WO2019105330A1 - Procédé d'identification d'équipement utilisateur dans une transmission sans autorisation, appareil, dispositif et système - Google Patents
Procédé d'identification d'équipement utilisateur dans une transmission sans autorisation, appareil, dispositif et système Download PDFInfo
- Publication number
- WO2019105330A1 WO2019105330A1 PCT/CN2018/117549 CN2018117549W WO2019105330A1 WO 2019105330 A1 WO2019105330 A1 WO 2019105330A1 CN 2018117549 W CN2018117549 W CN 2018117549W WO 2019105330 A1 WO2019105330 A1 WO 2019105330A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- dmrs
- user equipment
- resource
- message
- network device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
Definitions
- the present application relates to the field of communications technologies, and in particular, to a method, device, device, and system for identifying a user equipment in an unauthorized transmission.
- a traditional base station supports a limited number of connections and is easy to implement.
- eNodeB 4G base station
- 5G base station 5G base station
- gNodeB 5G base station
- next-generation mobile communication system will not only support traditional communication, but also support massive machine type communication (mMTC) and Ultra-Reliable and Low Latency Communications (URLLC) to meet different services. Demand.
- mMTC massive machine type communication
- URLLC Ultra-Reliable and Low Latency Communications
- V2V vehicle to vehicle
- the UE may first send a Scheduling Request (SR) command to notify the base station of the amount of data to be transmitted.
- SR Scheduling Request
- the base station After receiving the SR command, the base station sends the first uplink scheduling message to the UE; the UE sends a Buffer Status Report (BSR) according to the first uplink scheduling message, such as the expected data transmission amount; and then, the base station according to the BSR
- BSR Buffer Status Report
- the second uplink scheduling message is sent to the UE, and then the UE can send the uplink data according to the indication of the second uplink scheduling message.
- This transmission method is a transmission method based on Grant-based (also referred to as UL Transmission with grant).
- the UE may have a delay of more than 10 ms from the time the SR command is sent to actually send the uplink data. For future network systems, such delay cannot meet the low delay requirement.
- next-generation wireless communication networks introduce non-authorization (Grant-free, also known as Grantless, or Grant-less, or UL Transmission without grant, or configuration).
- the transmission method of the configured (autonomous UL transmission, etc.) that is, the base station first divides one or more pieces of resources for unauthorized transmission for the UE (Grant-free resources, which may also be called GFRC, Grant) -free resource, Grantless resource, resource for UL transmission without grant, etc., because the resource used for unauthorized transmission uses Physical UL Shared Channel (PUSCH) resources, so
- the resources for unlicensed transmission may also be referred to as GF-PUSCH resources, that is, physical uplink shared channels that can be used for unlicensed transmission.
- the UE directly sends the uplink data (such as the uplink Grant-free data) in the resource for the unlicensed transmission, and does not need to go through the uplink authorization process that the UE sends the SR command to the base station to send the uplink scheduling message to the UE. Therefore, it has great advantages in network delay and signaling overhead.
- the base station in the NR can also configure multiple resources for unlicensed transmission for the UE. As shown in FIG. 1 , the base station can allocate different unlicensed transmission resources, such as GFRC1 and GFRC2, to the UE in the frequency domain. Different business needs, while blanks can be used for authorized transfers. In FIG.
- the MCS may indicate a transmission rate (including a modulation order and the like) used by a UE configured by the base station to the UE to transmit uplink data in the corresponding unlicensed transmission resource, and a Transmission Block Size (TBS) 1 may be used.
- TBS Transmission Block Size
- the TBS2 may indicate the size of the uplink data sent by the UE configured by the base station to the UE in GFRC2.
- the time-frequency domain resources (depending on MCS and TBS) actually used by the UE in GFRC1 and GFRC2 may be smaller than the time-frequency domain resources of GFRC1 and GFRC2.
- the DMRS parameter 1 corresponds to UE1.
- DMRS parameter 2 corresponds to UE2, and so on.
- the DMRS is sent to the base station in the DMRS resource region to which the uplink data is mapped, to help the base station demodulate the uplink data sent by the UE.
- the UE generates a DMRS using DMRS parameters.
- the total number of DMRS parameters is limited, and the theoretical upper limit is 12, that is, at most one of the Grant-free resources carries 12 UEs that correspond one-to-one with the DMRS parameters.
- the number of DMRS parameters actually available in a Grant-free resource is usually less than 12, such as 4 or 6.
- the present application provides a method, an apparatus, a device, and a system for identifying a user equipment in an unauthorized transmission, which are used to increase the number of UEs that can be carried in a Grant-free resource.
- the embodiment of the present application provides a method for identifying a user equipment in an unauthorized transmission, including any of the following 1-5 embodiments;
- the embodiment of the present application provides another communication method for identifying a user equipment in an unauthorized transmission, including any of the following 6-10 embodiments;
- the embodiment of the present application provides another method for identifying a user equipment in an unauthorized transmission, including any of the following 11-21 embodiments;
- the embodiment of the present application provides another method for identifying a user equipment in an unauthorized transmission, including any of the following 22-32 embodiments;
- the embodiment of the present application provides a network device, including any of the following 33-37;
- the embodiment of the present application provides a first user equipment, including any of the following 38-42 embodiments;
- the embodiment of the present application provides another network device, including any of the following 43-53;
- the embodiment of the present application provides another first user equipment, including any of the following 54-64 embodiments;
- the embodiment of the present application provides another network device, including any one of the following 65-69;
- the embodiment of the present application provides another first user equipment, including any one of the following 70-74;
- the embodiment of the present application provides another network device, including any one of the following 75-85;
- the embodiment of the present application provides another first user equipment, including any of the following 86-96 embodiments;
- the embodiment of the present application provides an apparatus, including any of the following 97-99 embodiments;
- the embodiment of the present application provides another apparatus, including any one of the following 100-102;
- the embodiment of the present application provides another apparatus, including any one of the following 103-105;
- the embodiment of the present application provides another apparatus, including any of the following 106-108;
- the embodiment of the present application provides a communication system, including any one of the following 109-111;
- the embodiment of the present application provides a computer readable storage medium, including the following embodiment 112;
- the embodiment of the present application provides a computer program product, including the following embodiment 113.
- a method of identifying a user equipment in an unauthorized transmission comprising:
- the network device receives the K first message repeatedly transmitted by the first user equipment on the resource for unauthorized transmission at the L, and the demodulation reference signal DMRS corresponding to the sent K first message respectively;
- the DMRS is The first user equipment is generated according to the first DMRS parameter set corresponding to the first user equipment, where the first DMRS parameter set indicates that the first user equipment performs repeated transmission on the resources at the L.
- DMRS parameters respectively used by the DMRS are generated on the resource, and each DMRS parameter corresponds to one resource in the L resource, where the frequency of each resource in the L is different, and L is greater than An integer of 1, K is an integer greater than or equal to L;
- the network device parses the received DMRS corresponding to the K first messages, and parses out the DMRS parameters corresponding to the K first messages respectively;
- the network device identifies, according to the parsed DMRS parameter, the correspondence between the first user equipment and the first DMRS parameter set, that the user equipment that sends the first message is the first user equipment.
- the network device parses the DMRS corresponding to the K consecutive messages transmitted by the first user equipment at the L for the unlicensed transmission, and parses the K first message.
- the user equipment is identified according to the DMRS parameter corresponding to the DMRS received on each resource at the L, and the DMRS parameter corresponding to the DMRS received on only one resource is used to identify the one-to-one correspondence with the DMRS parameter.
- the number of user equipments that can be identified is increased, thereby increasing the number of user equipments carried in resources for unauthorized transmission.
- the parameter value of the DMRS parameter can take any one of four possible values of “1”, “2”, “3”, and “4”, and L is equal to 2
- the prior art adopts different
- the network device Before receiving the DMRS corresponding to the K first messages, the network device further includes:
- the network device sends a second message to the first user equipment, where the second message indicates the first DMRS parameter set corresponding to the first user equipment.
- the network device sends a second message indicating the first DMRS parameter set to the user equipment, and the first DMRS parameter set is configured by the network device to the user equipment.
- the second message is a main information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, and a minimum remaining system information.
- RMSI or other system information OSI is a main information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, and a minimum remaining system information.
- RMSI or other system information OSI.
- the user equipment is identified according to the DMRS parameter corresponding to the DMRS received on each resource at 2, and the DMRS parameter corresponding to the DMRS received on only one resource is used to identify and the DMRS parameter.
- the number of user equipments that can be identified is increased, thereby increasing the number of user equipments carried in resources for unauthorized transmission.
- a method of identifying a user equipment in an unauthorized transmission comprising:
- the first user equipment generates, according to the first demodulation reference signal DMRS parameter set corresponding to the first user equipment, a DMRS corresponding to each of the K first messages repeatedly transmitted on the resource for unauthorized transmission at L
- the first DMRS parameter set indicates the DMRS parameters respectively used by the first user equipment to generate DMRS on each resource when performing repeated transmission on the resource for unlicensed transmission at the L
- each DMRS parameter is One of the resources at the L corresponds to a resource, wherein the frequency of each resource at the L is different, L is an integer greater than 1, and K is an integer greater than or equal to L;
- the first user equipment repeatedly transmits the K first message to the network device and sends a DMRS corresponding to the K first message respectively on the resource at the L, where the K first message is sent
- the corresponding DMRS is used by the network device to identify that the user equipment that sends the first message is the first user equipment.
- the first user equipment generates DMRS parameters respectively used by the DMRS on each resource according to the repeated transmission on the resource indicating that the first user equipment is used for the resource for unauthorized transmission at the L.
- the first DMRS parameter set, the DMRS is generated, and the first user equipment repeatedly transmits the K first message to the network device and sends the DMRS corresponding to the K first message respectively on the resource at the L, so that the network device can
- the user equipment that sends the first message is identified according to the DMRS parameter corresponding to the DMRS received on each resource at the L, thereby increasing the number of user equipments carried in the resource for unauthorized transmission.
- the method before the first user equipment generates the DMRS corresponding to the K first messages according to the first DMRS parameter set, the method further includes:
- the first user equipment receives a second message sent by the network device, where the second message is used to indicate the first DMRS parameter set.
- the first user equipment receives the second message that is sent by the network device and indicates the first DMRS parameter set, and implements configuring, by the network device, the first DMRS parameter set to the user equipment.
- the second message is a main information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, and a minimum remaining system information.
- RMSI or other system information OSI is a main information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, and a minimum remaining system information.
- RMSI or other system information OSI.
- the first user equipment generates the DMRS separately used by the DMRS on each resource according to the repeated transmission on the resource for instructing the first user equipment to use the resource for unauthorized transmission at 2 a first DMRS parameter set of the parameter, generating a DMRS, and repeatedly transmitting the K first message to the network device at two resources and transmitting the DMRS corresponding to the K first message respectively, so that the network device is according to DMRS parameters corresponding to the DMRS received on each resource at the location, identifying the user equipment that sends the first message, and identifying the DMRS parameters corresponding to the DMRS parameters by using only the DMRS parameters corresponding to the DMRS received on one resource.
- the number of user equipments that can be identified is increased, thereby increasing the number of user equipments carried in resources for unauthorized transmission.
- a method of identifying a user equipment in an unauthorized transmission comprising:
- the L DMRSs are corresponding to the first message, and the L DMRSs are L DMRS parameters of the first user equipment according to the DMRS resources in the same time domain transmission unit Generating, each DMRS parameter of the L DMRS parameters is used by the first user equipment to generate a DMRS sent on a corresponding resource in the DMRS resource at the L, where L is an integer greater than 1;
- the network device identifies the user equipment that sends the first message according to the DMRS parameter corresponding to the DMRS received on each resource of the DMRS resource at the L, and implements each of the DMRS resources according to the L.
- the DMRS parameter corresponding to the DMRS received on the resource is used to identify the user equipment, and the number of user equipments that can be identified is improved compared with the user equipment that uses only one DMRS parameter to identify the one-to-one correspondence with the DMRS parameter, thereby improving the use.
- the network device receives a first message sent by a first user equipment in a same time domain transmission unit of resources for unauthorized transmission and in the same time domain transmission unit Before demodulating the L DMRSs transmitted on the reference signal DMRS resources at L, the method further includes:
- the network device sends M second messages to the first user equipment, where the M second messages correspond to the DMRS resources at the L; each second message corresponds to at least one of the DMRS resources at the L a DMRS resource, where the M second message is used to indicate that the first user equipment can separately use the DMRS parameter on each DMRS resource of the DMRS resource at the L, where M is greater than 0 and less than or equal to L. Integer.
