WO2024125393A1 - Procédé et appareil de transmission, terminal et dispositif côté réseau - Google Patents

Procédé et appareil de transmission, terminal et dispositif côté réseau Download PDF

Info

Publication number
WO2024125393A1
WO2024125393A1 PCT/CN2023/137316 CN2023137316W WO2024125393A1 WO 2024125393 A1 WO2024125393 A1 WO 2024125393A1 CN 2023137316 W CN2023137316 W CN 2023137316W WO 2024125393 A1 WO2024125393 A1 WO 2024125393A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
target
configuration
target configuration
signal
Prior art date
Application number
PCT/CN2023/137316
Other languages
English (en)
Chinese (zh)
Inventor
谭俊杰
黄伟
简荣灵
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2024125393A1 publication Critical patent/WO2024125393A1/fr

Links

Definitions

  • the present application belongs to the field of communication technology, and specifically relates to a transmission method, apparatus, terminal and network side equipment.
  • multiple backscatter communication (BSC) devices use completely orthogonal resources to access channels and transmit data.
  • BSC time division multiple access
  • the next BSC device needs to wait until the previous BSC device finishes transmitting before it can start to end.
  • the BSC device also needs to send a contention data packet to the reader (or access point) before formal data transmission. Only when the contention data packet is correctly and uniquely identified can it obtain resources for subsequent data transmission.
  • this access method is extremely inefficient. Therefore, there is a problem of low efficiency of BSC device transmission in the related art.
  • the embodiments of the present application provide a transmission method, apparatus, terminal and network-side equipment, which can solve the problem of low transmission efficiency of BSC equipment.
  • an embodiment of the present application provides a transmission method, including:
  • the third message is a message sent according to the first sending mode associated with the first target configuration, and the second target device is a second device in the first set;
  • the second device sends a first message to the first device using a first target configuration based on the second message
  • the second device In a case where the second device does not belong to the first set, receiving a twelfth message from the first target device, and sending a fourth message based on the twelfth message, wherein the twelfth message is used to instruct the second device to send a message according to a second sending mode associated with the second target configuration;
  • an embodiment of the present application provides a transmission method, including:
  • the third message is a message sent according to the first sending mode associated with the first target configuration, and the second target device is a second device in the first set;
  • the first set is the second device corresponding to the device identification information identified by the first device based on the first message.
  • the second target configuration is a configuration obtained by updating the first target configuration based on a first update parameter, and the first update parameter includes at least one of the following: a code domain parameter, a frequency domain parameter, a power domain parameter, and a polarization domain parameter.
  • an embodiment of the present application provides a transmission device, including:
  • a second receiving module configured to receive a second message from the first target device
  • the first execution module is configured to execute a second operation, where the second operation includes at least one of the following:
  • the second device belongs to the first set, receiving a fifteenth message from the first target device, and sending a third message based on the fifteenth message, wherein the fifteenth message is used to instruct the second device to send a message according to the first sending mode associated with the first target configuration;
  • the second device In a case where the second device does not belong to the first set, receiving a twelfth message from the first target device, and sending a fourth message based on the twelfth message, wherein the twelfth message is used to instruct the second device to send a message according to a second sending mode associated with the second target configuration;
  • the first set is a set of second devices corresponding to the device identification information identified by the first device based on the first message;
  • the second target configuration is a configuration obtained by updating the first target configuration based on a first update parameter, and the first update parameter includes at least one of the following: code domain parameters, frequency domain parameters, power domain parameters and polarization domain parameters.
  • an embodiment of the present application provides a transmission device, including:
  • a third sending module configured to send a second message to a second device, wherein the second message is used to send the first message using the first target configuration
  • the second execution module is configured to execute a third operation, where the third operation includes at least one of the following:
  • the second target device is the second device in the first set
  • the third target device is the second device outside the first set
  • the first set is a set of second devices corresponding to the device identification information identified by the first device based on the first message
  • the second target configuration is a configuration obtained by updating the first target configuration based on the first update parameter
  • the first update parameter includes at least one of the following: code domain parameters, frequency domain parameters, power domain parameters and polarization domain parameters.
  • an embodiment of the present application provides a terminal, which includes a processor and a memory, wherein the memory stores a program or instruction that can be run on the processor, and when the program or instruction is executed by the processor, it implements the steps of the method described in the first aspect, or implements the steps of the method described in the second aspect, or implements the steps of the method described in the third aspect.
  • an embodiment of the present application provides a terminal, including a processor and a communication interface, wherein:
  • the communication interface is used to receive a first message from a second device, The first message is used to indicate the device identification information of the second device, and the first message is a message sent using the first target configuration based on the second message sent by the first target device; a first operation is performed, and the first operation includes at least one of the following: receiving a third message from the second target device, the third message is a message sent according to the first sending method associated with the first target configuration, and the second target device is the second device in the first set; receiving a fourth message from the third target device, the fourth message is a message sent according to the second sending method associated with the second target configuration, and the third target device is a second device outside the first set; wherein, the first set is a set of second devices corresponding to the device identification information identified by the first device based on the first message; the second target configuration is a configuration obtained by updating the first target configuration based on a first update parameter, and the first update parameter includes at least one of the following: code domain
  • the communication interface is used to receive a second message from a first target device; send a first message to the first device using a first target configuration based on the second message; and perform a second operation, wherein the second operation includes at least one of the following: when the second device belongs to a first set, receive a fifteenth message from the first target device, and send a third message based on the fifteenth message, wherein the fifteenth message is used to instruct the second device to send a message according to a first sending method associated with the first target configuration; when the second device does not belong to the first set, receive a twelfth message from the first target device, and send a fourth message based on the twelfth message, wherein the twelfth message is used to instruct the second device to send a message according to a second sending method associated with the second target configuration; wherein the first set is a set of second devices corresponding to device identification information identified by the first device based on the first message; and the second target configuration is a
  • the communication interface is used to receive a second message from a first target device; send a first message to the first device using a first target configuration based on the second message; and perform a second operation, wherein the second operation includes at least one of the following: when the second device belongs to a first set, receive a fifteenth message from the first target device, and send a third message based on the fifteenth message, wherein the fifteenth message is used to instruct the second device to send a message according to a first sending method associated with the first target configuration; when the second device does not belong to the first set, receive a twelfth message from the first target device, and send a fourth message based on the twelfth message, wherein the twelfth message is used to instruct the second device to send a message according to a second sending method associated with the second target configuration; wherein the first set is a set of second devices corresponding to device identification information identified by the first device based on the first message; and the second target configuration is a
  • an embodiment of the present application provides a network side device, which includes a processor and a memory, wherein the memory stores programs or instructions that can be run on the processor, and when the program or instructions are executed by the processor, the steps of the method described in the first aspect are implemented, or the steps of the method described in the second aspect are implemented, or the steps of the method described in the third aspect are implemented.
  • an embodiment of the present application provides a network side device, including a processor and a communication interface, wherein:
  • the communication interface is used to receive a first message from a second device, The first message is used to indicate the device identification information of the second device, and the first message is a message sent using the first target configuration based on the second message sent by the first target device; a first operation is performed, and the first operation includes at least one of the following: receiving a third message from the second target device, the third message is a message sent according to the first sending method associated with the first target configuration, and the second target device is the second device in the first set; receiving a fourth message from the third target device, the fourth message is a message sent according to the second sending method associated with the second target configuration, and the third target device is a second device outside the first set; wherein, the first set is a set of second devices corresponding to the device identification information identified by the first device based on the first message; the second target configuration is a configuration obtained by updating the first target configuration based on a first update parameter, and the first update parameter includes at least one of the following:
  • the communication interface is used to receive a second message from a first target device; send a first message to the first device using a first target configuration based on the second message; and perform a second operation, wherein the second operation includes at least one of the following: when the second device belongs to a first set, receive a fifteenth message from the first target device, and send a third message based on the fifteenth message, wherein the fifteenth message is used to instruct the second device to send a message according to a first sending method associated with the first target configuration; when the second device does not belong to the first set, receive a twelfth message from the first target device, and send a fourth message based on the twelfth message, wherein the twelfth message is used to instruct the second device to send a message according to a second sending method associated with the second target configuration; wherein the first set is a set of second devices corresponding to device identification information identified by the first device based on the first message; and the second operation includes at least one of the following: when the second device
  • the communication interface is used to receive a second message from a first target device; send a first message to the first device using the first target configuration based on the second message; and perform a second operation, wherein the second operation includes at least one of the following: when the second device belongs to the first set, receive a fifteenth message from the first target device, and send a third message based on the fifteenth message, wherein the fifteenth message is used to instruct the second device to send a message according to a first sending method associated with the first target configuration; when the second device does not belong to the first set, receive a twelfth message from the first target device, and send a fourth message based on the twelfth message, wherein the twelfth message is used to instruct the second device to send a message according to a second sending method associated with the second target configuration; wherein the first set is a set of second devices corresponding to device identification information identified by the first device based on the first message; and the second target configuration
  • an embodiment of the present application provides a communication system, comprising: a first device, a second device and a third device, wherein the first device can be used to execute the steps of the transmission method as described in the first aspect, the second device can be used to execute the steps of the transmission method as described in the second aspect, and the third device can be used to execute the steps of the transmission method as described in the third aspect.
  • an embodiment of the present application provides a readable storage medium, on which a program or instruction is stored, and when the program or instruction is executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method described in the first aspect are implemented.
  • the steps of the method described in the second aspect, or the steps of the method described in the third aspect are implemented.
  • an embodiment of the present application provides a chip, comprising a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the steps of the method described in the first aspect, or to implement the steps of the method described in the second aspect, or to implement the steps of the method described in the third aspect.
  • an embodiment of the present application provides a computer program/program product, which is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the steps of the method described in the first aspect, or the steps of the method described in the second aspect, or the steps of the method described in the third aspect.
  • a first message is received from a second device by a first device, the first message is used to indicate the device identification information of the second device, and the first message is a message sent using a first target configuration based on a second message sent by a first target device; the first device performs a first operation, and the first operation includes at least one of the following: receiving a third message from a second target device, the third message is a message sent in a first sending mode associated with the first target configuration, and the second target device is a second device in the first set; receiving a fourth message from a third target device, the fourth message is a message sent in a second sending mode associated with the second target configuration, and the third target device is a second device outside the first set; wherein the first set is a set of second devices corresponding to the device identification information identified by the first device based on the first message; the second target configuration is a configuration obtained by updating the first target configuration based on a first update parameter, and the first update parameter includes at least one of the
  • different second devices can have different delays or different first update parameters, and different channel responses are determined by using the delay differences or first update parameter differences of different second devices, and corresponding information to be transmitted is obtained based on channel response demodulation, so that multiple devices can be allowed to share the same physical resources for parallel and concurrent transmission, thereby improving the transmission efficiency.
  • FIG1 is a schematic diagram of a network structure applicable to an embodiment of the present application.
  • FIG2 is an example diagram of a single-base transmission scenario applicable to an embodiment of the present application.
  • FIG3 is an example diagram of a dual-base transmission scenario applicable to an embodiment of the present application.
  • FIG4 is an example diagram of a conventional communication scenario
  • FIG5 is a diagram showing an example of a BSC communication scenario
  • FIG6 is a schematic diagram of a flow chart of a transmission method provided in an embodiment of the present application.
  • FIG7 is a schematic diagram of a flow chart of another transmission method provided in an embodiment of the present application.
