CN109698738A - Communication means and communication device - Google Patents
Communication means and communication device Download PDFInfo
- Publication number
- CN109698738A CN109698738A CN201711243045.1A CN201711243045A CN109698738A CN 109698738 A CN109698738 A CN 109698738A CN 201711243045 A CN201711243045 A CN 201711243045A CN 109698738 A CN109698738 A CN 109698738A
- Authority
- CN
- China
- Prior art keywords
- message
- terminal device
- transmission
- sfi
- indicate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0048—Allocation of pilot signals, i.e. of signals known to the receiver
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/12—Wireless traffic scheduling
- H04W72/1263—Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
- H04W72/1273—Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows of downlink data flows
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
- H04W72/23—Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the present application provides a kind of communication means and communication device, and the scene for capableing of scene and unauthorized transmission based on authorized transmissions carries out SFI configuration, and then lifting system efficiency.The communication means includes: that the network equipment determines first message, the first message includes time slot format relevant information SFI, wherein, the SFI is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, and when in the time slot including upgoing O FDM symbol, the first message is also used to indicate that upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization or for based on unauthorized transmission;The network equipment sends the first message to terminal device.
Description
Technical field
This application involves the communications fields, and more particularly to communication means and communication device in the communications field.
Background technique
Existing cellular communication system, such as Global Systems for Mobile communications (Global System for Mobile
Communication, GSM), WCDMA mobile communication system (Wideband Code Division Multiple
Access, WCDMA), in the systems such as long term evolution (Long Term Evolution, LTE), the communication supported is mainly needle
To voice communications versus data communications.Next-generation (5G, the 5th generation) mobile communication system, such as newly eats dishes without rice or wine (New Radio, NR), not only
It will support voice communications versus data communications, will also support magnanimity Internet of Things Network Communication (massive Machine Type
Communication, mMTC) and low time delay high reliable communication (Ultra-Reliable and Low Latency
Communications, URLLC), to meet the needs of different business.For URLLC business, for example vehicle is to vehicle
(Vehicle to Vehicle, V2V), it is short not to require nothing more than propagation delay time, and require high reliablity.
NR system supports flexible time slot (slot) structure, i.e. a time slot can be divided into 14 orthogonal frequency division multiplexing
(Orthogonal Frequency Division Multiplexing, OFDM) symbol (Symbol).And this 14 OFDM symbols
Uplink or downlink transfer or some OFDM symbols number can be completely used for for uplink, some OFDM symbols are used for
Downlink (DL, Downlink) transmission.In NR, the semi-static instruction structure of time slot of RRC signaling is can be used in base station, or uses group
Common downlink control information (Group Common DCI) dynamically indicates structure of time slot, when structure of time slot is referred to as here
Gap format (Slot Format) or time slot format relevant information (Slot Format related Information, SFI).
It but in the prior art, is for the field based on authorized transmissions for changing the SFI message of time slot purposes not distinguishing time slot
Scape is still used for the scene based on unauthorized transmission, causes to award when base station needs to change based on non-used in unauthorized transmission
When weighing resource, need to issue a large amount of configuration signal parameters to UE, efficiency is lower.
Summary of the invention
The application provides a kind of communication means and communication device, is capable of scene based on authorized transmissions and unauthorized transmission
Scene carries out SFI configuration, and then lifting system efficiency.
In a first aspect, providing a kind of communication means, comprising:
The network equipment determines that first message, the first message include time slot format relevant information SFI, wherein the SFI
It is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, and when in the time slot
When including upgoing O FDM symbol, the first message is also used to indicate that upgoing O FDM symbol indicated by the SFI is for base
In the transmission of authorization or for based on unauthorized transmission;
The network equipment sends the first message to terminal device.
Therefore, in the embodiment of the present application, the network equipment, can be to terminal device by sending first message to terminal device
It indicates to be used for upstream or downstream or unknown OFDM symbol in time slot, and also can indicate that the OFDM symbol of the uplink is to use
In the transmission based on authorization or for based on unauthorized transmission.It follows that the embodiment of the present application can be unified to consider base
Transmission in authorization and the SFI configuration based on unauthorized transmission, and then can be avoided the network equipment and send use to terminal device
In the configuration signal parameter of change time slot purposes, reduces and send duplicate configuration signal parameter bring redundancy overhead, Jin Erti
Rise data transmission efficiency.Here, time slot purposes refer to the upgoing O FDM symbol in the time slot for authorization transmission or this when
Upgoing O FDM symbol in gap is used for unauthorized transmission.
Here, first message can be semi-static signaling or dynamic signaling, such as system message MIB, SIB, RRC signaling, MAC
CE signaling, physical control message (such as L1signaling, group common DCI), remaining minimum system information
(Remaining Minimum System Information, RMSI), other systems information (Other System
Information, OSI) etc..In a kind of concrete implementation mode, first message can be the Group Common of carrying SFI
DCI, and Group Common DCI is referred to as Group Common PDCCH.It is understood that Group Common DCI
For a kind of physical control message, receiving object can be one group of terminal device, therefore Group Common DCI can be regarded as moving
State signaling.
It optionally, further include the first indicating bit in the first message, first indicating bit is used to indicate the SFI institute
The upgoing O FDM symbol of instruction is for the transmission based on authorization or for based on unauthorized transmission.In this way, disappearing by first
The indicating bit for including in breath can explicitly indicate that the SFI in the first message is for the transmission based on authorization or based on non-
The transmission of authorization.
Optionally, before the network equipment determines first message, further includes:
The network equipment sends the first instruction message to the terminal device, and first instruction message is used to indicate institute
It states terminal device and detects the first radio network temporary identifier RNTI used in the first message;
Wherein, the network equipment sends the first message to terminal device, comprising:
The network equipment scrambles the cyclic redundancy check (CRC) of the first message using the first RNTI,
And the first message after scrambling is sent to the terminal device.
Here, the first instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe
It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, before the network equipment determines first message, further includes:
The network equipment sends the second instruction message to the terminal device, and second instruction message is used to indicate institute
It states terminal device and detects the 2nd RNTI or the 3rd RNTI used in the first message;
Wherein, the network equipment sends the first message to terminal device, comprising:
If it is for the biography based on authorization that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI,
Defeated, then the network equipment scrambles the CRC of the first message using the 2nd RNTI, and to the terminal device
The first message after sending scrambling;
If it is for based on unauthorized biography that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI,
Defeated, then the network equipment scrambles the CRC of the first message using the 3rd RNTI, and to the terminal device
The first message after sending scrambling.
Here, the second instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe
It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, terminal device can send the response message for corresponding to second instruction message to the network equipment, with
Confirm that it is properly received second instruction message.
Therefore, the embodiment of the present application is by setting RNTI with the transmission based on authorization or based on the corresponding of unauthorized transmission
Relationship, so that terminal device is it can be learnt that the SFI in first message is for awarding without carrying out dominant instruction in first message
The transmission of power or unauthorized transmission, i.e. first message can be for the transmission of authorization or unauthorized with implicit instruction SFI
Transmission.
Optionally, before the network equipment determines first message, further includes:
The network equipment sends third instruction message to the terminal device, and the third instruction message is used to indicate institute
It states terminal device and detects the control of first resource used in first message set CORESET or the 2nd CORESET;
Wherein, the network equipment sends the first message to terminal device, comprising:
If it is for the biography based on authorization that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI,
Defeated, then the network equipment issues the first message to the terminal device in the first CORESET;
If it is for based on unauthorized biography that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI,
Defeated, then the network equipment issues the first message to the terminal device in the 2nd CORESET.
Here, third instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe
It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, terminal device can send the response message for corresponding to the third instruction message to the network equipment, with
Confirm that it is properly received the third instruction message.
Therefore, the embodiment of the present application is by setting CORESET with the transmission based on authorization or based on unauthorized transmission
Corresponding relationship, so that terminal device is it can be learnt that the SFI in first message is to use without carrying out dominant instruction in first message
In the transmission of authorization or unauthorized transmission, i.e. first message can be the transmission also right and wrong for authorization with implicit instruction SFI
The transmission of authorization.
Optionally, in the embodiment of the present application, the network equipment is by first message to terminal equipment configuration for unauthorized
The OFDM symbol that all can be used for transmitting uplink data in the time slot can be used in the time slot default of transmission, it is not necessary which is specialized
A little OFDM symbols can be used for unauthorized transmission.
Optionally, the network equipment also sends instruction information to the terminal device, and the instruction information is used to indicate
At least partly OFDM symbol that can be used in the OFDM symbol of uplink indicated by the SFI is used for based on unauthorized biography
It is defeated.
Here, instruction information can be one of the configuration parameter of unauthorized transmission.Specifically, the network equipment can lead to
It crosses semi-static signaling (such as RRC signaling, SIB, MIB, RMSI or OSI) or dynamic signaling (such as physical control signaling) is set to terminal
Preparation send the configuration parameter of unauthorized transmission, includes SFI parameter in the configuration parameter.
Therefore, in the embodiment of the present application, when the network equipment is the unauthorized biography of user device configuration by semi-static mode
When SFI parameter used in defeated, so that the Grant-free resource that terminal device can be used also will be more static, it will not be frequent
It is influenced by the Group Common DCI of SFI.In addition, the network equipment can be in the configuration parameter of unauthorized transmission further
The upgoing O FDM symbol or mini-slot that can be used for unauthorized transmission are indicated, so that configuration is more flexible.
Optionally, the network equipment includes: to the terminal device transmission first message
The network equipment sends the first message to the terminal device by radio resource control RRC signaling;Or
The network equipment sends the first message to the terminal device by physical control message.
Second aspect provides a kind of communication means, comprising:
Terminal device receives the first message that the network equipment is sent, and the first message includes time slot format relevant information
SFI, wherein the SFI is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol,
And when in the time slot including upgoing O FDM symbol, the first message is also used to indicate uplink indicated by the SFI
OFDM symbol is for the transmission based on authorization or for based on unauthorized transmission.
When terminal device receives the first message, terminal device can be confirmly detected according to first message
Upgoing O FDM symbol in time slot indicated by SFI be for authorization transmission or unauthorized transmission and time slot in use
In the quantity of the OFDM of uplink/downlink/unknown.Further, the terminal device receives lower line number according to the first message
According to, or send upstream data.
Therefore, in the embodiment of the present application, the network equipment, can be to terminal device by sending first message to terminal device
It indicates to be used for upstream or downstream or unknown OFDM symbol in time slot, and also can indicate that the OFDM symbol of the uplink is to use
In the transmission based on authorization or for based on unauthorized transmission.It follows that the embodiment of the present application can be unified to consider base
Transmission in authorization and the SFI configuration based on unauthorized transmission, and then can be avoided the network equipment and send use to terminal device
In the configuration signal parameter of change time slot purposes, reduces and send duplicate configuration signal parameter bring redundancy overhead, Jin Erti
Rise data transmission efficiency.Here, time slot purposes refer to the upgoing O FDM symbol in the time slot for authorization transmission or this when
Upgoing O FDM symbol in gap is used for unauthorized transmission.