- the network device sends, to the first user equipment, M second messages corresponding to the DMRS resources at the L, and each second message corresponds to at least one DMRS resource in the DMRS resources at the L, and implements the network device to the first A user equipment configures a first DMRS parameter set.
- M L
- the second message is implemented in one-to-one correspondence with the DMRS resources.
- the M pieces of second messages include L elements, and the L elements are in one-to-one correspondence with the DMRS resources at the L, among the L elements
- Each element indicates a DMRS parameter respectively used when generating a DMRS on the corresponding resource.
- the second message is: a primary information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, minimum remaining system information RMSI, or other system information OSI.
- the network device receives a first message sent by the first user equipment in a same time domain transmission unit of resources for unauthorized transmission and Before the L DMRSs sent on the DMRS resource of the demodulation reference signal in the L in the same time domain transmission unit, the method further includes:
- the network device sends a third message to the first user equipment, where the third message is used to instruct the first user equipment to generate the L DMRSs according to L DMRS parameters corresponding to the DMRS resources at the L. .
- the network device sends a third message to the first user equipment to instruct the first user equipment to generate the L DMRSs according to L DMRS parameters corresponding to the DMRS resources at the L, which can improve flexibility. Sex.
- the L DMRSs comprise one or more additional DMRSs (additional DMRSs).
- a method of identifying a user equipment in an unauthorized transmission comprising:
- the first user equipment generates, according to the L demodulation reference signal DMRS parameters, L DMRSs sent on L DMRS resources in the same time domain transmission unit in the resource for unauthorized transmission, the L DMRS parameters and Each of the DMRS parameters of the L DMRS parameters is used by the first user equipment to generate a DMRS separately sent on a corresponding resource in the DMRS resource at the L, where L is An integer greater than one;
- the first user equipment generates the L DMRS resources according to the L demodulation reference signal DMRS parameters corresponding to the DMRS resources in the same time domain transmission unit in the same time domain transmission unit as the resources for the unlicensed transmission. Transmitting the L DMRSs, and transmitting the first message to the network device in the same time domain transmission unit, and transmitting the L messages corresponding to the first message to the network device on the DMRS resource at the L.
- the DMRS is configured to enable the network device to identify the user equipment that sends the first message according to the DMRS parameter corresponding to the DMRS received on each resource of the DMRS resource at the L, and implement each resource according to the DMRS resource at the L.
- the DMRS parameters corresponding to the received DMRS are used to identify the user equipment, and the number of user equipments carried in the resources for unauthorized transmission is increased.
- L DMRS Before L DMRS, it also includes:
- the first user equipment receives M second messages sent by the network device, where the M second messages correspond to the DMRS resources at the L; each second message corresponds to at least one of the DMRS resources at the L a DMRS resource, where the M second message is used to indicate that the first user equipment can separately use the DMRS parameter on each DMRS resource of the DMRS resource at the L, where M is greater than 0 and less than or equal to L The integer.
- the first user equipment receives the M second messages corresponding to the DMRS resources of the L information sent by the network device, and each second message corresponds to at least one DMRS resource in the DMRS resources at the L, which is implemented by the network device.
- the first user equipment configures a first DMRS parameter set.
- M L
- the second message is implemented in one-to-one correspondence with the DMRS resources.
- the method further includes:
- the first user equipment receives a third message sent by the network device, where the third message is used to instruct the first user equipment to generate the foregoing according to L DMRS parameters that are in one-to-one correspondence with the DMRS resources at the L. L DMRSs.
- the first user equipment generates the L DMRSs according to the L DMRS parameters corresponding to the DMRS resources at the L according to the indication of the third message sent by the network device, so that the flexibility can be improved.
- the L DMRSs comprise one or more additional DMRSs (additional DMRSs).
- a network device comprising:
- a receiving unit configured to receive K first messages repeatedly transmitted by the first user equipment for resources for unauthorized transmission at the L, and demodulation reference signals DMRS respectively corresponding to the sent K first messages;
- the DMRS is generated by the first user equipment according to the first DMRS parameter set corresponding to the first user equipment, where the first DMRS parameter set indicates that the first user equipment performs repeated transmission on the resource at the L DMRS parameters respectively used by the DMRS are generated on each resource, and each DMRS parameter corresponds to one of the resources at the L, wherein the frequency of each resource at the L is different.
- L is an integer greater than 1
- K is an integer greater than or equal to L;
- a processing unit configured to parse the received DMRS corresponding to the K first messages, and parse the DMRS parameters corresponding to the K first messages respectively;
- the processing unit is further configured to identify, according to the parsed DMRS parameter, a correspondence between the first user equipment and the first DMRS parameter set, that the user equipment that sends the first message is the A user device.
- the network device of claim 33 further comprising: a sending unit, configured to: before the receiving unit receives the K first message and the DMRS respectively corresponding to the K first messages, Sending a second message to the first user equipment, where the second message indicates the first DMRS parameter set corresponding to the first user equipment.
- the second message being a primary information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, a minimum remaining system Information RMSI or other system information OSI.
- a first user equipment comprising:
- a processing unit configured to generate, according to the first demodulation reference signal DMRS parameter set corresponding to the first user equipment, a DMRS corresponding to each of the K first messages repeatedly transmitted on the resource for unlicensed transmission at L,
- the first DMRS parameter set indicates DMRS parameters respectively used by the first user equipment to generate DMRS on each resource when performing repeated transmission on the resource for unlicensed transmission at the L, and each DMRS parameter Corresponding to one of the resources at the L, wherein the frequency of each resource at the L is different, L is an integer greater than 1, and K is an integer greater than or equal to L;
- a sending unit configured to repeatedly transmit the K first messages to the network device at each of the resources at the L, and send a DMRS corresponding to the K first messages respectively, where the K The DMRS corresponding to the first message is used by the network device to identify that the user equipment that sends the first message is the first user equipment.
- the first user equipment of claim 38 the first user equipment further comprising: a receiving unit, configured to receive the network device before the processing unit generates the DMRS corresponding to the K first messages respectively And sending the second message, where the second message is used to indicate the first DMRS parameter set.
- the second message is a main information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, a minimum Remaining system information RMSI or other system information OSI.
- a network device comprising:
- a receiving unit configured to receive a first message sent by the first user equipment in the same time domain transmission unit of the resource for unauthorized transmission, and a demodulation reference signal DMRS resource at the L in the same time domain transmission unit
- the L DMRSs are sent, the L DMRSs are corresponding to the first message, and the L DMRSs are Ls of the first user equipment according to the DMRS resources in the same time domain transmission unit.
- DMRS parameter generation each of the L DMRS parameters is used by the first user equipment to generate a DMRS sent on a corresponding resource in the DMRS resource at the L, where L is an integer greater than 1;
- a processing unit configured to identify, according to the DMRS parameter corresponding to the DMRS received on the resource of the DMRS resource at the L, that the user equipment that sends the first message is the first user equipment.
- the network device of claim 43 further comprising: a first sending unit, configured to receive, in the receiving unit, the first user equipment in the same time domain transmission unit in the resource for unauthorized transmission Transmitting the first message and the M DMRSs sent on the DMRS resources in the same time domain transmission unit, sending, to the first user equipment, M pieces of second messages, where the M pieces of second messages correspond to a DMRS resource at the L; each second message corresponds to at least one DMRS resource in the DMRS resource at the L; the M second message is used to indicate that the first user equipment is a DMRS resource at the L
- the DMRS parameter that can be used separately on each DMRS resource, M is an integer greater than 0 and less than or equal to L.
- the second message is: a primary information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, minimum remaining system information RMSI, or other system information OSI.
- the network device of any one of 43-48 the network device further comprising: a second sending unit, configured to receive, at the receiving unit, the same of the first user equipment in the resource for unauthorized transmission Sending, by the first message sent in the time domain transmission unit, and the L DMRSs sent on the DMRS resource at the L in the same time domain transmission unit, sending a third message to the first user equipment, where the third message is used Instructing the first user equipment to generate the L DMRSs according to L DMRS parameters corresponding to the DMRS resources at the L.
- a second sending unit configured to receive, at the receiving unit, the same of the first user equipment in the resource for unauthorized transmission Sending, by the first message sent in the time domain transmission unit, and the L DMRSs sent on the DMRS resource at the L in the same time domain transmission unit, sending a third message to the first user equipment, where the third message is used Instructing the first user equipment to generate the L DMRSs according to L DMRS parameters corresponding to the DMRS resources
- L DMRSs comprise one or more additional DMRSs (additional DMRSs).
- a first user equipment comprising:
- a processing unit configured to generate, according to the L demodulation reference signal DMRS parameters, L DMRSs sent on L DMRS resources in the same time domain transmission unit in the resource for unauthorized transmission, the L DMRS parameters Corresponding to the DMRS resource at the L, the DMRS parameter of the L DMRS parameters is used by the first user equipment to generate a DMRS, L respectively sent on a corresponding resource in the DMRS resource at the L Is an integer greater than 1;
- a sending unit configured to send a first message to the network device in the same time domain transmission unit, and send the L DMRSs corresponding to the first message on the DMRS resource at the L, where The L DMRSs are respectively sent on the corresponding resources in the DMRS resources at the L, and the L DMRSs are used by the network device to identify the user equipment that sends the first message as the first user equipment.
- the first user equipment of claim 54 the first user equipment further comprising: a first receiving unit, configured to generate, in the resource for unauthorized transmission, the processing unit according to the L DMRS parameters Before the L DMRSs sent to the network device on the L DMRS resources in the same time domain transmission unit, receiving M second messages sent by the network device, where the M second messages correspond to the L DMRS Each of the second messages corresponds to at least one DMRS resource in the DMRS resource at the L; the M second message is used to indicate that the first user equipment is in each DMRS of the DMRS resource at the L
- the DMRS parameter that can be used separately on the resource, M is an integer greater than 0 and less than or equal to L.
- the first user equipment of 55, M is equal to L.
- the first user equipment, as described in FIG. 56, is equal to 1, and the second message is used to indicate a correspondence between the DMRS resources at the L and the L DMRS parameters.
- Control element MAC CE minimum remaining system information RMSI, or other system information OSI.
- the L DMRS parameters corresponding to the DMRS resources at the L are generated to generate the L DMRSs.
- a network device comprising:
- a transceiver configured to receive K first messages repeatedly transmitted by the first user equipment on the resources for unauthorized transmission at the L, and a demodulation reference signal DMRS corresponding to the sent K first messages respectively;
- the DMRS is generated by the first user equipment according to the first DMRS parameter set corresponding to the first user equipment, where the first DMRS parameter set indicates that the first user equipment performs repeated transmission on the resource at the L DMRS parameters respectively used by the DMRS are generated on each resource, and each DMRS parameter corresponds to one of the resources at the L, wherein the frequency of each resource at the L is different.
- L is an integer greater than 1
- K is an integer greater than or equal to L;
- the processor is configured to parse the DMRS corresponding to the received K first messages, and parse the DMRS parameters corresponding to the K first messages respectively;
- the processor is further configured to identify, according to the parsed DMRS parameter, a correspondence between the first user equipment and the first DMRS parameter set, that the user equipment that sends the first message is the A user device.
- the transceiver further configured to send the first user equipment to the first user equipment before receiving the K first message and the DMRS corresponding to the K first messages respectively a second message, where the second message indicates the first DMRS parameter set corresponding to the first user equipment.
- the second message is a main information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, a minimum remaining system.
- Information RMSI or other system information OSI is a main information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, a minimum remaining system.
- a first user equipment comprising:
- a processor configured to generate, according to the first demodulation reference signal DMRS parameter set corresponding to the first user equipment, a DMRS corresponding to each of the K first messages repeatedly transmitted on the resource for unauthorized transmission at L, where
- the first DMRS parameter set indicates DMRS parameters respectively used by the first user equipment to generate DMRS on each resource when performing repeated transmission on the resource for unlicensed transmission at the L, and each DMRS parameter Corresponding to one of the resources at the L, wherein the frequency of each resource at the L is different, L is an integer greater than 1, and K is an integer greater than or equal to L;
- a transceiver configured to repeatedly transmit the K first messages to the network device at each of the resources at the L, and send a DMRS corresponding to the K first messages respectively, where the K The DMRS corresponding to the first message is used by the network device to identify that the user equipment that sends the first message is the first user equipment.
- the first user equipment of 70 the transceiver is further configured to: before the processor generates the DMRS corresponding to the K first messages, receive a second message sent by the network device, The second message is used to indicate the first DMRS parameter set.
- the second message is a main information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, a minimum Remaining system information RMSI or other system information OSI.
