值。
可替换地,扩展因子用于指示总资源的长度和非扩展资源的长度之间的比值。
应理解,以上仅为示例,扩展因子的具体指示内容还可以为其他内容,只要基于该扩展因子能够用于指示频谱扩展的比例即可。
为了便于描述,本申请实施例中主要以扩展因子用于指示扩展资源的长度和总资源的长度之间的比值为例进行说明,不对本申请实施例的方案构成限定。在扩展因子用于指示其他内容时,相应调整后文中的方案即可。
资源的长度可以由不同的资源粒度表征。
示例性地,资源粒度可以为RB粒度,资源的长度可以由RB的数量表示。
可替换地,资源粒度可以为RE粒度,资源的长度可以由RE的数量表示。
在确定第一总资源的长度和第一非扩展资源的长度后,终端设备可以基于第一总资源的长度和第一非扩展资源的长度生成扩展后的数据。
在步骤740中,扩展后的数据占用第一总资源,待传输数据占用第一非扩展资源。终端设备可以确定第一总资源的长度和第一非扩展资源的长度,然后将占用第一非扩展资源的长度的待传输资源扩展为占用第一总资源的长度的数据,即扩展后的数据。第一总资源的长度和第一非扩展资源的长度的具体确定方式可以参考后文中的描述。
例如,第一非扩展资源包括K个RB,即第一非扩展资源的长度为K个RB;第一总资源包括J个RB,即第一总资源的长度为J个RB。K为正整数。J为正整数。J>K。待传输数据为占用K个RB的数据。扩展后的数据为占用J个RB的数据。在该情况下,步骤740可以包括:将占用K个RB的待传输数据进行扩展,以得到占用J个RB的数据,即扩展后的数据。
在本申请实施例中,扩展后的数据也可以称为扩频信号。
可选地,步骤740包括:将待传输数据进行循环扩展,以得到扩展后的数据。
换言之,数据扩展的方式可以为循环扩展的方式。
扩展数据位于待传输数据的左侧和/或右侧。
待传输数据为{X(0),X(1),…,X(F-1)},扩展数据包括E个元素,扩展数据中位于待传输数据的左侧的元素包括P个,位于待传输数据的右侧的元素包括E-P个。示例性地,在扩展数据中位于左侧的元素和位于右侧的元素的数量不超过待传输数据的情况下,扩展后的数据为{X(F-P),…,X(F-1),X(0),X(1),…,X(F-1),X(0),…X(E-P-1)}。若扩展数据中位于左侧的元素或位于右侧的元素的数量超过待传输数据,可以以类似的方式进行扩展。
经过循环扩展后得到的扩展后的数据中任意F个连续的元素为待传输数据中的F个元素。F为待传输数据中的元素的数量。F为正整数。E为正整数,P为非负整数,E-P为非负整数。
位于待传输数据的左侧的扩展数据中的元素的数量和位于待传输数据的右侧的扩展数据中的元素的数量可以相同,也可以不同。
在确定第一总资源的长度和第一非扩展资源的长度后,终端设备可以基于第一总资源的长度和第一非扩展资源的长度获取DMRS序列。
可选地,方法700还包括步骤750(图中未示出):获取第一DMRS序列。第一DMRS序列的长度与第一总资源的长度对应。
具体地,第一DMRS序列的长度与第一总资源的长度之间的对应关系与第一DMRS序列的映射方式相关。
图8示出了一种DMRS序列的映射方式的示意图。
示例性地,如图8所示,DMRS序列在资源中呈梳状结构,即DMRS序列以梳状结构占用资源。具体地,在总资源上每隔一个资源放置DMRS序列中的一个元素。例如,长度为12的DMRS序列可以以梳状结构占用长度为24个RE的频域资源,或者说长度为2个RB的频域资源。
在第一DMRS序列以梳状结构占用第一总资源的情况下,第一DMRS序列的长度为第一总资源的长 度的一半。
应理解,以上仅为示例,在第一DMRS序列的其他映射方式下,第一DMRS序列的长度与第一总资源的长度之间的关系可以基于映射方式进行相应的调整。本申请实施例中主要以第一DMRS序列呈梳状结构占用第一总资源为例进行说明。
需要说明的是,本申请实施例中的步骤编号不对步骤的执行顺序构成限定。
在本申请实施例中,资源的长度需要满足相关约束条件。
示例性地,约束条件可以包括约束条件#1。约束条件#1包括:第一总资源中的RB的数量为整数,第一非扩展资源中的RB的数量为整数。
示例性地,约束条件可以包括约束条件#2。约束条件#2包括:经过DFT后的数据或参考信号序列所占用的RB的数量满足2a*3b*5c条件。其中,在本申请实施例中的所有2a*3b*5c条件中,a,b和c为非负整数。
例如,非扩展资源可以用于承载将待映射的调制符号进行DFT后得到的频域信号。在该情况下,第一非扩展资源中的RB的数量K满足K=2a*3b*5c
示例性地,约束条件可以包括约束条件#3。约束条件#3包括:经过DFT后的数据或参考信号序列的长度满足2a*3b*5c条件。其中,a,b和c为非负整数。
例如,非扩展资源可以用于承载将待映射的调制符号进行DFT后得到的频域信号。在该情况下,第一非扩展资源中的RE的数量K’满足K’=2a*3b*5c。在该情况下,第一非扩展资源中的RB的数量不一定为整数。
需要说明的是,在本申请实施例中,上述三个约束条件为相互独立的约束条件,并非需要同时满足的约束条件。
在方法700中,终端设备实际使用的总资源和非扩展资源是终端设备自行确定的。为了便于描述,本申请实施例中仅以由终端设备确定实际使用的总资源和非扩展资源为例进行说明。在其他可能的实现方式中,终端设备实际使用的总资源和非扩展资源可以是其他设备(如网络设备)指示的。其他设备也可以采用与终端设备相同的方式确定资源的配置方式,例如,确定第一总资源和第一非扩展资源。
在一种可能的实现方式中,步骤720也可以按照如下方式理解:终端设备可以根据约束条件对基于分配资源和扩展因子计算得到的资源的配置方式进行调整,以得到第一总资源和第一非扩展资源。例如,终端设备可以根据分配资源和扩展因子计算得到第二总资源和/或第二非扩展资源,基于约束条件对第二总资源和/或第二非扩展资源进行调整,以得到第一总资源和第一非扩展资源。
网络设备可以通过多种方式确定终端设备实际使用的总资源和非扩展资源。例如,可以在协议中预先规定终端设备对网络设备指示的总资源或非扩展资源的调整方式。再如,终端设备可以发送指示信息通知网络设备对其指示的总资源或非扩展资源的调整方式。应理解,网络设备还可以通过其他方式确定终端设备实际使用的总资源和非扩展资源,本申请实施例对此不做限定。
在另一种可能的实现方式中,可以设置合适的扩展因子,以使得终端设备基于分配资源和扩展因子计算得到的第二总资源和/或第二非扩展资源满足约束条件。换言之,无需对第二总资源和/或第二非扩展资源进行调整。第一总资源即为第二总资源。或者,第一非扩展资源即为第二总资源。
在一种可能的场景中,在步骤710中,分配资源可以包括第一总资源。
换言之,分配资源可以为网络设备指示给终端设备的总资源。
在该情况下,终端设备可以在网络设备分配的资源的长度内进行频谱扩展。扩展资源可以位于网络设备分配的资源以内。
在一种可能的场景中,在步骤710中,分配资源可以用于承载待传输数据。
换言之,分配资源可以为网络设备指示给终端设备的非扩展资源。
在该情况下,终端设备可以在网络设备分配的资源以外进行频谱扩展。扩展资源可以位于网络设备分配的资源以外。
下面分别以分配资源为总资源(配置方式1)和分配资源为非扩展资源(配置方式2)为例对本申请实施例的方案进行说明。
配置方式1:
图9示出了本申请实施例的一种通信方法900,方法900可以视为方法700的一种具体实现方式,方法900包括如下步骤。
910,终端设备接收网络设备发送的第一指示信息。第一指示信息指示网络设备分配的分配资源。
920,终端设备根据分配资源和扩展因子确定第一非扩展资源。扩展因子用于指示频谱扩展的比例。
930,终端设备基于第一总资源与网络设备进行通信。第一非扩展资源上承载待传输数据。第一总资源为经过频谱扩展后的资源。第一总资源包括第一非扩展资源。
可选地,方法900还包括步骤940(图中未示出):基于待传输数据进行扩展,以得到扩展后的数据,扩展后的数据包括待传输数据,第一总资源上承载扩展后的数据。
可选地,方法900还包括步骤950(图中未示出):获取第一DMRS序列。第一DMRS序列的长度与第一总资源的长度对应。
分配资源可以为网络设备分配的总资源。
第一非扩展资源包括K个RB。即待传输数据占用K个RB,或者说,占用K’个RE。
示例性地,K可以是根据上述约束条件#2确定的。
可替换地,K’可以是根据上述约束条件#3确定的。
可选地,第一非扩展资源中的RB的数量满足2a*3b*5c,例如,K=2a*3b*5c。或者,第一非扩展资源中的RE的数量满足2a*3b*5c,例如,K’=2a*3b*5c。在一种可能的实现方式中,扩展因子满足如下条件。在本申请实施例的方案中,待传输数据可以是经过DFT操作得到的,DFT操作可以是基于FFT的快速算法实现的,其基为2,3或5中的至少一项,对于满足2a*3b*5c条件的待传输数据终端设备可以基于上述DFT操作实现高效的转换,提高数据处理效率,即提高终端设备的处理性能,从而有利于保证终端设备通过频谱扩展的方式实现数据传输,降低信号的PAPR,以增强通信链路的覆盖能力。
此外,在K=2a*3b*5c的情况下,K的值满足协议的要求,这样可以避免与协议发生冲突,同时,减少信令开销。
在一种可能的实现方式中,第一非扩展资源的长度可以通过如下方式确定。
示例性地,第一非扩展资源的长度可以是根据K=2a*3b*5c或者K’=2a*3b*5c对基于分配资源和扩展因子计算得到的非扩展资源的长度进行调整得到的。
或者,第一非扩展资源的长度可以是根据K=2a*3b*5c或者K’=2a*3b*5c对基于第一总资源和扩展因子计算得到的非扩展资源的长度进行调整得到的。
在一些场景中,分配资源和第一总资源可能是相同的,具体描述可以参见后文。
这样,第一非扩展资源的长度能够在满足2a*3b*5c要求的同时,尽可能接近网络设备指示的非扩展资源的长度,有利于提高传输性能。
在一种可能的实现方式中,扩展因子可以满足如下条件。
可选地,扩展因子用于指示扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,1/3,1/4,1/5,1/6,1/7,1/8,3/8,1/9或1/10。
可选地,扩展因子用于指示扩展资源的长度与非扩展资源的长度之间的比值,扩展因子的取值包括:1,1/2,1/3,1/4,1/5,1/6,1/7,3/5,1/8或1/9。
可选地,扩展因子用于指示非扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,2/3,3/4,4/5,5/6,6/7,7/8,5/8,8/9或9/10。
如前所述,通信链路的覆盖能力可以理解为,在保证传输速率目标的前提下,电磁波从发射机传播到接收机时的最大可容忍功率衰减。终端设备通过频谱扩展的方式实现数据传输,能够降低信号的PAPR。然而,频谱扩展的方式会占用额外的频谱,从而导致数据传输速率的损失。上述扩展因子能够以较小的资源开销实现较好的波形PAPR性能提升,即在占用较少的额外的频谱资源的同时,降低信号的PAPR,以增强通信链路的覆盖能力。
可选地,扩展因子用于指示扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,1/3,1/4,1/5,1/6,1/7,1/8,1/9或1/10。
可选地,扩展因子用于指示扩展资源的长度与非扩展资源的长度之间的比值,扩展因子的取值包括:1,1/2,1/3,1/4,1/5,1/6,1/7,1/8或1/9。
可选地,扩展因子用于指示非扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,2/3,3/4,4/5,5/6,6/7,7/8,8/9或9/10。
上述扩展因子能够适应更多种类的总资源,使得基于更多种类的总资源计算得到的非扩展资源的长度满足上述约束条件#1,且计算量较小。例如,扩展因子用于指示扩展资源的长度与频谱扩展后的总资 源的长度之间的比值,扩展因子为1/5时,总资源除以5即可计算出扩展资源的长度,而如果扩展因子为2/5,则还需要进行额外的乘法运算,增加了计算量。
可选地,扩展因子用于指示扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,1/3,1/4,1/5,1/6,1/7,3/8,1/9或1/10。
可选地,扩展因子用于指示扩展资源的长度与非扩展资源的长度之间的比值,扩展因子的取值包括:1,1/2,1/3,1/4,1/5,1/6,3/5,1/8或1/9。
可选地,扩展因子用于指示非扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,2/3,3/4,4/5,5/6,6/7,5/8,8/9或9/10。
上述扩展因子能够适应更多种类的总资源,使得基于更多种类的总资源计算得到的非扩展资源的长度满足上述约束条件#2或约束条件#3,换言之,在更多种类的总资源下,无需对计算出的非扩展资源进行调整,例如,无需进行取整操作,将计算得到的非扩展资源作为第一非扩展资源,即可满足K=2a*3b*5c或者K’=2a*3b*5c。该总资源可以为分配资源,也可以为,第一总资源。
下面以扩展因子用于指示扩展资源与频谱扩展后的总资源之间的比值为例进行说明。
例如,扩展因子为1/5,这样,在总资源的长度为5的倍数(如分配资源中的RB的数量为5,10,15,20…270等)的情况下,计算得到的非扩展资源的长度均可以满足上述约束条件#2或约束条件#3。计算得到的非扩展资源的长度可以作为第一非扩展资源的长度。
再如,扩展因子为1/6,这样,在总资源的长度为6的倍数(如分配资源中的RB的数量为6,12,18,24…270等)的情况下,计算得到的非扩展资源的长度均可以满足上述约束条件#2或约束条件#3。计算得到的非扩展资源的长度可以作为第一非扩展资源的长度。
