Nothing Special   »   [go: up one dir, main page]

CN109698738A - Communication means and communication device - Google Patents

Communication means and communication device Download PDF

Info

Publication number
CN109698738A
CN109698738A CN201711243045.1A CN201711243045A CN109698738A CN 109698738 A CN109698738 A CN 109698738A CN 201711243045 A CN201711243045 A CN 201711243045A CN 109698738 A CN109698738 A CN 109698738A
Authority
CN
China
Prior art keywords
message
terminal device
transmission
sfi
indicate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711243045.1A
Other languages
Chinese (zh)
Other versions
CN109698738B (en
Inventor
韩云博
庄宏成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN109698738A publication Critical patent/CN109698738A/en
Application granted granted Critical
Publication of CN109698738B publication Critical patent/CN109698738B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0048Allocation of pilot signals, i.e. of signals known to the receiver
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/1263Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
    • H04W72/1273Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows of downlink data flows
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the present application provides a kind of communication means and communication device, and the scene for capableing of scene and unauthorized transmission based on authorized transmissions carries out SFI configuration, and then lifting system efficiency.The communication means includes: that the network equipment determines first message, the first message includes time slot format relevant information SFI, wherein, the SFI is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, and when in the time slot including upgoing O FDM symbol, the first message is also used to indicate that upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization or for based on unauthorized transmission;The network equipment sends the first message to terminal device.

