Method and apparatus for transmitting and receiving bypass control information in wireless communication system

文档序号:1967198 发布日期:2021-12-14 浏览:15次 中文

阅读说明:本技术 在无线通信系统中发送和接收旁路控制信息的方法和装置 (Method and apparatus for transmitting and receiving bypass control information in wireless communication system ) 是由 吕贞镐 柳贤锡 申哲圭 方钟絃 朴成珍 吴振荣 于 2020-04-29 设计创作,主要内容包括:提供了一种用于将支持超第四代(4G)系统的更高数据速率的第五代(5G)通信系统与物联网(IoT)技术融合的通信方法和系统。本公开可以被应用于基于5G通信技术和IoT相关技术的智能服务,诸如智能家居、智能建筑、智能城市、智能汽车、联网汽车、医疗保健、数字教育、智能零售、安全和安保服务。本公开提供了一种用于在旁路通信中高效发送和接收控制信息的方法和装置。(A communication method and system for merging a fifth generation (5G) communication system supporting a higher data rate than a fourth generation (4G) system with internet of things (IoT) technology is provided. The present disclosure may be applied to smart services based on 5G communication technologies and IoT related technologies, such as smart homes, smart buildings, smart cities, smart cars, networked cars, healthcare, digital education, smart retail, security and security services. The present disclosure provides a method and apparatus for efficiently transmitting and receiving control information in bypass communication.)

1. A method performed by a first terminal in a communication system, the method comprising:

identifying second bypass control information (SCI) for transmitting bypass data;

identifying a first SCI for sending the bypass data based on the second SCI;

identifying resources of the first SCI and the second SCI; and

transmitting the first SCI and the second SCI to a second terminal on the identified resources,

wherein the resources of the second SCI are identified based on the number of encoding symbols of the second SCI, and

wherein the number of code symbols of the second SCI is identified based on a parameter corresponding to the number of one or more resource elements in a resource block to which a last code symbol of the second SCI is mapped.

2. The method of claim 1, wherein the first and second light sources are selected from the group consisting of,

wherein the number of code symbols of the second SCI is further identified based on a beta offset,

wherein the beta offset is indicated by a bit field included in the first SCI and the bit field indicates one of one or more values configured by resource pool configuration information, and

wherein the number of encoding symbols of the second SCI is further identified based on a parameter a configured by the resource pool configuration information, wherein the parameter a is used to control the number of encoding symbols of the second SCI.

3. The method of claim 1, wherein the first and second light sources are selected from the group consisting of,

wherein the number of encoding symbols of the second SCI is based on the parameter and onAndis identified by the sum of the minimum values identified in (a),

wherein O isSCI2Is the number of bits of the second SCI bit, LSCI2Is the number of Cyclic Redundancy Check (CRC) bits, β, of the second SCIoffset SCI2Is the offset of beta, alpha is a parameter,is the sum of the sizes of one or more code blocks corresponding to the bypass data, Nsymbol PSSCHIs the number of symbols of a physical bypass shared channel (PSSCH) corresponding to the bypass data, and Msc SCI2(l) Is the number of one or more resource elements that can be used to transmit the second SCI in an Orthogonal Frequency Division Multiplexing (OFDM) symbol.

4. The method of claim 1 wherein the number of encoding symbols of the second SCI is based on the parameter and onAndis identified by the sum of the minimum values identified in (a),

wherein, OSCI2Is the number of bits of the second SCI bit, LSCI2Is the number of Cyclic Redundancy Check (CRC) bits, β, of said second SCIoffset SCI2Is a beta offset, alpha is a parameter, R is a physical side corresponding to the bypass dataCoding rate, Q, of the road shared channel (PSSCH)mIs the modulation order of the PSSCH, Nsymbol PSSCHIs the number of symbols of the PSSCH, and Msc SCI2(l) Is the number of one or more resource elements that can be used to transmit the second SCI in an Orthogonal Frequency Division Multiplexing (OFDM) symbol.

5. A method performed by a first terminal in a communication system, the method comprising:

receiving first bypass control information (SCI) for receiving bypass data from the second terminal;

identifying resources of a second SCI for receiving the bypass data based on the first SCI; and

performing decoding of the second SCI based on the identified resources,

wherein the identified resources of the second SCI are identified based on a number of code symbols of the second SCI, and

wherein the number of code symbols of the second SCI is identified based on a parameter corresponding to the number of one or more resource elements in a resource block to which a last code symbol of the second SCI is mapped.

6. The method of claim 5, wherein the first and second light sources are selected from the group consisting of,

wherein the number of code symbols of the second SCI is further identified based on a beta offset,

wherein the beta offset is indicated by a bit field included in the first SCI and the bit field indicates one of one or more values configured by resource pool configuration information, and

wherein the number of encoding symbols of the second SCI is further identified based on a parameter a configured by the resource pool configuration information, wherein the parameter a is used to control the number of encoding symbols of the second SCI.

7. The method of claim 5, wherein the first and second light sources are selected from the group consisting of,

wherein the number of code symbols of the second SCIIs based on the parameters and onAndis identified by the sum of the minimum values identified in (a),

wherein O isSCI2Is the number of bits of the second SCI bit, LSCI2Is the number of Cyclic Redundancy Check (CRC) bits, β, of the second SCIoffset SCI2Is the offset of beta, alpha is a parameter,is the sum of the sizes of one or more code blocks corresponding to the bypass data, Nsymbol PSSCHIs the number of symbols of a physical bypass shared channel (PSSCH) corresponding to the bypass data, and Msc SCI2(l) Is the number of one or more resource elements that can be used to transmit the second SCI in an Orthogonal Frequency Division Multiplexing (OFDM) symbol.

8. The method of claim 5 wherein the number of encoding symbols for the second SCI is based on the parameter and onAndis identified by the sum of the minimum values identified in (a),

wherein, OSCI2Is the number of bits of the second SCI bit, LSCI2Is the number of Cyclic Redundancy Check (CRC) bits, β, of said second SCIoffset SCI2Is a beta offset, alpha is a parameter, R is a coding rate of a physical bypass shared channel (PSSCH) corresponding to the bypass data, QmIs the modulation order of the PSSCH, Nsymbol PSSCHIs the number of symbols of the PSSCH, and Msc SCI2(l) Is the number of one or more resource elements that can be used to transmit the second SCI in an Orthogonal Frequency Division Multiplexing (OFDM) symbol.

9. A first terminal in a communication system, the first terminal comprising:

a transceiver; and

at least one processor coupled with the transceiver and configured to:

identifying second bypass control information (SCI) for transmitting bypass data,

identifying a first SCI for sending the bypass data based on the second SCI,

identifying resources of said first SCI and said second SCI, an

Transmitting the first SCI and the second SCI to a second terminal on the identified resources,

wherein the resources of the second SCI are identified based on the number of encoding symbols of the second SCI, and

Wherein the number of code symbols of the second SCI is identified based on a parameter corresponding to the number of one or more resource elements in a resource block to which a last code symbol of the second SCI is mapped.

10. The first terminal of claim 9,

wherein the number of code symbols of the second SCI is further identified based on a beta offset,

wherein the beta offset is indicated by a bit field included in the first SCI and the bit field indicates one of one or more values configured by resource pool configuration information, and

wherein the number of encoding symbols of the second SCI is further identified based on a parameter a configured by the resource pool configuration information, wherein the parameter a is used to control the number of encoding symbols of the second SCI.

11. The first terminal of claim 9,

wherein the number of encoding symbols of the second SCI is based on the parameter and onAndis identified by the sum of the minimum values identified in (a),

wherein O isSCI2Is the number of bits of the second SCI bit, LSCI2Is the number of Cyclic Redundancy Check (CRC) bits, β, of the second SCIoffset SCI2Is the offset of beta, alpha is a parameter,is the sum of the sizes of one or more code blocks corresponding to the bypass data, N symbol PSSCHIs the number of symbols of a physical bypass shared channel (PSSCH) corresponding to the bypass data, and Msc SCI2(l) Is the number of one or more resource elements that can be used to transmit the second SCI in an Orthogonal Frequency Division Multiplexing (OFDM) symbol.

12. The first terminal of claim 9,

wherein the number of encoding symbols of the second SCI is based on the parameter and onAndis identified by the sum of the minimum values identified in (a),

wherein, OSCI2Is the number of bits of the second SCI bit, LSCI2Is the number of Cyclic Redundancy Check (CRC) bits, β, of said second SCIoffset SCI2Is a beta offset, alpha is a parameter, R is a coding rate of a physical bypass shared channel (PSSCH) corresponding to the bypass data, QmIs the modulation order of the PSSCH, Nsymbol PSSCHIs the number of symbols of the PSSCH, and Msc SCI2(l) Is the number of one or more resource elements that can be used to transmit the second SCI in an Orthogonal Frequency Division Multiplexing (OFDM) symbol.

13. A first terminal in a communication system, the first terminal comprising:

a transceiver; and

at least one processor coupled with the transceiver and configured to:

receiving first bypass control information (SCI) for receiving bypass data from the second terminal,

identifying resources of a second SCI for receiving the bypass data based on the first SCI, an

Performing decoding of the second SCI based on the identified resources,

wherein the identified resources of the second SCI are identified based on a number of code symbols of the second SCI, and

wherein the number of code symbols of the second SCI is identified based on a parameter corresponding to the number of one or more resource elements in a resource block to which a last code symbol of the second SCI is mapped.

14. The first terminal of claim 13,

wherein the number of code symbols of the second SCI is further identified based on a beta offset,

wherein the beta offset is indicated by a bit field included in the first SCI and the bit field indicates one of one or more values configured by resource pool configuration information, and

wherein the number of encoding symbols of the second SCI is further identified based on a parameter a configured by the resource pool configuration information, wherein the parameter a is used to control the number of encoding symbols of the second SCI.

15. The first terminal of claim 13,

wherein the number of encoding symbols of the second SCI is based on the parameter and onAndis identified by the sum of the minimum values identified in (a),

Wherein O isSCI2Is the number of bits of the second SCI bit, LSCI2Is the number of Cyclic Redundancy Check (CRC) bits, β, of the second SCIoffset SCI2Is the offset of beta, alpha is a parameter,is the sum of the sizes of one or more code blocks corresponding to the bypass data, Nsymbol PSSCHIs the number of symbols of a physical bypass shared channel (PSSCH) corresponding to the bypass data, and Msc SCI2(l) Is the number of one or more resource elements that can be used to transmit the second SCI in an Orthogonal Frequency Division Multiplexing (OFDM) symbol, or

Wherein the number of encoding symbols of the second SCI is based on the parameter and onAndis identified by the sum of the minimum values identified in (a),

wherein, OSCI2Is the number of bits of the second SCI bit, LSCI2Is the number of Cyclic Redundancy Check (CRC) bits, β, of said second SCIoffset SCI2Is a beta offset, alpha is a parameter, R is a coding rate of a physical bypass shared channel (PSSCH) corresponding to the bypass data, QmIs the modulation order of the PSSCH, Nsymbol PSSCHIs the number of symbols of the psch,and Msc SCI2(l) Is the number of one or more resource elements that can be used to transmit the second SCI in an Orthogonal Frequency Division Multiplexing (OFDM) symbol.

Technical Field

The present disclosure relates to a wireless communication system, and to a method and apparatus for transmitting and receiving control information in a bypass. More particularly, the present disclosure relates to an operation between terminals, a resource mapping method, and a decoding method in case of applying a method for separately transmitting and receiving control information in two stages in a bypass.

Background

In order to meet the increasing demand for wireless data traffic since the deployment of fourth generation (4G) communication systems, efforts have been made to develop improved fifth generation (5G) or pre-5G communication systems. Accordingly, the 5G or pre-5G communication system is also referred to as a "super 4G network" or a "post Long Term Evolution (LTE) system". Consider implementing a 5G communication system in a higher frequency (mmWave) band (e.g., 60GHz band) in order to achieve higher data rates. In order to reduce propagation loss of radio waves and increase transmission distance, beamforming, massive Multiple-Input Multiple-Output (MIMO), Full-Dimensional MIMO (FD-MIMO), array antenna, analog beamforming, and massive antenna techniques are discussed in the 5G communication system. In addition, in the 5G communication system, development of improvement of a system Network is being performed based on advanced small cells, a cloud Access Network (RAN), an ultra-dense Network, Device-to-Device (D2D) communication, a wireless backhaul, a mobile Network, cooperative communication, Coordinated Multi-point (CoMP), receiver interference cancellation, and the like. In the 5G system, hybrid Frequency Shift Keying (FSK) and QAM Modulation (FQAM) and Sliding Window Superposition Coding (SWSC) as Advanced Coding Modulation (ACM) and Filter Bank Multi-Carrier (FBMC), Non-Orthogonal Multiple Access (NOMA) and Sparse Code Multiple Access (Sparse Code Multiple Access, SCMA) as Advanced Access technologies have been developed.

The Internet, which is a human-centric connected network in which humans generate and consume information, is now evolving into the Internet of Things (IoT) in which distributed entities such as Things exchange and process information without human intervention. Internet of Everything (IoE) has emerged as a combination of IoT technology and big data processing technology through connection with a cloud server. Since IoT implementations require technical elements such as "sensing technology", "wired/wireless Communication and network infrastructure", "service interface technology", and "security technology", sensor networks, Machine-to-Machine (M2M) Communication, Machine Type Communication (MTC), and the like have been recently studied. Such IoT environments can provide intelligent internet technology services that create new value for human life by collecting and analyzing data generated among connected things. IoT may be applied to various fields including smart homes, smart buildings, smart cities, smart cars or networked cars, smart grids, healthcare, smart homes, and advanced medical services through fusion and combination between existing Information Technology (IT) and various industrial applications.

Consistent with this, various attempts have been made to apply the 5G communication system to the IoT network. For example, technologies such as sensor networks, Machine Type Communication (MTC), and machine-to-machine (M2M) communication may be implemented through beamforming, MIMO, and array antennas. The application of cloud radio access networks (cloud RANs), which are the big data processing technologies described above, can also be considered as an example of the convergence between 5G technologies and IoT technologies.

The above information is presented merely as background information to aid in understanding the present disclosure. No determination is made as to whether any of the above can be used as prior art with respect to the present disclosure, nor is an assertion made.

Disclosure of Invention

Technical problem

The present disclosure relates to a wireless communication system, and to a method and apparatus for transmitting and receiving control information in a bypass. More particularly, the present disclosure relates to an operation between terminals, a resource mapping method, and a decoding method in case of applying a method for separately transmitting and receiving control information in two stages in a bypass. In a method for transmitting and receiving control information in two stages, a receiving terminal decodes first control information, decodes second control information, and then decodes bypass data based on the second control information and the first control information. In this method, a method for mapping and transmitting the second control information by the transmitting terminal and a method for finding and decoding a mapping position of the second control information by the receiving terminal are necessary.

Problem solving scheme

Aspects of the present disclosure address at least the above problems and/or disadvantages and provide at least the advantages described below. Accordingly, an aspect of the present disclosure is to provide a wireless communication system and a method and apparatus for transmitting and receiving control information in a bypass.

According to an aspect of the present disclosure, there is provided a method performed by a first terminal in a communication system. The method includes identifying second bypass control information (SCI) for transmitting bypass data, identifying a first SCI for transmitting the bypass data based on the second SCI, identifying resources of the first SCI and the second SCI, and transmitting the first SCI and the second SCI to a second terminal on the identified resources, wherein the resources of the second SCI are identified based on a number of code symbols of the second SCI, and wherein the number of code symbols of the second SCI is identified based on a parameter corresponding to a number of one or more resource elements in a resource block to which a last code symbol of the second SCI is mapped.

According to another aspect of the present disclosure, there is provided a method performed by a first terminal in a communication system. The method includes receiving a first SCI for receiving bypass data from a second terminal, identifying resources for receiving a second SCI for the bypass data based on the first SCI, and performing decoding of the second SCI based on the identified resources, wherein the identified resources of the second SCI are identified based on a number of coded symbols of the second SCI, and wherein the number of coded symbols of the second SCI is identified based on a parameter corresponding to a number of one or more resource elements in a resource block to which a last coded symbol of the second SCI is mapped.

According to another aspect of the present disclosure, there is provided a first terminal in a communication system. The first terminal includes a transceiver and at least one processor coupled with the transceiver and configured to identify a second SCI for transmitting bypass data, identify a first SCI for transmitting the bypass data based on the second SCI, identify resources of the first SCI and the second SCI, and transmit the first SCI and the second SCI to the second terminal on the identified resources, wherein the resources of the second SCI are identified based on a number of code symbols of the second SCI, and wherein the number of code symbols of the second SCI is identified based on a parameter corresponding to a number of one or more resource elements in a resource block to which a last code symbol of the second SCI is mapped.

According to another aspect of the present disclosure, there is provided a first terminal in a communication system. The first terminal includes a transceiver and at least one processor coupled with the transceiver and configured to receive a first SCI for receiving bypass data from a second terminal, identify resources for receiving a second SCI for the bypass data based on the first SCI, and perform decoding of the second SCI based on the identified resources, wherein the identified resources of the second SCI are identified based on a number of code symbols of the second SCI, and wherein the number of code symbols of the second SCI is identified based on a parameter corresponding to a number of one or more resource elements in a resource block to which a last code symbol of the second SCI is mapped.

According to aspects of the present disclosure, smooth bypass transmission and reception becomes possible by providing a method for mapping and decoding second control information and a method and apparatus for calculating the number of coded bits after applying channel coding.

Other aspects, advantages, and salient features of the disclosure will become apparent to those skilled in the art from the following detailed description, which, taken in conjunction with the annexed drawings, discloses various embodiments of the disclosure.

Advantageous effects of the invention

According to aspects of the present disclosure, smooth bypass transmission and reception becomes possible by providing a method for mapping and decoding second control information and a method and apparatus for calculating the number of coded bits after applying channel coding. Other aspects, advantages, and salient features of the disclosure will become apparent to those skilled in the art from the following detailed description, which, taken in conjunction with the annexed drawings, discloses various embodiments of the disclosure.

Drawings

The above and other aspects, features and advantages of particular embodiments of the present disclosure will become more apparent from the following description when taken in conjunction with the accompanying drawings, in which:

fig. 1 is a diagram illustrating a basic structure of a time-frequency domain as a radio resource region in which data or a control channel is transmitted on a downlink or an uplink in a New Radio (NR) system according to an embodiment of the present disclosure;

Fig. 2A is a diagram illustrating allocation of frequency and time resources for information transmission in an NR system according to an embodiment of the present disclosure;

fig. 2B is a diagram illustrating allocation of frequency and time resources for information transmission in an NR system according to an embodiment of the present disclosure;

fig. 3 is a diagram illustrating a process in which one transport block is divided into several code blocks and a Cyclic Redundancy Check (CRC) is added to each code block according to an embodiment of the present disclosure;

fig. 4 is a diagram illustrating one-to-one communication performed as unicast communication between two terminals through bypass according to an embodiment of the present disclosure;

fig. 5 is a diagram illustrating multicast communication in which one terminal transmits common data to a plurality of terminals through a bypass according to an embodiment of the present disclosure;

fig. 6 is a diagram illustrating a procedure in which a terminal having received common data through multicast transmits information on success or failure of data reception to a terminal having transmitted data according to an embodiment of the present disclosure;

fig. 7 is a diagram illustrating a state in which a synchronization signal and a physical broadcast channel of an NR system are mapped to each other in a frequency domain and a time domain according to an embodiment of the present disclosure;

fig. 8 is a diagram illustrating what symbols a synchronization signal/physical broadcast channel (SS/PBCH) block is mapped to in a slot according to an embodiment of the present disclosure;

Fig. 9 is a diagram illustrating symbols on which SS/PBCH blocks may be transmitted according to subcarrier spacing according to an embodiment of the present disclosure;

fig. 10 is a diagram illustrating symbols on which SS/PBCH blocks may be transmitted according to subcarrier spacing according to an embodiment of the present disclosure;

fig. 11 is a diagram illustrating resource pools defined as sets of resources in time and frequency for bypassing transmission and reception, according to an embodiment of the present disclosure;

fig. 12 is a diagram illustrating a scheduling resource allocation in bypass (mode 1) method according to an embodiment of the present disclosure;

fig. 13 is a diagram illustrating a UE autonomous resource allocation in bypass (mode 2) method according to an embodiment of the present disclosure;

fig. 14A is a diagram illustrating a method for configuring a sensing window a of a User Equipment (UE) autonomous resource allocation for bypass (mode 2) according to an embodiment of the present disclosure;

fig. 14B is a diagram illustrating a method for configuring a sensing window B of UE autonomous resource allocation for bypass (mode 2) according to an embodiment of the present disclosure;

fig. 14C is a diagram illustrating a method for configuring sensing window a and sensing window B for bypassed UE autonomous resource allocation (mode 2) according to an embodiment of the present disclosure;

fig. 15 is a diagram illustrating a mode 1 method as a method for performing a bypass data transmission by receiving scheduling information from a base station according to an embodiment of the present disclosure;

Fig. 16 is a diagram illustrating a mode 2 method as a method in which a terminal performs bypass data transmission without scheduling of a base station according to an embodiment of the present disclosure;

fig. 17 is a diagram illustrating a method in which a Long Term Evolution (LTE) system in the related art enables a terminal to distinguish its own control signal by allocating a Radio Network Temporary Identifier (RNTI) having a length of 16 bits to the terminal and transmitting the control signal by masking the allocated RNTI value with a 16-bit CRC added to the control signal, according to an embodiment of the present disclosure;

fig. 18 is a diagram illustrating that a 24-bit CRC is added to Downlink Control Information (DCI) information bits and a 16-bit RNTI is masked (mask) with a part of the CRC in an NR system according to an embodiment of the present disclosure;

fig. 19 is a flowchart illustrating a method of determining bit field values of first control information and second control information by a transmitting terminal according to an embodiment of the present disclosure;

fig. 20 is a flowchart illustrating a method in which a receiving terminal continuously decodes first control information and second control information and decodes a physical bypass shared channel (pscch) based thereon according to an embodiment of the present disclosure;

fig. 21 is a diagram illustrating a method for transmitting second control information on a psch according to an embodiment of the present disclosure;

Fig. 22 is a diagram illustrating mapping of second control information according to an embodiment of the present disclosure;

fig. 23 is a diagram illustrating mapping of second control information according to an embodiment of the present disclosure;

fig. 24 is a diagram illustrating an operation in which second control information starts a first DMRS symbol among DMRSs mapped to a pscch of a bypass slot according to an embodiment of the present disclosure;

fig. 25 is a diagram illustrating an operation of a first DMRS symbol transmitted after a PSCCH that is a control channel among DMRSs where second control information starts to be mapped to a PSCCH of a bypass slot according to an embodiment of the present disclosure;

fig. 26 is a diagram illustrating an operation of a first DMRS symbol transmitted after a PSCCH that is a control channel among DMRSs where second control information starts to be mapped to a PSCCH of a bypass slot according to an embodiment of the present disclosure;

fig. 27 is a diagram illustrating an operation of a first DMRS symbol transmitted after a PSCCH that is a control channel among DMRSs where second control information starts to be mapped to a PSCCH of a bypass slot according to an embodiment of the present disclosure;

fig. 28 is a diagram illustrating an operation in which second control information starts to be mapped to a symbol immediately before a first DMRS symbol transmitted after a PSCCH that is a control channel among DMRSs of a PSCCH of a bypass slot according to an embodiment of the present disclosure;

FIG. 29 is a diagram illustrating the mapping of PSSCH to bypass slots in accordance with an embodiment of the disclosure;

FIG. 30 is a diagram illustrating mapping of PSSCH to bypass slots in accordance with an embodiment of the disclosure;

fig. 31 is a diagram illustrating mapping of second control information to a portion of Resource Blocks (RBs) according to an embodiment of the present disclosure;

fig. 32 is a diagram illustrating mapping of second control information to a portion of an RB according to an embodiment of the present disclosure;

fig. 33 is a block diagram illustrating an internal structure of a terminal according to an embodiment of the present disclosure; and is

Fig. 34 is a block diagram illustrating an internal structure of a base station according to an embodiment of the present disclosure.

Throughout the drawings, the same reference numerals will be understood to refer to the same parts, components and structures.

Detailed Description

The following description with reference to the accompanying drawings is provided to assist in a comprehensive understanding of various embodiments of the disclosure as defined by the claims and their equivalents. It includes various specific details to assist in this understanding, but these specific details are to be regarded as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the various embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Moreover, descriptions of well-known functions and constructions may be omitted for clarity and conciseness.

The terms and words used in the following description and claims are not limited to the written meaning, but are used only by the inventor to enable a clear and consistent understanding of the disclosure. Accordingly, it should be apparent to those skilled in the art that the following description of the various embodiments of the present disclosure is provided for illustration only and not for the purpose of limiting the disclosure as defined by the appended claims and their equivalents.

It will be understood that the singular forms "a," "an," and "the" include plural referents unless the context clearly dictates otherwise. Thus, for example, reference to a "component surface" includes reference to one or more of such surfaces.

In a new radio access technology (NR), which is a new fifth generation (5G) communication, various services have been designed so that they can be freely multiplexed on time and frequency resources, and thus, a waveform/parameter set and a reference signal can be dynamically or freely allocated to the corresponding service as needed. In order to provide an optimal service to a terminal in wireless communication, it is important to optimize data transmission by measuring channel quality and an interference amount, and thus it is necessary to measure an accurate channel state. However, in the case of a 5G channel, the channel and interference characteristics vary greatly according to services, as opposed to 4G communications where the channel and interference characteristics do not vary greatly according to frequency resources, and therefore it is necessary to support a subset of the Frequency Resource Group (FRG) dimension that enables channel and interference characteristics to be measured separately. Meanwhile, in the NR system, supported services may be classified into classes of enhanced mobile broadband (eMBB), large-scale machine type communication (mtc), and ultra-reliable and low-delay communication (URLLC). The eMBB may be considered as a service intended for high-speed transmission of large-capacity data, the mtc may be considered as a service intended for minimizing terminal power and access of multiple terminals, and the URLLC may be considered as a service intended for high reliability and low delay. Different requirements may be applied according to the kind of service applied to the terminal.

Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings.

In describing the embodiments of the present disclosure, explanations of technical contents that are well known in the art to which the present disclosure pertains and are not directly related to the present disclosure will be omitted. This is to more clearly convey the subject matter of the present disclosure by omitting unnecessary explanation without obscuring the subject matter.

In the same manner, in the drawings, the size and relative size of some constituent elements may be exaggerated, omitted, or briefly shown. In addition, the size of each constituent element does not completely reflect the actual size thereof. In the drawings, like reference numerals are used for like and corresponding elements throughout the various figures.

Aspects and features of the present disclosure and methods for accomplishing the same will become apparent by reference to the embodiments that will be described with reference to the accompanying drawings. However, the present disclosure is not limited to the embodiments disclosed below, and may be embodied in various forms. The matters defined in the description, such as the detailed construction and elements, are nothing but specific details provided to assist those of ordinary skill in the art in a comprehensive understanding of the disclosure, and the disclosure is defined only within the scope of the appended claims. Throughout the description of the present disclosure, like reference numerals are used for like elements across the various figures.

In such cases, it will be understood that each block of the flowchart illustrations, and combinations of blocks in the flowchart illustrations, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart block or blocks. These computer program instructions may also be stored in a computer usable or computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer usable or computer-readable memory produce an article of manufacture including instruction means that implement the function specified in the flowchart block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operations to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide operations for implementing the functions specified in the flowchart block or blocks.

Further, each block of the flowchart illustrations may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the blocks may occur out of the order. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.

In this case, the term "unit" used in the embodiments means, but is not limited to, a software or hardware component such as a Field Programmable Gate Array (FPGA) or an Application Specific Integrated Circuit (ASIC) that performs a specific task. However, "unit" is not meant to be limited to software or hardware. The term "cell" may advantageously be configured to reside on the addressable storage medium and configured to execute on one or more processors. Thus, for example, a unit may include components such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables. The functionality provided in the components and the "cells" may be combined into fewer components and "cells" or further separated into additional components and "cells". Furthermore, the components and the "unit" may be implemented as one or more CPUs in an operating device or a secure multimedia card. Further, in one embodiment, a "unit" may include one or more processors.

A wireless communication system was originally developed to provide voice-oriented services, but it has been extended to, for example, broadband wireless communication systems that provide high-speed and high-quality packet data services and communication standards such as 3GPP high-speed packet access (HSPA), Long Term Evolution (LTE) or evolved universal terrestrial radio access (E-UTRA), LTE-advanced (LTE-a), 3GPP2 High Rate Packet Data (HRPD), Ultra Mobile Broadband (UMB), and IEEE 802.16E. Further, for fifth generation wireless communication systems, 5G or New Radio (NR) communication standards have been established.

In the NR system, which is a representative example of the broadband wireless communication system, a Downlink (DL) and an Uplink (UL) employ an Orthogonal Frequency Division Multiplexing (OFDM) scheme. More specifically, the downlink employs a cyclic prefix OFDM (CP-OFDM) scheme, and the Uplink (UL) employs a discrete Fourier transform spread OFDM (DFT-S-OFDM) scheme in addition to the CP-OFDM. The uplink means a radio link in which a terminal (or User Equipment (UE) or a Mobile Station (MS)) transmits data or control signals to a base station (or a gbodeb or a Base Station (BS)), and the downlink means a radio link in which a base station transmits data or control signals to a terminal. Such a multiple access scheme may distinguish data or control information of individual users from each other by allocating and operating time-frequency resources to carry the data or control information of the individual users such that the time-frequency resources do not overlap each other, i.e., in order to establish orthogonality.

The NR system employs a hybrid automatic repeat request (HARQ) scheme in which a physical layer retransmits corresponding data if a decoding failure occurs during initial transmission. According to the HARQ scheme, if a receiver does not accurately decode data, the receiver may transmit information (negative acknowledgement (NACK)) for informing a transmitter of decoding failure, and the transmitter may cause a physical layer to retransmit corresponding data. The receiver can combine the data retransmitted by the transmitter with the previous data whose decoding has failed to improve data reception performance. In addition, if the receiver has accurately decoded data, the HARQ scheme may transmit information (acknowledgement (ACK)) for notifying the success of decoding to the transmitter so that the transmitter may transmit new data.

Fig. 1 is a diagram illustrating a basic structure of a time-frequency domain as a radio resource region in which data or a control channel is transmitted on a downlink or an uplink in an NR system according to an embodiment of the present disclosure.

Referring to fig. 1, in the radio frame 114, the horizontal axis represents the time domain, and the vertical axis represents the frequency domain. In the time domain, the minimum transmission unit is an OFDM symbol, and NsymbOne OFDM symbol 102 constitutes one slot 106. The length of the subframe is defined as 1.0ms and the radio frame is defined as 10ms, the minimum transmission unit is a subcarrier in the frequency domain, and the transmission bandwidth of the entire system includes N in total BWAnd subcarriers 104.

In the time-frequency domain, the basic unit of resources is a Resource Element (RE)112, which may be represented by an OFDM symbol index and a subcarrier index. Resource Block (RB)108 or Physical Resource Block (PRB) consisting of N in the frequency domainRBA number of consecutive subcarriers 110. Generally, the minimum transmission unit of data is the RB as described above. In NR systems, typically Nsymb14 and NRB12 and NBWProportional to the bandwidth of the system transmission band. The data rate may increase in proportion to the number of RBs scheduled to the terminal.

In the case of an FDD system operating to distinguish a downlink and an uplink by means of frequency in an NR system, a downlink transmission bandwidth and an uplink transmission bandwidth may be different from each other. The channel bandwidth indicates an RF bandwidth corresponding to a system transmission bandwidth. Tables 1 and 2 present partial correspondence relationships between system transmission bandwidths, subcarrier spacings, and channel bandwidths defined by NR systems in frequency bands lower than 6GHz and frequency bands higher than 6 GHz. For example, an NR system having a channel bandwidth of 100MHz and a subcarrier spacing of 30kHz has a transmission bandwidth including 273 RBs. Hereinafter, N/a may be a bandwidth-subcarrier combination not supported by the NR system.

[ TABLE 1 ]

[ TABLE 2 ]

In the NR system, the frequency range may be defined separately by FR1 and FR2, as shown in table 3 below.

[ TABLE 3 ]

Frequency range name Corresponding frequency range
FR1 450MHz-7125MHz
FR2 24250MHz-52600MHz

As described above, the ranges of FR1 and FR2 may be applied differently. As an example, the frequency range of FR1 can be varied and applied from 450MHz to 6000 MHz.

In the NR system, scheduling information on downlink data or uplink data is transferred from a base station to a terminal through Downlink Control Information (DCI). The DCI may be defined according to various formats, and it may correspond to whether the DCI is scheduling information (UL grant) on uplink data or scheduling information (DL grant) on downlink data according to each format, whether the DCI is a compact DCI having control information with a small size, whether spatial multiplexing using multiple antennas is applied, and whether the DCI is DCI for power control. For example, DCI format 1-1, which is scheduling control information (DL grant) on downlink data, may include at least one piece of the following control information.

-carrier indicator: indicating on what frequency carrier the corresponding DCI is transmitted.

-DCI format indicator: this is an indicator distinguishing whether the corresponding DCI is for downlink or uplink.

-a bandwidth part (BWP) indicator: indicating from what BWP the corresponding DCI is transmitted.

-frequency domain resource allocation: indicating the RBs of the frequency domain allocated for data transmission. The resources represented are determined according to the system bandwidth and the resource allocation scheme.

-time domain resource allocation: indicating from what OFDM symbol of what slot the data-related channel is to be transmitted.

-VRB to PRB mapping: indicates in what scheme the virtual rb (vrb) index and the physical rb (prb) index are mapped to each other.

Modulation and Coding Scheme (MCS): indicating the modulation scheme and the size of the transport block as data intended to be transmitted.

-HARQ process number: indicating the process number of HARQ.

-new data indicator: indicating whether HARQ was initially transmitted or retransmitted.

-redundancy version: indicating the redundancy version of HARQ.

-transmit power control (TCP) commands for the Physical Uplink Control Channel (PUCCH): a transmission power control command for the PUCCH which is an uplink control channel is indicated.

In case of data transmission through a Physical Uplink Shared Channel (PUSCH) as described above, the time domain resource allocation may be delivered through information on a slot on which the PUSCH is transmitted, a starting OFDM symbol position S on a corresponding slot, and the number L of symbols to which the PUSCH is mapped. As described above, position S may be a relative position from the start of a slot, L may be the number of consecutive symbols, and S and L may be determined by a Start and Length Indicator Value (SLIV) as defined below.

If (L-1) ≦ 7, SLIV ≦ 14 · (L-1) + S

Otherwise SLIV is 14 · (14-L +1) + (14-1-S)

Wherein L is more than 0 and less than or equal to 14-S

In the NR system, a terminal may be configured with information about a SLIV value, a PUSCH mapping type, and a PUSCH transmission slot in one row through Radio Resource Control (RRC) configuration (for example, the above information may be configured in the form of a table). Thereafter, in the time domain resource allocation of DCI, the base station may deliver information on the SLIV value, PUSCH mapping type, and PUSCH transmission slot to the terminal by indicating an index value in a configured table.

In the NR system, as the PUSCH mapping type, type a and type B have been defined. According to the PUSCH mapping type a, the first symbol of the DMRS symbol is located on the second OFDM symbol or the third OFDM symbol of the slot. According to the PUSCH mapping type B, a first symbol of the DMRS symbol is located on a first OFDM symbol in a time domain resource allocated through PUSCH transmission.

The PUSCH resource mapping method described above may also be applied to downlink data transmission through a Physical Downlink Shared Channel (PDSCH) in a similar manner. In the NR system, a PDSCH mapping type may be defined as type a and type B, and particularly, in the mapping type B, a first symbol of DMRS symbols may be located on a first symbol of PDSCH.

The DCI may pass through a channel coding and modulation process and may be transmitted on a physical downlink control channel (PUCCH) which is a downlink physical control channel. In the present disclosure, a case where control information is transmitted on a PDCCH or a PUCCH may be expressed as a case where the PDCCH or the PUCCH is transmitted. In the same manner, the case where data is transmitted on the PUSCH or PDSCH can be expressed as the case where the PUSCH or PDSCH is transmitted.

In general, DCI is scrambled with a specific Radio Network Temporary Identifier (RNTI) (or terminal identifier) independently of each terminal to which a Cyclic Redundancy Check (CRC) is to be added, channel-coded, and configured as a separate PDCCH to be transmitted. The PDCCH is mapped to a control resource set (CORESET) configured to the terminal to be transmitted.

Downlink data may be transmitted on the PDSCH, which is a physical channel for downlink data transmission. The PDSCH may be transmitted after a control channel transmission interval and scheduling information, such as a detailed mapping position and modulation scheme in the frequency domain, is determined based on DCI transmitted on the PDCCH.

The base station notifies the terminal of a modulation scheme applied to a PDSCH intended to be transmitted to the terminal and a size of data intended to be transmitted (transport block size (TBS)) through an MCS among control information constituting the DCI. In embodiments of the present disclosure, the MCS may include 5 bits or more or less. The TBS corresponds to the size of data (transport block (TB)) that the base station intends to transmit before channel coding for error correction is applied thereto.

In the present disclosure, a Transport Block (TB) may include a Medium Access Control (MAC) header, a MAC Control Element (CE), one or more MAC Service Data Units (SDUs), and padding bits. In addition, the TB may indicate a data unit or a MAC Protocol Data Unit (PDU) delivered from the MAC layer to the physical layer.

The modulation schemes supported in the NR system may be Quadrature Phase Shift Keying (QPSK), 16 quadrature amplitude modulation (16QAM), 64QAM, and 256QAM, and the respective modulation orders Qm correspond to 2, 4, 6, and 8. For example, in the case of QPSK modulation, 2 bits per symbol may be transmitted, and in the case of 16QAM, 4 bits per symbol may be transmitted. Further, in the case of 64QAM, 6 bits per symbol may be transmitted, and in the case of 256QAM, 8 bits per symbol may be transmitted.

Fig. 2A and 2B are diagrams illustrating a state in which data of eMBB, URLLC, and mtc, which are services considered in a 5G or NR system, are allocated frequency-time resources.

Referring to fig. 2A and 2B, it can be identified that frequency and time resources are allocated for information transmission in respective systems.

Fig. 2A is a diagram illustrating allocation of frequency and time resources for information transmission in an NR system according to various embodiments of the present disclosure.

Referring to fig. 2A, data for eMBB, URLLC, and mtc is shown distributed throughout a system frequency band 200. If URLLC data 203, 205, and 207 are generated while allocating and transmitting the eMBB201 and the mtc 209 in a specific frequency band, and it is necessary to transmit the generated URLLC data, the URLLC data 203, 205, and 207 may be transmitted without clearing or transmitting the portion to which the eMBB201 and the mtc 209 have been allocated. Since it is necessary to reduce the delay of URLLC among the above services, URLLC data 203, 205, and 207 can be allocated to a part of resources allocated to the eMBB201 to be transmitted. Of course, if URLLC is additionally allocated and transmitted on the eMBB allocation resources, the eMBB data may not be transmitted on redundant frequency-time resources, and thus transmission performance of the eMBB data may be degraded. In this case, an eMBB data transmission failure due to URLLC allocation may occur.

Fig. 2B is a diagram illustrating allocation of frequency and time resources for information transmission in an NR system.

Referring to fig. 2B, respective sub-bands 252, 254, and 256 obtained by dividing the entire system frequency band 250 may be used for the purpose of transmitting services and data. Information related to the subband configuration may be predetermined and may be transmitted from the base station to the terminal through higher signaling. Further, information related to subbands may optionally be partitioned by a base station or a network node, and a service may be provided to a terminal without transmitting separate subband configuration information to the terminal. Fig. 2B shows a state where sub-band 252 is used to transmit eMBB data (258), sub-band 254 is used to transmit URLLC data (260, 262, and 264), and sub-band 256 is used to transmit mtc data (266).

In embodiments of the present disclosure, a length of a Transmission Time Interval (TTI) for URLLC transmissions may be shorter than a length of a TTI for transmitting eMBB or mtc. Further, a response to information related to URLLC may be transmitted earlier than a response of eMBB or mtc, and thus information may be transmitted and received with low delay. Each type of physical layer channel for transmitting three services or data as described above may have a different structure. For example, at least one of a Transmission Time Interval (TTI) length, a frequency resource allocation unit, a control channel structure, and a data mapping method may be different.

Although three services and three data have been described, there may be more than three services and corresponding data, and even in this case, the disclosure will be applicable.

To illustrate the methods and apparatuses proposed in the embodiments of the present disclosure, the terms "physical channel" and "signal" in the NR system may be used. However, the disclosure may also be applied to a wireless communication system that is not an NR system.

Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. In describing the present disclosure, if it is determined that the description of the related function or configuration obscures the present disclosure in unnecessary detail, the description of the related function or configuration will be omitted. Further, all terms used in the specification are terms defined based on their functions in the present disclosure, but may be different according to the intention or custom of a user or operator. Therefore, they should be defined based on the contents of the entire description of the present disclosure. Hereinafter, the bypass (SL) is referred to as a signal transmission/reception path between terminals, and may be used interchangeably with the PC5 interface. Hereinafter, the base station is a subject that performs resource allocation to the terminal, and may be a base station supporting V2X communication and general cellular communication or a base station supporting only V2X communication. For example, the base station may mean an NR base station (gNB), an LTE base station (eNB), or a Road Site Unit (RSU) (or fixed station). The terminal may include a user equipment, a mobile station, a vehicle supporting vehicle-to-vehicle communication (V2V), a vehicle supporting vehicle-to-pedestrian (V2P), a cell phone (e.g., a smart phone) of a pedestrian, a vehicle supporting vehicle-to-network communication (V2N), a vehicle supporting vehicle-to-infrastructure communication (V2I), an RSU installed with a terminal function, an RSU installed with a base station function, or an RSU installed with a part of a base station function and a part of a terminal function. In the present disclosure, Downlink (DL) is a radio transmission path of a signal transmitted from a base station to a terminal, and Uplink (UL) is a radio transmission path meaning a signal transmitted from a terminal to a base station. Hereinafter, although the NR system is exemplified in the embodiment of the present disclosure, the embodiment of the present disclosure may be applied to other various communication systems even with similar technical background or channel type. Furthermore, the embodiments of the present disclosure may also be applied to other communication systems by partial modification thereof within a range not greatly deviating from the scope of the present disclosure, at the discretion of those skilled in the art.

In this disclosure, the terms "physical channel" and "signal" in the related art may be used interchangeably with data or control signals. For example, although the PDSCH is a physical channel to transmit data, it may be referred to as data in the present disclosure.

Hereinafter, in the present disclosure, higher signaling is a signaling method in which a base station transmits a signal to a terminal using a downlink data channel of a physical layer or the terminal transmits a signal to the base station using an uplink data channel of the physical layer, and it may also be referred to as RRC signaling or MAC control element (MAC CE).

In the following embodiments of the present disclosure, a method and apparatus for performing data transmission/reception between a base station and a terminal or between terminals are provided. In this case, data may be transmitted from one terminal to a plurality of terminals, or data may be transmitted from one terminal to one terminal. In addition, data may be transmitted from a base station to multiple terminals. However, the data transfer is not limited thereto, and the present disclosure will be applicable to various cases.

Fig. 3 is a diagram illustrating a process in which one transport block is divided into several code blocks and CRC is added thereto according to an embodiment of the present disclosure.

Referring to fig. 3, a CRC 303 may be added to the last or header portion of one Transport Block (TB)301 intended to be transmitted on the uplink or downlink. The CRC 303 may include 16 bits, 24 bits, or a prefix bit number, or may include a variable number of bits according to channel conditions. The CRC 303 may be used to determine whether the channel coding has been successful. A block including the TB 301 and the CRC 303 added thereto may be divided into several Code Blocks (CBs) 307, 309, 311, and 313 (305). Here, the divided code blocks may have a predetermined maximum size, and in this case, the last code block 313 may have a size smaller than the size of the other code blocks 307, 309, and 311. However, this is merely exemplary, and according to another example, by inserting 0, a random value, or 1 into the last code block 313, the last code block 313 may be set to have the same length as that of the other code blocks 307, 309, and 311. CRCs 317, 319, 321, and 323 may be added to the code blocks 307, 309, 311, and 313(315), respectively. The CRC may include 16 bits, 24 bits, or a number of prefix bits, and may be used to determine whether the channel coding has been successful.

To create CRC403, TB 401 and a loop generator polynomial may be used, and the loop generator polynomial may be defined in various ways. For example, if we assume that the loop generator polynomial for a 24-bit CRC is gccrc 24A (D) ═ D 24+D23+D18+D17+D14+D11+D10+D7+D6+D5+D4+D3+ D +1 and L is L-24, then for TB data a0,a1,a2,...aA-1,CRCp0,p1,p2,...pL-1Can be determined by dividing a0DA+23+a1DA+22+...+aA-1D24+p0D23+p2D22+...+p22D1+p23Divided by gccrc 24A (D) with a remainder of 0. In the above examples, though it is assumedThe CRC length L is 24, but the CRC length L may be determined to include various lengths such as 12, 16, 24, 32, 40, 48, 64, and so on.

After the CRC is added to the TB in the process as described above, the TB may be divided into N CBs 307, 309, 311, and 313. CRCs 317, 319, 321, and 323 may be added to the divided CBs 307, 309, 311, and 313(315), respectively. The CRC added to the CB may have a length different from that of the CRC added to the TB, or another cyclic generator polynomial may be used. However, the CRC 303 added to the TB and the CRCs 317, 319, 321, and 323 added to the code block may be omitted according to the kind of channel code to be applied to the code block. For example, if a Low Density Parity Check (LDPC) code is applied to the code blocks instead of the turbo code, the CRCs 317, 319, 321, and 323 to be inserted into the respective code blocks may be omitted.

However, even in the case of applying LDPC, CRCs 317, 319, 321, and 323 may be added to code blocks as they are. Further, even in the case of using a polarization code, CRC may be added or omitted.

As described above with reference to fig. 3, in the TB intended to be transmitted, the maximum length of one code block may be determined according to the kind of channel coding applied, and the division of the TB and the CRC added to the TB into code blocks may be performed according to the maximum length of the code blocks.

In the LTE system in the related art, a CRC for a CB is added to divided CBs, and data bits and the CRC of the CB are encoded with a channel code to determine coded bits, and the number of rate matching bits can be determined as previously agreed on with respect to the respective coded bits.

In the NR system, the size of the TB can be calculated by the following operations.

Operation 1: in one PRB within the allocated resource, N 'which is the number of REs allocated to PDSCH mapping is calculated'RE

Here, N'RECan pass throughTo calculate. Here, the first and second liquid crystal display panels are,is 12, andthe number of OFDM symbols allocated to the PDSCH may be indicated.Is the number of REs in one PRB occupied by the DMRS of the CDM group.Is the number of REs occupied by overhead in one PRB configured by higher signaling and may be configured as one of 0, 6, 12, and 18. Thereafter, the total number N of REs allocated to PDSCH may be calculatedRE. Here, NREIs calculated as min (156, N'RE)·nPRBAnd n isPRBIndicating the number of PRBs allocated to the terminal.

Operation 2: number N of temporary information bitsinfoCan be calculated as NRE·R·QmV. Where R is the code rate, QmIs the modulation order and the information of these values may be conveyed using a table pre-agreed with the MCS bit field in the control information. Further, v is the number of allocated layers. If N is presentinfo3824, the TBS can be calculated by the following operation 3. Otherwise, the TBS may be calculated through operation 4.

Operation 3: can pass throughAndis calculated by the formula (2)'info. TBS may be determined to be not less than N 'in Table 4 below'infoIs closest to N'infoThe value of (c).

[ TABLE 4 ]

Index TBS Index TBS Index TBS Index TBS
1 24 31 336 61 1288 91 3624
2 32 32 352 62 1320 92 3752
3 40 33 368 63 1352 93 3824
4 48 34 384 64 1416
5 56 35 408 65 1480
6 64 36 432 66 1544
7 72 37 456 67 1608
8 80 38 480 68 1672
9 88 39 504 69 1736
10 96 40 528 70 1800
11 104 41 552 71 1864
12 112 42 576 72 1928
13 120 43 608 73 2024
14 128 44 640 74 2088
15 136 45 672 75 2152
16 144 46 704 76 2216
17 152 47 736 77 2280
18 160 48 768 78 2408
19 168 49 808 79 2472
20 176 50 848 80 2536
21 184 51 888 81 2600
22 192 52 928 82 2664
23 208 53 984 83 2728
24 224 54 1032 84 2792
25 240 55 1064 85 2856
26 256 56 1128 86 2976
27 272 57 1160 87 3104
28 288 58 1192 88 3240
29 304 59 1224 89 3368
30 320 60 1256 90 3496

And operation 4: can pass throughAndis calculated by the formula (2)'info. TBS may be through N'infoValue sum below [ pseudo code 1 ]]And (4) determining.

Pseudo code 1

If one CB is input to the LDPC encoder in the NR system, parity bits may be added to the CB to be output. In this case, the amount of parity bits may vary according to the LDCP base map. The method for transmitting all parity bits created by LDPC coding with respect to a particular input may be referred to as Full Buffer Rate Matching (FBRM)And a method for limiting the number of transmittable parity bits may be referred to as Limited Buffer Rate Matching (LBRM). If resources are allocated for data transmission, the LDPC encoder output is made a circular buffer and bits of the made buffer are repeatedly transmitted to the extent of the allocated resources. In this case, the length of the circular buffer may be N cb. If the number of all parity bits created by the LDPC encoding is N, the length of the circular buffer becomes N in the FBRM methodcb=N。

In the LBRM method, NcbIs changed to min (N, N)ref),NrefIs given asAnd R isLBRMMay be determined as 2/3. To obtain TBSLBRMThe above-described method for obtaining the TBS, the maximum number of layers supported by the terminal in the corresponding cell, and the maximum modulation order configured to the terminal in the corresponding cell may be assumed, and in the case where the maximum modulation order is not configured, 64QAM may be assumed. Further, the code rate may be assumed to be 948/1024, N which is the maximum code rateREIs 156. nPRBAnd n isPRBIs nPRB,LBRM. Here, n isPRB,LBRMWhich can be given in table 5 below.

[ TABLE 5 ]

Maximum number of PRBs for BWP of all configurations across carriers nPRB.LBRM
Less than 33 32
33 to 66 66
67 to 107 107
108 to 135 135
136 to 162 162
163 to 217 217
Greater than 217 273

In the NR system, the maximum data rate supported by the terminal can be determined by the following equation 1.

In equation 1, it may mean that J is the number of carriers bundled by carrier aggregation, Rmax 948/1024,is the maximum number of layers that can be,is the maximum modulation order, f(j)Is the scaling index and μ is the subcarrier spacing. Here, f(j)Is one value of 1, 0.8, 0.75 and 0.4, which can be reported by the terminal, and μ can be given as in table 6 below.

[ TABLE 6 ]

μ Δf=2μ·15[kHz] Cyclic prefix
0 15 Is normal
1 30 Is normal
2 60 Normal, extended
3 120 Is normal
4 240 Is normal

In addition to this, the present invention is,is the average OFDM symbol length and is,can be calculated asAnd isIs the maximum number of RBs in BW (j). Further, OH(j)Is an overhead value which may be given as 0.14 in the downlink of FR1 (not higher than the 6GHz band) and 0.18 in the uplink, and which may be given as 0.08 in the downlink of FR2 (higher than the 6GHz band) and 0.10 in the uplink. By equation 1, the maximum data rate in the downlink in a cell having a frequency bandwidth of 100MHz in a 30kHz subcarrier spacing can be calculated as in table 7 below.

[ TABLE 7 ]

In contrast, the actual data rate that can be measured by the terminal in the actual data transmission may be a value obtained by dividing the data amount by the data transmission time. This may be the TBs in a 1TB transmission and may be a value obtained by dividing the sum of TBSs by the TTI length in a 2TB transmission. As an example, in the same manner as the assumption that the above table 7 is obtained, the maximum actual data rate in the downlink in a cell having a frequency bandwidth of 100MHz in a 30kHz subcarrier interval may be determined according to the number of allocated PDSCH symbols as in the following table 8.

[ TABLE 8 ]

From table 7, the maximum data rate supported by the terminal can be identified, and from table 8, the actual data rate following the allocated TBS can be identified. In this case, the actual data rate may be higher than the maximum data rate according to the scheduling information.

In a wireless communication system, and particularly, in a New Radio (NR) system, a data rate that a terminal can support may be promised in advance between a base station and the terminal. This may be calculated using the maximum frequency band, the maximum modulation order, and the maximum number of layers supported by the terminal. However, the calculated data rate may be different from a value calculated from a Transport Block Size (TBS) and a length of a Transmission Time Interval (TTI) for actual data transmission.

Accordingly, the terminal may be allocated a TBS greater than a value corresponding to a data rate supported by the terminal itself, and to prevent this, there may be a limitation in schedulable TBS according to the data rate supported by the terminal.

Fig. 4 is a diagram illustrating one-to-one communication performed as unicast communication between two terminals through bypass according to an embodiment of the present disclosure.

Referring to fig. 4, an example is shown in which a signal 403 is transmitted from a first terminal 401 to a second terminal 405, and the direction of signal transmission may be opposite to the above-described direction. For example, a signal may be transmitted from the second terminal 405 to the first terminal 401. The other terminals 407 and 409 than the first terminal 401 and the second terminal 405 may not be able to receive signals exchanged through the unicast communication between the first terminal 401 and the second terminal 405. The signal exchange between the first terminal 401 and the second terminal through unicast may include processes of mapping on resources agreed between the first terminal 401 and the second terminal 405, scrambling using agreed values, control information mapping, data transmission using configuration values, and identifying inherent ID values. The terminal may be a terminal that moves with the vehicle. For unicast, separate transmission of control information, physical control channels, and data may be performed.

Fig. 5 is a diagram illustrating multicast communication in which one terminal transmits common data to a plurality of terminals through a bypass according to an embodiment of the present disclosure.

Referring to fig. 5, an example of multicast communication 511 is shown in which a first terminal 501 transmits common data to other terminals 503, 505, 507, and 509 in a group through a bypass, and other terminals 513 and 515 not included in the group may not be able to receive a signal transmitted for multicast.

The terminal transmitting the signal for multicast may be another terminal in the group, and the resource allocation for signal transmission may be provided by the base station, may be provided by the terminal acting as a leader in the group, or may be selected by the terminal transmitting the signal. The terminal may be a terminal that moves with the vehicle. For multicast, separate transmission of control information, physical control channels and data may be performed.

Fig. 6 is a diagram illustrating a procedure in which a terminal having received common data through multicast transmits information on success or failure of data reception to a terminal having transmitted data according to an embodiment of the present disclosure.

Referring to fig. 6, terminals 603, 605, 607, and 609, which have received common data through multicast, transmit information on success or failure of data reception to a terminal 601, which has transmitted data. The information may be information such as HARQ-ACK feedback (611). Further, the terminal may be a terminal having an LTE-based bypass or an NR-based bypass function. A terminal having only the LTE-based bypass function may not be able to transmit/receive the NR-based bypass signal and the physical channel. In the present disclosure, the bypass may be used interchangeably with PC5, V2X, or D2D. Referring to fig. 5 and 6, transmission/reception according to multicast is illustrated, but it may also be applied to unicast signal transmission/reception between terminals.

Fig. 7 is a diagram illustrating a state in which a synchronization signal and a PBCH of an NR system are mapped to each other in frequency and time domains according to an embodiment of the present disclosure.

Referring to fig. 7, a Primary Synchronization Signal (PSS)701, a Secondary Synchronization Signal (SSS)703, and a PBCH (705) are mapped to each other over 4 OFDM symbols, PSS and SSSs are mapped to 12 RBs, and PBCH is mapped to 20 RBs. How the frequency bands of the 20 RBs are varied according to the subcarrier spacing (SCS) is shown in the table of fig. 7. The resource region on which the PSS, SSS, and PBCH are transmitted may be referred to as an SS/PBCH block. Also, the SS/PBCH block may be referred to as an SSB block.

Fig. 8 is a diagram illustrating what symbols one SS/PBCH block is mapped to in a slot according to an embodiment of the present disclosure.

Referring to fig. 8, there are shown examples of an LTE system using a subcarrier spacing of 15kHz and an NR system using a subcarrier spacing of 30kHz in the related art. SS/PBCH blocks 811, 813, 815 and 817 of the NR system are designed to be transmitted at locations 801, 803, 805 and 807, where it is possible to avoid always transmitting cell-specific reference signals (CRSs) in the LTE system. This is for the LTE system and the NR system to coexist in one frequency band.

Fig. 9 is a diagram illustrating symbols on which SS/PBCH blocks may be transmitted according to subcarrier spacing according to an embodiment of the present disclosure.

Referring to fig. 9, subcarrier spacing may be configured to 15kHz, 30kHz, 120kHz, and 240kHz, and according to the subcarrier spacing, the position of a symbol in which an SS/PBCH block (or SSB block) may be located may be determined. Fig. 9 shows symbol positions at which SSBs according to subcarrier spacing can be transmitted on each symbol within 1ms, and SSBs need not always be transmitted in the region shown in fig. 9. Accordingly, the location where the SSB block is transmitted can be configured in the terminal through system information or dedicated signaling.

Fig. 10 is a diagram illustrating symbols on which SS/PBCH blocks may be transmitted according to subcarrier spacing according to an embodiment of the present disclosure.

Referring to fig. 10, subcarrier spacing may be configured to 15kHz, 30kHz, 120kHz, and 240kHz, and according to the subcarrier spacing, the position of a symbol in which an SS/PBCH block (or SSB block) may be located may be determined. Fig. 10 shows symbol positions 1009 where SSB blocks can be transmitted on each symbol within 5ms according to subcarrier spacing, and the positions where SSB blocks are transmitted can be configured in a terminal through system information or dedicated signaling. The SS/PBCH block need not always be transmitted in a region where the SS/PBCH block can be transmitted, and may or may not be transmitted according to the selection of a base station. Accordingly, the location where the SSB block is transmitted can be configured in the terminal through system information or dedicated signaling.

In the present disclosure, the bypass control channel may be referred to as a physical bypass control channel (PSCCH), and the bypass shared channel or data channel may be referred to as a physical bypass shared channel (PSCCH). Further, a broadcast channel broadcasted together with the synchronization signal may be referred to as a physical bypass broadcast channel (PSBCH), and a channel for feedback transmission may be referred to as a physical bypass feedback channel (PSFCH). However, the feedback transmission may be performed using PSCCH or PSCCH. Depending on the transmitting communication system, this channel may be referred to as LTE-PSCCH, LTE-PSSCH, NR-PSCCH or NR-PSSCH. In the present disclosure, the bypass may mean a link between terminals, and the Uu link may mean a link between a base station and a terminal.

Fig. 11 is a diagram illustrating a resource pool defined as a set of resources in time and frequency for bypassing transmission and reception according to an embodiment of the present disclosure.

Referring to fig. 11, reference numeral "1110" denotes an example of discontinuous allocation of resource pools in time and frequency. In the present disclosure, although the explanation has been made for the case where the resource pool is discontinuously allocated in frequency, the resource pool may be continuously allocated in frequency.

"1120" denotes an example in which non-contiguous resource allocation is performed on frequency. The granularity of resource allocation on frequency may be PRB.

"1121" denotes an example in which resource allocation on frequency is performed based on a subchannel. The sub-channels may be defined in units on a frequency including a plurality of RBs. In other words, a subchannel may be defined as an integer multiple of an RB. "1121" denotes an example in which a subchannel includes four consecutive PRBs. The size of the sub-channel may be configured differently, and although generally one sub-channel includes consecutive PRBs, the sub-channel does not necessarily include consecutive PRBs. A subchannel may become a basic unit of resource allocation on a physical bypass shared channel (PSCCH) or a physical bypass control channel (PSCCH), and thus the size of the subchannel may be differently configured according to whether a corresponding channel is the PSCCH or the PSCCH. Furthermore, the term "subchannel" may be replaced by another term, such as a Resource Block Group (RBG).

Meanwhile, startrbsubchannel of "1122" indicates the starting position of the subchannel on the frequency in the resource pool.

The resource block, which is a frequency resource belonging to a resource pool for the psch in the LTE V2X system, can be determined by the following method.

-pool of resource blocks by NsubCHSub-channel composition, where NsubCHGiven by the high layer parameter numSubchannel.

-subchannel m (for m 0, 1subCH-1) from nsubCHsizeA set of continuous resource blocks, wherein the number of the physical resource block is nPRB=nsubCHRBstart+m·nsubCHsize+ j (0, 1.., n for j)subCHsize-1) in which nsubCHRBstartAnd nsubCHsizeGiven by the high level parameters startRBSubchannel and sizeSubchannel, respectively

"1130" represents an example where non-contiguous resource allocation is performed in time. The granularity of the resource allocation in time may be a time slot. In the present disclosure, although the resource pool is illustrated as being discontinuously allocated in time, the resource pool may be continuously allocated in time.

Meanwhile, the startSlot of "1131" indicates the start position of the slot in time. Sub-frame as a time resource belonging to a resource pool for PSSCH in LTE V2X systemCan be determined by the following method.

-

Subframe index with respect to subframe #0 of a radio frame corresponding to SFN 0 or DFN 0 of the serving cell (described in [11 ]),

-the set comprises all subframes except the following subframes,

sub-frames in which SLSS resources are configured,

if the bypass transmission occurs in a TDD cell, then downlink subframes and special subframes,

reserved subframes determined by:

1) Excluding N from the set of all subframesslssAnd NdssfThe remaining subframes of the sub-frames are arranged in ascending order of the subframe indexIs represented by the formula, wherein NslssIs the number of subframes in which SLSS resources are configured within 10240 subframes and if a bypass transmission occursIn a TDD cell, then NdssfIs the number of downlink subframes and special subframes within 10240 subframes.

2) If it is not(where m ═ 0.., N.)reserved-1, and Nreserved=(10240-Nslss-Ndssf)modLbitmap) Then subframe lr(0≤r<(10240-Nslss-Ndssf) ) belong to reserved subframes. Here, the length L of the bitmapbitmapConfigured by higher layers.

-the subframes are arranged in increasing order of subframe index.

Using bitmaps associated with resource poolsWherein the length L of the bitmapbitmapConfigured by higher layers.

If bk'1 (where k' ═ k mod L)bitmap) Then subframeBelonging to a subframe pool.

Fig. 12 is a diagram illustrating a scheduling resource allocation (mode 1) method in bypass according to an embodiment of the present disclosure. The scheduling resource allocation (mode 1) is a method in which the base station allocates resources for bypass transmission to the RRC-connected terminal in a dedicated scheduling method. According to the above method, the base station can manage the bypassed resources, so it can be effective in performing interference management and resource pool management.

Referring to fig. 12, camped (1205) terminal 1201 receives (1210) a bypass system information block (SL SIB) from base station 1203. The system information may include resource pool information for transmission/reception, configuration information for sensing operation, information for synchronization configuration, and information for inter-frequency transmission/reception. If the data service of V2X is created, the terminal 1201 performs RRC connection with the base station (1220). Here, the RRC connection between the terminal and the base station may be referred to as Uu-RRC (1220). The above-described Uu-RRC connection procedure may be performed before the data service is created.

Terminal 1201 requests the base station to provide transmission resources for performing V2X communication (1230). In this case, the terminal 1201 may request transmission resources from the base station using an RRC message or a MAC CE. Here, as the RRC message, a sildelinkueinformation or UEAssistanceInformation message may be used. Meanwhile, the MAC CE may be, for example, a buffer status report MAC CE of a new format (including at least an indicator informing a buffer status report for V2X communication or information on a data size buffered for D2D communication). For details of the format and contents of the buffer status report used in 3GPP, reference is made to the 3GPP standard TS36.321 "E-UTRA MAC Protocol Specification (E-UTRA MAC Protocol Specification)". The base station 1203 allocates the V2X transmission resource to the terminal 1201 by a dedicated Uu-RRC message. The message may be included in the RRCConnectionReconfiguration message. The allocated resources may be V2X resources through Uu or resources for PC5 according to the kind of traffic requested by the terminal or the congestion degree of the corresponding link. For the above determination, the terminal may additionally transmit ProSe Per Packet Priority (PPPP) or logical channel ID information of the V2X traffic through UEAssistanceInformation or MAC CE.

Since the base station also knows information about resources used by other terminals, the base station allocates a remaining resource pool among the resources requested by the terminal 1201 (1235). The base station may indicate final scheduling to the terminal 1201 by means of DCI transmission through the PDCCH (1240).

Next, in case of broadcast transmission, terminal 1201 broadcasts the bypass control information (SCI) to other terminals 1202 on the PSCCH by broadcasting, without the need for additional RRC configuration to bypass (1205) (1270). Further, terminal 1201 may broadcast data on the PSSCH to other terminal 1202 (1270).

In contrast, in the case of unicast and multicast transmission, the terminal 1201 can perform RRC connection with other terminals in a one-to-one manner. Here, in order to distinguish Uu-RRC, RRC connection between terminals may be referred to as PC 5-RRC. Even in the case of multicast, the PC5-RRC (1250) is individually connected between terminals in the group. Although fig. 12 shows the operation after the connection of the PC5-RRC (1215) is "1210", it may be performed at any time before "1210" or before "1260".

If an RRC connection is required between the terminals, terminal 1201 performs a bypassed PC5-RRC connection (1250) and sends SCIs on the PSCCH to the other terminals 1202 (1260) via unicast and multicast. In this case, the multicast transmission of the SCIs may be interpreted as a group SCI. Further, terminal 1201 transmits data to other terminal 1202 on the PSSCH via unicast and multicast (1270).

Fig. 13 is a diagram illustrating a UE autonomous resource allocation in bypass (mode 2) method according to an embodiment of the present disclosure.

Referring to fig. 13, in UE autonomous resource allocation (mode 2), a base station provides a bypass transmission/reception resource pool for V2X as system information, and a terminal selects a transmission resource according to a determined rule. The resource selection method may be resource selection or random selection based on region mapping or sensing. The UE autonomous resource allocation (mode 2) method of fig. 13 is different from the scheduled resource allocation (mode 1) method in that the terminal 1301 autonomously selects resources based on a resource pool previously received through system information and transmits data, in contrast to the scheduled resource allocation (mode 1) method in which the base station directly participates in resource allocation.

In V2X communication, the base station 1303 can allocate various kinds of resource pools (a V2X resource pool and a V2P resource pool) to the terminal 1301. The resource pool may include a resource pool in which the terminal can autonomously select an available resource pool after sensing resources used by other neighboring terminals and a resource pool in which the terminal randomly selects resources from a predetermined resource pool.

Camping (1305) terminal 1301 receives (1310) the SL SIB from base station 1303. The system information may include resource pool information for transmission/reception, configuration information for sensing operation, information for synchronization configuration, and information for inter-frequency transmission/reception. The operation shown in fig. 13 is greatly different from the operation shown in fig. 12 in that, in the case of fig. 12, the base station 1203 and the terminal 1201 operate in an RRC connected state, and in the case of fig. 13, they may operate even in an RRC unconnected idle mode. Further, even in the RRC connected state, the base station 1303 does not directly participate in resource allocation and can operate so that the terminal autonomously selects transmission resources. Here, the RRC connection between the terminal and the base station may be referred to as Uu-RRC (1320). If a data service for V2X is created, the terminal 1301 selects (1330) a resource pool of a time and/or frequency region according to a transmission operation configured among resource pools transferred from the base station 1303 through system information.

Next, in the case of broadcast transmission, terminal 1301 broadcasts SCIs to other terminals 1302 on the PSCCH by broadcast without the need for additional RRC configuration (1340) to bypass (1350). Further, terminal 1201 may broadcast data on the psch to other terminals 1302 (1360).

In contrast, in the case of unicast and multicast transmission, the terminal 1301 can perform RRC connection with other terminals in a one-to-one manner. Here, in order to distinguish Uu-RRC, RRC connection between terminals may be referred to as PC 5-RRC. Even in the case of multicast, the PC5-RRC is connected individually between terminals in a group. This may be similar to the RRC layer connection in the connection between the base station and the terminal in the NR uplink and downlink in the related art, and the connection of the RRC layer in the bypass may be referred to as PC 5-RRC. By the PC5-RRC connection, the bypassed UE capability information may be exchanged between terminals or the exchange of configuration information required for signal transmission/reception may be performed. Although fig. 13 shows the operation of the PC5-RRC (1315) connection after "1310", it may be performed at any time before "1310" or before "1350".

If an RRC connection is required between the terminals, terminal 1301 performs a bypass PC5-RRC connection (1340), and sends SCIs on the PSCCH to the other terminals 1302 by unicast and multicast (1350). In this case, the multicast transmission of the SCIs may be interpreted as a group SCI. Further, terminal 1301 transmits data to other terminals 1302 on the psch via unicast and multicast (1360).

In the present disclosure, in order to effectively perform sensing in the coexistence of periodic and aperiodic traffic, a sensing window a and a sensing window B are defined.

Fig. 14A is a diagram illustrating a method for configuring a sensing window a of UE autonomous resource allocation for bypass (mode 2) according to an embodiment of the present disclosure.

Referring to fig. 14A, (1400), in case a trigger for selecting a transmission resource occurs in a slot n (1401), a sensing window a 1402 may be defined as follows.

The sensing window A can be defined as [ n-T ]0,n-1]The slot segments of (a). Here, T0May be determined as a fixed value and may be determined to be configurable.

As an example of the case where T0 is determined to be a fixed value, it may be indicated as T with respect to periodic traffic0=1000*2μ. In contrast, with respect to aperiodic traffic, T0Can be configured to a fixed value T0=100*2μ. As exemplified above, fixed T0The value may be changed to another value according to the considered traffic characteristics and may be fixed to the same value with respect to periodic and aperiodic traffic. Here, μ is an index corresponding to a parameter set (numerology), and is configured as the following value according to a subcarrier spacing.

***SCS=15kHz,μ=0

***SCS=30kHz,μ=1

***SCS=60kHz,μ=2

***SCS=120kHz,μ=3

In case T0 is determined to be configurable, this configuration may be indicated by SL SIB or UE specific higher signaling. In case of indication through the SL SIB, a corresponding value may be configured within resource pool information among corresponding system information. If T is configured in the resource pool information 0Then always use the constant T in the resource pool0

In the sensing window a, SCI decoding and bypass measurement of another terminal may be performed.

The terminal performing sensing may acquire resource allocation information of another terminal and QoS information of a packet from the received SCI within a sensing window a. Here, the resource allocation information may include a reservation interval of the resource. Further, the QoS information may be delay, reliability and priority information of a minimum required communication range according to the transmitted traffic and data rate requirements. In addition, the terminal may acquire location information of another terminal from the received SCI. The terminal can calculate the TX-RX distance from the location information of another terminal and its own location information.

The terminal may measure the shunt reference signal received power (SL RSRP) from the received SCI within the sensing window A

The terminal may measure a bypass received signal strength indicator (SL RSSI) within a sensing window A

The sensing window a may be used for the main purpose of determining resources for UE autonomous resource allocation (mode 2) by sensing periodic traffic. The terminal can grasp periodic resource allocation information of another terminal through SCI decoding, and if the terminal determines that it is invalid to allocate transmission resources to be used by another terminal using a result of measurement bypass (such as SL RSRP or SL RSSI), the corresponding resources can be excluded from the resource selection window 1403. As shown in fig. 14A, in the case where a trigger for selecting transmission resources occurs in slot n (1401), a resource selection window 1403 may be defined as follows.

Resource selection window may be defined as [ n + T ]1,n+T2]The slot segments of (a). Here, T1And T2May be determined as a fixed value or may be determined to be configurable. In contrast, T1And T2May be determined within a fixed range and the terminal may configure appropriate values within the fixed range based on its implementation.

**T1And T2May be determined within a fixed range and, based on its implementation, the terminal may be within a fixed range (e.g., at T)1T is not less than 4 and not more than 202In the range of ≦ 100) are set to appropriate values.

Final transmission resources 1405 may be selected within the resource selection window using the results of sensing performed in sensing window a.

In the case where sensing is performed using only the sensing window a as shown in fig. 14A and transmission resource selection is performed therethrough, the following transmission resource selection method may be used.

Transmission resource selection method-1

Operation-1: determining a number M of resource candidates capable of performing resource allocation based on resource pool information within a resource selection windowtotal(1403)。

Operation-2: the result of sensing in terminal usage sensing window a (1402) excludes resources within resource selection window 1403 whose usage is determined to be invalid due to occupation by another terminal, and leaves X (M) capable of performing resource allocation total) And (4) resource candidates. For this purpose, a method of excluding resources by SCI decoding and bypass measurement of another terminal may be used.

Operation-3: the resource candidate list X is reported to the higher layers of the terminal and the final transmission resource among the X candidates is randomly selected on the higher layers of the terminal.

Fig. 14B is a diagram illustrating a method for configuring a sensing window B of UE autonomous resource allocation for bypass (mode 2) according to an embodiment of the present disclosure.

Referring to fig. 14B (1430), in case that a trigger for selecting a transmission resource occurs in a slot n (1401), a sensing window B1404 may be defined as follows.

The sensing window B may be defined as n + T1',n+T2']The slot segments of (a). Here, T1' and T2' may be determined as a fixed value or may be determined to be configurable. In contrast, T1' and T2' may be determined within a fixed range, and the terminal may configure an appropriate value within the fixed range based on its implementation. Further, in the case where k indicates a time slot in which the resource is finally selected, the sensing window B is interrupted in the k time slot, and in this case, the sensing window B becomes [ n + T ]1',k]。

**T1' and T2'may be configured to have T's with resource selection windows (1403), respectively 1And T2Or may be configured to have different values.

E.g. if T1Is configured as T1' -0 means that sensing is performed from the trigger slot n for selecting transmission resources.

T by configuration1' and T2' value, sensing window B may be configured as one time slot or a plurality of time slots.

In sensing window B, SCI decoding and bypass measurement of another terminal may be performed.

Sensing in the sensing window B is performed.

Sensing window B may be used for the purpose of determining resources for UE autonomous resource allocation (mode 2) by additional sensing with respect to periodic and aperiodic traffic of sensing window a. In the sensing window B configured hereinafter based on the trigger slot n for selecting a transmission resource, aperiodic traffic that cannot be predicted in the sensing window a can be sensed using a bypass measurement of a slot to which an actual transmission resource can be allocated. The sensing through the sensing window B may be understood as an operation of performing sensing with respect to traffic sensed for each slot, regardless of whether the traffic is periodic or aperiodic. In the case where sensing is performed using a sensing window B as shown in fig. 14B and transmission resource selection is performed therethrough, the following transmission resource selection method may be used.

Transmission resource selection method-2

Operation-1: whether the corresponding resource is free is determined by performing sensing in the corresponding time slot within sensing window B (1404).

The resource allocation unit on frequency may be defined as a (≧ 1) sub-channels or all sub-channels. Number N of resource candidates capable of performing resource allocation within a corresponding time slottotalDetermined according to the resource allocation unit on the frequency.

Sensing may be performed by SCI decoding and bypassing measurements.

Operation-2-1: if it is determined that the corresponding resource is idle through sensing in operation-1 as described above, the number N of resource candidates capable of performing resource allocation within the corresponding slot is determinedtotalThe final transmission resource 1406 in between.

Operation-2-2: if it is determined through sensing in operation-1 as described above that all corresponding resources are busy, the following operation may be selected.

If the next slot is also configured as sensing window B (1404), operation jumps to the next slot and performs operation-1 as described above.

If the next slot is not configured to sensing window B (1404), the following operations may be considered.

In the current time slot, the final transmission resource 1406 is determined using the QoS information or the result of the energy detection. The QoS information may be priority information according to at least one of priority, latency, reliability, proximity services (ProSe) per packet priority (PPPP), ProSe Per Packet Reliability (PPPR), minimum required communication range of transmitted traffic, or data rate requirements. The priority may mean including PPPP and PPPR, and may be a value selected within a range of predetermined values, and data required to be transmitted in the bypass may have one priority value.

May cancel the transmission in the current slot and may perform a backoff (backoff) operation.

As defined by fig. 14A and 14B, the sensing window a and the sensing window B may be divided based on a time point of trigger down for selecting transmission resources. Specifically, based on the trigger slot n for selecting transmission resources, a previously configured sensing segment may be defined as a sensing window a, and a configured sensing segment may be defined as a sensing window B thereafter.

Fig. 14C is a diagram illustrating a method for configuring sensing window a and sensing window B for bypassed UE autonomous resource allocation (mode 2) according to an embodiment of the present disclosure.

Referring to fig. 14C, (1460) shows an example of a case where the sensing window a and the sensing window B are simultaneously configured. In case the trigger for selecting transmission resources occurs in slot n (1401), sensing window a (1402) and sensing window B (1404) may refer to the above definition. In the case where sensing is performed using the sensing window a and the sensing window B as shown in fig. 14C and transmission resource selection is performed therethrough, the following transmission resource selection method may be used.

Transmission resource selection method-3

Operation-1: determining a number M of resource candidates capable of performing resource allocation based on resource pool information within a resource selection window total(1403)。

Operation-2: the terminal performing sensing uses the sensing result in the sensing window a (1402) to exclude the resource whose use is determined to be invalid due to occupation by another terminal within the resource selection window 1403, and leaves X (M) capable of performing resource allocationtotal) And (4) resource candidates. The resources may be excluded using SCI decoding and bypass measurements of another terminal.

Operation-3: the resource candidate list X is reported to the higher layer of the terminal and Y candidates among the X candidates are randomly selected downwards on the higher layer of the terminal.

Operation-4-1: if the sensing window B (1404) is included in the resource selection window (1403), the terminal selects a final transmission resource (1406) among Y candidates determined on a higher layer by a transmission resource selection method-2 using a sensing result of the sensing window B (1404) on a physical layer.

If sensing window B (1404) is included in resource selection window (1403), this corresponds to [ n + T in fig. 14C1,k]A section of (1). This situation may be represented by T1And T2And T1' and T2' configuration determination.

Operation-4-2: if sensing window B (1404) is not included in resource selection window (1403), the sensing result in sensing window B is used on the physical layer to select final transmission resource 1406 by transmission resource selection method-2.

The case where the sensing window B (1404) is not included in the resource selection window (1403) corresponds to [ n + T ] in fig. 14C1',n+T1-1]A section of (1). This situation may be represented by T1And T2And T1’And T2' configuration determination.

In transmission resource selection method-e, the selection of Y candidates on the higher layer may be omitted, and the following method may be used.

Transmission resource selection method-4

Operation-1: determining a number M of resource candidates capable of performing resource allocation based on resource pool information within a resource selection windowtotal(1403)。

Operation-2: the terminal performing sensing uses the sensing result in the sensing window a (1402) to exclude the resource whose use is determined to be invalid due to occupation by another terminal within the resource selection window 1403, and leaves X (M) capable of performing resource allocationtotal) And (4) resource candidates. The resources may be excluded using SCI decoding and bypass measurements of another terminal.

Operation-3-1: if the sensing window B (1404) is included in the resource selection window (1403), the terminal selects a final transmission resource (1406) among the X candidates by the transmission resource selection method-2 using a sensing result of the sensing window B (1404) on the physical layer.

If sensing window B (1404) is included in resource selection window (1403), this corresponds to [ n + T in fig. 14C 1,k]A section of (1). This situation may be represented by T1And T2And T1' and T2' configuration determination.

Operation-3-2: if sensing window B (1404) is not included in resource selection window (1403), the sensing result in sensing window B is used on the physical layer to select final transmission resource 1406 by transmission resource selection method-2.

The case where the sensing window B (1404) is not included in the resource selection window (1403) corresponds to [ n + T ] in fig. 14C1',n+T1-1]A section of (1). This situation may be represented by T1And T2And T1’And T2' configuration determination.

If sensing window A and sensing window B are configured simultaneously, the final resource selection may be determined by resource selection window (1403) and sensing window B (1404). The transmission resource selection method-3 and the transmission resource selection method-4 as proposed above are methods for performing sensing in the coexistence of periodic and aperiodic traffic by simultaneously configuring the sensing window a and the sensing window B and optimizing the selection of transmission resources through sensing.

The sensing and transmission resource selection in the bypassed UE autonomous resource allocation (mode 2) as described above may be implemented in various ways. For example, in the case where sensing window a and sensing window B are simultaneously configured, if a trigger for selecting a transmission resource occurs in slot n in a state where the terminal always performs sensing on sensing window a, the terminal may be implemented to select a final transmission resource by sensing the sensing window B. However, a terminal that always performs sensing for the sensing window a can immediately use the sensing result of the sensing window a at any time, and thus has advantages in terms of delay in selecting transmission resources but has disadvantages in terms of power consumption.

Thus, as another method, if traffic to be transmitted occurs, the terminal may be implemented to immediately perform sensing on the sensing window a and select a final transmission resource by performing sensing on the sensing window B after performing a trigger for selecting a transmission resource. The latter method has an advantage in that the power consumption of the terminal can be minimized, but has a disadvantage in terms of delay in selecting transmission resources.

From the above, an example has been described in which empty frequency-time resources are searched for communication between terminals in the bypass, and a signal is transmitted on the searched resources. However, the method and apparatus provided in the present disclosure are not limited thereto, and may be applied to various channel occupying and channel reserving methods.

Fig. 15 is a diagram illustrating a mode 1 method as a method for performing a bypass data transmission by receiving scheduling information from a base station according to an embodiment of the present disclosure. In the present disclosure, a method for receiving scheduling information from a base station and performing bypass communication based on the scheduling information is referred to as mode 1, but the method may also be referred to by other names.

Referring to fig. 15, a terminal 1501 intending to perform transmission in bypass receives scheduling information 1509 for bypass communication from a base station 1511. In the present disclosure, a terminal 1501 intended to perform transmission in the bypass may be referred to as a transmitting terminal, and a terminal 1503 intended to perform data reception in the bypass may be referred to as a receiving terminal. However, the transmission terminal 1501 and the reception terminal 1503 can perform both data transmission and reception in bypass. The scheduling information 1509 for bypass communication may be obtained by receiving Downlink Control Information (DCI) transmitted by the base station 1511, and the DCI may include the following information.

-carrier indicator: this may be used for the purpose of scheduling the bypass of another carrier in case Carrier Aggregation (CA) is applied.

-lowest index of subchannel allocation for initial transmission: this may be used for frequency resource allocation for initial transmission.

-information to be included in the bypass control information

This may include frequency resource allocation information, frequency resource allocation information for initial transmissions and retransmissions, and resource allocation or resource reservation information for subsequent N transmissions.

Information of time interval between initial transmission and retransmission

This may include information about the structure of the bypass slot, and information about what slots and what symbols may be used for bypass.

This may include HARQ-ACK/CSI feedback timing information, and timing information for sending HARQ-ACK or CSI feedback to the base station in the bypass.

-Addressee (Addressee) ID: ID information about what terminal receives information

Quality of service (QoS) information, such as priority: information about what priority data to send with

The scheduling may be used as a schedule for one-time bypass transmission or may be used for periodic transmission, semi-persistent scheduling (SPS) or configured grants. The scheduling method may be distinguished by an indicator included in the DCI, an RNTI scrambled in the CRC added to the DCI, or an ID value. Zero (0) bits may be additionally added to the DCI so that the size of the DCI is equal to the size of other DCI formats, such as DCI for downlink scheduling or uplink scheduling.

Transmitting terminal 1501 receives SCI for bypass scheduling from base station 1511, transmits PSCCH including bypass scheduling information (1507), and transmits PSCCH as corresponding data (1505). The bypass scheduling information 1507 may be bypass control information (SCI), and the SCI may include the following information.

-HARQ process number: HARQ process ID for HARQ related operations of transmitted data

-New Data Indicator (NDI): information on whether currently transmitted data is new data

-redundancy version: information on what parity bits to transmit when mapping is performed by channel coding of data

Layer 1 source ID: ID information on physical layer of transmission terminal

Layer 1 destination ID: ID information on physical layer of receiving terminal

Frequency domain resource allocation for scheduling of PSSCH: frequency domain resource configuration information of transmitted data

-MCS: modulation order and coding rate information

-QoS indication: this may include priority, target delay/latency, target distance, and target error rate.

Antenna port(s): antenna port information for data transmission

-DMRS sequence initialization: this may include information on an ID value for initialization of a DMRS sequence.

-PTRS-DMRS association: this may include information about the PTRS mapping.

-CBGTI: this can be used as an indicator of a Code Block Group (CBG) unit retransmission.

-resource reservation: information for resource reservation

-time gap between initial transmission and retransmission: time interval information between initial transmission and retransmission

-retransmission index: indicator for distinguishing between retransmissions

-transport format/broadcast type indicator: transport format or unicast/multicast/broadcast differentiation indicator

-area ID: transmitting location information of a terminal

-NACK distance: reference indicator for determining whether receiving terminal transmits HARQ-ACK/NACK

-HARQ feedback indication: this may include whether feedback is to be sent or whether feedback is being sent.

Time domain resource allocation for scheduling of PSSCH: time domain resource information of transmitted bypass data

-a second SCI indicating: including an indicator of mapping information of the second SCI in case of 2-stage control information

-DMRS pattern: DMRS pattern (e.g., DMRS mapped symbol position) information

The control information may be included in one SCI to be transmitted to the receiving terminal or may be included in two SCIs to be transmitted. The transmission of control information through two SCIs may be referred to as a 2-stage SCI method.

Fig. 16 is a diagram illustrating a mode 2 method as a method in which a terminal performs bypass data transmission without scheduling of a base station according to an embodiment of the present disclosure.

Referring to fig. 16, the first terminal 1601 transmits scheduling information 1607 and data 1605 to the second terminal 1603 according to the scheduling information 1607.

Fig. 17 is a diagram illustrating a method in which an LTE system in the related art enables a terminal to distinguish its own control signal by allocating an RNTI of a length of 16 bits to the terminal and transmitting the control signal by masking the allocated RNTI value with a 16-bit CRC added to the control signal according to an embodiment of the present disclosure.

Referring to fig. 17, Downlink Control Information (DCI) includes a 16-bit CRC (1701) added to the last part of the DCI, and a 16-bit RNTI value is added to the CRC (1705) through an exclusive or (XOR) operation. The RNTI value may be used for terminal discrimination or discrimination for control signal purposes. For example, the terminal knows the SI-RNTI value, and the SI-RNTI value can be used to detect control signals for system information transmission. The above case of detecting the control signal using the RNTI may mean that when the CRC check is performed after decoding the control signal, the terminal may recognize whether the CRC check has succeeded by performing the CRC check with respect to the result of re-performing the RNTI value mask (1703).

Fig. 18 is a diagram illustrating that a 24-bit CRC is added to DCI information bits and a 16-bit RNTI is masked with a part of the CRC in an NR system in the related art according to an embodiment of the present disclosure.

Referring to fig. 18, a total of 24-bit CRC 1803 is added to DCI information bits 1801, a part of the CRC 1803 is added to the middle of the DCI information bits, and the remaining CRC is added to the last part of the DCI information. The terminal configuration or known RNTI value 1805 is masked with the last 16 bits 1809 of the CRC added. The mask may mean performing an exclusive or operation on bit values of the same position, and may be an operation that generates "0" if two bit values are equal to each other and generates "1" if two bit values are different from each other. For the first 8 bits 1807 of the added CRC, no masking of the RNTI value is performed. As described above, after adding the CRC 1803 and partially masking the RNTI, channel coding by a polarization code is performed on the created control information to be transmitted. After decoding control information using a polarization code, the receiving end may determine whether to detect DCI by performing a CRC check by re-performing a masking on a portion of RNTI masked with an added CRC or performing an operation of releasing a mask based on an RNTI value that is already known or configured.

The present disclosure provides a method and apparatus for dividing bypass control information into two pieces of bypass control information and delivering the divided bypass control information to a receiving terminal. This may be referred to as a 2-stage (or 2-operation) control information transfer method (i.e., a 2-stage SCI method).

In the 2-stage control information transfer method for bypass communication according to an embodiment of the present disclosure, the first control information may be referred to as first control information or SCI _1, and the second control information may be referred to as second control information or SCI _ 2. When the bypass communication is performed, one terminal does not always need to decode the first control information and the second control information in all cases of data decoding, and in a specific case, data decoding scheduled by the first control information is possible even by decoding only the first control information.

First embodiment

A first embodiment provides a method and apparatus for performing transmission and reception of control information in a method for transmitting and receiving bypass control information in 2-phase by a transmitting terminal and a receiving terminal.

Fig. 19 is a flowchart illustrating a method of determining bit field values of first control information and second control information by a transmitting terminal according to an embodiment of the present disclosure.

Referring to fig. 19, the transmitting terminal determines resources for transmitting the pscch through the above-described method for channel occupancy or channel reservation in operation 1900. Based on this, the transmitting terminal determines the scheduling parameters included in the SCI. The scheduling parameters may include the psch frequency and time resources, MCS, RV, NDI, and HARQ process ID. In operation 1910, the transmitting terminal determines a bit field value of the second control information based on the determined scheduling parameter and determines where the second control information is mapped, i.e., a transmission resource. Further, in operation 1920, the transmitting terminal determines a bit field value of the first control information based on the psch scheduling parameter, a bit field value of the second control information, and determines a transmission resource to which the second control information is mapped. This is because information for decoding the second control information may be included in the first control information. In operation 1930, the transmitting terminal transmits the first control information, the second control information, and the pscch based on the determined information.

Fig. 20 is a flowchart illustrating a method of a receiving terminal continuously decoding first control information and second control information and decoding a pscch based thereon according to an embodiment of the present disclosure.

Referring to fig. 20, a receiving terminal attempts to decode first control information based on predetermined information in operation 2000. The receiving terminal determines whether to decode the second control information according to the bit field value of the first control information, the decoding of which has been successful in the above-described procedure, and if the second control information needs to be decoded, the receiving terminal determines to which resource the second control information is mapped and performs decoding of the second control information in operation 2010. As described above, the reason for determining whether to decode the second control information is that it is possible to decode the pscch only by decoding the first control information in a specific transmission type or transmission mode. In operation 2020, the receiving terminal identifies the pscch transmission resource and other scheduling information based on the bit field values of the decoded first and second control information. In operation 2030, the receiving terminal performs pscch decoding using the identified scheduling information and performs necessary subsequent operations.

Second embodiment

A second embodiment provides a method and apparatus for mapping second control information onto a resource. In the embodiment of the present disclosure, mapping of the second control information onto the psch to be transmitted is exemplified, and such mapping may be a method similar to a method in which Uplink Control Information (UCI) is mapped onto the PUSCH to be transmitted in the uplink of the NR system in the related art

Fig. 21 is a diagram illustrating a method for transmitting second control information on a psch according to an embodiment of the present disclosure.

Referring to fig. 21, the method may refer to a case where the second control information is piggybacked on the psch and corresponds to a method in which the second control information is encoded by a channel coding method different from the SL-SCH included in the psch and mapped. The transmitting terminal transmits the PSCCH and PSCCH to the receiving terminal, and on the PSCCH, the first control information may be mapped to be delivered to the receiving terminal. The transmitting terminal maps and transmits the first control information using the PSCCH, and transmits the PSCCH according to PSCCH scheduling information included in the first control information. The transmitting terminal maps the second control information to the resource region.

Referring to fig. 21, the second control information is illustrated as being mapped onto the PSCCH. (a) (2100) represents an example where the second control information 2102 is mapped to the foremost portion of the slot such that the second control information 2102 may be received as soon as possible. The second control information 2102 may also be mapped after the DMRS 2104 of the psch. (b) (2110) represents an example in which the second control information 2102 is mapped to the foremost part of the slot so that the second control information 2102 can be received as soon as possible, and the second control information is mapped onto the last symbol so as to be widely spread in the frequency domain. According to (a) (2100) and (b) (2110), it is effective that the receiving terminal can decode the second control information as soon as possible.

(c) (2120) represents an example in which the second control information 2102 is mapped to a foremost portion right after the mapping of the DMRS 2104 of the psch such that the second control information 2102 may be received as soon as possible after receiving the DMRS 2104 of the psch. (d) (2130) represents an example in which the second control information 2102 is mapped to a foremost part right after the mapping of the DMRS of the psch so that the second control information 2102 can be received as soon as possible after receiving the DMRS 2104 of the psch and mapped onto a last symbol so as to be widely spread in a frequency domain to be mapped.

(e) (2140) represents an example in which the second control information 2102 is mapped to a foremost part right after the mapping of the DMRS 2104 of the psch, so that the second control information 2102 can be received from the same symbol as the DMRS 2104 of the psch as soon as possible. (f) (2150) represents an example in which the second control information 2102 is mapped to the foremost part right after the mapping of the DMRS 2104 of the psch so that the second control information 2102 can be received from the same symbol as the DMRS 2104 of the psch as soon as possible, and the second control information 2102 is mapped onto the last symbol so as to be widely spread in the frequency domain to be mapped. According to (c) (2120), (d) (2130), (e) (2140), and (f) (2150), the receiving terminal may decode the second control information as soon as possible after channel estimation is completed using the DMRS of the PSSCH, and may be efficient using the fine channel estimation information.

Fig. 22 is a diagram illustrating mapping of second control information according to an embodiment of the present disclosure.

Referring to fig. 22, it is shown that the first symbol of the DMRS 2204 of the PSSCH is located in the fourth symbol of the slot, and (a) (2200), (b) (2210), (c) (2220), and (d) (2230) may represent an example of a case where the second control information 2202 is mapped in the same principle as (a) (2100), (b) (2110), (c) (2120), and (d) (2130) of fig. 21.

Fig. 23 is a diagram illustrating mapping of second control information according to an embodiment of the present disclosure.

Referring to fig. 23, (a) (2300) represents an example in which the second control information 2302 is mapped to all symbols to which the PSSCH is mapped. The second control information 2302 may be deployed after the DMRS2304 of the psch. (b) (2310) represents examples before and after the DMRS2304 where the second control information 2302 is mapped to the PSSCH. According to the example of fig. 23, since the second control information is disposed around the DMRS, good channel measurement performance may be ensured, and thus reliability of decoding the second control information may be improved.

If the first control information is obtained by decoding the PSCCH, the receiving terminal may obtain information of the resource to which the PSCCH is mapped and other scheduling information. Other scheduling information may include MCS. Accordingly, if the first control information is obtained, the receiving terminal can grasp the psch resource region and MCS information and can decode the second control information mapped on the psch.

Number of bits Q 'of second control information encoded using channel coding in a case where the second control information is mapped on PSSCH'SCI2May be calculated as described in equation 2 below.

[ equation 2]

Referring to equation 2 above, R is the coding rate of PSSCH, QmIs the modulation order of PSSCH, and R and QmMay be obtained from MCS information included in the first control information for scheduling the pscch.Is a parameter for adjusting the number of coded bits of the second control information, and may be determined based on at least one of a resource pool configuration, a PC5-RRC configuration, or a bit field of the first control information. As described above, OSCI2Is the number of bits of the second control information, and LSCI2Is the number of CRC bits added to the second control information before channel coding.

(2-1) -examples

The (2-1) embodiment provides a method and apparatus for mapping second control information onto a resource. In the embodiment of the present disclosure, it is exemplarily described that the second control information is mapped onto the psch to be transmitted, and such mapping may be a method similar to a method in which Uplink Control Information (UCI) is mapped onto the PUSCH to be transmitted in the uplink of the NR system in the related art.

This embodiment may provide an example in which the second control information is mapped onto available Resource Elements (REs) if there are corresponding REs in a symbol to which the DMRS is mapped in the second embodiment as described above.

Fig. 24 is a diagram illustrating an operation in which second control information starts to be mapped to a first DMRS symbol among DMRSs of a pscch of a bypass slot according to an embodiment of the present disclosure. Of course, if the remaining REs of the DMRS are not excluded in the DMRS symbol, the second control information may start to be mapped on the next symbol.

Referring to fig. 24, each example corresponds to a case where the second control information 2404 is mapped according to the length of the psch symbol 2401. Further, the first symbol in one slot may be used for Automatic Gain Control (AGC) (2402). The symbols following the psch symbol 2401 may be referred to as symbols 2400 that do not include the psch. Further, at least one of the second through fourth symbols may be used for PSCCH transmission (2403).

In the case of a (2410), b (2415), c (2420), d (2425), and e (2430), the DMRS 2405 of the psch may be located on the fifth and eleventh symbols, and in the case of h (2445), i (2450), j (2455), k (2460), and l (2465), the DMRS 2405 may be located on the fourth and eleventh symbols. In the case of f (2435), g (2440), m (2470), and n (2475), DMRS 2405 may be located on the second and sixth symbols. According to the example of fig. 26, the second control information 2404 may be mapped to the DMRS symbol 2405 of the first psch and a next symbol of the DMRS symbol 2405 of the first psch.

Fig. 25 is a diagram illustrating an operation of a first DMRS symbol transmitted after a PSCCH that is a control channel among DMRSs where second control information starts to be mapped to a PSCCH of a bypass slot according to an embodiment of the present disclosure.

Referring to fig. 25, each example corresponds to a case where the second control information 2504 is mapped according to the length of the psch symbol 2501. Further, the first symbol in one slot may be used for automatic gain control (2502). The symbols following psch symbol 2501 may be referred to as symbols 2500 that do not include psch. Further, at least one of the second through fourth symbols may be used for PSCCH transmission (2503).

In the case of a (2510), b (2515), c (2520), d (2525) and e (2530), the DMRS 2505 of the psch may be located on the fifth and eleventh symbols, and in the case of h (2545), i (2550), j (2555), k (2560) and l (2565), the DMRS 2405 may be located on the fourth and eleventh symbols. In the case of f (2535), g (2540), m (2570), and n (2575), the DMRS 2505 may be located on the second and sixth symbols. According to the example of fig. 26, in case that the DMRS symbol 2505 of the first psch is located on the fifth symbol (i.e., in case of a (2510), b (2515), c (2520), d (2525), e (2530), h (2545), i (2550), j (2555), k (2560), and l (2570)), the second control information 2504 may be mapped on the next symbol of the DMRS symbol 2505 of the first psch. In the case where the DMRS symbol 2505 of the first PSCCH is located on the second symbol and the PSCCH 2501 is located on the second to third symbols or the fourth symbol (i.e., in the case of f (2535), g (2540), m (2570), and n (2575)), the second control information may be mapped to the DMRS symbol 2505 of the second PSCCH, which is the first DMRS symbol transmitted after the PSCCH, and the next symbol.

Of course, if the remaining REs of the DMRS are not excluded in the DMRS symbol, the second control information may start to be mapped on the next symbol, as shown in fig. 26 and 27. Fig. 26 is a diagram illustrating another example in which second control information starts to be mapped on a first DMRS symbol among DMRSs of a pscch of a bypass slot according to an embodiment of the present disclosure.

Referring to fig. 26, it is illustrated that there are no remaining REs in the DMRS symbol 2605, and thus second control information 2604 is mapped onto a symbol next to the DMRS symbol 2605 of the first pscch.

Fig. 27 is a diagram illustrating an operation of a first DMRS symbol transmitted after a PSCCH that is a control channel among DMRSs where second control information starts to be mapped to a PSCCH of a bypass slot according to an embodiment of the present disclosure.

Referring to fig. 27, it is illustrated that there are no remaining REs in the DMRS symbol 2705, and thus the second control information 2704 is mapped onto the next symbol of the DMRS symbol 2705 of the first psch 2703.

Fig. 28 is a diagram illustrating an operation in which second control information starts to be mapped to a symbol just before a first DMRS symbol transmitted after a PSCCH that is a control channel among DMRSs of a PSCCH of a bypass slot according to an embodiment of the present disclosure.

Referring to fig. 28, the second control information 2804 may be mapped onto a symbol just before the DMRS symbol 2805 of the first PSCCH after the PSCCH 2803, the DMRS symbol 2805 of the first PSCCH, and the next symbol.

Here, the second control information may start to be mapped to the lowest subcarrier of the lowest PRB among the psch allocation resources or to the highest subcarrier in the frequency domain among the psch allocation resources.

Further, the second control information may be mapped onto one or more symbols, and in the case of fig. 28, the second control information may be mapped onto a symbol just before the first DMRS symbol transmitted after the PSCCH among the DMRSs of the PSCCH and/or the first DMRS symbol transmitted after the PSCCH.

Third embodiment

A third embodiment provides a method and apparatus for determining an amount of coded bits to which second control information is mapped.

The determination of the mapping resource and the amount of the mapping resource of the second control information or the number of bits used to encode the second control information may be based on a resource pool configuration, a PC5-RRC configuration, or the first control information. As an example, in the case where the second control information is mapped onto the psch in a manner similar to the example provided in the second embodiment of the present disclosure, the number Q 'of coded bits of the second control information that is coded using channel coding' SCI2May be calculated as described in equation 3 below.

[ equation 3]

Referring to equation 3 above, R is the coding rate of PSSCH, QmIs the modulation order of PSSCH, and R and QmMay be obtained from MCS information included in the first control information for scheduling the pscch.Is a parameter for adjusting the number of coded bits of the second control information, and may be determined based on at least one of a resource pool configuration, a PC5-RRC configuration, or a bit field of the first control information. As described above, OSCI2Is the number of bits of the second control information, and LSCI2Is the number of CRC bits added to the second control information before channel coding. Further, α may be a parameter for determining the mapping amount of the second control information. In this case, the α value may be transferred from the first control information, or may be a predetermined value.

As an example, if the α value is indicated by the first control information, the receiving terminal may obtain the first control information by decoding the PSCCH, find the α value, and decode the second control information based on the α value. Thereafter, the receiving terminal may know the resource to which the pscch is mapped and the scheduling parameter according to bit field values included in the first control information and the second control information, and may decode the pscch based on such information.

Hereinafter, a method for calculating the number of coding bits after channel coding is applied to CSI feedback information, and a method for mapping coding bits onto a pscch resource in case that CSI feedback is mapped onto the pscch resource and transmitted on the pscch resource after second control information is mapped onto the pscch region in the method for transmission of control information in 2-phase are provided. Hereinafter, two cases will be described: a first case of mapping only the CSI feedback on the PSSCH without bypassing a shared channel (SL-SCH), and a second case of mapping the CSI feedback on the PSSCH together with the SL-SCH. As described above, the SL-SCH may mean a MAC PDU or a transport block from a higher layer.

-case where SL-SCH is not included in psch: number of bits Q 'to which bypass CSI is encoded'SL-CSIMay be calculated as described in equation 4 below.

[ equation 4]

With reference to the above equation 4,is the number of Resource Elements (REs) used to map the bypass CSI feedback information on the PSSCH in the first OFDM symbol, andis the number of symbols used for the psch including DMRS symbols.

-case where SL-SCH is included in PSSCH: number of bits Q 'to which bypass CSI is encoded' SL-CSIMay be calculated as described in equation 5 below.

[ equation 5]

Referring to equation 5 above, R is the coding rate of PSSCH, QmIs the modulation order, and R and QmMay be obtained from MCS information included in the SCI for scheduling the PSSCH.Is a parameter for adjusting the number of coded bits of the bypass channel state information, and may be determined based on at least one of a resource pool configuration, a PC5-RRC configuration, or a bit field of SCI. As described above, OSL-CSIIs the number of bits by-passing the CSI feedback information, and LSL-CSIIs the number of CRC bits added to the second control information before channel coding.

For example, the above method may mean that the second control information is mapped on the PSSCH, and the bypass CSI feedback information is mapped on the remaining resources.

Example (3-1)

The (3-1) embodiment provides another example of a method and apparatus for determining the amount of the number of mapping-coded bits when mapping the second control information.

The determination of the mapping resource and the amount of the mapping resource of the second control information or the number of bits used to encode the second control information may be based on a resource pool configuration, a PC5-RRC configuration, or the first control information. As an example, in case that the second control information is mapped onto the psch in a similar manner to the example provided in the second embodiment of the present disclosure, the number of coded bits or symbols Q 'of the second control information coded using channel coding' SCI2May be calculated as described in equation 6 below.

[ equation 6]

Equation 6 may be replaced and applied by equation 7 below.

[ equation 7]

Refer to equation 7, KrMay be the size of the r-th code block of the TB included in the SL-SCH (i.e., PSSCH), and KrMay or may not be applied as a length that does not include a CRC.

As described above, CSL-SCHMay be the number of code blocks included in the TB included in the SL-SCH (i.e., the PSSCH). In addition to this, the present invention is,may be the size of the TB (i.e., TBs) included in the SL-SCH (i.e., PSSCH). That is to say that the position of the first electrode,may be replaced and applied by the size of the TB (i.e., TBs) included in the SL-SCH (i.e., PSSCH).

As mentioned above, R is the PSSCH coding rate, QmIs the modulation order, and R and QmMay be obtained from MCS information included in the first control information for scheduling the pscch.Is a parameter for adjusting the number of coded bits of the second control information, and may be determined based on at least one of a resource pool configuration, a PC5-RRC configuration, or a bit field of the first control information. As an example of this, the following is given,may be a value indicated by first control information among values configured in the corresponding resource pool, and is used to indicate in the first control informationMay be determined according to the number of values configured in the resource pool. For example, if in the resource pool is With N values, the size of the bit field may be a function of, for example, N, such asAs described above, OSCI2Is the number of bits of the second control information, and LSCI2Is the number of CRC bits added to the second control information before channel coding. As described above, α may be a parameter that determines the amount of mapping of the second control information. As described above, the α value may be transferred from the first control information or may be a predetermined value in the corresponding resource pool.

By way of example, ifThe value is indicated by the first control information, the receiving terminal can obtain the first control information by decoding the PSCCH to find outAnd decoding the second control information based on the value. Thereafter, the receiving terminal may know the resource to which the pscch is mapped and the scheduling parameter according to bit field values included in the first control information and the second control information, and based on the information, the receiving terminal may perform decoding of the pscch.

As has been described above, in the above-mentioned,may be the number of symbols allocated to the corresponding psch and may also be determined by the following method.

Fig. 29 is a diagram illustrating an operation of allocating a pscch and second control information according to an embodiment of the present disclosure. Fig. 30 is a diagram illustrating an operation of allocating a pscch and second information according to an embodiment of the present disclosure.

Referring to fig. 29, a first symbol is used for AGC (2903), DMRS 2905 of psch is located in, for example, fifth and eleventh symbols, PSCCH 2903 is located in second to fourth symbols, and second control information 2904 is located in fourth to sixth symbols. The PSSCH 2901 is located in the second to thirteenth symbols. Referring to fig. 30, a first symbol is used for AGC (3002), DMRS3005 of psch is located in, for example, a second symbol and a sixth symbol, PSCCH 3003 is located in the second symbol to the fourth symbol, and second control information 3004 is located in the third symbol. The psch 3001 is located among the third to fifth symbols.

-method 1:means the number of symbols that do not overlap with the PSCCH among symbols allocated to the corresponding PSCCH (excluding the symbol 2902 for AGC), and may selectively include DMRS symbols. For example, in the example of FIG. 29,is the number of symbols from the fourth symbol to the twelfth symbol, and thusBecomes 9.

With reference to figure 30 of the drawings,is the number of symbols from the fourth symbol to the sixth symbol, and thusBecomes 3.

-method 2:means the number of symbols allocated to the PSSCH 3001 thereafter among the first symbol of the DMRS3005 of the PSSCH 3001 and the symbol allocated to the corresponding PSSCH 3001 (excluding the AGC symbol 3002), and may selectively include the DMRS symbol 3005. For example, in the example of FIG. 29, Is the number of symbols from the fourth symbol to the twelfth symbol, and thusBecomes 9. In the example of figure 30, it is shown,is the number of symbols from the first symbol to the sixth symbol, and thusBecomes 6.

-method 3:meaning that the symbols allocated to the corresponding psch 3001 (excluding the symbols 3002 used for AGC) do not overlap the PSCCH 3003Number of symbols, and DMRS symbols 3005 may be selectively excluded. For example, in the example of FIG. 29,is the number of symbols from the fourth symbol to the twelfth symbol (excluding the fourth symbol and the tenth symbol), and thusBecomes 7. In the example of figure 30, it is shown,is the number of symbols from the fourth symbol to the sixth symbol (excluding the fifth symbol), and thusBecomes 2.

In the above-described equation, the equation,is the number of REs to which the second control information 3004 can be mapped, and a region to which at least one of PSCCH, DMRS, or PT-RS is mapped may be excluded (from the number of REs) in acquiring the number of REs.

Example (3-2)

The (3-2) embodiment provides another example of a method and apparatus for determining the amount of the number of mapping-coded bits when mapping the second control information.

The determination of the mapping resource and the amount of the mapping resource of the second control information or the number of bits used to encode the second control information may be based on a resource pool configuration, a PC5-RRC configuration, or the first control information. As an example, in case that the second control information is mapped onto the psch in a similar manner to the example provided in the second embodiment of the present disclosure, the number of coded bits or symbols Q 'of the second control information coded using channel coding' SCI2Can be calculated as in equation 8 below.

[ equation 8]

The above equation 8 may be replaced and applied by the following equation 9. Here, γ is a variable determined such that the second control information is not mapped onto RBs if any REs remain in a corresponding RB of a (OFDM or SC-FDMA) symbol to which a last symbol is mapped among (modulation) symbols created (modulated) by encoding the second control information when the second control information is mapped, i.e., REs to which the second control information is not mapped.

[ equation 9]

Referring to equation 9, γ is a variable determined such that the second control information is not mapped onto an RB if any RE remains in a corresponding RB of an (OFDM or SC-FDMA) symbol to which a last symbol is mapped among (modulation) symbols created (modulated) by encoding the second control information when the second control information is mapped, i.e., no RE to which the second control information is mapped.

As described above, KrMay be the size of the r-th code block of the TB included in the SL-SCH (i.e., PSSCH), and KrMay or may not be applied as a length that does not include a CRC. As described above, CSL-SCHMay be the number of code blocks included in the TB included in the SL-SCH (i.e., the PSSCH). In addition to this, the present invention is, May be the size of the TB (i.e., TBs) included in the SL-SCH (i.e., PSSCH). For example,may be replaced and applied by the size of the TB (i.e., TBs) included in the SL-SCH (i.e., PSSCH).

Fig. 31 is a diagram illustrating mapping of second control information to a portion of Resource Blocks (RBs) according to an embodiment of the present disclosure.

Referring to fig. 31, equation 8 and equation 9 as described above may be equations for avoiding a mapped portion (such as "3120") such that when the second control information 3110 is mapped in units of RBs as in the (3-1) embodiment, the second control information 3110 is not mapped only on a portion of RBs (i.e., the PSSCH 3100 and the second control information 3110 in one RB are mapped to each other). Fig. 31 may be a diagram illustrating a last symbol to which second control information is mapped when the second control information is mapped in the method provided in the (3-1) th embodiment.

As mentioned above, R is the PSSCH coding rate, QmIs the modulation order, and R and QmMay be obtained from MCS information included in the first control information for scheduling the pscch.Is a parameter for adjusting the number of coded bits of the second control information, and may be determined based on at least one of a resource pool configuration, a PC5-RRC configuration, or a bit field of the first control information. As an example of this, the following is given, May be a value indicated by first control information among values configured in the corresponding resource pool, and is used to indicate in the first control informationMay be determined according to the number of values configured in the resource pool. For example, if in the resource pool isWith N values, the size of the bit field may be a function of, for example, N, such asAs described above, OSCI2Is the number of bits of the second control information, and LSCI2Is the number of CRC bits added to the second control information before channel codingAmount of the compound (A). As described above, α may be a parameter that determines the amount of mapping of the second control information. As described above, the α value may be transferred from the first control information or may be a predetermined value in the corresponding resource pool.

By way of example, ifThe value is indicated by the first control information, the receiving terminal can obtain the first control information by decoding the PSCCH to find outAnd decoding the second control information based on the value. Thereafter, the receiving terminal may know the resource to which the pscch is mapped and the scheduling parameter according to bit field values included in the first control information and the second control information, and based on the information, the receiving terminal may perform decoding of the pscch.

Here, the first and second liquid crystal display panels are, May be the number of symbols allocated to the corresponding psch and may also be determined by the following method.

-method 1:means the number of symbols that do not overlap with the PSCCH among symbols allocated to the corresponding PSCCH (excluding symbols for AGC), and may selectively include DMRS symbols. For example, in the example of FIG. 29,is the number of symbols from the fourth symbol to the twelfth symbol, and thusBecomes 9. In the example of figure 30, it is shown,is the number of symbols from the fourth symbol to the sixth symbolAmount of, thereforeBecomes 3.

-method 2:means the number of symbols allocated to the psch thereafter among the first symbol of the DMRS of the psch and the symbol allocated to the corresponding psch (excluding the AGC symbol), and may selectively include the DMRS symbol. For example, in the example of FIG. 29,is the number of symbols from the fourth symbol to the twelfth symbol, and thusBecomes 9. In the example of figure 30, it is shown,is the number of symbols from the first symbol to the sixth symbol, and thusBecomes 6.

-method 3:means the number of symbols that do not overlap with the PSCCH among symbols allocated to the corresponding PSCCH (excluding symbols for AGC), and DMRS symbols can be selectively excluded. For example, in the example of FIG. 29, Is the number of symbols from the fourth symbol to the twelfth symbol (excluding the fourth symbol and the tenth symbol), and thusBecomes 7. In the example of figure 30, it is shown,is the number of symbols from the fourth symbol to the sixth symbol (excluding the fifth symbol), and thusBecomes 2.

In the above-described equation, the equation,is the number of REs to which the second control information may be mapped, and a region to which at least one of PSCCH, DMRS, or PT-RS is mapped may be excluded (from the number of REs) in acquiring the number of REs.

Examples (3 to 3)

The (3-3) embodiment provides another example of a method and apparatus for determining the amount of the number of mapping-coded bits when mapping the second control information.

The determination of the mapping resources and the amount of the mapping resources of the second control information or the number of bits used to encode the second control information is based on the resource pool configuration, the PC5-RRC configuration, or the first control information. As an example, in case that the second control information is mapped onto the psch in a similar manner to the example provided in the second embodiment of the present disclosure, the number of coded bits or symbols Q 'of the second control information coded using channel coding'SCI2Can be calculated as in equation 10 below.

[ equation 10]

Equation 10 may be replaced and applied by equation 11 below. Here, γ is a variable determined such that if any REs remain in a corresponding RB of an (OFDM or SC-FDMA) symbol to which a last symbol is mapped (i.e., REs to which the second control information is not mapped) among symbols created (modulated) by encoding the second control information when the second control information is mapped, the second control information is mapped to all the REs remaining in the RB.

[ equation 11]

Referring to equation 11, γ is a variable determined such that if any REs remain in a corresponding RB of (OFDM or SC-FDMA) symbols to which a last symbol is mapped among (modulation) symbols created (modulated) by encoding the second control information when the second control information is mapped, i.e., REs to which the second control information is not mapped, the second control information is mapped to all remaining REs of the RB.

As described above, KrMay be the size of the r-th code block of the TB included in the SL-SCH (i.e., PSSCH), and KrMay or may not be applied as a length that does not include a CRC. Here, CSL-SCHMay be the number of code blocks included in the TB included in the SL-SCH (i.e., the PSSCH). In addition to this, the present invention is,may be the size of the TB (i.e., TBs) included in the SL-SCH (i.e., PSSCH). For example,may be replaced and applied by the size of the TB (i.e., TBs) included in the SL-SCH (i.e., PSSCH).

Fig. 32 is a diagram illustrating mapping of second control information to a portion of an RB according to an embodiment of the present disclosure.

Referring to fig. 32, equation 10 and equation 11 as described above may be equations such that if there are remaining REs in RBs to which the second control information 3210 is mapped when the second control information is mapped in units of RBs (i.e., the psch 3200 and the second control information 3210 in one RB are mapped to each other), the second control information is mapped to all the remaining REs (3220). Fig. 32 may be a diagram illustrating the last symbol to which the second control information is mapped when the second control information is mapped in the method provided in the (3-1) th embodiment.

As mentioned above, R is the PSSCH coding rate, QmIs the modulation order, and R and QmMay be obtained from MCS information included in the first control information for scheduling the pscch.Is a parameter for adjusting the number of coded bits of the second control information, and may be determined based on at least one of a resource pool configuration, a PC5-RRC configuration, or a bit field of the first control information. As an example of this, the following is given,may be a value indicated by first control information among values configured in the corresponding resource pool, and is used to indicate in the first control informationMay be determined according to the number of values configured in the resource pool. For example, if in the resource pool isWith N values, the size of the bit field may be a function of, for example, N, such asAs described above, OSCI2Is the number of bits of the second control information, and LSCI2Is the number of CRC bits added to the second control information before channel coding. As described above, α may be a parameter that determines the amount of mapping of the second control information. As described above, the α value may be transferred from the first control information or may be a predetermined value in the corresponding resource pool.

By way of example, ifThe value is indicated by the first control information, the receiving terminal can obtain the first control information by decoding the PSCCH to find out And decoding the second control information based on the value. Thereafter, the receiving terminal may know the resource to which the pscch is mapped and the scheduling parameter according to bit field values included in the first control information and the second control information, and based on the information, the receiving terminal may perform decoding of the pscch.

Here, the first and second liquid crystal display panels are,may be the number of symbols allocated to the corresponding psch and may also be determined by the following method.

-method 1:is the number of symbols that do not overlap with the PSCCH among symbols allocated to the corresponding PSCCH (excluding symbols for AGC), and may selectively include DMRS symbols. For example, in the example of FIG. 29,is the number of symbols from the fourth symbol to the twelfth symbol, and thusBecomes 9. In the example of figure 30, it is shown,is the number of symbols from the fourth symbol to the sixth symbol, and thusBecomes 3.

-method 2:the number of symbols allocated to the psch thereafter among the first symbol of the DMRS that is the psch and the symbol allocated to the corresponding psch (excluding the AGC symbol), and the DMRS symbol may be selectively included. For example, in the example of FIG. 29,is the number of symbols from the fourth symbol to the twelfth symbol, and thusBecomes 9. In the example of figure 30, it is shown, Is the number of symbols from the first symbol to the sixth symbol, and thusBecomes 6.

-method 3:is the number of symbols that do not overlap with the PSCCH among the symbols allocated to the corresponding PSCCH (excluding the symbols for AGC), and DMRS symbols may be selectively excluded. For example, in the example of FIG. 29,is the number of symbols from the fourth symbol to the twelfth symbol (excluding the fourth symbol and the tenth symbol), and thusBecomes 7. In the example of figure 30, it is shown,is the number of symbols from the fourth symbol to the sixth symbol (excluding the fifth symbol), and thusBecomes 2.

In the above-described equation, the equation,is the number of REs to which the second control information can be mapped, and in acquiring the number of REs, the PSCCH,A region to which at least one of a DMRS or a phase tracking reference signal (PT-RS) is mapped may be excluded (from the number of REs).

Examples (3 to 4)

The (3-4) embodiment provides another example of a method and apparatus for determining the amount of the number of mapping-coded bits when mapping the second control information.

The determination of the mapping resource and the amount of the mapping resource of the second control information or the number of bits used to encode the second control information may be based on a resource pool configuration, a PC5-RRC configuration, or the first control information. As an example, in case that the second control information is mapped onto the psch in a similar manner to the example provided in the second embodiment of the present disclosure, the number of coded bits or symbols Q 'of the second control information coded using channel coding' SCI2Can be calculated as in equation 12 below.

[ equation 12]

Equation 12 may be replaced and applied by equation 13 below. Here, γ is a variable determined such that in the case where there are any remaining REs in a corresponding RB of a (OFDM or SC-FDMA) symbol to which a last symbol is mapped among (modulation) symbols created (modulated) by encoding of the second control information when the second control information is mapped (i.e., REs to which the second control information is not mapped), if the number of remaining REs is equal to or greater than X, the second control information is mapped to all remaining REs in the RB, and if the number of remaining REs is less than X, the second control information is not mapped to REs of the corresponding RB. For example, g may be determined to be a value less than "0" according to circumstances. As described above, "6" may be used as the X value. Further, the value of X may be predetermined according to a resource pool, or may be a value configured according to a higher layer signaling or a standard.

[ equation 13]

Referring to equation 13, γ is a variable determined such that, in the case where there are any remaining REs in a corresponding RB of an (OFDM or SC-FDMA) symbol to which the last symbol is mapped among symbols created (modulated) by encoding of the second control information when the second control information is mapped (i.e., REs to which the second control information is not mapped), if the number of remaining REs is equal to or greater than X, the second control information is mapped to all remaining REs in the RB, and if the number of remaining REs is less than X, the second control information is not mapped to REs of the corresponding RB. For example, g may be determined to be a value less than "0" according to circumstances. As described above, "6" may be used as the X value. Further, the value of X may be predetermined according to a resource pool, or may be a value configured according to a higher layer signaling or a standard.

As described above, KrMay be the size of the r-th code block of the TB included in the SL-SCH (i.e., PSSCH), and KrMay or may not be applied as a length that does not include a CRC. Here, CSL-SCHMay be the number of code blocks included in the TB included in the SL-SCH (i.e., the PSSCH). In addition to this, the present invention is,may be the size of the TB (i.e., TBs) included in the SL-SCH (i.e., PSSCH). For example,may be replaced and applied by the size of the TB (i.e., TBs) included in the SL-SCH (i.e., PSSCH).

The (3-4) embodiment will be described based on fig. 32. As described above, equation 12 and equation 13 as described above may be equations such that if there are remaining REs in the RBs to which the second control information 3210 is mapped when the second control information is mapped in units of RBs (i.e., the PSSCH 3100 and the second control information 3210 in one RB are mapped to each other), the second control information is mapped to all the remaining REs, such as 3220, or the second control information is not mapped to the RBs in which the remaining REs exist. Fig. 32 may be a diagram illustrating the last symbol to which the second control information is mapped when the second control information is mapped in the method provided in the (3-1) th embodiment.

As mentioned above, R is the PSSCH coding rate, Q mIs the modulation order, and R and QmMay be obtained from MCS information included in the first control information for scheduling the pscch.Is a parameter for adjusting the number of coded bits of the second control information, and may be determined based on at least one of a resource pool configuration, a PC5-RRC configuration, or a bit field of the first control information. As an example of this, the following is given,may be a value indicated by first control information among values configured in the corresponding resource pool, and is used to indicate in the first control informationMay be determined according to the number of values configured in the resource pool. For example, if in the resource pool isWith N values, the size of the bit field may be a function of, for example, N, such asAs described above, OSCI2Is the number of bits of the second control information, and LSCI2Is the number of CRC bits added to the second control information before channel coding. As described above, α may be a parameter that determines the amount of mapping of the second control information. As described above, the α value may be transferred from the first control information or may be a predetermined value in the corresponding resource pool.

By way of example, ifThe value is indicated by the first control informationThen, the receiving terminal can obtain the first control information by decoding the PSCCH to find out And decoding the second control information based on the value. Thereafter, the receiving terminal may know the resource to which the pscch is mapped and the scheduling parameter according to bit field values included in the first control information and the second control information, and based on the information, the receiving terminal may perform decoding of the pscch.

Here, the first and second liquid crystal display panels are,may be the number of symbols allocated to the corresponding psch and may also be determined by the following method.

-method 1:is the number of symbols that do not overlap with the PSCCH among symbols allocated to the corresponding PSCCH (excluding symbols for AGC), and may selectively include DMRS symbols. For example, in the example of FIG. 29,is the number of symbols from the fourth symbol to the twelfth symbol, and thusBecomes 9. In the example of figure 30, it is shown,is the number of symbols from the fourth symbol to the sixth symbol, and thusBecomes 3.

-method 2:first symbol of DMRS that is PSSCH and symbol allocated to corresponding PSSCH (excludingAGC symbol) and may selectively include DMRS symbols. For example, in the example of FIG. 29,is the number of symbols from the fourth symbol to the twelfth symbol, and thusBecomes 9. In the example of figure 30, it is shown, Is the number of symbols from the first symbol to the sixth symbol, and thusBecomes 6.

-method 3:is the number of symbols that do not overlap with the PSCCH among the symbols allocated to the corresponding PSCCH (excluding the symbols for AGC), and DMRS symbols may be selectively excluded. For example, in the example of FIG. 29,is the number of symbols from the fourth symbol to the twelfth symbol (excluding the fourth symbol and the tenth symbol), and thusBecomes 7. In the example of figure 30, it is shown,is the number of symbols from the fourth symbol to the sixth symbol (excluding the fifth symbol), and thusBecomes 2.

In the above-described equation, the equation,is the number of REs to which the second control information may be mapped, and a region to which at least one of PSCCH, DMRS, or PT-RS is mapped may be excluded (from the number of REs) in acquiring the number of REs.

Fourth embodiment

The fourth embodiment provides a method for mapping second control information assuming the number of layers and a determination method for calculating the number of coded bits based on the number of layers.

In performing the first, second, and third embodiments of the present disclosure as described above, the number of layers when the second control information is mapped onto the psch region may be determined based on psch layer number information provided from the first control information, and as another example, the second control information may always be mapped under the assumption of one layer.

Two layers may also be used to map the second control information if the number of layers used to map the second control information is determined based on the PSSCH layer number information provided from the first control information and the number of PSSCH layers in the first control information is "2", and one layer may also be used to map the second control information if the number of PSSCH layers in the first control information is "1". In this case, Q 'provided in the second embodiment or the third embodiment may be applied'SCI2Calculation method, alternatively, calculation for Q 'based on the number of layers may also be applied'SCI2The method of (1). For example, Q'SCI2Can be determined by the following equation 14.

[ equation 14]

Or

Refer to equation 14, NlayersMay be mapped to frequency-time in the PSSCHThe number of layers used when on the resource.

Layer number information for PSSCH data mapping may be provided from the second control information if the second control information is always mapped under the assumption of one layer.

Fifth embodiment

The fifth embodiment provides an example in which even the second control information is transmitted on the PSCCH. In this case, the PSCCH on which the first control information is transmitted and the PSCCH on which the second control information is transmitted may be PSCCHs different from each other and may be respectively mapped onto different frequency-time resources to be transmitted.

In this case, the first control information may convey frequency and time resource information of the PSCCH on which the second control information is transmitted, and for example, the transmitting terminal may include an index of a sub-channel on which the PSCCH includes the second control information or an offset value in the first control information to be notified. The subchannel information may be frequency resource information. The time resource information may be a value pre-configured in a resource pool, and for example, it may be determined to be transmitted from the next symbol of the PSCCH to which the first control information is transmitted.

As described above, the first to fifth embodiments have been separately described for convenience of explanation. However, the various embodiments include related operations, and thus at least two embodiments may be combined and configured with each other.

In order to perform the above-described embodiments of the present disclosure, transmitters, receivers, and processors of a terminal and a base station are illustrated in fig. 33 and 34. In the above-described embodiments of the present disclosure, the transmission and reception methods of the base station and the terminal are presented to deliver the source ID and the target ID or RNTI for user distinction, and in order to perform this, the receiver, processor and transmitter of the base station and the terminal should operate according to various embodiments. In the following operation, the base station may be a terminal that performs transmission in the bypass or a base station in the related art. In the following operation, the terminal may be a terminal that performs transmission or reception in the bypass.

Fig. 33 is a block diagram illustrating an internal structure of a terminal according to an embodiment of the present disclosure.

Referring to fig. 33, a terminal may include a terminal receiver 3300, a terminal transmitter 3304, and a terminal processor 3302 according to an embodiment of the present disclosure. In embodiments of the present disclosure, the terminal receiver 3300 and the terminal transmitter 3304 may be generally referred to as transceivers. The transceiver may transmit/receive signals with a base station. The signal may include control information and data. To this end, the transceiver may include an RF transmitter for up-converting and amplifying a frequency of a transmission signal, and an RF receiver for low-noise amplifying and down-converting a frequency of a reception signal. In addition, the transceiver may receive a signal through a radio channel and may output the received signal to the terminal processor 3302. In addition, the transceiver can also transmit signals output from the terminal processor 3302 over a radio channel. The terminal processor 3302 may control a series of processes so that the terminal operates according to the above-described embodiments of the present disclosure.

Fig. 34 is a diagram illustrating an internal structure of a base station according to an embodiment of the present disclosure.

Referring to fig. 34, a base station may include a base station receiver 3401, a base station transmitter 3405, and a base station processor 3403 according to an embodiment of the present disclosure. In an embodiment of the present disclosure, the base station receiver 3401 and the base station transmitter 3405 may be generally referred to as a transceiver. The transceiver may transmit/receive signals with the terminal. The signal may include control information and data. To this end, the transceiver may include an RF transmitter for up-converting and amplifying a frequency of a transmission signal, and an RF receiver for low-noise amplifying and down-converting a frequency of a reception signal. In addition, the transceiver may receive a signal through a radio channel and may output the received signal to the base station processor 3403. In addition, the transceiver can also transmit a signal output from the base station processor 3403 through a radio channel. The base station processor 3403 may control a series of processes so that the base station operates according to the above-described embodiment of the present disclosure.

While the disclosure has been shown and described with reference to various embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims and their equivalents. Further, the various embodiments may operate in combination, as appropriate. For example, the first embodiment and the fourth embodiment may be combined and applied. Further, other modified examples based on the technical ideas of the above-described embodiments may be embodied in the LTE system and the 5G system.

75页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:用于微时隙PUSCH的传输块确定的用户设备、基站和方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!