Method and apparatus for sidelink signalling in wireless communication system

ABSTRACT

The present disclosure relates to sidelink signalling in wireless communications. According to an embodiment of the present disclosure, a method performed by a first wireless device in a wireless communication system comprises: generating, by an entity of a first radio access technology (RAT), a first signalling message duplicated from a second signalling message; and transmitting the first signalling message on a carrier of the first RAT and the second signalling message on a carrier of a second RAT, wherein the second signalling message is transmitted with information informing that a duplication is performed by the entity of the first RAT, and wherein the entity is an upper entity with respect to a media access control (MAC) entity.

CROSS-REFERENCE TO RELATED APPLICATIONS

Pursuant to 35 U.S.C. § 119 (e), this application claims the benefit ofKorean Patent Applications No. 10-2019-0036314, filed on Mar. 28, 2019,No. 10-2019-0036363, filed on Mar. 28, 2019 and No. 10-2019-0036351,filed on Mar. 28, 2019, the contents of which are all herebyincorporated by reference herein in their entirety.

BACKGROUND OF THE DISCLOSURE Field of the Disclosure

The present disclosure relates to sidelink signalling in wirelesscommunications.

Related Art

3rd generation partnership project (3GPP) long-term evolution (LTE) is atechnology for enabling high-speed packet communications. Many schemeshave been proposed for the LTE objective including those that aim toreduce user and provider costs, improve service quality, and expand andimprove coverage and system capacity. The 3GPP LTE requires reduced costper bit, increased service availability, flexible use of a frequencyband, a simple structure, an open interface, and adequate powerconsumption of a terminal as an upper-level requirement.

Work has started in international telecommunication union (ITU) and 3GPPto develop requirements and specifications for new radio (NR) systems.3GPP has to identify and develop the technology components needed forsuccessfully standardizing the new RAT timely satisfying both the urgentmarket needs, and the more long-term requirements set forth by the ITUradio communication sector (ITU-R) international mobiletelecommunications (IMT)-2020 process. Further, the NR should be able touse any spectrum band ranging at least up to 100 GHz that may be madeavailable for wireless communications even in a more distant future.

The NR targets a single technical framework addressing all usagescenarios, requirements and deployment scenarios including enhancedmobile broadband (eMBB), massive machine-type-communications (mMTC),ultra-reliable and low latency communications (URLLC), etc. The NR shallbe inherently forward compatible.

User equipments (UEs) in a wireless communication system cancommunication with each other via a network infrastructure (e.g., RANnode), or via a direct communication link between the UEs. This directcommunication link may be referred to as sidelink, and the UEs canperform direct communication with each other. UEs may exchange sidelinksignallings with each other for a sidelink communication. Transmissionsfor exchange of the sidelink signallings should be reliable enough toprovide robustness to sidelink connectivity between those UEs.

SUMMARY OF THE DISCLOSURE Technical Problem

An aspect of the present disclosure is to provide method and apparatusfor sidelink signalling in a wireless communication system.

Another aspect of the present disclosure is to provide method andapparatus for exchanging PC5-RRC messages in a wireless communicationsystem.

Another aspect of the present disclosure is to provide method andapparatus for duplicating signalling messages in a wirelesscommunication system.

Another aspect of the present disclosure is to provide method andapparatus for transmitting duplicated signalling messages in a wirelesscommunication system.

Technical Solution

According to an embodiment of the present disclosure, a method performedby a first wireless device in a wireless communication system comprises:generating, by an entity of a first radio access technology (RAT), afirst signalling message duplicated from a second signalling message;and transmitting the first signalling message on a carrier of the firstRAT and the second signalling message on a carrier of a second RAT,wherein the second signalling message is transmitted with informationinforming that a duplication is performed by the entity of the firstRAT, and wherein the entity is an upper entity with respect to a mediaaccess control (MAC) entity.

According to an embodiment of the present disclosure, a wireless devicein a wireless communication system comprises: a transceiver; a memory;and at least one processor operatively coupled to the transceiver andthe memory, and configured to: generate, by an entity of a first radioaccess technology (RAT), a first signalling message duplicated from asecond signalling message, and control the transceiver to transmit thefirst signalling message on a carrier of the first RAT and the secondsignalling message on a carrier of a second RAT, wherein the secondsignalling message is transmitted with information informing that aduplication is performed by the entity of the first RAT, and wherein theentity is an upper entity with respect to a media access control (MAC)entity.

According to an embodiment of the present disclosure, a processor for awireless device in a wireless communication system is configured tocontrol the wireless device to perform operations comprising:generating, by an entity of a first radio access technology (RAT), afirst signalling message duplicated from a second signalling message;and transmitting the first signalling message on a carrier of the firstRAT and the second signalling message on a carrier of a second RAT,wherein the second signalling message is transmitted with informationinforming that a duplication is performed by the entity of the firstRAT, and wherein the entity is an upper entity with respect to a mediaaccess control (MAC) entity.

Advantageous Effect

The present disclosure can have various advantageous effects.

For example, a wireless device may duplicate and transmit a signallingmessage on different RATs and transmit information indicating that theduplication is performed by an entity of a specific RAT (e.g., NR), sothat the wireless device can support a reliable transmission of thesignalling message (e.g., control plane message).

For example, a UE can support a reliable transmission of a control planemessage in sidelink by using multiple RATs, in particular when V2Xsidelink communication is configured in both LTE and NR for a unicastservice.

Various embodiments of the present disclosure are beneficial in that thesystem can provide reliable delivery of signalling to UEs in sidelinktransmissions.

Advantageous effects which can be obtained through specific embodimentsof the present disclosure are not limited to the advantageous effectslisted above. For example, there may be a variety of technical effectsthat a person having ordinary skill in the related art can understandand/or derive from the present disclosure. Accordingly, the specificeffects of the present disclosure are not limited to those explicitlydescribed herein, but may include various effects that may be understoodor derived from the technical features of the present disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows examples of 5G usage scenarios to which the technicalfeatures of the present disclosure can be applied.

FIG. 2 shows an example of a wireless communication system to which thetechnical features of the present disclosure can be applied.

FIG. 3 shows an example of a wireless communication system to which thetechnical features of the present disclosure can be applied.

FIG. 4 shows another example of a wireless communication system to whichthe technical features of the present disclosure can be applied.

FIG. 5 shows a block diagram of a user plane protocol stack to which thetechnical features of the present disclosure can be applied.

FIG. 6 shows a block diagram of a control plane protocol stack to whichthe technical features of the present disclosure can be applied.

FIG. 7 illustrates a frame structure in a 3GPP based wirelesscommunication system.

FIG. 8 illustrates a data flow example in the 3GPP NR system.

FIG. 9 shows an example of communication links to which technicalfeatures of the present disclosure can be applied.

FIG. 10 shows an example of sidelink connectivity types to whichtechnical features of the present disclosure can be applied.

FIG. 11 shows an example of sidelink channel mapping to which technicalfeatures of the present disclosure can be applied.

FIG. 12 shows an example of a control plane protocol stack for sidelinkcommunication to which technical features of the present disclosure canbe applied.

FIG. 13 shows an example of a direct link setup procedure to whichtechnical features of the present disclosure can be applied.

FIG. 14 shows an example of a direct security mode control procedure towhich technical features of the present disclosure can be applied.

FIG. 15 shows an example of a direct link release procedure to whichtechnical features of the present disclosure can be applied.

FIG. 16 shows an example of a method for transmitting duplicatedsignalling messages according to an embodiment of the presentdisclosure.

FIG. 17 shows an example of signalling message exchange between UEsaccording to an embodiment of the present disclosure.

FIG. 18 shows a UE to implement an embodiment of the present disclosure.The present disclosure described above for UE side may be applied tothis embodiment.

FIG. 19 shows another example of a wireless communication system towhich the technical features of the present disclosure can be applied.

FIG. 20 shows an example of an AI device to which the technical featuresof the present disclosure can be applied.

FIG. 21 shows an example of an AI system to which the technical featuresof the present disclosure can be applied.