再如,扩展因子为1/9,这样,在总资源的长度为9的倍数(如分配资源中的RB的数量为9,18,27,36…270等)的情况下,计算得到的非扩展资源的长度均可以满足上述约束条件#2或约束条件#3。计算得到的非扩展资源的长度可以作为第一非扩展资源的长度。
应理解,以上仅为示例,扩展因子还可以为其他值,例如,在扩展因子用于指示扩展资源与频谱扩展后的总资源之间的比值的情况下,扩展因子还可以为1/11,2/11,3/11,2/5,3/7,4/9,2/7或5/11等。
第一总资源基于分配资源。
在分配资源的长度满足约束条件的情况下,终端设备可以将分配资源作为实际使用的第一总资源。在分配资源的长度不满足约束条件的情况下,终端设备可以基于条件约束和分配资源的长度确定实际使用的总资源的长度。
换言之,在分配资源的长度不满足约束条件的情况下,终端设备不直接将分配资源作为实际使用的第一总资源,而是基于约束条件和分配资源确定实际使用的第一总资源。
示例性地,步骤750可以包括:生成第一DMRS序列。第一DMRS序列的长度与第一总资源的长度对应。
第一DMRS序列可以以梳状结构占用J个RB。
DMRS序列包含的元素的个数可以称为DMRS的长度。第一DMRS序列的长度为J’=J*6。
可选地,第一DMRS序列可以是第一时域序列经过DFT操作后得到的。
第一DMRS序列占用的RB的数量可以满足2a*3b*5c,例如,J=2a*3b*5c。或者,第一DMRS序列的长度可以满足2a*3b*5c,例如,J’=2a*3b*5c
示例性地,第一时域序列可以为基于-BPSK调制的时域序列或8PSK调制的时域序列。
这样,第一DMRS序列的长度能够满足2a*3b*5c要求,对于满足2a*3b*5c要求的第一DMRS序列,终端设备可以基于FFT的快速算法实现DFT操作,其基可以为2,3或5中的至少一项,这样可以实现高效的转换,提高数据处理效率,即提高终端设备的处理性能,从而有利于保证终端设备通过频谱扩展的方式实现数据传输,进一步降低信号的PAPR,以增强通信链路的覆盖能力。
此外,在J=2a*3b*5c的情况下,J的值满足协议的要求,这样可以避免与协议发生冲突,同时,减少信令开销。
进一步地,第一DMRS序列占用的RB的数量可以是根据J=2a*3b*5c和分配资源的长度确定的。或者,第一DMRS序列的长度可以是根据J’=2a*3b*5c和分配资源的长度确定的。
这样,第一DMRS序列长度能够在满足2a*3b*5c要求的同时,尽可能使得其占用的资源的长度接近 于网络设备指示的总资源(即分配资源)的长度,有利于提高传输性能。
可替换地,步骤750可以包括:生成第二DMRS序列;基于第二DMRS序列进行扩展,以得到第一DMRS序列。
第二DMRS序列可以以梳状结构占用D个RB。在该情况下,第二DMRS序列的长度为D*6。或者说,第二DMRS序列的长度为D’,即第二DMRS序列占用D’/6个RB。
可选地,第二DMRS序列可以是第二时域序列经过DFT操作后得到的。
第二DMRS序列占用的RB的数量可以满足2a*3b*5c,例如,D=2a*3b*5c。或者,第二DMRS序列的长度可以满足2a*3b*5c,例如,D’=2a*3b*5c
示例性地,第二时域序列可以为基于-BPSK调制的时域序列或8PSK调制的时域序列。
这样,第二DMRS序列的长度能够满足2a*3b*5c要求,对于满足2a*3b*5c要求的第二DMRS序列,终端设备可以基于FFT的快速算法实现DFT操作,其基可以为2,3或5中的至少一项,这样可以实现高效的转换,提高数据处理效率,即提高终端设备的处理性能,从而有利于保证终端设备通过频谱扩展的方式实现数据传输,进一步降低信号的PAPR,以增强通信链路的覆盖能力。
此外,在D=2a*3b*5c的情况下,D的值满足协议的要求,这样可以避免与协议发生冲突,同时,减少信令开销。
进一步地,第二DMRS序列的长度可以是根据上述条件以及基于分配资源和扩展因子计算的非扩展资源的长度确定的。
这样,第二DMRS序列的长度能够在满足2a*3b*5c要求的同时,使得其占用的资源的长度尽可能接近网络设备指示的非扩展资源的长度,有利于提高传输性能。
或者,若第一非扩展资源满足K=2a*3b*5c,可以将K作为D,或者,将K*6作为D’。
这样,第二DMRS序列的长度能够在满足2a*3b*5c要求的同时,尽可能与网络设备指示的非扩展资源的长度对应,有利于提高传输性能。此外,该方式能够减少计算量。
可选地,第二DMRS序列可以基于ZC序列或第一频域序列得到的。第二DMRS序列的长度可以满足如下条件:在D’大于或等于30的情况下,D’为大于或等于30的最小素数;D’小于30的情况下,D’为6,12,18或24。
示例性地,第一频域序列可以为未经过DFT操作得到的频域序列,或者也可以是由时域序列经过DFT操作得到的频域序列。
例如,第一频域序列可以为QSPK调制的频域序列,该频域序列的生成过程不包括DFT操作。或者,第一频域序列可以为π/2-BPSK调制的时域序列经过DFT操作后得到的频域序列。
这样,第二DMRS序列的长度能够满足协议要求,有利于保证终端设备通过频谱扩展的方式实现数据传输,进一步降低信号的PAPR,以增强通信链路的覆盖能力。
下面分别以两种情况(情况1和情况2)对配置方式1进行说明。
在情况1中,第一DMRS序列是基于时域序列经过DFT操作后得到的频域序列确定的。
在情况2中,第一DMRS序列是基于ZC序列或其他频域序列得到的。
情况1:
在一种可能的实现方式中,步骤950包括:生成第一DMRS序列。
换言之,终端设备可以直接生成占用第一总资源的长度的第一DMRS序列。第一DMRS序列的生成过程中没有经过扩展操作。
在另一种可能的实现方式中,步骤950包括:生成第二DMRS序列;基于第二DMRS序列进行扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列。
换言之,第一DMRS序列的生成过程中包括扩展操作。
可选地,基于第二DMRS序列进行扩展,以得到第一DMRS序列,包括:基于第二DMRS序列进行循环扩展,以得到第一DMRS序列。
下面分别结合两个示例(示例1和示例2)对本申请实施例的方案进行说明。
在示例1中,第一DMRS序列的生成过程中没有经过扩展操作。
在示例2中,第一DMRS序列的生成过程中包括扩展操作。
示例1:
在示例1中,第一DMRS序列是第一时域序列经过DFT操作后得到的。
例如,第一时域序列可以为基于-BPSK调制的时域序列或8PSK调制的时域序列。为了便于理解,在示例1中以-BPSK调制的时域序列或8PSK调制的时域序列为例进行说明,不对本申请实施例的方案构成限定。第一时域序列还可以为其他时域序列。
在第一DMRS序列的长度为6时,对8PSK调制的时域序列执行DFT操作,以得到长度为6的DMRS序列,即第一DMRS序列。具体描述可以参见前文中的表1及其相关描述。
在第一DMRS序列的长度为6以外的其他值时,对-BPSK调制的时域序列执行DFT操作,以得到对应长度的DMRS序列,即第一DMRS序列。
示例性地,在第一DMRS序列的长度大于或等于30时,对-BPSK调制的时域gold序列执行DFT操作,以得到对应长度的DMRS序列,即第一DMRS序列。
示例性地,在第一DMRS序列的长度为12,18或24时,对计算机搜索得到的-BPSK调制的时域序列执行DFT操作,以得到对应长度的DMRS序列,即第一DMRS序列。具体描述可以参见前文中的表2至表4及其相关描述。
如上所述,第一DMRS序列是经过DFT操作后得到的。第一DMRS序列的长度与总资源的长度对应。终端设备可以基于约束条件#2调整总资源(即分配资源)的长度,或者说,基于约束条件#3确定第一DMRS序列的长度。
下面对第一总资源进行说明。
第一DMRS序列可以占用J个RB,即第一总资源包括J个RB。
其中,第一DMRS序列可以以梳状结构占用J个RB。在该情况下,第一DMRS序列的长度J’=J*6。
在约束条件包括约束条件#2的情况下,第一DMRS序列占用的RB的数量,即第一总资源中的RB的数量满足2a*3b*5c
在约束条件包括约束条件#3的情况下,第一DMRS序列的长度满足2a*3b*5c
可选地,J为满足J=2a*3b*5c的整数中小于或等于L的最大整数.
可选地,J’为满足J’=2a*3b*5c的整数中小于或等于L*6的最大整数。
a,b和c为非负整数,L为分配资源中的RB的数量。
在本申请实施例中,L为正数。
如前所述,待传输数据是经过DFT操作后得到的。终端设备可以基于约束条件#2或约束条件#3调整非扩展资源的长度,使得第一非扩展资源的长度满足约束条件#2或约束条件#3。
下面对第一非扩展资源进行说明。
第一非扩展资源包括K个RB。即待传输数据占用K个RB,或者说,占用K’个RE。
示例性地,K可以是根据上述约束条件#2确定的。即第一非扩展资源中的RB的数量满足2a*3b*5c。或者K’可以是根据上述约束条件#3确定的,即第一非扩展资源中的RE的数量满足2a*3b*5c
示例性地,终端设备可以根据约束条件#2对基于分配资源和扩展因子计算得到的非扩展资源的长度进行调整,以得到K。
可替换地,终端设备可以根据约束条件#3对基于分配资源和扩展因子计算得到的非扩展资源的长度进行调整,以得到K’。
K1为第二非扩展资源(第四资源的一例)中的RB的数量,第二非扩展资源是基于分配资源和扩展因子计算得到的。
需要说明的是,在本申请实施例中,K1为正数。K1是通过计算得到的,可能为整数,也可以为非整数,本申请实施例对此不做限定。
例如,扩展因子alpha用于表示扩展资源相对总资源的比例。在该情况下,K1=L*(1-alpha)。L为分配资源中的RB的数量。
可选地,K满足以下任一项:
K为满足K=2a*3b*5c的整数中小于或等于K1的最大整数;
K为满足K=2a*3b*5c的整数中距离K1最近的整数;或者
K为满足K=2a*3b*5c的整数中大于或等于K1的最小整数。
可选地,K’满足以下任一项:
K’为满足K’=2a*3b*5c的整数中距离K1*12最近的整数;
K’为满足K’=2a*3b*5c的整数中小于或等于K1*12的最大整数;或者,
K’为满足K’=2a*3b*5c的整数中大于或等于K1*12的最小整数。
其中,a,b和c为非负整数。
示例性地,终端设备可以根据约束条件#2对基于第一总资源和扩展因子计算得到的非扩展资源的长度进行调整,以得到K。
示例性地,终端设备可以根据约束条件#3对基于第一总资源和扩展因子计算得到的非扩展资源的长度进行调整,以得到K’。
K2为第三非扩展资源(第五资源的一例)中的RB的数量,第三非扩展资源是基于第一总资源和扩展因子计算得到的。
需要说明的是,在本申请实施例中,K2为正数。K2是通过计算得到的,可能为整数,也可以为非整数,本申请实施例对此不做限定。
例如,扩展因子alpha用于表示扩展资源相对总资源的比例。在该情况下,K2=J*(1-alpha)。J为前述确定的第一总资源中的RB的数量。
可选地,K满足以下任一项:
K为满足K=2a*3b*5c的整数中小于或等于K2的最大整数;
K为满足K=2a*3b*5c的整数中距离K2最近的整数;或者
K为满足K=2a*3b*5c的整数中大于或等于K2的最小整数。
可选地,K’满足以下任一项:
K’为满足K’=2a*3b*5c的整数中小于或等于K2*12的最大整数;
K’为满足K’=2a*3b*5c的整数中距离K2*12最近的整数;或者
K’为满足K’=2a*3b*5c的整数中大于或等于K2*12的最小整数。
其中,a,b和c为非负整数。
下面对数据扩展方式进行说明。
可选地,步骤940可以包括:将占用K个RB的待传输数据循环扩展为占用J个RB的扩展后的数据。
具体扩展方式可以参考前文中步骤940或步骤740的相关描述,此处不再赘述。
下面对获取第一DMRS序列的方式进行说明。
可选地,步骤950可以包括:生成占用J个RB的DMRS序列,即第一DMRS序列。
示例2:
在示例2中,第一DMRS序列是通过对第二DMRS序列进行扩展操作后得到的。
第二DMRS序列是第二时域序列经过DFT操作后得到的。
示例性地,第二时域序列可以为基于-BPSK调制的时域序列或8PSK调制的时域序列。
为了便于理解,在示例2中主要以-BPSK调制的时域序列或8PSK调制的时域序列为例进行说明,不对本申请实施例的范围构成限定。第二时域序列还可以为其他时域序列。
在第二DMRS序列的长度为6时,对8PSK调制的时域序列执行DFT操作,以得到长度为6的DMRS序列,即第二DMRS序列。具体描述可以参见前文中的表1及其相关描述。
在第二DMRS序列的长度为6以外的其他值时,对-BPSK调制的时域序列执行DFT操作,以得到对应长度的DMRS序列,即第二DMRS序列。
示例性地,在第二DMRS序列的长度大于或等于30时,对-BPSK调制的时域gold序列执行DFT操作,以得到对应长度的DMRS序列,即第二DMRS序列。
示例性地,在第二DMRS序列的长度为12,18或24时,对计算机搜索得到的-BPSK调制的时域序列执行DFT操作,以得到对应长度的DMRS序列,即第二DMRS序列。具体描述可以参见前文中的表2至表4及其相关描述。
如上所述,第二DMRS序列是经过DFT操作后得到的。终端设备可以基于约束条件#2确定第二DMRS序列占用的资源,或者,基于约束条件#3确定第二DMRS序列的长度。
下面对第一总资源进行说明。
终端设备可以基于约束条件1#确定第一总资源的长度。
通常分配资源中的RB的数量L为正整数。该情况下,分配资源可以作为第一总资源。第一总资源的长度即为分配资源的长度。第一总资源包括J个RB,分配资源包括L个RB。J等于L。