Here, first message can be semi-static signaling or dynamic signaling, such as system message MIB, SIB, RRC signaling, MAC
CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..A kind of specific
In implementation, first message can be the Group Common DCI that carries SFI, and Group Common DCI can also be with
Referred to as Group Common PDCCH.It is understood that Group Common DCI is a kind of physical control message, receiving object can be with
For one group of terminal device, therefore Group Common DCI can be regarded as dynamic signaling.
It optionally, further include the first indicating bit in the first message, first indicating bit is used to indicate the SFI institute
The upgoing O FDM symbol of instruction is for the transmission based on authorization or for based on unauthorized transmission.In this way, disappearing by first
The indicating bit for including in breath can explicitly indicate that the SFI in the first message is for the transmission based on authorization or based on non-
The transmission of authorization.
Optionally, before the first message that the terminal device reception network equipment is sent, further includes:
The terminal device receives the first instruction information that the network equipment is sent, and the first instruction information is for referring to
Show that the terminal device detects the first radio network temporary identifier RNTI used in the first message;
Wherein, the terminal device receives the first message that the network equipment is sent, comprising:
The terminal device descrambles the CRC of the first message according to the first RNTI, to obtain described
Information entrained by one message.
Here, the first instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe
It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, before the terminal device reception first message, further includes:
The terminal device receives the second instruction message that the network equipment is sent, and second instruction message is for referring to
Show that the terminal device detects the 2nd RNTI or the 3rd RNTI used in the first message;
Wherein, the terminal device receives the first message that the network equipment is sent, comprising:
If the terminal device descrambles successfully the CRC of the first message using the 2nd RNTI, described first
It is for the transmission based on authorization that message, which is used to indicate upgoing O FDM symbol indicated by the SFI,;
If the terminal device descrambles successfully the CRC of the first message using the 3rd RNTI, described first
It is for based on unauthorized transmission that message, which is used to indicate upgoing O FDM symbol indicated by the SFI,.
Here, the second instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe
It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, terminal device can send the response message for corresponding to second instruction message to the network equipment, with
Confirm that it is properly received second instruction message.
It is understood that only when terminal device to the CRC of the first message descrambled used in RNTI set with network
When identical for the RNTI that the CRC of the first message is scrambled and used, terminal device can just successfully obtain first message
In information.That is, then first disappears when terminal device can be used the 2nd RNTI and successfully descramble the CRC of first message
Upgoing O FDM symbol in time slot indicated by SFI in breath will be used for the transmission based on authorization.When terminal device can be used
When 3rd RNTI successfully descrambles the CRC of first message, then the upgoing O FDM symbol in time slot indicated by the SFI in first message
It will be used for based on unauthorized transmission.
Therefore, the embodiment of the present application is by setting RNTI with the transmission based on authorization or based on the corresponding of unauthorized transmission
Relationship, so that terminal device is it can be learnt that the SFI in first message is for awarding without carrying out dominant instruction in first message
The transmission of power or unauthorized transmission, i.e. first message can be for the transmission of authorization or unauthorized with implicit instruction SFI
Transmission.
Optionally, before the terminal device reception first message, further includes:
The terminal device receives the third instruction message that the network equipment is sent, and the third instruction message is for referring to
Show that the terminal device detects the control of first resource used in first message set CORESET or the 2nd CORESET;
Wherein, the terminal device receives the first message that the network equipment is sent, comprising:
If the terminal device receives the first message in the first CORESET, the first message is used for
Indicate that upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization;
If the terminal device receives the first message in the 2nd CORESET, the first message is used for
Indicate that upgoing O FDM symbol indicated by the SFI is for based on unauthorized transmission.
Here, third instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe
It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, terminal device can send the response message for corresponding to the third instruction message to the network equipment, with
Confirm that it is properly received the third instruction message.
Further, the third instruction message that terminal device is issued according to the network equipment at this time, in the first CORESET and
The first message is received in two CORESET.Specifically, if terminal device is successfully received first in the first CORESET
Message, then the upgoing O FDM symbol in time slot indicated by the SFI in first message will be used for the transmission based on authorization.If eventually
End equipment is successfully received first message in the 2nd CORESET, then the uplink in time slot indicated by the SFI in first message
OFDM symbol will be used for based on unauthorized transmission.
Therefore, the embodiment of the present application is by setting CORESET with the transmission based on authorization or based on unauthorized transmission
Corresponding relationship, so that terminal device is it can be learnt that the SFI in first message is to use without carrying out dominant instruction in first message
In the transmission of authorization or unauthorized transmission, i.e. first message can be the transmission also right and wrong for authorization with implicit instruction SFI
The transmission of authorization.
Optionally, in the embodiment of the present application, the network equipment is by first message to terminal equipment configuration for unauthorized
The OFDM symbol that all can be used for transmitting uplink data in the time slot can be used in the time slot default of transmission, it is not necessary which is specialized
A little OFDM symbols can be used for unauthorized transmission.Corresponding, terminal device, which can be used in the time slot, all can be used for line number
Unauthorized transmission is carried out according to the OFDM symbol of transmission.
Optionally, the terminal device also receives the instruction information that the network equipment is sent, and the instruction information is used for
It indicates to can be used for indicated by the SFI at least partly OFDM symbol in the OFDM symbol of uplink to be used for based on unauthorized
Transmission.
Here, instruction information can be one of the configuration parameter of unauthorized transmission.Specifically, the network equipment can lead to
It crosses semi-static signaling (such as RRC signaling, SIB, MIB, RMSI or OSI) or dynamic signaling (such as physical control signaling) is set to terminal
Preparation send the configuration parameter of unauthorized transmission, includes SFI parameter in the configuration parameter.
Therefore, in the embodiment of the present application, when the network equipment is the unauthorized biography of user device configuration by semi-static mode
When SFI parameter used in defeated, so that the Grant-free resource that terminal device can be used also will be more static, it will not be frequent
It is influenced by the Group Common DCI of SFI.In addition, the network equipment can be in the configuration parameter of unauthorized transmission further
The upgoing O FDM symbol or mini-slot that can be used for unauthorized transmission are indicated, so that configuration is more flexible.
The third aspect provides a kind of communication means, comprising:
The network equipment is determined for the configuration information based on unauthorized transmission, includes time slot format phase in the configuration information
Close information SFI, wherein the SFI is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplexing
OFDM symbol;
The network equipment sends the configuration information to the terminal device.
It optionally, further include instruction information in the configuration information, the instruction information is used to indicate indicated by the SFI
The OFDM symbol that can be used for uplink at least partly OFDM symbol be used for based on unauthorized transmission.
Optionally, the network equipment sends the configuration information to the terminal device, comprising:
The network equipment sends the configuration information to the terminal device by radio resource control RRC signaling.
Therefore, in the embodiment of the present application, when the network equipment is including SFI for the configuration information based on unauthorized transmission
When, it can be SFI parameter used in the unauthorized transmission of user device configuration by semi-static mode, so that terminal is set
The standby Grant-free resource that can be used also will be more static.In addition, the network equipment can join in the configuration of unauthorized transmission
The upgoing O FDM symbol or mini-slot that can be used for unauthorized transmission are further indicated in number, so that configuration is more flexible.
Fourth aspect provides a kind of communication means, comprising:
What terminal device received that the network equipment sends is used for the configuration information based on unauthorized transmission, in the configuration information
Including time slot format relevant information SFI, wherein the SFI is at least used to indicate in time slot for upstream or downstream or unknown
Orthogonal frequency division multiplex OFDM symbol;
The terminal device sends upstream data to the network equipment according to the SFI.
It optionally, further include instruction information in the configuration information, the instruction information is used to indicate indicated by the SFI
The OFDM symbol that can be used for uplink at least partly OFDM symbol be used for based on unauthorized transmission.
Optionally, the terminal device receives the configuration information based on unauthorized transmission that is used for of network equipment transmission, packet
It includes:
The terminal device receives the described with confidence of the network equipment transmission by radio resource control RRC signaling
Breath.
Therefore, in the embodiment of the present application, when the network equipment is including SFI for the configuration information based on unauthorized transmission
When, it can be SFI parameter used in the unauthorized transmission of user device configuration by semi-static mode, so that terminal is set
The standby Grant-free resource that can be used also will be more static.In addition, the network equipment can join in the configuration of unauthorized transmission
The upgoing O FDM symbol or mini-slot that can be used for unauthorized transmission are further indicated in number, so that configuration is more flexible.
5th aspect, provides a kind of communication device, for executing any possibility of any of the above-described aspect or either side
Implementation in method.Specifically, which includes for executing any of any of the above-described aspect or either side
The unit of method in possible implementation.
6th aspect, provides a kind of communication device, which includes: transceiver, memory, processor and bus
System.Wherein, the transceiver, the memory and the processor are connected by the bus system, the memory for storing instruction,
The processor is used to execute the instruction of memory storage, receives and/or send signal to control transceiver, and work as the processing
When device executes the instruction of memory storage, the execution is so that the processor executes any of any of the above-described aspect or either side
Method in possible implementation.
7th aspect, provides a kind of computer-readable medium, for storing computer program, which includes
The instruction of the method in any possible implementation for executing any of the above-described aspect.
Eighth aspect, provides a kind of computer program product, and the computer program product includes: computer program generation
Code, when the computer program code is by the communication unit of communication equipment (for example, terminal device or network equipment), processing unit
Or when the operation of transceiver, processor, so that communication equipment executes the side in any possible implementation of any of the above-described aspect
Method.
9th aspect, provides a kind of communication chip, wherein being stored with instruction, when it runs on the communication device, makes
It obtains the communication chip and executes the method in any possible implementation of any of the above-described aspect.
Detailed description of the invention
Fig. 1 shows a kind of schematic flow chart of communication means of the embodiment of the present application.
Fig. 2 shows the flow charts of another communication means of the embodiment of the present application.
Fig. 3 shows a kind of schematic diagram of frame format of the first message of the embodiment of the present application.
Fig. 4 shows a kind of schematic diagram of time slot configuration of the embodiment of the present application.
Fig. 5 shows the schematic diagram of another time slot configuration of the embodiment of the present application.
Fig. 6 shows the flow chart of another communication means of the embodiment of the present application.
Fig. 7 shows the flow chart of another communication means of the embodiment of the present application.
Fig. 8 shows the flow chart of another communication means of the embodiment of the present application.
Fig. 9 shows a kind of schematic block diagram of communication device of the embodiment of the present application.
Figure 10 shows the schematic block diagram of another communication device of the embodiment of the present application.
Figure 11 shows the schematic block diagram of another communication device of the embodiment of the present application.
Figure 12 shows the schematic block diagram of another communication device of the embodiment of the present application.
Figure 13 shows the schematic block diagram of another communication device of the embodiment of the present application.
Figure 14 shows the schematic block diagram of another communication device of the embodiment of the present application.
Figure 15 shows the schematic block diagram of another communication device of the embodiment of the present application.
Figure 16 shows the schematic block diagram of another communication device of the embodiment of the present application.
Specific embodiment
Below in conjunction with attached drawing, the technical solution in the application is described.