DESCRIPTION OF EXEMPLARY EMBODIMENTS

The technical features described below may be used by a communicationstandard by the 3rd generation partnership project (3GPP)standardization organization, a communication standard by the instituteof electrical and electronics engineers (IEEE), etc. For example, thecommunication standards by the 3GPP standardization organization includelong-term evolution (LTE) and/or evolution of LTE systems. The evolutionof LTE systems includes LTE-advanced (LTE-A), LTE-A Pro, and/or 5G newradio (NR). The communication standard by the IEEE standardizationorganization includes a wireless local area network (WLAN) system suchas IEEE 802.11a/b/g/n/ac/ax. The above system uses various multipleaccess technologies such as orthogonal frequency division multipleaccess (OFDMA) and/or single carrier frequency division multiple access(SC-FDMA) for downlink (DL) and/or uplink (UL). For example, only OFDMAmay be used for DL and only SC-FDMA may be used for UL. Alternatively,OFDMA and SC-FDMA may be used for DL and/or UL.

In the present disclosure, “A or B” may mean “only A”, “only B”, or“both A and B”. In other words, “A or B” in the present disclosure maybe interpreted as “A and/or B”. For example, “A, B or C” in the presentdisclosure may mean “only A”, “only B”, “only C”, or “any combination ofA, B and C”.

In the present disclosure, slash (/) or comma (,) may mean “and/or”. Forexample, “A/B” may mean “A and/or B”. Accordingly, “A/B” may mean “onlyA”, “only B”, or “both A and B”. For example, “A, B, C” may mean “A, Bor C”.

In the present disclosure, “at least one of A and B” may mean “only A”,“only B” or “both A and B”. In addition, the expression “at least one ofA or B” or “at least one of A and/or B” in the present disclosure may beinterpreted as same as “at least one of A and B”.

In addition, in the present disclosure, “at least one of A, B and C” maymean “only A”, “only B”, “only C”, or “any combination of A, B and C”.In addition, “at least one of A, B or C” or “at least one of A, B and/orC” may mean “at least one of A, B and C”.

Also, parentheses used in the present disclosure may mean “for example”.In detail, when it is shown as “control information (PDCCH)”, “PDCCH”may be proposed as an example of “control information”. In other words,“control information” in the present disclosure is not limited to“PDCCH”, and “PDDCH” may be proposed as an example of “controlinformation”. In addition, even when shown as “control information(i.e., PDCCH)”, “PDCCH” may be proposed as an example of “controlinformation”.

Technical features that are separately described in one drawing in thepresent disclosure may be implemented separately or simultaneously.

Throughout the disclosure, the terms ‘radio access network (RAN) node’,‘base station’, ‘eNB’, ‘gNB’ and ‘cell’ may be used interchangeably.Further, a UE may be a kind of a wireless device, and throughout thedisclosure, the terms ‘UE’ and ‘wireless device’ may be usedinterchangeably.

The following drawings are created to explain specific embodiments ofthe present disclosure. The names of the specific devices or the namesof the specific signals/messages/fields shown in the drawings areprovided by way of example, and thus the technical features of thepresent disclosure are not limited to the specific names used in thefollowing drawings.

FIG. 1 shows examples of 5G usage scenarios to which the technicalfeatures of the present disclosure can be applied.

The 5G usage scenarios shown in FIG. 1 are only exemplary, and thetechnical features of the present disclosure can be applied to other 5Gusage scenarios which are not shown in FIG. 1.

Referring to FIG. 1, the three main requirements areas of 5G include (1)enhanced mobile broadband (eMBB) domain, (2) massive machine typecommunication (mMTC) area, and (3) ultra-reliable and low latencycommunications (URLLC) area. Some use cases may require multiple areasfor optimization and, other use cases may only focus on only one keyperformance indicator (KPI). 5G is to support these various use cases ina flexible and reliable way.

eMBB focuses on across-the-board enhancements to the data rate, latency,user density, capacity and coverage of mobile broadband access. The eMBBaims ˜10 Gbps of throughput. eMBB far surpasses basic mobile Internetaccess and covers rich interactive work and media and entertainmentapplications in cloud and/or augmented reality. Data is one of the keydrivers of 5G and may not be able to see dedicated voice services forthe first time in the 5G era. In 5G, the voice is expected to beprocessed as an application simply using the data connection provided bythe communication system. The main reason for the increased volume oftraffic is an increase in the size of the content and an increase in thenumber of applications requiring high data rates. Streaming services(audio and video), interactive video and mobile Internet connectivitywill become more common as more devices connect to the Internet. Many ofthese applications require always-on connectivity to push real-timeinformation and notifications to the user. Cloud storage andapplications are growing rapidly in mobile communication platforms,which can be applied to both work and entertainment. Cloud storage is aspecial use case that drives growth of uplink data rate. 5G is also usedfor remote tasks on the cloud and requires much lower end-to-end delayto maintain a good user experience when the tactile interface is used.In entertainment, for example, cloud games and video streaming areanother key factor that increases the demand for mobile broadbandcapabilities. Entertainment is essential in smartphones and tabletsanywhere, including high mobility environments such as trains, cars andairplanes. Another use case is augmented reality and informationretrieval for entertainment. Here, augmented reality requires very lowlatency and instantaneous data amount.

mMTC is designed to enable communication between devices that arelow-cost, massive in number and battery-driven, intended to supportapplications such as smart metering, logistics, and field and bodysensors. mMTC aims ˜10 years on battery and/or ˜1 million devices/km2.mMTC allows seamless integration of embedded sensors in all areas and isone of the most widely used 5G applications. Potentially by 2020,internet-of-things (IoT) devices are expected to reach 20.4 billion.Industrial IoT is one of the areas where 5G plays a key role in enablingsmart cities, asset tracking, smart utilities, agriculture and securityinfrastructures.

URLLC will make it possible for devices and machines to communicate withultra-reliability, very low latency and high availability, making itideal for vehicular communication, industrial control, factoryautomation, remote surgery, smart grids and public safety applications.URLLC aims ˜1 ms of latency. URLLC includes new services that willchange the industry through links with ultra-reliability/low latency,such as remote control of key infrastructure and self-driving vehicles.The level of reliability and latency is essential for smart gridcontrol, industrial automation, robotics, drones control andcoordination.

Next, a plurality of use cases included in the triangle of FIG. 1 willbe described in more detail.

5G can complement fiber-to-the-home (FTTH) and cable-based broadband (orDOCSIS) as a means of delivering streams rated from hundreds of megabitsper second to gigabits per second. This high speed can be required todeliver TVs with resolutions of 4K or more (6K, 8K and above) as well asvirtual reality (VR) and augmented reality (AR). VR and AR applicationsinclude mostly immersive sporting events. Certain applications mayrequire special network settings. For example, in the case of a VR game,a game company may need to integrate a core server with an edge networkserver of a network operator to minimize delay.

Automotive is expected to become an important new driver for 5G, withmany use cases for mobile communications to vehicles. For example,entertainment for passengers demands high capacity and high mobilebroadband at the same time. This is because future users will continueto expect high-quality connections regardless of their location andspeed. Another use case in the automotive sector is an augmented realitydashboard. The driver can identify an object in the dark on top of whatis being viewed through the front window through the augmented realitydashboard. The augmented reality dashboard displays information thatwill inform the driver about the object's distance and movement. In thefuture, the wireless module enables communication between vehicles,information exchange between the vehicle and the supportinginfrastructure, and information exchange between the vehicle and otherconnected devices (e.g. devices accompanied by a pedestrian). The safetysystem allows the driver to guide the alternative course of action sothat he can drive more safely, thereby reducing the risk of accidents.The next step will be a remotely controlled vehicle or self-drivingvehicle. This requires a very reliable and very fast communicationbetween different self-driving vehicles and between vehicles andinfrastructure. In the future, a self-driving vehicle will perform alldriving activities, and the driver will focus only on traffic that thevehicle itself cannot identify. The technical requirements ofself-driving vehicles require ultra-low latency and high-speedreliability to increase traffic safety to a level not achievable byhumans.

Smart cities and smart homes, which are referred to as smart societies,will be embedded in high density wireless sensor networks. Thedistributed network of intelligent sensors will identify conditions forcost and energy-efficient maintenance of a city or house. A similarsetting can be performed for each home. Temperature sensors, windows andheating controllers, burglar alarms and appliances are all wirelesslyconnected. Many of these sensors typically require low data rate, lowpower and low cost. However, for example, real-time high-definition (HD)video may be required for certain types of devices for monitoring.

The consumption and distribution of energy, including heat or gas, ishighly dispersed, requiring automated control of distributed sensornetworks. The smart grid interconnects these sensors using digitalinformation and communication technologies to collect and act oninformation. This information can include supplier and consumerbehavior, allowing the smart grid to improve the distribution of fuel,such as electricity, in terms of efficiency, reliability, economy,production sustainability, and automated methods. The smart grid can beviewed as another sensor network with low latency.