Description

Communication means and communication device
Technical field
This application involves the communications fields, and more particularly to communication means and communication device in the communications field.
Background technique
Existing cellular communication system, such as Global Systems for Mobile communications (Global System for Mobile Communication, GSM), WCDMA mobile communication system (Wideband Code Division Multiple Access, WCDMA), in the systems such as long term evolution (Long Term Evolution, LTE), the communication supported is mainly needle To voice communications versus data communications.Next-generation (5G, the 5th generation) mobile communication system, such as newly eats dishes without rice or wine (New Radio, NR), not only It will support voice communications versus data communications, will also support magnanimity Internet of Things Network Communication (massive Machine Type Communication, mMTC) and low time delay high reliable communication (Ultra-Reliable and Low Latency Communications, URLLC), to meet the needs of different business.For URLLC business, for example vehicle is to vehicle (Vehicle to Vehicle, V2V), it is short not to require nothing more than propagation delay time, and require high reliablity.
NR system supports flexible time slot (slot) structure, i.e. a time slot can be divided into 14 orthogonal frequency division multiplexing (Orthogonal Frequency Division Multiplexing, OFDM) symbol (Symbol).And this 14 OFDM symbols Uplink or downlink transfer or some OFDM symbols number can be completely used for for uplink, some OFDM symbols are used for Downlink (DL, Downlink) transmission.In NR, the semi-static instruction structure of time slot of RRC signaling is can be used in base station, or uses group Common downlink control information (Group Common DCI) dynamically indicates structure of time slot, when structure of time slot is referred to as here Gap format (Slot Format) or time slot format relevant information (Slot Format related Information, SFI). It but in the prior art, is for the field based on authorized transmissions for changing the SFI message of time slot purposes not distinguishing time slot Scape is still used for the scene based on unauthorized transmission, causes to award when base station needs to change based on non-used in unauthorized transmission When weighing resource, need to issue a large amount of configuration signal parameters to UE, efficiency is lower.
Summary of the invention
The application provides a kind of communication means and communication device, is capable of scene based on authorized transmissions and unauthorized transmission Scene carries out SFI configuration, and then lifting system efficiency.
In a first aspect, providing a kind of communication means, comprising:
The network equipment determines that first message, the first message include time slot format relevant information SFI, wherein the SFI It is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, and when in the time slot When including upgoing O FDM symbol, the first message is also used to indicate that upgoing O FDM symbol indicated by the SFI is for base In the transmission of authorization or for based on unauthorized transmission;
The network equipment sends the first message to terminal device.
Therefore, in the embodiment of the present application, the network equipment, can be to terminal device by sending first message to terminal device It indicates to be used for upstream or downstream or unknown OFDM symbol in time slot, and also can indicate that the OFDM symbol of the uplink is to use In the transmission based on authorization or for based on unauthorized transmission.It follows that the embodiment of the present application can be unified to consider base Transmission in authorization and the SFI configuration based on unauthorized transmission, and then can be avoided the network equipment and send use to terminal device In the configuration signal parameter of change time slot purposes, reduces and send duplicate configuration signal parameter bring redundancy overhead, Jin Erti Rise data transmission efficiency.Here, time slot purposes refer to the upgoing O FDM symbol in the time slot for authorization transmission or this when Upgoing O FDM symbol in gap is used for unauthorized transmission.
Here, first message can be semi-static signaling or dynamic signaling, such as system message MIB, SIB, RRC signaling, MAC CE signaling, physical control message (such as L1signaling, group common DCI), remaining minimum system information (Remaining Minimum System Information, RMSI), other systems information (Other System Information, OSI) etc..In a kind of concrete implementation mode, first message can be the Group Common of carrying SFI DCI, and Group Common DCI is referred to as Group Common PDCCH.It is understood that Group Common DCI For a kind of physical control message, receiving object can be one group of terminal device, therefore Group Common DCI can be regarded as moving State signaling.
It optionally, further include the first indicating bit in the first message, first indicating bit is used to indicate the SFI institute The upgoing O FDM symbol of instruction is for the transmission based on authorization or for based on unauthorized transmission.In this way, disappearing by first The indicating bit for including in breath can explicitly indicate that the SFI in the first message is for the transmission based on authorization or based on non- The transmission of authorization.
Optionally, before the network equipment determines first message, further includes:
The network equipment sends the first instruction message to the terminal device, and first instruction message is used to indicate institute It states terminal device and detects the first radio network temporary identifier RNTI used in the first message;
Wherein, the network equipment sends the first message to terminal device, comprising:
The network equipment scrambles the cyclic redundancy check (CRC) of the first message using the first RNTI, And the first message after scrambling is sent to the terminal device.
Here, the first instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, before the network equipment determines first message, further includes:
The network equipment sends the second instruction message to the terminal device, and second instruction message is used to indicate institute It states terminal device and detects the 2nd RNTI or the 3rd RNTI used in the first message;
Wherein, the network equipment sends the first message to terminal device, comprising:
If it is for the biography based on authorization that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI, Defeated, then the network equipment scrambles the CRC of the first message using the 2nd RNTI, and to the terminal device The first message after sending scrambling;
If it is for based on unauthorized biography that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI, Defeated, then the network equipment scrambles the CRC of the first message using the 3rd RNTI, and to the terminal device The first message after sending scrambling.
Here, the second instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, terminal device can send the response message for corresponding to second instruction message to the network equipment, with Confirm that it is properly received second instruction message.
Therefore, the embodiment of the present application is by setting RNTI with the transmission based on authorization or based on the corresponding of unauthorized transmission Relationship, so that terminal device is it can be learnt that the SFI in first message is for awarding without carrying out dominant instruction in first message The transmission of power or unauthorized transmission, i.e. first message can be for the transmission of authorization or unauthorized with implicit instruction SFI Transmission.
Optionally, before the network equipment determines first message, further includes:
The network equipment sends third instruction message to the terminal device, and the third instruction message is used to indicate institute It states terminal device and detects the control of first resource used in first message set CORESET or the 2nd CORESET;
Wherein, the network equipment sends the first message to terminal device, comprising:
If it is for the biography based on authorization that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI, Defeated, then the network equipment issues the first message to the terminal device in the first CORESET;
If it is for based on unauthorized biography that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI, Defeated, then the network equipment issues the first message to the terminal device in the 2nd CORESET.
Here, third instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, terminal device can send the response message for corresponding to the third instruction message to the network equipment, with Confirm that it is properly received the third instruction message.
Therefore, the embodiment of the present application is by setting CORESET with the transmission based on authorization or based on unauthorized transmission Corresponding relationship, so that terminal device is it can be learnt that the SFI in first message is to use without carrying out dominant instruction in first message In the transmission of authorization or unauthorized transmission, i.e. first message can be the transmission also right and wrong for authorization with implicit instruction SFI The transmission of authorization.
Optionally, in the embodiment of the present application, the network equipment is by first message to terminal equipment configuration for unauthorized The OFDM symbol that all can be used for transmitting uplink data in the time slot can be used in the time slot default of transmission, it is not necessary which is specialized A little OFDM symbols can be used for unauthorized transmission.
Optionally, the network equipment also sends instruction information to the terminal device, and the instruction information is used to indicate At least partly OFDM symbol that can be used in the OFDM symbol of uplink indicated by the SFI is used for based on unauthorized biography It is defeated.
Here, instruction information can be one of the configuration parameter of unauthorized transmission.Specifically, the network equipment can lead to It crosses semi-static signaling (such as RRC signaling, SIB, MIB, RMSI or OSI) or dynamic signaling (such as physical control signaling) is set to terminal Preparation send the configuration parameter of unauthorized transmission, includes SFI parameter in the configuration parameter.
Therefore, in the embodiment of the present application, when the network equipment is the unauthorized biography of user device configuration by semi-static mode When SFI parameter used in defeated, so that the Grant-free resource that terminal device can be used also will be more static, it will not be frequent It is influenced by the Group Common DCI of SFI.In addition, the network equipment can be in the configuration parameter of unauthorized transmission further The upgoing O FDM symbol or mini-slot that can be used for unauthorized transmission are indicated, so that configuration is more flexible.
Optionally, the network equipment includes: to the terminal device transmission first message
The network equipment sends the first message to the terminal device by radio resource control RRC signaling;Or
The network equipment sends the first message to the terminal device by physical control message.
Second aspect provides a kind of communication means, comprising:
Terminal device receives the first message that the network equipment is sent, and the first message includes time slot format relevant information SFI, wherein the SFI is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, And when in the time slot including upgoing O FDM symbol, the first message is also used to indicate uplink indicated by the SFI OFDM symbol is for the transmission based on authorization or for based on unauthorized transmission.
When terminal device receives the first message, terminal device can be confirmly detected according to first message Upgoing O FDM symbol in time slot indicated by SFI be for authorization transmission or unauthorized transmission and time slot in use In the quantity of the OFDM of uplink/downlink/unknown.Further, the terminal device receives lower line number according to the first message According to, or send upstream data.
Therefore, in the embodiment of the present application, the network equipment, can be to terminal device by sending first message to terminal device It indicates to be used for upstream or downstream or unknown OFDM symbol in time slot, and also can indicate that the OFDM symbol of the uplink is to use In the transmission based on authorization or for based on unauthorized transmission.It follows that the embodiment of the present application can be unified to consider base Transmission in authorization and the SFI configuration based on unauthorized transmission, and then can be avoided the network equipment and send use to terminal device In the configuration signal parameter of change time slot purposes, reduces and send duplicate configuration signal parameter bring redundancy overhead, Jin Erti Rise data transmission efficiency.Here, time slot purposes refer to the upgoing O FDM symbol in the time slot for authorization transmission or this when Upgoing O FDM symbol in gap is used for unauthorized transmission.
Here, first message can be semi-static signaling or dynamic signaling, such as system message MIB, SIB, RRC signaling, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..A kind of specific In implementation, first message can be the Group Common DCI that carries SFI, and Group Common DCI can also be with Referred to as Group Common PDCCH.It is understood that Group Common DCI is a kind of physical control message, receiving object can be with For one group of terminal device, therefore Group Common DCI can be regarded as dynamic signaling.
It optionally, further include the first indicating bit in the first message, first indicating bit is used to indicate the SFI institute The upgoing O FDM symbol of instruction is for the transmission based on authorization or for based on unauthorized transmission.In this way, disappearing by first The indicating bit for including in breath can explicitly indicate that the SFI in the first message is for the transmission based on authorization or based on non- The transmission of authorization.
Optionally, before the first message that the terminal device reception network equipment is sent, further includes:
The terminal device receives the first instruction information that the network equipment is sent, and the first instruction information is for referring to Show that the terminal device detects the first radio network temporary identifier RNTI used in the first message;
Wherein, the terminal device receives the first message that the network equipment is sent, comprising:
The terminal device descrambles the CRC of the first message according to the first RNTI, to obtain described Information entrained by one message.
Here, the first instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, before the terminal device reception first message, further includes:
The terminal device receives the second instruction message that the network equipment is sent, and second instruction message is for referring to Show that the terminal device detects the 2nd RNTI or the 3rd RNTI used in the first message;
Wherein, the terminal device receives the first message that the network equipment is sent, comprising:
If the terminal device descrambles successfully the CRC of the first message using the 2nd RNTI, described first It is for the transmission based on authorization that message, which is used to indicate upgoing O FDM symbol indicated by the SFI,;
If the terminal device descrambles successfully the CRC of the first message using the 3rd RNTI, described first It is for based on unauthorized transmission that message, which is used to indicate upgoing O FDM symbol indicated by the SFI,.
Here, the second instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, terminal device can send the response message for corresponding to second instruction message to the network equipment, with Confirm that it is properly received second instruction message.
It is understood that only when terminal device to the CRC of the first message descrambled used in RNTI set with network When identical for the RNTI that the CRC of the first message is scrambled and used, terminal device can just successfully obtain first message In information.That is, then first disappears when terminal device can be used the 2nd RNTI and successfully descramble the CRC of first message Upgoing O FDM symbol in time slot indicated by SFI in breath will be used for the transmission based on authorization.When terminal device can be used When 3rd RNTI successfully descrambles the CRC of first message, then the upgoing O FDM symbol in time slot indicated by the SFI in first message It will be used for based on unauthorized transmission.
Therefore, the embodiment of the present application is by setting RNTI with the transmission based on authorization or based on the corresponding of unauthorized transmission Relationship, so that terminal device is it can be learnt that the SFI in first message is for awarding without carrying out dominant instruction in first message The transmission of power or unauthorized transmission, i.e. first message can be for the transmission of authorization or unauthorized with implicit instruction SFI Transmission.