  • FIG8 is a schematic diagram of a flow chart of another transmission method provided in an embodiment of the present application.
  • FIG9 is a structural diagram of a transmission device provided in an embodiment of the present application.
  • FIG10 is a structural diagram of another transmission device provided in an embodiment of the present application.
  • FIG11 is a structural diagram of another transmission device provided in an embodiment of the present application.
  • FIG12 is a structural diagram of a communication device provided in an embodiment of the present application.
  • FIG13 is a structural diagram of a terminal provided in an embodiment of the present application.
  • FIG. 14 is a structural diagram of a network-side device provided in an embodiment of the present application.
  • first, second, etc. in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It should be understood that the terms used in this way are interchangeable under appropriate circumstances, so that the embodiments of the present application can be implemented in an order other than those illustrated or described here, and the objects distinguished by “first” and “second” are generally of the same type, and the number of objects is not limited.
  • the first object can be one or more.
  • “and/or” in the specification and claims represents at least one of the connected objects, and the character “/" generally represents that the objects associated with each other are in an "or” relationship.
  • instruction in the specification and claims of this application can be either an explicit instruction or an implicit instruction.
  • An explicit instruction can be understood as the sender explicitly informing the receiver of the operation to be performed or the request result in the instruction sent; an implicit instruction can be understood as the receiver making a judgment based on the instruction sent by the sender and determining the operation to be performed or the request result based on the judgment result.
  • LTE Long Term Evolution
  • LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • NR new radio
  • FIG1 shows a block diagram of a wireless communication system applicable to an embodiment of the present application.
  • the wireless communication system includes a terminal 11 and a network side device 12.
  • the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a handheld computer, a netbook, an ultra-mobile personal computer (ultra-mobile personal computer, UMPC), a mobile Internet device (Mobile Internet Device, MID), an augmented reality (augmented reality, AR)/virtual reality (virtual reality, VR) device, a robot, a wearable device (Wearable Device), a vehicle user equipment (VUE), a pedestrian terminal (Pedestrian User Equipment, PUE), a smart home (with wireless
  • the terminal side devices 12 include household appliances with wireless communication functions, such as refrigerators, televisions, washing machines or furniture, etc.), game consoles, personal computers (PCs), ATMs or self-service machines, and
  • the network side device 12 may include access network equipment or core network equipment, wherein the access network equipment may also be referred to as wireless access network equipment, wireless access network (Radio Access Network, RAN), wireless access network function or wireless access network unit.
  • the access network equipment may include a base station, a wireless local area network (WLAN) access point or a WiFi node, etc.
  • WLAN wireless local area network
  • the base station may be referred to as a node B, an evolved node B (eNB), an access point, a base transceiver station (BTS), a radio base station, a radio transceiver, a basic service set (BSS), an extended service set (ESS), a home node B, a home evolved node B, a transmission reception point (TRP) or some other suitable term in the field.
  • eNB evolved node B
  • BTS basic service set
  • ESS extended service set
  • TRP transmission reception point
  • the base station is not limited to a specific technical vocabulary. It should be noted that in the embodiment of the present application, only the base station in the NR system is used as an example for introduction, and the specific type of the base station is not limited.
  • Backscatter communication refers to the use of radio frequency signals from other devices or the environment to modulate signals in order to transmit its own information. It is a typical passive IoT device.
  • the basic components and main functions of the backscatter communication transmitter include:
  • Antenna unit used to receive RF signals and control commands, and also used to send modulated backscattered signals;
  • Energy harvesting module or power supply module This module is used for backscatter communication equipment to harvest radio frequency energy or other energy, including but not limited to solar energy, kinetic energy, mechanical energy, thermal energy, etc. In addition to the energy harvesting module, it may also include a battery power supply module. In this case, the backscatter communication equipment is a semi-passive device. The energy harvesting module or power supply module supplies power to all other modules in the device.
  • Microcontroller including control of baseband signal processing, energy storage or data scheduling status, switch switching, system synchronization, etc.;
  • Signal receiving module used to demodulate control commands or data sent by the backscatter communication receiving end or other network nodes;
  • Channel coding and modulation module performs channel coding and signal modulation under the control of the controller, and realizes modulation by selecting different load impedances under the control of the controller through a selection switch;
  • Memory or sensor module used to store device identifier information, location information or sensor data, etc.
  • future backscatter communication transmitters can even integrate tunnel diode amplifier modules, low-noise amplifier modules, etc. to improve the receiving sensitivity and transmission power of the transmitter.
  • the backscatter communication receiving end such as the backscatter communication receiving end in the traditional Radio Frequency Identification (RFID) system
  • RFID Radio Frequency Identification
  • Antenna unit used to receive modulated backscattered signals
  • Backscatter signal detection module used to detect the backscatter signal sent by the transmitter, including amplitude shift keying (ASK) detection, phase shift keying (PSK) detection, frequency shift keying (FSK) or quadrature amplitude modulation (QAM) detection, etc.
  • ASK amplitude shift keying
  • PSK phase shift keying
  • FSK frequency shift keying
  • QAM quadrature amplitude modulation
  • Demodulation and decoding module demodulates and decodes the detected signal to restore the original information stream.
  • MCSs Monostatic Backscatter Communication System
  • the traditional RFID system is a typical MBCSs.
  • the system includes a BSC transmitter (such as a tag) and a reader.
  • the reader includes a (Radio Frequency, RF) radio frequency source and a BSC receiver, where the RF radio frequency source is used to generate an RF radio frequency signal to power the BSC transmitter/Tag.
  • the BSC transmitter backscatters the modulated RF radio frequency signal, and the BSC receiver in the reader receives the backscattered signal and then demodulates the signal. Since the RF radio frequency source and the BSC receiver are in the same device, such as the reader here, it becomes a single-station backscatter communication system.
  • MBCSs since the RF radio frequency signal sent from the BSC transmitter will undergo a double near-far effect caused by the signal attenuation of the round-trip signal, the signal energy attenuation is large, so MBCSs are generally used for short-distance backscatter communication, such as traditional RFID applications.
  • BBCSs Bistatic Backscatter Communication Systems
  • the RF source, BSC transmitting equipment and BSC receiving equipment in BBCSs are separated, as shown in Figure 3. Therefore, BBCSs avoid the problem of large round-trip signal attenuation. In addition, the performance of BBCSs can be further improved by properly placing the RF source.
  • ambient backscatter communication systems are also a type of dual-base backscatter communication, but unlike the RF source in BBCSs, which is a dedicated signal RF source, the RF source in ABCSs can be an available early RF source in the environment, such as: TV towers, cellular base stations, WiFi signals, Bluetooth signals, etc.
  • Multiple access is also called multi-user access. Its purpose is to allow multiple users to access a base station (or access point) for communication at the same time, while ensuring that the signals between users do not interfere with each other and that the signals sent by the users are successfully detected.
  • Common multiple access methods include frequency division multiple access (FDMA), time division multiple access (TDMA) and code division multiple access (CDMA).
  • RFID is a traditional backscatter communication system, whose main design goal is to identify the ID and read the data of BSC devices (i.e. tags) within the coverage of the reader. Since RFID was originally used in the automated inventory of large quantities of goods, the process of identifying tags and reading data is also called inventory.
  • the Tag After the reader sends a query (Query) command, the Tag responds (Reply). For example, if the Reply is RN16, the Tag generates a 16-bit random number and sends it to the reader. Then the reader sends the sequence to the Tag through an Acknowledgement (ACK) command. After the Tag successfully verifies the RN16 in the ACK, it will send the subsequent data (such as Protocol Control (PC)/Extended Protocol Control (XPC), Electronic Product Code (EPC), etc.) EPC) etc.) is sent to the reader/writer.
  • PC Protocol Control
  • XPC Extended Protocol Control
  • EPC Electronic Product Code
  • the reader sends a Select command to select the tag to be inventoried
  • the reader sends a Query command to start a round of inventory, and Query indicates a Q value
  • All tags generate a random integer in the range of [0, 2Q-1] as the initial value of the counter;
  • the reader sends an ACK command, including the RN16 and a 2-bit command field;
  • Tag receives ACK and checks whether the RN16 contained in the ACK is the RN16 sent previously;
  • the tag that receives the QueryRep command will reduce its own counter by 1;
  • the reader can send a QueryAdjust command to reconfigure a Q value
  • the tag that has received the QueryAdjust command and has not completed the inventory will randomly select an integer in the range of [0, 2 Q -1] as the counter;
  • the tag needs to repeatedly send RN16 until the RN16 is correctly and uniquely identified by the reader, and the reader then uses the RN16 to instruct the tag to exclusively use the channel to send data.
  • the transmission of RN16 itself is prone to failure due to resource conflicts, resulting in failure to seize subsequent data transmission opportunities.
  • data transmission opportunities are exclusive, resulting in a large time overhead for waiting for transmission opportunities in the case of multiple devices.
  • hi (t) represents the gain of the i-th path to the signal at time t.
  • the reflector only has an attenuation effect on the signal, so 0 ⁇ hi (t) ⁇ 1; ⁇ ( ⁇ ) is the impulse function. If the gain of each path to the signal is time-invariant or slowly varying, then c( ⁇ ; t) can be simplified to:
  • the reflector is replaced with a device with the ability to modulate signals, such as a BSC device
  • the BSC device can modulate its own transmission symbol x i onto the original h i by adjusting the reflection coefficient, that is,
  • hi corresponds to the gain value of the i-th path when the i-th BSC device does not modulate symbols (generally, the maximum reflection coefficient can be used, such as total reflection, that is, a reflection coefficient with an absolute value of 1 is selected).
  • each BSC device can be obtained by comparing the gain values corresponding to each path. Since each path can be distinguished by delay and has a corresponding relationship with the BSC device (in an ideal case, the path corresponds to the BSC device one by one), this multi-user access method can be called delay domain multiple access.
  • the process of obtaining the channel response c( ⁇ ) is the process of channel estimation.
  • Tx sends a training sequence known to Rx, and Rx compares the difference between the received sequence after passing through the channel and the original sequence to infer the specific value of the channel response.
  • * represents the linear convolution operation
  • the length of r d is n is a noise sequence with the same length as r c . Since Rx knows d, h can be obtained by performing deconvolution and denoising operations on r d (due to the existence of noise, only an estimated value of h can be obtained, but for the sake of ease of description, perfect estimation is assumed here).
  • the training sequence may have only one symbol, which can reduce the overhead, but at the same time It also reduces the estimation accuracy.
  • the signal sent by Tx carries the training sequence.
  • Tx the training sequence
  • Case 1 Tx only sends a continuous wave (CW), and then the BSC device modulates and backscatters the training sequence based on the CW.
  • the training sequence can be generated by the BSC device backscattering the CW instead of the Tx.
  • the signal that the BSC device needs to modulate and backscatter is actually the product of the training sequence and the symbol to be transmitted.
  • Tx does not even need to send any information, but only needs to instruct the device to generate a training sequence according to certain rules.
  • the signal that the device needs to generate is the product of the training sequence and the symbol to be transmitted.
  • h′ [x 1 h 1 ,...,x 2 h 2 ,...,...,x I h I ];
  • the modulation symbols x 1 , ..., x I of the BSC device can be obtained by dividing h′ and the non-zero elements of h.
  • the BSC device can modulate a symbol once, and after sending a training sequence, it needs to wait for the sequence to reach Rx through all paths before sending the next sequence (strictly speaking, after Tx sends, it needs to wait for ⁇ I - ⁇ 1 before starting the next transmission). This is to prevent the symbols modulated by the BSC device in the next sequence from aliasing the symbols modulated by other BSC devices in the previous sequence. To this end, there are the following two problems:
  • ⁇ I - ⁇ 1 may be much longer than the total duration of the sent training sequence
  • the BSC equipment can only modulate 1 symbol in each training sequence.
  • the training sequence segmentation is to divide the original training sequence of length L into multiple subsequences, which is equivalent to k training sequence symbols (subsequence length is k) corresponding to one BSC device modulation symbol.
  • the symbol modulated by the i-th BSC device i.e., the i-th BSC device
  • the m-th modulation corresponding to the m-th (i.e., the m-th) training subsequence of length 2
  • the relationship between rd and d1 , d2 , h and the modulation symbol can be expressed as:
  • R D (z) is the z-transform expression of r d ;
  • D (m) (z) is the z-transform of the training sequence used for the m-th modulation symbol.
  • H (m) (z) is the z-transform of the m-th modulation symbol of the BSC device together with its own channel.
  • a set of equations can be listed to obtain the symbols modulated by the BSC device.
  • the multiple access method based on the delay domain is an efficient multi-user communication method suitable for BSC. It utilizes the multipath naturally generated by BSC equipment (or communication equipment with the equivalent effect of "reflection/scattering". Rx detects the modulation symbols of BSC equipment based on the correspondence between multipath delay and BSC equipment.
  • BSC equipment can use the same physical resources (time domain, frequency domain, code domain) for communication, which can improve the access capacity and spectrum efficiency of the system.
  • TA timing advance
  • Solution 1 Delay domain-code domain multiple access. The basic idea of this solution is to combine delay domain multiple access with code domain multiple access.
  • a common multiple access method in the code domain is the orthogonal code division multiple access in the background technology.
  • orthogonal code division multiple access different users use different orthogonal extension code words to send signals.
  • the code word used by user 1 is s 1 and the code word used by user 2 is s 2 , and their lengths are both F.
  • each user will compare the symbol x to be transmitted with its own code word.
  • the original information of length 1 will be expanded into a vector of length F, which requires F times the resources. Therefore, F is usually called the spreading factor. For example, if the symbol that user 1 needs to transmit is x 1 , then the symbol to be transmitted is x 1 s 1 .
  • Rx x 1 s 1 + x 2 s 2 .
  • Rx needs to correlate the received signal with the codeword that matches each user, and the correlation result is the information sent by the user.
  • the signal for user 1 is:
  • orthogonality between codewords can only be guaranteed when the codewords are synchronized (ie, the codewords cannot be shifted or linearly shifted). Therefore, this requires that the signals of all users must arrive at the Rx synchronously at least at the symbol level, ie, symbol-level synchronization.
  • the backscattered signals of the two devices are x 1 and x 2 respectively, and they reach Rx through paths with channel gain values of h 1 and h 2 respectively, they have the same delay
  • the multi-user detection method using the delay domain that is, the process of Rx obtaining the BSC device modulation symbol
  • the corresponding path channel gain value is the superimposed channel gain value
  • an extended codebook can be allocated to these users with the same delay and inseparable transmitted symbols, so that they can further adopt an extended communication mode based on delay domain multiple access, that is, code division multiple access.