The health sector has many applications that can benefit from mobilecommunications. Communication systems can support telemedicine toprovide clinical care in remote locations. This can help to reducebarriers to distance and improve access to health services that are notcontinuously available in distant rural areas. It is also used to savelives in critical care and emergency situations. Mobile communicationbased wireless sensor networks can provide remote monitoring and sensorsfor parameters such as heart rate and blood pressure.

Wireless and mobile communications are becoming increasingly importantin industrial applications. Wiring costs are high for installation andmaintenance. Thus, the possibility of replacing a cable with a wirelesslink that can be reconfigured is an attractive opportunity in manyindustries. However, achieving this requires that wireless connectionsoperate with similar delay, reliability, and capacity as cables and thattheir management is simplified. Low latency and very low errorprobabilities are new requirements that need to be connected to 5G.

Logistics and freight tracking are important use cases of mobilecommunications that enable tracking of inventory and packages anywhereusing location based information systems. Use cases of logistics andfreight tracking typically require low data rates, but require a largerange and reliable location information.

NR supports multiple numerology (or, subcarrier spacing (SCS)) tosupport various 5G services. For example, when the SCS is 15 kHz, widearea in traditional cellular bands may be supported. When the SCS is 30kHz/60 kHz, dense-urban, lower latency and wider carrier bandwidth maybe supported. When the SCS is 60 kHz or higher, a bandwidth greater than24.25 GHz may be supported to overcome phase noise.

The NR frequency band may be defined as two types of frequency range,i.e., FR1 and FR2. The numerical value of the frequency range may bechanged. For example, the frequency ranges of the two types (FR1 andFR2) may be as shown in Table 1 below. For ease of explanation, in thefrequency ranges used in the NR system, FR1 may mean “sub 6 GHz range”,FR2 may mean “above 6 GHz range,” and may be referred to as millimeterwave (mmW).

TABLE 1 Frequency Range Corresponding frequency designation rangeSubcarrier Spacing FR1  450 MHz-6000 MHz  15, 30, 60 kHz FR2 24250MHz-52600 MHz 60, 120, 240 kHz

As mentioned above, the numerical value of the frequency range of the NRsystem may be changed. For example, FR1 may include a frequency band of410 MHz to 7125 MHz as shown in Table 2 below. That is, FR1 may includea frequency band of 6 GHz (or 5850, 5900, 5925 MHz, etc.) or more. Forexample, a frequency band of 6 GHz (or 5850, 5900, 5925 MHz, etc.) ormore included in FR1 may include an unlicensed band. Unlicensed bandsmay be used for a variety of purposes, for example for communication forvehicles (e.g., autonomous driving).

TABLE 2 Frequency Range Corresponding frequency designation rangeSubcarrier Spacing FR1  410 MHz-7125 MHz  15, 30, 60 kHz FR2 24250MHz-52600 MHz 60, 120, 240 kHz

FIG. 2 shows an example of a wireless communication system to which thetechnical features of the present disclosure can be applied.

Referring to FIG. 2, the wireless communication system may include afirst device 210 and a second device 220.

The first device 210 includes a base station, a network node, atransmitting UE, a receiving UE, a wireless device, a wirelesscommunication device, a vehicle, a vehicle equipped with an autonomousdriving function, a connected car, a drone, an unmanned aerial vehicle(UAV), an artificial intelligence (AI) module, a robot, an AR device, aVR device, a mixed reality (MR) device, a hologram device, a publicsafety device, an MTC device, an IoT device, a medical device, afin-tech device (or, a financial device), a security device, aclimate/environmental device, a device related to 5G services, or adevice related to the fourth industrial revolution.

The second device 220 includes a base station, a network node, atransmitting UE, a receiving UE, a wireless device, a wirelesscommunication device, a vehicle, a vehicle equipped with an autonomousdriving function, a connected car, a drone, a UAV, an AI module, arobot, an AR device, a VR device, an MR device, a hologram device, apublic safety device, an MTC device, an IoT device, a medical device, afin-tech device (or, a financial device), a security device, aclimate/environmental device, a device related to 5G services, or adevice related to the fourth industrial revolution.

For example, the UE may include a mobile phone, a smart phone, a laptopcomputer, a digital broadcasting terminal, a personal digital assistant(PDA), a portable multimedia player (PMP), a navigation device, a slatepersonal computer (PC), a tablet PC, an ultrabook, a wearable device(e.g. a smartwatch, a smart glass, a head mounted display (HMD)). Forexample, the HMD may be a display device worn on the head. For example,the HMD may be used to implement AR, VR and/or MR.

For example, the drone may be a flying object that is flying by a radiocontrol signal without a person boarding it. For example, the VR devicemay include a device that implements an object or background in thevirtual world. For example, the AR device may include a device thatimplements connection of an object and/or a background of a virtualworld to an object and/or a background of the real world. For example,the MR device may include a device that implements fusion of an objectand/or a background of a virtual world to an object and/or a backgroundof the real world. For example, the hologram device may include a devicethat implements a 360-degree stereoscopic image by recording and playingstereoscopic information by utilizing a phenomenon of interference oflight generated by the two laser lights meeting with each other, calledholography. For example, the public safety device may include a videorelay device or a video device that can be worn by the user's body. Forexample, the MTC device and the IoT device may be a device that do notrequire direct human intervention or manipulation. For example, the MTCdevice and the IoT device may include a smart meter, a vending machine,a thermometer, a smart bulb, a door lock and/or various sensors. Forexample, the medical device may be a device used for the purpose ofdiagnosing, treating, alleviating, handling, or preventing a disease.For example, the medical device may be a device used for the purpose ofdiagnosing, treating, alleviating, or correcting an injury or disorder.For example, the medical device may be a device used for the purpose ofinspecting, replacing or modifying a structure or function. For example,the medical device may be a device used for the purpose of controllingpregnancy. For example, the medical device may include a treatmentdevice, a surgical device, an (in vitro) diagnostic device, a hearingaid and/or a procedural device, etc. For example, a security device maybe a device installed to prevent the risk that may occur and to maintainsafety. For example, the security device may include a camera, aclosed-circuit TV (CCTV), a recorder, or a black box. For example, thefin-tech device may be a device capable of providing financial servicessuch as mobile payment. For example, the fin-tech device may include apayment device or a point of sales (POS). For example, theclimate/environmental device may include a device for monitoring orpredicting the climate/environment.

The first device 210 may include at least one or more processors, suchas a processor 211, at least one memory, such as a memory 212, and atleast one transceiver, such as a transceiver 213. The processor 211 mayperform the functions, procedures, and/or methods of the first devicedescribed throughout the disclosure. The processor 211 may perform oneor more protocols. For example, the processor 211 may perform one ormore layers of the air interface protocol. The memory 212 is connectedto the processor 211 and may store various types of information and/orinstructions. The transceiver 213 is connected to the processor 211 andmay be controlled by the processor 211 to transmit and receive wirelesssignals.

The second device 220 may include at least one or more processors, suchas a processor 221, at least one memory, such as a memory 222, and atleast one transceiver, such as a transceiver 223. The processor 221 mayperform the functions, procedures, and/or methods of the second device220 described throughout the disclosure. The processor 221 may performone or more protocols. For example, the processor 221 may perform one ormore layers of the air interface protocol. The memory 222 is connectedto the processor 221 and may store various types of information and/orinstructions. The transceiver 223 is connected to the processor 221 andmay be controlled by the processor 221 to transmit and receive wirelesssignals.

The memory 212, 222 may be connected internally or externally to theprocessor 211, 212, or may be connected to other processors via avariety of technologies such as wired or wireless connections.

The first device 210 and/or the second device 220 may have more than oneantenna. For example, antenna 214 and/or antenna 224 may be configuredto transmit and receive wireless signals.

FIG. 3 shows an example of a wireless communication system to which thetechnical features of the present disclosure can be applied.

Specifically, FIG. 3 shows a system architecture based on anevolved-UMTS terrestrial radio access network (E-UTRAN). Theaforementioned LTE is a part of an evolved-UTMS (e-UMTS) using theE-UTRAN.

Referring to FIG. 3, the wireless communication system includes one ormore user equipment (UE) 310, an E-UTRAN and an evolved packet core(EPC). The UE 310 refers to a communication equipment carried by a user.The UE 310 may be fixed or mobile. The UE 310 may be referred to asanother terminology, such as a mobile station (MS), a user terminal(UT), a subscriber station (SS), a wireless device, etc.