Optionally, before the terminal device reception first message, further includes:
The terminal device receives the third instruction message that the network equipment is sent, and the third instruction message is for referring to Show that the terminal device detects the control of first resource used in first message set CORESET or the 2nd CORESET;
Wherein, the terminal device receives the first message that the network equipment is sent, comprising:
If the terminal device receives the first message in the first CORESET, the first message is used for Indicate that upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization;
If the terminal device receives the first message in the 2nd CORESET, the first message is used for Indicate that upgoing O FDM symbol indicated by the SFI is for based on unauthorized transmission.
Here, third instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, terminal device can send the response message for corresponding to the third instruction message to the network equipment, with Confirm that it is properly received the third instruction message.
Further, the third instruction message that terminal device is issued according to the network equipment at this time, in the first CORESET and The first message is received in two CORESET.Specifically, if terminal device is successfully received first in the first CORESET Message, then the upgoing O FDM symbol in time slot indicated by the SFI in first message will be used for the transmission based on authorization.If eventually End equipment is successfully received first message in the 2nd CORESET, then the uplink in time slot indicated by the SFI in first message OFDM symbol will be used for based on unauthorized transmission.
Therefore, the embodiment of the present application is by setting CORESET with the transmission based on authorization or based on unauthorized transmission Corresponding relationship, so that terminal device is it can be learnt that the SFI in first message is to use without carrying out dominant instruction in first message In the transmission of authorization or unauthorized transmission, i.e. first message can be the transmission also right and wrong for authorization with implicit instruction SFI The transmission of authorization.
Optionally, in the embodiment of the present application, the network equipment is by first message to terminal equipment configuration for unauthorized The OFDM symbol that all can be used for transmitting uplink data in the time slot can be used in the time slot default of transmission, it is not necessary which is specialized A little OFDM symbols can be used for unauthorized transmission.Corresponding, terminal device, which can be used in the time slot, all can be used for line number Unauthorized transmission is carried out according to the OFDM symbol of transmission.
Optionally, the terminal device also receives the instruction information that the network equipment is sent, and the instruction information is used for It indicates to can be used for indicated by the SFI at least partly OFDM symbol in the OFDM symbol of uplink to be used for based on unauthorized Transmission.
Here, instruction information can be one of the configuration parameter of unauthorized transmission.Specifically, the network equipment can lead to It crosses semi-static signaling (such as RRC signaling, SIB, MIB, RMSI or OSI) or dynamic signaling (such as physical control signaling) is set to terminal Preparation send the configuration parameter of unauthorized transmission, includes SFI parameter in the configuration parameter.
Therefore, in the embodiment of the present application, when the network equipment is the unauthorized biography of user device configuration by semi-static mode When SFI parameter used in defeated, so that the Grant-free resource that terminal device can be used also will be more static, it will not be frequent It is influenced by the Group Common DCI of SFI.In addition, the network equipment can be in the configuration parameter of unauthorized transmission further The upgoing O FDM symbol or mini-slot that can be used for unauthorized transmission are indicated, so that configuration is more flexible.
The third aspect provides a kind of communication means, comprising:
The network equipment is determined for the configuration information based on unauthorized transmission, includes time slot format phase in the configuration information Close information SFI, wherein the SFI is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplexing OFDM symbol;
The network equipment sends the configuration information to the terminal device.
It optionally, further include instruction information in the configuration information, the instruction information is used to indicate indicated by the SFI The OFDM symbol that can be used for uplink at least partly OFDM symbol be used for based on unauthorized transmission.
Optionally, the network equipment sends the configuration information to the terminal device, comprising:
The network equipment sends the configuration information to the terminal device by radio resource control RRC signaling.
Therefore, in the embodiment of the present application, when the network equipment is including SFI for the configuration information based on unauthorized transmission When, it can be SFI parameter used in the unauthorized transmission of user device configuration by semi-static mode, so that terminal is set The standby Grant-free resource that can be used also will be more static.In addition, the network equipment can join in the configuration of unauthorized transmission The upgoing O FDM symbol or mini-slot that can be used for unauthorized transmission are further indicated in number, so that configuration is more flexible.
Fourth aspect provides a kind of communication means, comprising:
What terminal device received that the network equipment sends is used for the configuration information based on unauthorized transmission, in the configuration information Including time slot format relevant information SFI, wherein the SFI is at least used to indicate in time slot for upstream or downstream or unknown Orthogonal frequency division multiplex OFDM symbol;
The terminal device sends upstream data to the network equipment according to the SFI.
It optionally, further include instruction information in the configuration information, the instruction information is used to indicate indicated by the SFI The OFDM symbol that can be used for uplink at least partly OFDM symbol be used for based on unauthorized transmission.
Optionally, the terminal device receives the configuration information based on unauthorized transmission that is used for of network equipment transmission, packet It includes:
The terminal device receives the described with confidence of the network equipment transmission by radio resource control RRC signaling Breath.
Therefore, in the embodiment of the present application, when the network equipment is including SFI for the configuration information based on unauthorized transmission When, it can be SFI parameter used in the unauthorized transmission of user device configuration by semi-static mode, so that terminal is set The standby Grant-free resource that can be used also will be more static.In addition, the network equipment can join in the configuration of unauthorized transmission The upgoing O FDM symbol or mini-slot that can be used for unauthorized transmission are further indicated in number, so that configuration is more flexible.
5th aspect, provides a kind of communication device, for executing any possibility of any of the above-described aspect or either side Implementation in method.Specifically, which includes for executing any of any of the above-described aspect or either side The unit of method in possible implementation.
6th aspect, provides a kind of communication device, which includes: transceiver, memory, processor and bus System.Wherein, the transceiver, the memory and the processor are connected by the bus system, the memory for storing instruction, The processor is used to execute the instruction of memory storage, receives and/or send signal to control transceiver, and work as the processing When device executes the instruction of memory storage, the execution is so that the processor executes any of any of the above-described aspect or either side Method in possible implementation.
7th aspect, provides a kind of computer-readable medium, for storing computer program, which includes The instruction of the method in any possible implementation for executing any of the above-described aspect.
Eighth aspect, provides a kind of computer program product, and the computer program product includes: computer program generation Code, when the computer program code is by the communication unit of communication equipment (for example, terminal device or network equipment), processing unit Or when the operation of transceiver, processor, so that communication equipment executes the side in any possible implementation of any of the above-described aspect Method.
9th aspect, provides a kind of communication chip, wherein being stored with instruction, when it runs on the communication device, makes It obtains the communication chip and executes the method in any possible implementation of any of the above-described aspect.
Detailed description of the invention
Fig. 1 shows a kind of schematic flow chart of communication means of the embodiment of the present application.
Fig. 2 shows the flow charts of another communication means of the embodiment of the present application.
Fig. 3 shows a kind of schematic diagram of frame format of the first message of the embodiment of the present application.
Fig. 4 shows a kind of schematic diagram of time slot configuration of the embodiment of the present application.
Fig. 5 shows the schematic diagram of another time slot configuration of the embodiment of the present application.
Fig. 6 shows the flow chart of another communication means of the embodiment of the present application.
Fig. 7 shows the flow chart of another communication means of the embodiment of the present application.
Fig. 8 shows the flow chart of another communication means of the embodiment of the present application.
Fig. 9 shows a kind of schematic block diagram of communication device of the embodiment of the present application.
Figure 10 shows the schematic block diagram of another communication device of the embodiment of the present application.
Figure 11 shows the schematic block diagram of another communication device of the embodiment of the present application.
Figure 12 shows the schematic block diagram of another communication device of the embodiment of the present application.
Figure 13 shows the schematic block diagram of another communication device of the embodiment of the present application.
Figure 14 shows the schematic block diagram of another communication device of the embodiment of the present application.
Figure 15 shows the schematic block diagram of another communication device of the embodiment of the present application.
Figure 16 shows the schematic block diagram of another communication device of the embodiment of the present application.
Specific embodiment
Below in conjunction with attached drawing, the technical solution in the application is described.
The technical solution of the embodiment of the present application can be applied to various communication systems, such as: global system for mobile telecommunications (Global System of Mobile communication, GSM) system, CDMA (Code Division Multiple Access, CDMA) system, wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) system System, General Packet Radio Service (General Packet Radio Service, GPRS), long term evolution (Long Term Evolution, LTE) system, LTE frequency division duplex (Frequency Division Duplex, FDD) system, LTE time division duplex (Time Division Duplex, TDD), Universal Mobile Communication System (Universal Mobile Telecommunication System, UMTS), global interconnection inserting of microwave (Worldwide Interoperability For Microwave Access, WiMAX) communication system, following the 5th generation (5th Generation, 5G) system or new nothing Line (New Radio, NR) etc..
Terminal device in the embodiment of the present application can refer to terminal device, access terminal, subscriber unit, subscriber station, movement It stands, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless telecom equipment, user agent or user Device.Terminal device can also be cellular phone, wireless phone, session initiation protocol (Session Initiation Protocol, SIP) phone, wireless local loop (Wireless Local Loop, WLL) stand, personal digital assistant (Personal Digital Assistant, PDA), the handheld device with wireless communication function calculate equipment or are connected to Other processing equipments of radio modem, mobile unit, wearable device, terminal device in the following 5G network or not Carry out the terminal device etc. in the Public Land Mobile Network network (Public Land Mobile Network, PLMN) of evolution, The embodiment of the present application does not limit this.
The network equipment in the embodiment of the present application can be for the equipment with terminal equipment in communication, which can be with It is global system for mobile telecommunications (Global System of Mobile communication, GSM) system or CDMA (Code Division Multiple Access, CDMA) in base station (Base Transceiver Station, BTS), be also possible to In wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) system base station (NodeB, NB), can also be the evolved base station (Evolutional NodeB, eNB or eNodeB) in LTE system, can also be cloud without Wireless controller or the network equipment under line access network (Cloud Radio Access Network, CRAN) scene It can be relay station, access point, mobile unit, wearable device and the network equipment or the following evolution in future 5G network PLMN network in the network equipment etc., the embodiment of the present application does not limit.
Fig. 1 shows a kind of schematic flow chart of communication means provided by the embodiments of the present application.
110, the network equipment determines that first message, the first message include time slot format relevant information SFI, wherein institute It states SFI and is used to indicate the orthogonal frequency division multiplex OFDM symbol for being used for upstream or downstream in time slot, and work as in the time slot and include When upgoing O FDM symbol, the first message is also used to indicate that upgoing O FDM symbol indicated by the SFI is for being based on awarding The transmission of power or for based on unauthorized transmission.
Specifically, first message can be semi-static signaling or dynamic signaling, such as system message Master Information Block (Master Information Block, MIB), System information block (System Information Block, SIB), wireless heterogeneous networks (Radio Resource Control, RRC) signaling, MAC control element (Media Access Control Control Element, MAC CE) signaling, physical control message (such as L1signaling, group common DCI), remaining minimum system Information (Remaining Minimum System Information, RMSI) or other systems information (Other System Information, OSI) etc..In a kind of concrete implementation mode, first message can be the Group Common of carrying SFI DCI, and Group Common DCI be referred to as the public Physical Uplink Control Channel of group (Group Common PDCCH, GC-PDCCH).It is understood that Group Common DCI is a kind of physical control message, receiving object can set for one group of terminal It is standby, therefore Group Common DCI can be regarded as dynamic signaling.
It should be noted that the network equipment here can be base station.Specifically, forth generation mobile communication system (4G, Such as LTE) in base station be properly termed as eNB (eNodeB), next generation mobile communication system (also referred to as NR, New Radio, it is new empty Mouthful) in, base station is properly termed as gNB (gNodeB).
Here, first message can dynamic, static or semi-statically indicate structure of time slot.Specifically, the SFI is extremely It is used to indicate in time slot less for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, i.e., the described SFI can be used for Indicate that the OFDM symbol in time slot can be completely used for uplink or downlink transfer or some OFDM symbols can be used for uplink Transmission, some OFDM symbols can be used for downlink transfer, some OFDM symbols are unknown (unknown) symbol.Here, unknown The purposes that OFDM symbol can be understood as the OFDM symbol is uncertain, i.e., the OFDM symbol at least can be used for uplink, downlink or As blank resource.It should be noted that the network equipment (such as base station) at least can by dynamic signaling (such as DCI) will as described in not Know that OFDM symbol is configured to upstream or downstream symbol.Table 1 shows a kind of mode of possible structure of time slot (i.e. SFI) instruction. Here, SFI can be used 3bit (bit) and be indicated, under can be used for so that at most 8 kinds of representative in a time slot are possible The configuring condition of the OFDM symbol of row/unknown/uplink.
Table 1
Slot format DL Unknown UL Bits
0 14 0 0 000
1 10 2 2 001
2 8 2 4 010
3 6 2 6 011
4 4 2 8 100
5 2 2 10 101
6 0 0 14 110