  • Tx can require all devices to first send their own IDs through the basic delay domain multiple access method. At this time, based on the IDs of all existing devices and the successfully decoded device IDs, Rx can know which devices need to be assigned codewords (which can be assigned per ID) and need to activate the code division multiple access method.
  • Rx does not know the IDs of all devices in advance, then Rx can only know which delays cannot be successfully decoded, but does not know how many synchronized devices there are. At this time, Tx can only blindly allocate codebooks to all devices and activate CDMA, and then instruct the successfully decoded devices not to activate CDMA. In addition, since the number of synchronized devices is unknown, it is impossible to allocate codewords per ID, resulting in devices having to randomly select codewords from the codebook, which may lead to codeword conflicts and the inability to separate information.
  • Tx requires all devices to first send their own identity (ID) through the basic delay domain multiple access method
  • Tx indicates (per ID) that all devices successfully decoded by Rx will no longer use CDMA and will no longer report device IDs;
  • Tx blind allocation codebook activate the device that has not been successfully decoded using code division multiple access, and optionally indicate the silence probability ⁇ (0 ⁇ 1);
  • the device activated for CDMA randomly selects a codeword from the codebook to send an ID. If the silence probability is configured, each device will not send information in this round of ID reporting with probability ⁇ ;
  • 8.Tx instructs (per ID) the synchronization device on the codeword that should be used for subsequent data transmission based on the number of synchronization devices present at each delay.
  • Rx knows the IDs of all devices in advance, although Rx can assign codewords to all unidentified devices in one step, in order to ensure uniqueness, these codewords need to come from the same codebook. However, these devices may correspond to different delays and do not need to use the same codebook. Generally, the larger the codebook, the larger the expansion factor, resulting in more resources required to send one symbol. Therefore, the ID of the synchronized device at each delay can be obtained by adopting a multi-step iteration method similar to the blind codebook allocation, and then the appropriate codebook can be selected according to the number of device IDs to assign codewords to each device.
  • Solution 2 Delay domain-frequency domain/power domain/polarization domain multiple access.
  • Frequency domain FDM, which enables synchronized devices to use different frequencies, thereby distinguishing the signals of different devices in the frequency domain;
  • Power domain The signals of synchronized devices at the receiving end have power differences, so that the receiving end can use methods such as serial interference cancellation (SIC) to distinguish the superimposed signals.
  • SIC serial interference cancellation
  • Polarization domain Signals from different antenna polarization directions are orthogonal. Therefore, when a device has antennas with multiple polarization directions, signals can be sent in different polarization directions, so that the receiving end can distinguish signals from different devices.
  • the above methods are similar to the code domain method, except that the selectable resources of the device are no longer extended code words, but frequency, power, and polarization direction.
  • the transmission method includes:
  • Step 601 A first device receives a first message from a second device, where the first message is used to indicate device identification information of the second device, and the first message is a message sent using a first target configuration based on a second message sent by a first target device;
  • Step 602 The first device performs a first operation, where the first operation includes at least one of the following:
  • the third message is a message sent according to the first sending mode associated with the first target configuration, and the second target device is a second device in the first set;
  • the first set is a set of second devices corresponding to the device identification information identified by the first device based on the first message;
  • the second target configuration is a configuration obtained by updating the first target configuration based on a first update parameter, and the first update parameter includes at least one of the following: code domain parameters, frequency domain parameters, power domain parameters and polarization domain parameters.
  • the specific types of the above-mentioned first device, second device and third device can be set according to actual needs, for example, the first device is a base station, a reader/writer, a terminal device or a relay; the second device is a backscatter device, a terminal device or a relay; the third device is a base station, a reader/writer, a terminal device or a relay.
  • the first target device is a first device; for a dual-base communication scenario, the first target device is a third device.
  • the first message can be carried by a channel estimation signal for channel estimation or a data transmission signal for data transmission.
  • the second message can be carried by a fourth signal or a second signal, wherein the channel estimation signal can be referred to as a third signal and the data transmission signal can be referred to as a first signal.
  • the first message and the second message can also be carried by other additional signals, which are not further limited here.
  • the fourth signal and the second signal may be two independent signals, and the fourth signal may be an enhanced signal combined with the second signal, that is, the fourth signal includes part of the content of the second signal.
  • the first device can determine the second channel response based on the third signal, determine the first channel response based on the first signal, and then determine the first symbol transmitted by the second device based on the first channel response and the second channel response.
  • the first device or the third device may determine the second channel response based on the third signal, determine the first channel response based on the first signal, and finally determine the first symbol transmitted by the second device based on the first channel response and the second channel response.
  • the device that determines the channel response may be the same as or different from the device that determines the first symbol, and no further limitation is made here.
  • the first channel response and the second channel response may include a gain value and a delay.
  • the second target device may be understood as a second device that can be identified based on the time delay
  • the third target device may be understood as a second device that can be identified based on the time delay and the first update parameter.
  • the first message may be understood as a message sent by the second device without delay bias, or may be understood as a message sent by the second device based on a fixed time domain bias value.
  • the message sent is used as an example for explanation.
  • the first device can determine the second target device and the third target device according to the reception delay of the first message (that is, the original delay, which can also be referred to as the first delay).
  • the second device corresponding to the identification information that can be identified according to the first message is determined as the second target device, and the remaining second devices are determined as the third target devices.
  • the second target devices are distinguished by the delay
  • the third target devices are distinguished by the delay plus at least one of the code domain parameters, frequency domain parameters, power domain parameters, and polarization domain parameters, so that the first device can identify different second devices.
  • the above device identification information may be referred to as a device identification or a second device identification.
  • the first method mentioned above can be understood as a multiple access method based on the delay domain
  • the second method mentioned above can be understood as a multiple access method based on the delay domain-frequency domain/power domain/polarization domain.
  • a first message is received from a second device by a first device, the first message is used to indicate the device identification information of the second device, and the first message is a message sent using a first target configuration based on a second message sent by a first target device; the first device performs a first operation, and the first operation includes at least one of the following: receiving a third message from a second target device, the third message is a message sent in a first sending mode associated with the first target configuration, and the second target device is a second device in the first set; receiving a fourth message from a third target device, the fourth message is a message sent in a second sending mode associated with the second target configuration, and the third target device is a second device outside the first set; wherein the first set is a set of second devices corresponding to the device identification information identified by the first device based on the first message; the second target configuration is a configuration obtained by updating the first target configuration based on a first update parameter, and the first update parameter includes at least one of the
  • different second devices can have different delays or different first update parameters, and different channel responses are determined by using the delay differences or first update parameter differences of different second devices, and corresponding information to be transmitted is obtained based on channel response demodulation, so that multiple devices can share the same physical resources for parallel and concurrent transmission, thereby improving the transmission efficiency.
  • no additional synchronization operations are required on the device side, reducing the implementation complexity of the device; at the same time, the access capacity and spectrum efficiency of the system can also be improved.
  • the embodiments of the present application can increase the probability of successful access and reduce overhead such as latency and energy consumption.
  • the method further includes:
  • the first device determines the first set according to the first message.
  • the first device may determine the above-mentioned first set, and after determining the first set, the second device outside the first set may be instructed to send a message using the second sending method associated with the second target configuration.
  • the first device may directly instruct the third target device to send a message using the second sending method associated with the second target configuration, or the first device may indicate the first set to the third device, and then the third device may instruct the third target device to send a message using the second sending method associated with the second target configuration.
  • the method further includes:
  • the first device receives a fifth message from the third target device, where the fifth message is a message sent using a third target configuration based on a sixth message sent by the first target, where the third target configuration is a configuration obtained by updating the first target configuration based on a second update parameter, where the second update parameter includes at least one of the following: a code domain parameter, a frequency domain parameter, a power domain parameter, and a polarization domain parameter;
  • the first device determines the correspondence between the device identification information of the third target device and the first delay of the third target device according to the fifth message, and the correspondence between the device identification information of the third target device and the first delay of the third target device is used to determine the second target configuration or the first update parameter.
  • the first device has learned the device identification information of all second devices.
  • the first device needs to perform signal interaction with M specified second devices, and the M specified second devices are referred to as the second set.
  • the M second devices can be indicated by a third device or a network side device, and no further limitation is made here.
  • the second device corresponding to the device identification information identified based on the above-mentioned first message can be understood as the second device corresponding to the device identification information that can be identified without the delay offset value. If the second device corresponding to the device identification information cannot be identified based on the first message, different second devices can be distinguished by configuring the second update parameter, thereby facilitating the identification of the first device. That is to say, firstly, the first message is used to obtain the second device that can be identified without the delay offset value, and the fifth message is used to obtain the second device that can be identified by updating the first target configuration, so that the first device can identify the signals sent by different second devices. Finally, based on the correspondence between each second device and the first delay, the corresponding first update parameter can be configured so that the signal sent by each second device has a different receiving delay and/or first update parameter, ensuring that the first device can identify the signal sent by each second device.
  • the method before the first device receives the fifth message from the second device, the method further includes:
  • the first device sends a seventh message to the third target device, where the seventh message is used to determine the third target configuration.
  • the third target configuration can be understood as the updated first configuration or the second configuration
  • the first configuration can be understood as the configuration for sending the third signal
  • the second configuration can be understood as the configuration for sending the first signal.
  • the seventh message can be used to indicate the second updated parameter or the third target configuration.
  • the seventh message can be understood as an activation command, which is used to activate the message sent by the third target device according to the second sending mode using the third target configuration.
  • the sixth message can be understood as a message that triggers the third target device to report its own identity.
  • the sixth message and the seventh message can be combined into one message, that is, the content of the seventh message is carried in the sixth message.
  • the first configuration includes at least one of the following:
  • the second target information is used to autonomously generate a fifth symbol according to a second radio frequency signal in the fourth signal
  • silence parameter is used to determine whether to send the first message
  • the second target signal is the second signal or the fourth signal, the second signal is used to send the data transmission signal; the first part of the fourth signal is used to indicate the start of sending the second part of the fourth signal, the second part of the fourth signal is used to generate the channel estimation signal, and the second part of the fourth signal includes the fifth symbol or the second RF signal.
  • the second target information may include at least one of the following: the content of the third symbol, the interval of the third symbol, the modulation method of the third symbol (such as On-Off Keying (OOK), ASK, FSK, etc.) and the mapping relationship between the third symbol and the reflection coefficient.
  • the modulation method of the third symbol such as On-Off Keying (OOK), ASK, FSK, etc.
  • the above-mentioned silence parameters may include whether to randomly silence when reporting device identification information and the probability of silence.
  • the above-mentioned parameters associated with frequency domain access may include at least one of the following: whether to adopt frequency domain access, and a frequency offset value of the third signal relative to the second signal.
  • the above parameters associated with power domain access may include at least one of the following: whether to adopt power domain access, the power of sending the third signal, and the absolute value of the reflection coefficient used to send the third signal.
  • the above-mentioned parameters associated with polarization domain access may include at least one of the following: whether to adopt polarization domain access, the polarization direction of the antenna for sending the third signal, and the antenna number/index value for sending the third signal.
  • the second configuration includes at least one of the following:
  • the interval time between the data transmission signal and the end time of the first part of the second signal, the The first part is used to indicate the start of sending the data transmission signal
  • the center frequency of the data transmission signal or the frequency offset between the data transmission signal and a specific reference signal
  • first target information where the first target information is used to autonomously generate a third symbol based on the first radio frequency signal in the second signal
  • Target characteristic information the target identification information is used to indicate the end of the data transmission signal or the end of the sending of the information to be transmitted by the second device;
  • the second target signal is the second signal or the fourth signal, the second signal is used to send the data transmission signal; the first part of the fourth signal is used to indicate the start of sending the second part of the fourth signal, and the second part of the fourth signal is used to generate the channel estimation signal.