The technical solution of the embodiment of the present application can be applied to various communication systems, such as: global system for mobile telecommunications (Global
System of Mobile communication, GSM) system, CDMA (Code Division Multiple
Access, CDMA) system, wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) system
System, General Packet Radio Service (General Packet Radio Service, GPRS), long term evolution (Long Term
Evolution, LTE) system, LTE frequency division duplex (Frequency Division Duplex, FDD) system, LTE time division duplex
(Time Division Duplex, TDD), Universal Mobile Communication System (Universal Mobile
Telecommunication System, UMTS), global interconnection inserting of microwave (Worldwide Interoperability
For Microwave Access, WiMAX) communication system, following the 5th generation (5th Generation, 5G) system or new nothing
Line (New Radio, NR) etc..
Terminal device in the embodiment of the present application can refer to terminal device, access terminal, subscriber unit, subscriber station, movement
It stands, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless telecom equipment, user agent or user
Device.Terminal device can also be cellular phone, wireless phone, session initiation protocol (Session Initiation
Protocol, SIP) phone, wireless local loop (Wireless Local Loop, WLL) stand, personal digital assistant
(Personal Digital Assistant, PDA), the handheld device with wireless communication function calculate equipment or are connected to
Other processing equipments of radio modem, mobile unit, wearable device, terminal device in the following 5G network or not
Carry out the terminal device etc. in the Public Land Mobile Network network (Public Land Mobile Network, PLMN) of evolution,
The embodiment of the present application does not limit this.
The network equipment in the embodiment of the present application can be for the equipment with terminal equipment in communication, which can be with
It is global system for mobile telecommunications (Global System of Mobile communication, GSM) system or CDMA (Code
Division Multiple Access, CDMA) in base station (Base Transceiver Station, BTS), be also possible to
In wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) system base station (NodeB,
NB), can also be the evolved base station (Evolutional NodeB, eNB or eNodeB) in LTE system, can also be cloud without
Wireless controller or the network equipment under line access network (Cloud Radio Access Network, CRAN) scene
It can be relay station, access point, mobile unit, wearable device and the network equipment or the following evolution in future 5G network
PLMN network in the network equipment etc., the embodiment of the present application does not limit.
Fig. 1 shows a kind of schematic flow chart of communication means provided by the embodiments of the present application.
110, the network equipment determines that first message, the first message include time slot format relevant information SFI, wherein institute
It states SFI and is used to indicate the orthogonal frequency division multiplex OFDM symbol for being used for upstream or downstream in time slot, and work as in the time slot and include
When upgoing O FDM symbol, the first message is also used to indicate that upgoing O FDM symbol indicated by the SFI is for being based on awarding
The transmission of power or for based on unauthorized transmission.
Specifically, first message can be semi-static signaling or dynamic signaling, such as system message Master Information Block (Master
Information Block, MIB), System information block (System Information Block, SIB), wireless heterogeneous networks
(Radio Resource Control, RRC) signaling, MAC control element (Media Access Control Control
Element, MAC CE) signaling, physical control message (such as L1signaling, group common DCI), remaining minimum system
Information (Remaining Minimum System Information, RMSI) or other systems information (Other System
Information, OSI) etc..In a kind of concrete implementation mode, first message can be the Group Common of carrying SFI
DCI, and Group Common DCI be referred to as the public Physical Uplink Control Channel of group (Group Common PDCCH,
GC-PDCCH).It is understood that Group Common DCI is a kind of physical control message, receiving object can set for one group of terminal
It is standby, therefore Group Common DCI can be regarded as dynamic signaling.
It should be noted that the network equipment here can be base station.Specifically, forth generation mobile communication system (4G,
Such as LTE) in base station be properly termed as eNB (eNodeB), next generation mobile communication system (also referred to as NR, New Radio, it is new empty
Mouthful) in, base station is properly termed as gNB (gNodeB).
Here, first message can dynamic, static or semi-statically indicate structure of time slot.Specifically, the SFI is extremely
It is used to indicate in time slot less for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, i.e., the described SFI can be used for
Indicate that the OFDM symbol in time slot can be completely used for uplink or downlink transfer or some OFDM symbols can be used for uplink
Transmission, some OFDM symbols can be used for downlink transfer, some OFDM symbols are unknown (unknown) symbol.Here, unknown
The purposes that OFDM symbol can be understood as the OFDM symbol is uncertain, i.e., the OFDM symbol at least can be used for uplink, downlink or
As blank resource.It should be noted that the network equipment (such as base station) at least can by dynamic signaling (such as DCI) will as described in not
Know that OFDM symbol is configured to upstream or downstream symbol.Table 1 shows a kind of mode of possible structure of time slot (i.e. SFI) instruction.
Here, SFI can be used 3bit (bit) and be indicated, under can be used for so that at most 8 kinds of representative in a time slot are possible
The configuring condition of the OFDM symbol of row/unknown/uplink.
Table 1
Slot format | DL | Unknown | UL | Bits |
0 | 14 | 0 | 0 | 000 |
1 | 10 | 2 | 2 | 001 |
2 | 8 | 2 | 4 | 010 |
3 | 6 | 2 | 6 | 011 |
4 | 4 | 2 | 8 | 100 |
5 | 2 | 2 | 10 | 101 |
6 | 0 | 0 | 14 | 110 |
It is understood that the SFI may be used to indicate that other OFDM symbols, the application in time slot in the embodiment of the present application
Embodiment does not limit this.For example, SFI may be used to indicate that reserved (reserved) OFDM symbol in time slot, wherein should
Reserved OFDM symbol can be configured to unknown OFDM symbol or other OFDM symbols.
In the embodiment of the present application, the first message is also used to indicate that the upgoing O FDM in time slot indicated by the SFI is accorded with
It number is for the transmission based on authorization or for based on unauthorized transmission.
It is understood that the upgoing O FDM symbol in time slot can be used for transmission based on authorization or user based on unauthorized biography
Defeated, other symbols in the time slot in addition to upgoing O FDM symbol are used to the transmission based on authorization at this time.That is, this Shen
Please be in embodiment, first message is also used to indicate that one or more time slots indicated by the SFI can be used for based on authorization
Upgoing O FDM symbol in transmission or the one or more time slot can be used for based on unauthorized transmission.
Specifically, based on authorization, (Grant-based is referred to as UL Transmission compared to traditional
With grant) transmission method, next generation wireless communication network (such as NR) introduce based on it is unauthorized (Grant-free,
Be properly termed as Grantless or Grant-less or UL Transmission without grant etc.) transmission method,
I.e. the network equipment is first that terminal device divides one or more pieces unauthorized transmission region (Grant-free Transmission
Area, GFTA), terminal device directly transmits upstream data (such as uplink Grant-free data) in unauthorized transmission region,
The process from service request to base station uplink authorization is not needed to undergo.Therefore, have very in terms of network delay and signaling overheads
Big advantage.Here, unauthorized transmission region is referred to as Grant-free resource (Grant-free resource).
For unauthorized transmission, since its business is not expectable, the Grant-free resource that the network equipment is pre-configured has
The demand that dynamic updates.Such as when needing more Grant-free resources, need to update the Grant-free money of pre-configuration
Source.Based on this, when the first message in the embodiment of the present application is also used to indicate that upgoing O FDM indicated by the SFI is for base
In the transmission of authorization or when for based on unauthorized transmission, the first message can meet to the transmission configuration of authorization its
While time slot format, meet the unauthorized demand for transmitting its time slot format of dynamic configuration in the time domain.
It should be noted that unauthorized transmission is only used for uplink in Current standards, that is to say, that only upgoing O FDM symbol
It can be used for unauthorized transmission.But unauthorized transmission also is likely used for downlink transfer in the standard in future, i.e., in standard in future
It is also possible to realize the technical solution that downlink OFDM symbol is used for unauthorized transmission.It is understood that uplink is directed in the present invention at this time
The instruction for authorized transmissions or unauthorized transmission that OFDM symbol carries out is equally applicable to downlink OFDM symbol, i.e. first message
It may be used to indicate that downlink OFDM symbol indicated by the SFI is for the transmission based on authorization or for unauthorized
Transmission.
120, the network equipment sends the first message to terminal device.
Specifically, the network equipment can be by radio resource control RRC signaling to described in terminal device transmission
First message or the network equipment pass through physical control message and send the first message to the terminal device.Here,
The quantity of terminal device can be one or more.
When terminal device receives the first message, terminal device can be confirmly detected according to first message
Upgoing O FDM symbol in time slot indicated by SFI be for authorization transmission or unauthorized transmission and time slot in use
In the quantity of the OFDM of uplink/downlink/unknown.
Therefore, in the embodiment of the present application, the network equipment, can be to terminal device by sending first message to terminal device
It indicates to be used for upstream or downstream or unknown OFDM symbol in time slot, and also can indicate that the OFDM symbol of the uplink is to use
In the transmission based on authorization or for based on unauthorized transmission.It follows that the embodiment of the present application can be unified to consider base
Transmission in authorization and the SFI configuration based on unauthorized transmission, and then can be avoided the network equipment and send use to terminal device
In the configuration signal parameter of change time slot purposes, reduces and send duplicate configuration signal parameter bring redundancy overhead, Jin Erti
Rise data transmission efficiency.Here, time slot purposes refer to the upgoing O FDM symbol in the time slot for authorization transmission or this when
Upgoing O FDM symbol in gap is used for unauthorized transmission.
Fig. 2 shows the flow charts of another communication means provided by the embodiments of the present application.It should be understood that Fig. 2 shows should
The step of communication means or operation, but these steps or operation are only examples, and other operations can also be performed in the embodiment of the present application
Or the deformation of each operation in Fig. 2.In addition, each step in Fig. 2 can be come according to the different sequences presented from Fig. 2
It executes, and it is possible to not really want to execute all operationss in Fig. 2.
201, the network equipment sends the first instruction message to terminal device, which is used to indicate the terminal
Equipment detects the first radio network temporary identifier (Radio Network Tempory used in the first message
Identity, RNTI).Specifically, the first message may refer to the description in figure 1 above, to avoid repeating, here no longer
It repeats.
Here, the first instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe
It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, step 202 can also be performed after step 201,202 be specially that terminal device is sent to the network equipment
Response message corresponding to first instruction message.As an example, when terminal device is successfully received network equipment transmission
After first instruction message (such as RRC signaling), which sends the response for corresponding to first instruction message to the network equipment
Message, to confirm that it is properly received first instruction message.
203, the network equipment sends first message to terminal device.
Specifically, the network equipment uses the first RNTI in 201 to the cyclic redundancy check (Cyclic in the first message
Redundancy Check, CRC) it is scrambled, it is (i.e. different to be different from other possible Group Common DCI types
Its meaning for carrying indicating bit of the scrambled Group Common DCI of RNTI can be not exactly the same).Then, the network equipment
The first message after scrambling is sent to the terminal device.
Further, after terminal device receives the first message that the network equipment is sent, according to network in step 201
The RNTI that equipment issues demodulates information entrained by first message, the uplink in time slot indicated by the SFI confirmly detected
OFDM symbol is for being used for uplink/downlink/unknown OFDM symbol number in authorized transmissions or unauthorized transmission and time slot
Amount.
It should be noted that executing step 203 after step 202 if step 202 exists.It should be noted that
(or step 201 and step 202) are relatively independent steps, that is to say, that in step 201 (or step for step 203 and step 201
Rapid 201 and step 202) after can execute one or many steps 203.