It is understood that the SFI may be used to indicate that other OFDM symbols, the application in time slot in the embodiment of the present application Embodiment does not limit this.For example, SFI may be used to indicate that reserved (reserved) OFDM symbol in time slot, wherein should Reserved OFDM symbol can be configured to unknown OFDM symbol or other OFDM symbols.
In the embodiment of the present application, the first message is also used to indicate that the upgoing O FDM in time slot indicated by the SFI is accorded with It number is for the transmission based on authorization or for based on unauthorized transmission.
It is understood that the upgoing O FDM symbol in time slot can be used for transmission based on authorization or user based on unauthorized biography Defeated, other symbols in the time slot in addition to upgoing O FDM symbol are used to the transmission based on authorization at this time.That is, this Shen Please be in embodiment, first message is also used to indicate that one or more time slots indicated by the SFI can be used for based on authorization Upgoing O FDM symbol in transmission or the one or more time slot can be used for based on unauthorized transmission.
Specifically, based on authorization, (Grant-based is referred to as UL Transmission compared to traditional With grant) transmission method, next generation wireless communication network (such as NR) introduce based on it is unauthorized (Grant-free, Be properly termed as Grantless or Grant-less or UL Transmission without grant etc.) transmission method, I.e. the network equipment is first that terminal device divides one or more pieces unauthorized transmission region (Grant-free Transmission Area, GFTA), terminal device directly transmits upstream data (such as uplink Grant-free data) in unauthorized transmission region, The process from service request to base station uplink authorization is not needed to undergo.Therefore, have very in terms of network delay and signaling overheads Big advantage.Here, unauthorized transmission region is referred to as Grant-free resource (Grant-free resource).
For unauthorized transmission, since its business is not expectable, the Grant-free resource that the network equipment is pre-configured has The demand that dynamic updates.Such as when needing more Grant-free resources, need to update the Grant-free money of pre-configuration Source.Based on this, when the first message in the embodiment of the present application is also used to indicate that upgoing O FDM indicated by the SFI is for base In the transmission of authorization or when for based on unauthorized transmission, the first message can meet to the transmission configuration of authorization its While time slot format, meet the unauthorized demand for transmitting its time slot format of dynamic configuration in the time domain.
It should be noted that unauthorized transmission is only used for uplink in Current standards, that is to say, that only upgoing O FDM symbol It can be used for unauthorized transmission.But unauthorized transmission also is likely used for downlink transfer in the standard in future, i.e., in standard in future It is also possible to realize the technical solution that downlink OFDM symbol is used for unauthorized transmission.It is understood that uplink is directed in the present invention at this time The instruction for authorized transmissions or unauthorized transmission that OFDM symbol carries out is equally applicable to downlink OFDM symbol, i.e. first message It may be used to indicate that downlink OFDM symbol indicated by the SFI is for the transmission based on authorization or for unauthorized Transmission.
120, the network equipment sends the first message to terminal device.
Specifically, the network equipment can be by radio resource control RRC signaling to described in terminal device transmission First message or the network equipment pass through physical control message and send the first message to the terminal device.Here, The quantity of terminal device can be one or more.
When terminal device receives the first message, terminal device can be confirmly detected according to first message Upgoing O FDM symbol in time slot indicated by SFI be for authorization transmission or unauthorized transmission and time slot in use In the quantity of the OFDM of uplink/downlink/unknown.
Therefore, in the embodiment of the present application, the network equipment, can be to terminal device by sending first message to terminal device It indicates to be used for upstream or downstream or unknown OFDM symbol in time slot, and also can indicate that the OFDM symbol of the uplink is to use In the transmission based on authorization or for based on unauthorized transmission.It follows that the embodiment of the present application can be unified to consider base Transmission in authorization and the SFI configuration based on unauthorized transmission, and then can be avoided the network equipment and send use to terminal device In the configuration signal parameter of change time slot purposes, reduces and send duplicate configuration signal parameter bring redundancy overhead, Jin Erti Rise data transmission efficiency.Here, time slot purposes refer to the upgoing O FDM symbol in the time slot for authorization transmission or this when Upgoing O FDM symbol in gap is used for unauthorized transmission.
Fig. 2 shows the flow charts of another communication means provided by the embodiments of the present application.It should be understood that Fig. 2 shows should The step of communication means or operation, but these steps or operation are only examples, and other operations can also be performed in the embodiment of the present application Or the deformation of each operation in Fig. 2.In addition, each step in Fig. 2 can be come according to the different sequences presented from Fig. 2 It executes, and it is possible to not really want to execute all operationss in Fig. 2.
201, the network equipment sends the first instruction message to terminal device, which is used to indicate the terminal Equipment detects the first radio network temporary identifier (Radio Network Tempory used in the first message Identity, RNTI).Specifically, the first message may refer to the description in figure 1 above, to avoid repeating, here no longer It repeats.
Here, the first instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, step 202 can also be performed after step 201,202 be specially that terminal device is sent to the network equipment Response message corresponding to first instruction message.As an example, when terminal device is successfully received network equipment transmission After first instruction message (such as RRC signaling), which sends the response for corresponding to first instruction message to the network equipment Message, to confirm that it is properly received first instruction message.
203, the network equipment sends first message to terminal device.
Specifically, the network equipment uses the first RNTI in 201 to the cyclic redundancy check (Cyclic in the first message Redundancy Check, CRC) it is scrambled, it is (i.e. different to be different from other possible Group Common DCI types Its meaning for carrying indicating bit of the scrambled Group Common DCI of RNTI can be not exactly the same).Then, the network equipment The first message after scrambling is sent to the terminal device.
Further, after terminal device receives the first message that the network equipment is sent, according to network in step 201 The RNTI that equipment issues demodulates information entrained by first message, the uplink in time slot indicated by the SFI confirmly detected OFDM symbol is for being used for uplink/downlink/unknown OFDM symbol number in authorized transmissions or unauthorized transmission and time slot Amount.
It should be noted that executing step 203 after step 202 if step 202 exists.It should be noted that (or step 201 and step 202) are relatively independent steps, that is to say, that in step 201 (or step for step 203 and step 201 Rapid 201 and step 202) after can execute one or many steps 203.
It optionally, further include the first indicating bit in the first message in the embodiment of the present application, first indicating bit is used Upgoing O FDM symbol in the time slot indicated by the instruction SFI is for the transmission based on authorization or for based on unauthorized Transmission, that is, be used to indicate one or more time slots indicated by the SFI can be used for transmission based on authorization or it is described when Upgoing O FDM symbol in gap can be used for based on unauthorized transmission.In this way, passing through the indicating bit energy for including in first message Enough SFI explicitly indicated in the first message are for the transmission based on authorization or based on unauthorized transmission.
Fig. 3 shows a kind of schematic diagram of frame format of first message provided by the embodiments of the present application, as an example, at this time The first message can be Group Common DCI.Specifically, the indicating bit of 1bit (bit) can be used in the first message To indicate transport-type.Such as when the indicating bit is set as " 1 ", it can indicate that the time slot will be used for the transmission based on authorization; When the indicating bit is set as " 0 ", then it can indicate that the time slot will be used for based on unauthorized transmission.Alternatively, working as the indicating bit When being set as " 0 ", it can indicate that the time slot will be used for the transmission based on authorization;When the indicating bit is set as " 1 ", then can refer to Show that the time slot will be used for based on unauthorized transmission.
It should be noted that a time slot is for all OFDM symbols in the transmission based on the authorization i.e. time slot here (i.e. uplink/downlink/unknown OFDM symbol) is used for the transmission based on authorization;One time slot is used to i.e. should based on unauthorized transmission Upgoing O FDM symbol in time slot is used for based on unauthorized transmission, other symbols in the time slot in addition to upgoing O FDM symbol For the transmission based on authorization.
Fig. 4 shows a kind of schematic diagram of time slot configuration provided by the embodiments of the present application.Specifically, the network equipment passes through half Static configuration is dynamically configured as terminal equipment configuration one or more can be used for time slot (the i.e. Grant- of unauthorized transmission Free resource), remaining time slot then can be used for the transmission based on authorization.Here, the network equipment can be by first message by one The time slot of place or many places for authorized transmissions is adjusted to the time slot for unauthorized transmission, authorized transmissions are flexibly met to resource Demand.
For example, network is set when conflicting more violent between the portfolio or terminal device carried in Grant-free resource It is standby that the partial time slot for being originally intended to authorized transmissions can be allocated to unauthorized transmission, and uplink and downlink OFDM can be adjusted by SFI The ratio (quantity as increased upgoing O FDM symbol in time slot) of symbol, to increase the resource that unauthorized transmission can be used, mentions Rise system effectiveness.Here conflict can refer to be carried out on time-frequency domain used in transmitting uplink data between multiple terminal devices Grant-free resource is completely or partially overlapped, and causes the network equipment that can not correctly demodulate what the multiple terminal device was sent Upstream data.
Further, the Grant-free resource that the network equipment is reconfigured by first message is in addition to Parameters of Time-frequency Field Outside, parameter used in other unauthorized transmission can be used along unauthorized transmission configured in same frequency resource is used in Parameter, such as Modulation and Coding Scheme (Modulation and Coding Scheme, MCS), power control parameters (Power Control Related parameter), demodulated reference signal (the Demodulation Reference of user equipment Signal, DMRS) configuration information etc..
Fig. 5 shows the schematic diagram of another time slot configuration provided by the embodiments of the present application.Specifically, the network equipment passes through Being semi-statically configured or be dynamically configured as terminal equipment configuration, one or more can be used for time slot (the i.e. Grant- of authorized transmissions Free resource), remaining time slot then can be used for the transmission based on authorization.Here, the network equipment can be by first message by one The time slot of place or many places for unauthorized transmission is adjusted to the time slot for authorized transmissions, authorized transmissions are flexibly met to resource Demand.
Therefore, in the embodiment of the present application, the network equipment, can be to terminal device by sending first message to terminal device It indicates to be used for upstream or downstream or unknown OFDM symbol in time slot, and also can indicate that the OFDM symbol of the uplink is to use In the transmission based on authorization or for based on unauthorized transmission.It follows that the embodiment of the present application can be unified to consider base Transmission in authorization and the SFI configuration based on unauthorized transmission, and then can be avoided the network equipment and send use to terminal device In the configuration signal parameter of change time slot purposes, reduces and send duplicate configuration signal parameter bring redundancy overhead, Jin Erti Rise data transmission efficiency.Here, time slot purposes refer to the upgoing O FDM symbol in the time slot for authorization transmission or this when Upgoing O FDM symbol in gap is used for unauthorized transmission.
Fig. 6 shows the flow chart of another communication means provided by the embodiments of the present application.It should be understood that Fig. 6 shows this The step of communication means or operation, but these steps or operation are only examples, and other operations can also be performed in the embodiment of the present application Or the deformation of each operation in Fig. 6.In addition, each step in Fig. 6 can be come according to the different sequences presented from Fig. 6 It executes, and it is possible to not really want to execute all operationss in Fig. 6.
601, the network equipment sends the second instruction message to terminal device, and second instruction message is used to indicate the end End equipment detects the 2nd RNTI or the 3rd RNTI used in the first message.Here, the 2nd RNTI and the 3rd RNTI can be with Upgoing O FDM symbol for distinguishing in time slot indicated by the SFI is for the transmission based on authorization or based on unauthorized Transmission, i.e., for distinguish one or more time slots indicated by the SFI can be used for transmission based on authorization or it is described when Upgoing O FDM symbol in gap can be used for based on unauthorized transmission.Specifically, the first message may refer to figure 1 above In description, to avoid repeating, which is not described herein again.
Here, the second instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, step 602 can also be performed after step 601,602 be specially that terminal device is sent to the network equipment Response message corresponding to second instruction message.As an example, when terminal device is successfully received network equipment transmission After second instruction message (such as RRC signaling), which sends the response for corresponding to second instruction message to the network equipment Message, to confirm that it is properly received second instruction message.
603, the network equipment sends first message to terminal device.
Specifically, if it is for being based on awarding that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI, The transmission of power, then the network equipment scrambles the CRC of the first message using the 2nd RNTI, and to the end End equipment sends the first message after scrambling.It is understood that the upgoing O FDM symbol in the time slot indicated by the SFI here When number being for transmission based on authorization, other OFDM symbols in addition to upgoing O FDM symbol in the time slot are also to be used for Transmission based on authorization.
If it is for based on unauthorized biography that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI, Defeated, then the network equipment scrambles the CRC of the first message using the 3rd RNTI, and to the terminal device The first message after sending scrambling.It is understood that the upgoing O FDM symbol in the time slot indicated by the SFI is for base here When unauthorized transmission, other OFDM symbols in addition to upgoing O FDM symbol in the time slot are for based on authorization Transmission.
It should be noted that if there is step 602, then executing 603 after step 602 in the embodiment of the present application.
Further, in the embodiment of the present application, after terminal device receives the first message of network equipment transmission, according to The 2nd RNTI and the 3rd RNTI that the network equipment issues in step 601, descramble the CRC of the first message.