下面对第一非扩展资源进行说明。
第一非扩展资源包括K个RB。即待传输数据占用K个RB,或者说,占用K’个RE。
示例性地,K可以是根据上述约束条件#2确定的。即第一非扩展资源中的RB的数量满足2a*3b*5c。或者K’可以是基于上述约束条件#3确定的,即第一非扩展资源中的RE的数量满足2a*3b*5c
示例性地,终端设备可以根据约束条件#2或约束条件#3对基于分配资源(第一总资源)和扩展因子计算得到的非扩展资源的长度进行调整。在示例2中,分配资源与第一总资源相同。
K1为第二非扩展资源(第四资源的一例)中的RB的数量,第二非扩展资源是基于分配资源和扩展因子计算得到的。
例如,扩展因子alpha用于表示扩展资源相对总资源的比例。在该情况下,K1=L*(1-alpha)。L为分配资源中的RB的数量。
可选地,K满足以下任一项:
K为满足K=2a*3b*5c的整数中小于或等于K1的最大整数;
K为满足K=2a*3b*5c的整数中距离K1最近的整数;或者
K为满足K=2a*3b*5c的整数中大于或等于K1的最小整数。
其中,a,b和c为非负整数。
可选地,K’满足以下任一项:
K’为满足K’=2a*3b*5c的整数中小于或等于K1*12的最大整数;
K’为满足K’=2a*3b*5c的整数中距离K1*12最近的整数;或者,
K’为满足K’=2a*3b*5c的整数中大于或等于K1*12的最小整数。
其中,a,b和c为非负整数。
上述K1也可以替换为示例1中的K2,在示例2中,示例1中的第二非扩展资源和第三非扩展资源相同,相应地,K1=K2。
下面对第二DMRS序列进行说明。
第二DMRS序列占用D个RB。其中,第二DMRS序列可以以梳状结构占用D个RB。在该情况下,第二DMRS序列的长度为D*6。或者说,第二DMRS序列的长度为D’,即第二DMRS序列占用D’/6个RB。
在约束条件包括约束条件#2的情况下,第二DMRS序列占用的RB的数量,即第二总资源中的RB的数量满足2a*3b*5c
在约束条件包括约束条件#3的情况下,第二DMRS序列的长度满足2a*3b*5c
示例性地,终端设备可以根据约束条件#2以及基于分配资源和扩展因子计算得到的非扩展资源的长度确定D。
可替换地,终端设备可以根据约束条件#3以及基于分配资源和扩展因子计算得到的非扩展资源的长度确定D’。
K1为第二非扩展资源(第四资源的一例)中的RB的数量,第二非扩展资源是基于分配资源和扩展因子计算得到的。
例如,扩展因子alpha用于表示扩展资源相对总资源的比例。在该情况下,K1=L*(1-alpha)。L为分配资源中的RB的数量。
可选地,D满足以下任一项:
D为满足D=2a*3b*5c的整数中小于或等于K1的最大整数;
D为满足D=2a*3b*5c的整数中距离K1最近的整数;或者
D为满足D=2a*3b*5c的整数中大于或等于K1的最小整数。
a,b和c为非负整数。
可选地,D=K。即第二DMRS序列的长度与第一非扩展资源的长度对应,这样可以减少计算量。
可选地,D’满足以下任一项:
D’=K*6;
D’为满足D’=2a*3b*5c的整数中小于或等于K1*6的最大整数;
D’为满足D’=2a*3b*5c的整数中距离K1*6最近的整数;或者
D’为满足D’=2a*3b*5c的整数中大于或等于K1*6的最小整数。
a,b和c为非负整数。
下面对数据扩展方式进行说明。
可选地,步骤940可以包括:将占用K个RB的待传输数据循环扩展为占用J个RB的扩展后的数据。在示例2中,J=L。
具体扩展方式可以参考前文步骤940或步骤740的相关描述,此处不再赘述。
下面对获取第一DMRS序列的方式进行说明。
可选地,步骤950可以包括:生成占用D个RB的DMRS序列,即第二DMRS序列;对第二DMRS序列循环扩展为占用J个RB的DMRS序列,即第一DMRS序列。
可选地,步骤950可以包括:生成长度为D’的DMRS序列,即第二DMRS序列;对第二DMRS序列循环扩展为占用J个RB的DMRS序列,即第一DMRS序列。
情况2
步骤950包括:生成第二DMRS序列;基于第二DMRS序列进行扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列。
可选地,基于第二DMRS序列进行扩展,以得到第一DMRS序列,包括:基于第二DMRS序列进行循环扩展,以得到第一DMRS序列。
第一DMRS序列是通过对第二DMRS序列进行扩展操作后得到的。
在情况2中,第二DMRS序列可以是ZC序列或第一频域序列。
示例性地,第一频域序列可以为未经过DFT操作得到的频域序列,或者也可以是由时域序列经过DFT操作得到的频域序列。
例如,第一频域序列可以为QSPK调制的频域序列,该频域序列的生成过程不包括DFT操作。或者,第一频域序列可以为π/2-BPSK调制的时域序列经过DFT操作后得到的频域序列。
在情况2中主要以ZC序列或QPSK调制的频域序列为例进行说明,不对本申请实施例的方案构成限定。
在第二DMRS序列的长度大于或等于36时,生成对应长度的ZC序列,即第二DMRS序列。具体描述可以参考前文。
在第二DMRS序列的长度为30时,生成长度为31的ZC序列,即第二DMRS序列。具体描述可以参考前文。
在第二DMRS序列的长度为6,12,18或24时,生成对应长度的QPSK调制的频谱序列,即第二DMRS序列。具体描述可以参考前文中的表5至表8及其相关描述。
在情况2中,第二DMRS序列的生成过程不经过DFT。
下面对第一总资源进行说明。
终端设备可以基于约束条件1#确定第一总资源的长度。
通常分配资源中的RB的数量L为正整数。该情况下,分配资源可以作为第一总资源。第一总资源的长度即为分配资源的长度。第一总资源包括J个RB,分配资源包括L个RB。J等于L。
下面对第一非扩展资源进行说明。
第一非扩展资源包括K个RB。即待传输数据占用K个RB,或者说,占用K’个RE。
示例性地,K可以是根据上述约束条件#2确定的。即第一非扩展资源中的RB的数量满足2a*3b*5c。或者K’可以是根据上述约束条件#3确定的,即第一非扩展资源中的RE的数量满足2a*3b*5c
示例性地,终端设备可以根据约束条件#2或约束条件#3对基于分配资源(第一总资源)和扩展因子计算得到的非扩展资源的长度进行调整。在情况2中,分配资源与第一总资源相同。
K1为第二非扩展资源(第四资源的一例)中的RB的数量,第二非扩展资源是基于分配资源和扩展因子计算得到的。
例如,扩展因子alpha用于表示扩展资源相对总资源的比例。在该情况下,K1=L*(1-alpha)。L为分配资源中的RB的数量。
可选地,K满足以下任一项:
K为满足K=2a*3b*5c的整数中小于或等于K1的最大整数;
K为满足K=2a*3b*5c的整数中距离K1最近的整数;或者
K为满足K=2a*3b*5c的整数中大于或等于K1的最小整数。
其中,a,b和c为非负整数。
可选地,K’满足以下任一项:
K’为满足K’=2a*3b*5c的整数中小于或等于K1*12的最大整数;
K’为满足K’=2a*3b*5c的整数中距离K1*12最近的整数;或者,
K’为满足K’=2a*3b*5c的整数中大于或等于K1*12的最小整数。
其中,a,b和c为非负整数。
上述K1也可以替换为前文中的示例1中的K2,在情况2中,示例1中的第二非扩展资源和第三非扩展资源相同,相应地,K1=K2。
下面对第二DMRS序列进行说明。
第二DMRS序列占用D个RB,即第二DMRS序列的长度为D*6。
或者说,第二DMRS序列的长度为D’,即第二DMRS序列占用D’/6个RB。
可选地,在K1≥5的情况下,D’为大于或等于K1*6的最小素数。
可选地,在K1<5的情况下,D满足以下任一项:
D=K;
D为小于K1的最大整数,或者
D为距离K1最近的整数。
K1为第二非扩展资源(第四资源的一例)中的RB的数量,第二非扩展资源是基于分配资源和扩展因子计算得到的。
示例性地,扩展因子alpha用于表示扩展资源相对总资源的比例。在该情况下,K1=L*(1-alpha)。L为分配资源中的RB的数量。
下面对数据扩展方式进行说明。
可选地,步骤940可以包括:将占用K个RB的待传输数据循环扩展为占用J个RB的扩展后的数据。在情况2中,J=L。
具体扩展方式可以参考前文中步骤940或步骤740的相关描述,此处不再赘述。
下面对获取第一DMRS序列的方式进行说明。
可选地,步骤950可以包括:生成占用D个RB的DMRS序列,即第二DMRS序列;对第二DMRS序列循环扩展为占用J个RB的DMRS序列,即第一DMRS序列。
例如,在K1<5的情况下,生成占用D个RB的QPSK调制的频域序列,即第二DMRS序列。
可选地,步骤950可以包括:生成长度为D’的DMRS序列,即第二DMRS序列;对第二DMRS序列循环扩展为占用J个RB的DMRS序列,即第一DMRS序列。
例如,在K1≥5的情况下,生成长度为D’的ZC序列,即第二DMRS序列。
配置方式2:
图10示出了本申请实施例的一种通信方法1000,方法1000可以视为方法700的一种具体实现方式,方法1000包括如下步骤。
1010,终端设备接收网络设备发送的第一指示信息。第一指示信息指示网络设备分配的分配资源。该分配资源为用于承载待传输数据的资源。
1020,终端设备根据分配资源和扩展因子确定第一总资源。扩展因子用于指示频谱扩展的比例。
1030,终端设备基于第一总资源与网络设备进行通信。第一非扩展资源上承载待传输数据。第一总 资源为经过频谱扩展后的资源。第一总资源包括第一非扩展资源。
可选地,方法1000还包括步骤1040(图中未示出):基于待传输数据进行扩展,以得到扩展后的数据,扩展后的数据包括待传输数据,第一总资源上承载扩展后的数据。
可选地,方法1000还包括步骤1050(图中未示出):获取第一DMRS序列。第一DMRS序列的长度与第一总资源的长度对应。
分配资源为网络设备分配的非扩展资源,即网络设备分配的用于承载待传输数据的资源。
第一非扩展资源基于分配资源。
在分配资源的长度满足约束条件的情况下,终端设备可以将分配资源作为实际使用的第一非扩展资源。在分配资源的长度不满足约束条件的情况下,终端设备可以基于条件约束和分配资源的长度确定实际使用的第一非扩展资源的长度。
换言之,在分配资源的长度不满足约束条件的情况下,终端设备不直接将分配资源作为实际使用的第一非扩展资源,而是基于约束条件和分配资源确定实际使用的第一非扩展资源。
第一非扩展资源包括K个RB。即待传输数据占用K个RB,或者说,占用K’个RE。
示例性地,K可以是根据上述约束条件#2确定的。
可替换地,示例性地,K’可以是根据上述约束条件#3确定的。
可选地,第一非扩展资源中的RB的数量满足2a*3b*5c,例如,K=2a*3b*5c。或者,第一非扩展资源中的RE的数量满足2a*3b*5c,例如,K’=2a*3b*5c
在本申请实施例的方案中,第一非扩展资源承载的待传输数据可以是经过DFT操作得到的,DFT操作可以是基于FFT的快速算法实现的,其基为2,3或5中的至少一项,对于满足2a*3b*5c条件的待传输数据终端设备可以基于上述DFT操作实现高效的转换,提高数据处理效率,即提高终端设备的处理性能,从而有利于保证终端设备通过频谱扩展的方式实现数据传输,降低信号的PAPR,以增强通信链路的覆盖能力。
此外,在K=2a*3b*5c的情况下,K的值满足协议的要求,这样可以避免与协议发生冲突,同时,减少信令开销。
在一种可能的实现方式中,第一非扩展资源的长度可以通过如下方式确定。
示例性地,第一非扩展资源的长度可以是根据K=2a*3b*5c或者K’=2a*3b*5c对分配资源的长度进行调整得到的。
这样,第一非扩展资源中的RB能够在满足2a*3b*5c要求的同时,尽可能接近网络设备分配的非扩展资源的长度,有利于提高传输性能。
在一种可能的实现方式中,扩展因子可以满足如下条件。
可选地,扩展因子用于指示扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,1/3,1/4,1/5,1/6,1/7,1/8,3/8,1/9或1/10。
可选地,扩展因子用于指示扩展资源的长度与非扩展资源的长度之间的比值,扩展因子的取值包括:1,1/2,1/3,1/4,1/5,1/6,1/7,3/5,1/8或1/9。
可选地,扩展因子用于指示非扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,2/3,3/4,4/5,5/6,6/7,7/8,5/8,8/9或9/10。
上述扩展因子能够以较小的资源开销实现较好的波形PAPR性能提升,即在占用较少的额外的频谱资源的同时,降低信号的PAPR,以增强通信链路的覆盖能力。具体描述可以参考前文,此处不再赘述。
可选地,扩展因子用于指示扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,1/3,1/4,1/5,1/6,1/7,1/8,1/9或1/10。
可选地,扩展因子用于指示扩展资源的长度与非扩展资源的长度之间的比值,扩展因子的取值包括:1,1/2,1/3,1/4,1/5,1/6,1/7,1/8或1/9。
可选地,扩展因子用于指示非扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,2/3,3/4,4/5,5/6,6/7,7/8,8/9或9/10。
上述扩展因子能够适应更多长度的非扩展资源,即使得基于更多长度的非扩展资源计算得到的总资源的长度能够满足上述约束条件#1,换言之,若总资源的长度仅需满足约束条件#1,则无需对计算出的总资源进行调整,例如,无需进行取整操作,可以将计算出的资源作为第一总资源。
可选地,扩展因子用于指示扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的 取值包括:1/2,1/3,1/4,1/5,1/6,1/7,3/8,1/9或1/10。
可选地,扩展因子用于指示扩展资源的长度与非扩展资源的长度之间的比值,扩展因子的取值包括:1,1/2,1/3,1/4,1/5,1/6,3/5,1/8或1/9。
可选地,扩展因子用于指示非扩展资源的长度与频谱扩展后的总资源的长度之间的比值,扩展因子的取值包括:1/2,2/3,3/4,4/5,5/6,6/7,5/8,8/9或9/10。
上述扩展因子能够适应更多长度的非扩展资源,在非扩展资源的长度满足上述约束条件#2或约束条件#3的情况下,计算得到的总资源的长度满足上述约束条件#1的可能性更高,换言之,若总资源的长度仅需满足约束条件#1,则无需对计算出的总资源进行调整,例如,无需进行取整操作,可以将计算出的资源作为第一总资源。
应理解,以上仅为示例,扩展因子还可以为其他值,具体描述可以参考配置方式1。
下面分别以两种情况(情况3和情况4)对配置方式2进行说明。
在情况3中,第一DMRS序列是基于时域序列经过DFT操作后得到的频域序列确定的。
在情况4中,第一DMRS序列是基于ZC序列或其他频域序列得到的。
情况3:
在一种可能的实现方式中,步骤1050包括:生成第一DMRS序列。
换言之,终端设备可以直接生成占用第一总资源的长度的第一DMRS序列。第一DMRS序列的生成过程中没有经过扩展操作。
在另一种可能的实现方式中,步骤1050包括:生成第二DMRS序列;基于第二DMRS序列进行扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列。
换言之,第一DMRS序列的生成过程中包括扩展操作。
可选地,基于第二DMRS序列进行扩展,以得到第一DMRS序列,包括:基于第二DMRS序列进行循环扩展,以得到第一DMRS序列。
下面分别结合两个示例(示例3和示例4)对本申请实施例的方案进行说明。
在示例3中,第一DMRS序列的生成过程中没有经过扩展操作。
在示例4中,第一DMRS序列的生成过程中包括扩展操作。
示例3:
在示例3中,第一DMRS序列是第一时域序列经过DFT操作后得到的。
例如,第一时域序列可以为基于-BPSK调制的时域序列或8PSK调制的时域序列。为了便于理解,在示例3中以-BPSK调制的时域序列或8PSK调制的时域序列为例进行说明,不对本申请实施例的方案构成限定。第一时域序列还可以为其他时域序列。
在第一DMRS序列的长度为6时,对8PSK调制的时域序列执行DFT操作,以长度为6的DMRS序列,即第一DMRS序列。具体描述可以参见前文中的表1及其相关描述。
在第一DMRS序列的长度为6以外的其他值时,对-BPSK调制的时域序列执行DFT操作,以得到对应长度的DMRS序列,即第一DMRS序列。
示例性地,在第一DMRS序列的长度大于或等于30时,对-BPSK调制的时域gold序列执行DFT操作,以得到对应长度的DMRS序列,即第一DMRS序列。
示例性地,在第一DMRS序列的长度为12,18或24时,对计算机搜索得到的-BPSK调制的时域序列执行DFT操作,以得到对应长度的DMRS序列,即第一DMRS序列。具体描述可以参见前文中的表2至表4及其相关描述。
如上所述,第一DMRS序列是经过DFT操作后得到的。第一DMRS序列的长度与总资源的长度对应。终端设备可以基于约束条件#2调整总资源的长度,或者说,基于约束条件#3确定第一DMRS序列的长度。
下面对第一非扩展资源进行说明。
第一非扩展资源包括K个RB。即待传输数据占用K个RB,或者说,占用K’个RE。
示例性地,K可以是根据上述约束条件#2确定的。即第一非扩展资源中的RB的数量满足2a*3b*5c。或者K’可以是根据上述约束条件#3确定的。即第一非扩展资源中的RE的数量满足2a*3b*5c
示例性地,终端设备可以根据约束条件#2或约束条件#3对基于分配资源的长度进行调整。
可选地,K为满足K=2a*3b*5c的整数中小于或等于L的最大整数。
可选地,K’为满足K’=2a*3b*5c的整数中小于或等于L*12的最大整数;
其中,a,b和c为非负整数,L为分配资源中的RB的数量。
若分配资源的长度满足上述约束条件#2,则可以将分配资源作为第一非扩展资源,L=K。
应理解,以上仅为示例,K还可以为其他值。
下面对第一总资源进行说明。
第一DMRS序列占用J个RB,即第一总资源包括J个RB。
其中,第一DMRS序列可以以梳状结构占用J个RB。在该情况下,第一DMRS序列的长度为J’=J*6。
在约束条件包括约束条件#2的情况下,第一DMRS序列占用的RB的数量,即第一总资源中的RB的数量满足2a*3b*5c
在约束条件包括约束条件#3的情况下,第一DMRS序列的长度满足2a*3b*5c
示例性地,J可以是根据上述约束条件#2以及基于分配资源和扩展因子计算得到的总资源的长度确定的。
示例性地,终端设备可以根据约束条件#2以及基于分配资源和扩展因子计算得到的总资源的长度确定的。
J1为第三总资源(第六资源的一例)中的RB的数量,第三总资源基于分配资源和扩展因子计算得到。
在本申请实施例中,J1为正数。J1是通过计算得到的,可能为整数,也可能为非整数,本申请实施例对此不做限定。
示例性地,扩展因子alpha用于表示扩展资源相对总资源的比例。在该情况下,J1=L/(1-alpha)。L为分配资源中的RB的数量。
可选地,J满足以下任一项:
J为满足J=2a*3b*5c的整数中大于或等于J1的最小整数;或者
J为满足J=2a*3b*5c的整数中距离J1最近的整数。
可选地,J’满足以下任一项:
J’为满足J’=2a*3b*5c的整数中大于或等于J1*6的最小整数;或者
J’为满足J’=2a*3b*5c的整数中距离J1*6最近的整数。
a,b和c为非负整数。
示例性地,终端设备可以根据约束条件#2以及基于第一非扩展资源和扩展因子计算得到的总资源的长度确定第一总资源中的RB的数量。
示例性地,终端设备可以根据约束条件#3以及基于第一非扩展资源和扩展因子计算得到的总资源的长度确定第一DMRS序列的长度。
J2为第四总资源(第七资源的一例)中的RB的数量,第四总资源基于第一非扩展资源和扩展因子计算得到。
需要说明的是,在本申请实施例中J2为正数。J2是通过计算得到的,可能为整数,也可能为非整数。本申请实施例对此不做限定。
示例性地,扩展因子alpha用于表示扩展资源相对总资源的比例。在该情况下,J2=K/(1-alpha)
可选地,J满足以下任一项:
J为满足J=2a*3b*5c的整数中大于或等于J2的最小整数;或者
J为满足J=2a*3b*5c的整数中距离J2最近的整数。
可选地,J’满足以下任一项:
J’为满足J’=2a*3b*5c的整数中大于或等于J2*6的最小整数;或者
J’为满足J’=2a*3b*5c的整数中距离J2*6最近的整数。
a,b和c为非负整数。
应理解,以上仅为示例,J还可以为其他值。
下面对数据扩展方式进行说明。
可选地,步骤1040可以包括:将占用K个RB的待传输数据循环扩展为占用J个RB的扩展后的数据。
具体扩展方式可以参考前文中步骤1040或步骤740的相关描述,此处不再赘述。
下面对获取第一DMRS序列的方式进行说明。
可选地,步骤1050可以包括:生成占用J个RB的DMRS序列,即第一DMRS序列。
示例4:
在示例4中,第一DMRS序列是通过对第二DMRS序列进行扩展操作后得到的。
第二DMRS序列是第二时域序列经过DFT操作后得到的。
示例性地,第二时域序列可以为基于-BPSK调制的时域序列或8PSK调制的时域序列。
为了便于理解,在示例4中主要以-BPSK调制的时域序列或8PSK调制的时域序列为例进行说明,不对本申请实施例的范围构成限定。第二时域序列还可以为其他时域序列。
在第二DMRS序列的长度为6时,对8PSK调制的时域序列执行DFT操作,以得到长度为6的DMRS序列,即第二DMRS序列。具体描述可以参见前文中的表1及其相关描述。
在第二DMRS序列的长度为6以外的其他值时,对-BPSK调制的时域序列执行DFT操作,以得到对应长度的DMRS序列,即第二DMRS序列。
示例性地,在第二DMRS序列的长度大于或等于30时,对-BPSK调制的时域gold序列执行DFT操作,以得到对应长度的DMRS序列,即第二DMRS序列。
示例性地,在第二DMRS序列的长度为12,18或24时,对计算机搜索得到的-BPSK调制的时域序列执行DFT操作,以得到对应长度的DMRS序列,即第二DMRS序列。具体描述可以参见前文中的表2至表4及其相关描述。
如上所述,第二DMRS序列是经过DFT操作后得到的。终端设备可以基于约束条件#2确定第二DMRS序列占用的资源,或者,基于约束条件#3确定第二DMRS序列的长度。
下面对第一非扩展资源进行说明。
第一非扩展资源包括K个RB。即待传输数据占用K个RB,或者说,占用K’个RE。
示例性地,K可以是根据上述约束条件#2确定的。即第一非扩展资源中的RB的数量满足2a*3b*5c。或者K’可以是根据上述约束条件#3确定的,第一非扩展资源中的RE的数量满足2a*3b*5c
示例性地,K可以是根据上述约束条件#2以及分配资源的长度确定的。
可替换地,K’可以是根据上述约束条件#3以及分配资源的长度确定的。
可选地,K为满足K=2a*3b*5c的整数中小于或等于L的最大整数。
可选地,K’为满足K’=2a*3b*5c的整数中小于或等于L*12的最大整数;
其中,a,b和c为非负整数,L为分配资源中的RB的数量。
若分配资源的长度满足上述约束条件#2,则可以将分配资源作为第一非扩展资源,L=K。
应理解,以上仅为示例,K还可以为其他值。
下面对第一总资源进行说明。
终端设备可以基于约束条件1#确定第一总资源的长度。
第一总资源包括J个RB。
示例性地,J可以是根据上述约束条件#1以及基于分配资源和扩展因子计算得到的总资源的长度确定的。
J1为第三总资源(第六资源的一例)中的RB的数量,第三总资源基于分配资源和扩展因子计算得到。
示例性地,扩展因子alpha用于表示扩展资源相对总资源的比例。在该情况下,J1=L/(1-alpha)。L为分配资源中的RB的数量。
可选地,J满足以下任一条件:
J为大于或等于J1的最小整数,或者
J为距离J1最近的整数。
示例性地,J可以是根据上述约束条件#1以及基于第一非扩展资源和扩展因子计算得到的总资源的长度确定的。
J2为第四总资源(第七资源的一例)中的RB的数量,第四总资源基于第一非扩展资源和扩展因子计算得到。
示例性地,扩展因子alpha用于表示扩展资源相对总资源的比例。在该情况下,J2=K/(1-alpha)。
可选地,J满足以下任一条件:
J为大于或等于J2的最小整数,或者
J为距离J2最近的整数。
应理解,以上仅为示例,J还可以为其他值。
下面对第二DMRS序列进行说明。
如前所述,第二DMRS序列是经过DFT操作后得到的。终端设备可以基于约束条件#2调整第二DMRS序列占用的资源的长度,使得第二DMRS序列占用的资源的长度满足约束条件#2。或者,终端设备可以基于约束条件#3调整第二DMRS序列的长度,使得第二DMRS序列的长度满足约束条件#3。
第二DMRS序列占用D个RB。其中,第二DMRS序列可以以梳状结构占用D个RB。在该情况下,第二DMRS序列的长度为D*6。或者说,第二DMRS序列的长度为D’,即第二DMRS序列占用D’/6个RB。
在约束条件包括约束条件#2的情况下,第二DMRS序列占用的RB的数量,即第二总资源中的RB的数量满足2a*3b*5c
在约束条件包括约束条件#3的情况下,第二DMRS序列的长度满足2a*3b*5c
可选地,D=K。即第二DMRS序列的长度与第一非扩展资源的长度对应,这样可以减少计算量。
示例性地,D可以是根据上述约束条件#2和分配资源的长度确定的。
可选地,D满足以下任一项:
D为满足D=2a*3b*5c的整数中小于或等于L的最大整数,或者
D为满足D=2a*3b*5c的整数中距离L最近的整数。
a,b和c为非负整数,L为分配资源中的RB的数量。
示例性地,D’可以是根据上述约束条件#3和分配资源的长度确定的。
可选地,D’满足以下任一项:
D’为满足D’=2a*3b*5c的整数中小于或等于L*6的最大整数;或者
D’为满足D’=2a*3b*5c的整数中距离L*6最近的整数。
其中,a,b和c为非负整数,L为分配资源中的RB的数量。
下面对数据扩展方式进行说明。
可选地,步骤1040可以包括:将占用K个RB的待传输数据循环扩展为占用J个RB的扩展后的数据。
具体扩展方式可以参考前文中步骤1040或步骤740的相关描述,此处不再赘述。
下面对获取第一DMRS序列的方式进行说明。
可选地,步骤1050可以包括:生成占用D个RB的DMRS序列,即第二DMRS序列;对第二DMRS序列循环扩展为占用J个RB的DMRS序列,即第一DMRS序列。
可选地,步骤1050可以包括:生成长度为D’的DMRS序列,即第二DMRS序列;对第二DMRS序列循环扩展为占用J个RB的DMRS序列,即第一DMRS序列。
情况4
步骤1050包括:生成第二DMRS序列;基于第二DMRS序列进行扩展,以得到第一DMRS序列,第一DMRS序列包括第二DMRS序列。
可选地,基于第二DMRS序列进行扩展,以得到第一DMRS序列,包括:基于第二DMRS序列进行循环扩展,以得到第一DMRS序列。
第一DMRS序列是通过对第二DMRS序列进行扩展操作后得到的。
第一DMRS序列是通过对第二DMRS序列进行扩展操作后得到的。
在情况2中,第二DMRS序列可以是ZC序列或第一频域序列。
示例性地,第一频域序列可以为未经过DFT操作得到的频域序列,或者也可以是由时域序列经过DFT操作得到的频域序列。
例如,第一频域序列可以为QSPK调制的频域序列,该频域序列的生成过程不包括DFT操作。或者,第一频域序列可以为π/2-BPSK调制的时域序列经过DFT操作后得到的频域序列。
在情况4中主要以ZC序列或QPSK调制的频域序列为例进行说明,不对本申请实施例的方案构成限定。
在第二DMRS序列的长度36时,生成对应长度的ZC序列,即第二DMRS序列。具体描述可以参考前文。
在第二DMRS序列的长度30时,生成长度为31的ZC序列,即第二DMRS序列。具体描述可以参考前文。
在第二DMRS序列的长度为6,12,18或24时,生成对应长度的QPSK调制的频谱序列,即第二DMRS序列。具体描述可以参考前文中的表5至表8及其相关描述。
在情况4中,第二DMRS序列的生成过程不经过DFT。
下面对第一非扩展资源进行说明。
第一非扩展资源包括K个RB。即待传输数据占用K个RB,或者说,占用K’个RE。
示例性地,K可以是根据上述约束条件#2确定的。即第一非扩展资源中的RB的数量满足2a*3b*5c。或者,K’可以是根据上述约束条件#3确定的,即第一非扩展资源中的RE的数量满足2a*3b*5c
示例性地,K可以是根据上述约束条件#2以及分配资源的长度确定的。
示例性地,K’可以是根据上述约束条件#3以及分配资源的长度确定的。
可选地,K为满足K=2a*3b*5c的整数中小于或等于L的最大整数。
可选地,K’为满足K’=2a*3b*5c的整数中小于或等于L*12的最大整数;
其中,a,b和c为非负整数,L为分配资源中的RB的数量。
若分配资源的长度满足上述约束条件#2,则可以将分配资源作为第一非扩展资源,L=K。
应理解,以上仅为示例,K还可以为其他值。
下面对第一总资源进行说明。
终端设备可以基于约束条件1#确定第一总资源的长度。
第一总资源包括J个RB。
示例性地,J可以是根据上述约束条件#1以及基于分配资源和扩展因子计算得到的总资源的长度确定的。
J1为第三总资源(第六资源的一例)中的RB的数量,第三总资源基于分配资源和扩展因子计算得到。
示例性地,扩展因子alpha用于表示扩展资源相对总资源的比例。在该情况下,J1=L/(1-alpha)。L为分配资源中的RB的数量。
可选地,J满足以下任一条件:
J为大于或等于J1的最小整数,或者
J为距离J1最近的整数。
示例性地,J可以是根据上述约束条件#1以及基于第一非扩展资源和扩展因子计算得到的总资源的长度确定的。
J2为第四总资源(第七资源的一例)中的RB的数量,第四总资源基于第一非扩展资源和扩展因子计算得到。
示例性地,扩展因子alpha用于表示扩展资源相对总资源的比例。在该情况下,J2=K/(1-alpha)。
可选地,J满足以下任一条件:
J为大于或等于J2的最小整数,或者
J为距离J2最近的整数。
应理解,以上仅为示例,J还可以为其他值。
下面对第二DMRS序列进行说明。
第二DMRS序列占用D个RB,即第二DMRS序列的长度为D*6。
或者说,第二DMRS序列的长度为D’,即第二DMRS序列占用D’/6个RB。
可选地,D’满足以下任一项:
在L≥5的情况下,D’为大于或等于L*6的最小素数;或者
在L<5的情况下,D’=L*6。
其中,L为分配资源中的RB的数量。
可选地,D’满足以下任一项:
在K≥5的情况下,D’为大于或等于K*6的最小素数;或者
在K<5的情况下,D’=K*6。
下面对数据扩展方式进行说明。
可选地,步骤1040可以包括:将占用K个RB的待传输数据循环扩展为占用J个RB的扩展后的数据。
具体扩展方式可以参考前文中步骤1040或步骤740的相关描述,此处不再赘述。
下面对获取第一DMRS序列的方式进行说明。
可选地,步骤1050可以包括:生成占用D个RB的DMRS序列,即第二DMRS序列;对第二DMRS序列循环扩展为占用J个RB的DMRS序列,即第一DMRS序列。
例如,在K1<5的情况下,生成占用D个RB的QPSK调制的频域序列,即第二DMRS序列。
可选地,步骤1050可以包括:生成长度为D’的DMRS序列,即第二DMRS序列;对第二DMRS序列循环扩展为占用J个RB的DMRS序列,即第一DMRS序列。
例如,在K1≥5的情况下,生成长度为D’的ZC序列,即第二DMRS序列。
应理解,本申请中,指示包括直接指示(也称为显式指示)和隐式指示。其中,直接指示信息A,是指包括该信息A;隐式指示信息A,是指通过信息A和信息B的对应关系以及直接指示信息B,来指示信息A。其中,信息A和信息B的对应关系可以是预定义的,预存储的,预烧制的,或者,预先配置的。
应理解,本申请中,信息C用于信息D的确定,既包括信息D仅基于信息C来确定,也包括基于信息C和其他信息来确定。此外,信息C用于信息D的确定,还可以间接确定的情况,比如,信息D基于信息E确定,而信息E基于信息C确定这种情况。
可以理解,本申请实施例中的例子仅仅是为了便于本领域技术人员理解本申请实施例,并非要将本申请实施例限于例示的具体场景。本领域技术人员根据上述例子,显然可以进行各种等价的修改或变化,这样的修改或变化也落入本申请实施例的范围内。
还可以理解,在上述一些实施例中,涉及到的信息名称,仅是一种示例,不对本申请实施例的保护范围造成限定。
还可以理解,在本申请各个实施例中涉及到的公式仅是示例性说明,其不对本申请实施例的保护范围造成限定。在计算上述各个涉及的参数的过程中,也可以根据上述公式进行计算,或者基于上述公式的变形进行计算,也可以根据其它方式进行计算以满足公式计算的结果。
还可以理解,本申请的各实施例中的一些可选的特征,在某些场景下,可以不依赖于其他特征,也可以在某些场景下,与其他特征进行结合,不作限定。
还可以理解,本申请的各实施例中的方案可以进行合理的组合使用,并且实施例中出现的各个术语的解释或说明可以在各个实施例中互相参考或解释,对此不作限定。
还可以理解,在本申请的各实施例中的各种数字序号的大小并不意味着执行顺序的先后,仅为描述方便进行的区分,不应对本申请实施例的实施过程构成任何限定。
还可以理解,上述各个方法实施例中,由设备实现的方法和操作,也可以由可由设备的组成部件(例如芯片或者电路)来实现。
相应于上述各方法实施例给出的方法,本申请实施例还提供了相应的装置,所述装置包括用于执行上述各个方法实施例相应的模块。该模块可以是软件,也可以是硬件,或者是软件和硬件结合。可以理解的是,上述各方法实施例所描述的技术特征同样适用于以下装置实施例。
图11是本申请实施例提供的一种通信的装置1700的示意图。该装置1700包括收发单元1710和处理单元1720。收发单元1710可以用于实现相应的通信功能。收发单元1710还可以称为通信接口或通信单元等。处理单元1720可以用于实现相应的处理功能,如配置资源。处理单元1720也可以称为处理器等。
可选地,该装置1700还包括存储单元,该存储单元可以用于存储指令和/或数据,处理单元1720可以读取存储单元中的指令和/或数据,以使得装置实现前述各个方法实施例中设备或网元的动作。
该通信装置1700可以是终端设备,也可以是应用于终端设备或者和终端设备匹配使用,能够实现终端设备侧执行的通信方法的通信装置;或者,该通信装置1700可以是网络设备,也可以是应用于网络设备或者和网络设备匹配使用,能够实现网络设备侧执行的通信方法的通信装置。
该通信装置1700应用于终端设备时,装置1700可实现对应于上文方法实施例中的终端设备执行的步骤或者流程。其中,收发单元1710可用于执行上文方法实施例中终端设备的收发相关的操作,处理单元1720可用于执行上文方法实施例中终端设备的处理相关的操作。
该通信装置1700应用于网络设备时,装置1700可实现对应于上文方法实施例中的网络设备执行的步骤或者流程,其中,收发单元1710可用于执行上文方法实施例中网络设备的收发相关的操作,处理单元1720可用于执行上文方法实施例中网络设备的处理相关的操作。
应理解,各单元执行上述相应步骤的具体过程在上述各方法实施例中已经详细说明,为了简洁,在此不再赘述。
还应理解,这里的装置1700以功能单元的形式体现。这里的术语“单元”可以指应用特有集成电路(application specific integrated circuit,ASIC)、电子电路、用于执行一个或多个软件或固件程序的处理器(例如共享处理器、专有处理器或组处理器等)和存储器、合并逻辑电路和/或其它支持所描述的功能的合适组件。在一个可选例子中,本领域技术人员可以理解,装置1700可以具体为上述实施例中的终端设备,可以用于执行上述各方法实施例中与终端设备对应的各个流程和/或步骤;或者,装置1700可以具体为上述实施例中的网络设备,可以用于执行上述各方法实施例中与网络设备对应的各个流程和/或步骤,为避免重复,在此不再赘述。
上述各个方案的装置1700具有实现上述方法中设备(如终端设备,又如网络设备)所执行的相应步骤的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块;例如收发单元可以由收发机替代(例如,收发单元中的发送单元可以由发送机替代,收发单元中的接收单元可以由接收机替代),其它单元,如处理单元等可以由处理器替代,分别执行各个方法实施例中的收发操作以及相关的处理操作。
此外,上述收发单元1710还可以是收发电路(例如可以包括接收电路和发送电路),处理单元可以是处理电路。
需要指出的是,图11中的装置可以是前述实施例中的网元或设备,也可以是芯片或者芯片系统,例如:片上系统(system on chip,SoC)。其中,收发单元可以是输入输出电路、通信接口;处理单元为该芯片上集成的处理器或者微处理器或者集成电路。在此不做限定。
图12是本申请实施例提供另一种通信装置1800的示意图。该装置1800包括处理器1810,处理器1810用于执行存储器1820存储的计算机程序或指令,或读取存储器1820存储的数据/信令,以执行上文各方法实施例中的方法。可选地,处理器1810为一个或多个。
可选地,如图12所示,该装置1800还包括存储器1820,存储器1820用于存储计算机程序或指令和/或数据。该存储器1820可以与处理器1810集成在一起,或者也可以分离设置。可选地,存储器1820为一个或多个。
可选地,如图12所示,该装置1800还包括收发器1830,收发器1830用于信号的接收和/或发送。例如,处理器1810用于控制收发器1830进行信号的接收和/或发送。
作为一种方案,该通信装置1800可以应用于终端设备,具体通信装置1800可以是终端设备,也可以是能够支持终端设备,实现上述涉及的任一示例中终端设备的功能的装置。该装置1800用于实现上文各个方法实施例中由终端设备执行的操作。
例如,处理器1810用于执行存储器1820存储的计算机程序或指令,以实现上文各个方法实施例中终端设备的相关操作。
作为另一种方案,该通信装置1800可以应用于网络设备,具体通信装置1800可以是网络设备,也可以是能够支持网络设备,实现上述涉及的任一示例中网络设备的功能的装置。该装置1800用于实现上文各个方法实施例中由网络设备执行的操作。
例如,处理器1810用于执行存储器1820存储的计算机程序或指令,以实现上文各个方法实施例中网络设备的相关操作。
应理解,本申请实施例中提及的处理器可以是中央处理单元(central processing unit,CPU),还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
还应理解,本申请实施例中提及的存储器可以是易失性存储器和/或非易失性存储器。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM)。例如,RAM可以用作外部高速缓存。作为示例而非限定,RAM包括如下多种形式:静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)可以集成在处理器中。
还需要说明的是,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请实施例还提供一种计算机可读存储介质,其上存储有用于实现上述各方法实施例中由通信设备执行的方法的计算机指令。
例如,该计算机程序被计算机执行时,使得该计算机可以实现上述方法各实施例中由终端设备执行的方法。
又如,该计算机程序被计算机执行时,使得该计算机可以实现上述方法各实施例中由网络设备执行的方法。
本申请实施例还提供一种计算机程序产品,包含指令,该指令被计算机执行时以实现上述各方法实施例中由设备(如终端设备,又如网络设备)执行的方法。
本申请实施例还提供一种通信的系统,包括前述的终端设备和网络设备。终端设备和网络设备可以实现前述图7、图9或图10中任一示例中所示的通信的方法。
可选地,该系统中还包括与上述终端设备和/或网络设备通信的设备。
上述提供的任一种装置中相关内容的解释及有益效果均可参考上文提供的对应的方法实施例,此处不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。此外,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。例如,所述计算机可以是个人计算机,服务器,或者网络设备等。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD)等。例如,前述的可用介质包括但不限于:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access  memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (42)