It optionally, further include the first indicating bit in the first message in the embodiment of the present application, first indicating bit is used
Upgoing O FDM symbol in the time slot indicated by the instruction SFI is for the transmission based on authorization or for based on unauthorized
Transmission, that is, be used to indicate one or more time slots indicated by the SFI can be used for transmission based on authorization or it is described when
Upgoing O FDM symbol in gap can be used for based on unauthorized transmission.In this way, passing through the indicating bit energy for including in first message
Enough SFI explicitly indicated in the first message are for the transmission based on authorization or based on unauthorized transmission.
Fig. 3 shows a kind of schematic diagram of frame format of first message provided by the embodiments of the present application, as an example, at this time
The first message can be Group Common DCI.Specifically, the indicating bit of 1bit (bit) can be used in the first message
To indicate transport-type.Such as when the indicating bit is set as " 1 ", it can indicate that the time slot will be used for the transmission based on authorization;
When the indicating bit is set as " 0 ", then it can indicate that the time slot will be used for based on unauthorized transmission.Alternatively, working as the indicating bit
When being set as " 0 ", it can indicate that the time slot will be used for the transmission based on authorization;When the indicating bit is set as " 1 ", then can refer to
Show that the time slot will be used for based on unauthorized transmission.
It should be noted that a time slot is for all OFDM symbols in the transmission based on the authorization i.e. time slot here
(i.e. uplink/downlink/unknown OFDM symbol) is used for the transmission based on authorization;One time slot is used to i.e. should based on unauthorized transmission
Upgoing O FDM symbol in time slot is used for based on unauthorized transmission, other symbols in the time slot in addition to upgoing O FDM symbol
For the transmission based on authorization.
Fig. 4 shows a kind of schematic diagram of time slot configuration provided by the embodiments of the present application.Specifically, the network equipment passes through half
Static configuration is dynamically configured as terminal equipment configuration one or more can be used for time slot (the i.e. Grant- of unauthorized transmission
Free resource), remaining time slot then can be used for the transmission based on authorization.Here, the network equipment can be by first message by one
The time slot of place or many places for authorized transmissions is adjusted to the time slot for unauthorized transmission, authorized transmissions are flexibly met to resource
Demand.
For example, network is set when conflicting more violent between the portfolio or terminal device carried in Grant-free resource
It is standby that the partial time slot for being originally intended to authorized transmissions can be allocated to unauthorized transmission, and uplink and downlink OFDM can be adjusted by SFI
The ratio (quantity as increased upgoing O FDM symbol in time slot) of symbol, to increase the resource that unauthorized transmission can be used, mentions
Rise system effectiveness.Here conflict can refer to be carried out on time-frequency domain used in transmitting uplink data between multiple terminal devices
Grant-free resource is completely or partially overlapped, and causes the network equipment that can not correctly demodulate what the multiple terminal device was sent
Upstream data.
Further, the Grant-free resource that the network equipment is reconfigured by first message is in addition to Parameters of Time-frequency Field
Outside, parameter used in other unauthorized transmission can be used along unauthorized transmission configured in same frequency resource is used in
Parameter, such as Modulation and Coding Scheme (Modulation and Coding Scheme, MCS), power control parameters (Power
Control Related parameter), demodulated reference signal (the Demodulation Reference of user equipment
Signal, DMRS) configuration information etc..
Fig. 5 shows the schematic diagram of another time slot configuration provided by the embodiments of the present application.Specifically, the network equipment passes through
Being semi-statically configured or be dynamically configured as terminal equipment configuration, one or more can be used for time slot (the i.e. Grant- of authorized transmissions
Free resource), remaining time slot then can be used for the transmission based on authorization.Here, the network equipment can be by first message by one
The time slot of place or many places for unauthorized transmission is adjusted to the time slot for authorized transmissions, authorized transmissions are flexibly met to resource
Demand.
Therefore, in the embodiment of the present application, the network equipment, can be to terminal device by sending first message to terminal device
It indicates to be used for upstream or downstream or unknown OFDM symbol in time slot, and also can indicate that the OFDM symbol of the uplink is to use
In the transmission based on authorization or for based on unauthorized transmission.It follows that the embodiment of the present application can be unified to consider base
Transmission in authorization and the SFI configuration based on unauthorized transmission, and then can be avoided the network equipment and send use to terminal device
In the configuration signal parameter of change time slot purposes, reduces and send duplicate configuration signal parameter bring redundancy overhead, Jin Erti
Rise data transmission efficiency.Here, time slot purposes refer to the upgoing O FDM symbol in the time slot for authorization transmission or this when
Upgoing O FDM symbol in gap is used for unauthorized transmission.
Fig. 6 shows the flow chart of another communication means provided by the embodiments of the present application.It should be understood that Fig. 6 shows this
The step of communication means or operation, but these steps or operation are only examples, and other operations can also be performed in the embodiment of the present application
Or the deformation of each operation in Fig. 6.In addition, each step in Fig. 6 can be come according to the different sequences presented from Fig. 6
It executes, and it is possible to not really want to execute all operationss in Fig. 6.
601, the network equipment sends the second instruction message to terminal device, and second instruction message is used to indicate the end
End equipment detects the 2nd RNTI or the 3rd RNTI used in the first message.Here, the 2nd RNTI and the 3rd RNTI can be with
Upgoing O FDM symbol for distinguishing in time slot indicated by the SFI is for the transmission based on authorization or based on unauthorized
Transmission, i.e., for distinguish one or more time slots indicated by the SFI can be used for transmission based on authorization or it is described when
Upgoing O FDM symbol in gap can be used for based on unauthorized transmission.Specifically, the first message may refer to figure 1 above
In description, to avoid repeating, which is not described herein again.
Here, the second instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe
It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, step 602 can also be performed after step 601,602 be specially that terminal device is sent to the network equipment
Response message corresponding to second instruction message.As an example, when terminal device is successfully received network equipment transmission
After second instruction message (such as RRC signaling), which sends the response for corresponding to second instruction message to the network equipment
Message, to confirm that it is properly received second instruction message.
603, the network equipment sends first message to terminal device.
Specifically, if it is for being based on awarding that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI,
The transmission of power, then the network equipment scrambles the CRC of the first message using the 2nd RNTI, and to the end
End equipment sends the first message after scrambling.It is understood that the upgoing O FDM symbol in the time slot indicated by the SFI here
When number being for transmission based on authorization, other OFDM symbols in addition to upgoing O FDM symbol in the time slot are also to be used for
Transmission based on authorization.
If it is for based on unauthorized biography that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI,
Defeated, then the network equipment scrambles the CRC of the first message using the 3rd RNTI, and to the terminal device
The first message after sending scrambling.It is understood that the upgoing O FDM symbol in the time slot indicated by the SFI is for base here
When unauthorized transmission, other OFDM symbols in addition to upgoing O FDM symbol in the time slot are for based on authorization
Transmission.
It should be noted that if there is step 602, then executing 603 after step 602 in the embodiment of the present application.
Further, in the embodiment of the present application, after terminal device receives the first message of network equipment transmission, according to
The 2nd RNTI and the 3rd RNTI that the network equipment issues in step 601, descramble the CRC of the first message.
It is understood that only when terminal device to the CRC of the first message descrambled used in RNTI set with network
When identical for the RNTI that the CRC of the first message is scrambled and used, terminal device can just successfully obtain first message
In information.That is, then first disappears when terminal device can be used the 2nd RNTI and successfully descramble the CRC of first message
Upgoing O FDM symbol in time slot indicated by SFI in breath will be used for the transmission based on authorization.When terminal device can be used
When 3rd RNTI successfully descrambles the CRC of first message, then the upgoing O FDM symbol in time slot indicated by the SFI in first message
It will be used for based on unauthorized transmission.
Therefore, the embodiment of the present application is by setting RNTI with the transmission based on authorization or based on the corresponding of unauthorized transmission
Relationship, so that terminal device is it can be learnt that the SFI in first message is for awarding without carrying out dominant instruction in first message
The transmission of power or unauthorized transmission, i.e. first message can be for the transmission of authorization or unauthorized with implicit instruction SFI
Transmission.
Fig. 7 shows the flow chart of another communication means provided by the embodiments of the present application.It should be understood that Fig. 7 shows this
The step of communication means or operation, but these steps or operation are only examples, and other operations can also be performed in the embodiment of the present application
Or the deformation of each operation in Fig. 7.In addition, each step in Fig. 7 can be come according to the different sequences presented from Fig. 7
It executes, and it is possible to not really want to execute all operationss in Fig. 7.
701, the network equipment sends third instruction message to terminal device, and the third instruction message is used to indicate the end
End equipment detects first resource used in the first message and controls set CORESET or the 2nd CORESET.Here, first
It is for base that CORESET and the 2nd CORESET, which can be used for distinguishing the upgoing O FDM symbol in time slot indicated by the SFI,
It, i.e., can be with for distinguishing one or more time slots indicated by the SFI in the transmission of authorization or based on unauthorized transmission
It can be used for for the upgoing O FDM symbol in the transmission based on authorization or the time slot based on unauthorized transmission.Specifically,
The first message may refer to the description in figure 1 above, and to avoid repeating, which is not described herein again.
Here, third instruction message can be semi-static signaling or dynamic signaling, as system message MIB, SIB, RRC believe
It enables, MAC CE signaling, physical control message (such as L1signaling, group common DCI), RMSI or OSI etc..
Optionally, step 702 can also be performed after step 701,702 be specially that terminal device is sent to the network equipment
Response message corresponding to the third instruction message.As an example, when terminal device is successfully received network equipment transmission
After third instruction message (such as RRC signaling), which sends the response for corresponding to the third instruction message to the network equipment
Message, to confirm that it is properly received the third instruction message.
703, the network equipment sends first message to terminal device.
Specifically, if it is for being based on awarding that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI,
The transmission of power, then the network equipment issues the first message to the terminal device in the first CORESET.It can manage
Solution, when the upgoing O FDM symbol indicated by the SFI in time slot is for transmission based on authorization here, in the time slot
Other OFDM symbols in addition to upgoing O FDM symbol are also for the transmission based on authorization.
If it is for based on unauthorized biography that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI,
Defeated, then the network equipment issues the first message to the terminal device in the 2nd CORESET.It is understood that this
In upgoing O FDM symbol in the time slot indicated by SFI when being for based on unauthorized transmission, in the time slot except on this
Other OFDM symbols except row OFDM symbol are for the transmission based on authorization.
It should be noted that if there is step 702, then executing 703 after step 702 in the embodiment of the present application.
Further, the third instruction message that terminal device is issued according to the network equipment in step 701 at this time, first
The first message is received in CORESET and the 2nd CORESET.Specifically, if terminal device success in the first CORESET
First message is received, then the upgoing O FDM symbol in time slot indicated by the SFI in first message will be used for based on authorization
Transmission.If terminal device is successfully received first message in the 2nd CORESET, indicated by the SFI in first message
Upgoing O FDM symbol in time slot will be used for based on unauthorized transmission.
Therefore, the embodiment of the present application is by setting CORESET with the transmission based on authorization or based on unauthorized transmission
Corresponding relationship, so that terminal device is it can be learnt that the SFI in first message is to use without carrying out dominant instruction in first message
In the transmission of authorization or unauthorized transmission, i.e. first message can be the transmission also right and wrong for authorization with implicit instruction SFI
The transmission of authorization.