  • the adjustment interval of the reflection coefficient may be understood as how long it takes to modulate a symbol, such as defining one first symbol to be modulated for every k second symbols according to a relative value; or defining it according to an absolute value of time.
  • the first configuration and the second configuration do not include a modulation symbol set, a signal amplification factor, and a relay mode.
  • the first configuration and the second configuration have the following differences: deleting reflection coefficient related parameters; adding modulation symbol sets, signal amplification factors, and relay modes.
  • the first configuration includes at least one of the following:
  • the second target information is used to autonomously generate a fifth symbol according to a second radio frequency signal in the fourth signal
  • silence parameter is used to determine whether to send the first message
  • the second target signal is the second signal or the fourth signal, the second signal is used to send the data transmission signal; the first part of the fourth signal is used to indicate the start of sending the second part of the fourth signal, the second part of the fourth signal is used to generate the channel estimation signal, and the second part of the fourth signal includes the fifth symbol or the second RF signal.
  • the second configuration includes at least one of the following:
  • the center frequency of the data transmission signal or the frequency offset between the data transmission signal and a specific reference signal
  • first target information where the first target information is used to autonomously generate a third symbol based on the first radio frequency signal in the second signal
  • Target characteristic information the target identification information is used to indicate the end of the data transmission signal or the end of the sending of the information to be transmitted by the second device;
  • the second target signal is the second signal or the fourth signal, the second signal is used to send the data transmission signal; the first part of the fourth signal is used to indicate the start of sending the second part of the fourth signal, and the second part of the fourth signal is used to generate the channel estimation signal.
  • the first configuration and the second configuration have the following differences: delete the reflection coefficient related parameters; add the modulation symbol set, the signal amplification factor and the relay mode. Delete the reflection coefficient related parameters; add the modulation symbol set; include part or all of the second parameters and the first parameters.
  • the first configuration includes at least one of the following:
  • the second target information is used to autonomously generate a fifth symbol according to a second radio frequency signal in the fourth signal
  • silence parameter is used to determine whether to send the first message
  • the second target signal is the second signal or the fourth signal, the second signal is used to send the data transmission signal; the first part of the fourth signal is used to indicate the start of sending the second part of the fourth signal, the second part of the fourth signal is used to generate the channel estimation signal, and the second part of the fourth signal includes the fifth symbol or the second RF signal.
  • the second configuration includes at least one of the following:
  • the center frequency of the data transmission signal or the frequency offset between the data transmission signal and a specific reference signal
  • first target information where the first target information is used to autonomously generate a third symbol based on the first radio frequency signal in the second signal
  • Target characteristic information the target identification information is used to indicate the end of the data transmission signal or the end of the sending of the information to be transmitted by the second device;
  • the second target signal is the second signal or the fourth signal, the second signal is used to send the data transmission signal; the first part of the fourth signal is used to indicate the start of sending the second part of the fourth signal, and the second part of the fourth signal is used to generate the channel estimation signal.
  • the first parameter may be understood as a parameter for receiving a first signal, and the first parameter includes at least one of the following:
  • the third signal sends the length or number of symbols of the third symbol
  • the third signal sends a symbol interval of a third symbol
  • the third signal sends a waveform of a third symbol
  • the third signal sends the center frequency of the third symbol
  • the third signal sends a bandwidth of a third symbol
  • the third symbol is used to generate the first signal.
  • the second parameter may be understood as a parameter for receiving the third signal, and may specifically include at least one of the following:
  • a modulation mode of sending the fifth symbol of the fourth signal such as PSK, OOK, FSK, etc.
  • the fourth signal sends the length or number of symbols of the fifth symbol
  • the fourth signal sends a symbol interval of a fifth symbol
  • the fourth signal sends a waveform of the fifth symbol, such as a single-carrier square wave, a rolled-off cosine wave, a sinc wave, a sine wave, etc.; multi-carrier orthogonal frequency division multiplexing (Orthogonal frequency division multiplexing, OFDM), (Discrete Fourier Transform-Spread-Orthogonal Frequency Division Multiplexing, DFT-S-OFDM), orthogonal time-frequency space (Orthogonal Time Frequency Space, OTFS), etc.;
  • OFDM Orthogonal frequency division multiplexing
  • DFT-S-OFDM Discrete Fourier Transform-Spread-Orthogonal Frequency Division Multiplexing
  • OTFS Orthogonal time-frequency space
  • the fourth signal sends the center frequency of the fifth symbol
  • the fourth signal transmits a bandwidth of the fifth symbol
  • the method further includes:
  • the first device receives an eighth message from the third target device, where the eighth message is a message sent using a fourth target configuration based on a ninth message sent by the first target device, where the fourth target configuration is a configuration obtained by updating the first target configuration based on a silence parameter and a third update parameter, where the silence parameter is used to determine whether to report device identification information, and the third update parameter includes at least one of the following: a code domain parameter, a frequency domain parameter, a power domain parameter, and a polarization domain parameter;
  • the first device determines the correspondence between the device identification information of the third target device and the first delay of the third target device according to the eighth message, and the correspondence between the device identification information of the third target device and the first delay of the third target device is used to determine the second target configuration or the first update parameter.
  • the first device does not know in advance the device identification of the second device to be transmitted.
  • this may also include a situation where the first device knows in advance the device identification of the second device to be transmitted.
  • the second device corresponding to the device identification information identified based on the above-mentioned first message can be understood as the second device corresponding to the device identification information that can be identified without the delay offset value. If the second device corresponding to the device identification information cannot be identified based on the first message, different second devices can be distinguished by configuring the second update parameter, thereby facilitating the identification of the first device. That is, first use the first message to obtain the second device that can be identified without the delay offset value, and use the seventh message to obtain the second device that needs to be identified by updating the first target configuration. The first device can identify the signals sent by different second devices by identifying the second device, so that the first device can identify the signals sent by different second devices. Finally, based on the correspondence between each second device and the first delay, the corresponding first update parameter can be configured so that the signal sent by each second device has a different receiving delay and/or first update parameter, ensuring that the first device can identify the signal sent by each second device.
  • the method before the first device receives the eighth message from the second device, the method further includes:
  • the first device sends a tenth message to the second device, where the tenth message is used to determine the fourth target configuration
  • the first device sends an eleventh message to the second target device, where the eleventh message is used to instruct the second target device to ignore the fourth target configuration.
  • the above-mentioned fourth target configuration can be understood as the updated first configuration or the second configuration
  • the first configuration can be understood as the configuration for sending the third signal
  • the second configuration can be understood as the configuration for sending the first signal.
  • the tenth message may be used to indicate the third update parameter or the fourth target configuration.
  • the tenth message can be understood as an activation command, which is used to activate all second devices to send messages using the fourth target configuration in accordance with the second sending method.
  • the ninth message can be understood as a message that triggers all second devices to report their own identification. Since the eleventh message indicates that the second device that has identified the device identification information ignores the fourth configuration, the second device that has identified the device identification information no longer reports the device identification information.
  • the method further includes any one of the following:
  • the first device sends, to the third device, a correspondence between device identification information of the third target device and a first delay of the third target device;
  • the first device determines the second target configuration or the first update parameter based on a correspondence between the device identification information of the third target device and the first delay of the third target device.
  • the first device when the second target configuration or the first update parameter is determined by the third device, the first device may report the correspondence between the device identification information of the third target device and the first delay of the third target device.
  • the method further includes:
  • the first device sends a twelfth message to the third target device, where the twelfth message is used to instruct the third target device to send a message according to the second sending mode associated with the second target configuration.
  • the twelfth message may include the first update parameter or the second target configuration. It should be understood that the second target configuration may be indicated by the first device or by the third device.
  • the method further includes:
  • the first device sends a fourteenth message to the third device, where the fourteenth message is used to determine the first set.
  • the fourteenth message may include the correspondence between the device identification information of the second device and the first time delay of the second device, or may only include the device identification information of all second devices currently identified.
  • the method further includes:
  • the first device sends a fifteenth message to the second target device, where the fifteenth message is used to instruct the second target device to send a message according to the first sending manner.
  • the second target device may transmit information according to the multiple access method of the delay domain based on the fifteenth message.
  • Embodiment 1 Single-base BSC multiple access
  • the RF source and the receiving end are considered to be the same device, which may be a base station, a reader/writer, a terminal device, a relay, etc., hereinafter referred to as the first device, and the BSC device is the second device.
  • the second device sends a third signal, and the first device detects the third signal to perform channel estimation. Specifically, the following process may be included:
  • the first device sends a fourth signal to the second device, the fourth signal comprising a first part and a second part, wherein the first part includes a fourth symbol and the second part includes a fifth symbol or a CW.
  • the second device After the second device detects that the first part (or fourth symbol) of the fourth signal ends, it sends a third signal in a first configuration, wherein the third signal is backscattered by the second part of the fourth signal.
  • the second configuration may be indicated by the fourth symbol, or an agreed default value.
  • the first device receives the third signal, and obtains a second channel response (including a gain value and a delay) which is initiated from the first device, backscattered by the (each) second device, and reaches the first device.
  • a second channel response including a gain value and a delay
  • the second device sends the first signal, and the first device obtains the information sent by the second device based on the received third signal and the first signal.
  • the specific process includes the following:
  • the first device sends a second signal to the second device, the second signal including a first part and a second part, wherein the first part includes a second symbol and the second part includes a third symbol or a CW.
  • the second device After the second device detects that the first part (or second symbol) of the second signal has ended, it sends the first signal in a second configuration, wherein the first signal carries the information to be transmitted by the second device (i.e., the first symbol), and is generated by backscattering the second part of the second signal.
  • the first configuration may be indicated by a second symbol, or an agreed default value.
  • the second symbol is optional, and its function is to inform the second device when to start backscattering the signal, or to serve as a start symbol.
  • the second signal and the fourth signal are merged, that is, an enhanced fourth signal is used, and when the fourth symbol, the fifth symbol, and the third symbol are placed consecutively, there is no second symbol.
  • the first device receives the first signal, and obtains a first channel response (including a gain value and a delay) which is initiated from the first device, backscattered by the (each) second device, and reaches the first device.
  • a first channel response including a gain value and a delay
  • the first device obtains the first symbol according to the second channel response and the first channel response, and completes sending the signal to the second device. Detection of information.
  • the fourth signal and the second signal can be combined, that is, an enhanced fourth signal is sent, including a first part, a second part and a third part, which respectively contain a fourth symbol, a fifth symbol or CW, a third symbol or CW, and no second symbol, wherein the second configuration and/or the first configuration can be indicated by the fourth symbol, or an agreed default value.
  • the possible placements include the following two situations:
  • the first part, the second part and the third part are placed continuously.
  • the second device detects that the first part is finished, it sends the third signal and the first signal successively.
  • the first part and the second part are placed continuously, and there is a first interval between the second part and the third part.
  • the second device detects that the first part ends, it sends the third signal and then sends the first signal after the first interval.
  • the first interval is an optional parameter of the second configuration.
  • Embodiment 2 dual-base BSC multiple access.
  • the RF source and the receiving end are considered to be different devices, which can be a base station, a reader, a terminal device, and a relay, etc.
  • the receiving end is hereinafter referred to as the first device, the RF source is called the third device, and the BSC device is called the second device.
  • the second device sends a third signal, and the first device detects the third signal to perform channel estimation. Specifically, the following process may be included:
  • the third device sends a fourth signal to the second device, the fourth signal comprising a first part and a second part, wherein the first part comprises a fourth symbol and the second part comprises a fifth symbol or a CW;
  • the second device After the second device detects that the first part (or fourth symbol) of the fourth signal ends, it sends a third signal in a first configuration, wherein the third signal is generated by backscattering the second part of the fourth signal.
  • the first configuration may be indicated by the fourth symbol, or an agreed default value.
  • the first device receives the third signal, which may specifically include the following situations:
  • Case 1 (the second channel response is determined by the first device): The first device obtains the second channel response (including gain value and delay) starting from the third device, backscattered by (each) second device, and reaching the first device based on the second parameter.
  • the third device before sending the fourth signal, the third device sends message 1 to the first device, indicating the second parameter required to obtain the second channel response; or, the first device detects the fourth symbol and obtains the second parameter; or, the second parameter is an agreed value.