  1. 一种通信的方法,其特征在于,包括:
    接收来自网络设备的第一指示信息,所述第一指示信息指示所述网络设备分配的第一资源,所述第一资源为用于承载待传输的第一数据的资源;
    根据所述第一资源和扩展因子确定第三资源,所述扩展因子用于指示频谱扩展的比例;
    基于所述第三资源与所述网络设备进行通信,所述第三资源为频谱扩展后的总资源,所述第三资源包括第二资源,所述第二资源上承载所述第一数据,所述第二资源包括K个资源块RB,K为满足K=2a*3b*5c的整数,或者,所述第二资源包括K’个资源单元RE,K’为满足K’=2a*3b*5c的整数,a,b和c为非负整数。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:基于所述第一数据进行扩展,以得到第二数据,所述第二数据包括所述第一数据,所述第三资源上承载所述第二数据。
  3. 根据权利要求1或2所述的方法,其特征在于,
    所述扩展因子用于指示扩展资源的长度与频谱扩展后的总资源的长度之间的比值,所述扩展因子的取值包括:1/2,1/3,1/4,1/5,1/6,1/7,1/8,3/8,1/9或1/10;或者
    所述扩展因子用于指示扩展资源的长度与非扩展资源的长度之间的比值,所述扩展因子的取值包括:1,1/2,1/3,1/4,1/5,1/6,1/7,3/5,1/8或1/9;或者
    所述扩展因子用于指示非扩展资源的长度与频谱扩展后的总资源的长度之间的比值,所述扩展因子的取值包括:1/2,2/3,3/4,4/5,5/6,6/7,7/8,5/8,8/9或9/10。
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,K为满足K=2a*3b*5c的整数中小于或等于L的最大整数,或者,K’为满足K’=2a*3b*5c的整数中小于或等于L*12的最大整数,其中,a,b和c为非负整数,L为所述第一资源中的RB的数量,L为正数。
  5. 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:
    生成第一DMRS序列,所述第一DMRS序列是第一时域序列经过DFT操作得到的,
    所述第一DMRS序列占用J个RB,J满足以下任一项:
    J为满足J=2a*3b*5c的整数中大于或等于J1的最小整数;
    J为满足J=2a*3b*5c的整数中距离J1最近的整数;
    J为满足J=2a*3b*5c的整数中大于或等于J2的最小整数;或者
    J为满足J=2a*3b*5c的整数中距离J2最近的整数;或者
    所述第一DMRS序列的长度为J’,J’满足以下任一项:
    J’为满足J’=2a*3b*5c的整数中大于或等于J1*6的最小整数;
    J’为满足J’=2a*3b*5c的整数中距离J1*6最近的整数;
    J’为满足J’=2a*3b*5c的整数中大于或等于J2*6的最小整数;或者
    J’为满足J’=2a*3b*5c的整数中距离J2*6最近的整数;
    其中,a,b和c为非负整数,J1为第六资源中的RB的数量,J1为正数,所述第六资源基于所述第一资源和所述扩展因子计算得到,J2为第七资源中的RB的数量,J2为正数,所述第七资源基于所述第二资源和所述扩展因子计算得到。
  6. 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:
    生成第二DMRS序列;
    基于所述第二DMRS序列进行循环扩展,以得到所述第一DMRS序列,所述第一DMRS序列包括所述第二DMRS序列,其中,所述第二DMRS序列为第二时域序列经过DFT操作得到的,所述第二DMRS序列占用D个RB;
    D满足以下任一项:
    D=K;
    D为满足D=2a*3b*5c的整数中小于或等于L的最大整数;或者
    D为满足D=2a*3b*5c的整数中距离L最近的整数;
    a,b和c为非负整数,L为所述第一资源中的RB的数量,L为正数。
  7. 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:
    生成第二DMRS序列;
    基于所述第二DMRS序列进行循环扩展,以得到所述第一DMRS序列,所述第一DMRS序列包括所述第二DMRS序列,所述第二DMRS序列为第二时域序列经过DFT操作得到的;
    所述第二DMRS序列的长度D’满足以下任一项:
    D’为满足D’=2a*3b*5c的整数中小于或等于L*6的最大整数;或者
    D’为满足D’=2a*3b*5c的整数中距离L*6最近的整数;
    其中,a,b和c为非负整数,L为所述第一资源中的RB的数量,L为正数。
  8. 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:
    生成第二DMRS序列;
    基于所述第二DMRS序列进行循环扩展,以得到所述第一DMRS序列,所述第一DMRS序列包括所述第二DMRS序列,其中,所述第二DMRS序列的长度D’满足以下任一项:
    在L≥5的情况下,所述第二DMRS序列为ZC序列,且D’为大于或等于L*6的最小素数;或者
    在L<5的情况下,所述第二DMRS序列为第一频域序列,且D’=L*6;
    其中,L为所述第一资源中的RB的数量,L为正数。
  9. 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:
    生成第二DMRS序列;
    基于所述第二DMRS序列进行循环扩展,以得到所述第一DMRS序列,所述第一DMRS序列包括所述第二DMRS序列,其中,所述第二DMRS序列的长度为D’满足以下任一项:
    在K≥5的情况下,所述第二DMRS序列为ZC序列,且D’为大于或等于K*6的最小素数;或者
    在K<5的情况下,所述第二DMRS序列为第一频域序列,且D’=K*6。
  10. 一种通信的方法,其特征在于,包括:
    接收来自网络设备的第一指示信息,所述第一指示信息指示所述网络设备分配的第一资源;
    根据所述第一资源和扩展因子确定第二资源,所述扩展因子用于指示频谱扩展的比例,所述第二资源包括K个资源块RB,K为满足K=2a*3b*5c的整数,或者,所述第二资源包括K’个资源单元RE,K’为满足K’=2a*3b*5c的整数,a,b和c为非负整数;
    基于第三资源与所述网络设备进行通信,所述第三资源为频谱扩展后的总资源,所述第一资源包括所述第三资源,所述第三资源包括所述第二资源,所述第二资源上承载待传输的第一数据。
  11. 根据权利要求10所述的方法,其特征在于,所述方法还包括:基于所述第一数据进行扩展,以得到第二数据,所述第二数据包括所述第一数据,所述第三资源上承载所述第二数据。
  12. 根据权利要求10或11所述的方法,其特征在于,
    所述扩展因子用于指示扩展资源的长度与频谱扩展后的总资源的长度之间的比值,所述扩展因子的取值包括:1/2,1/3,1/4,1/5,1/6,1/7,1/8,3/8,1/9或1/10;或者
    所述扩展因子用于指示扩展资源的长度与非扩展资源的长度之间的比值,所述扩展因子的取值包括:1,1/2,1/3,1/4,1/5,1/6,1/7,3/5,1/8或1/9;或者
    所述扩展因子用于指示非扩展资源的长度与频谱扩展后的总资源的长度之间的比值,所述扩展因子的取值包括:1/2,2/3,3/4,4/5,5/6,6/7,7/8,5/8,8/9或9/10。
  13. 根据权利要求10至12中任一项所述的方法,其特征在于,
    K满足以下任一项:
    K为满足K=2a*3b*5c的整数中小于或等于K1的最大整数;
    K为满足K=2a*3b*5c的整数中距离K1最近的整数;
    K为满足K=2a*3b*5c的整数中小于或等于K2的最大整数;或者
    K为满足K=2a*3b*5c的整数中距离K2最近的整数;或者
    K’满足以下任一项:
    K’为满足K’=2a*3b*5c的整数中距离K1*12最近的整数;
    K’为满足K’=2a*3b*5c的整数中小于或等于K1*12的最大整数;
    K’为满足K’=2a*3b*5c的整数中小于或等于K2*12的最大整数;或者
    K’为满足K’=2a*3b*5c的整数中距离K2*12最近的整数;
    其中,a,b和c为非负整数,K1为第四资源中的RB的数量,所述第四资源是基于所述第一资源和所述扩展因子计算得到的,K2为第五资源中的RB的数量,所述第五资源是基于所述第三资源和所述扩展因子计算得到的,K1为正数,K2为正数。
  14. 根据权利要求10至13中任一项所述的方法,其特征在于,所述方法还包括:
    生成第一DMRS序列,所述第一DMRS序列为第一时域序列经过DFT操作得到的,
    所述第一DMRS序列占用J个RB,J为满足J=2a*3b*5c的整数中小于或等于L的最大整数;或者
    所述第一DMRS序列的长度为J’,J’为满足J’=2a*3b*5c的整数中小于或等于L*6的最大整数;
    其中,a,b和c为非负整数,L为所述第一资源中的RB的数量,L为正数。
  15. 根据权利要求10至13中任一项所述的方法,其特征在于,所述方法还包括:
    生成第二DMRS序列;
    基于所述第二DMRS序列进行循环扩展,以得到所述第一DMRS序列,所述第一DMRS序列包括所述第二DMRS序列,其中,所述第二DMRS序列为第二时域序列经过DFT操作得到的,所述第二DMRS序列占用D个RB;
    D满足以下任一项:
    D=K;
    D为满足D=2a*3b*5c的整数中小于或等于K1的最大整数;或者
    D为满足D=2a*3b*5c的整数中距离K1最近的整数;
    其中,a,b和c为非负整数,K1为第四资源中的RB的数量,K1为正数,所述第四资源是基于所述第一资源和所述扩展因子计算得到的。
  16. 根据权利要求10至13中任一项所述的方法,其特征在于,所述方法还包括:
    生成第二DMRS序列;
    基于所述第二DMRS序列进行循环扩展,以得到所述第一DMRS序列,所述第一DMRS序列包括所述第二DMRS序列,所述第二DMRS序列为第二时域序列经过DFT操作得到的;
    所述第二DMRS序列的长度D’满足以下任一项:
    D’为满足D’=2a*3b*5c的整数中小于或等于K1*6的最大整数;或者
    D’为满足D’=2a*3b*5c的整数中距离K1*6最近的整数;
    其中,a,b和c为非负整数,K1为第四资源中的RB的数量,K1为正数,所述第四资源是基于所述第一资源和所述扩展因子计算得到的。
  17. 根据权利要求10至13中任一项所述的方法,其特征在于,所述方法还包括:
    生成第二DMRS序列;
    基于所述第二DMRS序列进行循环扩展,以得到所述第一DMRS序列,所述第一DMRS序列包括所述第二DMRS序列,在K1≥5的情况下,所述第二DMRS序列为ZC序列,第二DMRS序列的长度D’为大于或等于K1*6的最小素数,其中,K1为所述第四资源中的RB的数量,K1为正数,所述第四资源是基于所述第一资源和所述扩展因子计算得到的。
  18. 根据权利要求10至13中任一项所述的方法,其特征在于,所述方法还包括:
    生成第二DMRS序列;
    基于所述第二DMRS序列进行循环扩展,以得到所述第一DMRS序列,所述第一DMRS序列包括所述第二DMRS序列,其中,所述第二DMRS序列占用D个RB,在K1<5的情况下,所述第二DMRS序列为第一频域序列,且D满足以下任一项:
    D=K;
    D为小于K1的最大整数;或者
    D为距离K1最近的整数;
    其中,K1为所述第四资源中的RB的数量,K1为正数,所述第四资源是基于所述第一资源和所述扩展因子计算得到的。
  19. 一种通信的方法,其特征在于,包括:
    向终端设备发送第一指示信息,所述第一指示信息指示为所述终端设备分配的第一资源,所述第一资源为用于承载待传输的第一数据的资源;
    基于第三资源与所述终端设备进行通信,所述第三资源为频谱扩展后的总资源,所述所述第三资源 包括第二资源,所述第二资源上承载待传输的第一数据,所述第三资源基于所述第一资源和扩展因子,所述扩展因子用于指示频谱扩展的比例,所述第二资源包括K个资源块RB,K为满足K=2a*3b*5c的整数,或者,所述第二资源包括K’个资源单元RE,K’为满足K’=2a*3b*5c的整数,a,b和c为非负整数。
  20. 根据权利要求19所述的方法,其特征在于,所述第三资源上承载第二数据,所述第二数据是基于所述第一数据进行扩展得到的,所述第二数据包括所述第一数据。
  21. 根据权利要求19或20所述的方法,其特征在于,
    所述扩展因子用于指示扩展资源的长度与频谱扩展后的总资源的长度之间的比值,所述扩展因子的取值包括:1/2,1/3,1/4,1/5,1/6,1/7,1/8,3/8,1/9或1/10;或者
    所述扩展因子用于指示扩展资源的长度与非扩展资源的长度之间的比值,所述扩展因子的取值包括:1,1/2,1/3,1/4,1/5,1/6,1/7,3/5,1/8或1/9;或者