Optionally, in the embodiment of the present application, the network equipment is by first message to terminal equipment configuration for unauthorized
The OFDM symbol that all can be used for transmitting uplink data in the time slot can be used in the time slot default of transmission, it is not necessary which is specialized
A little OFDM symbols can be used for unauthorized transmission.
Optionally, in the embodiment of the present application, the network equipment is by first message to terminal equipment configuration for unauthorized
The time slot of transmission can be at least partly OFDM symbol in the OFDM symbol for can be used in the time slot transmitting uplink data.This
When, indicating bit can be further used indicate in the time slot this at least partly OFDM symbol be which OFDM symbol.Specifically
For, the network equipment can also send instruction information to the terminal device, and the instruction information is used to indicate the SFI
At least partly OFDM symbol in the indicated OFDM symbol that can be used for uplink is used for based on unauthorized transmission.Specifically
, which can be the bit in the first information, or be the configuration of one of configuration parameter of unauthorized transmission
Parameter.
When indicating information is one of the configuration parameter of unauthorized transmission, the network equipment can pass through semi-static signaling
(such as RRC signaling, SIB, MIB, RMSI or OSI) or dynamic signaling (such as physical control signaling) send unauthorized to terminal device
The configuration parameter of transmission may include SFI in the configuration parameter.Wherein, the OFDM symbol in time slot for uplink can be whole
For that based on unauthorized transmission, can also indicate the multiple uplink that can be used in the configuration signal of unauthorized transmission
Which OFDM symbol can be used for unauthorized transmission in OFDM symbol.
As an example, when M shared in time slot (M is non-negative integer) a OFDM symbol that can be used for uplink, the network equipment
It into the configuration signal of terminal device is sent first message or unauthorized transmission, can further indicate that the M can
It can be used for unauthorized transmission for N (N≤M, N can be non-negative integer) a OFDM symbol in the OFDM symbol of uplink.
In addition, the embodiment of the present application to the position of N number of OFDM symbol without limitation.Such as in M OFDM symbol
Rear N number of OFDM symbol that top n OFDM symbol can be used in unauthorized transmission or M OFDM symbol can be used for unauthorized transmission,
Or certain N number of OFDM symbol in M OFDM symbol can be used for unauthorized transmission.
As another example, when in a time slot including multiple mini-slot (mini-slot or non-slot), network
Equipment can also notify to use into the configuration signal of first message or unauthorized transmission that terminal device is sent to terminal device
In the mini-slot based on unauthorized transmission, such as mini-slot serial number (alternatively referred to as mini-slot number, mini-slot call number), it is micro- when
Gap combined situation etc..
It is illustrated by taking mini-slot combined situation as an example below.Specifically, the network equipment can matching in unauthorized transmission
Several bit indicating bits, which are carried, in confidence order indicates which mini-slot or which uplink mini-slot can be used for unauthorized transmission.Than
The mode that bitmap (bitmap) such as can be used is indicated that is, each mini-slot can correspond to 1bit indicating bit, and " 1 " instruction makes
With corresponding mini-slot, " 0 " instruction does not use corresponding mini-slot, or " 0 " instruction uses corresponding mini-slot, " 1 " instruction
Without using corresponding mini-slot.For another example, several indicating bits can be used to indicate possible a variety of mini-slot combinations.Such as when
It is indicated using 3bit indicating bit, " 000 " can indicate using mini-slot 1/2/3 or can be used for the mini-slot 1/2/3 of uplink,
" 001 " can indicate using mini-slot 3/4/5 or can be used for the mini-slot 3/4/5 of uplink, or can also use other instructions
Mode, here without limitation.
Therefore, in the embodiment of the present application, when the network equipment is the unauthorized biography of user device configuration by semi-static mode
When SFI parameter used in defeated, so that the Grant-free resource that terminal device can be used also will be more static, it will not be frequent
It is influenced by the Group Common DCI of SFI.In addition, the network equipment can be in the configuration parameter of unauthorized transmission further
The upgoing O FDM symbol or mini-slot that can be used for unauthorized transmission are indicated, so that configuration is more flexible.
Fig. 8 shows a kind of schematic flow chart of communication means provided by the embodiments of the present application.
810, the network equipment is determined for the configuration information based on unauthorized transmission, includes time slot lattice in the configuration information
Formula relevant information SFI, wherein the SFI is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplexing
Use OFDM symbol.
Here, it is referred to as configuration parameter for the configuration information based on unauthorized transmission, the configuration information or configuration
It may include SFI in parameter, SFI, which can serve to indicate that, will be used for uplink/downlink/not in the time slot in the resource of unauthorized transmission
The quantity for the OFDM symbol known.
In the embodiment of the present application, the OFDM symbol in time slot for uplink can be completely used for based on unauthorized transmission.
Alternatively, can also be indicated in the configuration signal of unauthorized transmission in the multiple OFDM symbol that can be used for uplink
Which OFDM symbol can be used for unauthorized transmission.That is, can also include instruction information, institute in the configuration information
State at least partly OFDM symbol that instruction information is used to indicate in the OFDM symbol that can be used for uplink indicated by the SFI
For based on unauthorized transmission.
As an example, when M shared in time slot (M is non-negative integer) a OFDM symbol that can be used for uplink, the network equipment
It can further indicate that the M can be used for uplink in the configuration information for sending unauthorized transmission to terminal device
N (N≤M, N can be non-negative integer) a OFDM symbol in OFDM symbol can be used for unauthorized transmission.
In addition, the embodiment of the present application to the position of N number of OFDM symbol without limitation.Such as in M OFDM symbol
Rear N number of OFDM symbol that top n OFDM symbol can be used in unauthorized transmission or M OFDM symbol can be used for unauthorized transmission,
Or certain N number of OFDM symbol in M OFDM symbol can be used for unauthorized transmission.
As another example, when in a time slot including multiple mini-slot (mini-slot or non-slot), network
Equipment can also in the configuration information of unauthorized transmission, to terminal device notice for the mini-slot based on unauthorized transmission,
Such as mini-slot serial number (alternatively referred to as mini-slot number, mini-slot call number), mini-slot combined situation etc..
It is illustrated by taking mini-slot combined situation as an example below.Specifically, the network equipment can matching in unauthorized transmission
Several bit indicating bits, which are carried, in confidence order indicates which mini-slot or which uplink mini-slot can be used for unauthorized transmission.Than
The mode that bitmap (bitmap) such as can be used is indicated that is, each mini-slot can correspond to 1bit indicating bit, and " 1 " instruction makes
With corresponding mini-slot, " 0 " instruction does not use corresponding mini-slot, or " 0 " instruction uses corresponding mini-slot, " 1 " instruction
Without using corresponding mini-slot.For another example, several indicating bits can be used to indicate possible a variety of mini-slot combinations.Such as when
It is indicated using 3bit indicating bit, " 000 " can indicate using mini-slot 1/2/3 or can be used for the mini-slot 1/2/3 of uplink,
" 001 " can indicate using mini-slot 3/4/5 or can be used for the mini-slot 3/4/5 of uplink, or can also use other instructions
Mode, here without limitation.
820, the network equipment sends the configuration information to the terminal device.
Specifically, the network equipment can pass through semi-static signaling (such as RRC signaling, SIB, MIB, RMSI or OSI) Xiang Suoshu
Terminal device sends the configuration information.
Therefore, in the embodiment of the present application, when the network equipment is including SFI for the configuration information based on unauthorized transmission
When, it can be SFI parameter used in the unauthorized transmission of user device configuration by semi-static mode, so that terminal is set
The standby Grant-free resource that can be used also will be more static.In addition, the network equipment can join in the configuration of unauthorized transmission
The upgoing O FDM symbol or mini-slot that can be used for unauthorized transmission are further indicated in number, so that configuration is more flexible.
Communication means provided by the embodiments of the present application is described in detail above in association with Fig. 1 to Fig. 8, extremely below in conjunction with Fig. 9
Communication device provided by the embodiments of the present application is described in detail in Figure 16.
Fig. 9 shows a kind of schematic block diagram of communication device 900 provided by the embodiments of the present application, which includes
Determination unit 910 and transmission unit 920.
Determination unit 910, for determining that first message, the first message include time slot format relevant information SFI,
In, the SFI is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, and is worked as
When including upgoing O FDM symbol in the time slot, the first message is also used to indicate that upgoing O FDM indicated by the SFI is accorded with
It number is for the transmission based on authorization or for based on unauthorized transmission;
Transmission unit 920, for sending the first message to terminal device.
Therefore, in the embodiment of the present application, the network equipment, can be to terminal device by sending first message to terminal device
It indicates to be used for upstream or downstream or unknown OFDM symbol in time slot, and also can indicate that the OFDM symbol of the uplink is to use
In the transmission based on authorization or for based on unauthorized transmission.It follows that the embodiment of the present application can be unified to consider base
Transmission in authorization and the SFI configuration based on unauthorized transmission, and then can be avoided the network equipment and send use to terminal device
In the configuration signal parameter of change time slot purposes, reduces and send duplicate configuration signal parameter bring redundancy overhead, Jin Erti
Rise data transmission efficiency.Here, time slot purposes refer to the upgoing O FDM symbol in the time slot for authorization transmission or this when
Upgoing O FDM symbol in gap is used for unauthorized transmission.
It optionally, further include the first indicating bit in the first message, first indicating bit is used to indicate the SFI institute
The upgoing O FDM symbol of instruction is for the transmission based on authorization or for based on unauthorized transmission.
Optionally, the transmission unit 920 is also used to send the first instruction message to the terminal device, and described first refers to
Show that message is used to indicate the terminal device and detects the first radio network temporary identifier RNTI used in the first message;
Wherein, transmission unit 920 is specifically used for the cyclic redundancy check using the first RNTI to the first message
CRC is scrambled, and sends the first message after scrambling to the terminal device.
Optionally, the transmission unit 920 is also used to send the second instruction message to the terminal device, and described second refers to
Show that message is used to indicate the terminal device and detects the 2nd RNTI or the 3rd RNTI used in the first message;
Wherein, the transmission unit 920 is specifically used for:
If it is for the biography based on authorization that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI,
Defeated, then the network equipment scrambles the CRC of the first message using the 2nd RNTI, and to the terminal device
The first message after sending scrambling;
If it is for based on unauthorized biography that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI,
Defeated, then the network equipment scrambles the CRC of the first message using the 3rd RNTI, and to the terminal device
The first message after sending scrambling.
Optionally, the transmission unit 920 is also used to send third instruction message to the terminal device, and the third refers to
Show that message is used to indicate the terminal device and detects the control set CORESET of first resource used in the first message or the
Two CORESET;
Wherein, the transmission unit 920 is specifically used for:
If it is for the biography based on authorization that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI,
Defeated, then the network equipment issues the first message to the terminal device in the first CORESET;
If it is for based on unauthorized biography that the first message, which is used to indicate upgoing O FDM symbol indicated by the SFI,
Defeated, then the network equipment issues the first message to the terminal device in the 2nd CORESET.
Optionally, the transmission unit 920 can be also used for sending instruction information to terminal device, which is used for
It indicates to can be used for indicated by the SFI at least partly OFDM symbol in the OFDM symbol of uplink to be used for based on unauthorized
Transmission.