The E-UTRAN consists of one or more evolved NodeB (eNB) 320. The eNB 320provides the E-UTRA user plane and control plane protocol terminationstowards the UE 10. The eNB 320 is generally a fixed station thatcommunicates with the UE 310. The eNB 320 hosts the functions, such asinter-cell radio resource management (RRM), radio bearer (RB) control,connection mobility control, radio admission control, measurementconfiguration/provision, dynamic resource allocation (scheduler), etc.The eNB 320 may be referred to as another terminology, such as a basestation (BS), a base transceiver system (BTS), an access point (AP),etc.

A downlink (DL) denotes communication from the eNB 320 to the UE 310. Anuplink (UL) denotes communication from the UE 310 to the eNB 320. Asidelink (SL) denotes communication between the UEs 310. In the DL, atransmitter may be a part of the eNB 320, and a receiver may be a partof the UE 310. In the UL, the transmitter may be a part of the UE 310,and the receiver may be a part of the eNB 320. In the SL, thetransmitter and receiver may be a part of the UE 310.

The EPC includes a mobility management entity (MME), a serving gateway(S-GW) and a packet data network (PDN) gateway (P-GW). The MME hosts thefunctions, such as non-access stratum (NAS) security, idle statemobility handling, evolved packet system (EPS) bearer control, etc. TheS-GW hosts the functions, such as mobility anchoring, etc. The S-GW is agateway having an E-UTRAN as an endpoint. For convenience, MME/S-GW 330will be referred to herein simply as a “gateway,” but it is understoodthat this entity includes both the MME and S-GW. The P-GW hosts thefunctions, such as UE Internet protocol (IP) address allocation, packetfiltering, etc. The P-GW is a gateway having a PDN as an endpoint. TheP-GW is connected to an external network.

The UE 310 is connected to the eNB 320 by means of the Uu interface. TheUEs 310 are interconnected with each other by means of the PC5interface. The eNBs 320 are interconnected with each other by means ofthe X2 interface. The eNBs 320 are also connected by means of the S1interface to the EPC, more specifically to the MME by means of theS1-MME interface and to the S-GW by means of the S1-U interface. The S1interface supports a many-to-many relation between MMEs/S-GWs and eNBs.

FIG. 4 shows another example of a wireless communication system to whichthe technical features of the present disclosure can be applied.

Specifically, FIG. 4 shows a system architecture based on a 5G NR. Theentity used in the 5G NR (hereinafter, simply referred to as “NR”) mayabsorb some or all of the functions of the entities introduced in FIG. 3(e.g. eNB, MME, S-GW). The entity used in the NR may be identified bythe name “NG” for distinction from the LTE/LTE-A.

Referring to FIG. 4, the wireless communication system includes one ormore UE 410, a next-generation RAN (NG-RAN) and a 5th generation corenetwork (5GC). The NG-RAN consists of at least one NG-RAN node. TheNG-RAN node is an entity corresponding to the eNB 320 shown in FIG. 3.The NG-RAN node consists of at least one gNB 421 and/or at least oneng-eNB 422. The gNB 421 provides NR user plane and control planeprotocol terminations towards the UE 410. The ng-eNB 422 provides E-UTRAuser plane and control plane protocol terminations towards the UE 410.

The 5GC includes an access and mobility management function (AMF), auser plane function (UPF) and a session management function (SMF). TheAMF hosts the functions, such as NAS security, idle state mobilityhandling, etc. The AMF is an entity including the functions of theconventional MME. The UPF hosts the functions, such as mobilityanchoring, protocol data unit (PDU) handling. The UPF an entityincluding the functions of the conventional S-GW. The SMF hosts thefunctions, such as UE IP address allocation, PDU session control.

The gNBs 421 and ng-eNBs 422 are interconnected with each other by meansof the Xn interface. The gNBs 421 and ng-eNBs 422 are also connected bymeans of the NG interfaces to the 5GC, more specifically to the AMF bymeans of the NG-C interface and to the UPF by means of the NG-Uinterface.

A protocol structure between network entities described above isdescribed. On the system of FIG. 3 and/or FIG. 4, layers of a radiointerface protocol between the UE and the network (e.g. NG-RAN and/orE-UTRAN) may be classified into a first layer (L1), a second layer (L2),and a third layer (L3) based on the lower three layers of the opensystem interconnection (OSI) model that is well-known in thecommunication system.

FIG. 5 shows a block diagram of a user plane protocol stack to which thetechnical features of the present disclosure can be applied. FIG. 6shows a block diagram of a control plane protocol stack to which thetechnical features of the present disclosure can be applied.

The user/control plane protocol stacks shown in FIG. 5 and FIG. 6 areused in NR. However, user/control plane protocol stacks shown in FIG. 5and FIG. 6 may be used in LTE/LTE-A without loss of generality, byreplacing gNB/AMF with eNB/MME.

Referring to FIG. 5 and FIG. 6, a physical (PHY) layer belonging to L1.The PHY layer offers information transfer services to media accesscontrol (MAC) sublayer and higher layers. The PHY layer offers to theMAC sublayer transport channels. Data between the MAC sublayer and thePHY layer is transferred via the transport channels. Between differentPHY layers, i.e., between a PHY layer of a transmission side and a PHYlayer of a reception side, data is transferred via the physicalchannels.

The MAC sublayer belongs to L2. The main services and functions of theMAC sublayer include mapping between logical channels and transportchannels, multiplexing/de-multiplexing of MAC service data units (SDUs)belonging to one or different logical channels into/from transportblocks (TB) delivered to/from the physical layer on transport channels,scheduling information reporting, error correction through hybridautomatic repeat request (HARQ), priority handling between UEs by meansof dynamic scheduling, priority handling between logical channels of oneUE by means of logical channel prioritization (LCP), etc. The MACsublayer offers to the radio link control (RLC) sublayer logicalchannels.

The RLC sublayer belong to L2. The RLC sublayer supports threetransmission modes, i.e. transparent mode (TM), unacknowledged mode(UM), and acknowledged mode (AM), in order to guarantee various qualityof services (QoS) required by radio bearers. The main services andfunctions of the RLC sublayer depend on the transmission mode. Forexample, the RLC sublayer provides transfer of upper layer PDUs for allthree modes, but provides error correction through ARQ for AM only. InLTE/LTE-A, the RLC sublayer provides concatenation, segmentation andreassembly of RLC SDUs (only for UM and AM data transfer) andre-segmentation of RLC data PDUs (only for AM data transfer). In NR, theRLC sublayer provides segmentation (only for AM and UM) andre-segmentation (only for AM) of RLC SDUs and reassembly of SDU (onlyfor AM and UM). That is, the NR does not support concatenation of RLCSDUs. The RLC sublayer offers to the packet data convergence protocol(PDCP) sublayer RLC channels.

The PDCP sublayer belong to L2. The main services and functions of thePDCP sublayer for the user plane include header compression anddecompression, transfer of user data, duplicate detection, PDCP PDUrouting, retransmission of PDCP SDUs, ciphering and deciphering, etc.The main services and functions of the PDCP sublayer for the controlplane include ciphering and integrity protection, transfer of controlplane data, etc.

The service data adaptation protocol (SDAP) sublayer belong to L2. TheSDAP sublayer is only defined in the user plane. The SDAP sublayer isonly defined for NR. The main services and functions of SDAP include,mapping between a QoS flow and a data radio bearer (DRB), and markingQoS flow ID (QFI) in both DL and UL packets. The SDAP sublayer offers to5GC QoS flows.

A radio resource control (RRC) layer belongs to L3. The RRC layer isonly defined in the control plane. The RRC layer controls radioresources between the UE and the network. To this end, the RRC layerexchanges RRC messages between the UE and the BS. The main services andfunctions of the RRC layer include broadcast of system informationrelated to AS and NAS, paging, establishment, maintenance and release ofan RRC connection between the UE and the network, security functionsincluding key management, establishment, configuration, maintenance andrelease of radio bearers, mobility functions, QoS management functions,UE measurement reporting and control of the reporting, NAS messagetransfer to/from NAS from/to UE.

In other words, the RRC layer controls logical channels, transportchannels, and physical channels in relation to the configuration,reconfiguration, and release of radio bearers. A radio bearer refers toa logical path provided by L1 (PHY layer) and L2 (MAC/RLC/PDCP/SDAPsublayer) for data transmission between a UE and a network. Setting theradio bearer means defining the characteristics of the radio protocollayer and the channel for providing a specific service, and setting eachspecific parameter and operation method. Radio bearer may be dividedinto signalling RB (SRB) and data RB (DRB). The SRB is used as a pathfor transmitting RRC messages in the control plane, and the DRB is usedas a path for transmitting user data in the user plane.