    所述扩展因子用于指示非扩展资源的长度与频谱扩展后的总资源的长度之间的比值,所述扩展因子的取值包括:1/2,2/3,3/4,4/5,5/6,6/7,7/8,5/8,8/9或9/10。
  22. 根据权利要求19至21中任一项所述的方法,其特征在于,K为满足K=2a*3b*5c的整数中小于或等于L的最大整数;或者K’为满足K’=2a*3b*5c的整数中小于或等于L*12的最大整数,其中,a,b和c为非负整数,L为所述第一资源中的RB的数量,L为正数。
  23. 根据权利要求19至22中任一项所述的方法,其特征在于,所述基于第三资源与所述终端设备进行通信,包括:
    基于所述第三资源接收第一DMRS序列,所述第一DMRS序列是第一时域序列经过DFT操作得到的,其中,
    所述第一DMRS序列占用J个RB,J满足以下任一项:
    J为满足J=2a*3b*5c的整数中大于或等于J1的最小整数;
    J为满足J=2a*3b*5c的整数中距离J1最近的整数;
    J为满足J=2a*3b*5c的整数中大于或等于J2的最小整数;或者
    J为满足J=2a*3b*5c的整数中距离J2最近的整数;或者
    所述第一DMRS序列的长度为J’,J’满足以下任一项:
    J’为满足J’=2a*3b*5c的整数中大于或等于J1*6的最小整数;
    J’为满足J’=2a*3b*5c的整数中距离J1*6最近的整数;
    J’为满足J’=2a*3b*5c的整数中大于或等于J2*6的最小整数;或者
    J’为满足J’=2a*3b*5c的整数中距离J2*6最近的整数;
    其中,a,b和c为非负整数,J1为第六资源中的RB的数量,J1为正数,所述第六资源基于第一资源和所述扩展因子计算得到,J2为第七资源中的RB的数量,J2为正数,所述第七资源基于第二资源和所述扩展因子计算得到。
  24. 根据权利要求19至22中任一项所述的方法,其特征在于,所述基于第三资源与所述终端设备进行通信,包括:
    基于所述第三资源接收第一DMRS序列,所述第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,所述第一DMRS序列包括所述第二DMRS序列,其中,所述第二DMRS序列是第二时域序列经过DFT操作得到的,所述第二DMRS序列占用D个RB;
    D满足以下任一项:
    D=K;
    D为满足D=2a*3b*5c的整数中小于或等于L的最大整数;或者
    D为满足D=2a*3b*5c的整数中距离L最近的整数,
    a,b和c为非负整数,L为所述第一资源中的RB的数量,L为正数。
  25. 根据权利要求19至22中任一项所述的方法,其特征在于,所述基于第三资源与所述终端设备进行通信,包括:
    基于所述第三资源接收第一DMRS序列,所述第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,所述第一DMRS序列包括所述第二DMRS序列,所述第二DMRS序列是第二时域序列经过DFT操作得到的;
    所述第二DMRS序列的长度D’满足以下任一项:
    D’为满足D’=2a*3b*5c的整数中小于或等于L*6的最大整数;或者
    D’为满足D’=2a*3b*5c的整数中距离L*6最近的整数;
    其中,a,b和c为非负整数,L为所述第一资源中的RB的数量,L为正数。
  26. 根据权利要求19至22中任一项所述的方法,其特征在于,所述基于第三资源与所述终端设备进行通信,包括:
    基于所述第三资源接收第一DMRS序列,所述第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,所述第一DMRS序列包括所述第二DMRS序列,其中,所述第二DMRS序列的长度D’满足以下任一项:
    在L≥5的情况下,所述第二DMRS序列为ZC序列,且D’为大于或等于L*6的最小素数;或者
    在L<5的情况下,所述第二DMRS序列为第一频域序列,且D’=L*6;
    其中,L为所述第一资源中的RB的数量,L为正数。
  27. 根据权利要求19至22中任一项所述的方法,其特征在于,所述基于第三资源与所述终端设备进行通信,包括:
    基于所述第三资源接收第一DMRS序列,所述第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,所述第一DMRS序列包括所述第二DMRS序列,其中,所述第二DMRS序列的长度D’满足以下任一项:
    在K≥5的情况下,所述第二DMRS序列为ZC序列,且D’为大于或等于K*6的最小素数;或者
    在K<5的情况下,所述第二DMRS序列为第一频域序列,且D’=K*6。
  28. 一种通信的方法,其特征在于,包括:
    向终端设备发送第一指示信息,所述第一指示信息指示为所述终端设备分配的第一资源;
    基于第三资源与所述终端设备进行通信,所述第三资源为频谱扩展后的总资源,所述第一资源包括所述第三资源,所述第三资源包括第二资源,所述第二资源上承载待传输的第一数据,所述第二资源基于所述第一资源和扩展因子,所述扩展因子用于指示频谱扩展的比例,所述第二资源包括K个资源块RB,K为满足K=2a*3b*5c的整数,或者,所述第二资源包括K’个资源单元RE,K’为满足K’=2a*3b*5c的整数,a,b和c为非负整数。
  29. 根据权利要求28所述的方法,其特征在于,所述第三资源上承载第二数据,所述第二数据是基于所述第一数据进行扩展得到的,所述第二数据包括所述第一数据。
  30. 根据权利要求28或29所述的方法,其特征在于,
    所述扩展因子用于指示扩展资源的长度与频谱扩展后的总资源的长度之间的比值,所述扩展因子的取值包括:1/2,1/3,1/4,1/5,1/6,1/7,1/8,3/8,1/9或1/10;或者
    所述扩展因子用于指示扩展资源的长度与非扩展资源的长度之间的比值,所述扩展因子的取值包括:1,1/2,1/3,1/4,1/5,1/6,1/7,3/5,1/8或1/9;或者
    所述扩展因子用于指示非扩展资源的长度与频谱扩展后的总资源的长度之间的比值,所述扩展因子的取值包括:1/2,2/3,3/4,4/5,5/6,6/7,7/8,5/8,8/9或9/10。
  31. 根据权利要求28至30中任一项所述的方法,其特征在于,
    K满足以下任一项:
    K为满足K=2a*3b*5c的整数中小于或等于K1的最大整数;
    K为满足K=2a*3b*5c的整数中距离K1最近的整数;
    K为满足K=2a*3b*5c的整数中小于或等于K2的最大整数;或者
    K为满足K=2a*3b*5c的整数中距离K2最近的整数;或者
    K’满足以下任一项:
    K’为满足K’=2a*3b*5c的整数中距离K1*12最近的整数;
    K’为满足K’=2a*3b*5c的整数中小于或等于K1*12的最大整数;
    K’为满足K’=2a*3b*5c的整数中小于或等于K2*12的最大整数;或者
    K’为满足K’=2a*3b*5c的整数中距离K2*12最近的整数;
    其中,a,b和c为非负整数,K1为第四资源中的RB的数量,K1为正数,所述第四资源是基于所述第一资源和所述扩展因子计算得到的,K2为第五资源中的RB的数量,所述第五资源是基于所述第三资源和所述扩展因子计算得到的,K2为正数。
  32. 根据权利要求28至31中任一项所述的方法,其特征在于,所述基于第三资源与所述终端设备进行通信,包括:
    基于所述第三资源接收第一DMRS序列,所述第一DMRS序列是第一时域序列经过DFT操作得到的,
    所述第一DMRS序列占用J个RB,J为满足J=2a*3b*5c的整数中小于或等于L的最大整数;或者
    所述第一DMRS序列的长度为J’,J’为满足J’=2a*3b*5c的整数中小于或等于L*6的最大整数;
    其中,a,b和c为非负整数,L为所述第一资源中的RB的数量,L为正数。
  33. 根据权利要求28至31中任一项所述的方法,其特征在于,所述基于第三资源与所述终端设备进行通信,包括:
    基于所述第三资源接收第一DMRS序列,所述第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,所述第一DMRS序列包括所述第二DMRS序列,其中,所述第二DMRS序列是第二时域序列经过DFT操作得到的,所述第二DMRS序列占用D个RB,
    D满足以下任一项:
    D=K,
    D为满足D=2a*3b*5c的整数中小于或等于K1的最大整数;或者
    D为满足D=2a*3b*5c的整数中距离K1最近的整数;
    其中,a,b和c为非负整数,K1为第四资源中的RB的数量,K1为正数,所述第四资源是基于所述第一资源和所述扩展因子计算得到的。
  34. 根据权利要求28至31中任一项所述的方法,其特征在于,所述基于第三资源与所述终端设备进行通信,包括:
    基于所述第三资源接收第一DMRS序列,所述第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,所述第一DMRS序列包括所述第二DMRS序列,所述第二DMRS序列是第二时域序列经过DFT操作得到的;
    所述第二DMRS序列的长度D’满足以下任一项:
    D’为满足D’=2a*3b*5c的整数中小于或等于K1*6的最大整数;或者
    D’为满足D’=2a*3b*5c的整数中距离K1*6最近的整数;
    其中,a,b和c为非负整数,K1为第四资源中的RB的数量,K1为正数,所述第四资源是基于所述第一资源和所述扩展因子计算得到的。
  35. 根据权利要求28至31中任一项所述的方法,其特征在于,所述基于第三资源与所述终端设备进行通信,包括:
    基于所述第三资源接收第一DMRS序列,所述第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,所述第一DMRS序列包括所述第二DMRS序列,在K1≥5的情况下,所述第二DMRS序列为ZC序列,所述第二DMRS序列的长度D’为大于或等于K1*6的最小素数,其中,K1为所述第四资源中的RB的数量,K1为正数,所述第四资源是基于所述第一资源和所述扩展因子计算得到的。
  36. 根据权利要求28至31中任一项所述的方法,其特征在于,所述基于第三资源与所述终端设备进行通信,包括:
    基于所述第三资源接收第一DMRS序列,所述第一DMRS序列是基于第二DMRS序列进行循环扩展得到的,所述第一DMRS序列包括所述第二DMRS序列,其中,所述第二DMRS序列占用D个RB,在K1<5的情况下,所述第二DMRS序列为第一频域序列,且D满足以下任一项:
    D=K;
    D为小于K1的最大整数;或者
    D为距离K1最近的整数;
    其中,K1为所述第四资源中的RB的数量,K1为正数,所述第四资源是基于所述第一资源和所述扩展因子计算得到的。
  37. 一种通信装置,其特征在于,包括:用于执行如权利要求1至9或权利要求10至18中任一项所述的方法的单元或模块。
  38. 一种通信装置,其特征在于,包括:用于执行如权利要求19至27或权利要求28至36中任一项所述的方法的单元或模块。
  39. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括指令,当所述指令被处理器运行时,使得如权利要求1至9中任一项所述的方法被实现,使得如权利要求10至18中任一项所述的方法被实现,使得如权利要求19至27中任一项所述的方法被实现,或者使得如权利要求28至36中任一项所述的方法被实现。
  40. 一种通信装置,其特征在于,所述通信装置包括处理器和存储介质,所述存储介质存储有指令,所述指令被所述处理器运行时,使得如权利要求1至9中任一项所述的方法被实现,使得如权利要求10至18中任一项所述的方法被实现,使得如权利要求19至27中任一项所述的方法被实现,或者使得如权利要求28至36中任一项所述的方法被实现。
  41. 一种计算机程序产品,其特征在于,所述计算机程序产品包括指令,当所述指令被处理器运行时,使得如权利要求1至9中任一项所述的方法被实现,使得如权利要求10至18中任一项所述的方法被实现,使得如权利要求要求19至27中任一项所述的方法被实现,或者使得如权利要求28至36中任一项所述的方法被实现。
  42. 一种通信系统,其特征在于,包括:如权利要求37所述的通信装置和权利要求38所述的通信装置。
PCT/CN2023/129374 2022-11-06 2023-11-02 一种通信的方法和通信装置 WO2024094132A1 (zh)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202211381137.7 2022-11-06
CN202211381137 2022-11-06
CN202310086024.2A CN117998619A (zh) 2022-11-06 2023-01-16 一种通信的方法和通信装置
CN202310086024.2 2023-01-16