Optionally, the transmission unit 920 is specifically used for sending out by radio resource control RRC signaling to the terminal device
Send the first message;Or the first message is sent to the terminal device by physical control message.
It should be noted that determination unit 910 can be realized by processor, and transmission unit 920 can be by receiving in the embodiment of the present invention
Device is sent out to realize.As shown in Figure 10, communication device 1000 may include processor 1010, memory 1020 and transceiver 1030.Its
In, memory 1020 can be used for the code etc. of the execution of storage processor 1010, and processor 910 can be used for data or program
It is handled.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor 1010
Or the instruction of software form is completed.The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly at hardware
Reason device executes completion, or in processor hardware and software module combine and execute completion.Software module can be located at random
Memory, flash memory, read-only memory, the abilities such as programmable read only memory or electrically erasable programmable memory, register
In the storage medium of domain maturation.The storage medium is located at memory 1020, and processor 1010 reads the information in memory 1020,
The step of completing the above method in conjunction with its hardware.To avoid repeating, it is not detailed herein.
Communication device 900 or communication device shown in Fig. 10 1000 shown in Fig. 9 can be realized preceding method embodiment pair
Answer each process of the network equipment, specifically, the communication device 900 or communication device 1000 may refer to it is described above,
To avoid repeating, which is not described herein again.
Figure 11 shows a kind of schematic block diagram of communication device 1100 provided by the embodiments of the present application.Device 1100 includes
Receiving unit 1110 and processing unit 1120.
Receiving unit 1110, for receiving the first message of network equipment transmission, the first message includes time slot format
Relevant information SFI, wherein the SFI is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplexing
OFDM symbol, and when in the time slot including upgoing O FDM symbol, the first message is also used to indicate that the SFI is signified
The upgoing O FDM symbol shown is for the transmission based on authorization or for based on unauthorized transmission;
Processing unit 1120, for receiving downlink data, or transmission upstream data according to the first message.
Therefore, in the embodiment of the present application, the network equipment, can be to terminal device by sending first message to terminal device
It indicates to be used for upstream or downstream or unknown OFDM symbol in time slot, and also can indicate that the OFDM symbol of the uplink is to use
In the transmission based on authorization or for based on unauthorized transmission.It follows that the embodiment of the present application can be unified to consider base
Transmission in authorization and the SFI configuration based on unauthorized transmission, and then can be avoided the network equipment and send use to terminal device
In the configuration signal parameter of change time slot purposes, reduces and send duplicate configuration signal parameter bring redundancy overhead, Jin Erti
Rise data transmission efficiency.Here, time slot purposes refer to the upgoing O FDM symbol in the time slot for authorization transmission or this when
Upgoing O FDM symbol in gap is used for unauthorized transmission.
It optionally, further include the first indicating bit in the first message, first indicating bit is used to indicate the SFI institute
The upgoing O FDM symbol of instruction is for the transmission based on authorization or for based on unauthorized transmission.
Optionally, the receiving unit 1110 is also used to receive the first instruction information that the network equipment is sent, described
First instruction information is used to indicate the terminal device and detects the first radio network temporary identifier used in the first message
RNTI;
Wherein, the receiving unit is specifically used for descrambling the CRC of the first message according to the first RNTI,
To obtain information entrained by the first message.
Optionally, the receiving unit 1110 is also used to receive the second instruction message that the network equipment is sent, described
Second instruction message is used to indicate the terminal device and detects the 2nd RNTI or the 3rd RNTI used in the first message;
Wherein, the receiving unit 1110 is specifically used for:
If the terminal device descrambles successfully the CRC of the first message using the 2nd RNTI, described first
It is for the transmission based on authorization that message, which is used to indicate upgoing O FDM symbol indicated by the SFI,;
If the terminal device descrambles successfully the CRC of the first message using the 3rd RNTI, described first
It is for based on unauthorized transmission that message, which is used to indicate upgoing O FDM symbol indicated by the SFI,.
Optionally, the receiving unit 1110 is also used to receive the third instruction message that the network equipment is sent, described
Third instruction message is used to indicate the terminal device and detects the control set of first resource used in the first message
CORESET or the 2nd CORESET;
Wherein, the receiving unit 1110 is specifically used for:
If the terminal device receives the first message in the first CORESET, the first message is used for
Indicate that upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization;
If the terminal device receives the first message in the 2nd CORESET, the first message is used for
Indicate that upgoing O FDM symbol indicated by the SFI is for based on unauthorized transmission.
Optionally, which is characterized in that the receiving unit 1110 can be also used for receiving the instruction letter that the network equipment is sent
Breath, the instruction information are used to indicate in the OFDM symbol that can be used for uplink indicated by the SFI at least partly
OFDM symbol is used for based on unauthorized transmission.
It should be noted that receiving unit 1110 can be realized by transceiver in the embodiment of the present invention, processing unit 1120 can be by
Processor is realized.As shown in figure 12, communication device 1200 may include processor 1210, memory 1220 and transceiver 1230.
Wherein, memory 1220 can be used for the code etc. of the execution of storage processor 1210, processor 1210 can be used for data or
Program is handled.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor 1210
Or the instruction of software form is completed.The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly at hardware
Reason device executes completion, or in processor hardware and software module combine and execute completion.Software module can be located at random
Memory, flash memory, read-only memory, the abilities such as programmable read only memory or electrically erasable programmable memory, register
In the storage medium of domain maturation.The storage medium is located at memory 1220, and processor 1210 reads the information in memory 1220,
The step of completing the above method in conjunction with its hardware.To avoid repeating, it is not detailed herein.
Communication device 1200 shown in communication device 1100 or Figure 12 shown in Figure 11 can be realized preceding method embodiment
Each process of counterpart terminal equipment, specifically, the communication device 1100 or communication device 1200 may refer to retouching above
It states, to avoid repeating, which is not described herein again.
Figure 13 shows a kind of schematic block diagram of communication device 1300 provided by the embodiments of the present application.Device 1300 includes
Determination unit 1310 and transmission unit 1320.
Determination unit 1310 is for determining for the configuration information based on unauthorized transmission, when including in the configuration information
Gap format related information SFI, wherein the SFI is at least used to indicate in time slot for upstream or downstream or unknown orthogonal frequency
Divide multiplexing OFDM symbol.
Transmission unit 1320 is used to send the configuration information to the terminal device.
It optionally, further include instruction information in the configuration information, the instruction information is used to indicate indicated by the SFI
The OFDM symbol that can be used for uplink at least partly OFDM symbol be used for based on unauthorized transmission.
Optionally, the transmission unit 1320 is specifically used for passing through radio resource control RRC signaling to the terminal device
Send the configuration information.
It should be noted that determination unit 1310 can be realized by processor in the embodiment of the present invention, transmission unit 1320 can be by
Transceiver is realized.As shown in figure 14, communication device 1400 may include processor 1410, memory 1420 and transceiver 1430.
Wherein, memory 1420 can be used for the code etc. of the execution of storage processor 1410, and processor 910 can be used for data or journey
Sequence is handled.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor 1410
Or the instruction of software form is completed.The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly at hardware
Reason device executes completion, or in processor hardware and software module combine and execute completion.Software module can be located at random
Memory, flash memory, read-only memory, the abilities such as programmable read only memory or electrically erasable programmable memory, register
In the storage medium of domain maturation.The storage medium is located at memory 1420, and processor 1410 reads the information in memory 1420,
The step of completing the above method in conjunction with its hardware.To avoid repeating, it is not detailed herein.
Communication device 1400 shown in communication device 1300 or Figure 14 shown in Figure 13 can be realized preceding method embodiment
Each process of counterpart terminal equipment, specifically, the communication device 1300 or communication device 1400 may refer to retouching above
It states, to avoid repeating, which is not described herein again.
Figure 15 shows a kind of schematic block diagram of communication device 1500 provided by the embodiments of the present application.Device 1500 includes
Receiving unit 1510 and transmission unit 1520.
Receiving unit 1510 is used to receive the configuration information based on unauthorized transmission that is used for of network equipment transmission, described to match
It include time slot format relevant information SFI in confidence breath, wherein the SFI is at least used to indicate in time slot for upstream or downstream
Or unknown orthogonal frequency division multiplex OFDM symbol;
Transmission unit 1520 is used to send upstream data to the network equipment according to the SFI.
It optionally, further include instruction information in the configuration information, the instruction information is used to indicate indicated by the SFI
The OFDM symbol that can be used for uplink at least partly OFDM symbol be used for based on unauthorized transmission.
Optionally, the receiving unit 1510 is specifically used for setting by the radio resource control RRC signaling reception network
The configuration information that preparation is sent.
It should be noted that receiving unit 1510 and transmission unit 1520 can be realized by transceiver in the embodiment of the present invention.Such as figure
Shown in 16, communication device 1600 may include processor 1610, memory 1620 and transceiver 1630.Wherein, memory 1620
It can be used for the code etc. of the execution of storage processor 1610, processor 1610 can be used for handling data or program.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor 1610
Or the instruction of software form is completed.The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly at hardware
Reason device executes completion, or in processor hardware and software module combine and execute completion.Software module can be located at random
Memory, flash memory, read-only memory, the abilities such as programmable read only memory or electrically erasable programmable memory, register
In the storage medium of domain maturation.The storage medium is located at memory 1620, and processor 1610 reads the information in memory 1620,
The step of completing the above method in conjunction with its hardware.To avoid repeating, it is not detailed herein.
Communication device 1600 shown in communication device 1500 or Figure 16 shown in figure 15 can be realized preceding method embodiment
Each process of counterpart terminal equipment, specifically, the communication device 1500 or communication device 1600 may refer to retouching above
It states, to avoid repeating, which is not described herein again.
The embodiment of the present application also provides a kind of computer-readable mediums, for storing computer program, the computer journey
Sequence includes the instruction for executing terminal device or the corresponding method of the network equipment in above method embodiment.
The embodiment of the present application also provides a kind of computer program product, the computer program product includes: computer
Program code, when the computer program code is by the communication unit of communication equipment (for example, terminal device or network equipment), place
When managing unit or transceiver, processor operation, so that communication equipment executes terminal device or network in above-mentioned embodiment of the method
The corresponding method of equipment.
The embodiment of the present application also provides a kind of communication chips, wherein instruction is stored with, when it runs on the communication device
When, so that the communication chip executes terminal device or the corresponding method of the network equipment in above method embodiment.
Each embodiment in the application independent can use, and can also be used in combination, here without limitation.
It should be understood that the first, second equal description occurred in the embodiment of the present application, only make signal with distinguish description object it
With, without order point, do not indicate to be particularly limited to equipment number in the embodiment of the present application yet, cannot constitute to the application reality
Apply any restrictions of example.
It should also be understood that magnitude of the sequence numbers of the above procedures are not meant to execute in the various embodiments of the application
Sequence it is successive, the execution of each process sequence should be determined by its function and internal logic, the reality without coping with the embodiment of the present application
It applies process and constitutes any restriction.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
Scope of the present application.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, institute it is explicit or
The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit
It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component of formula may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), arbitrary access are deposited
The various media that can store program code such as reservoir (Random Access Memory, RAM), magnetic or disk.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any
Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain
Lid is within the scope of protection of this application.Therefore, the protection scope of the application should be based on the protection scope of the described claims.