It is understood that only when terminal device to the CRC of the first message descrambled used in RNTI set with network When identical for the RNTI that the CRC of the first message is scrambled and used, terminal device can just successfully obtain first message In information.That is, then first disappears when terminal device can be used the 2nd RNTI and successfully descramble the CRC of first message Upgoing O FDM symbol in time slot indicated by SFI in breath will be used for the transmission based on authorization.When terminal device can be used When 3rd RNTI successfully descrambles the CRC of first message, then the upgoing O FDM symbol in time slot indicated by the SFI in first message It will be used for based on unauthorized transmission.
Therefore, the embodiment of the present application is by setting RNTI with the transmission based on authorization or based on the corresponding of unauthorized transmission Relationship, so that terminal device is it can be learnt that the SFI in first message is for awarding without carrying out dominant instruction in first message The transmission of power or unauthorized transmission, i.e. first message can be for the transmission of authorization or unauthorized with implicit instruction SFI Transmission.
Fig. 7 shows the flow chart of another communication means provided by the embodiments of the present application.It should be understood that Fig. 7 shows this The step of communication means or operation, but these steps or operation are only examples, and other operations can also be performed in the embodiment of the present application Or the deformation of each operation in Fig. 7.In addition, each step in Fig. 7 can be come according to the different sequences presented from Fig. 7 It executes, and it is possible to not really want to execute all operationss in Fig. 7.
701, the network equipment sends third instruction message to terminal device, and the third instruction message is used to indicate the end End equipment detects first resource used in the first message and controls set CORESET or the 2nd CORESET.Here, first It is for base that CORESET and the 2nd CORESET, which can be used for distinguishing the upgoing O FDM symbol in time slot indicated by the SFI, It, i.e., can be with for distinguishing one or more time slots indicated by the SFI in the transmission of authorization or based on unauthorized transmission It can be used for for the upgoing O FDM symbol in the transmission based on authorization or the time slot based on unauthorized transmission.Specifically, The first message may refer to the description in figure 1 above, and to avoid repeating, which is not described herein again.
Here, third instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, step 702 can also be performed after step 701,702 be specially that terminal device is sent to the network equipment Response message corresponding to the third instruction message.As an example, when terminal device is successfully received network equipment transmission After third instruction message (such as RRC signaling), which sends the response for corresponding to the third instruction message to the network equipment Message, to confirm that it is properly received the third instruction message.
703, the network equipment sends first message to terminal device.
Specifically, if it is for being based on awarding that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI, The transmission of power, then the network equipment issues the first message to the terminal device in the first CORESET.It can manage Solution, when the upgoing O FDM symbol indicated by the SFI in time slot is for transmission based on authorization here, in the time slot Other OFDM symbols in addition to upgoing O FDM symbol are also for the transmission based on authorization.
If it is for based on unauthorized biography that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI, Defeated, then the network equipment issues the first message to the terminal device in the 2nd CORESET.It is understood that this In upgoing O FDM symbol in the time slot indicated by SFI when being for based on unauthorized transmission, in the time slot except on this Other OFDM symbols except row OFDM symbol are for the transmission based on authorization.
It should be noted that if there is step 702, then executing 703 after step 702 in the embodiment of the present application.
Further, the third instruction message that terminal device is issued according to the network equipment in step 701 at this time, first The first message is received in CORESET and the 2nd CORESET.Specifically, if terminal device success in the first CORESET First message is received, then the upgoing O FDM symbol in time slot indicated by the SFI in first message will be used for based on authorization Transmission.If terminal device is successfully received first message in the 2nd CORESET, indicated by the SFI in first message Upgoing O FDM symbol in time slot will be used for based on unauthorized transmission.
Therefore, the embodiment of the present application is by setting CORESET with the transmission based on authorization or based on unauthorized transmission Corresponding relationship, so that terminal device is it can be learnt that the SFI in first message is to use without carrying out dominant instruction in first message In the transmission of authorization or unauthorized transmission, i.e. first message can be the transmission also right and wrong for authorization with implicit instruction SFI The transmission of authorization.
Optionally, in the embodiment of the present application, the network equipment is by first message to terminal equipment configuration for unauthorized The OFDM symbol that all can be used for transmitting uplink data in the time slot can be used in the time slot default of transmission, it is not necessary which is specialized A little OFDM symbols can be used for unauthorized transmission.
Optionally, in the embodiment of the present application, the network equipment is by first message to terminal equipment configuration for unauthorized The time slot of transmission can be at least partly OFDM symbol in the OFDM symbol for can be used in the time slot transmitting uplink data.This When, indicating bit can be further used indicate in the time slot this at least partly OFDM symbol be which OFDM symbol.Specifically For, the network equipment can also send instruction information to the terminal device, and the instruction information is used to indicate the SFI At least partly OFDM symbol in the indicated OFDM symbol that can be used for uplink is used for based on unauthorized transmission.Specifically , which can be the bit in the first information, or be the configuration of one of configuration parameter of unauthorized transmission Parameter.
When indicating information is one of the configuration parameter of unauthorized transmission, the network equipment can pass through semi-static signaling (such as RRC signaling, SIB, MIB, RMSI or OSI) or dynamic signaling (such as physical control signaling) send unauthorized to terminal device The configuration parameter of transmission may include SFI in the configuration parameter.Wherein, the OFDM symbol in time slot for uplink can be whole For that based on unauthorized transmission, can also indicate the multiple uplink that can be used in the configuration signal of unauthorized transmission Which OFDM symbol can be used for unauthorized transmission in OFDM symbol.
As an example, when M shared in time slot (M is non-negative integer) a OFDM symbol that can be used for uplink, the network equipment It into the configuration signal of terminal device is sent first message or unauthorized transmission, can further indicate that the M can It can be used for unauthorized transmission for N (N≤M, N can be non-negative integer) a OFDM symbol in the OFDM symbol of uplink.
In addition, the embodiment of the present application to the position of N number of OFDM symbol without limitation.Such as in M OFDM symbol Rear N number of OFDM symbol that top n OFDM symbol can be used in unauthorized transmission or M OFDM symbol can be used for unauthorized transmission, Or certain N number of OFDM symbol in M OFDM symbol can be used for unauthorized transmission.
As another example, when in a time slot including multiple mini-slot (mini-slot or non-slot), network Equipment can also notify to use into the configuration signal of first message or unauthorized transmission that terminal device is sent to terminal device In the mini-slot based on unauthorized transmission, such as mini-slot serial number (alternatively referred to as mini-slot number, mini-slot call number), it is micro- when Gap combined situation etc..
It is illustrated by taking mini-slot combined situation as an example below.Specifically, the network equipment can matching in unauthorized transmission Several bit indicating bits, which are carried, in confidence order indicates which mini-slot or which uplink mini-slot can be used for unauthorized transmission.Than The mode that bitmap (bitmap) such as can be used is indicated that is, each mini-slot can correspond to 1bit indicating bit, and " 1 " instruction makes With corresponding mini-slot, " 0 " instruction does not use corresponding mini-slot, or " 0 " instruction uses corresponding mini-slot, " 1 " instruction Without using corresponding mini-slot.For another example, several indicating bits can be used to indicate possible a variety of mini-slot combinations.Such as when It is indicated using 3bit indicating bit, " 000 " can indicate using mini-slot 1/2/3 or can be used for the mini-slot 1/2/3 of uplink, " 001 " can indicate using mini-slot 3/4/5 or can be used for the mini-slot 3/4/5 of uplink, or can also use other instructions Mode, here without limitation.
Therefore, in the embodiment of the present application, when the network equipment is the unauthorized biography of user device configuration by semi-static mode When SFI parameter used in defeated, so that the Grant-free resource that terminal device can be used also will be more static, it will not be frequent It is influenced by the Group Common DCI of SFI.In addition, the network equipment can be in the configuration parameter of unauthorized transmission further The upgoing O FDM symbol or mini-slot that can be used for unauthorized transmission are indicated, so that configuration is more flexible.
Fig. 8 shows a kind of schematic flow chart of communication means provided by the embodiments of the present application.
810, the network equipment is determined for the configuration information based on unauthorized transmission, includes time slot lattice in the configuration information Formula relevant information SFI, wherein the SFI is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplexing Use OFDM symbol.
Here, it is referred to as configuration parameter for the configuration information based on unauthorized transmission, the configuration information or configuration It may include SFI in parameter, SFI, which can serve to indicate that, will be used for uplink/downlink/not in the time slot in the resource of unauthorized transmission The quantity for the OFDM symbol known.
In the embodiment of the present application, the OFDM symbol in time slot for uplink can be completely used for based on unauthorized transmission.
Alternatively, can also be indicated in the configuration signal of unauthorized transmission in the multiple OFDM symbol that can be used for uplink Which OFDM symbol can be used for unauthorized transmission.That is, can also include instruction information, institute in the configuration information State at least partly OFDM symbol that instruction information is used to indicate in the OFDM symbol that can be used for uplink indicated by the SFI For based on unauthorized transmission.
As an example, when M shared in time slot (M is non-negative integer) a OFDM symbol that can be used for uplink, the network equipment It can further indicate that the M can be used for uplink in the configuration information for sending unauthorized transmission to terminal device N (N≤M, N can be non-negative integer) a OFDM symbol in OFDM symbol can be used for unauthorized transmission.
In addition, the embodiment of the present application to the position of N number of OFDM symbol without limitation.Such as in M OFDM symbol Rear N number of OFDM symbol that top n OFDM symbol can be used in unauthorized transmission or M OFDM symbol can be used for unauthorized transmission, Or certain N number of OFDM symbol in M OFDM symbol can be used for unauthorized transmission.
As another example, when in a time slot including multiple mini-slot (mini-slot or non-slot), network Equipment can also in the configuration information of unauthorized transmission, to terminal device notice for the mini-slot based on unauthorized transmission, Such as mini-slot serial number (alternatively referred to as mini-slot number, mini-slot call number), mini-slot combined situation etc..
It is illustrated by taking mini-slot combined situation as an example below.Specifically, the network equipment can matching in unauthorized transmission Several bit indicating bits, which are carried, in confidence order indicates which mini-slot or which uplink mini-slot can be used for unauthorized transmission.Than The mode that bitmap (bitmap) such as can be used is indicated that is, each mini-slot can correspond to 1bit indicating bit, and " 1 " instruction makes With corresponding mini-slot, " 0 " instruction does not use corresponding mini-slot, or " 0 " instruction uses corresponding mini-slot, " 1 " instruction Without using corresponding mini-slot.For another example, several indicating bits can be used to indicate possible a variety of mini-slot combinations.Such as when It is indicated using 3bit indicating bit, " 000 " can indicate using mini-slot 1/2/3 or can be used for the mini-slot 1/2/3 of uplink, " 001 " can indicate using mini-slot 3/4/5 or can be used for the mini-slot 3/4/5 of uplink, or can also use other instructions Mode, here without limitation.
820, the network equipment sends the configuration information to the terminal device.
Specifically, the network equipment can pass through semi-static signaling (such as RRC signaling, SIB, MIB, RMSI or OSI) Xiang Suoshu Terminal device sends the configuration information.
Therefore, in the embodiment of the present application, when the network equipment is including SFI for the configuration information based on unauthorized transmission When, it can be SFI parameter used in the unauthorized transmission of user device configuration by semi-static mode, so that terminal is set The standby Grant-free resource that can be used also will be more static.In addition, the network equipment can join in the configuration of unauthorized transmission The upgoing O FDM symbol or mini-slot that can be used for unauthorized transmission are further indicated in number, so that configuration is more flexible.
Communication means provided by the embodiments of the present application is described in detail above in association with Fig. 1 to Fig. 8, extremely below in conjunction with Fig. 9 Communication device provided by the embodiments of the present application is described in detail in Figure 16.
Fig. 9 shows a kind of schematic block diagram of communication device 900 provided by the embodiments of the present application, which includes Determination unit 910 and transmission unit 920.
Determination unit 910, for determining that first message, the first message include time slot format relevant information SFI, In, the SFI is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, and is worked as When including upgoing O FDM symbol in the time slot, the first message is also used to indicate that upgoing O FDM indicated by the SFI is accorded with It number is for the transmission based on authorization or for based on unauthorized transmission;
Transmission unit 920, for sending the first message to terminal device.
Therefore, in the embodiment of the present application, the network equipment, can be to terminal device by sending first message to terminal device It indicates to be used for upstream or downstream or unknown OFDM symbol in time slot, and also can indicate that the OFDM symbol of the uplink is to use In the transmission based on authorization or for based on unauthorized transmission.It follows that the embodiment of the present application can be unified to consider base Transmission in authorization and the SFI configuration based on unauthorized transmission, and then can be avoided the network equipment and send use to terminal device In the configuration signal parameter of change time slot purposes, reduces and send duplicate configuration signal parameter bring redundancy overhead, Jin Erti Rise data transmission efficiency.Here, time slot purposes refer to the upgoing O FDM symbol in the time slot for authorization transmission or this when Upgoing O FDM symbol in gap is used for unauthorized transmission.
It optionally, further include the first indicating bit in the first message, first indicating bit is used to indicate the SFI institute The upgoing O FDM symbol of instruction is for the transmission based on authorization or for based on unauthorized transmission.
Optionally, the transmission unit 920 is also used to send the first instruction message to the terminal device, and described first refers to Show that message is used to indicate the terminal device and detects the first radio network temporary identifier RNTI used in the first message;
Wherein, transmission unit 920 is specifically used for the cyclic redundancy check using the first RNTI to the first message CRC is scrambled, and sends the first message after scrambling to the terminal device.