- a network device comprising:
- a transceiver configured to receive a first message sent by a first user equipment in a same time domain transmitter for a resource for unauthorized transmission, and a demodulation reference signal DMRS resource at an L in the same time domain transmission unit
- the L DMRSs are sent, the L DMRSs are corresponding to the first message, and the L DMRSs are Ls of the first user equipment according to the DMRS resources in the same time domain transmitter.
- DMRS parameter generation each of the L DMRS parameters is used by the first user equipment to generate a DMRS sent on a corresponding resource in the DMRS resource at the L, where L is an integer greater than 1;
- a processor configured to identify, according to the DMRS parameter corresponding to the DMRS received on each resource of the DMRS resource at the L, that the user equipment that sends the first message is the first user equipment.
- the transceiver further configured to receive a first message sent in a same time domain transmission unit of a resource for unauthorized transmission by the first user equipment and in the same Before the L DMRSs sent on the DMRS resources at the L in the time domain transmission unit, send M second messages to the first user equipment, where the M second messages correspond to the DMRS resources at the L;
- the second message corresponds to at least one DMRS resource in the DMRS resource at the L;
- the M second message is used to indicate that the first user equipment can be separately used on each DMRS resource of the DMRS resource at the L DMRS parameter, M is an integer greater than 0 and less than or equal to L.
- the network device of 76, M equals L.
- M is equal to 1, and the second message is used to indicate a correspondence between the DMRS resource at the L and the L DMRS parameters.
- the second message is: a primary information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, minimum remaining system information RMSI, or other system information OSI.
- the transceiver is further configured to receive a first message sent in a same time domain transmission unit of the first user equipment in a resource for unauthorized transmission And sending, to the first user equipment, a third message, where the third message is used to indicate the first user equipment according to the location, before the L DMRSs sent on the DMRS resource at the L in the same time domain transmission unit
- the L DMRS parameters corresponding to the DMRS resources at L are generated by the L DMRS parameters.
- a first user equipment comprising:
- a processor configured to generate, according to the L demodulation reference signal DMRS parameters, L DMRSs sent on L DMRS resources in the same time domain transmission unit in the resource for unlicensed transmission, the L DMRS parameters Corresponding to the DMRS resource at the L, the DMRS parameter of the L DMRS parameters is used by the first user equipment to generate a DMRS, L respectively sent on a corresponding resource in the DMRS resource at the L Is an integer greater than 1;
- a transceiver configured to send a first message to the network device in the same time domain transmitter, and send the L DMRSs corresponding to the first message to the network device on the DMRS resource at the L And the L DMRSs are respectively sent on the corresponding resources in the DMRS resources at the L, where the L DMRSs are used by the network device to identify that the user equipment that sends the first message is the A user device.
- the first user equipment of 86, the transceiver further configured to generate, in the same time domain transmission unit in a resource for unauthorized transmission, the L according to the L DMRS parameters.
- receiving M second messages sent by the network device where the M second messages correspond to the DMRS resources at the L; each second message corresponds to the L DMRS At least one DMRS resource in the resource; the M second message is used to indicate that the first user equipment can separately use the DMRS parameter on each DMRS resource of the DMRS resource at the L, where M is greater than 0 And an integer less than or equal to L.
- the first user equipment of 87, M is equal to L.
- the first user equipment, as described in 87, is equal to 1, and the second message is used to indicate a correspondence between the DMRS resource at the L and the L DMRS parameters.
- the first user equipment according to any one of 87-90, wherein the second message is: a main information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, and a media access control.
- Control element MAC CE minimum remaining system information RMSI, or other system information OSI.
- the first user equipment of any one of 86-91, the transceiver further configured to generate, in the same time domain in a resource for unauthorized transmission, according to the L DMRS parameters by the processor Receiving a third message sent by the network device, where the third message is used to indicate that the first user equipment is configured according to the DMRS resource at the L, before the L DMRSs sent by the L DMRS resources in the transmission unit A corresponding DMRS parameter generates the L DMRSs.
- An apparatus comprising: a processor and a memory;
- the memory storage program
- the processor invokes the program stored by the memory to control the network device to perform the method of any of 1-5.
- An apparatus comprising: a processor and a memory;
- the memory storage program
- the processor invokes the program stored by the memory to control the first user device to perform the method of any of 6-10.
- the device of 100 the device being one or more components on the first user device.
- the device of 100 the device is the first user equipment, the first user equipment further comprising a transceiver, the processor controlling a transceiving action of the transceiver.
- An apparatus comprising: a processor and a memory;
- the memory storage program
- the processor invokes the program stored in the memory to control the network device to perform the method of any of embodiments 11-21.
- the device of 103 the device being one or more components on the network device.
- the device of 103 the device being the network device, the network device further comprising a transceiver, the processor controlling a transceiving action of the transceiver.
- An apparatus comprising: a processor and a memory;
- the memory storage program
- the processor invokes the program stored by the memory to control the first user device to perform the method of any of embodiments 22-32.
- the device of 106 the device being one or more components on the first user device.
- the device of 106 the device is the first user equipment, the first user equipment further comprising a transceiver, the processor controlling a transceiving action of the transceiver.
- a communication system comprising: the network device of any one of embodiments 33-37, and the first user device of any one of embodiments 38-42, or any one of embodiments 65-69 The network device and the first user device of any one of embodiments 70-74.
- a communication system comprising: the network device of any one of 43-53, and the first user device of any one of 54-64, or the network device of any one of 75-85 And the first user equipment of any one of 86-96.
- a communication system comprising: the apparatus of any one of clauses 97-99, and the apparatus of any one of 100-102, or the apparatus of any one of 103-105 and such as 106-108 The device of any of the preceding claims.
- a computer readable storage medium having stored thereon a computer program, the computer program being executed by a computer to implement the method of any of the above 1-32.
- a computer program product having stored thereon a computer program, which when executed by a computer, implements the method of any of the above 1-32.
- a method for identifying a user equipment, for the user equipment comprising:
- DMRS parameter index set used by the user equipment to perform repeated transmission in a resource for unauthorized transmission at the L;
- the parameter index set is used by the user equipment to generate a DMRS signal to help the network device identify the user equipment;
- L is a positive integer greater than one
- the DMRS parameter index set includes L elements, each of the L elements indicating a DMRS parameter used by the user equipment to generate a DMRS signal in a resource that is not authorized for transmission.
- the DMRS parameter used by the DMRS signal sent by the UE in synchronization with the uplink data in each of the Grant-free resources in the Grant-free resource at the L may be configured by the base station by using the DMRS parameter index set in the first message sent; where the DMRS parameter is The index set can be used as a multi-dimensional DMRS parameter to identify the UE mode.
- the base station only recognizes that the uplink data is sent by a certain UE when the corresponding DMRS parameter parsed in the Grant-free resource at the L matches the DMRS parameter index set of a certain UE.
- the advantage is that the scheme can configure the UE to have more UEs corresponding to the DMRS parameters (sets) in the same number of Grant-free resources.
- the user equipment sends, according to the DMRS parameter index set in the first message, a total of K second messages to the network device in the resource for unauthorized transmission at the L, the K strip
- the second message is uplink data of repeated transmission based on unauthorized transmission;
- K is a positive integer greater than or equal to L
- the user equipment generates a corresponding DMRS signal according to the DMRS parameter index set in each of the unlicensed resources in the resource for the unlicensed transmission at the L, and sends the corresponding DMRS signal together with the K second message.
- Each of the second messages corresponds to at least one DMRS signal, so the K second messages correspond to at least K DMRS signals.
- the UE transmits K second messages (ie, uplink data repeatedly transmitted) in the Grant-free resource at L to obtain a (frequency) diversity gain.
- K second messages ie, uplink data repeatedly transmitted
- the base station can enable the UE to obtain the diversity gain without reducing the number of UEs that correspond one-to-one with the DMRS parameters.
- the DMRS parameters include cyclic displacement.
- the cyclic shift can affect the phase rotation of the DMRS signal, and the base station can identify which cyclic displacement, ie, the DMRS parameter, is specifically used by the UE through different phase rotations.
- the first message that is sent by the user equipment to the user equipment by the network device is carried in at least one of a system message, a radio resource control signaling RRC, a physical layer control message, and a MAC control element.
- RRC radio resource control signaling
- MAC MAC control element
- the first message may be delivered by semi-static signaling (such as system message, RRC, MAC CE) or by dynamic signaling (such as physical layer control message).
- semi-static signaling such as system message, RRC, MAC CE
- dynamic signaling such as physical layer control message
- a method of identifying a user equipment for a network device comprising:
- the network device Sending, by the network device, the first message to the user equipment, to indicate a demodulation reference signal DMRS parameter index set used by the user equipment to perform repeated transmission in a resource for unauthorized transmission at L; the DMRS a parameter index set is used by the network device to parse the DMRS signal to identify the user equipment;
- L is a positive integer greater than one
- the DMRS parameter index set includes L elements, each of the L elements indicating a DMRS parameter used by the user equipment to generate a DMRS signal in a resource that is not authorized for transmission.
- the DMRS parameter used by the DMRS signal sent by the UE in synchronization with the uplink data in each of the Grant-free resources in the Grant-free resource at the L may be configured by the base station by using the DMRS parameter index set in the first message sent; where the DMRS parameter is The index set can be used as a multi-dimensional DMRS parameter to identify the UE mode.
- the base station only recognizes that the uplink data is sent by a certain UE when the corresponding DMRS parameter parsed in the Grant-free resource at the L matches the DMRS parameter index set of a certain UE.
- the advantage is that the scheme can configure the UE to have more one-to-one correspondence with the DMRS parameters (sets) in the same number of Grant-free resources.
- the network device Determining, by the network device, the DMRS parameters corresponding to the one or more second messages and the DMRS signals according to the received one or more second messages and DMRS signals;
- the UE transmits K second messages (ie, uplink data repeatedly transmitted) in the Grant-free resource at L to obtain a (frequency) diversity gain.
- K second messages ie, uplink data repeatedly transmitted
- the base station can enable the UE to obtain the diversity gain without reducing the number of UEs that correspond one-to-one with the DMRS parameters.
- the DMRS parameters include cyclic displacement.
- the cyclic shift can affect the phase rotation of the DMRS signal, and the base station can identify which cyclic displacement, ie, the DMRS parameter, is specifically used by the UE through different phase rotations.
- the first message sent by the network device to the user equipment is carried in at least one of a system message, a radio resource control signaling RRC, a physical layer control message, and a MAC control element signaling MAC CE.
- the first message may be delivered by semi-static signaling (such as system message, RRC, MAC CE) or by dynamic signaling (such as physical layer control message).
- semi-static signaling such as system message, RRC, MAC CE
- dynamic signaling such as physical layer control message
- a terminal comprising:
- a processor a memory, and a transceiver
- the transceiver is configured to receive and send data
- the memory is for storing instructions
- the processor is configured to execute the instructions in the memory, and perform the method of any one of 1 to 4.
- a base station comprising:
- a processor a memory, and a transceiver
- the transceiver is configured to receive and send data
- the memory is for storing instructions
- the processor is operative to execute the instructions in the memory, and the method of any one of claims 5 to 8 is performed.
- a communication system comprising the terminal according to any one of 1 to 4 and the base station according to any one of 5 to 8.
- a chip comprising:
- the processing module is operative to perform the method of any of 1 to 4 and/or 5 to 8.
- the chip further includes a storage module (eg, a memory) for storing instructions, the processing module is configured to execute an instruction stored by the storage module, and execute an instruction stored in the storage module
- the processing module performs the method of any of 1 to 4 and/or 5 to 8.
- FIG. 1 is a schematic diagram of resources used for unauthorized transmission in the prior art
- FIG. 2 is a schematic diagram of an application architecture of an embodiment of the present application.
- FIG. 3 is a flowchart of Embodiment 1 of a method for identifying a user equipment in an unauthorized transmission according to an embodiment of the present disclosure
- FIG. 4 is a schematic diagram of resources for unauthorized transmission according to an embodiment of the present application.
- FIG. 5A is a schematic diagram of a DMRS parameter index set of multiple user equipments according to an embodiment of the present disclosure
- FIG. 5B is a first schematic diagram of a method for identifying a user equipment in an unauthorized transmission according to an embodiment of the present application
- 5C is a schematic diagram 2 of a method for identifying a user equipment in an unauthorized transmission according to an embodiment of the present application
- FIG. 6 is a schematic diagram 1 of a resource used by a user equipment for repeated transmission according to an embodiment of the present disclosure
- FIG. 7 is a second schematic diagram of resources used by a user equipment for repeated transmission according to an embodiment of the present disclosure.
- FIG. 8 is a flowchart of Embodiment 2 of a method for identifying a user equipment in an unauthorized transmission according to an embodiment of the present disclosure
- FIG. 9 is a schematic diagram of transmitting a DMRS in a prior art time slot
- FIG. 10 is a flowchart of Embodiment 3 of a method for identifying a user equipment in an unauthorized transmission according to an embodiment of the present disclosure
- FIG. 10B is a third schematic diagram of a method for identifying a user equipment in an unauthorized transmission according to an embodiment of the present disclosure
- 10C is a schematic diagram 4 of a method for identifying a user equipment in an unauthorized transmission according to an embodiment of the present disclosure
- FIG. 11 is a schematic structural diagram 1 of a network device according to an embodiment of the present disclosure.
- FIG. 12 is a schematic structural diagram 1 of a first user equipment according to an embodiment of the present disclosure.
- FIG. 13 is a schematic structural diagram 2 of a network device according to an embodiment of the present disclosure.
- FIG. 14 is a schematic structural diagram 2 of a first user equipment according to an embodiment of the present disclosure.
- FIG. 15 is a schematic structural diagram 3 of a network device according to an embodiment of the present disclosure.
- FIG. 16 is a schematic structural diagram 3 of a first user equipment according to an embodiment of the present disclosure.
- the application architecture of the embodiment of the present application may include a first user equipment and a network device, and the first user equipment is in communication connection with the network device. Among them, the network device can configure resources for unauthorized transmission. The first user equipment may use the resources configured by the network device for unauthorized transmission for unauthorized transmission.
- the first user equipment may include, but is not limited to, an Internet device such as a smart phone (such as an Android mobile phone, an IOS mobile phone, etc.), a personal computer, a tablet computer, a palmtop computer, a mobile internet device (MID), or a wearable smart device. Wait.
- an Internet device such as a smart phone (such as an Android mobile phone, an IOS mobile phone, etc.), a personal computer, a tablet computer, a palmtop computer, a mobile internet device (MID), or a wearable smart device. Wait.
- the network device may include a base station, which may be a base transceiver station (BTS) in a GSM or system, or an NB (NodeB) in a WCDMA system, or an evolved base station in LTE ( Evolved NodeB, eNB), or a relay station, or an in-vehicle device, a wearable device, and an access network device in a future 5G network or an access network device in a publicly evolved public land mobile network (PLMN) network, etc.
- BTS base transceiver station
- NodeB evolved base station in LTE
- eNB evolved NodeB
- PLMN publicly evolved public land mobile network
- FIG. 3 is a flowchart of Embodiment 1 of a method for identifying a user equipment in an unauthorized transmission according to an embodiment of the present disclosure. As shown in FIG. 3, the method in this embodiment may include:
- Step 301 The first user equipment generates, according to the first DMRS parameter set corresponding to the first user equipment, a DMRS corresponding to each of the K first messages that are repeatedly transmitted.
- the first DMRS parameter set indicates that the first user equipment generates DMRS on each resource when performing repeated transmission on each resource of the resource for unauthorized transmission at L.
- a DMRS parameter each DMRS parameter corresponding to one of the resources at the L, wherein each of the resources at the L has a different frequency, L is an integer greater than 1, and K is greater than or An integer equal to L.
- the time domain of each resource of the L resource in the embodiment may be different, or may be the same or partially the same, which is not limited in this application.
- the time domain of the same resource is not limited in this application.
- the time domain of the same resource may be continuous or discontinuous.
- the network device may configure multiple frequency domain information for the unlicensed transmission resource, and each frequency domain information may be used to indicate a resource for unauthorized transmission.
- Frequency Range may be used to indicate a resource for unauthorized transmission.
- each frequency domain information may have corresponding time domain information, where the time domain information may be used to indicate a time range of resources used for unauthorized transmission.
- the resource for unlicensed transmission corresponding to the same frequency domain information may be considered as a resource for unauthorized transmission.
- GFRC1 can be considered as a resource for unlicensed transmission
- GFRC2 can be considered as another resource for unauthorized transmission.
- the network device may separately notify multiple user resources for unauthorized transmission through multiple pieces of configuration information, or may notify multiple user resources for unauthorized transmission through a configuration information. This application does not limit this. As shown in FIG. 4, Grant-free resource 1 can be considered as a resource for unauthorized transmission, and Grant-free resource 2 can be considered as another resource for unauthorized transmission.
- the repeated transmission may specifically refer to repeated transmission of a physical layer.
- different user equipments can be directly sent in the Grant-free resource when there is uplink data.
- the repeated transmission of the uplink data comprises at least two types, one for the initial transmission (1 st transmission) of the uplink data remaining the same repeated transmission data other than the initial uplink transmission scenario, only the base station successfully demodulated multiple times
- the uplink data may be obtained by any one of the uplink data that is repeatedly transmitted; the other is that the uplink data of the initial transmission is completely different or partially different from the uplink data of the repeated transmissions other than the initial transmission, and the uplink data transmission is reliable at this time.
- the performance is mainly obtained by the base station to perform Soft Combining on the received uplink data of multiple repeated transmissions (also referred to as Incremental Redundancy).
- the soft combining is that the receiving end (for example, the user equipment or the network device) receives the data packet that cannot be correctly decoded, and the receiving end saves the received error data packet in a buffer and performs subsequent retransmission with the received packet.
- the data is combined to obtain a more reliable packet than the individual decoding, and then the receiver decodes the combined packet.
- the number K of repeated transmissions may be greater than or equal to L.
- K is equal to L
- a repeated transmission is performed in each of the resources for unauthorized transmission at L for each of the resources for unauthorized transmission.
- K is greater than L
- at least one of the resources for unauthorized transmission at L is repeatedly transmitted in the resource for unauthorized transmission.
- the first DMRS parameter set may include L elements, and the L elements are in one-to-one correspondence with resources for unauthorized transmission at the L, and each of the L elements indicates the The first user equipment will perform DMRS parameters used in the repeated transmission to generate the DMRS on the corresponding resource at the L.
- the first DMRS parameter set may specifically include a parameter value of the DMRS parameter, or may also include an identifier corresponding to the parameter value of the DMRS parameter, which is not limited in this application.
- first DMRS parameter set may also be referred to as a first DMRS parameter index set, and other names may be used.
- the present application does not limit this, as long as the functions are the same.
- the application is not limited.
- the first DMRS parameter set is ⁇ identity of Grant-free resource 1, identifier of Grant-free resource 2, identity of Grant-free resource 3; DMRS parameter 1, DMRS parameter 2, DMRS parameter 3 ⁇
- the DMRS parameter 1 is used when generating the DMRS on the Grant-free resource 1
- the DMRS parameter 2 is used when the DMRS is generated on the Grant-free resource 2
- the DMRS parameter 3 is used when the DMRS is generated on the Grant-free resource 3.
- a first message may correspond to one or more DMRSs, which is not limited in this application.
- the first message when a first message is carried in a time domain transmission unit, and only one DMRS is sent in the time domain transmission unit, the first message may correspond to one DMRS.
- the first message when a first message is carried in a time domain transmission unit, and the multiple DMRSs are sent in the time domain transmission unit, the first message may correspond to multiple DMRSs.
- the first message may correspond to multiple DMRSs.
- the time domain transmission unit may refer to one time slot, or one micro time slot, or several OFDM symbols, or several time slots, or one subframe.
- the DMRS parameters used for repeated transmission on the same resource are the same.
- the DMRS parameters used by the first user equipment for repeated transmission on each of the resources for unlicensed transmission at L may be different, or all the same, or partially identical.
- the DMRS parameters corresponding to each of the first messages of the K first messages are the same; or the DMRS parameters corresponding to each of the first messages of the K first messages are different; or, The DMRS parameters corresponding to each of the first messages in the first message in a message are the same, and the DMRS parameters corresponding to each of the first messages in the first message are different.
- the first user equipment generates a parameter value of the DMRS parameter used by the DMRS on each resource when performing repeated transmission in each of the Grant-free resources in the Grant-free resource at the L (or,
- the DMRS parameter used by the first user equipment to generate the DMRS when performing repeated transmission on the Grant-free resource 1 may be indicated.
- the DMRS parameters used by the DMRS to generate the DMRS when the first user equipment performs repeated transmission on the Grant-free resource 2 may be indicated.
- the multi-dimensional means that the frequency domain locations of the unlicensed resources used by the user equipment are different.
- the specific manner for the first user equipment to determine the first DMRS parameter set is not limited in this application.
- the first user equipment may be directly allocated to the first user equipment by using the first DMRS parameter set; or the first user equipment may be configured by the network equipment to configure a plurality of first DMRS parameter sets that may be used, and then through a specific index.
- the process may be embodied in a tabular form; or may be generated by the first user equipment according to preset information, eg, a device number of the user equipment; .
- Step 302 The first user equipment repeatedly transmits the K first messages to the network device and sends the DMRSs corresponding to the K first messages respectively on the resources at the L.
- the DMRS corresponding to the K first messages is used by the network device to identify that the user equipment that sends the first message is the first user equipment.
- the first user equipment may send the DMRS corresponding to the K first messages repeatedly transmitted to the network device together with the K first messages.
- the first DMRS parameter set delivered by the network device received by the first user equipment in the first message is For example, the first message of K1 and K2 repeated transmissions is sent in the Grant-free resource 1 and the Grant-free resource 2 respectively, and the first message of the K1 sent by the first user equipment in the Grant-free resource 1 and use The generated DMRS corresponding to the first message of the K1, the first message of the K2 sent by the first user equipment in the Grant-free resource 2, and the use The generated DMRS corresponding to the K2 first message respectively.
- the specific sending manner of the first user equipment on a Grant-free resource is not limited in this application.
- the first user equipment may adopt a frequency hopping transmission mode, or may not adopt a frequency hopping transmission mode, and whether the frequency hopping is used herein is determined by the configuration of the base station. Assuming that the bandwidth of a Grant-free resource is 2 MHz, the first user equipment adopts a frequency hopping transmission method, for example, in the Grant-free resource, the first frequency of the 1 MHz resource is used first, and the frequency of the larger frequency is 1 MHz. Resources.
- step 301 and step 302 the application is not limited, and only needs to ensure that the first message is repeatedly transmitted on a resource in the resource for unauthorized transmission at L.
- the DMRS corresponding to the first message repeatedly transmitted on the resource may be used.
- the specific time may be repeated transmission to the network device at the same time of the Grant-free resource at the L.
- K first messages for example, as shown in FIG. 1, GFRC1 and GFRC2 corresponding to time unit n repeatedly transmit K first messages to the network device.
- the K first message may be repeatedly transmitted to the network device at different time resources of the Grant-free resource at L.
- the GFRC2 corresponding to the time unit n corresponds to the time unit n+1.
- GFRC1 repeatedly transmits K first messages to the network device, or GFRC1 and GFRC2 corresponding to time unit n, and GFRC1 corresponding to time unit n+1 repeatedly transmits K first messages to the network device.
- the K first message is repeatedly transmitted to the network device at different time resources of the Grant-free resource at the L, the network device and the first user device may agree on a time resource allocation manner.
- Step 303 The network device parses the received DMRS corresponding to the K first messages, and parses out the DMRS parameters corresponding to the K first messages.
- the DMRS corresponding to a first message may be one or more, and the number of DMRSs corresponding to each first message in the K first messages may be different, or all the same or partially the same .
- the number of DMRSs corresponding to each of the first messages in the K first message is one
- the number of DMRSs corresponding to the first message may be the same.
- the number of the DMRSs corresponding to the first message in the K first message is multiple, the number of the DMRS parameters corresponding to the first message may be smaller than the corresponding one of the K first messages.
- the number of DMRS is
- Step 304 The network device identifies, according to the parsed DMRS parameter, a correspondence between the first user equipment and the first DMRS parameter set, that the user equipment that sends the first message is the first User equipment.
- the network device identifies, according to the parsed DMRS parameter, a pre-known correspondence between the first user equipment and the first DMRS parameter set, that the user equipment that sends the first message is The first user equipment.
- the network device may identify the DMRS parameter according to the user equipment that is sent by the first user equipment, and may form a DMRS parameter set.
- the DMRS parameter set Determining, by the first user equipment, DMRS parameters respectively used by the DMRS on each resource when performing repeated transmission on the resources at the L.
- the network device when the network device obtains the DMRS parameter set according to the parsed DMRS parameter The first DMRS parameter set that should be used with the first user equipment When matching, the network device can identify that the user equipment that sends the first message is the first user equipment.
- the DMRS parameter set that the first user equipment should use (that is, the first DMRS parameter set corresponding to the first user equipment)
- the representation may be represented by a correspondence between the first user equipment and the first DMRS parameter set.
- the DMRS parameter set obtained according to the parsed DMRS parameter is matched with the first DMRS parameter set that the first user equipment should use, and can be specifically understood as indicating that the DMRS parameter set obtained according to the parsed DMRS parameter is
- the DMRS parameters used by the DMRS when performing repeated transmissions on each of the resources at the L are repeated with each resource at the L indicated by the first DMRS parameter set that the first user equipment should use.
- the DMRS parameters used to generate the DMRS during transmission are the same.
- the DMRS parameter set obtained by the network device according to the parsed DMRS parameters is the same as the first DMRS parameter set that the first user equipment should use.
- the network device When the network device receives the first message and the corresponding DMRS sent by the same user equipment in each Grant-free resource in the Grant-free resource at the L, the network device can directly identify according to the obtained DMRS parameter set. The user equipment that sent the first message.
- the network device configures two Grant-free resources to the user equipment for unauthorized transmission, where the user equipment 1 can be at the first Grant-free resource (such as Grant-free resource 1) and the second place Grant The -free resource (such as Grant-free resource 2) sends the first message of K1 and K2 respectively, and assumes that the network device determines that the DMRS parameter set that user equipment 1 should use is ⁇ 1, 4 ⁇ .
- the parameter value of the DMRS parameter that the network device resolves in the Grant-free resource 1 is "1”
- the parameter value of the DMRS parameter that is parsed in the Grant-free resource 2 is "4", that is, the DMRS obtained by the network device.
- the parameter set is ⁇ 1, 4 ⁇ , and the network device can determine that the obtained DMRS parameter set matches the DMRS parameter set that the user equipment 1 should use, thereby determining that the first message is sent by the user equipment 1.
- the network device may determine, according to the obtained DMRS parameter set, Sending user equipments of different first transmission corresponding to the first message respectively. It is assumed that the network device can configure two Grant-free resources (such as Grant-free resource 1 and Grant-free resource 2) to multiple user devices for unauthorized transmission. In an example, as shown in FIG.
- the network device When the network device parses multiple DMRS parameters in the same Grant-free resource, if the parameter values of the DMRS parameters parsed by the network device in the Grant-free resource 1 are "1" and "3", the network device may The DMRS parameter set that the multiple user equipments should use respectively determines that the DMRS corresponding to the parameter value “1” in the Grant-free resource 1 may be sent by the UE1 or the UE8, and the DMRS corresponding to the parameter value “3” may be sent by the UE3 or the UE6. .
- the network device may determine the DMRS parameter set according to the DMRS parameter set that the multiple user equipments should respectively use.
- 1,3 ⁇ corresponds to UE1
- DMRS parameter set ⁇ 3, 4 ⁇ corresponds to UE6, that is, DMRS with parameter value "1" in Grant-free resource 1, and the first message corresponding to the DMRS is sent by UE1, Grant-free resource 1
- the DMRS of the parameter value “3” and the first message corresponding to the DMRS are sent by the UE6, the DMRS of the parameter value “3” in the Grant-free resource 2, and the first message corresponding to the DMRS are sent by the UE1, and the Grant-free resource 2 is used.
- the DMRS of the parameter value "4" and the first message corresponding to the DMRS are transmitted by the UE 6.
- the network device When the network device receives the first message and the corresponding DMRS that are repeatedly transmitted by the multiple user equipments in each Grant-free in the Grant-free resource at the L, the network device may perform according to the obtained DMRS parameter set and The number of user equipments that are repeatedly transmitted, and the user equipment that sends the first message corresponding to the different repeated transmissions is determined. It is assumed that the network device can configure two Grant-free resources (such as Grant-free resource 1 and Grant-free resource 2) to multiple user devices for unauthorized transmission. In another example, as shown in FIG.
- the parameter values of the DMRS parameters parsed by the network device in Grant-free resource 1 are "1" and "2", but in Grant-free.
- the parameter values of the DMRS parameters parsed in the resource 2 are “2” and “3”, and the network device may determine that the first message may be sent by the UE1, the UE5, and the UE8 according to the DMRS parameter set that the multiple user equipments should use respectively. Further, if the first message that the network device resolves in a Grant-free resource is sent by two user equipments, the network device may determine that the first message is sent by the UE5 and the UE8. If the first message parsed by the network device in one of the Grant-free resources is sent by three user equipments, the network device may determine that the first message is sent by UE1, UE5, and UE8.
- the step 301 may further include: the network device sending a second message to the first user equipment, where the second message indicates The first DMRS parameter set corresponding to the first user equipment.
- the first user equipment receives the second message sent by the network device.
- the second message may be semi-static signaling or dynamic signaling.
- the second message may be a master information block (MIB), a system information block (SIB), a radio resource control (RRC) signaling, a physical layer control message, Media Access Control Element (MAC CE) signaling, Minimum Residual System Information (RMSI) or Other System Information (OSI).
- MIB master information block
- SIB system information block
- RRC radio resource control
- MAC CE Media Access Control Element
- RMSI Minimum Residual System Information
- OSI System Information
- the physical layer control message may specifically be L1 signaling, Downlink Control Information (DCI), group common DCI, and the like. It should be noted that, the specific manner in which the second message indicates the first DMRS parameter set is not limited in this application.
- the second message may include the first DMRS parameter set, or include an identifier of the first DMRS parameter set, and the like.
- L can be equal to 2.
- the foregoing DMRS parameters may include: Cyclic Shift.
- Step 305 The network device sends a response message to the first user equipment.
- the response message may be used to indicate a positive response or a negative response to the first user equipment.
- the network device may send an ACK (Acknowledge) to the first user equipment, to determine that the second is successfully received.
- ACK Acknowledge
- a message when the network device successfully obtains the DMRS parameter but fails to demodulate the K second message, the network device may send a NACK (Negative Acknowledge) to the first user equipment to determine that the network device is not successfully received. Said K second message.
- the affirmative response may be a positive response sent by the network device for a certain user equipment (such as UE specific DCI), or may be an affirmation indicated in a response message (such as a Group Common DCI) sent by the network device for multiple user equipments. response.
- the network device may also indicate a positive response to the first user equipment by not sending a response message to the first user equipment. For example, the first user equipment starts a timer after sending the first message. If the scheduling message from the network device is not received before the timer expires, the user equipment considers that the first message is successfully sent, and the network device may indicate a positive response to the first user equipment by using other methods, which is not limited herein.
- the negative response may be a negative response sent by the network device to a user equipment, such as a scheduling message or a scheduling message indicating that the network device is not successfully demodulated to the second message, or the network device is targeting multiple user equipments.
- the network device can also indicate a negative response to the first user equipment in other manners, which is not limited herein.
- step 305 is an optional step.
- the DMRS is generated by using the DMRS on each resource when the first user equipment performs repeated transmission according to the resource indicating that the first user equipment uses the resource for unauthorized transmission at the L.
- a first DMRS parameter set of the DMRS parameter the DMRS is generated, the first user equipment repeatedly transmits the K first message to the network device on the resource at the L, and the sending corresponds to the K first message respectively DMRS, the network device parses the received DMRS corresponding to the K first messages, and parses out the DMRS parameters corresponding to the K first messages, and according to the parsed DMRS parameters, Determining a correspondence between the first user equipment and the first DMRS parameter set, identifying that the user equipment that sends the first message is the first user equipment, and implementing the DMRS received according to each resource at the L
- the corresponding DMRS parameters (which can be understood as multi-dimensional DMRS parameters, the DMRS parameters corresponding to the DMRS received on each resource can be regarded as one-dimensional DM
- the DMRS parameter of the DMRS improves the number of user equipments that can be identified, thereby increasing the number of user equipments carried in the resources for unauthorized transmission.
- the parameter value of the DMRS parameter can take any one of four possible values of “1”, “2”, “3”, and “4”, and L is equal to 2
- the prior art adopts different
- uplink data of multiple repeated transmissions sent by the user equipment may be discretely opened at a larger interval in the frequency domain, as shown in FIG.
- the first time (1 st ) and the second time of UE1 (2 nd ) K-repetition can be performed in Grant-free resource 1
- the third (3 rd ) and fourth (4 th ) retransmission can be performed in Grant-free resource 2 to obtain Frequency diversity gain, which in turn improves transmission reliability.
- the message that the first user equipment repeatedly transmits is recorded as the first message, and the network device is sent to the first user equipment.
- the message indicating the first DMRS parameter set is recorded as the second message.
- the message indicating the first DMRS parameter set by the network device to the first user equipment is recorded as the first message, and the first user is used according to the order in which the messages appear.
- the message that the device repeatedly transmits is recorded as the second message.
- FIG. 8 is a flowchart of Embodiment 2 of a method for identifying a user equipment in an unauthorized transmission according to an embodiment of the present disclosure. As shown in FIG. 8, the method in this embodiment may include:
- Step 101 The network device sends a first message to the user equipment to indicate a DMRS parameter index set used by the user equipment to perform repeated transmission in multiple Grant-free resources, for the network device to identify the user equipment.
- the user equipment can be understood as the foregoing first user equipment
- the DMRS parameter index set can be understood as the foregoing first DMRS parameter set, where the plurality of locations can be understood as L, and L is an integer greater than 1.
- a Grant-free resource is a resource used for unauthorized transmission.
- the network device may be the Grant of the user equipment in the Grant-free resource at the L-
- the corresponding DMRS parameters are configured in the free resource, and the corresponding DMRS parameters in each of the Grant-free resources in the Grant-free resource at the L can be combined into a first DMRS parameter set to form a multi-dimensional user equipment identification index set.
- the first message sent indicates that the first DMRS parameter set may be among them
- the DMRS parameter used by the corresponding DMRS when the user equipment sends the uplink data in the Grant-free resource 1.
- the DMRS parameter used by the corresponding DMRS when the user equipment will send the uplink data in the Grant-free resource 2.
- Step 110 The user equipment sends a second message to the network device, where the second message is uplink data of the retransmission of the unauthorized transmission.
- the user equipment repeatedly transmits K second messages to the network device and sends DMRSs respectively corresponding to the K second messages on each resource at the L.
- the user equipment repeatedly transmits the K second messages to the network device and the DMRSs corresponding to the K second messages respectively in the Grant-free resource at the L.
- the first user equipment repeatedly transmits the K first message to the network device in the Grant-free resource at the L, and sends a related description of the DMRS corresponding to the K first message respectively. Narration.
- Step 111 The network device receives the second message, and determines, by using the obtained DMRS parameter index set, that the second message is sent by the user equipment.
- the network device parses the received DMRS corresponding to the K second messages, and parses out the DMRS parameters corresponding to the K second messages, and according to the parsed Determining the DMRS parameter, and the correspondence between the first user equipment and the DMRS parameter set, and identifying that the second message is sent by the user equipment.
- the network device parses the DMRS parameters corresponding to the K second messages, and the specific DMRS parameter is sent by the user equipment according to the parsed DMRS parameters, refer to step 303 in the foregoing method embodiment.
- the network device in step 304 parses the DMRS parameters respectively corresponding to the K first messages, and identifies, according to the parsed DMRS parameters, that the user equipment that sends the first message is a related description of the first user equipment, where not Let me repeat.
- Step 112 The network device sends a response message to the user equipment.
- the response message may be used to indicate a positive response or a negative response to the user equipment.
- the network device may send an ACK (Acknowledge) to the user equipment to determine that the second message is successfully received.
- the network device may send a NACK (Negative Acknowledge) to the user equipment to determine that the K-strip is not successfully received. Two messages.
- the affirmative response may be a positive response sent by the network device for a certain user equipment (such as UE specific DCI), or may be an affirmation indicated in a response message (such as a Group Common DCI) sent by the network device for multiple user equipments. response.
- the network device may also indicate a positive response to the user equipment by not sending a response message to the user equipment. For example, the user equipment starts a timer after sending the second message, if the timer expires. The user equipment does not receive a scheduling message from the network device, and the user equipment considers that the second message is successfully sent.
- the network device may also indicate a positive response to the user equipment in other manners, which is not limited herein.
- the negative response may be a negative response sent by the network device to a user equipment, such as a scheduling message or a scheduling message indicating that the network device is not successfully demodulated to the second message, or the network device is targeting multiple user equipments.
- the network device can also indicate a negative response to the user equipment in other manners, which is not limited herein.
- step 112 is an optional step.
- the first message is sent to the user equipment by the network device, to indicate the DMRS parameter index set used by the user equipment to perform repeated transmission in the Grant-free resource at the L, for the network device. Identifying the user equipment, where the user equipment sends K second messages in the Grant-free resource at L, and the network device receives the DMRS corresponding to the K second messages respectively according to the Grant-free resource at the L, Obtaining a DMRS parameter index set consisting of DMRS parameters corresponding to the DMRS received by each Grant-free resource, and confirming that the K second message is sent by the user equipment by using the obtained DMRS parameter index set, and implementing the basis according to the L
- the DMRS parameters corresponding to the DMRS received on each of the resources are used to identify the user equipment, and the number of user equipments carried in the resources for unauthorized transmission is increased.
- Orthogonal Frequency Division Multiplexing (OFDM) symbols (for example, Orthogonal Frequency Division Multiplexing (OFDM) symbol 3 in FIG. 9) transmits the DMRS; when the base station considers that the user equipment is in a special environment
- the mobile station may also configure more than one OFDM symbol for the user equipment, such as the OFDM symbol 11 in FIG. 9, and the user equipment may send an additional DMRS (additional DMRS) on the OFDM symbol 11 to better support the user equipment.
- Mobility The DMRS parameter configured by the base station is received by the user equipment, and the DMRS sent on the OFDM symbol 3 and the OFDM symbol 11 is generated by using the DMRS parameter.
- FIG. 10 is a flowchart of Embodiment 3 of a method for identifying a user equipment in an unauthorized transmission according to an embodiment of the present disclosure. As shown in FIG. 10A, the method in this embodiment may include:
- Step 1001 The first user equipment generates, according to the L demodulation reference signal DMRS parameters, L DMRSs sent on L DMRS resources in the same time domain transmission unit among the resources used for unauthorized transmission.
- the L DMRS parameters are in one-to-one correspondence with the DMRS resources at the L, and each of the L DMRS parameters is used by the first user equipment to generate the DMRS resource at the L.
- the DMRS sent on the corresponding resource, L is an integer greater than 1.
- the time domain transmission unit may refer to one time slot, or one micro time slot, or several OFDM symbols, or several time slots, or one subframe.
- one time slot in Figure 9 can be considered a time domain transmission unit.
- a time domain transmission unit includes two DMRS resources (ie, L is equal to 2), which are OFDM symbol 3 and OFDM symbol 11, respectively.
- the number of DMRS parameters is also 2, such as DMRS parameter 1 and DMRS parameter 2. It is assumed that the one-to-one correspondence between the L DMRS parameters and the DMRS resources at the L is that the DMRS parameter 1 can correspond to the OFDM symbol 3, and the DMRS parameter 2 can correspond to the OFDM symbol 11, and the user equipment can generate the OFDM symbol 3 according to the DMRS parameter 1. DMRS1 generates DMRS2 transmitted on OFDM symbol 11 according to DMRS parameter 2.
- the number of OFDM symbols included in one slot may also be other values, for example, 7 OFDM symbols.
- the DMRS resources at the L are all located in the same time domain transmission unit, and the frequencies of the DMRS resources at the L are the same.
- the specific manner in which the first user equipment acquires L demodulation parameters corresponding to the DMRS resources at the L is not limited in this application.
- the first user equipment may be directly allocated to the first user equipment by using the L demodulation parameters that are specifically used with the DMRS resources at the L; or the network equipment may be configured by the network equipment to use the multiple groups and the possible
- the L demodulation parameters corresponding to the DMRS resources at the L are respectively indicated by the specific index, and the process may be performed in a tabular form; the first user equipment may also be based on the preset information, For example, the device number of the user device is generated; and so on.
- the network device sends, to the first user equipment, M pieces of second messages, where the M second messages correspond to the DMRS resources at the L; each second message corresponds to the Determining at least one DMRS resource in the DMRS resource at the L; the M second message is used to indicate a DMRS parameter that the first user equipment can separately use on each DMRS resource of the DMRS resource at the L, M is an integer greater than 0 and less than or equal to L.
- the second message may be semi-static signaling or dynamic signaling.
- the second message is: a primary information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, a minimum remaining system information RMSI, or other system information.
- OSI is: a primary information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, a minimum remaining system information RMSI, or other system information.
- OSI OSI.
- the network device sends the corresponding relationship between the DMRS resource and the DMRS parameter at the L to the first user equipment by using a second message, where the second message is used to indicate the DMRS resource at the L Correspondence relationship of the L DMRS parameters.
- the second message may include L elements, where the L elements are in one-to-one correspondence with the DMRS resources at the L, and each of the L elements indicates that the DMRS is generated on the corresponding resource. The DMRS parameters used.
- each element indicates the DMRS parameter used when generating the DMRS on the corresponding resource may be a parameter value of the DMRS parameter used when each element includes the DMRS parameter on the corresponding resource, or the DMRS parameter used.
- L is equal to 3
- the second message includes at least 6 elements, an identifier of the DMRS resource 1, an identifier of the DMRS resource 2, and an identifier of the DMRS resource 3. the DMRS parameter 1, the DMRS parameter 2, and the DMRS parameter.
- DMRS parameter 1 is used when DMRS is generated on DMRS resource 1
- DMRS parameter 2 is used when DMRS is generated on DMRS resource 2
- DMRS parameter 3 is used when DMRS is generated on DMRS resource 3.
- M When M is equal to L, it may indicate that a second message corresponds to one DMRS resource in the DMRS resource at L. When M is greater than 1 and less than L, it may be indicated that at least one second message corresponds to multiple DMRS resources in the DMRS resource at L.
- the M second messages may be the same type of message, or may be different types of messages, which is not limited in this application.
- the M second messages may all be system messages, or RRC signaling, or physical layer control messages; or some of the M second messages may be RRC signaling, and part of the signaling may be physical. Layer control message.
- the system message may include at least one of the foregoing MID, SIB, RMSI, and OSI.
- the above L may be equal to 2.
- the two DMRS resources may be, for example, OFDM symbol 3 and OFDM symbol 11.
- the two DMRS parameters include, for example, DMRS parameter 1 corresponding to OFDM symbol 3 and DMRS parameter 1 corresponding to OFDM symbol 11; or DMRS corresponding to OFDM symbol 3.
- DMRS parameter 2 corresponding to parameter 1 and OFDM symbol 11; or DMRS parameter 2 corresponding to OFDM symbol 3 and DMRS parameter 1 corresponding to OFDM symbol 11.
- the foregoing DMRS parameter may include a cyclic shift (Cyclic Shift).
- the foregoing L DMRSs may include one or more additional DMRSs (additional DMRSs).
- additional DMRSs may include one additional DMRS; when L is equal to 3, L DMRSs may include two additional DMRSs.
- the L DMRS parameters may be identical or not identical, which is not limited in this application.
- L is equal to 3
- the DMRS resources are DMRS resource 1, DMRS resource 2, and DMRS resource 3, respectively
- the parameter value of the DMRS parameter can take "1", "2", or "3”
- L DMRS parameters The DMRS parameter corresponding to the DMRS resource 1 and having a parameter value of “1”, the DMRS parameter corresponding to the DMRS resource 2, the parameter value “1”, and the DMRS corresponding to the DMRS resource 3 and having the parameter value “1” may be included.
- a parameter or a DMRS parameter corresponding to DMRS resource 1, a parameter value of "1", a DMRS parameter corresponding to DMRS resource 2, a parameter value of "2", and a DMRS resource 3, and a parameter value of "2" DMRS parameter; or DMRS parameter corresponding to DMRS resource 1, parameter value "1", DMRS parameter corresponding to DMRS resource 2, parameter value "2", and corresponding to DMRS resource 3, parameter value is "3" DMRS parameters; and so on.
- the DMRS parameter is used to generate the DMRS sent on two DMRS resources.
- the DMRS resources in the DMRS resources of the L correspond to one DMRS parameter, and the DMRS parameters sent by the DMRS resources are generated by using the DMRS parameters corresponding to the resources.
- the switch control may be provided.
- the first user equipment may generate the L DMRSs according to L DMRS parameters corresponding to the DMRS resources at the L.
- the first user equipment may not generate the L DMRSs according to L DMRS parameters corresponding to the DMRS resources at the L, For example, L DMRSs are generated according to one DMRS parameter that does not have a corresponding relationship with the DMRS resources.
- the step 1001 may further include: the network device sending a third message to the first user equipment, where the third message is used to indicate that the first user equipment is configured according to the DMRS resource at the L A corresponding DMRS parameter generates the L DMRSs.
- the third device is sent by the network device to the first user equipment to instruct the first user equipment to generate the L DMRSs according to the L DMRS parameters corresponding to the DMRS resources at the L, and the flexibility can be improved.
- Step 1002 The first user equipment sends a first message to the network device in the same time domain transmission unit, and sends the foregoing information corresponding to the first message to the network device on the DMRS resource at the L. L DMRSs.
- the L DMRSs are respectively sent on the corresponding resources in the DMRS resources at the L, and the L DMRSs are used by the network device to identify that the user equipment that sends the first message is the First user device.
- the first message can be a message.
- the L DMRSs are used to demodulate the first message.
- the first user equipment uses one slot as a time domain transmission unit, and the first user equipment may send DMRS1 in OFDM symbol 3 in the same time domain transmission unit, and send DMRS2 on OFDM symbol 11. And transmitting the first message on other OFDM symbols than OFDM symbol 3 and OFDM symbol 11.
- Step 1003 The network device identifies, according to the DMRS parameter corresponding to the DMRS received on each resource of the DMRS resource at the L, that the user equipment that sends the first message is the first user equipment.
- the network device is configured according to the DMRS parameter corresponding to the DMRS received on each resource of the DMRS resource at the L, and each of the DMRS resources of the different user equipment at the L that are known in advance.
- the DMRS parameter corresponding to the DMRS is sent on the resource, and the user equipment that sends the first message is identified as the first user equipment.
- the network device determines the DMRS parameter corresponding to the DMRS received on each resource at the L, and the DMRS parameter that the first user equipment should use to send the DMRS on each resource at the L
- the user equipment that sends the first message may be determined to be the first user equipment.
- the network device knows in advance that the DMRS corresponding to the DMRS parameter 1 transmitted by the user equipment 1 in the OFDM symbol 3, the DMRS corresponding to the DMRS parameter 2 transmitted by the user equipment 1 in the OFDM symbol 11, and the DMRS parameter corresponding to the DMRS transmitted by the user equipment 2 in the OFDM symbol 3. 2.
- the DMRS sent by the user equipment 2 in the OFDM symbol 11 corresponds to the DMRS parameter 1, and the network device sends the L DMRSs and the L DMRSs to the network device in the same time domain transmission unit.
- the user equipment that sends the first message may be determined as the user equipment. If it is determined that the DMRS received on the OFDM symbol 3 corresponds to the DMRS parameter 2, and the DMRS received on the OFDM symbol 3 corresponds to the DMRS parameter 1, the user equipment that sends the first message may be the user equipment 2.
- step 1104 may also be performed.
- Step 1004 The network device sends a response message to the first user equipment.
- the response message may be used to indicate a positive response or a negative response to the first user equipment.
- the network device may send an ACK (Acknowledge) to the first user equipment, to determine that the first is successfully received.
- ACK Acknowledge
- a message when the network device successfully obtains the DMRS parameter but fails to demodulate the first message, the network device may send a NACK (Negative Acknowledge) to the first user equipment to determine that the first message is not successfully received.
- NACK Negative Acknowledge
- the affirmative response may be a positive response sent by the network device for a certain user equipment (such as UE specific DCI), or may be an affirmation indicated in a response message (such as a Group Common DCI) sent by the network device for multiple user equipments. response.
- the network device may also indicate a positive response to the user equipment by not sending a response message to the first user equipment. For example, the first user equipment starts a timer after sending the first message, if If the scheduling message is not received from the network device before the timer expires, the first user equipment considers that the first message is successfully sent, and the network device may indicate a positive response to the first user equipment in other manners, which is not limited herein.
- the negative response may be a negative response sent by the network device to a user equipment, such as a scheduling message or a scheduling message indicating that the network device is not successfully demodulated to the first message, or the network device is targeting multiple user equipments.
- the network device can also indicate a negative response to the first user equipment in other manners, which is not limited herein.
- the first user equipment generates, according to the L demodulation reference signal DMRS parameters, L DMRSs sent on L DMRS resources in the same time domain transmission unit among the resources used for unauthorized transmission;
- the first user equipment sends a first message to the network device in the same time domain transmission unit, and sends the L DMRSs corresponding to the first message to the network device on the DMRS resource at the L;
- the DMRS parameter corresponding to the DMRS received on the resource (which can be understood as a multi-dimensional DMRS parameter, and the DMRS parameter corresponding to the DMRS received on each resource can be regarded as a one-dimensional DMRS parameter) to identify the user equipment, and only use one Compared with the user equipment corresponding
- the method shown in FIG. 3 or FIG. 8 may be combined with the method shown in FIG. 10A, that is, the method combined with the methods shown in FIG. 3 and FIG. 10 may be used simultaneously to identify the user equipment, or may be used simultaneously.
- the method illustrated in Figures 8 and 10 combines methods to identify user equipment. For example, when the parameter value of the DMRS parameter can take any one of four possible values of "1", “2", “3", and "4", and L is equal to 2, as shown in FIG. 3 or FIG.
- FIG. 11 is a schematic structural diagram 1 of a network device according to an embodiment of the present disclosure; as shown in FIG. 11, the network device in this embodiment may include: a receiving unit 1101 and a processing unit 1102.
- the receiving unit 1101 is configured to receive K first messages repeatedly transmitted by the first user equipment for resources for unauthorized transmission at the L, and demodulation reference signals DMRS corresponding to the sent K first messages respectively.
- the DMRS is generated by the first user equipment according to the first DMRS parameter set corresponding to the first user equipment, where the first DMRS parameter set indicates that the first user equipment is performed on the resource at the L.
- the DMRS parameters respectively used by the DMRS are generated on each resource when the transmission is repeated, and each DMRS parameter corresponds to one resource in the resource at the L, wherein each of the resources at the L has a frequency Not identical, L is an integer greater than 1, and K is an integer greater than or equal to L;
- the processing unit 1102 is configured to parse the DMRSs corresponding to the received K first messages, and parse the DMRS parameters corresponding to the K first messages respectively.
- the processing unit 1102 is further configured to: identify, according to the parsed DMRS parameter, a correspondence between the first user equipment and the first DMRS parameter set, that the user equipment that sends the first message is the first User equipment.
- the network device of this embodiment may further include: a sending unit 1103, configured to: before the receiving unit 1101 receives the K first message and the DMRS corresponding to the K first messages respectively, The first user equipment sends a second message, where the second message indicates the first DMRS parameter set corresponding to the first user equipment.
- a sending unit 1103 configured to: before the receiving unit 1101 receives the K first message and the DMRS corresponding to the K first messages respectively, The first user equipment sends a second message, where the second message indicates the first DMRS parameter set corresponding to the first user equipment.
- the second message is a main information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, a minimum remaining system information RMSI, or other system information.
- OSI main information block MIB
- SIB system information block SIB
- RRC signaling a radio resource control RRC signaling
- a physical layer control message a media access control control element MAC CE
- MAC CE media access control control element
- minimum remaining system information RMSI or other system information.
- the first DMRS parameter set includes L elements, and the L elements are in one-to-one correspondence with resources for unauthorized transmission at the L, and each of the L elements indicates the user
- the device will perform the DMRS parameters used in the repeated transmission to generate the DMRS on the corresponding resource at the L.
- the DMRS parameter includes a cyclic shift.
- the L is equal to 2.
- the network device in this embodiment can be used in the technical solution on the network device side of the embodiment shown in FIG. 3, and the implementation principle and technical effects are similar, and details are not described herein again.
- FIG. 12 is a schematic structural diagram 1 of a first user equipment according to an embodiment of the present disclosure; as shown in FIG. 12, the first user equipment in this embodiment may include: a processing unit 1201 and a sending unit 1202.
- the processing unit 1201 is configured to generate, according to the first demodulation reference signal DMRS parameter set corresponding to the first user equipment, a K first message corresponding to repeated transmission on the resource for unauthorized transmission at L, respectively.
- DMRS the first DMRS parameter set indicates a DMRS parameter respectively used by the first user equipment to generate a DMRS on each resource when performing repeated transmission on the resource for unauthorized transmission at the L
- a DMRS parameter corresponds to one of the resources at the L, wherein each of the resources at the L has a different frequency, L is an integer greater than 1, and K is an integer greater than or equal to L;
- the sending unit 1202 is configured to repeatedly transmit the K first messages to the network device and send the DMRSs respectively corresponding to the K first messages on the resources at the L, where the K first messages are sent.
- the corresponding DMRS is used by the network device to identify that the user equipment that sends the first message is the first user equipment.
- the user equipment in this embodiment may further include: a receiving unit 1203, configured to receive, after the processing unit 1201 generates the DMRS corresponding to the K first messages, the second message sent by the network device, where The second message is used to indicate the first DMRS parameter set.
- a receiving unit 1203 configured to receive, after the processing unit 1201 generates the DMRS corresponding to the K first messages, the second message sent by the network device, where The second message is used to indicate the first DMRS parameter set.
- the second message is a main information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, a minimum remaining system information RMSI, or other system information.
- OSI main information block MIB
- SIB system information block SIB
- RRC signaling a radio resource control RRC signaling
- a physical layer control message a media access control control element MAC CE
- MAC CE media access control control element
- minimum remaining system information RMSI or other system information.
- the first DMRS parameter set includes L elements, and the L elements are in one-to-one correspondence with resources for unauthorized transmission at the L, and each of the L elements indicates the user
- the device will perform the DMRS parameters used in the repeated transmission to generate the DMRS on the corresponding resource at the L.
- the DMRS parameter includes a cyclic shift.
- the L is equal to 2.
- the first user equipment in this embodiment may be used in the technical solution of the first user equipment side as shown in FIG. 3, and the implementation principle and technical effects are similar, and details are not described herein again.
- FIG. 13 is a schematic structural diagram of a network device according to an embodiment of the present disclosure; as shown in FIG. 13 , the network device in this embodiment may include: a receiving unit 1301 and a processing unit 1302.
- the receiving unit 1301 is configured to receive a first message sent by the first user equipment in the same time domain transmission unit for the resource for unauthorized transmission, and a demodulation reference signal at the L in the same time domain transmission unit.
- the L DMRSs are transmitted on the DMRS resource, and the L DMRSs are corresponding to the first message, and the L DMRSs are the first user equipment according to the DMRS resources at the L in the same time domain transmission unit.
- Corresponding L DMRS parameters are generated, and each of the L DMRS parameters is used by the first user equipment to generate a DMRS sent on a corresponding resource in the DMRS resource at the L, where L is greater than 1.
- the processing unit 1302 is configured to identify, according to the DMRS parameter corresponding to the DMRS received on each resource of the DMRS resource at the L, that the user equipment that sends the first message is the first user equipment.
- the network device in this embodiment may further include: a first sending unit 1303, configured to receive, by the receiving unit 1301, a first user equipment, where the first user equipment sends the same time domain transmission unit in the resource for unauthorized transmission. Transmitting, to the first user equipment, M pieces of second messages, where the M pieces of second messages correspond to the L, before the message and the L DMRSs sent on the DMRS resources at the L in the same time domain transmission unit a DMRS resource; each second message corresponds to at least one DMRS resource in the DMRS resource at the L; the M second message is used to indicate that the first user equipment is in each of the DMRS resources at the L
- the DMRS parameter that can be used separately on the DMRS resource, and M is an integer greater than 0 and less than or equal to L.
- the network device in this embodiment may further include: a second sending unit 1304, configured to receive, by the receiving unit 1301, the first user equipment, where the first user equipment sends the same time domain transmission unit in the resource for unauthorized transmission.
- a second sending unit 1304 configured to receive, by the receiving unit 1301, the first user equipment, where the first user equipment sends the same time domain transmission unit in the resource for unauthorized transmission.
- the L DMRS parameters corresponding to the DMRS resources at the L are generated to generate the L DMRSs.
- the first sending unit and the second sending unit may be one sending unit.
- the transmitting unit and the receiving unit can be integrated into one transceiver unit.
- M is equal to L.
- M is equal to 1, and the second message is used to indicate a correspondence between the DMRS resource at the L and the L DMRS parameters.
- the second message includes L elements, where the L elements are in one-to-one correspondence with the DMRS resources at the L, and each of the L elements indicates that the DMRS is generated when the corresponding resource is generated.
- DMRS parameters are in one-to-one correspondence with the DMRS resources at the L, and each of the L elements indicates that the DMRS is generated when the corresponding resource is generated.
- the second message is: a primary information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, a minimum remaining system information RMSI, or other System information OSI.
- the DMRS parameter includes a cyclic shift.
- the L is equal to 2.
- the L DMRSs include one or more additional DMRSs (additional DMRSs).
- the L DMRS parameters are not identical.
- the network device in this embodiment may be used in the technical solution on the network device side of the embodiment shown in FIG. 10A, and the implementation principle and technical effects are similar, and details are not described herein again.
- FIG. 14 is a schematic structural diagram 2 of a first user equipment according to an embodiment of the present disclosure; as shown in FIG. 14 , the first user equipment in this embodiment may include: a processing unit 1401 and a sending unit 1402.
- the processing unit 1401 is configured to generate, according to the L demodulation reference signal DMRS parameters, L DMRSs sent on L DMRS resources in the same time domain transmission unit in the resource for unauthorized transmission, where the L Each DMRS parameter is in one-to-one correspondence with the DMRS resource at the L, and each DMRS parameter of the L DMRS parameters is used by the first user equipment to generate, respectively, sent on a corresponding resource in the DMRS resource at the L DMRS, L is an integer greater than one;
- the sending unit 1402 is configured to send a first message to the network device in the same time domain transmission unit, and send the L messages corresponding to the first message to the network device on the DMRS resource at the L a DMRS, where the L DMRSs are respectively sent on a corresponding resource in the DMRS resource at the L, where the L DMRSs are used by the network device to identify that the user equipment that sends the first message is the First user device.
- the user equipment in this embodiment may further include: a first receiving unit 1403, configured to generate, by the processing unit 1401, the same time domain transmission unit in the resource for unauthorized transmission according to the L DMRS parameters.
- a first receiving unit 1403 configured to generate, by the processing unit 1401, the same time domain transmission unit in the resource for unauthorized transmission according to the L DMRS parameters.
- the M second messages sent by the network device are received, where the M second messages correspond to the DMRS resources at the L; each second message corresponds to the L At least one DMRS resource in the DMRS resource; the M second message is used to indicate that the first user equipment can separately use the DMRS parameter on each DMRS resource of the DMRS resource at the L, where M is greater than 0 and an integer less than or equal to L.
- the user equipment in this embodiment may further include: a second receiving unit 1404, configured to, by the processing unit 1401, generate L in the same time domain transmission unit in the resource for unauthorized transmission according to the L DMRS parameters.
- a second receiving unit 1404 configured to, by the processing unit 1401, generate L in the same time domain transmission unit in the resource for unauthorized transmission according to the L DMRS parameters.
- the DMRS parameters generate the L DMRSs.
- M is equal to L.
- M is equal to 1, and the second message is used to indicate a correspondence between the DMRS resource at the L and the L DMRS parameters.
- the second message includes L elements, where the L elements are in one-to-one correspondence with the DMRS resources at the L, and each of the L elements indicates that the DMRS is generated when the corresponding resource is generated.
- DMRS parameters are in one-to-one correspondence with the DMRS resources at the L, and each of the L elements indicates that the DMRS is generated when the corresponding resource is generated.
- the second message is: a primary information block MIB, a system information block SIB, a radio resource control RRC signaling, a physical layer control message, a media access control control element MAC CE, a minimum remaining system information RMSI, or other System information OSI.
- the DMRS parameter includes a cyclic shift.
- the L is equal to 2.
- the L DMRSs include one or more additional DMRSs (additional DMRSs).
- the L DMRS parameters are not identical.
- the first user equipment in this embodiment may be used in the technical solution of the first user equipment side as shown in FIG. 10A, and the implementation principle and technical effects are similar, and details are not described herein again.
- FIG. 15 is a schematic structural diagram 3 of a network device according to an embodiment of the present disclosure.
- the network device 1600 includes a processor 1601, a memory 1602, a transceiver 1603, and a bus 1604.
- the processor 1601, the memory 1602, and the transceiver 1603 (including the transmitter and the receiver) are connected to each other through a bus 1604.
- the bus 1604 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus.
- PCI Peripheral Component Interconnect
- EISA Extended Industry Standard Architecture
- the bus 1604 described above can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only a thick line is shown in Figure 16, but it does not mean that there is only one bus or one type of bus.
- the memory 1602 is configured to store application code for executing the solution of the present application, and is controlled by the processor 1601 for execution.
- the processor 1601 is configured to execute the application code stored in the memory 1602, thereby implementing the method on the network device side in the above method embodiment.
- the processor 1601 may perform the processing related function in the method on the network device side in the foregoing method embodiment of the present application, and the transceiver 1603 is responsible for communicating with other devices or the communication network. This embodiment of the present application does not specifically limit this.
- the embodiment of the present invention further provides a non-volatile storage medium having one or more program codes stored therein.
- the processor 1601 of the network device 1600 executes the program code, the network device 1600 Performing related method steps performed by the network device in any of the method embodiments of the present invention.
- each module or unit in the network device 1600 provided by the embodiment of the present invention and the technical effects brought by each module or unit performing the related method steps performed by the network device in any method embodiment of the present invention may refer to the present invention. Related descriptions of the method embodiments of the present invention are not described herein again.
- FIG. 16 is a schematic structural diagram 3 of a first user equipment according to an embodiment of the present disclosure.
- the first user equipment 1900 includes a processor 1901, a memory 1902, a transceiver 1903, and a bus 1904.
- the processor 1901, the memory 1902, and the transceiver 1903 (including the transmitter and the receiver) are connected to each other through a bus 1904.
- the bus 1904 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus.
- PCI Peripheral Component Interconnect
- EISA Extended Industry Standard Architecture
- the bus 1904 described above can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only a thick line is shown in Figure 17, but it does not mean that there is only one bus or one type of bus.
- the memory 1902 is configured to store application code for executing the solution of the present application, and is controlled by the processor 1901 for execution.
- the processor 1901 is configured to execute the application code stored in the memory 1902, thereby implementing the method on the first user equipment side in the above method embodiment.
- the processor 1901 may perform the processing related function in the method on the first user equipment side in the foregoing method embodiment of the present application, and the transceiver 1903 is responsible for interacting with other devices or communication networks.
- the embodiment of the present application does not specifically limit this.
- the embodiment of the present invention further provides a non-volatile storage medium having one or more program codes stored therein.
- the processor 1901 of the user equipment 1900 executes the program code, the user equipment 1900 Performing related method steps performed by the first user equipment in any of the method embodiments of the present invention.
- the application implementation also provides an apparatus, including: a processor and a memory;
- the memory storage program
- the processor invokes the program stored in the memory to control the network device to perform the method on the network device side of the embodiment shown in FIG. 3 or 8.
- the device is one or more components on the network device.
- the device may specifically be a chip or chip system (SoC) in the network device.
- SoC chip or chip system
- the device is the network device, and the network device further includes a transceiver, where the processor controls a transceiving action of the transceiver.
- the application implementation also provides an apparatus, including: a processor and a memory;
- the memory storage program
- the processor invokes the program stored in the memory to control the first user equipment to perform the method on the first user equipment side of the embodiment shown in FIG. 3 or FIG. 8.
- the device is one or more components on the first user equipment.
- the device may specifically be a chip or chip system in the first user equipment.
- the device is the first user equipment, and the first user equipment further includes a transceiver, where the processor controls a transceiving action of the transceiver.
- the application implementation also provides an apparatus, including: a processor and a memory;
- the memory storage program
- the processor invokes the program stored in the memory to control a method in which the network device performs the network device side of the embodiment shown in FIG.
- the device is one or more components on the network device.
- the device may specifically be a chip or chip system in the network device.
- the device is the network device, and the network device further includes a transceiver, where the processor controls a transceiving action of the transceiver.
- the application implementation also provides an apparatus, including: a processor and a memory;
- the memory storage program
- the processor invokes the program stored in the memory to control the first user equipment to perform the method on the first user equipment side of the embodiment shown in FIG.
- the device is one or more components on the first user equipment.
- the device may specifically be a chip or chip system in the first user equipment.
- the device is the first user equipment, and the first user equipment further includes a transceiver, where the processor controls a transceiving action of the transceiver.
- the embodiment of the present application further provides a communication system, including: the network device described in the embodiment shown in FIG. 11 and the first user equipment in the embodiment shown in FIG. 12; or the embodiment shown in FIG. The network device and the first user device described in the embodiment shown in FIG.
- the embodiment of the present application further provides a communication system, including: the network device described in the embodiment shown in FIG. 15 and the first user device in the embodiment shown in FIG. 16.
- the embodiment of the present application further provides a communication system, including: the device according to the first embodiment of the device and the device according to the second embodiment of the device; or the device according to the third embodiment of the device and the device according to the fourth embodiment of the device .
- the embodiment of the present application further provides a computer readable storage medium, on which a computer program is stored, and the computer program is implemented by a computer to implement the above method.
- the embodiment of the present application further provides a computer program product, where a computer program is stored thereon, and the method is implemented when the computer program is executed by a computer.
- processors mentioned in the embodiment of the present application may be a central processing unit (CPU), and may also be other general-purpose processors, digital signal processors (DSPs), and application specific integrated circuits ( Application Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, etc.
- the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
- the memory referred to in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory may be a read-only memory (ROM), a programmable read only memory (PROM), an erasable programmable read only memory (Erasable PROM, EPROM), or an electric Erase programmable read only memory (EEPROM) or flash memory.
- the volatile memory can be a Random Access Memory (RAM) that acts as an external cache.
- RAM Random Access Memory
- many forms of RAM are available, such as static random access memory (SRAM), dynamic random access memory (DRAM), synchronous dynamic random access memory (Synchronous DRAM). SDRAM), Double Data Rate SDRAM (DDR SDRAM), Enhanced Synchronous Dynamic Random Access Memory (ESDRAM), Synchronous Connection Dynamic Random Access Memory (Synchlink DRAM, SLDRAM) ) and direct memory bus random access memory (DR RAM).
- memories described herein are intended to comprise, without being limited to, these and any other suitable types of memory.
- At least one means one or more, and "a plurality” means two or more.
- At least one of the following or a similar expression thereof refers to any combination of these items, including any combination of a single item or a plurality of items.
- at least one of "a, b, or c" may mean: a, b, c, ab ( That is, a and b), ac, bc, or abc, wherein a, b, and c may be single or plural.
- the size of the serial numbers of the above processes does not mean the order of execution, and some or all of the steps may be performed in parallel or sequentially, and the execution order of each process shall be
- the intrinsic logic is determined without any limitation on the implementation process of the embodiments of the present application.
- the disclosed systems, devices, and methods may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
- the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
- the instructions are used to cause a computer device (which may be a personal computer, server, network device or terminal device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .
- each device embodiment may refer to related methods in the related method embodiments. Partial understanding.
- the device structure diagrams given in the various device embodiments of the present application show only a simplified design of the corresponding device.
- the device may include any number of transmitters, receivers, processors, memories, etc., to implement the functions or operations performed by the device in the embodiments of the present application, and all devices that can implement the present application All are within the scope of this application.
- the words “if” or “if” as used herein may be interpreted as “when” or “when” or “in response to determining” or “in response to detecting.”
- the phrase “if determined” or “if detected (conditions or events stated)” may be interpreted as “when determined” or “in response to determination” or “when detected (stated condition or event) “Time” or “in response to a test (condition or event stated)”.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Les modes de réalisation de la présente invention concernent un procédé d'identification d'équipement utilisateur dans une transmission sans autorisation, un appareil, un dispositif et un système. Le procédé comprend les étapes suivantes : un dispositif de réseau reçoit K premiers messages transmis de manière répétée par un premier équipement utilisateur sur des ressources au niveau de L destinées à une transmission sans autorisation et les DMRS envoyés correspondant respectivement aux K premiers messages, les DMRS étant générés par le premier équipement utilisateur en fonction d'un premier ensemble de paramètres DMRS correspondant au premier équipement utilisateur ; le dispositif de réseau analyse les DMRS correspondant respectivement aux K premiers messages reçus, pour obtenir des paramètres DMRS correspondant respectivement aux K premiers messages, et identifie, en fonction des paramètres DMRS analysés et de la corrélation entre le premier équipement utilisateur et le premier ensemble de paramètres DMRS, que l'équipement utilisateur ayant envoyé le premier message est le premier équipement utilisateur. La présente invention augmente le nombre d'équipements utilisateur transportés dans des ressources destinées à une transmission sans autorisation.
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711226525 | 2017-11-29 | ||
| CN201711226525.7 | 2017-11-29 | ||
| CN201810284997.6 | 2018-04-02 | ||
| CN201810284997.6A CN109842479B (zh) | 2017-11-29 | 2018-04-02 | 在非授权传输中识别用户设备的方法、装置、设备及系统 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019105330A1 true WO2019105330A1 (fr) | 2019-06-06 |
Family
ID=66665360
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2018/117549 Ceased WO2019105330A1 (fr) | 2017-11-29 | 2018-11-27 | Procédé d'identification d'équipement utilisateur dans une transmission sans autorisation, appareil, dispositif et système |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2019105330A1 (fr) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2021068228A1 (fr) * | 2019-10-12 | 2021-04-15 | Qualcomm Incorporated | Configuration de signal de référence de démodulation pour de multiples configurations de canal physique partagé de liaison montante d'autorisation configurée |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104796218A (zh) * | 2014-01-17 | 2015-07-22 | 电信科学技术研究院 | 信号传输方法和装置 |
| WO2016148805A1 (fr) * | 2015-03-17 | 2016-09-22 | Motorola Mobility Llc | Procédé et appareil pour planifier des transmissions en liaison montante d'équipement utilisateur sur une porteuse non autorisée |
| WO2017147513A1 (fr) * | 2016-02-25 | 2017-08-31 | Intel IP Corporation | Détection de transmission de transmissions en liaison montante non planifiées |
-
2018
- 2018-11-27 WO PCT/CN2018/117549 patent/WO2019105330A1/fr not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104796218A (zh) * | 2014-01-17 | 2015-07-22 | 电信科学技术研究院 | 信号传输方法和装置 |
| WO2016148805A1 (fr) * | 2015-03-17 | 2016-09-22 | Motorola Mobility Llc | Procédé et appareil pour planifier des transmissions en liaison montante d'équipement utilisateur sur une porteuse non autorisée |
| WO2017147513A1 (fr) * | 2016-02-25 | 2017-08-31 | Intel IP Corporation | Détection de transmission de transmissions en liaison montante non planifiées |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2021068228A1 (fr) * | 2019-10-12 | 2021-04-15 | Qualcomm Incorporated | Configuration de signal de référence de démodulation pour de multiples configurations de canal physique partagé de liaison montante d'autorisation configurée |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11483820B2 (en) | Data transmission method, terminal device, and network device | |
| KR102421611B1 (ko) | Lte 업링크 송신들의 레이턴시를 감소시키기 위한 방법 및 장치 | |
| KR102308624B1 (ko) | Lte 업링크 송신들의 레이턴시를 감소시키기 위한 방법 및 장치 | |
| KR101971410B1 (ko) | Lte 업링크 송신들의 레이턴시를 감소시키기 위한 방법 및 장치 | |
| CN107534978B (zh) | 物理下行链路控制和数据信道的物理资源块分配 | |
| US11425755B2 (en) | Method and apparatus for identifying uplink signal transmission timing in wireless communication system | |
| CA3061633A1 (fr) | Procede et dispositif de configuration de faisceau | |
| CN113647179A (zh) | 在无线通信系统中用于基于无授权的数据传输的方法和装置 | |
| CN106664689B (zh) | 一种物理下行控制信道的传输方法及装置 | |
| EP3874645A1 (fr) | Systèmes de retransmission et optimisations pour des ressources de liaison montante préconfigurées | |
| WO2018010103A1 (fr) | Procédé et équipement terminal servant à transmettre des données | |
| EP3695541B1 (fr) | Configuration de pucch avec taille de livre de codes de harq | |
| CN109391355B (zh) | 无线通信的方法、芯片和系统 | |
| CN109672506B (zh) | 数据传输的确认方法及设备 | |
| US11122601B2 (en) | Buffer status report sending method, terminal device, and network device | |
| CN109842479B (zh) | 在非授权传输中识别用户设备的方法、装置、设备及系统 | |
| CN113517959B (zh) | 一种反馈信息的发送方法、装置及存储介质 | |
| KR20220050766A (ko) | 통신 시스템에서의 브로드캐스트 신호의 송수신 방법 및 장치 | |
| CN111885715B (zh) | 信道传输方法及相关设备 | |
| WO2019105330A1 (fr) | Procédé d'identification d'équipement utilisateur dans une transmission sans autorisation, appareil, dispositif et système | |
| CN114982168B (zh) | 通信方法及装置 | |
| JP7243010B2 (ja) | キャリアアグリゲーションシステムの通信方法、通信装置、通信システム、コンピュータプログラム、およびコンピュータ可読記憶媒体 | |
| US20180343099A1 (en) | Data transmission method, terminal device, and network device | |
| JP6265449B2 (ja) | 通信方法、基地局およびユーザ機器 | |
| KR20160134497A (ko) | 면허 및 비면허 대역을 지원하는 네트워크에서 통신 노드의 동작 방법 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18882921 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 18882921 Country of ref document: EP Kind code of ref document: A1 |