An RRC state indicates whether an RRC layer of the UE is logicallyconnected to an RRC layer of the E-UTRAN. In LTE/LTE-A, when the RRCconnection is established between the RRC layer of the UE and the RRClayer of the E-UTRAN, the UE is in the RRC connected state(RRC_CONNECTED). Otherwise, the UE is in the RRC idle state (RRC_IDLE).In NR, the RRC inactive state (RRC_INACTIVE) is additionally introduced.RRC_INACTIVE may be used for various purposes. For example, the massivemachine type communications (MMTC) UEs can be efficiently managed inRRC_INACTIVE. When a specific condition is satisfied, transition is madefrom one of the above three states to the other.

A predetermined operation may be performed according to the RRC state.In RRC_IDLE, public land mobile network (PLMN) selection, broadcast ofsystem information (SI), cell re-selection mobility, core network (CN)paging and discontinuous reception (DRX) configured by NAS may beperformed. The UE shall have been allocated an identifier (ID) whichuniquely identifies the UE in a tracking area. No RRC context stored inthe BS.

In RRC_CONNECTED, the UE has an RRC connection with the network (i.e.E-UTRAN/NG-RAN). Network-CN connection (both C/U-planes) is alsoestablished for UE. The UE AS context is stored in the network and theUE. The RAN knows the cell which the UE belongs to. The network cantransmit and/or receive data to/from UE. Network controlled mobilityincluding measurement is also performed.

Most of operations performed in RRC_IDLE may be performed inRRC_INACTIVE. But, instead of CN paging in RRC_IDLE, RAN paging isperformed in RRC_INACTIVE. In other words, in RRC_IDLE, paging formobile terminated (MT) data is initiated by core network and paging areais managed by core network. In RRC_INACTIVE, paging is initiated byNG-RAN, and RAN-based notification area (RNA) is managed by NG-RAN.Further, instead of DRX for CN paging configured by NAS in RRC_IDLE, DRXfor RAN paging is configured by NG-RAN in RRC_INACTIVE. Meanwhile, inRRC_INACTIVE, 5GC-NG-RAN connection (both C/U-planes) is established forUE, and the UE AS context is stored in NG-RAN and the UE. NG-RAN knowsthe RNA which the UE belongs to.

NAS layer is located at the top of the RRC layer. The NAS controlprotocol performs the functions, such as authentication, mobilitymanagement, security control.

The physical channels may be modulated according to OFDM processing andutilizes time and frequency as radio resources. The physical channelsconsist of a plurality of orthogonal frequency division multiplexing(OFDM) symbols in time domain and a plurality of subcarriers infrequency domain. One subframe consists of a plurality of OFDM symbolsin the time domain. A resource block is a resource allocation unit, andconsists of a plurality of OFDM symbols and a plurality of subcarriers.In addition, each subframe may use specific subcarriers of specific OFDMsymbols (e.g. first OFDM symbol) of the corresponding subframe for aphysical downlink control channel (PDCCH), i.e. L1/L2 control channel Atransmission time interval (TTI) is a basic unit of time used by ascheduler for resource allocation. The TTI may be defined in units ofone or a plurality of slots, or may be defined in units of mini-slots.

The transport channels are classified according to how and with whatcharacteristics data are transferred over the radio interface. DLtransport channels include a broadcast channel (BCH) used fortransmitting system information, a downlink shared channel (DL-SCH) usedfor transmitting user traffic or control signals, and a paging channel(PCH) used for paging a UE. UL transport channels include an uplinkshared channel (UL-SCH) for transmitting user traffic or control signalsand a random access channel (RACH) normally used for initial access to acell.

Different kinds of data transfer services are offered by MAC sublayer.Each logical channel type is defined by what type of information istransferred. Logical channels are classified into two groups: controlchannels and traffic channels.

Control channels are used for the transfer of control plane informationonly. The control channels include a broadcast control channel (BCCH), apaging control channel (PCCH), a common control channel (CCCH) and adedicated control channel (DCCH). The BCCH is a DL channel forbroadcasting system control information. The PCCH is DL channel thattransfers paging information, system information change notifications.The CCCH is a channel for transmitting control information between UEsand network. This channel is used for UEs having no RRC connection withthe network. The DCCH is a point-to-point bi-directional channel thattransmits dedicated control information between a UE and the network.This channel is used by UEs having an RRC connection.

Traffic channels are used for the transfer of user plane informationonly. The traffic channels include a dedicated traffic channel (DTCH).The DTCH is a point-to-point channel, dedicated to one UE, for thetransfer of user information. The DTCH can exist in both UL and DL.

Regarding mapping between the logical channels and transport channels,in DL, BCCH can be mapped to BCH, BCCH can be mapped to DL-SCH, PCCH canbe mapped to PCH, CCCH can be mapped to DL-SCH, DCCH can be mapped toDL-SCH, and DTCH can be mapped to DL-SCH. In UL, CCCH can be mapped toUL-SCH, DCCH can be mapped to UL-SCH, and DTCH can be mapped to UL-SCH.

FIG. 7 illustrates a frame structure in a 3GPP based wirelesscommunication system. The frame structure illustrated in FIG. 7 ispurely exemplary and the number of subframes, the number of slots,and/or the number of symbols in a frame may be variously changed. In the3GPP based wireless communication system, an OFDM numerology (e.g.,subcarrier spacing (SCS), transmission time interval (TTI) duration) maybe differently configured between a plurality of cells aggregated forone UE. For example, if a UE is configured with different SCSs for cellsaggregated for the cell, an (absolute time) duration of a time resource(e.g. a subframe, a slot, or a TTI) including the same number of symbolsmay be different among the aggregated cells. Herein, symbols may includeOFDM symbols (or CP-OFDM symbols), SC-FDMA symbols (or discrete Fouriertransform-spread-OFDM (DFT-s-OFDM) symbols).

Referring to FIG. 7, downlink and uplink transmissions are organizedinto frames. Each frame has Tf=10 ms duration. Each frame is dividedinto two half-frames, where each of the half-frames has 5 ms duration.Each half-frame consists of 5 subframes, where the duration Tsf persubframe is 1 ms. Each subframe is divided into slots and the number ofslots in a subframe depends on a subcarrier spacing. Each slot includes14 or 12 OFDM symbols based on a cyclic prefix (CP). In a normal CP,each slot includes 14 OFDM symbols and, in an extended CP, each slotincludes 12 OFDM symbols. The numerology is based on exponentiallyscalable subcarrier spacing Δf=2u*15 kHz. The following table shows thenumber of OFDM symbols per slot, the number of slots per frame, and thenumber of slots per for the normal CP, according to the subcarrierspacing Δf=2u*15 kHz.

TABLE 3 u Nslotsymb Nframe, uslot Nsubframe, uslot 0 14 10 1 1 14 20 2 214 40 4 3 14 80 8 4 14 160 16

The following table shows the number of OFDM symbols per slot, thenumber of slots per frame, and the number of slots per for the extendedCP, according to the subcarrier spacing Δf=2u*15 kHz.

TABLE 4 u Nslotsymb Nframe, uslot Nsubframe, uslot 2 12 40 4

A slot includes plural symbols (e.g., 14 or 12 symbols) in the timedomain. For each numerology (e.g. subcarrier spacing) and carrier, aresource grid of Nsize,ugrid,x*NRBsc subcarriers and Nsubframe,usymbOFDM symbols is defined, starting at common resource block (CRB)Nstart,ugrid indicated by higher-layer signalling (e.g. radio resourcecontrol (RRC) signalling), where Nsize,ugrid,x is the number of resourceblocks (RBs) in the resource grid and the subscript x is DL for downlinkand UL for uplink. NRBsc is the number of subcarriers per RB. In the3GPP based wireless communication system, NRBsc is 12 generally. Thereis one resource grid for a given antenna port p, subcarrier spacingconfiguration u, and transmission direction (DL or UL). The carrierbandwidth Nsize,ugrid for subcarrier spacing configuration u is given bythe higher-layer parameter (e.g. RRC parameter). Each element in theresource grid for the antenna port p and the subcarrier spacingconfiguration u is referred to as a resource element (RE) and onecomplex symbol may be mapped to each RE. Each RE in the resource grid isuniquely identified by an index k in the frequency domain and an index 1representing a symbol location relative to a reference point in the timedomain. In the 3GPP based wireless communication system, an RB isdefined by 12 consecutive subcarriers in the frequency domain.