Optionally, the transmission unit 920 is also used to send the second instruction message to the terminal device, and described second refers to Show that message is used to indicate the terminal device and detects the 2nd RNTI or the 3rd RNTI used in the first message;
Wherein, the transmission unit 920 is specifically used for:
If it is for the biography based on authorization that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI, Defeated, then the network equipment scrambles the CRC of the first message using the 2nd RNTI, and to the terminal device The first message after sending scrambling;
If it is for based on unauthorized biography that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI, Defeated, then the network equipment scrambles the CRC of the first message using the 3rd RNTI, and to the terminal device The first message after sending scrambling.
Optionally, the transmission unit 920 is also used to send third instruction message to the terminal device, and the third refers to Show that message is used to indicate the terminal device and detects the control set CORESET of first resource used in the first message or the Two CORESET;
Wherein, the transmission unit 920 is specifically used for:
If it is for the biography based on authorization that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI, Defeated, then the network equipment issues the first message to the terminal device in the first CORESET;
If it is for based on unauthorized biography that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI, Defeated, then the network equipment issues the first message to the terminal device in the 2nd CORESET.
Optionally, the transmission unit 920 can be also used for sending instruction information to terminal device, which is used for It indicates to can be used for indicated by the SFI at least partly OFDM symbol in the OFDM symbol of uplink to be used for based on unauthorized Transmission.
Optionally, the transmission unit 920 is specifically used for sending out by radio resource control RRC signaling to the terminal device Send the first message;Or the first message is sent to the terminal device by physical control message.
It should be noted that determination unit 910 can be realized by processor, and transmission unit 920 can be by receiving in the embodiment of the present invention Device is sent out to realize.As shown in Figure 10, communication device 1000 may include processor 1010, memory 1020 and transceiver 1030.Its In, memory 1020 can be used for the code etc. of the execution of storage processor 1010, and processor 910 can be used for data or program It is handled.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor 1010 Or the instruction of software form is completed.The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly at hardware Reason device executes completion, or in processor hardware and software module combine and execute completion.Software module can be located at random Memory, flash memory, read-only memory, the abilities such as programmable read only memory or electrically erasable programmable memory, register In the storage medium of domain maturation.The storage medium is located at memory 1020, and processor 1010 reads the information in memory 1020, The step of completing the above method in conjunction with its hardware.To avoid repeating, it is not detailed herein.
Communication device 900 or communication device shown in Fig. 10 1000 shown in Fig. 9 can be realized preceding method embodiment pair Answer each process of the network equipment, specifically, the communication device 900 or communication device 1000 may refer to it is described above, To avoid repeating, which is not described herein again.
Figure 11 shows a kind of schematic block diagram of communication device 1100 provided by the embodiments of the present application.Device 1100 includes Receiving unit 1110 and processing unit 1120.
Receiving unit 1110, for receiving the first message of network equipment transmission, the first message includes time slot format Relevant information SFI, wherein the SFI is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplexing OFDM symbol, and when in the time slot including upgoing O FDM symbol, the first message is also used to indicate that the SFI is signified The upgoing O FDM symbol shown is for the transmission based on authorization or for based on unauthorized transmission;
Processing unit 1120, for receiving downlink data, or transmission upstream data according to the first message.
Therefore, in the embodiment of the present application, the network equipment, can be to terminal device by sending first message to terminal device It indicates to be used for upstream or downstream or unknown OFDM symbol in time slot, and also can indicate that the OFDM symbol of the uplink is to use In the transmission based on authorization or for based on unauthorized transmission.It follows that the embodiment of the present application can be unified to consider base Transmission in authorization and the SFI configuration based on unauthorized transmission, and then can be avoided the network equipment and send use to terminal device In the configuration signal parameter of change time slot purposes, reduces and send duplicate configuration signal parameter bring redundancy overhead, Jin Erti Rise data transmission efficiency.Here, time slot purposes refer to the upgoing O FDM symbol in the time slot for authorization transmission or this when Upgoing O FDM symbol in gap is used for unauthorized transmission.
It optionally, further include the first indicating bit in the first message, first indicating bit is used to indicate the SFI institute The upgoing O FDM symbol of instruction is for the transmission based on authorization or for based on unauthorized transmission.
Optionally, the receiving unit 1110 is also used to receive the first instruction information that the network equipment is sent, described First instruction information is used to indicate the terminal device and detects the first radio network temporary identifier used in the first message RNTI;
Wherein, the receiving unit is specifically used for descrambling the CRC of the first message according to the first RNTI, To obtain information entrained by the first message.
Optionally, the receiving unit 1110 is also used to receive the second instruction message that the network equipment is sent, described Second instruction message is used to indicate the terminal device and detects the 2nd RNTI or the 3rd RNTI used in the first message;
Wherein, the receiving unit 1110 is specifically used for:
If the terminal device descrambles successfully the CRC of the first message using the 2nd RNTI, described first It is for the transmission based on authorization that message, which is used to indicate upgoing O FDM symbol indicated by the SFI,;
If the terminal device descrambles successfully the CRC of the first message using the 3rd RNTI, described first It is for based on unauthorized transmission that message, which is used to indicate upgoing O FDM symbol indicated by the SFI,.
Optionally, the receiving unit 1110 is also used to receive the third instruction message that the network equipment is sent, described Third instruction message is used to indicate the terminal device and detects the control set of first resource used in the first message CORESET or the 2nd CORESET;
Wherein, the receiving unit 1110 is specifically used for:
If the terminal device receives the first message in the first CORESET, the first message is used for Indicate that upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization;
If the terminal device receives the first message in the 2nd CORESET, the first message is used for Indicate that upgoing O FDM symbol indicated by the SFI is for based on unauthorized transmission.
Optionally, which is characterized in that the receiving unit 1110 can be also used for receiving the instruction letter that the network equipment is sent Breath, the instruction information are used to indicate in the OFDM symbol that can be used for uplink indicated by the SFI at least partly OFDM symbol is used for based on unauthorized transmission.
It should be noted that receiving unit 1110 can be realized by transceiver in the embodiment of the present invention, processing unit 1120 can be by Processor is realized.As shown in figure 12, communication device 1200 may include processor 1210, memory 1220 and transceiver 1230. Wherein, memory 1220 can be used for the code etc. of the execution of storage processor 1210, processor 1210 can be used for data or Program is handled.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor 1210 Or the instruction of software form is completed.The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly at hardware Reason device executes completion, or in processor hardware and software module combine and execute completion.Software module can be located at random Memory, flash memory, read-only memory, the abilities such as programmable read only memory or electrically erasable programmable memory, register In the storage medium of domain maturation.The storage medium is located at memory 1220, and processor 1210 reads the information in memory 1220, The step of completing the above method in conjunction with its hardware.To avoid repeating, it is not detailed herein.
Communication device 1200 shown in communication device 1100 or Figure 12 shown in Figure 11 can be realized preceding method embodiment Each process of counterpart terminal equipment, specifically, the communication device 1100 or communication device 1200 may refer to retouching above It states, to avoid repeating, which is not described herein again.
Figure 13 shows a kind of schematic block diagram of communication device 1300 provided by the embodiments of the present application.Device 1300 includes Determination unit 1310 and transmission unit 1320.
Determination unit 1310 is for determining for the configuration information based on unauthorized transmission, when including in the configuration information Gap format related information SFI, wherein the SFI is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency Divide multiplexing OFDM symbol.
Transmission unit 1320 is used to send the configuration information to the terminal device.
It optionally, further include instruction information in the configuration information, the instruction information is used to indicate indicated by the SFI The OFDM symbol that can be used for uplink at least partly OFDM symbol be used for based on unauthorized transmission.
Optionally, the transmission unit 1320 is specifically used for passing through radio resource control RRC signaling to the terminal device Send the configuration information.
It should be noted that determination unit 1310 can be realized by processor in the embodiment of the present invention, transmission unit 1320 can be by Transceiver is realized.As shown in figure 14, communication device 1400 may include processor 1410, memory 1420 and transceiver 1430. Wherein, memory 1420 can be used for the code etc. of the execution of storage processor 1410, and processor 910 can be used for data or journey Sequence is handled.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor 1410 Or the instruction of software form is completed.The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly at hardware Reason device executes completion, or in processor hardware and software module combine and execute completion.Software module can be located at random Memory, flash memory, read-only memory, the abilities such as programmable read only memory or electrically erasable programmable memory, register In the storage medium of domain maturation.The storage medium is located at memory 1420, and processor 1410 reads the information in memory 1420, The step of completing the above method in conjunction with its hardware.To avoid repeating, it is not detailed herein.
Communication device 1400 shown in communication device 1300 or Figure 14 shown in Figure 13 can be realized preceding method embodiment Each process of counterpart terminal equipment, specifically, the communication device 1300 or communication device 1400 may refer to retouching above It states, to avoid repeating, which is not described herein again.
Figure 15 shows a kind of schematic block diagram of communication device 1500 provided by the embodiments of the present application.Device 1500 includes Receiving unit 1510 and transmission unit 1520.
Receiving unit 1510 is used to receive the configuration information based on unauthorized transmission that is used for of network equipment transmission, described to match It include time slot format relevant information SFI in confidence breath, wherein the SFI is at least used to indicate in time slot for upstream or downstream Or unknown orthogonal frequency division multiplex OFDM symbol;
Transmission unit 1520 is used to send upstream data to the network equipment according to the SFI.
It optionally, further include instruction information in the configuration information, the instruction information is used to indicate indicated by the SFI The OFDM symbol that can be used for uplink at least partly OFDM symbol be used for based on unauthorized transmission.
Optionally, the receiving unit 1510 is specifically used for setting by the radio resource control RRC signaling reception network The configuration information that preparation is sent.
It should be noted that receiving unit 1510 and transmission unit 1520 can be realized by transceiver in the embodiment of the present invention.Such as figure Shown in 16, communication device 1600 may include processor 1610, memory 1620 and transceiver 1630.Wherein, memory 1620 It can be used for the code etc. of the execution of storage processor 1610, processor 1610 can be used for handling data or program.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor 1610 Or the instruction of software form is completed.The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly at hardware Reason device executes completion, or in processor hardware and software module combine and execute completion.Software module can be located at random Memory, flash memory, read-only memory, the abilities such as programmable read only memory or electrically erasable programmable memory, register In the storage medium of domain maturation.The storage medium is located at memory 1620, and processor 1610 reads the information in memory 1620, The step of completing the above method in conjunction with its hardware.To avoid repeating, it is not detailed herein.
Communication device 1600 shown in communication device 1500 or Figure 16 shown in figure 15 can be realized preceding method embodiment Each process of counterpart terminal equipment, specifically, the communication device 1500 or communication device 1600 may refer to retouching above It states, to avoid repeating, which is not described herein again.
The embodiment of the present application also provides a kind of computer-readable mediums, for storing computer program, the computer journey Sequence includes the instruction for executing terminal device or the corresponding method of the network equipment in above method embodiment.
The embodiment of the present application also provides a kind of computer program product, the computer program product includes: computer Program code, when the computer program code is by the communication unit of communication equipment (for example, terminal device or network equipment), place When managing unit or transceiver, processor operation, so that communication equipment executes terminal device or network in above-mentioned embodiment of the method The corresponding method of equipment.
The embodiment of the present application also provides a kind of communication chips, wherein instruction is stored with, when it runs on the communication device When, so that the communication chip executes terminal device or the corresponding method of the network equipment in above method embodiment.
Each embodiment in the application independent can use, and can also be used in combination, here without limitation.
It should be understood that the first, second equal description occurred in the embodiment of the present application, only make signal with distinguish description object it With, without order point, do not indicate to be particularly limited to equipment number in the embodiment of the present application yet, cannot constitute to the application reality Apply any restrictions of example.
It should also be understood that magnitude of the sequence numbers of the above procedures are not meant to execute in the various embodiments of the application Sequence it is successive, the execution of each process sequence should be determined by its function and internal logic, the reality without coping with the embodiment of the present application It applies process and constitutes any restriction.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed Scope of the present application.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, institute it is explicit or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component of formula may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), arbitrary access are deposited The various media that can store program code such as reservoir (Random Access Memory, RAM), magnetic or disk.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain Lid is within the scope of protection of this application.Therefore, the protection scope of the application should be based on the protection scope of the described claims.