  • the first device sends message 2 to the third device, and the message 2 carries the second channel response.
  • Case 2 (the second channel response is determined by the third device): the first device sends a message 3 to the third device, wherein the message 3 carries part or all of the content of the third signal; the third device obtains the second channel response (including gain value and delay) that starts from the third device, passes through (each) second device backscattering, and reaches the first device.
  • the third device sends a message 4 to the first device, wherein the message 4 carries the second channel response.
  • the second device sends the first signal, and the first or first device obtains the information sent by the first device according to the received third signal and the first signal.
  • the process includes the following:
  • the third device sends a second signal to the second device, the second signal comprising a first part and a second part, wherein the first part comprises a second symbol and the second part comprises a third symbol or a CW.
  • the first signal is sent in a second configuration, wherein the first signal carries information to be transmitted by the second device (first symbol) and is generated by backscattering the second part of the second signal.
  • the second configuration may be indicated by the second symbol or an agreed default value.
  • the first symbol is obtained by the second device through expansion based on the original information to be transmitted (ie, the sixth symbol).
  • the first device receives the first signal, which may specifically include the following situations:
  • Case 1 the first device determines the first channel response and the first symbol: the first device obtains the first channel response (including gain value and delay) from the third device, backscattered by (each) second device, and reaching the first device according to the first parameter; the first device obtains the first symbol according to the second channel response and the first channel response, and completes the detection of the information sent by the first device.
  • the first device obtains the first symbol and needs to expand the first symbol to obtain the sixth symbol.
  • the first device sends a message 5 to the third device, where the message 5 carries the first symbol; optionally, for the code domain method, the message 5 carries the sixth symbol.
  • the third device before sending the second signal, the third device sends a message 6 to the first device, indicating a first parameter required to obtain a first channel response; or, the first device detects the second symbol to obtain the first parameter; or, the first parameter is an agreed value.
  • Case 2 (the first device determines the first channel response, and the third device determines the first symbol): the first device obtains the first channel response (including gain value and delay) starting from the third device, backscattered by (each) second device, and reaching the first device according to the first parameter; after obtaining the first channel response, the first device sends message 7 to the third device, and the message 7 carries the first channel response; the third device obtains the first symbol according to the second channel response and the first channel response, and completes the detection of the information sent by the first device.
  • the first device obtains the first symbol and needs to expand the first symbol to obtain the sixth symbol.
  • the third device sends a message 8 to the first device, wherein the message 8 carries the first symbol.
  • the message 8 carries the sixth symbol.
  • the third device before sending the second signal, the third device sends a message 6 to the first device, indicating a first parameter required to obtain a first channel response; or, the first device detects the second symbol to obtain the first parameter; or, the first parameter is an agreed value.
  • Case 3 the third device determines the first channel response and the first symbol: the first device sends a message 9 to the third device, wherein the message 9 carries part or all of the content of the first signal; the third device obtains the first channel response (including gain value and delay) that starts from the third device, passes through (each) second device and is backscattered to the first device; the third device obtains the first symbol based on the second channel response and the first channel response, and completes the detection of the information sent by the first device.
  • the first device obtains the first symbol and needs to expand the first symbol to obtain the sixth symbol.
  • the third device sends a message 10 to the first device, and the message 10 carries the first symbol.
  • the message 10 carries the sixth symbol.
  • Case 4 the third device determines the first channel response, and the first device determines the first symbol: the first device sends a message 9 to the third device, wherein the message 9 carries part or all of the first signal; the third device obtains the first channel response (including the gain value and the time) which is sent from the third device, backscattered by the (each) second device, and reaches the first device. After obtaining the first channel response, the third device sends a message 11 to the first device, and the message 11 carries the first channel response; the first device obtains the first symbol according to the second channel response and the first channel response, and completes the detection of the information sent by the first device.
  • the first device obtains the first symbol and needs to extend the first symbol to obtain the sixth symbol.
  • the first device sends a message 12 to the third device, and the message 12 carries the first symbol.
  • the message 10 carries the sixth symbol.
  • the resource configuration process may include the following process:
  • the third device sends a message A1 to instruct the second device to report the second device ID or ID-related information (hereinafter referred to as the second device identification) using a basic delay domain multiple access method.
  • the second device sends message A2, where message A2 carries the second device's own identification.
  • message A1 may be carried by a separate signaling, or carried by a signal (such as a third signal, a first signal) sent by a third device to assist the second device in accessing (such as the fourth symbol of the second signal, the second symbol of the second signal, etc.).
  • a signal such as a third signal, a first signal
  • message A1 may be carried by a separate signaling, or carried by a signal (such as a third signal, a first signal) sent by a third device to assist the second device in accessing (such as the fourth symbol of the second signal, the second symbol of the second signal, etc.).
  • the first device attempts to detect all signals carrying message A2 sent by the second devices, and the successfully decoded message A2 is the successfully identified second device identification set (hereinafter referred to as set 1).
  • the third device determines a set of second device identifiers that have not been successfully identified (hereinafter referred to as set 3) based on an existing set of all second device identifiers (hereinafter referred to as set 2) (owned by the second device or indicated by a network-side device).
  • the third device sends message A3 to activate the devices belonging to set 3 to subsequently access using the code domain/frequency domain/power domain/polarization domain, wherein message A3 carries the second configuration about the code domain/frequency domain/power domain/polarization domain (i.e., the second updated parameters mentioned above).
  • the second device belonging to set 3 accesses in the delay domain + code domain/frequency domain/power domain/polarization domain according to the updated second configuration.
  • the second device indicates that the second device belonging to set 3 reports the device identification in a delay domain + code domain/frequency domain/power domain/polarization domain manner, and then indicates an updated second configuration.
  • the third device sends message A4 to instruct the device belonging to set 3 to report the device identification, and the second device sends message A5 in the delay domain + code domain/frequency domain/power domain/polarization domain mode, where message A5 carries the second device's own identification.
  • the first device detects the signal carrying message A5, determines and records the relationship between the second device and the delay based on the relationship between message A5 and the delay, and the second device identification carried by message A5; the third device sends message A6 to the second device belonging to the set, where message A6 carries the second configuration about the code domain/frequency domain/power domain/polarization domain.
  • the resource configuration process may include the following process:
  • the third device sends a message A1 to instruct the second device to use the basic delay domain multiple access method to report the second device
  • the device ID or ID-related information hereinafter referred to as the second device identification.
  • the second device sends message A2, where message A2 carries the second device's own identification.
  • message A1 may be carried by a separate signaling, or carried by a signal (such as a third signal, a first signal) sent by a third device to assist the second device in accessing (such as the fourth symbol of the second signal, the second symbol of the second signal, etc.).
  • a signal such as a third signal, a first signal
  • message A1 may be carried by a separate signaling, or carried by a signal (such as a third signal, a first signal) sent by a third device to assist the second device in accessing (such as the fourth symbol of the second signal, the second symbol of the second signal, etc.).
  • the first device attempts to detect all signals carrying message A2 sent by the second devices, and the successfully decoded message A2 is the successfully identified second device identification set (hereinafter referred to as set 1).
  • the third device sends message A3 to activate all devices to subsequently access using the delay domain + code domain/frequency domain/power domain/polarization domain method, wherein message A3 carries the second configuration regarding random silence and the code domain/frequency domain/power domain/polarization domain, as well as the first configuration regarding random silence (i.e., the above-mentioned random parameters).
  • the third device sends a message A4 to instruct the second device belonging to set 1 to ignore the message A3 and not to continue to report its own identification (ie, remain silent after identification).
  • the third device sends a message A5, instructing the second device to report its own identification in the delay domain + code domain/frequency domain/power domain/polarization domain manner.
  • the third device sends a message A6, where the message A6 carries the second device's own identification.
  • the first device detects and attempts to detect (delay domain + code domain/frequency domain/power domain/polarization domain detection) the signal carrying message A6 sent by the second device.
  • the successfully decoded message A6 is the successfully identified second device identification set; then, based on the relationship between message A6 and the delay, and the second device identification carried by message A6, the relationship between the second device and the delay is determined and recorded.
  • the third device sends a message A7 to instruct the second devices belonging to the first target set to subsequently adopt a basic delay domain access method.
  • the third device sends an eighth message, instructing the devices belonging to the second target set to subsequently access using the delay domain + code domain/frequency domain/power domain/polarization domain method, wherein the eighth message carries the second configuration about the code domain/frequency domain/power domain/polarization domain.
  • the first target set is a set of second devices identified based on message A1
  • the second target set is a set of second devices identified based on message A5.
  • the decoding is considered successful:
  • the decoding is considered successful if the decoded device identifier meets the identifier generation rules, such as the identifier value range is valid; some fixed bits in the identifier (such as the manufacturer identifier) are positive. Indeed, etc.
  • the number of frames in which the difference (such as Euclidean distance, etc.) between the channel h′ obtained in the information transmission stage and the h obtained by channel estimation is less than a first preset value is greater than a second preset value;
  • the number of consecutive unsuccessful decoding of messages bearing device identification is greater than a third preset value
  • the first preset value, the second preset value, and the third preset value may be default or indicated by the network side device.
  • an embodiment of the present application further provides a transmission method.
  • the transmission method includes:
  • Step 701 the second device receives a second message from the first target device
  • Step 702 The second device sends a first message to the first device using a first target configuration based on the second message;
  • Step 703 The second device performs a second operation, where the second operation includes at least one of the following:
  • the second device belongs to the first set, receiving a fifteenth message from the first target device, and sending a third message based on the fifteenth message, wherein the fifteenth message is used to instruct the second device to send a message according to the first sending mode associated with the first target configuration;
  • the second device In a case where the second device does not belong to the first set, receiving a twelfth message from the first target device, and sending a fourth message based on the twelfth message, wherein the twelfth message is used to instruct the second device to send a message according to a second sending mode associated with the second target configuration;
  • the first set is a set of second devices corresponding to the device identification information identified by the first device based on the first message;
  • the second target configuration is a configuration obtained by updating the first target configuration based on a first update parameter, and the first update parameter includes at least one of the following: code domain parameters, frequency domain parameters, power domain parameters and polarization domain parameters.
  • the method further includes:
  • the second device receives a sixth message from the first target device
  • the second device sends a fifth message to the first device using a third target configuration based on the sixth message;
  • the third target configuration is a configuration obtained by updating the first target configuration based on a second update parameter, and the second update parameter includes at least one of the following: a code domain parameter, a frequency domain parameter, a power domain parameter, and a polarization domain parameter.
  • the method before the second device receives the sixth message from the first target device, the method further includes:
  • the second device receives a seventh message from the first target device, where the seventh message is used to determine the third target configuration.
  • the method further includes:
  • the second device receives a ninth message from the first target device
  • the second device sends an eighth message to the first device using a fourth target configuration based on the ninth message
  • the fourth target configuration is a configuration obtained by updating the first target configuration based on a third update parameter
  • the second update parameter includes at least one of the following: a code domain parameter, a frequency domain parameter, a power domain parameter, and a polarization domain parameter.
  • the method before the second device receives the sixth message from the first target device, the method further includes:
  • the second device receives a tenth message from the first target device, the tenth message being used to determine the fourth target configuration.
  • an embodiment of the present application further provides a transmission method.
  • the transmission method includes:
  • Step 801 A third device sends a second message to a second device, where the second message is used to send a first message using a first target configuration;
  • Step 802 The third device performs a third operation, where the third operation includes at least one of the following:
  • the second target device is the second device in the first set
  • the third target device is the second device outside the first set
  • the first set is a set of second devices corresponding to the device identification information identified by the first device based on the first message
  • the second target configuration is a configuration obtained by updating the first target configuration based on the first update parameter
  • the first update parameter includes at least one of the following: code domain parameters, frequency domain parameters, power domain parameters and polarization domain parameters.
  • the method further includes:
  • the third device sends a sixth message to the third target device, where the sixth message is used for the fifth message sent by the third target device using the third target configuration;
  • the fifth message is used to determine the correspondence between the device identification information of the third target device and the first delay of the third target device, and the correspondence between the device identification information of the third target device and the first delay of the third target device is used to determine the second target configuration or the first update parameter.
  • the method before the third device sends the sixth message to the third target device, the method further includes:
  • the third device sends a seventh message to a third target device, where the seventh message is used to determine the third target configuration.
  • the method further includes:
  • the third device sends a ninth message to the third target device, where the ninth message is used for the eighth message sent by the third target device using the fourth target configuration;
  • the eighth message is used to determine the correspondence between the device identification information of the third target device and the first delay of the third target device, and the correspondence between the device identification information of the third target device and the first delay of the third target device is used to determine the second target configuration or the first update parameter.
  • the method further includes:
  • the third device sends a tenth message to the third target device and to the second device, where the tenth message is used by the third target device to determine the third target configuration.
  • the method further includes:
  • the third device receives, from the first device, a correspondence between the device identification information of the third target device and the first delay of the third target device;
  • the third device determines the second target configuration or the first update parameter according to a correspondence between device identification information of the third target device and the first delay of the third target device.
  • the method further includes:
  • the third device receives a fourteenth message from the first device, where the fourteenth message is used to determine the first set.
  • the transmission method provided in the embodiment of the present application can be executed by a transmission device.
  • the transmission device provided in the embodiment of the present application is described by taking the transmission method executed by the transmission device as an example.
  • an embodiment of the present application further provides a transmission device.
  • the transmission device 900 includes:
  • the first receiving module 901 is configured to receive a first message from a second device, where the first message is used to indicate device identification information of the second device, and the first message is a message sent using a first target configuration based on a second message sent by a first target device; and perform a first operation, where the first operation includes at least one of the following:
  • the third message is a message sent according to the first sending mode associated with the first target configuration, and the second target device is a second device in the first set;
  • the first set is a set of second devices corresponding to the device identification information identified by the first device based on the first message;
  • the second target configuration is a configuration obtained by updating the first target configuration based on a first update parameter, and the first update parameter includes at least one of the following: code domain parameters, frequency domain parameters, power domain parameters and polarization domain parameters.
  • the transmission device 900 further includes:
  • a first determining module is used to determine the first set according to the first message.
  • the transmission device 900 further includes:
  • the first receiving module 901 is further configured to receive a fifth message from the third target device, where the fifth message is a message sent using a third target configuration based on a sixth message sent by the first target, where the third target configuration is a configuration obtained by updating the first target configuration based on a second update parameter, where the second update parameter includes at least one of the following: a code domain parameter, a frequency domain parameter, a power domain parameter, and a polarization domain parameter;
  • the first determination module is used to determine the correspondence between the device identification information of the third target device and the first delay of the third target device according to the fifth message, and the correspondence between the device identification information of the third target device and the first delay of the third target device is used to determine the second target configuration or the first update parameter.
  • the transmission device 900 further includes:
  • the first sending module is used to send a seventh message to the third target device, where the seventh message is used to determine the third target configuration.
  • the transmission device 900 further includes:
  • the first receiving module 901 is further configured to receive an eighth message from the third target device.
  • the eighth message is A message sent using a fourth target configuration based on a ninth message sent by the first target device, where the fourth target configuration is a configuration obtained by updating the first target configuration based on a silence parameter and a third update parameter, where the silence parameter is used to determine whether to report device identification information, and the third update parameter includes at least one of the following: a code domain parameter, a frequency domain parameter, a power domain parameter, and a polarization domain parameter;
  • the first determination module is used to determine the correspondence between the device identification information of the third target device and the first delay of the third target device according to the eighth message, and the correspondence between the device identification information of the third target device and the first delay of the third target device is used to determine the second target configuration or the first update parameter.
  • the transmission device 900 further includes:
  • the first sending module is used to send a tenth message to the second device, where the tenth message is used to determine the fourth target configuration; and send an eleventh message to the second target device, where the eleventh message is used to instruct the second target device to ignore the fourth target configuration.
  • the transmission device 900 further includes:
  • the first sending module is used to perform any of the following:
  • the second target configuration or the first update parameter is determined based on the correspondence between the device identification information of the third target device and the first delay of the third target device.
  • the transmission device 900 further includes:
  • the first sending module is configured to send a twelfth message to the third target device, wherein the twelfth message is used to instruct the third target device to send a message according to a second sending mode associated with the second target configuration.
  • the transmission device 900 further includes:
  • the first sending module is used to send a thirteenth message to the third device, where the thirteenth message is used to indicate a corresponding relationship between the device identification information of the third target device and the first delay of the third target device.
  • the transmission device 900 further includes:
  • the first sending module is used to send a fourteenth message to a third device, where the fourteenth message is used to determine the first set.
  • the transmission device 900 further includes:
  • the first sending module is used to send a fifteenth message to the second target device, where the fifteenth message is used to instruct the second target device to send a message according to the first sending mode.
  • the transmission device 1000 includes:
  • the second receiving module 1001 is used to receive a second message from the first target device
  • a second sending module 1002 configured to send a first message to a first device using a first target configuration based on the second message
  • the first execution module 1003 is configured to execute a second operation, where the second operation includes at least one of the following:
  • the second device belongs to the first set, receiving a fifteenth message from the first target device, and sending a third message based on the fifteenth message, wherein the fifteenth message is used to instruct the second device to send a message according to the first sending mode associated with the first target configuration;
  • the second device In a case where the second device does not belong to the first set, receiving a twelfth message from the first target device, and sending a fourth message based on the twelfth message, wherein the twelfth message is used to instruct the second device to send a message according to a second sending mode associated with the second target configuration;
  • the first set is a set of second devices corresponding to the device identification information identified by the first device based on the first message;
  • the second target configuration is a configuration obtained by updating the first target configuration based on a first update parameter, and the first update parameter includes at least one of the following: code domain parameters, frequency domain parameters, power domain parameters and polarization domain parameters.
  • the second receiving module 1001 is further configured to receive a sixth message from the first target device
  • the second sending module 1002 is further configured to send a fifth message to the first device using a third target configuration based on the sixth message;
  • the third target configuration is a configuration obtained by updating the first target configuration based on a second update parameter, and the second update parameter includes at least one of the following: a code domain parameter, a frequency domain parameter, a power domain parameter, and a polarization domain parameter.
  • the second receiving module 1001 is further used to receive a seventh message from the first target device, where the seventh message is used to determine the third target configuration.
  • the second receiving module 1001 is further configured to receive a ninth message from the first target device
  • the second sending module 1002 is further configured to send an eighth message to the first device using a fourth target configuration based on the ninth message;
  • the fourth target configuration is a configuration obtained by updating the first target configuration based on a third update parameter
  • the second update parameter includes at least one of the following: a code domain parameter, a frequency domain parameter, a power domain parameter, and a polarization domain parameter.
  • the second receiving module 1001 is further used to receive a tenth message from the first target device, and the tenth message is used to determine the fourth target configuration.
  • the transmission device 1100 includes:
  • a third sending module 1101 is configured to send a second message to a second device, where the second message is used to send the first message using the first target configuration;
  • the second execution module 1102 is configured to execute a third operation, where the third operation includes at least one of the following:
  • the second target device is a second device in the first set
  • the third target device is a second device outside the first set
  • the first set is a second device corresponding to the device identification information identified by the first device based on the first message.
  • a set of second devices; the second target configuration is a configuration obtained by updating the first target configuration based on a first update parameter, and the first update parameter includes at least one of the following: a code domain parameter, a frequency domain parameter, a power domain parameter, and a polarization domain parameter.
  • the third sending module 1101 is further used to send a sixth message to the third target device, where the sixth message is used for the fifth message sent by the third target device using the third target configuration;
  • the fifth message is used to determine the correspondence between the device identification information of the third target device and the first delay of the third target device, and the correspondence between the device identification information of the third target device and the first delay of the third target device is used to determine the second target configuration or the first update parameter.
  • the third sending module 1101 is further used to send a seventh message to a third target device, where the seventh message is used to determine the third target configuration.
  • the third sending module 1101 is further used to send a ninth message to the third target device, where the ninth message is used for the eighth message sent by the third target device using the fourth target configuration;
  • the eighth message is used to determine the correspondence between the device identification information of the third target device and the first delay of the third target device, and the correspondence between the device identification information of the third target device and the first delay of the third target device is used to determine the second target configuration or the first update parameter.
  • the third sending module 1101 is further used to send a tenth message to the third target device to the second device, and the tenth message is used for the third target device to determine the third target configuration.
  • the transmission device 1100 further includes:
  • a third receiving module configured to receive, from the first device, a correspondence between device identification information of the third target device and a first delay of the third target device;
  • the second determination module is configured to determine the second target configuration or the first update parameter according to a correspondence between device identification information of a third target device and the first delay of the third target device.
  • the transmission device 1100 further includes:
  • the third receiving module is used to receive a fourteenth message from the first device, where the fourteenth message is used to determine the first set.
  • the transmission method provided in the embodiment of the present application can be executed by a transmission device.
  • the transmission device provided in the embodiment of the present application is described by taking the transmission method executed by the transmission device as an example.
  • the transmission device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip.
  • the electronic device may be a terminal, or may be other devices other than a terminal.
  • the terminal may include but is not limited to the types of terminal 11 listed above, and other devices may be servers, network attached storage (NAS), etc., which are not specifically limited in the embodiment of the present application.
  • the transmission device provided in the embodiment of the present application can implement the various processes implemented in the method embodiments of Figures 6 to 8 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the embodiment of the present application further provides a communication device 1200, including a processor 1201 and Memory 1202, the memory 1202 stores programs or instructions that can be run on the processor 1201.
  • the program or instruction is executed by the processor 1201
  • the various steps of the above-mentioned transmission method embodiment are implemented, and the same technical effect can be achieved. To avoid repetition, it will not be repeated here.
  • the embodiment of the present application further provides a terminal, including a processor and a communication interface, wherein:
  • the communication interface is used to receive a first message from a second device, the first message is used to indicate device identification information of the second device, and the first message is a message sent using a first target configuration based on a second message sent by a first target device; perform a first operation, the first operation including at least one of the following: receive a third message from a second target device, the third message is a message sent in a first sending mode associated with the first target configuration, and the second target device is a second device in a first set; receive a fourth message from a third target device, the fourth message is a message sent in a second sending mode associated with the second target configuration, and the third target device is a second device outside the first set; wherein the first set is a set of second devices corresponding to device identification information identified by the first device based on the first message; the second target configuration is a configuration obtained by updating the first target configuration based on a first update parameter, and the first update parameter includes at least one of the following:
  • the communication interface is used to receive a second message from a first target device; send a first message to the first device using a first target configuration based on the second message; and perform a second operation, wherein the second operation includes at least one of the following: when the second device belongs to a first set, receive a fifteenth message from the first target device, and send a third message based on the fifteenth message, wherein the fifteenth message is used to instruct the second device to send a message according to a first sending method associated with the first target configuration; when the second device does not belong to the first set, receive a twelfth message from the first target device, and send a fourth message based on the twelfth message, wherein the twelfth message is used to instruct the second device to send a message according to a second sending method associated with the second target configuration; wherein the first set is a set of second devices corresponding to device identification information identified by the first device based on the first message; and the second target configuration is a