In the 3GPP NR system, RBs are classified into CRBs and physicalresource blocks (PRBs). CRBs are numbered from 0 and upwards in thefrequency domain for subcarrier spacing configuration u. The center ofsubcarrier 0 of CRB 0 for subcarrier spacing configuration u coincideswith ‘point A’ which serves as a common reference point for resourceblock grids. In the 3GPP NR system, PRBs are defined within a bandwidthpart (BWP) and numbered from 0 to NsizeBWP,i−1, where i is the number ofthe bandwidth part. The relation between the physical resource blocknPRB in the bandwidth part i and the common resource block nCRB is asfollows: nPRB=nCRB+NsizeBWP,i, where NsizeBWP,i is the common resourceblock where bandwidth part starts relative to CRB 0. The BWP includes aplurality of consecutive RBs. A carrier may include a maximum of N(e.g., 5) BWPs. A UE may be configured with one or more BWPs on a givencomponent carrier. Only one BWP among BWPs configured to the UE canactive at a time. The active BWP defines the UE's operating bandwidthwithin the cell's operating bandwidth.

In the present disclosure, the term “cell” may refer to a geographicarea to which one or more nodes provide a communication system, or referto radio resources. A “cell” of a geographic area may be understood ascoverage within which a node can provide service using a carrier and a“cell” as radio resources (e.g. time-frequency resources) is associatedwith bandwidth (BW) which is a frequency range configured by thecarrier. The “cell” associated with the radio resources is defined by acombination of downlink resources and uplink resources, for example, acombination of a downlink (DL) component carrier (CC) and a uplink (UL)CC. The cell may be configured by downlink resources only, or may beconfigured by downlink resources and uplink resources. Since DLcoverage, which is a range within which the node is capable oftransmitting a valid signal, and UL coverage, which is a range withinwhich the node is capable of receiving the valid signal from the UE,depends upon a carrier carrying the signal, the coverage of the node maybe associated with coverage of the “cell” of radio resources used by thenode. Accordingly, the term “cell” may be used to represent servicecoverage of the node sometimes, radio resources at other times, or arange that signals using the radio resources can reach with validstrength at other times.

In carrier aggregation (CA), two or more CCs are aggregated. A UE maysimultaneously receive or transmit on one or multiple CCs depending onits capabilities. CA is supported for both contiguous and non-contiguousCCs. When CA is configured the UE only has one radio resource control(RRC) connection with the network. At RRC connectionestablishment/re-establishment/handover, one serving cell provides thenon-access stratum (NAS) mobility information, and at RRC connectionre-establishment/handover, one serving cell provides the security input.This cell is referred to as the Primary Cell (PCell). The PCell is acell, operating on the primary frequency, in which the UE eitherperforms the initial connection establishment procedure or initiates theconnection re-establishment procedure. Depending on UE capabilities,Secondary Cells (SCells) can be configured to form together with thePCell a set of serving cells. An SCell is a cell providing additionalradio resources on top of Special Cell. The configured set of servingcells for a UE therefore always consists of one PCell and one or moreSCells. For dual connectivity operation, the term Special Cell (SpCell)refers to the PCell of the master cell group (MCG) or the PSCell of thesecondary cell group (SCG). An SpCell supports PUCCH transmission andcontention-based random access, and is always activated. The MCG is agroup of serving cells associated with a master node, comprising of theSpCell (PCell) and optionally one or more SCells. The SCG is the subsetof serving cells associated with a secondary node, comprising of thePSCell and zero or more SCells, for a UE configured with dualconnectivity (DC). For a UE in RRC_CONNECTED not configured with CA/DCthere is only one serving cell comprising of the PCell. For a UE inRRC_CONNECTED configured with CA/DC the term “serving cells” is used todenote the set of cells comprising of the SpCell(s) and all SCells. InDC, two MAC entities are configured in a UE: one for the MCG and one forthe SCG.

FIG. 8 illustrates a data flow example in the 3GPP NR system.

In FIG. 8, “RB” denotes a radio bearer, and “H” denotes a header. Radiobearers are categorized into two groups: data radio bearers (DRB) foruser plane data and signalling radio bearers (SRB) for control planedata. The MAC PDU is transmitted/received using radio resources throughthe PHY layer to/from an external device. The MAC PDU arrives to the PHYlayer in the form of a transport block.

In the PHY layer, the uplink transport channels UL-SCH and RACH aremapped to their physical channels PUSCH and PRACH, respectively, and thedownlink transport channels DL-SCH, BCH and PCH are mapped to PDSCH,PBCH and PDSCH, respectively. In the PHY layer, uplink controlinformation (UCI) is mapped to PUCCH, and downlink control information(DCI) is mapped to PDCCH. A MAC PDU related to UL-SCH is transmitted bya UE via a PUSCH based on an UL grant, and a MAC PDU related to DL-SCHis transmitted by a BS via a PDSCH based on a DL assignment.

Data unit(s) (e.g. PDCP SDU, PDCP PDU, RLC SDU, RLC PDU, RLC SDU, MACSDU, MAC CE, MAC PDU) in the present disclosure is(are)transmitted/received on a physical channel (e.g. PDSCH, PUSCH) based onresource allocation (e.g. UL grant, DL assignment). In the presentdisclosure, uplink resource allocation is also referred to as uplinkgrant, and downlink resource allocation is also referred to as downlinkassignment. The resource allocation includes time domain resourceallocation and frequency domain resource allocation. In the presentdisclosure, an uplink grant is either received by the UE dynamically onPDCCH, in a Random Access Response, or configured to the UEsemi-persistently by RRC. In the present disclosure, downlink assignmentis either received by the UE dynamically on the PDCCH, or configured tothe UE semi-persistently by RRC signalling from the BS.

FIG. 9 shows an example of communication links to which technicalfeatures of the present disclosure can be applied.

Referring to FIG. 9, the communication links comprise uplink, downlink,and sidelink. The uplink is a communication interface from a UE (e.g.,UE 920) to a base station (e.g., base station 910, such as eNB and/orgNB). The downlink is a communication interface from a base station(e.g., base station 910) to a UE (e.g., UE 920).

The sidelink is UE to UE interface for sidelink communication, sidelinkdiscovery and/or vehicle to everything (V2X) communication. For example,the sidelink may correspond to a PC5 interface for sidelinkcommunication, sidelink discovery and/or V2X sidelink communication.

A UE may perform a communication via network infrastructure. Forexample, as shown in FIG. 9, the UE1 920 may perform an uplinktransmission and/or receive a downlink transmission, via the basestation 910.

Also, a UE may perform a communication directly with a peer UE withoutusing the network infrastructure. For example, as shown in FIG. 9, theUE1 920 may perform a direct communication with the UE2 930 viasidelink, without a support of the network infrastructure such as basestation 910.

According to various embodiments, upper layers configure the UE toreceive or transmit sidelink communication on a specific frequency, tomonitor or transmit non-public safety (PS) related sidelink discoveryannouncements on one or more frequencies or to monitor or transmit PSrelated sidelink discovery announcements on a specific frequency, butonly if the UE is authorized to perform these particular proximityservice (ProSe) related sidelink activities.

Sidelink communication comprises one-to-many and one-to-one sidelinkcommunication. One-to-many sidelink communication comprises relayrelated and non-relay related one-to-many sidelink communication.One-to-one sidelink communication comprises relay related and non-relayrelated one-to-one sidelink communication. In relay related one-to-onesidelink communication the communicating parties comprise one sidelinkrelay UE and one sidelink remote UE.

Sidelink discovery comprises public safety related (PS related) andnon-PS related sidelink discovery. PS related sidelink discoverycomprises relay related and non-relay related PS related sidelinkdiscovery. Upper layers indicate to RRC whether a particular sidelinkannouncement is PS related or non-PS related.

According to various embodiments, upper layers indicate to radioresource control (RRC) whether a particular sidelink procedure is V2Xrelated or not.