Claims (26)

1. a kind of communication means characterized by comprising
The network equipment determines that first message, the first message include time slot format relevant information SFI, wherein the SFI is used for It indicates to be used for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol in time slot, and working as includes uplink in the time slot When OFDM symbol, the first message is also used to indicate that upgoing O FDM symbol indicated by the SFI is for based on authorization It transmits or for based on unauthorized transmission;
The network equipment sends the first message to terminal device.
2. described the method according to claim 1, wherein further include the first indicating bit in the first message It is for the transmission based on authorization or for based on non-that first indicating bit, which is used to indicate upgoing O FDM symbol indicated by the SFI, The transmission of authorization.
3. according to the method described in claim 2, it is characterized in that, before the network equipment determines first message, further includes:
The network equipment sends the first instruction message to the terminal device, and first instruction message is used to indicate the end End equipment detects the first radio network temporary identifier RNTI used in the first message;
Wherein, the network equipment sends the first message to terminal device, comprising:
The network equipment scrambles the cyclic redundancy check (CRC) of the first message using the first RNTI, and to The terminal device sends the first message after scrambling.
4. the method according to claim 1, wherein before the network equipment determines first message, further includes:
The network equipment sends the second instruction message to the terminal device, and second instruction message is used to indicate the end End equipment detects the 2nd RNTI or the 3rd RNTI used in the first message;
Wherein, the network equipment sends the first message to terminal device, comprising:
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for the transmission based on authorization, The network equipment scrambles the CRC of the first message using the 2nd RNTI, and sends to the terminal device The first message after scrambling;
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for based on unauthorized transmission, Then the network equipment scrambles the CRC of the first message using the 3rd RNTI, and sends out to the terminal device The first message after sending scrambling.
5. the method according to claim 1, wherein before the network equipment determines first message, further includes:
The network equipment sends third instruction message to the terminal device, and the third instruction message is used to indicate the end End equipment detects first resource used in the first message and controls set CORESET or the 2nd CORESET;
Wherein, the network equipment sends the first message to terminal device, comprising:
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for the transmission based on authorization, The network equipment issues the first message to the terminal device in the first CORESET;
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for based on unauthorized transmission, Then the network equipment issues the first message to the terminal device in the 2nd CORESET.
6. method according to claim 1-5, which is characterized in that further include:
The network equipment sends instruction information to the terminal device, and the instruction information is used to indicate indicated by the SFI The OFDM symbol that can be used for uplink at least partly OFDM symbol be used for based on unauthorized transmission.
7. method according to claim 1-6, which is characterized in that the network equipment sends institute to terminal device Stating first message includes:
The network equipment sends the first message to the terminal device by radio resource control RRC signaling;Or
The network equipment sends the first message to the terminal device by physical control message.
8. a kind of communication means characterized by comprising
Terminal device receives the first message that the network equipment is sent, and the first message includes time slot format relevant information SFI, In, the SFI is used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, and when described When including upgoing O FDM symbol in time slot, the first message is also used to indicate that upgoing O FDM symbol indicated by the SFI is For the transmission based on authorization or for based on unauthorized transmission;
The terminal device receives downlink data according to the first message, or sends upstream data.
9. described according to the method described in claim 8, it is characterized in that, further include the first indicating bit in the first message It is for the transmission based on authorization or for based on non-that first indicating bit, which is used to indicate upgoing O FDM symbol indicated by the SFI, The transmission of authorization.
10. according to the method described in claim 9, it is characterized in that, the terminal device receives the network equipment is sent first Before message, further includes:
The terminal device receives the first instruction information that the network equipment is sent, and the first instruction information is used to indicate institute It states terminal device and detects the first radio network temporary identifier RNTI used in the first message;
Wherein, the terminal device receives the first message that the network equipment is sent, comprising:
The terminal device descrambles the CRC of the first message according to the first RNTI, is disappeared with obtaining described first The entrained information of breath.
11. according to the method described in claim 8, it is characterized in that, also being wrapped before terminal device reception first message It includes:
The terminal device receives the second instruction message that the network equipment is sent, and second instruction message is used to indicate institute It states terminal device and detects the 2nd RNTI or the 3rd RNTI used in the first message;
Wherein, the terminal device receives the first message that the network equipment is sent, comprising:
If the terminal device descrambles successfully the CRC of the first message using the 2nd RNTI, the first message Being used to indicate upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization;
If the terminal device descrambles successfully the CRC of the first message using the 3rd RNTI, the first message Being used to indicate upgoing O FDM symbol indicated by the SFI is for based on unauthorized transmission.
12. according to the method described in claim 8, it is characterized in that, also being wrapped before terminal device reception first message It includes:
The terminal device receives the third instruction message that the network equipment is sent, and the third instruction message is used to indicate institute It states terminal device and detects the control of first resource used in first message set CORESET or the 2nd CORESET;
Wherein, the terminal device receives the first message that the network equipment is sent, comprising:
If the terminal device receives the first message in the first CORESET, the first message is used to indicate Upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization;
If the terminal device receives the first message in the 2nd CORESET, the first message is used to indicate Upgoing O FDM symbol indicated by the SFI is for based on unauthorized transmission.
13. according to the described in any item methods of claim 8-12, which is characterized in that further include:
The terminal device receives the instruction information that the network equipment is sent, and the instruction information is used to indicate the SFI institute At least partly OFDM symbol in the OFDM symbol that can be used for uplink indicated is used for based on unauthorized transmission.
14. a kind of communication device characterized by comprising
Determination unit, for determining that first message, the first message include time slot format relevant information SFI, wherein described SFI is used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, and when in the time slot When including upgoing O FDM symbol, the first message is also used to indicate that upgoing O FDM symbol indicated by the SFI is for base In the transmission of authorization or for based on unauthorized transmission;
Transmission unit, for sending the first message to terminal device.
15. device according to claim 14, which is characterized in that further include the first indicating bit, institute in the first message Stating the first indicating bit and being used to indicate upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization or for being based on Unauthorized transmission.
16. device according to claim 15, which is characterized in that the transmission unit is also used to send out to the terminal device Send the first instruction message, first instruction message is used to indicate the terminal device and detects used in the first message the One radio network temporary identifier RNTI;
Wherein, transmission unit is specifically used for carrying out using cyclic redundancy check (CRC) of the first RNTI to the first message Scrambling, and the first message after scrambling is sent to the terminal device.
17. device according to claim 14, which is characterized in that the transmission unit is also used to send out to the terminal device Send the second instruction message, second instruction message is used to indicate the terminal device and detects used in the first message the Two RNTI or the 3rd RNTI;
Wherein, the transmission unit is specifically used for:
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for the transmission based on authorization, The network equipment scrambles the CRC of the first message using the 2nd RNTI, and sends to the terminal device The first message after scrambling;
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for based on unauthorized transmission, Then the network equipment scrambles the CRC of the first message using the 3rd RNTI, and sends out to the terminal device The first message after sending scrambling.
18. device according to claim 14, which is characterized in that the transmission unit is also used to send out to the terminal device Send third instruction message, the third instruction message is used to indicate the terminal device and detects used in the first message the One resources control set CORESET or the 2nd CORESET;
Wherein, the transmission unit is specifically used for:
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for the transmission based on authorization, The network equipment issues the first message to the terminal device in the first CORESET;
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for based on unauthorized transmission, Then the network equipment issues the first message to the terminal device in the 2nd CORESET.
19. the described in any item devices of 4-18 according to claim 1, which is characterized in that the transmission unit is also used to described Terminal device sends instruction information, and the instruction information is used to indicate the OFDM that can be used for uplink indicated by the SFI At least partly OFDM symbol in symbol is used for based on unauthorized transmission.
20. the described in any item methods of 4-19 according to claim 1, which is characterized in that the transmission unit is specifically used for passing through Radio resource control RRC signaling sends the first message to the terminal device;Or pass through physical control message to the end End equipment sends the first message.
21. a kind of communication device characterized by comprising
Receiving unit, for receiving the first message of network equipment transmission, the first message includes time slot format relevant information SFI, wherein the SFI is used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, and When in the time slot including upgoing O FDM symbol, the first message is also used to indicate upgoing O FDM indicated by the SFI Symbol is for the transmission based on authorization or for based on unauthorized transmission;
Processing unit, for receiving downlink data, or transmission upstream data according to the first message.
22. device according to claim 21, which is characterized in that further include the first indicating bit, institute in the first message Stating the first indicating bit and being used to indicate upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization or for being based on Unauthorized transmission.
23. device according to claim 22, which is characterized in that the receiving unit is also used to receive the network equipment The the first instruction information sent, the first instruction information are used to indicate the terminal device detection first message and are used The first radio network temporary identifier RNTI;
Wherein, the receiving unit is specifically used for descrambling the CRC of the first message according to the first RNTI, to obtain Take information entrained by the first message.
24. device according to claim 21, which is characterized in that the receiving unit is also used to receive the network equipment The second instruction message sent, second instruction message are used to indicate the terminal device detection first message and are used The 2nd RNTI or the 3rd RNTI;
Wherein, the receiving unit is specifically used for:
If the terminal device descrambles successfully the CRC of the first message using the 2nd RNTI, the first message Being used to indicate upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization;
If the terminal device descrambles successfully the CRC of the first message using the 3rd RNTI, the first message Being used to indicate upgoing O FDM symbol indicated by the SFI is for based on unauthorized transmission.
25. device according to claim 21, which is characterized in that the receiving unit is also used to receive the network equipment The third instruction message of transmission, the third instruction message are used to indicate the terminal device detection first message and are used First resource control set CORESET or the 2nd CORESET;
Wherein, the receiving unit is specifically used for:
If the terminal device receives the first message in the first CORESET, the first message is used to indicate Upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization;
If the terminal device receives the first message in the 2nd CORESET, the first message is used to indicate Upgoing O FDM symbol indicated by the SFI is for based on unauthorized transmission.
26. according to the described in any item devices of claim 21-25, which is characterized in that the receiving unit is also used to receive institute The instruction information of network equipment transmission is stated, the instruction information, which is used to indicate indicated by the SFI, can be used for uplink At least partly OFDM symbol in OFDM symbol is used for based on unauthorized transmission.
CN201711243045.1A 2017-10-24 2017-11-30 Communication method and communication device Active CN109698738B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2017110011152 2017-10-24
CN201711001115 2017-10-24