Publications (1)

Publication Number Publication Date
WO2024094132A1 true WO2024094132A1 (zh) 2024-05-10

Family

ID=90895175

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/129374 WO2024094132A1 (zh) 2022-11-06 2023-11-02 一种通信的方法和通信装置

Country Status (2)

Country Link
CN (1) CN117998619A (zh)
WO (1) WO2024094132A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656891A (zh) * 2015-07-21 2017-05-10 苏州简约纳电子有限公司 Lte系统中的数据处理装置
CN106937293A (zh) * 2015-12-29 2017-07-07 中兴通讯股份有限公司 一种频谱资源的分配方法及装置
WO2017132967A1 (zh) * 2016-02-04 2017-08-10 华为技术有限公司 数据发送方法、数据接收方法、用户设备及基站
CN110831182A (zh) * 2018-08-10 2020-02-21 华为技术有限公司 一种资源分配方法、相关设备及装置
US20220240243A1 (en) * 2021-01-25 2022-07-28 Qualcomm Incorporated Physical uplink control channel configuration for millimeter wave bands

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656891A (zh) * 2015-07-21 2017-05-10 苏州简约纳电子有限公司 Lte系统中的数据处理装置
CN106937293A (zh) * 2015-12-29 2017-07-07 中兴通讯股份有限公司 一种频谱资源的分配方法及装置
WO2017132967A1 (zh) * 2016-02-04 2017-08-10 华为技术有限公司 数据发送方法、数据接收方法、用户设备及基站
CN110831182A (zh) * 2018-08-10 2020-02-21 华为技术有限公司 一种资源分配方法、相关设备及装置
US20220240243A1 (en) * 2021-01-25 2022-07-28 Qualcomm Incorporated Physical uplink control channel configuration for millimeter wave bands

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "Further observations on DMRS for DFT-spread /2-BPSK", 3GPP DRAFT; R1-1813265 FURTHER OBSERVATIONS ON HALF-PI BPSK DFTS DMRS, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG1, no. Spokane, USA; 20181112 - 20181115, 3 November 2018 (2018-11-03), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051479564 *

Also Published As

Publication number Publication date
CN117998619A (zh) 2024-05-07

Similar Documents

Publication Publication Date Title
WO2019029325A1 (zh) 一种获取参考信号的方法、装置和计算机可读存储介质
US20220263697A1 (en) Symbol processing method and apparatus
US11770281B2 (en) Symbol processing method and apparatus
US11991112B2 (en) Symbol processing method and apparatus
TW201818751A (zh) 傳輸信號的方法、終端設備和網路設備
WO2019242738A1 (zh) 发送调制符号的方法、接收调制符号的方法和通信设备
EP3854043A1 (en) Configurable waveform for beyond 52.6ghz
WO2018061341A1 (ja) 無線送信装置、無線受信装置、送信方法及び受信方法
EP4336786A1 (en) Signal transmission method and communication apparatus
WO2022237509A1 (zh) 一种通信方法及装置
WO2024094132A1 (zh) 一种通信的方法和通信装置
WO2022228117A1 (zh) 一种确定ptrs图案的方法和装置
US11943086B2 (en) Symbol processing method and apparatus
KR101895997B1 (ko) 주파수 분할 다중 접속을 위한 송신기 및 수신기
WO2020114317A1 (zh) 一种参考信号的传输方法及装置
EP3840281A1 (en) Communication method and apparatus
WO2019095863A1 (zh) Pucch传输方法、终端及网络侧设备
WO2024051769A1 (zh) 一种数据传输的方法和通信装置
WO2024051653A1 (zh) 一种通信方法、装置及设备
WO2022253116A1 (zh) 一种多用户通信的方法及相关通信装置
WO2023169302A1 (zh) 一种通信方法及装置
US11843485B2 (en) Symbol processing method and apparatus
US12101747B2 (en) Communication method and apparatus
WO2022087970A1 (zh) 无线通信的方法和通信设备
US20240121140A1 (en) Symbol transmission method and communications apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23885057

Country of ref document: EP

Kind code of ref document: A1