Claims (26)
1. a kind of communication means characterized by comprising
The network equipment determines that first message, the first message include time slot format relevant information SFI, wherein the SFI is used for
It indicates to be used for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol in time slot, and working as includes uplink in the time slot
When OFDM symbol, the first message is also used to indicate that upgoing O FDM symbol indicated by the SFI is for based on authorization
It transmits or for based on unauthorized transmission;
The network equipment sends the first message to terminal device.
2. described the method according to claim 1, wherein further include the first indicating bit in the first message
It is for the transmission based on authorization or for based on non-that first indicating bit, which is used to indicate upgoing O FDM symbol indicated by the SFI,
The transmission of authorization.
3. according to the method described in claim 2, it is characterized in that, before the network equipment determines first message, further includes:
The network equipment sends the first instruction message to the terminal device, and first instruction message is used to indicate the end
End equipment detects the first radio network temporary identifier RNTI used in the first message;
Wherein, the network equipment sends the first message to terminal device, comprising:
The network equipment scrambles the cyclic redundancy check (CRC) of the first message using the first RNTI, and to
The terminal device sends the first message after scrambling.
4. the method according to claim 1, wherein before the network equipment determines first message, further includes:
The network equipment sends the second instruction message to the terminal device, and second instruction message is used to indicate the end
End equipment detects the 2nd RNTI or the 3rd RNTI used in the first message;
Wherein, the network equipment sends the first message to terminal device, comprising:
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for the transmission based on authorization,
The network equipment scrambles the CRC of the first message using the 2nd RNTI, and sends to the terminal device
The first message after scrambling;
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for based on unauthorized transmission,
Then the network equipment scrambles the CRC of the first message using the 3rd RNTI, and sends out to the terminal device
The first message after sending scrambling.
5. the method according to claim 1, wherein before the network equipment determines first message, further includes:
The network equipment sends third instruction message to the terminal device, and the third instruction message is used to indicate the end
End equipment detects first resource used in the first message and controls set CORESET or the 2nd CORESET;
Wherein, the network equipment sends the first message to terminal device, comprising:
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for the transmission based on authorization,
The network equipment issues the first message to the terminal device in the first CORESET;
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for based on unauthorized transmission,
Then the network equipment issues the first message to the terminal device in the 2nd CORESET.
6. method according to claim 1-5, which is characterized in that further include:
The network equipment sends instruction information to the terminal device, and the instruction information is used to indicate indicated by the SFI
The OFDM symbol that can be used for uplink at least partly OFDM symbol be used for based on unauthorized transmission.
7. method according to claim 1-6, which is characterized in that the network equipment sends institute to terminal device
Stating first message includes:
The network equipment sends the first message to the terminal device by radio resource control RRC signaling;Or
The network equipment sends the first message to the terminal device by physical control message.
8. a kind of communication means characterized by comprising
Terminal device receives the first message that the network equipment is sent, and the first message includes time slot format relevant information SFI,
In, the SFI is used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, and when described
When including upgoing O FDM symbol in time slot, the first message is also used to indicate that upgoing O FDM symbol indicated by the SFI is
For the transmission based on authorization or for based on unauthorized transmission;
The terminal device receives downlink data according to the first message, or sends upstream data.
9. described according to the method described in claim 8, it is characterized in that, further include the first indicating bit in the first message
It is for the transmission based on authorization or for based on non-that first indicating bit, which is used to indicate upgoing O FDM symbol indicated by the SFI,
The transmission of authorization.
10. according to the method described in claim 9, it is characterized in that, the terminal device receives the network equipment is sent first
Before message, further includes:
The terminal device receives the first instruction information that the network equipment is sent, and the first instruction information is used to indicate institute
It states terminal device and detects the first radio network temporary identifier RNTI used in the first message;
Wherein, the terminal device receives the first message that the network equipment is sent, comprising:
The terminal device descrambles the CRC of the first message according to the first RNTI, is disappeared with obtaining described first
The entrained information of breath.
11. according to the method described in claim 8, it is characterized in that, also being wrapped before terminal device reception first message
It includes:
The terminal device receives the second instruction message that the network equipment is sent, and second instruction message is used to indicate institute
It states terminal device and detects the 2nd RNTI or the 3rd RNTI used in the first message;
Wherein, the terminal device receives the first message that the network equipment is sent, comprising:
If the terminal device descrambles successfully the CRC of the first message using the 2nd RNTI, the first message
Being used to indicate upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization;
If the terminal device descrambles successfully the CRC of the first message using the 3rd RNTI, the first message
Being used to indicate upgoing O FDM symbol indicated by the SFI is for based on unauthorized transmission.
12. according to the method described in claim 8, it is characterized in that, also being wrapped before terminal device reception first message
It includes:
The terminal device receives the third instruction message that the network equipment is sent, and the third instruction message is used to indicate institute
It states terminal device and detects the control of first resource used in first message set CORESET or the 2nd CORESET;
Wherein, the terminal device receives the first message that the network equipment is sent, comprising:
If the terminal device receives the first message in the first CORESET, the first message is used to indicate
Upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization;
If the terminal device receives the first message in the 2nd CORESET, the first message is used to indicate
Upgoing O FDM symbol indicated by the SFI is for based on unauthorized transmission.
13. according to the described in any item methods of claim 8-12, which is characterized in that further include:
The terminal device receives the instruction information that the network equipment is sent, and the instruction information is used to indicate the SFI institute
At least partly OFDM symbol in the OFDM symbol that can be used for uplink indicated is used for based on unauthorized transmission.
14. a kind of communication device characterized by comprising
Determination unit, for determining that first message, the first message include time slot format relevant information SFI, wherein described
SFI is used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, and when in the time slot
When including upgoing O FDM symbol, the first message is also used to indicate that upgoing O FDM symbol indicated by the SFI is for base
In the transmission of authorization or for based on unauthorized transmission;
Transmission unit, for sending the first message to terminal device.
15. device according to claim 14, which is characterized in that further include the first indicating bit, institute in the first message
Stating the first indicating bit and being used to indicate upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization or for being based on
Unauthorized transmission.
16. device according to claim 15, which is characterized in that the transmission unit is also used to send out to the terminal device
Send the first instruction message, first instruction message is used to indicate the terminal device and detects used in the first message the
One radio network temporary identifier RNTI;
Wherein, transmission unit is specifically used for carrying out using cyclic redundancy check (CRC) of the first RNTI to the first message
Scrambling, and the first message after scrambling is sent to the terminal device.
17. device according to claim 14, which is characterized in that the transmission unit is also used to send out to the terminal device
Send the second instruction message, second instruction message is used to indicate the terminal device and detects used in the first message the
Two RNTI or the 3rd RNTI;
Wherein, the transmission unit is specifically used for:
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for the transmission based on authorization,
The network equipment scrambles the CRC of the first message using the 2nd RNTI, and sends to the terminal device
The first message after scrambling;
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for based on unauthorized transmission,
Then the network equipment scrambles the CRC of the first message using the 3rd RNTI, and sends out to the terminal device
The first message after sending scrambling.
18. device according to claim 14, which is characterized in that the transmission unit is also used to send out to the terminal device
Send third instruction message, the third instruction message is used to indicate the terminal device and detects used in the first message the
One resources control set CORESET or the 2nd CORESET;
Wherein, the transmission unit is specifically used for:
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for the transmission based on authorization,
The network equipment issues the first message to the terminal device in the first CORESET;
If the first message be used to indicate upgoing O FDM symbol indicated by the SFI be for based on unauthorized transmission,
Then the network equipment issues the first message to the terminal device in the 2nd CORESET.
19. the described in any item devices of 4-18 according to claim 1, which is characterized in that the transmission unit is also used to described
Terminal device sends instruction information, and the instruction information is used to indicate the OFDM that can be used for uplink indicated by the SFI
At least partly OFDM symbol in symbol is used for based on unauthorized transmission.
20. the described in any item methods of 4-19 according to claim 1, which is characterized in that the transmission unit is specifically used for passing through
Radio resource control RRC signaling sends the first message to the terminal device;Or pass through physical control message to the end
End equipment sends the first message.
21. a kind of communication device characterized by comprising
Receiving unit, for receiving the first message of network equipment transmission, the first message includes time slot format relevant information
SFI, wherein the SFI is used to indicate in time slot for upstream or downstream or unknown orthogonal frequency division multiplex OFDM symbol, and
When in the time slot including upgoing O FDM symbol, the first message is also used to indicate upgoing O FDM indicated by the SFI
Symbol is for the transmission based on authorization or for based on unauthorized transmission;
Processing unit, for receiving downlink data, or transmission upstream data according to the first message.
22. device according to claim 21, which is characterized in that further include the first indicating bit, institute in the first message
Stating the first indicating bit and being used to indicate upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization or for being based on
Unauthorized transmission.
23. device according to claim 22, which is characterized in that the receiving unit is also used to receive the network equipment
The the first instruction information sent, the first instruction information are used to indicate the terminal device detection first message and are used
The first radio network temporary identifier RNTI;
Wherein, the receiving unit is specifically used for descrambling the CRC of the first message according to the first RNTI, to obtain
Take information entrained by the first message.
24. device according to claim 21, which is characterized in that the receiving unit is also used to receive the network equipment
The second instruction message sent, second instruction message are used to indicate the terminal device detection first message and are used
The 2nd RNTI or the 3rd RNTI;
Wherein, the receiving unit is specifically used for:
If the terminal device descrambles successfully the CRC of the first message using the 2nd RNTI, the first message
Being used to indicate upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization;
If the terminal device descrambles successfully the CRC of the first message using the 3rd RNTI, the first message
Being used to indicate upgoing O FDM symbol indicated by the SFI is for based on unauthorized transmission.
25. device according to claim 21, which is characterized in that the receiving unit is also used to receive the network equipment
The third instruction message of transmission, the third instruction message are used to indicate the terminal device detection first message and are used
First resource control set CORESET or the 2nd CORESET;
Wherein, the receiving unit is specifically used for:
If the terminal device receives the first message in the first CORESET, the first message is used to indicate
Upgoing O FDM symbol indicated by the SFI is for the transmission based on authorization;
If the terminal device receives the first message in the 2nd CORESET, the first message is used to indicate
Upgoing O FDM symbol indicated by the SFI is for based on unauthorized transmission.