  • the communication interface is used to receive a second message from a first target device; send a first message to the first device using a first target configuration based on the second message; and perform a second operation, wherein the second operation includes at least one of the following: when the second device belongs to a first set, receive a fifteenth message from the first target device, and send a third message based on the fifteenth message, wherein the fifteenth message is used to instruct the second device to send a message according to a first sending method associated with the first target configuration; when the second device does not belong to the first set, receive a twelfth message from the first target device, and send a fourth message based on the twelfth message, wherein the twelfth message is used to instruct the second device to send a message according to a second sending method associated with the second target configuration; wherein the first set is a set of second devices corresponding to device identification information identified by the first device based on the first message; and the second target configuration is a
  • FIG13 is a schematic diagram of the hardware structure of a terminal implementing the embodiment of the present application.
  • the terminal 1300 includes but is not limited to: a radio frequency unit 1301, a network module 1302, an audio output unit 1303, an input unit 1304, a sensor 1305, a display unit 1306, a user input unit 1307, an interface unit 1308, a memory 1309 and at least some of the components of a processor 1310.
  • the terminal 1300 may also include a power source (such as a battery) for supplying power to each component, and the power source may be logically connected to the processor 1310 through a power management system, so as to manage charging, discharging, and power consumption management through the power management system.
  • a power source such as a battery
  • the terminal structure shown in FIG13 does not constitute a limitation on the terminal, and the terminal may include more or fewer components than shown in the figure, or combine certain components, or arrange components differently, which will not be described in detail here.
  • the input unit 1304 may include a graphics processing unit (GPU) 13041 and a microphone 13042, and the graphics processor 13041 processes the image data of the static picture or video obtained by the image capture device (such as a camera) in the video capture mode or the image capture mode.
  • the display unit 1306 may include a display panel 13061, and the display panel 13061 may be configured in the form of a liquid crystal display, an organic light emitting diode, etc.
  • the user input unit 1307 includes a touch panel 13071 and at least one of other input devices 13072.
  • the touch panel 13071 is also called a touch screen.
  • the touch panel 13071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 13072 may include, but are not limited to, a physical keyboard, function keys (such as a volume control key, a switch key, etc.), a trackball, a mouse, and a joystick, which will not be repeated here.
  • the RF unit 1301 can transmit the data to the processor 1310 for processing; in addition, the RF unit 1301 can send uplink data to the network side device.
  • the RF unit 1301 includes but is not limited to an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, etc.
  • the memory 1309 can be used to store software programs or instructions and various data.
  • the memory 1309 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instruction required for at least one function (such as a sound playback function, an image playback function, etc.), etc.
  • the memory 1309 may include a volatile memory or a non-volatile memory, or the memory 1309 may include both volatile and non-volatile memories.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
  • the volatile memory may be a random access memory (RAM), a static random access memory (SRAM), a dynamic random access memory (DRAM), a synchronous dynamic random access memory (SDRAM), a double data rate synchronous dynamic random access memory (DDRSDRAM), an enhanced synchronous dynamic random access memory (ESDRAM), a synchronous link dynamic random access memory (SLDRAM) and a direct memory bus random access memory (DRRAM).
  • the memory 1309 in the embodiment of the present application includes but is not limited to these and any other suitable types of memory.
  • the processor 1310 may include one or more processing units; optionally, the processor 1310 integrates an application processor and a modem processor, wherein the application processor mainly processes operations related to an operating system, a user interface, and application programs, and the modem processor mainly processes wireless communication signals, such as a baseband processor. It is understandable that the modem processor may not be integrated into the processor 1310.
  • the radio frequency unit 1301 is used to receive a first message from a second device, the first message being used to indicate device identification information of the second device, and the first message being a message sent using a first target configuration based on a second message sent by a first target device; performing a first operation, the first operation comprising at least one of the following: receiving a third message from a second target device, the third message being a message sent in a first sending mode associated with the first target configuration, and the second target device being a second device in a first set; receiving a fourth message from a third target device, the fourth message being a message sent in a second sending mode associated with the second target configuration, and the third target device being a second device outside the first set; wherein the first set is a set of second devices corresponding to device identification information identified by the first device based on the first message; the second target configuration is a configuration obtained by updating the first target configuration based on a first update parameter, and the first update parameter comprises at least one
  • the radio frequency unit 1301 is used to receive a second message from a first target device; send a first message to the first device using a first target configuration based on the second message; and perform a second operation, wherein the second operation includes at least one of the following: when the second device belongs to a first set, receive a fifteenth message from the first target device, and send a third message based on the fifteenth message, wherein the fifteenth message is used to instruct the second device to send a message according to a first sending method associated with the first target configuration; when the second device does not belong to the first set, receive a twelfth message from the first target device, and send a fourth message based on the twelfth message, wherein the twelfth message is used to instruct the second device to send a message according to a second sending method associated with the second target configuration; wherein the first set is a set of second devices corresponding to device identification information identified by the first device based on the first message; and the second target configuration
  • the radio frequency unit 1301 is used to receive a second message from a first target device; send a first message to the first device using a first target configuration based on the second message; and perform a second operation, wherein the second operation includes at least one of the following: when the second device belongs to a first set, receive a fifteenth message from the first target device, and send a third message based on the fifteenth message, wherein the fifteenth message is used to instruct the second device to send a message according to a first sending method associated with the first target configuration; when the second device does not belong to the first set, receive a twelfth message from the first target device, and send a fourth message based on the twelfth message, wherein the twelfth message is used to instruct the second device to send a message according to a second sending method associated with the second target configuration; wherein the first set is a set of second devices corresponding to device identification information identified by the first device based on the first message; and the second target configuration
  • the embodiment of the present application also provides a network side device, including a processor and a communication interface, wherein:
  • the communication interface is used to receive a first message from a second device, the first message is used to indicate device identification information of the second device, and the first message is a message sent using a first target configuration based on a second message sent by a first target device; perform a first operation, and the first operation includes at least one of the following: receive a third message from a second target device, the third message is a message sent in a first sending mode associated with the first target configuration, and the second target device is a second device in a first set; receive a fourth message from a third target device, the fourth message is a message sent in a second sending mode associated with the second target configuration, and the third target device is a second device outside the first set; wherein, the first set is a set of second devices corresponding to device identification information identified by the first device based on the first message; the second target configuration is a configuration obtained by updating the first target configuration based on a first update parameter, and the first update parameter includes at least one
  • the communication interface is used to receive a second message from a first target device; send a first message to the first device using a first target configuration based on the second message; and perform a second operation, wherein the second operation includes at least one of the following: when the second device belongs to a first set, receive a fifteenth message from the first target device, and send a third message based on the fifteenth message, wherein the fifteenth message is used to instruct the second device to send a message according to a first sending method associated with the first target configuration; when the second device does not belong to the first set, receive a twelfth message from the first target device, and send a fourth message based on the twelfth message, wherein the twelfth message is used to instruct the second device to send a message according to a second sending method associated with the second target configuration; wherein the first set is a set of second devices corresponding to device identification information identified by the first device based on the first message; and the second operation includes at least one of the following: when the second device
  • the communication interface is used to receive a second message from a first target device; send a first message to the first device using the first target configuration based on the second message; and perform a second operation, wherein the second operation includes at least one of the following: when the second device belongs to the first set, receive a fifteenth message from the first target device, and send a third message based on the fifteenth message, wherein the fifteenth message is used to instruct the second device to send a message according to a first sending method associated with the first target configuration; when the second device does not belong to the first set, receive a twelfth message from the first target device, and send a fourth message based on the twelfth message, wherein the twelfth message is used to instruct the second device to send a message according to a second sending method associated with the second target configuration; wherein the first set is a set of second devices corresponding to device identification information identified by the first device based on the first message; and the second target configuration
  • This network side device embodiment corresponds to the above-mentioned network side device method embodiment.
  • Each implementation process and implementation method of the above-mentioned method embodiment can be applied to this network side device embodiment and can achieve the same technical effect.
  • the embodiment of the present application also provides a network side device.
  • the network side device 1400 includes: an antenna 1401, a radio frequency device 1402, a baseband device 1403, a processor 1404 and a memory 1405.
  • the antenna 1401 is connected to the radio frequency device 1402.
  • the radio frequency device 1402 receives information through the antenna 1401 and transmits the received information to the baseband device 1403.
  • the baseband device 1403 processes the information to be sent and sends it to the radio frequency device 1402.
  • the radio frequency device 1402 processes the received information and sends it out through the antenna 1401.
  • the method executed by the network-side device in the above embodiment may be implemented in the baseband device 1403, which includes a baseband processor.
  • the baseband device 1403 may include, for example, at least one baseband board, on which multiple chips are arranged, as shown in Figure 14, one of which is, for example, a baseband processor, which is connected to the memory 1405 through a bus interface to call the program in the memory 1405 and execute the network device operations shown in the above method embodiment.
  • the network side device may also include a network interface 1406, which is, for example, a common public radio interface (CPRI).
  • a network interface 1406 which is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the network side device 1400 of the embodiment of the present invention also includes: instructions or programs stored in the memory 1405 and executable on the processor 1404.
  • the processor 1404 calls the instructions or programs in the memory 1405 to execute the methods executed by the modules shown in Figures 9, 10 or 11, and achieves the same technical effect. To avoid repetition, it will not be described here.
  • An embodiment of the present application also provides a readable storage medium, on which a program or instruction is stored.
  • a program or instruction is stored.
  • the various processes of the above-mentioned transmission method embodiment are implemented and the same technical effect can be achieved. To avoid repetition, it will not be repeated here.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium includes a computer readable storage medium, such as a computer read-only memory ROM, a random access memory RAM, a magnetic disk or an optical disk.
  • An embodiment of the present application further provides a chip, which includes a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the various processes of the above-mentioned transmission method embodiment, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.
  • the embodiments of the present application further provide a computer program/program product, which is stored in a storage medium and is executed by at least one processor to implement the various processes of the above-mentioned transmission method embodiment and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • An embodiment of the present application also provides a communication system, including: a first device, a second device and a third device, wherein the first device is used to execute the various processes of the various method embodiments as shown in Figure 6 and the above-mentioned first device side, the second device is used to execute the various processes of the various method embodiments as shown in Figure 7 and the above-mentioned second device side, and the third device is used to execute the various processes of the various method embodiments as shown in Figure 8 and the above-mentioned third device side, and the same technical effects can be achieved, which will not be repeated here to avoid repetition.
  • the technical solution of the present application can be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, a magnetic disk, or an optical disk), and includes a number of instructions for enabling a terminal (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the methods described in each embodiment of the present application.
  • a storage medium such as ROM/RAM, a magnetic disk, or an optical disk
  • a terminal which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande relève du domaine technique des communications et divulgue un procédé et un appareil de transmission, un terminal et un dispositif côté réseau. Le procédé de transmission dans des modes de réalisation de la présente demande comprend les étapes suivantes : un premier dispositif reçoit un premier message en provenance d'un deuxième dispositif, le premier message étant utilisé pour indiquer des informations d'identifiant de dispositif du deuxième dispositif; et le premier dispositif exécute au moins l'une des opérations suivantes : la réception d'un troisième message en provenance d'un deuxième dispositif cible, le troisième message étant un message envoyé selon un premier mode d'envoi associé à une première configuration cible, et le deuxième dispositif cible étant un deuxième dispositif dans un premier ensemble; et la réception d'un quatrième message en provenance d'un troisième dispositif cible, le quatrième message étant un message envoyé selon un second mode d'envoi associé à une seconde configuration cible, et le troisième dispositif cible étant un deuxième dispositif externe au premier ensemble. Le premier ensemble est un ensemble de seconds dispositifs correspondant aux informations d'identifiant de dispositif qui sont identifiées par le premier dispositif sur la base du premier message; la seconde configuration cible est une configuration obtenue par mise à jour de la première configuration cible sur la base d'un premier paramètre de mise à jour.
PCT/CN2023/137316 2022-12-12 2023-12-08 Procédé et appareil de transmission, terminal et dispositif côté réseau WO2024125393A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211600340.9 2022-12-12
CN202211600340.9A CN118199790A (zh) 2022-12-12 2022-12-12 传输方法、装置、终端及网络侧设备