Publications (2)

Publication Number Publication Date
CN109698738A true CN109698738A (en) 2019-04-30
CN109698738B CN109698738B (en) 2022-04-29

Family

ID=66229600

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711243045.1A Active CN109698738B (en) 2017-10-24 2017-11-30 Communication method and communication device

Country Status (1)

Country Link
CN (1) CN109698738B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112153672A (en) * 2019-06-29 2020-12-29 华为技术有限公司 Resource allocation method and device
CN112566146A (en) * 2019-09-25 2021-03-26 维沃移动通信有限公司 Uplink transmission method and terminal
CN114208099A (en) * 2019-08-14 2022-03-18 索尼集团公司 OFDM-based wireless communication using flexible resources
CN114342509A (en) * 2019-11-19 2022-04-12 Oppo广东移动通信有限公司 Time domain resource determination method and device and terminal equipment
CN116261220A (en) * 2020-07-31 2023-06-13 Oppo广东移动通信有限公司 CG configuration method, device, equipment and medium

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102084596A (en) * 2008-04-30 2011-06-01 摩托罗拉移动公司 Multi-antenna configuration signaling in wireless communication system
US20140073312A1 (en) * 2011-12-12 2014-03-13 Broadcom Corporation Enhanced Discontinuous Mode Operation with Shared Radio Frequency Resources
CN104038920A (en) * 2013-03-08 2014-09-10 电信科学技术研究院 Data transmission method, system and device
CN104363975A (en) * 2013-03-14 2015-02-18 华为技术有限公司 Method, apparatus and equipment for configuring downlink dedicated physical channel (DPCH) slot format
CN104540230A (en) * 2015-01-30 2015-04-22 深圳酷派技术有限公司 Uplink scheduling method and uplink scheduling device
CN104683081A (en) * 2013-12-02 2015-06-03 中国移动通信集团公司 Carrier aggregation method, and capability information reporting method and device
CN104735768A (en) * 2013-12-20 2015-06-24 华为技术有限公司 Power control optimization processing method and device
CN104995980A (en) * 2013-03-27 2015-10-21 夏普株式会社 Terminal device, base station device, communications method, and integrated circuit
CN105338640A (en) * 2015-09-25 2016-02-17 宇龙计算机通信科技(深圳)有限公司 Data transmission method and device based on uplink multiplexing
CN105451358A (en) * 2014-08-27 2016-03-30 中国移动通信集团公司 Uplink transmission method, base station and terminal
CN105517061A (en) * 2016-01-15 2016-04-20 宇龙计算机通信科技(深圳)有限公司 Method and device for indicating uplink subframes on unauthorized frequency spectrum
CN105792362A (en) * 2014-12-22 2016-07-20 上海贝尔股份有限公司 Wireless resource allocation method
CN106358203A (en) * 2016-08-30 2017-01-25 湖南大学 Method for spectrum allocation in distributed cognition wireless sensor network on basis of Q study
US20170041805A1 (en) * 2015-08-07 2017-02-09 Cisco Technology, Inc. Uplink channel access, reservation and data transmission for licensed assist access long term evolution (laa-lte)
CN106507497A (en) * 2015-09-08 2017-03-15 华为技术有限公司 For the method for transmitting uplink data, terminal unit and the network equipment
CN106559795A (en) * 2015-09-25 2017-04-05 中兴通讯股份有限公司 A kind of method of determination LBT patterns, device and the method for realizing LBT pattern switchings
CN107211441A (en) * 2015-01-30 2017-09-26 英特尔Ip公司 For the uplink scheduling for the access for permitting auxiliary
CN107210871A (en) * 2015-02-06 2017-09-26 苹果公司 Method and apparatus for carrying out time-division LTE transmission in unauthorized radio frequency band

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102084596A (en) * 2008-04-30 2011-06-01 摩托罗拉移动公司 Multi-antenna configuration signaling in wireless communication system
US20140073312A1 (en) * 2011-12-12 2014-03-13 Broadcom Corporation Enhanced Discontinuous Mode Operation with Shared Radio Frequency Resources
CN104038920A (en) * 2013-03-08 2014-09-10 电信科学技术研究院 Data transmission method, system and device
CN104363975A (en) * 2013-03-14 2015-02-18 华为技术有限公司 Method, apparatus and equipment for configuring downlink dedicated physical channel (DPCH) slot format
CN104995980A (en) * 2013-03-27 2015-10-21 夏普株式会社 Terminal device, base station device, communications method, and integrated circuit
CN104683081A (en) * 2013-12-02 2015-06-03 中国移动通信集团公司 Carrier aggregation method, and capability information reporting method and device
CN104735768A (en) * 2013-12-20 2015-06-24 华为技术有限公司 Power control optimization processing method and device
CN105451358A (en) * 2014-08-27 2016-03-30 中国移动通信集团公司 Uplink transmission method, base station and terminal
CN105792362A (en) * 2014-12-22 2016-07-20 上海贝尔股份有限公司 Wireless resource allocation method
CN104540230A (en) * 2015-01-30 2015-04-22 深圳酷派技术有限公司 Uplink scheduling method and uplink scheduling device
CN107211441A (en) * 2015-01-30 2017-09-26 英特尔Ip公司 For the uplink scheduling for the access for permitting auxiliary
CN107210871A (en) * 2015-02-06 2017-09-26 苹果公司 Method and apparatus for carrying out time-division LTE transmission in unauthorized radio frequency band
US20170041805A1 (en) * 2015-08-07 2017-02-09 Cisco Technology, Inc. Uplink channel access, reservation and data transmission for licensed assist access long term evolution (laa-lte)
CN106507497A (en) * 2015-09-08 2017-03-15 华为技术有限公司 For the method for transmitting uplink data, terminal unit and the network equipment
CN105338640A (en) * 2015-09-25 2016-02-17 宇龙计算机通信科技(深圳)有限公司 Data transmission method and device based on uplink multiplexing
CN106559795A (en) * 2015-09-25 2017-04-05 中兴通讯股份有限公司 A kind of method of determination LBT patterns, device and the method for realizing LBT pattern switchings
CN105517061A (en) * 2016-01-15 2016-04-20 宇龙计算机通信科技(深圳)有限公司 Method and device for indicating uplink subframes on unauthorized frequency spectrum
CN106358203A (en) * 2016-08-30 2017-01-25 湖南大学 Method for spectrum allocation in distributed cognition wireless sensor network on basis of Q study

Non-Patent Citations (10)

* Cited by examiner, † Cited by third party
Title
CATT: "Remaining details of pre-emption indication", 《3GPP TSG RAN WG1 MEETING #90BIS》 *
COLM BROWNING ET AL.: "60 GHz 5G Radio-Over-Fiber Using UF-OFDM With Optical Heterodyning", 《IEEE PHOTONICS TECHNOLOGY LETTERS》 *
HUAWEI, HISILICON: "Remaining details on group-common PDCCH", 《3GPP TSG RAN WG1 MEETING 90BIS》 *
HUAWEI, HISILICON: "Remaining details on group-common PDCCH", 《3GPP TSG RAN WG1 MEETING AH_NR#3》 *
INTEL CORPORATION: "UL data transmission procedures in NR", 《3GPP TSG RAN WG1 MEETING 90BIS》 *
INTEL CORPORATION: "UL data transmission procedures in NR", 《3GPP TSG RAN WG1 MEETING NR#3》 *
NTT DOCOMO, INC.: "Email discussions on UL transmission procedures", 《3GPP TSG RAN WG1 MEETING 90BIS 》 *
SHAOMIN WANG,BIN ZHOU: "5G-oriented information sharing mechanism within D2D clusters", 《TELECOMMUNICATIONS SCIENCE》 *
VIVO: "Design of group-common PDCCH", 《3GPP TSG RAN WG1 NR ADHOC#3》 *
陈宁宇: "面向LTE-advanced系统的small cell关键技术研究", 《中国优秀硕士学位论文全文数据库》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112153672A (en) * 2019-06-29 2020-12-29 华为技术有限公司 Resource allocation method and device
CN114208099A (en) * 2019-08-14 2022-03-18 索尼集团公司 OFDM-based wireless communication using flexible resources
CN112566146A (en) * 2019-09-25 2021-03-26 维沃移动通信有限公司 Uplink transmission method and terminal
WO2021057896A1 (en) * 2019-09-25 2021-04-01 维沃移动通信有限公司 Uplink transmission method and terminal
CN112566146B (en) * 2019-09-25 2022-04-12 维沃移动通信有限公司 Uplink transmission method and terminal
JP2022549676A (en) * 2019-09-25 2022-11-28 維沃移動通信有限公司 Uplink transmission method and terminal
JP7293505B2 (en) 2019-09-25 2023-06-19 維沃移動通信有限公司 Uplink transmission method and terminal
CN114342509A (en) * 2019-11-19 2022-04-12 Oppo广东移动通信有限公司 Time domain resource determination method and device and terminal equipment
CN116261220A (en) * 2020-07-31 2023-06-13 Oppo广东移动通信有限公司 CG configuration method, device, equipment and medium

Also Published As

Publication number Publication date
CN109698738B (en) 2022-04-29

Similar Documents

Publication Publication Date Title
US11483820B2 (en) Data transmission method, terminal device, and network device
CN106301737B (en) Changing rate matching patterns in the presence of channel state information reference signal transmissions
US11071149B2 (en) Multefire design of random access channel and random access channel procedure for Internet of Things device operation in unlicensed spectrum
US20190334680A1 (en) Resource Indication Method, User Equipment, and Network Device
US11343835B2 (en) Method for transmitting data, terminal device and network device
EP3522476B1 (en) Method and apparatus for configuring reference signal
JP5852100B2 (en) Method and apparatus for assigning terminal identifier (STID) in wireless connection system
CN109698738A (en) Communication means and communication device
US20220256613A1 (en) Method of configuring uplink grant-free transmission and device thereof
EP3641454B1 (en) Communication methods, network device, terminal device, computer readable storage medium and computer program product
CN113595699A (en) PDCCH design for narrowband deployment
KR102117572B1 (en) Method and apparatus for transmitting physical downlink control channel
CN109644172A (en) Transmit method, terminal device and the network equipment of upstream data
CN115134927A (en) Communication method, device and system
CN110719648B (en) Information sending method, information receiving method and device
CN109672506B (en) Data transmission confirmation method and equipment
EP3637818B1 (en) Signal sending and receiving method and device
WO2020063482A1 (en) Method and device for transmitting random access signals
CN109076034A (en) Information transferring method and device
EP3761585A1 (en) Data transmission method and apparatus
CN113840386B (en) Method for transmitting data, terminal device and network device
CN112600655A (en) Method for transmitting information, network device, terminal device and computer readable medium
CN107027191B (en) Handle the device and method of Non-Access Stratum control program
CN109417781B (en) Method for transmitting data, network device, terminal device and readable storage medium
WO2018006741A1 (en) Signal transmission method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant