[go: up one dir, main page]

WO2025031070A1 - Procédé et appareil de communication, et support de stockage - Google Patents

Procédé et appareil de communication, et support de stockage Download PDF

Info

Publication number
WO2025031070A1
WO2025031070A1 PCT/CN2024/103447 CN2024103447W WO2025031070A1 WO 2025031070 A1 WO2025031070 A1 WO 2025031070A1 CN 2024103447 W CN2024103447 W CN 2024103447W WO 2025031070 A1 WO2025031070 A1 WO 2025031070A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
time
resources
priority
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
PCT/CN2024/103447
Other languages
English (en)
Chinese (zh)
Inventor
齐鸿
张懿
苏宏家
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of WO2025031070A1 publication Critical patent/WO2025031070A1/fr
Pending legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0446Resources in time domain, e.g. slots or frames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0453Resources in frequency domain, e.g. a carrier in FDMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/56Allocation or scheduling criteria for wireless resources based on priority criteria
    • H04W72/566Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient

Definitions

  • the present application relates to the field of communication technology, and in particular to a communication method, device and storage medium.
  • UE user equipment
  • channels can be competed for in a listen-before-talk (LBT) manner.
  • Unlicensed spectrum resources can be shared between different UEs, that is, as long as network equipment complies with certain regulations, the spectrum can be used to receive and send information.
  • COT channel occupancy time
  • the UE obtains the COT it can share the resources in the COT with other UEs. After receiving the shared information, other UEs can use the specified resources to send information at the specified time.
  • UE3 intercepts UE1's reservation information (for example, reserving resources for time slot t3).
  • UE1 can be the receiving end of UE3, or a UE with higher priority. After UE3 obtains COT, it can share some resources with UE1.
  • UE3 performs re-evaluation or preemption evaluation at time m-T3, it finds that the selected resources (resources corresponding to time slots t1 and t2) are selected or preempted by a third UE (for example, UE2), because UE2 may not receive UE1's reservation information due to half-duplex or distance problems. If UE3 selects other resources, the initially selected resources (resources corresponding to time slots t1 and t2) will be used by UE2, and UE1's transmission cannot be guaranteed.
  • the present application provides a communication method, device and storage medium to improve the reliability of unauthorized resource sharing.
  • a communication method is provided, which can be executed by a terminal or by a module applied to the terminal (such as a processor, chip, or chip system, etc.), or by a logical node, logical module or software that can implement all or part of the terminal functions.
  • a module applied to the terminal such as a processor, chip, or chip system, etc.
  • a logical node, logical module or software that can implement all or part of the terminal functions.
  • the method includes: a first terminal receives first information from a second terminal, the first information indicating a reservation of a first time-frequency resource; the first terminal performs channel access to obtain a first COT, the first COT at least including a second time-frequency resource and the first time-frequency resource; the first terminal receives second information from a third terminal, the second information indicating a reservation of the second time-frequency resource; and when the first terminal determines that the priority corresponding to the first terminal and/or the second terminal is higher than or equal to the priority corresponding to the third terminal, the first terminal sends third information to the second terminal, the third information indicating sharing the first time-frequency resource with the second terminal.
  • the first terminal when triggering resource selection, can share resources with the second terminal by comparing the priority corresponding to itself and/or the second terminal and the priority corresponding to the third terminal, and when the priority corresponding to itself and/or the second terminal is higher than or equal to the priority corresponding to the third terminal, the reliability of unauthorized resource sharing is improved.
  • the method further includes: the first terminal uses the second time-frequency resource for communication.
  • the first terminal uses the second time-frequency resource for communication.
  • the second time-frequency resource is used by the first terminal, so that the first terminal can use the second time-frequency resource for communication.
  • the method further includes: the first terminal sends a cyclic prefix extension before using the second time-frequency resource, wherein the starting position or length of the cyclic prefix extension is related to the priority corresponding to the first terminal and/or the second terminal.
  • the first terminal sends a cyclic prefix extension before using the second time-frequency resource to seize the channel, and the starting position or length of the cyclic prefix extension is related to the priority corresponding to the first terminal and/or the second terminal, which is conducive to the first terminal to seize the channel more easily.
  • the first terminal when the first terminal determines that the service priority corresponding to the first terminal and/or the second terminal is higher than or equal to the service priority corresponding to the third terminal, the first terminal sends third information to the second terminal.
  • the first terminal when the first terminal determines that the channel access priority corresponding to the first terminal and/or the second terminal is higher than or equal to the channel access priority corresponding to the third terminal, the first terminal sends third information to the second terminal.
  • the starting position or length of the cyclic prefix extension is related to the service priority corresponding to the first terminal and/or the second terminal.
  • the starting position or length of the cyclic prefix extension is related to the channel access priority corresponding to the first terminal and/or the second terminal.
  • the priority is a service priority or a channel access priority.
  • the first time-frequency resource occupies the available frequency domain resources of the entire channel in the frequency domain.
  • the starting position or length of the cyclic prefix extension can be determined based on the priority corresponding to the first terminal and/or the second terminal.
  • the first terminal does not detect reservation information of other terminals in the time slot corresponding to the first time-frequency resource.
  • the starting position or length of the cyclic prefix extension can be determined based on the priority corresponding to the first terminal and/or the second terminal.
  • the second time-frequency resource occupies the available frequency domain resources of the entire channel in the frequency domain.
  • the starting position or length of the cyclic prefix extension can be determined based on the priority corresponding to the first terminal and/or the second terminal.
  • the first terminal does not detect the reservation information of other terminals in the time slot corresponding to the second time-frequency resource.
  • the starting position or length of the cyclic prefix extension can be determined based on the priority corresponding to the first terminal and/or the second terminal.
  • the second terminal is a receiving terminal of the first terminal.
  • the second terminal is a receiving terminal of the first terminal, so that after the first terminal completes LBT, the remaining resources occupied by the first terminal can be shared with the second terminal, thereby improving the reliability of communication between the first terminal and the second terminal.
  • the third information is sent to indicate that the first time-frequency resource can be shared with the second terminal.
  • the second terminal needs a certain time to parse the third information. Therefore, there needs to be a certain time interval between the second time-frequency resource and the first time-frequency resource.
  • the first time interval is associated with a subcarrier spacing.
  • the second time-frequency resource precedes the first time-frequency resource in the time domain.
  • the second time-frequency resource is reserved by the first terminal.
  • the method can be applied to a resource preemption scenario.
  • a communication device for implementing the communication method in the first aspect or any one of the implementations of the first aspect.
  • the device may be a terminal, or a module (such as a processor, a chip, or a chip system) applied to a terminal, or a logical node, a logical module, or software that can implement all or part of the terminal functions.
  • the device includes: a transceiver unit and a processing unit; wherein: the transceiver unit is used to receive first information from a second terminal, the first information indicating a reservation for a first time-frequency resource; the processing unit is used to perform channel access and obtain a first channel occupancy time COT, the first COT including at least a second time-frequency resource and the first time-frequency resource; the transceiver unit is also used to receive second information from a third terminal, the second information indicating a reservation for the second time-frequency resource; and the transceiver unit is also used to send third information to the second terminal when the processing unit determines that the priority corresponding to the first terminal and/or the second terminal is higher than or equal to the priority corresponding to the third terminal, the third information indicating sharing the first time-frequency resource with the second terminal.
  • the transceiver unit is used to receive first information from a second terminal, the first information indicating a reservation for a first time-frequency resource
  • the processing unit is used to perform channel access and obtain a
  • the transceiver unit is also used to communicate using the second time-frequency resources.
  • the transceiver unit is further used to send a cyclic prefix extension before using the second time-frequency resource, wherein a starting position or length of the cyclic prefix extension is related to a priority corresponding to the first terminal and/or the second terminal.
  • the priority is a service priority or a channel access priority.
  • the first time-frequency resources occupy available frequency domain resources of the entire channel in the frequency domain.
  • the communication device does not detect reservation information of other terminals in the time domain time slot corresponding to the first time-frequency resource.
  • the second time-frequency resources occupy available frequency domain resources of the entire channel in the frequency domain.
  • the communication device does not detect reservation information of other terminals in the time domain time slot corresponding to the second time-frequency resource.
  • the second terminal is a receiving end of the first terminal.
  • the first time interval is associated with a subcarrier spacing.
  • the second time-frequency resource is reserved by the first terminal.
  • the communication device in the second aspect includes a processor coupled to a memory; the processor is configured to enable the device to perform the corresponding functions in the above communication method.
  • the memory is used to couple with the processor, which stores the necessary programs (instructions) and/or data for the device.
  • the communication device may also include a communication interface for implementing communication between the device and other network elements.
  • the memory may be located inside the communication device or outside the communication device.
  • the communication device in the second aspect includes a processor and a transceiver, the processor is coupled to the transceiver, and the processor is used to execute a computer program or instruction to control the transceiver to receive and send information; when the processor executes the computer program or instruction, the processor is also used to implement the above method through a logic circuit or execute code instructions.
  • the transceiver may be a transceiver, a transceiver circuit or an input-output interface, which is used to receive signals from other communication devices outside the communication device and transmit them to the processor or send signals from the processor to other communication devices outside the communication device.
  • the transceiver is a transceiver circuit or an input-output interface.
  • the sending unit may be an output unit, such as an output circuit or a communication interface; the receiving unit may be an input unit, such as an input circuit or a communication interface.
  • the sending unit may be a transmitter or a transmitter; the receiving unit may be a receiver or a receiver.
  • a computer-readable storage medium wherein a computer program or instruction is stored in the computer-readable storage medium.
  • the computer program or instruction is executed, the method described in the first aspect or any one of the implementations of the first aspect is implemented.
  • a computer program product comprising instructions.
  • the instructions When the instructions are executed on a communication device, the communication device executes the method described in the first aspect or any one implementation of the first aspect.
  • FIG1 is a schematic diagram of existing resource selection
  • FIG2 is a schematic diagram of the architecture of a communication system used in an embodiment of the present application.
  • FIG3 is a schematic diagram of C-V2X provided in an embodiment of the present application.
  • FIG4 is a schematic diagram of an example of an interleaved resource block according to an embodiment of the present application.
  • FIG5 is a schematic diagram of indicating available subframes for SL communication through a bit map in an NR SL according to an embodiment of the present application
  • FIG6 is a schematic diagram of frequency resources of an SL communication resource pool according to an embodiment of the present application.
  • FIG7a is a schematic diagram of a subchannel with a granularity of staggered resource blocks
  • FIG7b is a schematic diagram of a sub-channel with continuous RB resources as the granularity
  • FIG8 is a schematic diagram showing the relationship between physical time slots and logical time slots according to an embodiment of the present application.
  • FIG9 is a schematic diagram of a sub-channel according to an embodiment of the present application.
  • FIG10 is a schematic diagram of a resource selection process provided in an embodiment of the present application.
  • FIG11 is a schematic diagram of COT sharing based on reservation according to an embodiment of the present application.
  • FIG12 is a schematic diagram of an open COT sharing example according to an embodiment of the present application.
  • FIG13 is a schematic diagram of a CP duplication process in an OFDM symbol according to an embodiment of the present application.
  • FIG14 is a schematic diagram of a CPE process in an NR-U system according to an embodiment of the present application.
  • FIG15a is a schematic diagram showing the distribution of the starting positions of CPEs at 30 KHz according to an embodiment of the present application.
  • FIG15 b is a schematic diagram showing the distribution of the starting positions of CPEs at 60 KHz according to an embodiment of the present application.
  • FIG16 is a schematic diagram of an application scenario in which different priorities determine different CPE lengths according to an example of an embodiment of the present application
  • FIG17 is a schematic diagram of a COT sharing solution provided in an embodiment of the present application.
  • FIG18 is a schematic diagram of another COT sharing solution provided in an embodiment of the present application.
  • FIG19 is a schematic diagram of another COT sharing solution provided in an embodiment of the present application.
  • FIG20 is a flow chart of a communication method provided in an embodiment of the present application.
  • FIG21 is a schematic diagram of a network scenario in which a terminal according to an example of an embodiment of the present application is located;
  • FIG22 is a schematic diagram of a COT sharing solution in a resource reassessment scenario provided by an embodiment of the present application.
  • FIG23 is a schematic diagram of a COT sharing solution in a resource preemption evaluation scenario provided by an embodiment of the present application.
  • FIG24 is a schematic diagram of the structure of a communication device provided in an embodiment of the present application.
  • FIG25 is a schematic diagram of the structure of another communication device provided in an embodiment of the present application.
  • the at least one (item) involved in the present application indicates one (item) or more (items). More than one (item) refers to two (items) or more than two (items).
  • "And/or" describes the association relationship of associated objects, indicating that three relationships may exist. For example, A and/or B can represent: A exists alone, A and B exist at the same time, and B exists alone.
  • the character "/” generally indicates that the objects associated before and after are in an "or” relationship.
  • first, second, etc. may be used to describe each object in the present application, these objects should not be limited to these terms. These terms are only used to distinguish each object from each other.
  • the communication system can be a fourth generation (4G) communication system (such as a long term evolution (LTE) system), a fifth generation (5G) communication system, a worldwide interoperability for microwave access (WiMAX) or a wireless local area network (WLAN) system, or a fusion system of multiple systems, or a future communication system, such as a 6G communication system.
  • 4G fourth generation
  • 5G fifth generation
  • WiMAX worldwide interoperability for microwave access
  • WLAN wireless local area network
  • fusion system such as a 6G communication system
  • 6G communication system a future communication system
  • the 5G communication system can also be called a new radio (NR) system.
  • NR new radio
  • a network element in a communication system can send a signal to another network element or receive a signal from another network element.
  • the signal may include information, signaling, or data, etc.
  • the network element may also be replaced by an entity, a network entity, a device, a terminal device, a communication module, a node, a communication node, etc.
  • the network element is used as an example for description in this application.
  • a communication system may include at least one terminal device and at least one access network device.
  • the access network device may send a downlink signal to the terminal device, and/or the terminal device may send an uplink signal to the access network device.
  • the plurality of terminal devices may also send signals to each other, that is, the signal sending network element and the signal receiving network element may both be terminal devices.
  • the communication method provided in the embodiment of the present application can be applied to wireless communication systems such as 5G, 6G, and satellite communication.
  • Figure 2 is a schematic diagram of the architecture of the communication system applied in the embodiment of the present application.
  • the communication system 1000 includes a wireless access network 100 and a core network 200.
  • the communication system 1000 may also include the Internet 300.
  • the wireless access network 100 may include at least one wireless access network device (such as 110a and 110b in Figure 2), and may also include at least one terminal (such as 120a-120j in Figure 2).
  • the terminal is connected to the wireless access network device by wireless means, and the wireless access network device is connected to the core network by wireless or wired means.
  • the core network device and the wireless access network device can be independent and different physical devices, or the functions of the core network device and the logical functions of the wireless access network device can be integrated on the same physical device, or the functions of some core network devices and some wireless access network devices can be integrated on one physical device.
  • Terminals and terminals and wireless access network devices and wireless access network devices can be connected to each other by wire or wireless means.
  • FIG. 2 is only a schematic diagram.
  • the communication system may also include other network devices, such as wireless relay devices and wireless backhaul devices, which are not shown in FIG. 2 .
  • the wireless access network device may be a base station, an evolved NodeB (eNodeB), a transmission reception point (TRP), a next generation NodeB (gNB) in a fifth generation (5G) mobile communication system, a next generation NodeB in a sixth generation (6G) mobile communication system, a base station in a future mobile communication system, or an access node in a WiFi system, etc.; it may also be a module or unit that completes part of the functions of a base station, for example, a centralized unit (CU) or a distributed unit (DU).
  • the wireless access network device may be a macro base station (such as 110a in FIG. 2), a micro base station or an indoor station (such as 110b in FIG.
  • the embodiments of the present application do not limit the specific technology and specific device form adopted by the wireless access network device.
  • the following description takes a base station as an example of a wireless access network device.
  • a terminal may also be referred to as a terminal device, user equipment (UE), a mobile station, a mobile terminal, etc.
  • a terminal can be widely Applied to various scenarios, for example, device-to-device (D2D), vehicle to everything (V2X) communication, machine-type communication (MTC), Internet of Things (IoT), virtual reality, augmented reality, industrial control, autonomous driving, telemedicine, smart grid, smart furniture, smart office, smart wear, smart transportation, smart city, etc.
  • D2D device-to-device
  • V2X vehicle to everything
  • MTC machine-type communication
  • IoT Internet of Things
  • virtual reality augmented reality
  • industrial control autonomous driving
  • telemedicine smart grid
  • smart furniture smart office
  • smart wear smart transportation
  • smart city etc.
  • the terminal can be a mobile phone, a tablet computer, a computer with wireless transceiver function, a wearable device, a vehicle, a drone, a helicopter, an airplane, a ship, a robot, a robotic arm, a smart home device, a road side unit (RSU), a vehicle-mounted module, a vehicle-mounted module, a chip or a whole vehicle, etc.
  • the embodiments of the present application do not limit the specific technology and specific device form adopted by the terminal.
  • Base stations and terminals can be fixed or movable. Base stations and terminals can be deployed on land, including indoors or outdoors, handheld or vehicle-mounted; they can also be deployed on the water surface; they can also be deployed on aircraft, balloons, and artificial satellites in the air. The embodiments of this application do not limit the application scenarios of base stations and terminals.
  • the helicopter or drone 120i in FIG. 2 can be configured as a mobile base station.
  • the terminal 120j that accesses the wireless access network 100 through 120i
  • the terminal 120i is a base station; but for the base station 110a, 120i is a terminal, that is, 110a and 120i communicate through the wireless air interface protocol.
  • 110a and 120i can also communicate through the interface protocol between base stations.
  • relative to 110a, 120i is also a base station. Therefore, base stations and terminals can be collectively referred to as communication devices.
  • 110a and 110b in FIG. 2 can be referred to as communication devices with base station functions
  • 120a-120j in FIG. 2 can be referred to as communication devices with terminal functions.
  • Base stations and terminals, base stations and base stations, and terminals and terminals can communicate through authorized spectrum, unauthorized spectrum, or both; they can communicate through spectrum below 6 gigahertz (GHz), spectrum above 6 GHz, or spectrum below 6 GHz and spectrum above 6 GHz.
  • GHz gigahertz
  • the embodiments of the present application do not limit the spectrum resources used for wireless communication.
  • the functions of the base station may also be performed by a module (such as a chip) in the base station, or by a control subsystem including the base station function.
  • the control subsystem including the base station function here may be a control center in the above-mentioned application scenarios such as smart grid, industrial control, smart transportation, and smart city.
  • the functions of the terminal may also be performed by a module (such as a chip or a modem) in the terminal, or by a device including the terminal function.
  • the base station sends a downlink signal or downlink information to the terminal, and the downlink information is carried on the downlink channel; the terminal sends an uplink signal or uplink information to the base station, and the uplink information is carried on the uplink channel.
  • the terminal In order to communicate with the base station, the terminal establishes a wireless connection with the cell controlled by the base station.
  • the cell with which the terminal has established a wireless connection is called the service cell of the terminal.
  • the service cell When the terminal communicates with the service cell, it will also be interfered by signals from neighboring cells.
  • the time domain symbol may be an orthogonal frequency division multiplexing (orthogonal frequency division multiplexing, OFDM) symbol or a discrete Fourier transform spread-OFDM (Discrete Fourier Transform-spread-OFDM, DFT-s-OFDM) symbol. If not otherwise specified, the symbols in the embodiments of the present application refer to time domain symbols.
  • the physical downlink shared channel (PDSCH), the physical downlink control channel (PDCCH) and the physical uplink shared channel (PUSCH) are merely examples of downlink data channels, downlink control channels and uplink data channels, respectively.
  • data channels and control channels may have different names, and the embodiments of the present application do not limit this.
  • C-V2X Cellular vehicle-to-everything
  • C-V2X is a V2X communication technology developed based on cellular systems. It utilizes and enhances current cellular network functions and elements to achieve low-latency and high-reliability communication between various nodes in the vehicle network.
  • a schematic diagram of C-V2X provided in an embodiment of the present application is provided, which includes vehicle-to-vehicle communication (vehicle to vehicle, V2V), vehicle-to-pedestrian communication (vehicle to pedestrian, V2P), vehicle-to-infrastructure communication (vehicle to infrastructure, V2I), and vehicle-to-network communication (vehicle to network, V2N).
  • V2V vehicle-to-vehicle communication
  • V2P vehicle-to-pedestrian communication
  • V2I vehicle-to-infrastructure communication
  • V2N vehicle-to-network communication
  • NR-V2X new radio V2X
  • V2X communication has great potential in reducing vehicle collision accidents, and therefore the number of casualties.
  • the advantages of V2X are not limited to improving safety.
  • Vehicles that can perform V2X communication can help better manage traffic, further promote green transportation and lower energy consumption.
  • Intelligent transportation system (ITS) is an application that combines V2X.
  • vehicle users vehicle UE, V-UE
  • V-UE vehicle users
  • V-UE vehicle UE
  • V-UE vehicle users
  • V-UE vehicle UE
  • V-UE vehicle users
  • V-UE vehicle users
  • V-UE can send some of their own information, such as location, speed, intention (turning, merging, reversing) and other periodic information and some non-periodic event-triggered information to the surrounding V-UE.
  • V-UE will also receive information from surrounding users in real time.
  • V2X can support lower transmission latency, more reliable communication transmission, higher throughput, better user experience, and meet the needs of a wider range of application scenarios. Furthermore, the vehicle-to-vehicle communication technology supported by V2X can be extended to device-to-device (D2D) communication under any system.
  • D2D device-to-device
  • frequency bands can be divided into licensed bands and unlicensed bands according to the different frequency bands used.
  • licensed bands users use spectrum resources based on the scheduling of central nodes.
  • LTE-U unlicensed spectrum
  • LAA licensed assisted access
  • MulteFire unlicensed bands
  • unlicensed bands have been used by some wireless communication devices, such as Wi-Fi.
  • the LTE system introduces a listen-before-talk (LBT) mechanism to enable it to coexist with Wi-Fi devices, while enabling LTE Uu interface communication on unlicensed bands.
  • LBT listen-before-talk
  • PC5 interface which is a communication interface between UEs.
  • the transmission link in the PC5 interface is defined as a sidelink (SL).
  • SL sidelink
  • Enabling SL communication in unlicensed bands in local space is an important evolution direction, and the corresponding protocol technologies can be collectively referred to as SL-U. Similar to the Uu interface, UE using the SL-U protocol also needs to coexist with nearby Wi-Fi devices based on the LBT mechanism.
  • the transmitting node needs to use the spectrum resources in a competitive manner. Specifically, it competes for the channel by the listen-before-talk (LBT) method.
  • LBT listen-before-talk
  • the LBT mechanism is essentially a channel access rule based on random back-off. Before accessing the channel and starting to send data, the UE needs to sense whether the channel is idle. If the channel has been idle for a certain period of time, it can occupy the channel. If the channel is not idle, it needs to wait for the channel to be idle again before occupying the channel.
  • the reason why the LBT mechanism has become a mandatory feature of the unlicensed frequency band is that various regions of the world have regulations for the use of unlicensed frequency bands. UEs of various forms working in different communication protocols can only use unlicensed frequency bands if they meet the regulations, thereby using spectrum resources relatively fairly and efficiently.
  • Unlicensed spectrum resources can be shared between different user devices, that is, as long as the network devices comply with certain regulations, they can use the spectrum to receive and send information.
  • a user device obtains a transmission opportunity through LBT, the length of time that can continuously send information corresponding to the transmission opportunity is called channel occupancy time (COT).
  • COT channel occupancy time
  • the user device After the user device obtains the COT, it can share the spectrum with other user devices and send the shared resources in the COT, including the corresponding time and frequency domain position, to other user devices. After receiving the shared information, other user devices can use the specified frequency domain resources to send information at the specified time.
  • the devices used in D2D technology are generally half-duplex devices, that is, the UE can only be in the state of receiving or sending information at the same time, and does not have the ability to send and receive at the same time.
  • mode 1 there are two resource allocation modes of the PC5 interface: mode 1 and mode 2.
  • mode 1 the base station allocates transmission resources to V2X through the Uu interface, so the UE in mode 1 must be within the network coverage.
  • the spectrum resources of SL can be shared with uplink communication resources.
  • mode 1 and mode 2 can be allocated to different resource pools or share resource pools. Resource pool sharing can improve resource utilization efficiency, but it is also easy to cause conflicts between mode 1 and mode 2. Therefore, the UE in mode 1 will notify the UE in mode 2 of the resources allocated for its future transmission.
  • NR-U adopts the LBT channel access method.
  • the LBT access method generally adopts energy-based detection and signal type detection.
  • NR-U adopts energy detection
  • WiFi adopts a combination of the two detection methods.
  • Energy-based detection requires setting an energy detection threshold. When the detected energy exceeds the detection threshold, it is judged that the channel is busy and access to the channel is not allowed. When the detected energy is lower than the detection threshold, if it continues for more than a period of time, access to the channel is allowed.
  • OCB minimum occupied channel bandwidth
  • the minimum OCB must be at least 80% of the normal bandwidth. Taking 20MHz as an example, at least 16MHz of bandwidth must be occupied to seize the 20MHz channel.
  • the 3rd Generation Partnership Project (3GPP) NR-U system introduces the concept of interlaced resource blocks, and defines interlacem ⁇ 0,1,...,M-1 ⁇ to include multiple ⁇ m,M+m,2M+m,3M+m,... ⁇ resource blocks (RBs).
  • SCS subcarrier spacing
  • M 10
  • FIG 4 it is a schematic diagram of an interlaced resource block in an example of an embodiment of the present application. For 15kHz SCS, interlace#1 has 10 interlaced resource blocks, and each interlaced resource block is the 10th RB of a subchannel.
  • the time and frequency resources for SL communication are configured based on the SL communication resource pool.
  • the SL communication resource pool can be regarded as a collection of time resources and frequency resources used for SL communication.
  • the base station uses a bit map and periodically repeats the bit map to indicate the set of subframes used for SL communication in all subframes in the system.
  • Figure 5 it is a schematic diagram of indicating the available subframes for SL communication through a bit map in the NR SL of the embodiment of the present application, and the length of the bit map is 8 bits.
  • the number of symbols occupied by SL transmission in each subframe is fixed to M symbols, and M is defined as an SL time domain transmission duration, or a time domain transmission unit.
  • the base station For the frequency resources of the SL communication resource pool, the base station divides the frequency band used for SL communication into several sub-channels. Resource selection and transmission are determined based on the sub-channel granularity, and each sub-channel contains a certain number of resource blocks.
  • Figure 6 it is a schematic diagram of the frequency resources of the SL communication resource pool of the embodiment of the present application, in which the base station indicates the sequence number of the first resource block of the frequency resources used for SL communication, the total number of sub-channels contained in the communication resource pool N, and the number of resource blocks contained in each sub-channel n CH .
  • SL transmission can occupy one time One or more sub-channels are used.
  • scheduling is performed in the frequency domain with sub-channels as the granularity.
  • the definition of a subchannel can be composed of one or more interlaces, as shown in FIG7a, which is a schematic diagram of a subchannel with staggered resource blocks as the granularity, wherein one interlace can span multiple resource block sets (RB sets) or only one RB set, and one RB set can correspond to a 20MHz channel.
  • a subchannel can be composed of multiple continuous RB resources, as shown in FIG7b, which is a schematic diagram of a subchannel with continuous RB resources as the granularity.
  • occupying all frequency domain resources may mean occupying all available frequency domain resources of a channel.
  • LBT mechanisms are generally divided into the following four categories:
  • Category 1 LBT Send immediately after a short switching gap. Also known as Cat 1 LBT, it is used for communication equipment to send immediately after the switching gap from the receiving state to the sending state in COT. COT refers to the time that the communication equipment is allowed to occupy the channel after successfully accessing the channel; the switching gap time cannot be greater than 16us.
  • Category 2 LBT LBT without random backoff. Also called Cat 2 LBT, it is used for communication equipment to send without random backoff after it detects that the channel is idle for a certain period of time.
  • Category 3 LBT LBT with random backoff and fixed-size contention window. Also called Cat 3 LBT, it is used for communication equipment to generate a random number N based on a fixed-size contention window and to send after the channel is detected to be idle for a period of time determined by the random number N.
  • the size of the contention window is related to the minimum and maximum values of N.
  • Category 4 LBT LBT with random backoff and variable-sized contention window. Also known as Category 4 LBT, it is used for a communication device to generate a random number N based on a variable-sized contention window and to send after detecting that the channel is idle for a period of time determined by the random number N.
  • the size of the contention window is related to the minimum and maximum values of N, and the communication device can change the size of the contention window.
  • NR-U devices follow the 3GPP protocol and use the LBT mechanism as the channel access method. Specifically, NR-U devices use the following types of LBT:
  • Type 1 LBT Cat 4 LBT.
  • NR-U devices need to perform random backoff before they can access the channel and send data.
  • the network device or the terminal device may initiate information transmission after the channel is sensed to be idle for a sensing slot duration of an extended duration (defer sensing, denoted as T d ) and after the counter N in the following step 4 is zero.
  • the counter N is adjusted by sensing the channel to obtain an additional sensing slot duration according to the following steps:
  • N init N init , where N init is a random number uniformly distributed between 0 and CW p , and execute step 4;
  • N N-1 is set
  • CW min,p and CW max,p are selected before step 1 of the above procedure.
  • m p , CW min,p and CW max,p are based on the channel access priority level p associated with the network device or terminal device transmission, as shown in Table 1 below:
  • the COT of a network device or terminal transmission on a channel does not exceed T mcot,p , wherein the channel access procedure is performed based on a channel access priority level p associated with the network device or terminal transmission.
  • the network device or terminal maintains the contention window value CW p and adjusts the value of CW p according to the following steps before step 1 in the above fallback:
  • the reference subframe k is the starting subframe of the most recent transmission of the network device or terminal on the channel.
  • Type 2A LBT Cat 2 LBT with 25us interval.
  • the NR-U device can access the channel and send data after detecting that the channel is idle for 25us.
  • Type 2B LBT Cat 2 LBT with 16us interval.
  • the NR-U device can access the channel and send data after detecting that the channel is idle for 16us.
  • Type 2C LBT Cat 1 LBT with a maximum interval of 16us.
  • the NR-U device does not need to listen to the channel and can directly access the channel and send data after a transition interval of up to 16us within the COT.
  • the NR-U device can be used as a load-based equipment (LBE), which can perform channel perception and contention access at any time point without considering frame boundaries.
  • LBE load-based equipment
  • FBE frame-based equipment
  • the NR-U device is only allowed to obtain COT through contention access to the channel on the frame boundary synchronized within the system.
  • the "frame” here means a fixed frame period (FFP), and the specific period value is configured by the radio resource control (RRC) signaling.
  • RRC radio resource control
  • the current protocol supports period values of 1ms, 2ms, 2.5ms, 4ms, 5ms and 10ms, which can be divided by 2 radio frame durations, that is, 20ms.
  • the terminal may obtain SL resource pool configuration information and/or SL bandwidth part (BWP) configuration information by receiving the system information block (SIB), cell-specific RRC signaling or user-specific RRC signaling of the network device.
  • the terminal may also use pre-configured SL resource pool configuration information or SL BWP configuration information, for example, when there is no network coverage.
  • the SL resource pool configuration information includes resource pool resource information, which is used to indicate the SL resource pool.
  • a resource pool is a collection of time-frequency resources used for sideline communication between UEs.
  • a resource pool may include code domain resources.
  • the resources in the resource pool are used by the terminal to send and receive at least one of the following physical channel resources: physical sidelink control channel (physical sidelink control channel, PSCCH) (used to carry sidelink control information (sidelink control information, SCI)), physical sidelink shared channel (physical sidelink shared channel, PSSCH) (used to carry at least one of control information, data, sidelink CSI feedback information, etc.), physical sidelink discovery channel (physical sidelink discovery channel, PSDCH) (used to carry discovery messages), physical sidelink feedback channel (physical sidelink feedback channel, PSFCH) (used to carry sidelink feedback messages).
  • physical sidelink control channel physical sidelink control channel, PSCCH
  • sidelink control information sidelink control information
  • PSSCH physical sidelink shared channel
  • PSDCH physical sidelink discovery channel
  • PSFCH physical sidelink feedback channel
  • the side feedback information can be used for data information (including hybrid automatic repeat request (HARQ) response feedback information, such as acknowledgement (ACK) or negative acknowledgement (NACK), and can also include channel state indication (CSI) feedback information), and can also be used to indicate at least one of the following information, for example, energy saving information, resource auxiliary information (including recommended resources, unrecommended resources, resource collisions, resource reservation conflicts, half-duplex conflicts that have occurred in the past or will occur in the future), physical sidelink broadcast channel (PSBCH) (used to carry information related to side synchronization), etc.
  • the service types carried by PSSCH can include unicast, multicast and/or broadcast communication types. In the time domain of the SL resource pool, one or more time units are included.
  • the time unit may be one or more symbols, one or more time slots, one or more mini-slots, one or more subframes, or one or more frames.
  • One or more time units may be continuous or discrete in time. It should be understood that the time domain units in a resource pool are logically continuous.
  • Time slots 1 to 8 are time slots that are continuous in time, and such time slots are called physical time slots.
  • the physical time slots—time slot 1, time slot 3, time slot 5, and time slot 8 are configured as time slots belonging to a resource pool. Since the time slots contained in the resource pool may be discontinuous in time, from the perspective of the resource pool, time slots 1, 3, 5, and 8 on the physical time slots correspond to time slots 1’, 2’, 3’, and 4’ in the resource pool. Then.
  • the continuous time slots contained in the resource pool are logically continuous time slots from the perspective of the resource pool. Such logically continuous but not necessarily temporally continuous time slots are called logical time slots.
  • a frequency domain unit can be a resource element (RE), several REs, a resource block (RB), several RBs, a sub-channel, or several sub-channels.
  • the size of a sub-channel, which means that a sub-channel includes one or more continuous or interlaced RBs in the frequency domain can be an integer such as 10, 12, 15, 20, 25, or 50.
  • the SL resource pool configuration information may also include PSCCH configuration information.
  • the PSCCH configuration information includes the PSCCH in a time slot. The number of occupied symbols and the number of RBs occupied by the PSCCH in a subchannel.
  • the SL BWP configuration information may include SL resource pool information, which is used to configure the number of resource pools included in the BWP.
  • the SL BWP configuration information may include SL bandwidth information, which is used to indicate the bandwidth size for SL communication, for example, indicating that the SL bandwidth is 20 megahertz (MHz).
  • the SL BWP configuration information may also include SL symbol information, which is used to indicate the starting SL symbol position on a time slot and the number of continuous SL symbols occupied.
  • the SL BWP configuration information may also include SL subcarrier spacing and cyclic prefix information, which are used to indicate the subcarrier spacing and cyclic prefix used for SL communication.
  • the cyclic prefix indicates an extended cyclic prefix or a normal cyclic prefix.
  • the SL BWP configuration information may also include SL resource pool configuration information.
  • time unit In the embodiments of the present application, unless the meaning of the time unit is specifically stated, it is described by time slots, but the time unit is not limited to time slots only; unless the meaning of the time-frequency domain unit is specifically stated, it is described by subchannels, but the frequency domain unit is not limited to subchannels only.
  • the SCI of the NR SL system is divided into first-level SCI and second-level SCI.
  • PSCCH carries the first-level SCI, which is used to schedule the second-level SCI and PSSCH. Since SL is a distributed system, all UEs need to correctly decode the first-level SCI before decoding the second-level SCI and PSSCH. However, in order to reduce the complexity of UE's blind decoding of PSCCH, the resource location of PSCCH is relatively fixed, and the format information of the first-level SCI carried is also relatively unique, that is, the UE does not need to blindly detect the time-frequency resource location where the PSCCH is located, nor does it need to blindly detect SCIs of different formats.
  • PSCCH may exist in each subchannel in each time slot, that is, the time domain starting position of a PSCCH is the second symbol used for SL transmission in each time slot, the length is 2 or 3 symbols (determined by the resource pool configuration information), the frequency domain position is the smallest PRB index of each subchannel, and the length is at least 10 PRBs (determined by the resource pool configuration information) but not exceeding the size of the subchannel, as shown in Figure 9, a schematic diagram of the subchannel of an example of an embodiment of the present application.
  • the frequency resource assignment field and the time resource assignment field in the first-level SCI are used to indicate the frequency domain resources and time domain resources for transmitting PSSCH, respectively.
  • the resource reservation period field is used to indicate the resources for periodic reservation of PSSCH transmission.
  • the value of the resource reservation period field is configured by the network device, or preconfigured, or predefined, for example, indicated by the first RRC signaling, and the first RRC signaling can determine the sidelink-resource reservation period (sl-ResourceReservePeriod) 1.
  • the format of the second-level SCI is indicated by the second-stage sidelink control information format ( 2nd- stage SCI format) field in the first-level SCI, and the second-level SCI format field is shown in Table 2 below.
  • the transmission resources of the transmitting UE in the user self-selected resource mode do not depend on the base station.
  • the transmitting UE selects the transmission resources for communication within the resource selection window according to the results of its own perception window. Assuming that the transmitting UE triggers resource selection in time slot n, specifically, the resource selection process provided in the embodiment of the present application is shown in FIG10.
  • Step 1 UE1 triggers resource selection in time slot n and determines the size of the resource selection window.
  • the candidate resources R x,y are determined in units of one time slot and L subCH consecutive subchannels, and the resource selection window is [n+T 1 ,n+T 2 ], where Determined by the following table, ⁇ SL is the configured subcarrier spacing, and T 1 is selected based on implementation. If T 2min (high-level configuration) is less than the remaining PDB (data packet delay), then T 2min ⁇ T 2 ⁇ PDB (data packet delay), and T 2 is selected based on implementation; otherwise T 2 is equal to the small remaining PDB.
  • Step 2 UE1 determines the size of the resource listening window.
  • the perception window Where T 0 is configured by high-level parameters. It can be determined from Table 3 or Table 4 below.
  • RSRP reference signal received power
  • the RSRP threshold value is related to the prio TX of the data to be sent and the priority prio RX indicated by the received SCI. Th(p i ,p j ) is specifically the 8th threshold value prio RX +(prio TX -1)*8 in the RSRP threshold value set configured by the resource pool.
  • Step 4 Initialize a resource set SA for resource exclusion, where the resources in the set include all time-frequency resources in the resource window.
  • Step 5 Delete all frequency domain resources in the sending time slot in the listening window from the determined initial set. Because it is a half-duplex device, it cannot listen when sending and cannot receive the SCI sent by other UEs. For example, if it sends at time t0 in the listening window and the period is p, then the corresponding time slot resources at t0+i*p falling in the resource selection window need to be excluded. Specifically, exclude the following time-frequency resources from SA : the time slots of all periodic resource reservations configured by the resource pool corresponding to the unperceived time slots (transmitted time slots) in the sensing window.
  • step 5a If it is found that the resources in the resource selection window are insufficient after the elimination, the resources of the excluded unlistened time slots are put back. Specifically, step 5a:
  • time-frequency resources excluded by SA are less than X% of the total resources in the resource selection window, re-execute the initialization of step 4 and skip step 5.
  • Step 6 Start to exclude resources reserved by others, including the following conditions: the reserved SCI is received, the resources indicated by the SCI are in the resource selection window, and the RSRP value of the SCI of the reserved resources is greater than the RSRP threshold value. Specifically, continue to exclude the following time-frequency resources from SA : the decoding of the received first-level SCI is successful, and the result of RSRP measurement of the PSSCH demodulation reference signal (DMRS) of the time-frequency resources reserved by the received first-level SCI is higher than the RSRP threshold determined in step 3, and the time-frequency resources reserved by the received first-level SCI are within the resource selection window, including the retransmission resources indicated by the first-level SCI and the periodic reserved resources.
  • DMRS PSSCH demodulation reference signal
  • the time and frequency resources reserved by the received first-level SCI are within the resource selection window (where TRIV and FRIV are used to indicate the location of resources for specifying data retransmission).
  • Step 7 If UE1 excludes all resources reserved by other UEs, such as those reserved by UE2 and UE3, and finds that the available resources are less than X%, the RSRP threshold value of each excluded reserved resource is increased by 3dB, and the exclusion is performed again. Specifically, if the remaining resources in SA are less than X% of the total resources in the resource selection window, and the value of X% is configured by the resource pool and is related to prio TX , the RSRP threshold determined in step 3 is increased (by 3dB each time) until the remaining resources in SA are not less than X% of the total resources in the resource selection window and step 4 is continued.
  • a time-frequency resource (r 0 , r 1 , r 2 , ...) is randomly selected in SA for sending data. Before sending, a resource re-evaluation is performed on (r 0 , r 1 , r 2 , ). After the re-evaluation, a preemption detection is performed on the resource (r′ 0 , r′ 1 , r′ 2 , ...) selected from SA .
  • the user is in at least time slot Resource re-evaluation and preemption detection are performed at all times.
  • the UE can perform resource re-evaluation and/or preemption detection based on additional triggering before and after the time slot mT 3 .
  • step 1-7 The method for determining whether (r 0 , r 1 , r 2 , ...) and (r′ 0 , r′ 1 , r′ 2 , ...) need to be excluded is the same as step 1-7, and one of the following conditions is met: 1) the sl-PreemptionEnable parameter is provided and configured to be enabled, and prio TX >prio RX ; 2) the sl-PreemptionEnable parameter is provided and not configured to be enabled, and prio RX ⁇ prio pre and prio TX >prio pre are satisfied, where prio pre is configured by a higher layer.
  • time slot m is the next time slot to be sent, that is, time slot m belongs to (r 0 , r 1 , r 2 , ...) and (r′ 0 , r′ 1 , r′ 2 , ).
  • the resource preemption part it is taken into account that the available resources are determined when the resource selection is triggered, but before the resource is used, other UEs may not hear the SCI information of their reserved resources, so other UEs may also select the resources. Therefore, it is necessary to compare the priority of the resources selected by themselves for data transmission with the priority reserved by other UEs to determine whether it is necessary to reselect resources.
  • resource re-evaluation it is because when triggering resource selection, you may only select resources but do not send SCI for pre-evaluation. At this time, a re-evaluation is required before the selected resource is actually used to determine whether the resource is reserved by other UEs. If it is found that the selected resource is no longer in the available resource set when steps 1-7 are re-executed, resource reselection is triggered.
  • the priority in this application can be channel access priority class (CAPC) or service priority.
  • CCP channel access priority class
  • service priority service priority
  • the priority of the sidelink information may refer to the priority of the PSSCH used to carry the sidelink information, or may also refer to the service priority of the sidelink information.
  • the priority levels of the side information may include 1, 2, 3, ... 8, and the smaller the priority level of the side information, the higher the priority level of the side information.
  • the priority level 1 of the side information is higher than the priority level 2 of the side information
  • the priority level 2 of the side information is higher than the priority level 3 of the side information, and so on.
  • the terminal After the current terminal completes LBT, it can obtain a continuous channel occupation time.
  • the corresponding frequency domain resource is an RB set.
  • the frequency domain width of a single RB set is 20MHz.
  • the terminal can share the resources in the COT with other terminals. There are two solutions for sharing resources:
  • the implementation scheme is relatively simple, that is, when sending data, the terminal can reserve the resources needed for subsequent use through SCI. Then, the terminal that has completed LBT and grabbed the COT can determine whether other terminals in its COT have reserved resources based on the SCI of the received reserved resources, and share the resources in the COT with the terminals that have reserved resources.
  • UE1 completes LBT on time slot n-1 and the time slot before n-1, obtains COT, and before obtaining COT, it detects that UE2 has reserved resources for time slot n+2, time slot n+3 and time slot n+4, and UE3 has reserved resources for time slot n+5.
  • UE1 can notify UE2 and UE3 by sending a COT sharing indication message that they can use the resources at their respective reservation locations.
  • the terminal can share resources with other terminals, but at this time it may be necessary to indicate the specific time-frequency resource location shared with a specific terminal to avoid transmission conflicts when different terminals use the same shared resources.
  • Figure 12 is a schematic diagram of open COT sharing in an example embodiment of the present application
  • UE1 after UE1 obtains a COT, after using part of the resources in the COT, it can share the remaining resources with other UEs, that is, UE1 uses the resources from time slot n to time slot n+3, and shares the resources of time slot n+4 and time slot n+5 with UE2 and UE3.
  • COT sharing involves the need to instruct specific UEs to use the shared COT.
  • reservation-based COT sharing it is necessary to indicate which UEs can use the reserved resources, and the specific time-frequency resource locations may need to be indicated; in the open sharing scenario, it is necessary to specifically indicate which UEs need to use which time-frequency resources.
  • the specific notification information can be carried on the COT sharing indication information (COT sharing indication), and the indication information can be carried by the first-order SCI, the second-order SCI, or the MAC CE (media access control element).
  • COT sharing indication COT sharing indication
  • the second-order SCI is more appropriate. The following analysis is based on the way the second-order SCI carries the COT sharing indication information.
  • the second-order SCI has a total of 140 bits, and the bits that must be used are shown in Table 5, totaling 45 bits. The remaining maximum 95 bits can be used to carry COT sharing indication information.
  • CPE Cyclic prefix extension
  • multiple UEs After completing LBT, multiple UEs mainly occupy the channel by sending CPE, that is, the cyclic prefix (CP) at the front of the OFDM symbol is further extended to the previous symbol until the LBT end time point.
  • CPE cyclic prefix
  • FIG 13 it is a schematic diagram of the CP copying process in the OFDM symbol of the embodiment of the present application.
  • the tail section of the OFDM data signal will be copied as the CP and its front part will be added.
  • the CP and the OFDM data signal together constitute the OFDM symbol.
  • FIG 14 it is a schematic diagram of the CPE process in the NR-U system of the embodiment of the present application.
  • the NR-U device Since the LBT end time point of the NR-U device is not the starting point of an OFDM symbol, a complete OFDM symbol cannot be sent. However, according to the LBT mechanism, the NR-U device needs to access the channel immediately, so a part of the next OFDM symbol is further filled into the previous incomplete symbol as an extended CP, and then access and occupy the channel. Based on CPE, the NR-U system can ensure symbol-level synchronization.
  • SL-U multiple positions are determined for the length of CPE, which can also be called the starting position of CPE.
  • LBT channel access is required before using resources, but resource usage in SL is based on time slots. This may result in different UEs completing LBT before the same time slot and using resources at the same time, causing resource usage conflicts.
  • different UEs can determine the length or starting position of CPE according to their own priorities. UEs with different priorities can determine the difference in CPE lengths to prevent other UEs from using the same resources.
  • FIG 16 is a schematic diagram of an application scenario in which different CPE lengths are determined for different priorities in an embodiment of the present application.
  • UE1 and UE2 both want to use the resources of time slot n+1.
  • UE1 and UE2 both determine the length of CPE based on the priority of the data to be transmitted.
  • UE1 has a higher priority and a longer determined CPE length, that is, the corresponding CPE sends a starting position earlier, thereby blocking UE2's channel access and ensuring UE1's high-priority data transmission.
  • the present application focuses on the case where the UE in SL-U determines that the selected resources can be shared by COT, and determines that the selected resources can be shared with other UEs with higher priority.
  • a solution provided by an embodiment of the present application is as follows:
  • a schematic diagram of a COT sharing solution provided in an embodiment of the present application is provided.
  • a UE such as UE3
  • UE3 selects a resource
  • it has been considered that the selected resource can be shared with other UEs with higher priority such as UE1 that has reserved the shared resource.
  • UE2 has reserved the resource.
  • UE2 may not receive information about the resource reserved by UE1 due to half-duplex or distance issues.
  • UE3 uses the resource, it will not share the resource with UE1, or if UE3 selects other resources, the initially selected resource will be used by UE2, and UE1's high-priority transmission cannot be guaranteed.
  • the sidelink technology can be directly multiplexed into SL-U.
  • there is no corresponding enhancement to COT sharing to protect the COT sharing mechanism and ensure high-priority transmission.
  • P priority resources
  • the UE1 reserves the resources of the previous time slot (the resources of time slots t1 and t2) and is ready to share the resources of time slot t3 with UE1.
  • P the reservation of UE2
  • FIG19 which is a schematic diagram of another COT sharing solution provided in an embodiment of the present application
  • UE3 selects the resources of the t1 and t2 time slots according to the resource exclusion mechanism in this solution when triggering the resource selection.
  • UE2 did not receive the SCI information of UE3's reserved resources due to half-duplex, distance or other reasons, and also selected the resources of the t1 and t2 time slots.
  • UE2 may not know that UE3 needs to share resources with UE1 due to distance or other reasons, UE1's high priority transmission cannot be guaranteed.
  • an embodiment of the present application also provides a communication scheme.
  • the first terminal triggers resource selection, by comparing the priority corresponding to itself and/or the second terminal and the priority corresponding to the third terminal, when the priority corresponding to itself and/or the second terminal is higher than or equal to the priority corresponding to the third terminal, the resources can be shared with the second terminal, thereby improving the reliability of unauthorized resource sharing.
  • a flow chart of a communication method provided in an embodiment of the present application is provided.
  • This embodiment is exemplified by the interaction between the first terminal, the second terminal and the third terminal.
  • Figure 21 a schematic diagram of the network scenario in which the terminal in the example of the embodiment of the present application is located, the first terminal, the second terminal and the third terminal can work in the scenario with network coverage as shown in the first to third figures shown in Figure 21 (in order from left to right and from top to bottom), or can work in the scenario without network coverage as shown in the fourth figure shown in Figure 21.
  • each terminal is in network coverage; in the second figure, one of the terminals is in network coverage; in the third figure, each terminal is in different network coverage.
  • the method may include the following steps:
  • the second terminal sends first information to the first terminal.
  • the first terminal receives the first information.
  • the second terminal before the second terminal needs to use the first time-frequency resource, it may first send reservation information, that is, the second terminal sends first information, wherein the first information indicates the reservation of the first time-frequency resource.
  • the second terminal may be a receiving end of the first terminal, and the second terminal sends the first information to the first terminal.
  • the second terminal may also broadcast the first information.
  • the first terminal may receive the first information broadcast by the second terminal.
  • the first terminal performs channel access and obtains a first COT.
  • the first COT includes at least the second time-frequency resource and the first time-frequency resource.
  • the time-frequency resources in this embodiment are unlicensed resources.
  • the first terminal selects time-frequency resources in the resource pool in mode 2.
  • the first terminal performs channel access and obtains the first COT.
  • the first COT includes at least the second time-frequency resources and the first time-frequency resources.
  • the first terminal obtains the first time-frequency resources and the second time-frequency resources, and can use part of the resources (such as the second time-frequency resources) by itself, and the remaining resources (such as the first time-frequency resources) can be shared with other associated terminals (for example, the receiving end of the first terminal-the second terminal).
  • the first COT here refers to a set of time-frequency resources.
  • the time domain is the maximum channel occupancy time corresponding to CAPC, and the frequency domain is a frequency domain resource with a granularity of 20MHz.
  • the third terminal sends second information to the first terminal.
  • the first terminal receives the second information.
  • the second information indicates the reservation of the second time-frequency resource.
  • the third terminal does not know that the first terminal also wants to use the second time-frequency resource, or the second time-frequency resource is reserved by the first terminal.
  • the third terminal does not receive the reservation information of the first terminal due to half-duplex, distance or other reasons, and does not know that the first terminal also reserves the second time-frequency resource.
  • the third terminal also reserves the second time-frequency resource.
  • the first terminal receives the reservation information (i.e., the second information) of the third terminal.
  • step S2003 and steps S2001 and S2002 is not limited.
  • the first terminal determines that the priority corresponding to the first terminal and/or the second terminal is higher than or equal to the priority corresponding to the third terminal
  • the first terminal sends third information to the second terminal.
  • the second terminal receives the third information.
  • the first terminal After the first terminal receives the reservation information (i.e., the first information) from the second terminal and the reservation information (i.e., the second information) from the third terminal, the first terminal compares the priority corresponding to the first terminal with the priority corresponding to the third terminal, and/or compares the priority corresponding to the second terminal with the priority corresponding to the third terminal.
  • the first terminal determines that the priority corresponding to the first terminal and/or the second terminal is higher than or equal to the priority corresponding to the third terminal, it determines that it can continue to use the second time-frequency resources, and can share the remaining first time-frequency resources with the second terminal. Therefore, the first terminal sends the third information to the second terminal, wherein the third information indicates sharing the first time-frequency resources with the second terminal.
  • the above priority may be a service priority or a channel access priority. That is, the first terminal determines the first terminal and/or the second terminal When the service priority corresponding to the first terminal is higher than or equal to the service priority corresponding to the third terminal, the first terminal sends the third information to the second terminal; or, when the first terminal determines that the channel access priority corresponding to the first terminal and/or the second terminal is higher than or equal to the channel access priority corresponding to the third terminal, the first terminal sends the third information to the second terminal.
  • the first terminal only compares the priority corresponding to the first terminal with the priority corresponding to the third terminal.
  • the priority corresponding to the first terminal is lower than the priority corresponding to the third terminal, the first terminal re-uses resources, and cannot reliably realize the sharing of COT, and cannot guarantee the transmission of high-priority services of the second terminal.
  • This embodiment compares the priority corresponding to itself and/or the second terminal and the priority corresponding to the third terminal. When the priority corresponding to itself and/or the second terminal is higher than or equal to the priority corresponding to the third terminal, resources can be shared with the second terminal, thereby improving the reliability of unauthorized resource sharing.
  • the third information may be the COT sharing indication information described above. Since the second terminal needs a certain amount of time to parse the third information when receiving the third information before using the first time-frequency resource shared by the first terminal, in this embodiment, the first terminal sends the third information on the first time-frequency resource, and there is a first time interval between the second time-frequency resource and the first time-frequency resource.
  • the method further comprises the following steps (represented by dotted lines in the figure):
  • the first terminal sends a cyclic prefix extension before using the second time-frequency resource.
  • the first terminal determines that the priority corresponding to the first terminal and/or the second terminal is higher than or equal to the priority corresponding to the third terminal, the first terminal has performed channel access, and the first terminal sends the CPE to further reliably seize the channel.
  • the CPE sent by the first terminal can be received within a certain distance range from the first terminal.
  • the third terminal can receive the CPE, so that its corresponding channel access process will fail, and the first time-frequency resource cannot be used.
  • the starting position or length of CPE is related to the priority corresponding to the first terminal and/or the second terminal. Furthermore, the higher the priority, the earlier the starting position of the corresponding CPE; or, the higher the priority, the longer the length of the corresponding CPE, so that the first terminal can occupy the first COT more reliably.
  • the starting position or length of the CPE is related to the service priority corresponding to the first terminal and/or the second terminal. Further, the higher the service priority, the earlier the starting position of the corresponding CPE; or, the higher the service priority, the longer the length of the corresponding CPE.
  • the starting position or length of the CPE is related to the channel access priority corresponding to the first terminal and/or the second terminal. Further, the higher the channel access priority, the earlier the starting position of the corresponding CPE; or, the higher the channel access priority, the longer the length of the corresponding CPE.
  • the first terminal can compare the service priority corresponding to the first terminal with the service priority corresponding to the third terminal, and/or compare the service priority corresponding to the second terminal with the service priority corresponding to the third terminal, and when it is determined that the service priority corresponding to the first terminal and/or the second terminal is higher than or equal to the service priority corresponding to the third terminal, the first terminal sends the third information to the second terminal.
  • the starting position or length of the CPE is determined based on the service priority corresponding to the first terminal and/or the second terminal; or,
  • the first terminal may also compare the service priority corresponding to the first terminal with the service priority corresponding to the third terminal, and/or compare the service priority corresponding to the second terminal with the service priority corresponding to the third terminal, and when determining that the service priority corresponding to the first terminal and/or the second terminal is higher than or equal to the service priority corresponding to the third terminal, the first terminal sends the third information to the second terminal. And the starting position or length of the CPE is determined based on the channel access priority corresponding to the first terminal and/or the second terminal.
  • the premise for determining the starting position or length of the CPE based on priority is to occupy all channel resources. Therefore, in this embodiment, the first time-frequency resource occupies the available frequency domain resources of the entire channel in the frequency domain, or there are no other terminal reservation resources in the time slot corresponding to the first time-frequency resource, or the first terminal does not hear the reservation information of other terminals in the time slot corresponding to the first time-frequency resource.
  • the second time-frequency resource occupies the available frequency domain resources of the entire channel in the frequency domain, or no other terminal has reserved resources in the time slot corresponding to the second time-frequency resource, or the first terminal has not heard the reservation information of other terminals in the time slot corresponding to the second time-frequency resource.
  • the first terminal uses the second time-frequency resources for communication.
  • the first terminal After the first terminal determines that the priority corresponding to the first terminal and/or the second terminal is higher than or equal to the priority corresponding to the third terminal, and after the first terminal sends the CPE, the first terminal can use the second time-frequency resources to communicate with other terminals (such as the second terminal in this article) or the network.
  • UE1 and UE4 are terminals associated with UE3, for example, UE1 and UE4 are receiving terminals of UE3.
  • This embodiment is described by taking UE1 and UE4 as the above-mentioned second terminals as an example.
  • the second terminal associated with the first terminal may be one or more terminals.
  • UE3 detects that UE1 has reserved resources for time slot t3, and UE4 has reserved resources for time slot t4.
  • the smaller P is, the higher the priority is.
  • UE1 is the data receiving end of UE3. After UE3 seizes the channel, it can share resources with UE1.
  • UE3 triggers resource selection at time slot n, determines that the resources of time slots t1 and t2 are available, and selects the resources of time slots t1 and t2.
  • the resources selected by UE3 are at least the two resources before the reserved resources (resources of time slots t3 and t4), because if UE3 can share COT, it needs to send COT sharing indication information to UE1 and UE4.
  • UE1 and UE4 need at least one time slot to decode after receiving the COT sharing indication information. Therefore, the first resource selected by UE3 (resource of time slot t1) and the first shared resource (resource of time slot t3) cannot be closely adjacent, and there needs to be a certain time interval. This time interval is related to the terminal device decoding the COT sharing indication information.
  • UE3 When UE3 performs resource re-evaluation at time m-T3, it detects that UE2 has reserved resources for time slot t1. In this embodiment, UE3 can compare the priority corresponding to UE3, the priority corresponding to UE1 (if UE4 exists, the priority corresponding to UE4) and the priority corresponding to UE2. When the priority corresponding to UE3 and/or the priority corresponding to UE1 is higher than or equal to the priority corresponding to UE2 (in FIG. 22, the priority corresponding to UE1 is higher than the priority corresponding to UE2), UE3 does not need to trigger resource reselection.
  • UE3 After UE3 completes LBT in the time slot t1, it determines the starting position and/or length of CPE according to the priority corresponding to UE3 and/or the priority corresponding to UE1, and sends CPE.
  • UE3 can use time slots t1 and t2 for communication.
  • UE1 uses t1 resources, it can send COT sharing indication information to UE1 and UE4 respectively, indicating that the resources of time slot t3 are shared with UE1, and the resources of time slot t4 are shared with UE4.
  • UE1 and UE4 are terminals associated with UE3, for example, UE1 and UE4 are receiving terminals of UE3.
  • This embodiment is described by taking UE1 and UE4 as the above-mentioned second terminals as an example.
  • the second terminal associated with the first terminal may be one or more terminals.
  • UE3 detects that UE1 has reserved resources for time slot t3, and UE4 has reserved resources for time slot t4.
  • the smaller P is, the higher the priority is.
  • UE1 is the data receiving end of UE3. After UE3 seizes the channel, it can share resources with UE1.
  • UE3 sends SCI in time slot t0 and reserves resources in time slot t1. At the same time, it can also reserve resources in time slot t2.
  • UE3 triggers resource selection at time slot n, determines that the resources of time slots t1 and t2 are available, and selects the resources of time slots t1 and t2.
  • the resources selected by UE3 are at least the two resources before the reserved resources (resources of time slots t3 and t4), because if UE3 can share COT, it needs to send COT sharing indication information to UE1 and UE4.
  • UE1 and UE4 need at least one time slot to decode after receiving the COT sharing indication information. Therefore, the first resource selected by UE3 (resource of time slot t1) and the first shared resource (resource of time slot t3) cannot be closely adjacent, and there needs to be a certain time interval.
  • UE3 When UE3 performs resource re-evaluation at time m-T3, it detects that UE2 has reserved resources for time slot t1. In this embodiment, UE3 can compare the priority corresponding to UE3, the priority corresponding to UE1 (if UE4 exists, the priority corresponding to UE4) and the priority corresponding to UE2. When the priority corresponding to UE3 and/or the priority corresponding to UE1 is higher than or equal to the priority corresponding to UE2 (in FIG. 23, the priority corresponding to UE1 is higher than the priority corresponding to UE2), UE3 does not need to trigger resource reselection.
  • UE3 After UE3 completes LBT in the time slot t1, it determines the starting position and/or length of CPE according to the priority corresponding to UE3 and/or the priority corresponding to UE1, and sends CPE.
  • the priority may be the highest priority among the priorities of multiple UEs (including the UE of the initial COT and multiple UEs of the shared COT). And for the priority level, the higher the value of the priority, the lower the corresponding priority.
  • UE3 can use time slots t1 and t2 for communication.
  • UE1 uses t1 resources, it can send COT sharing indication information to UE1 and UE4 respectively, indicating that the resources of time slot t3 are shared with UE1, and the resources of time slot t4 are shared with UE4.
  • the first terminal when triggering resource selection, compares the priority corresponding to itself and/or the second terminal and the priority corresponding to the third terminal.
  • the priority corresponding to itself and/or the second terminal is higher than or equal to the priority corresponding to the third terminal, the first terminal can share the resources with the second terminal, thereby improving the reliability of unauthorized resource sharing.
  • each of the above network elements includes a hardware structure and/or a hardware structure for executing each function. Or software module.
  • this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is executed in the form of hardware or computer software driving hardware depends on the specific application scenario and design constraints of the technical solution.
  • Figures 24 and 25 are schematic diagrams of possible communication devices provided by embodiments of the present application. These communication devices can be used to implement the function of the first terminal in the above method embodiment, and thus can also achieve the beneficial effects possessed by the above method embodiment.
  • the communication device can be one of the terminals 120a-120j as shown in Figure 2, or a module (such as a chip) applied to a terminal.
  • the communication device 2400 includes a processing unit 2410 and a transceiver unit 2420.
  • the communication device 2400 is used to implement the function of the first terminal in the method embodiment shown in Fig. 20 above.
  • the processing unit 2410 is used to execute step S2002 in the method embodiment shown in Figure 20, and can also be used to execute steps S2005 and S2006 in the method embodiment shown in Figure 20;
  • the transceiver unit 2420 is used to execute the functions of the first terminal in steps S2001, S2003 and S2004 in the method embodiment shown in Figure 20.
  • the communication device 2500 includes a processor 2510 and an interface circuit 2520.
  • the processor 2510 and the interface circuit 2520 are coupled to each other.
  • the interface circuit 2520 may be a transceiver or an input/output interface.
  • the communication device 2500 may further include a memory 2530 for storing instructions executed by the processor 2510 or storing input data required by the processor 2510 to execute instructions or storing data generated after the processor 2510 executes instructions.
  • the processor 2510 is used to implement the function of the processing unit 2410
  • the interface circuit 2520 is used to implement the function of the transceiver unit 2420 .
  • the chip in the first terminal implements the function of the first terminal in the above method embodiment.
  • the chip in the first terminal receives information from other modules (such as a radio frequency module or an antenna) in the first terminal, and the information is sent to the first terminal by the second terminal or the third terminal; or the chip in the first terminal sends information to other modules (such as a radio frequency module or an antenna) in the first terminal, and the information is sent to the second terminal or the third terminal by the first terminal.
  • processors in the embodiments of the present application may be a central processing unit (CPU), or other general-purpose processors, digital signal processors (DSP), application specific integrated circuits (ASIC), field programmable gate arrays (FPGA) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof.
  • the general-purpose processor may be a microprocessor or any conventional processor.
  • the method steps in the embodiments of the present application can be implemented by hardware or by a processor executing software instructions.
  • the software instructions can be composed of corresponding software modules, and the software modules can be stored in random access memory, flash memory, read-only memory, programmable read-only memory, erasable programmable read-only memory, electrically erasable programmable read-only memory, registers, hard disks, mobile hard disks, compact disc read-only memory (CD-ROM) or any other form of storage medium known in the art.
  • An exemplary storage medium is coupled to the processor so that the processor can read information from the storage medium and write information to the storage medium.
  • the storage medium can also be a component of the processor.
  • the processor and the storage medium can be located in an ASIC.
  • the ASIC can be located in a network device or a terminal.
  • the processor and the storage medium can also exist in a network device or a terminal as discrete components.
  • the computer program product includes one or more computer programs or instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, a network device, a user device or other programmable device.
  • the computer program or instruction may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer program or instruction may be transmitted from one website site, computer, server or data center to another website site, computer, server or data center by wired or wireless means.
  • the computer-readable storage medium may be any available medium that a computer can access or a data storage device such as a server or data center that integrates one or more available media.
  • the available medium may be a magnetic medium, such as a floppy disk, a hard disk, or a tape; it may also be an optical medium, such as a digital video disc; it may also be a semiconductor medium, such as a solid-state hard disk.
  • At least one means one or more, and “more” means two or more.
  • At least one of the following: " or similar expressions means any one of the listed items or any combination of these items.
  • “at least one of the following: A, B and C”, or “at least one of the following: A, B or C” can all mean: A exists alone, B exists alone, C exists alone, A and B exist at the same time, B and C exist at the same time, A and C exist at the same time, and A, B and C exist at the same time, where A, B, C can be singular or plural.
  • “And/or” describes the association relationship of associated objects, indicating that three relationships can exist.
  • a and/or B can mean: A exists alone, A and B exist at the same time, and B exists alone, where A and B can be singular or plural.
  • the character "/" generally indicates that the previous and next associated objects are in an "or” relationship; in the formula of the present application, the character "/" indicates that the previous and next associated objects are in a "division" relationship.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande divulgue un procédé et un appareil de communication, et un support de stockage. Un premier terminal reçoit d'un second terminal des premières informations indiquant une réservation d'une première ressource temps-fréquence ; le premier terminal acquiert un premier COT, le premier COT comprenant au moins une seconde ressource temps-fréquence et la première ressource temps-fréquence ; le premier terminal reçoit d'un troisième terminal des deuxièmes informations indiquant la réservation de la deuxième ressource temps-fréquence ; et lorsque le premier terminal détermine que la priorité correspondant au premier terminal et/ou au deuxième terminal est supérieure ou égale à la priorité correspondant au troisième terminal, le premier terminal envoie au deuxième terminal des troisièmes informations indiquant le partage de la première ressource temps-fréquence au deuxième terminal. Dans la présente demande, lorsque le premier terminal déclenche une sélection de ressources, la priorité correspondant au premier terminal et/ou au deuxième terminal est comparée à la priorité correspondant au troisième terminal, et lorsque la priorité correspondant au premier terminal et/ou au deuxième terminal est supérieure ou égale à la priorité correspondant au troisième terminal, la ressource peut être partagée au deuxième terminal, ce qui permet d'améliorer la fiabilité du partage de ressources sans licence.
PCT/CN2024/103447 2023-08-09 2024-07-03 Procédé et appareil de communication, et support de stockage Pending WO2025031070A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202311002257.6A CN119485668A (zh) 2023-08-09 2023-08-09 通信方法、装置及存储介质
CN202311002257.6 2023-08-09

Publications (1)

Publication Number Publication Date
WO2025031070A1 true WO2025031070A1 (fr) 2025-02-13

Family

ID=94533545

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2024/103447 Pending WO2025031070A1 (fr) 2023-08-09 2024-07-03 Procédé et appareil de communication, et support de stockage

Country Status (2)

Country Link
CN (1) CN119485668A (fr)
WO (1) WO2025031070A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114125939A (zh) * 2020-08-31 2022-03-01 华为技术有限公司 资源指示、资源选择方法及装置
CN115707118A (zh) * 2021-08-06 2023-02-17 华为技术有限公司 一种资源共享方法及通信装置
WO2023123282A1 (fr) * 2021-12-30 2023-07-06 Nec Corporation Procédé, dispositif et support lisible par ordinateur pour des communications

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111867074B (zh) * 2019-04-30 2023-04-18 华为技术有限公司 接收数据和发送数据的方法、通信装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114125939A (zh) * 2020-08-31 2022-03-01 华为技术有限公司 资源指示、资源选择方法及装置
CN115707118A (zh) * 2021-08-06 2023-02-17 华为技术有限公司 一种资源共享方法及通信装置
WO2023123282A1 (fr) * 2021-12-30 2023-07-06 Nec Corporation Procédé, dispositif et support lisible par ordinateur pour des communications

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI, HISILICON: "Channel access mechanism and resource allocation for sidelink operation over unlicensed spectrum", 3GPP DRAFT; R1-2302353, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. 3GPP RAN 1, no. E-meeting; 20230417 - 20230426, 7 April 2023 (2023-04-07), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052351837 *

Also Published As

Publication number Publication date
CN119485668A (zh) 2025-02-18

Similar Documents

Publication Publication Date Title
CN115002787B (zh) 通信方法及终端设备
CN115589596A (zh) 侧行通信的方法及装置
CN111615192A (zh) 传输数据的方法和通信装置
US20230217493A1 (en) Systems and techniques for sidelink communication
WO2024036671A1 (fr) Procédé et appareil de communication en liaison latérale
US20250056612A1 (en) Resource determining method and apparatus
WO2023051086A1 (fr) Procédé de transmission de données, dispositif terminal et système
WO2023071407A1 (fr) Procédé et dispositif de communication
CN114303414B (zh) 在侧行链路单播中非活动情况下进行调度的方法
WO2022165843A1 (fr) Procédé de transmission de liaison latérale et terminal
WO2024067017A1 (fr) Procédé, appareil et système de communication
WO2025031070A1 (fr) Procédé et appareil de communication, et support de stockage
WO2024032324A1 (fr) Procédé de communication et appareil de communication
US12035335B2 (en) Sidelink communication method and apparatus
WO2022193282A1 (fr) Procédé et appareil de sélection de ressources, dispositif, et support de stockage
KR102897021B1 (ko) 사이드링크 통신 방법 및 장치
CN118540793B (zh) 资源使用方法及装置
US20250247866A1 (en) Sharing of channel occupancy time by user devices for a sidelink communication in an unlicensed spectrum
WO2024208049A1 (fr) Procédé et appareil de communication
WO2024067476A1 (fr) Procédé et dispositif de communication, support de stockage lisible par ordinateur et produit programme
WO2024065420A1 (fr) Procédés pour une communication de liaison latérale, et dispositifs terminal
CN117835184A (zh) 一种通信方法、装置和系统
WO2024016899A1 (fr) Procédé de communication et appareil de communication
WO2023207506A1 (fr) Procédé et appareil d'attribution de ressources partagées
WO2024099260A1 (fr) Procédé de sélection de ressources, appareil de communication et système de communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 24850721

Country of ref document: EP

Kind code of ref document: A1