Abstract:
Disclosed are various methods for transmitting or receiving data or control information having high reliability conditions. A method for operating a terminal which transmits uplink control information (UCI) includes: a step of generating UCI; a step of comparing the priority of an uplink (UL) control channel for the transmission of the UCI with the priority of a UL data channel when some symbols of the UL control channel and the UL data channel overlap; and a step of selecting the UL channel having a higher priority among the UL control channel and the UL data channel, and transmitting the UCI to a base station through the selected UL channel.
Abstract:
Disclosed are methods and apparatuses for transmitting and receiving data channels in a communication system. An operation method of a terminal in a communication system may comprise receiving, from a base station, resource allocation information of a plurality of physical uplink shared channels (PUSCHs) used for repetitive transmission of a same transport block (TB); identifying a position of each of the plurality of PUSCHs in a time domain based on the resource allocation information; and repeatedly transmitting the same TB to the base station at the position of each of the plurality of PUSCHs. Therefore, performance of the communication system can be improved.
Abstract:
A security key management method performed in a PDCP layer of a terminal dual-connected to a first cell and a second cell may comprise receiving a PDCP PDU on which ciphering or integrity protection to which a first security key of the first cell or a second security key of the second cell is applied is performed; performing at least one of integrity verification and header decompression for the PDCP PDU based on the first security key; performing at least one of integrity verification and header decompression for the PDCP PDU based on the second security key; and determining a security key applied to the PDCP PDU, based on result of the at least one of integrity verification and header decompression based on the first security key and result of the at least one of integrity verification and header decompression based on the second security key.
Abstract:
An operation method of a terminal for uplink transmission in a communication network based on Internet of things (IoT) includes receiving a message including information on a resource pool for the uplink transmission from a base station included in the communication network; configuring an uplink resource for the uplink transmission based on the resource pool; transmitting a message including a transmission indicator indicating the uplink transmission to the base station based on a transmission indicator pool corresponding to the resource pool; and performing the uplink transmission through the uplink resource based on a plurality of parameters preconfigured for the uplink transmission.
Abstract:
An operation method of a first communication node, which controls a plurality of communication nodes included in a mobile xhaul network supporting mobility, may comprise performing an attach procedure between the first communication node and a second communication node among the plurality of communication nodes; configuring a path for communications between the second communication node and a third communication node for which attach procedure has been completed among the plurality of communication nodes; and supporting communications of the second communication node and the third communication node using the configured path.
Abstract:
Provided is a control method for device-to-device (D2D) communication. A base station measures a load of a cell, receives location information about each piece of user equipment (UE) from a plurality of pieces of UE, selects any one of an overlay-based resource allocation method and an underlay-based resource allocation method on the basis of the measured cell load and the location information about the respective pieces of UE, allocates resources for D2D communication on the basis of the selected resource allocation method, and controls power according to the locations of the pieces of UE and a density of pieces of cellular communication UE. Accordingly, it is possible to improve resource use efficiency and efficiently remove interference.
Abstract:
An operation method of a boundary IAB node between a first topology and a second topology in a communication system may include: receiving, from a first IAB donor node included in the first topology, a first address of a first node included in the second topology; receiving, from a node connected to the boundary IAB node, data including a relay request using a second address as a destination address; rewriting the destination address of the data with the first address indicated by the second address in a mapping table; and routing the data towards the first node.
Abstract:
Disclosed are methods and apparatuses for transmitting and receiving data channels in a communication system. An operation method of a terminal in a communication system may comprise receiving, from a base station, resource allocation information of a plurality of physical uplink shared channels (PUSCHs) used for repetitive transmission of a same transport block (TB); identifying a position of each of the plurality of PUSCHs in a time domain based on the resource allocation information; and repeatedly transmitting the same TB to the base station at the position of each of the plurality of PUSCHs. Therefore, performance of the communication system can be improved.
Abstract:
An operation method of a first communication node in a communication network, which supports a radio link control (RLC) function among functions of a base station, may comprise receiving a first message from a second communication node supporting a packet data convergence protocol (PDCP) function among the functions of the base station; processing the received first message by performing the RLC function; and transmitting the processed first message to a third communication node supporting a medium access control (MAC) function and physical (PHY) functions among the functions of the base station.
Abstract:
There are provided a method of a device-to-device (D2D) discovery and an apparatus thereof. The method of the device-to-device discovery performed in a terminal may includes registering a discovery service of the terminal using service information on a service provided from an user; transmitting a discovery transmission activation request to a network in which the terminal is located; receiving a response in response to the discovery transmission activation request from the network; and transmitting a discovery message when the response is an approval message.