Publications (1)

Publication Number Publication Date
WO2024125393A1 true WO2024125393A1 (fr) 2024-06-20

Family

ID=91395396

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/137316 WO2024125393A1 (fr) 2022-12-12 2023-12-08 Procédé et appareil de transmission, terminal et dispositif côté réseau

Country Status (2)

Country Link
CN (1) CN118199790A (fr)
WO (1) WO2024125393A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110289938A (zh) * 2019-06-14 2019-09-27 中国科学技术大学 基于码分多址的多无源反射标签接入系统及控制方法
CN112714912A (zh) * 2018-05-14 2021-04-27 康奈尔大学 使用码分多址(cdma)的协作式rfid读取器及其方法
CN113065365A (zh) * 2021-03-18 2021-07-02 复旦大学 一种基于反向散射技术的多副载波多址无源无线传感系统
US20220070775A1 (en) * 2018-12-17 2022-03-03 Idac Holdings, Inc. Methods for updating system information and wireless transmit/receive units using thereof
CN114745044A (zh) * 2022-04-01 2022-07-12 中国信息通信研究院 一种无线信号传输方法和设备
CN114915370A (zh) * 2021-02-10 2022-08-16 维沃移动通信有限公司 盲检测、信息发送方法、装置、通信设备及可读存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112714912A (zh) * 2018-05-14 2021-04-27 康奈尔大学 使用码分多址(cdma)的协作式rfid读取器及其方法
US20220070775A1 (en) * 2018-12-17 2022-03-03 Idac Holdings, Inc. Methods for updating system information and wireless transmit/receive units using thereof
CN110289938A (zh) * 2019-06-14 2019-09-27 中国科学技术大学 基于码分多址的多无源反射标签接入系统及控制方法
CN114915370A (zh) * 2021-02-10 2022-08-16 维沃移动通信有限公司 盲检测、信息发送方法、装置、通信设备及可读存储介质
CN113065365A (zh) * 2021-03-18 2021-07-02 复旦大学 一种基于反向散射技术的多副载波多址无源无线传感系统
CN114745044A (zh) * 2022-04-01 2022-07-12 中国信息通信研究院 一种无线信号传输方法和设备

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MI NANHUAN; ZHANG XIAOXUE; HE XIN; XIONG JIE; XIAO MINGJUN; LI XIANG-YANG; YANG PANLONG: "CBMA: Coded-Backscatter Multiple Access", 2019 IEEE 39TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), IEEE, 7 July 2019 (2019-07-07), pages 799 - 809, XP033651856, DOI: 10.1109/ICDCS.2019.00084 *
NANHUAN MI: "Large-scale Backscatter Tags Multiple Access Networking and Prototype Platform Construction", DISSERTATION FOR A MASTER'S DEGREE, UNIVERSITY OF SCIENCE AND TECHNOLOGY OF CHINA, 23 June 2020 (2020-06-23), University of Science and Technology of China, XP093181394 *

Also Published As

Publication number Publication date
CN118199790A (zh) 2024-06-14

Similar Documents

Publication Publication Date Title
AU2022275533B2 (en) A method and apparatus for configuring resources and transmitting/receiving data in wireless cellular communication system
US8674808B2 (en) Interrogation of RFID communication units
US20180192387A1 (en) Method and apparatus for controlling timing advance
CN113573409A (zh) 一种通信方法及装置
JP2023547873A (ja) 同期信号ブロックの伝送方法、装置、機器及び記憶媒体
WO2024125393A1 (fr) Procédé et appareil de transmission, terminal et dispositif côté réseau
WO2024125403A1 (fr) Procédés de transmission, appareil, terminal et dispositif côté réseau
WO2024125400A1 (fr) Procédé de transmission, appareil, terminal et dispositif côté réseau
WO2024125438A1 (fr) Procédé et appareil de transmission de signal, dispositif
WO2024032496A1 (fr) Procédé et appareil de communication, procédé et appareil de configuration de ressources, et lecteur, étiquette et périphérique côté réseau
WO2023103904A1 (fr) Procédé et appareil de transmission de données
WO2023231908A1 (fr) Procédé et appareil de transmission d'informations pour communication par rétrodiffusion, et terminal et dispositif côté réseau
WO2024140753A1 (fr) Procédé et appareil d'estimation d'erreur de synchronisation, et dispositif et support de stockage lisible
WO2023168721A1 (fr) Procédé de configuration de ressource, terminal et dispositif de réseau
WO2023231920A1 (fr) Procédé et dispositif de communication de rétrodiffusion
WO2024061109A1 (fr) Procédé et appareil de transmission, dispositif de communication et dispositif de rétrodiffusion
CN115134048B (zh) 上行传输方法及装置、终端及可读存储介质
WO2023236868A1 (fr) Procédé et appareil de configuration de communication de rétrodiffusion, et dispositif côté réseau et terminal
WO2023125311A1 (fr) Procédé et appareil d'estimation de canal, terminal, dispositif côté réseau et support
WO2024027746A1 (fr) Procédé et appareil de transmission d'informations, et extrémité de réception et extrémité d'envoi
WO2023226844A1 (fr) Procédé et appareil de transmission de signal rétrodiffusé, dispositif de communication et support de stockage lisible
WO2023202513A1 (fr) Procédé de traitement de conflit, terminal et dispositif côté réseau
WO2023206052A1 (fr) Procédé de communication, terminal et dispositif wi-fi
WO2024032609A1 (fr) Procédé et appareil d'estimation d'informations de retard, dispositif de communication et support de stockage
WO2024007980A1 (fr) Procédé et appareil de détermination du nombre de dispositifs, et dispositif électronique