26. according to the described in any item devices of claim 21-25, which is characterized in that the receiving unit is also used to receive institute
The instruction information of network equipment transmission is stated, the instruction information, which is used to indicate indicated by the SFI, can be used for uplink
At least partly OFDM symbol in OFDM symbol is used for based on unauthorized transmission.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2017110011152 | 2017-10-24 | ||
CN201711001115 | 2017-10-24 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109698738A true CN109698738A (en) | 2019-04-30 |
CN109698738B CN109698738B (en) | 2022-04-29 |
Family
ID=66229600
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711243045.1A Active CN109698738B (en) | 2017-10-24 | 2017-11-30 | Communication method and communication device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109698738B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112153672A (en) * | 2019-06-29 | 2020-12-29 | 华为技术有限公司 | Resource allocation method and device |
CN112566146A (en) * | 2019-09-25 | 2021-03-26 | 维沃移动通信有限公司 | Uplink transmission method and terminal |
CN114208099A (en) * | 2019-08-14 | 2022-03-18 | 索尼集团公司 | OFDM-based wireless communication using flexible resources |
CN114342509A (en) * | 2019-11-19 | 2022-04-12 | Oppo广东移动通信有限公司 | Time domain resource determination method and device and terminal equipment |
CN116261220A (en) * | 2020-07-31 | 2023-06-13 | Oppo广东移动通信有限公司 | CG configuration method, device, equipment and medium |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102084596A (en) * | 2008-04-30 | 2011-06-01 | 摩托罗拉移动公司 | Multi-antenna configuration signaling in wireless communication system |
US20140073312A1 (en) * | 2011-12-12 | 2014-03-13 | Broadcom Corporation | Enhanced Discontinuous Mode Operation with Shared Radio Frequency Resources |
CN104038920A (en) * | 2013-03-08 | 2014-09-10 | 电信科学技术研究院 | Data transmission method, system and device |
CN104363975A (en) * | 2013-03-14 | 2015-02-18 | 华为技术有限公司 | Method, apparatus and equipment for configuring downlink dedicated physical channel (DPCH) slot format |
CN104540230A (en) * | 2015-01-30 | 2015-04-22 | 深圳酷派技术有限公司 | Uplink scheduling method and uplink scheduling device |
CN104683081A (en) * | 2013-12-02 | 2015-06-03 | 中国移动通信集团公司 | Carrier aggregation method, and capability information reporting method and device |
CN104735768A (en) * | 2013-12-20 | 2015-06-24 | 华为技术有限公司 | Power control optimization processing method and device |
CN104995980A (en) * | 2013-03-27 | 2015-10-21 | 夏普株式会社 | Terminal device, base station device, communications method, and integrated circuit |
CN105338640A (en) * | 2015-09-25 | 2016-02-17 | 宇龙计算机通信科技(深圳)有限公司 | Data transmission method and device based on uplink multiplexing |
CN105451358A (en) * | 2014-08-27 | 2016-03-30 | 中国移动通信集团公司 | Uplink transmission method, base station and terminal |
CN105517061A (en) * | 2016-01-15 | 2016-04-20 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for indicating uplink subframes on unauthorized frequency spectrum |
CN105792362A (en) * | 2014-12-22 | 2016-07-20 | 上海贝尔股份有限公司 | Wireless resource allocation method |
CN106358203A (en) * | 2016-08-30 | 2017-01-25 | 湖南大学 | Method for spectrum allocation in distributed cognition wireless sensor network on basis of Q study |
US20170041805A1 (en) * | 2015-08-07 | 2017-02-09 | Cisco Technology, Inc. | Uplink channel access, reservation and data transmission for licensed assist access long term evolution (laa-lte) |
CN106507497A (en) * | 2015-09-08 | 2017-03-15 | 华为技术有限公司 | For the method for transmitting uplink data, terminal unit and the network equipment |
CN106559795A (en) * | 2015-09-25 | 2017-04-05 | 中兴通讯股份有限公司 | A kind of method of determination LBT patterns, device and the method for realizing LBT pattern switchings |
CN107211441A (en) * | 2015-01-30 | 2017-09-26 | 英特尔Ip公司 | For the uplink scheduling for the access for permitting auxiliary |
CN107210871A (en) * | 2015-02-06 | 2017-09-26 | 苹果公司 | Method and apparatus for carrying out time-division LTE transmission in unauthorized radio frequency band |
-
2017
- 2017-11-30 CN CN201711243045.1A patent/CN109698738B/en active Active
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102084596A (en) * | 2008-04-30 | 2011-06-01 | 摩托罗拉移动公司 | Multi-antenna configuration signaling in wireless communication system |
US20140073312A1 (en) * | 2011-12-12 | 2014-03-13 | Broadcom Corporation | Enhanced Discontinuous Mode Operation with Shared Radio Frequency Resources |
CN104038920A (en) * | 2013-03-08 | 2014-09-10 | 电信科学技术研究院 | Data transmission method, system and device |
CN104363975A (en) * | 2013-03-14 | 2015-02-18 | 华为技术有限公司 | Method, apparatus and equipment for configuring downlink dedicated physical channel (DPCH) slot format |
CN104995980A (en) * | 2013-03-27 | 2015-10-21 | 夏普株式会社 | Terminal device, base station device, communications method, and integrated circuit |
CN104683081A (en) * | 2013-12-02 | 2015-06-03 | 中国移动通信集团公司 | Carrier aggregation method, and capability information reporting method and device |
CN104735768A (en) * | 2013-12-20 | 2015-06-24 | 华为技术有限公司 | Power control optimization processing method and device |
CN105451358A (en) * | 2014-08-27 | 2016-03-30 | 中国移动通信集团公司 | Uplink transmission method, base station and terminal |
CN105792362A (en) * | 2014-12-22 | 2016-07-20 | 上海贝尔股份有限公司 | Wireless resource allocation method |
CN104540230A (en) * | 2015-01-30 | 2015-04-22 | 深圳酷派技术有限公司 | Uplink scheduling method and uplink scheduling device |
CN107211441A (en) * | 2015-01-30 | 2017-09-26 | 英特尔Ip公司 | For the uplink scheduling for the access for permitting auxiliary |
CN107210871A (en) * | 2015-02-06 | 2017-09-26 | 苹果公司 | Method and apparatus for carrying out time-division LTE transmission in unauthorized radio frequency band |
US20170041805A1 (en) * | 2015-08-07 | 2017-02-09 | Cisco Technology, Inc. | Uplink channel access, reservation and data transmission for licensed assist access long term evolution (laa-lte) |
CN106507497A (en) * | 2015-09-08 | 2017-03-15 | 华为技术有限公司 | For the method for transmitting uplink data, terminal unit and the network equipment |
CN105338640A (en) * | 2015-09-25 | 2016-02-17 | 宇龙计算机通信科技(深圳)有限公司 | Data transmission method and device based on uplink multiplexing |
CN106559795A (en) * | 2015-09-25 | 2017-04-05 | 中兴通讯股份有限公司 | A kind of method of determination LBT patterns, device and the method for realizing LBT pattern switchings |
CN105517061A (en) * | 2016-01-15 | 2016-04-20 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for indicating uplink subframes on unauthorized frequency spectrum |
CN106358203A (en) * | 2016-08-30 | 2017-01-25 | 湖南大学 | Method for spectrum allocation in distributed cognition wireless sensor network on basis of Q study |
Non-Patent Citations (10)
Title |
---|
CATT: "Remaining details of pre-emption indication", 《3GPP TSG RAN WG1 MEETING #90BIS》 * |
COLM BROWNING ET AL.: "60 GHz 5G Radio-Over-Fiber Using UF-OFDM With Optical Heterodyning", 《IEEE PHOTONICS TECHNOLOGY LETTERS》 * |
HUAWEI, HISILICON: "Remaining details on group-common PDCCH", 《3GPP TSG RAN WG1 MEETING 90BIS》 * |
HUAWEI, HISILICON: "Remaining details on group-common PDCCH", 《3GPP TSG RAN WG1 MEETING AH_NR#3》 * |
INTEL CORPORATION: "UL data transmission procedures in NR", 《3GPP TSG RAN WG1 MEETING 90BIS》 * |
INTEL CORPORATION: "UL data transmission procedures in NR", 《3GPP TSG RAN WG1 MEETING NR#3》 * |
NTT DOCOMO, INC.: "Email discussions on UL transmission procedures", 《3GPP TSG RAN WG1 MEETING 90BIS 》 * |
SHAOMIN WANG,BIN ZHOU: "5G-oriented information sharing mechanism within D2D clusters", 《TELECOMMUNICATIONS SCIENCE》 * |
VIVO: "Design of group-common PDCCH", 《3GPP TSG RAN WG1 NR ADHOC#3》 * |
陈宁宇: "面向LTE-advanced系统的small cell关键技术研究", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112153672A (en) * | 2019-06-29 | 2020-12-29 | 华为技术有限公司 | Resource allocation method and device |
CN114208099A (en) * | 2019-08-14 | 2022-03-18 | 索尼集团公司 | OFDM-based wireless communication using flexible resources |
CN112566146A (en) * | 2019-09-25 | 2021-03-26 | 维沃移动通信有限公司 | Uplink transmission method and terminal |
WO2021057896A1 (en) * | 2019-09-25 | 2021-04-01 | 维沃移动通信有限公司 | Uplink transmission method and terminal |
CN112566146B (en) * | 2019-09-25 | 2022-04-12 | 维沃移动通信有限公司 | Uplink transmission method and terminal |
JP2022549676A (en) * | 2019-09-25 | 2022-11-28 | 維沃移動通信有限公司 | Uplink transmission method and terminal |
JP7293505B2 (en) | 2019-09-25 | 2023-06-19 | 維沃移動通信有限公司 | Uplink transmission method and terminal |
CN114342509A (en) * | 2019-11-19 | 2022-04-12 | Oppo广东移动通信有限公司 | Time domain resource determination method and device and terminal equipment |
CN116261220A (en) * | 2020-07-31 | 2023-06-13 | Oppo广东移动通信有限公司 | CG configuration method, device, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN109698738B (en) | 2022-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11483820B2 (en) | Data transmission method, terminal device, and network device | |
CN106301737B (en) | Changing rate matching patterns in the presence of channel state information reference signal transmissions | |
US11071149B2 (en) | Multefire design of random access channel and random access channel procedure for Internet of Things device operation in unlicensed spectrum | |
US20190334680A1 (en) | Resource Indication Method, User Equipment, and Network Device | |
US11343835B2 (en) | Method for transmitting data, terminal device and network device | |
EP3522476B1 (en) | Method and apparatus for configuring reference signal | |
JP5852100B2 (en) | Method and apparatus for assigning terminal identifier (STID) in wireless connection system | |
CN109698738A (en) | Communication means and communication device | |
US20220256613A1 (en) | Method of configuring uplink grant-free transmission and device thereof | |
EP3641454B1 (en) | Communication methods, network device, terminal device, computer readable storage medium and computer program product | |
CN113595699A (en) | PDCCH design for narrowband deployment | |
KR102117572B1 (en) | Method and apparatus for transmitting physical downlink control channel | |
CN109644172A (en) | Transmit method, terminal device and the network equipment of upstream data | |
CN115134927A (en) | Communication method, device and system | |
CN110719648B (en) | Information sending method, information receiving method and device | |
CN109672506B (en) | Data transmission confirmation method and equipment | |
EP3637818B1 (en) | Signal sending and receiving method and device | |
WO2020063482A1 (en) | Method and device for transmitting random access signals | |
CN109076034A (en) | Information transferring method and device | |
EP3761585A1 (en) | Data transmission method and apparatus | |
CN113840386B (en) | Method for transmitting data, terminal device and network device | |
CN112600655A (en) | Method for transmitting information, network device, terminal device and computer readable medium | |
CN107027191B (en) | Handle the device and method of Non-Access Stratum control program | |
CN109417781B (en) | Method for transmitting data, network device, terminal device and readable storage medium | |
WO2018006741A1 (en) | Signal transmission method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |