Search

EP-4355010-B1 - SIDELINK COMMUNICATION METHOD, TERMINAL AND COMPUTER-READABLE STORAGE MEDIUM

EP4355010B1EP 4355010 B1EP4355010 B1EP 4355010B1EP-4355010-B1

Inventors

  • ZHANG, Boyuan
  • LU, QIANXI
  • LENG, Bingxue

Dates

Publication Date
20260506
Application Date
20210802

Claims (10)

  1. A Side Link, SL, communication method, applied to a first terminal for SL transmission, comprising: performing (210) Listen Before Talk, LBT, on unlicensed resources for the SL transmission, wherein the unlicensed resources are resources in a candidate resource set; and performing (220) a target operation in a case that a consistent LBT failure is triggered on the unlicensed resources for the SL transmission; wherein the target operation comprises at least one of frequency point switching, sending a failure message, or LBT consistent failure recovery; wherein the target operation comprises the LBT consistent failure recovery, wherein performing the target operation in the case that the consistent LBT failure is triggered on the unlicensed resources comprises: sending (224) a second consistent LBT failure indication to a network device in a case that the consistent LBT failure is triggered on all bandwidth parts, BWPs, of the candidate resource set, characterized in that the method further comprises: transmitting, by a Medium Access Control, MAC, layer of the first terminal, a third consistent LBT failure indication to a Radio Resource Control, RRC, layer in the case that the consistent LBT failure is triggered on all BWPs of the candidate resource set, wherein sending the second consistent LBT failure indication to the network device in the case that the consistent LBT failure is triggered on all BWPs of the candidate resource set comprises: sending, by the RRC layer, the second consistent LBT failure indication to the network device through an RRC signaling in a case that the RRC layer receives the third consistent LBT failure indication from the MAC layer, wherein the second consistent LBT failure indication is carried in the RRC signaling and the second consistent LBT failure indication comprises the candidate resource set determined by the MAC layer for a Layer 2 target address, a logic channel or a Hybrid Automatic Repeat reQuest, HARQ, process, and the second consistent LBT failure indication is associated with a carrier set selected by the MAC layer for the Layer 2 target address.
  2. The method of claim 1, further comprising: receiving, by an MAC layer of the first terminal, an LBT failure indication on the unlicensed resources transmitted by a physical layer, PHY; starting or restarting, by the MAC layer, an LBT failure detection timer, and increasing, by the MAC layer, an LBT failure count by 1; and determining, by the MAC layer, that the consistent LBT failure is triggered on the unlicensed resources in a case that the LBT failure count is equal to or greater than an LBT detection number threshold.
  3. The method of claim 2, wherein the LBT detection number threshold and the LBT failure detection timer are configured by a network device for the first terminal.
  4. The method of claim 1, wherein the target operation further comprises the frequency point switching, and the candidate resource set of the first terminal comprises unlicensed resources on a first carrier and resources on a second carrier, wherein performing the LBT on the unlicensed resources comprises: performing (211) the LBT on a BWP of the first carrier, wherein performing the target operation in the case that the consistent LBT failure is triggered on the unlicensed resources comprises: selecting (221) resources from the second carrier to perform the SL transmission in a case that the consistent LBT failure is triggered on the BWP of the first carrier.
  5. The method of claim 1, wherein the target operation further comprises the frequency point switching, and the candidate resource set of the first terminal comprises unlicensed resources on a first BWP and resources on a second BWP, wherein performing the LBT on the unlicensed resources comprises: performing (212) the LBT on the first BWP, wherein performing the target operation in the case that the consistent LBT failure is triggered on the unlicensed resources comprises: selecting (222) resources from the second BWP to perform the SL transmission in a case that the consistent LBT failure is triggered on the first BWP, wherein the first BWP is a BWP on a first carrier, and the second BWP is a BWP on the first carrier or a second carrier.
  6. The method of claim 5, wherein selecting the resources from the second BWP to perform the SL transmission comprises: performing the LBT on the second BWP in a case that a carrier to which the second BWP belongs is a grant-free carrier; and selecting available resources on the second BWP to perform the SL transmission in a case that the LBT success is triggered on the second BWP; or selecting the available resources on the second BWP to perform the SL transmission in a case that the carrier to which the second BWP belongs is a granted carrier.
  7. The method of claim 1, wherein the target operation further comprises sending the failure message, and the SL transmission further comprises a second terminal, wherein performing the target operation in the case that the consistent LBT failure is triggered on the unlicensed resources comprises: sending (223) a consistent LBT failure message to the second terminal in a case that the consistent LBT failure is triggered on the unlicensed resources, the consistent LBT failure message comprising at least a first consistent LBT failure indication or consistent LBT failure information, wherein the consistent LBT failure information comprises at least one of an LBT failure carrier, an LBT failure BWP an LBT failure carrier set, an LBT failure BWP set, a target switched carrier, a target switched BWP, a target selected carrier, or a target selected BWP.
  8. The method of claim 1, wherein after sending the second consistent LBT failure indication to the network device, in the case that the consistent LBT failure is triggered on all the BWPs of the candidate resource set, the method further comprises: receiving transmission resources configured by the network device for the SL transmission.
  9. A terminal, comprising a processor and a transceiver connected to the processor, wherein the terminal is configured to perform the method of any one of claims 1 to 8.
  10. A computer-readable storage medium, having stored thereon executable instructions which, when loaded and executed by a processor, cause the processor to perform the method of any one of claims 1 to 8.

Description

TECHNICAL FIELD The disclosure relates to the field of mobile communications, and in particular to a Side Link (SL) communication method, a terminal and a computer-readable storage medium. BACKGROUND In order to achieve direct communication between terminals in a Vehicle to everything (V2X) system, an SL transmission mode is introduced. With further extension of business scenarios of SL transmission, the SL transmission is widely applied to scenarios such as V2X, smart factory, home entertainment, etc. Limited frequency domain resources would limit evolution of later technologies. Therefore, it is necessary to consider performing the SL transmission on unlicensed resources. Patent documents WO 2020/198584 A1 and EP 3846573 A1 relate to the detection and indication of consistent Listen Before Talk (LBT) failures. The document 3GPP R2-1913504: "Handling LBT failures", by Ericsson, 3GPP TSG-RAN WG2 #107bis, 14 -18 October 2019, proposes to declare RLF if a UE has detected LBT problems for all configured BWPs with RA configured, and to include a failure cause in the RLF report indicating that the RLF was triggered due to occurrence of consistent UL LBT failures. SUMMARY The invention provides an SL communication method, a terminal and a computer-readable storage medium, which provide technical solutions of performing SL transmission by means of performing Listen Before Talk (LBT) on unlicensed resources. The present invention is set out in the appended set of claims. The technical solutions provided in the embodiments of the disclosure at least include the following beneficial effects. LBT is performed on unlicensed resources, and available resources are selected on the unlicensed resources based on an LBT result for SL transmission. When the LBT fails, the terminal performs LBT consistent failure recovery or frequency domain reselection by performing a target operation to select available resources for the SL transmission. BRIEF DESCRIPTION OF THE DRAWINGS In order to explain the technical solutions in the embodiments of the disclosure more clearly, the drawings required in descriptions of the embodiments are briefly introduced below. FIG. 1 is a diagram of a transmission mode according to an exemplary embodiment of the disclosure.FIG. 2 is a diagram of a system architecture according to an exemplary embodiment of the disclosure.FIG. 3 is a method flowchart of an SL communication method according to an embodiment of the disclosure.FIG. 4 is a method flowchart of an SL communication method according to an exemplary embodiment of the disclosure.FIG. 5 is a method flowchart of an SL communication method according to an exemplary embodiment of the disclosure.FIG. 6 is a method flowchart of an SL communication method according to an exemplary embodiment of the disclosure.FIG. 7 is a method flowchart of an SL communication method according to an exemplary embodiment of the disclosure.FIG. 8 is a method flowchart of an SL communication method according to an embodiment of the disclosure.FIG. 9 is a block diagram of an SL communication device according to an exemplary embodiment of the disclosure.FIG. 10 is a block diagram of an SL communication device according to an exemplary embodiment of the disclosure.FIG. 11 is a structural diagram of a communication device according to an exemplary embodiment of the disclosure. DETAILED DESCRIPTION In order to make the purpose, technical solutions and advantages of the disclosure clearer, implementations of the disclosure would be further described in detail below with reference to the drawings. Terms used in the disclosure are only for the purpose of describing particular embodiments, and are not intended to limit the disclosure. Singular forms "a/an", "said" and "the" as used in the disclosure and the appended claims are also intended to include plural forms, unless the context clearly indicates other meanings. It should also be understood that the term "and/or" as used here refers to and includes any or all possible combinations of one or more listed associated items. It should be understood that although terms "first", "second", "third" or the like may be used in the disclosure to describe various information, these information should not be limited to these terms. These terms are only intended to distinguish information of the same type from one another. For example, without departing from the scope of the disclosure, first information may also be referred to as second information. Similarly, the second information may also be referred to as the first information. Depending on the context, a word "if" as used here may be interpreted as "at a time of..." or "when..." or "in response to determining...". Firstly, nouns involved in the embodiments of the disclosure are briefly introduced. 1. Long Term Evolution (LTE) Device-to-Device (D2D)/Vehicle to everything (V2X): V2X: it is a key technology of a future intelligent transportation system, and mainly studies vehicle data tra