According to various embodiments, the UE shall perform V2X sidelinkcommunication operation if at least one of the following conditions1)-3) is met:

Condition 1) if the UE's serving cell is suitable (RRC_IDLE or RRCCONNECTED); and if either the selected cell on the frequency used forV2X sidelink communication operation belongs to the registered orequivalent public land mobile network (PLMN) or the UE is out ofcoverage on the frequency used for V2X sidelink communication operation;

Condition 2) if the UE's serving cell (for RRC_IDLE or RRC_CONNECTED)fulfils the conditions to support V2X sidelink communication in limitedservice state; and if either the serving cell is on the frequency usedfor V2X sidelink communication operation or the UE is out of coverage onthe frequency used for V2X sidelink communication operation; or

Condition 3) if the UE has no serving cell (RRC_IDLE).

FIG. 10 shows an example of sidelink connectivity types to whichtechnical features of the present disclosure can be applied.

Referring to FIG. 10, a sidelink connectivity between UE 1011 and UE1013 may be “in-coverage”, where the two UEs UE 1011 and UE 1013 areunder a coverage of a network (e.g., base station 1010). Also, thesidelink connectivity between the UE 1011 and the UE 1013 may bein-coverage of intra-cell type, as the UE 1011 receiving a sidelinktransmission is within a same cell as the UE 1013 transmitting thesidelink transmission.

A sidelink connectivity between UE 1017 and UE 1021 may be alsoin-coverage, as the two UEs 1017 and 1021 are under a coverage of anetwork. However, unlike the case of the UE 1011 and the UE 1013, thesidelink connectivity between the UE 1017 and the UE 1021 may bein-coverage of inter-cell type, as the UE 1021 receiving a sidelinktransmission is within a cell coverage of a base station 1020 while theUE 1017 transmitting the sidelink transmission is within a cell coverageof a base station 1010.

A sidelink connectivity between UE 1015 and UE 1031 may be“partial-coverage”, where one of the two UEs (e.g., UE 1015) is under acoverage of a network while the other UE (e.g., UE 1031) is outside thecoverage of the network.

A sidelink connectivity between UE 1033 and UE 1035 may be“out-of-coverage”, where the two UEs UE 1033 and UE 1035 are outside acoverage of a network.

FIG. 11 shows an example of sidelink channel mapping to which technicalfeatures of the present disclosure can be applied.

Referring to FIG. 11, sidelink logical channels may comprise sidelinktraffic channel (STCH) and sidelink broadcast control channel (SBCCH).Sidelink transport channels may comprise sidelink shared channel(SL-SCH), sidelink discovery channel (SL-DCH), and sidelink broadcastchannel (SL-BCH). Sidelink physical channels and/or signals may comprisephysical sidelink shared channel (PSSCH), physical sidelink controlchannel (PSCCH), physical sidelink discovery channel (PSDCH), sidelinksynchronization signal (SLSS), and physical sidelink broadcast channel(PSBCH).

The STCH carries user data for sidelink communication. The STCH ismapped to the SL-SCH which, in turn, is mapped to the PSSCH.

The PSCCH carries sidelink control information (SCI). The SCI containssidelink scheduling information such as resource block assignment,modulation and coding scheme, and/or group destination ID.

The SL-DCH is used for discovery announcements. The SL-DCH is mapped tothe PSDCH.

The SLSS is a physical signal, which is used to synchronize a sidelinkcommunication between UE and peer UE. The SLSS is associated with aspecific sidelink identity (SLI).

The SBCCH is mapped to the SL-BCH which, in turn, is mapped to thePSBCH. These channels are also used for sidelink synchronization, andcomprise sidelink related system information. For example, the sidelinkrelated system information may be referred to as sidelink masterinformation block (SL-MIB).

Although not illustrated in FIG. 11, there might be other channel(s)such as sidelink feedback channel (SL-FCH) and/or physical sidelinkfeedback channel (PSFCH). These channels are used to carry sidelinkfeedback control information (SFCI) from a device receiving a sidelinktransmission.

FIG. 12 shows an example of a control plane protocol stack for sidelinkcommunication to which technical features of the present disclosure canbe applied.

Referring to FIG. 12, a control plane for PC5 reference point (i.e., PC5signalling (PC5-S) protocol stack) is depicted. The control planeprotocol stack for sidelink communication may comprise PC5-S protocol,PDCP, RLC, MAC, and PHY.

The PC-5 S protocol may be used for control plane signalling over thePC5 reference point for the secure layer-2 link. The functionality ofPDCP/RLC/MAC/PHY may be the same as illustrated in FIG. 5-6.

FIG. 13 shows an example of a direct link setup procedure to whichtechnical features of the present disclosure can be applied.

Referring to FIG. 13, the direct link setup procedure may be used toestablish a secure direct link between two ProSe-enabled UEs. The UEsending the request message (i.e., DIRECT_COMMUNICATION_REQUESETmessage) may be called the “initiating UE”, and the other UE may becalled the “target UE”.

The initiating UE may generate the DIRECT_COMMUNICATION_REQUEST message.After the DIRECT_COMMUNICATION_REQUEST message is generated, theinitiating UE shall pass this message to the lower layers fortransmission along with the initiating UE's layer 2 ID (for unicastcommunication) and the target UE's Layer 2 ID (for unicastcommunication), and start timer T4100. The UE shall not send a newDIRECT_COMMUNICATION_REQUEST message to the same target UE while thetimer T4100 is running.

Upon receiving a DIRECT_COMMUNICATION_REQUEST message, the target UEshall store the pair of Layer 2 IDs (for unicast communication) used inthe transport of this message provided by the lower layers and associatethem with a direct link context.

The target UE then may check the User Info IE included in theDIRECT_COMMUNICATION_REQUEST message and determine whether this requestcan be accepted or not. Then, the target UE may examine the IP AddressConfig IE to see whether there is at least one common IP addressconfiguration option supported by both the initiating UE and the targetUE. If the above check is successful, the target UE shall invoke thedirect security mode control procedure to establish a securityassociation between the target UE and the initiating UE. Only after thecompletion of link authentication procedure and a successfulestablishment of the security association, the target UE shall send aDIRECT_COMMUNICATION_ACCEPT message to the initiating UE.

If the target UE is a ProSe-UE-to-network relay UE, the target UE shallcreate an inactivity timer T4108 with the value provided in the MaximumInactivity Period IE included in the DIRECT_COMMUNICATION_REQUESTmessage, and start the timer T4108 when it has no more messages to sendover the link to be established. Once the timer T4108 is started, if anycommunication activity occurs before the timer T4108 expires, the UEshall stop the timer T4108 and reset it with the initial value, unless anew value is provided in a Maximum Inactivity Period IE in aDIRECT_COMMUNICATION_KEEPALIVE message.

Upon receipt of the DIRECT_COMMUNICATION_ACCEPT message, the initiatingUE shall stop timer T4100. From this time onward the initiating UE shalluse the established link for all one-to-one communication (includingadditional PC5 Signalling messages) to the target UE.

If the direct link setup request cannot be accepted, the target UE shallsend a DIRECT_COMMUNICATION_REJECT message. TheDIRECT_COMMUNICATION_REJECT message contains a PC5 Signalling Protocolcause value.

Upon receipt of the DIRECT_COMMUNICATION_REJECT message, the initiatingUE shall stop timer T4100 and abort the direct link setup procedure. Ifthe cause value in the DIRECT_COMMUNICATION_REJECT message is “Directcommunication to target UE not allowed” or “Lack of resources forproposed link”, then the UE shall not attempt to start direct link setupwith the same target UE at least for a time period T, and if theinitiating UE is a remote UE requesting link setup to a ProSeUE-to-network relay UE, it shall initiate the relay reselectionprocedure.

FIG. 14 shows an example of a direct security mode control procedure towhich technical features of the present disclosure can be applied.

Referring to FIG. 14, the UE sending the DIRECT_SECURITY_MODE_COMMANDmessage may be called the “commanding UE” and the other UE may be calledthe “peer UE”.

The commanding UE shall send the DIRECT SECURITY MODE COMMAND messageunciphered, but shall integrity protect the message with the newsecurity context. After sending the DIRECT_SECURITY_MODE_COMMANDmessage, the commanding UE shall start timer T4111.

Upon receipt of the DIRECT_SECURITY_MODE_COMMAND message, the peer UEshall check whether the security mode command can be accepted or not.This may be done by performing the integrity check of the message and bychecking that the received UE security capabilities have not beenaltered compared to the latest values that the peer UE sent to thecommanding UE in the DIRECT_COMMUNICATION_REQUEST orDIRECT_REKEYING_REQUEST message.

If the DIRECT_SECURITY_MODE_COMMAND message can be accepted, the peer UEshall send a DIRECT_SECURITY_MODE_COMPLETE message ciphered andintegrity protected with the new security context. TheDIRECT_SECURITY_MODE_COMPLETE message shall include the 16 leastsignificant bits of the K_(D) ID if the initiating UE included the MSBof K_(D) ID in the DIRECT_SECURITY_MODE_COMMAND message.

Upon receipt of the DIRECT_SECURITY_MODE_COMPLETE message, thecommanding UE shall stop timer T4111. If an LSB of K_(D) ID IE wasincluded in the message, the commanding UE may use this and the MSB ofK_(D) ID it previously sent to form the K_(D) ID of the new K_(D). Fromthis time onwards the commanding UE shall protect all signallingmessages and user data with the new security context.

If the DIRECT_SECURITY_MODE_COMMAND message cannot be accepted, the peerUE shall send a DIRECT_SECURITY_MODE_REJECT message. TheDIRECT_SECURITY_MODE_REJECT message contains a PC5 Signalling ProtocolCause Value IE.

Upon receipt of the DIRECT_SECURITY_MODE_REJECT message, the commandingUE shall stop timer T4111. If the PC5 Signalling Protocol Cause Value IEindicates a synchronisation error and the message contained a RAND andan AUTS, then a ProSe UE-to-network relay may fetch a fresh K_(D) fromthe PKMF by sending a Key Request message including RAND and AUTS.Otherwise the commanding UE shall abort the ongoing procedure thattriggered the initiation of the direct security mode control procedure.

FIG. 15 shows an example of a direct link release procedure to whichtechnical features of the present disclosure can be applied.

Referring to FIG. 15, the direct link release procedure may be used torelease a secure direct link between two ProSe-enabled UEs. The link canbe released from either end points. The UE sending theDIRECT_COMMUNICATION_RELEASE message may be called the “releasing UE”and the other UE may be called the “peer UE”.

The releasing UE may initiate the direct link release procedure bygenerating a DIRECT_COMMUNICATION_RELEASE message with a Release ReasonIE. After the DIRECT_COMMUNICATION_RELEASE message is generated, thereleasing UE shall pass this message to the lower layers fortransmission along with the releasing UE's Layer 2 ID (for unicastcommunication) and the peer UE's Layer 2 ID (for unicast communication).The releasing UE shall release the direct link locally if the releasereason is “Direct connection is not available any more”. Otherwise, thereleasing UE shall start timer T4103.

Upon receiving a DIRECT_COMMUNICATION_RELEASE message, the peer UE shallstop timer T4101, timer T4102, timer T4103 or timer T4108 for this link,if any of those timers is running, and abort any other ongoing PC5Signalling Protocol procedures on this link. The peer UE shall respondwith a DIRECT_COMMUNICATION_RELEASE_ACCEPT message. After the message issent, the peer UE shall remove the context of this direct link and nolonger send or receive any messages via this link.

Upon receipt of the DIRECT_COMMUNICATION_RELEASE_ACCEPT message, thereleasing UE shall stop timer T4103. From this time onward the releasingUE shall no longer send or receive any messages via this link.

Hereinafter, PDCP duplication is described.

For the PDCP entity configured with pdcp-Duplication, the transmittingPDCP entity (i.e., PDCP entity of a UE that intends to transmit data)shall, for SRBs, activate the PDCP duplication. For DRBs, if theactivation of PDCP duplication is indicated, the transmitting PDCPentity shall activate the PDCP duplication. For DRBs, if thedeactivation of PDCP duplication is indicated, the transmitting PDCPentity shall deactivate the PDCP duplication.

For the PDCP entity configured with pdcp-Duplication, the transmittingPDCP entity shall, if the successful delivery of a PDCP Data PDU isconfirmed by one of the two associated AM RLC entities, indicate to theother AM RLC entity to discard the duplicated PDCP Data PDU. Thetransmitting PDCP entity shall, if the deactivation of PDCP duplicationis indicated, indicate to the secondary RLC entity to discard allduplicated PDCP Data PDUs.

In a wireless communication system, UEs supporting sidelinkcommunication can perform sidelink transmission and reception. In V2Xcommunication, a UE can establish a PC5 link (i.e., one-to-oneconnection or session between UEs) for one or more unicast services withanother UE.

PC5 signalling protocol above RRC layer in the UEs can be used forunicast link establishment and management so that the UEs may exchangePC5 signalling (i.e., upper layer signalling with respect to the RRCsignalling) to successfully or unsuccessfully establish a unicast linkwith security activation or release the established unicast link, asshown in FIGS. 13-15 for a unicast or groupcast session.

When two UEs want to use unicast service in sidelink, those UEs mayexchange PC5-RRC messages to establish unicast transmission possiblywith sidelink connection. Transmissions for exchange of PC5-RRC messagesshould be reliable enough to provide robustness to sidelink connectivitybetween those UEs. Such reliability may be supported by duplicating apacket on multiple sidelink carriers. However, such duplication cannotwork when only a single carrier is supported.

Therefore, various embodiments of the present disclosure proposes amethod for exchanging signallings for a sidelink service. In theproposed method, if a duplication is configured for the signallingmessage in NR PDCP, the first UE may determine whether or not more thanone carrier of the first radio access technology (RAT) is available fortransmission of the signalling message.

If more than one carrier of the first RAT is not available forduplication, the first UE may determine whether or not the second RAT isavailable for transmission of the signalling message. The first RAT maybe NR while the second RAT may be LTE.

If the first RAT is not available for duplication but the second RAT isavailable for duplication, the first UE may duplicate the signallingmessage for the first RAT and the second RAT. Then, the first UE mayperform a transmission of the signalling message on a carrier of thefirst RAT and transmission of the duplicated signalling message on acarrier of the second RAT.

The second UE may receive an SCI and a MAC PDU carrying the signallingmessage. If the SCI and/or the header of the MAC PDU indicates that NRPDCP is used for the signalling message, the second UE may establish aNR PDCP entity and deliver the data unit included in the received MACPDU to the NR PDCP entity. The SCI may refer to sidelink controlinformation used to transmit the MAC PDU on the sidelink shared channel.

Upon receiving the signalling message from the first UE, if thesignalling message indicates the duplication on different RATs, thesecond UE may duplicate a response message and transmit the responsemessage to the first UE on different RATs.

Upon receiving the response message from the second UE, the first UE maybegin to perform sidelink transmission on the first RAT for the service.The sidelink transmission may comprise sidelink unicast transmission.

FIG. 16 shows an example of a method for transmitting duplicatedsignalling messages according to an embodiment of the presentdisclosure. Steps illustrated in FIG. 16 may be performed by a firstwireless device and/or a first UE.

Referring to FIG. 16, in step S1601, the first wireless device maygenerate, by an entity of a first RAT, a first signalling messageduplicated from a second signalling message. The entity may be an upperentity with respect to a MAC entity. For example, the entity of thefirst RAT in the first wireless device may perform a duplication of thesecond signalling message to obtain the first signalling messageduplicated from the second signalling message. The contents of the firstsignalling message (i.e., duplicated signalling message) may be the sameas that of the second signalling message.

In step S1603, the first wireless device may transmit the firstsignalling message on a carrier of the first RAT and the secondsignalling message on a carrier of a second RAT. The second signallingmessage may be transmitted with information informing that a duplicationis performed by the entity of the first RAT.

According to various embodiments, the first wireless device may performthe duplication of the second signalling message to obtain the firstsignalling message duplicated from the second signalling message. Theduplication may be performed based on that a single carrier is availablefor the first RAT and at least one carrier on the second RAT isavailable for the duplication.

According to various embodiments, the first wireless device maytransmit, to a second wireless device via sidelink, the first signallingmessage on a carrier of the first RAT and the second signalling messageon a carrier of a second RAT. The first wireless device may receive,from the second wireless device via sidelink, feedback information forat least one of the first signalling message or the second signallingmessage. The first wireless device may perform a re-transmission of atleast one of the first signalling message or the second signallingmessage on the carrier of the first RAT, to the second wireless devicevia sidelink.

According to various embodiments, the information may comprise sidelinkcontrol information (SCI) informing that the duplication is performed bythe entity of the first RAT.

According to various embodiments, the second signalling message may beincluded in a MAC protocol data unit (PDU). The information may beincluded in a header of the MAC PDU. For example, the header of the MACPDU may comprise the SCI informing that the duplication is performed bythe entity of the first RAT.

According to various embodiments, the information may correspond to alogical channel identity (LCID) field of the header of the MAC PDU, or aversion field of the header of the MAC PDU.

According to various embodiments, the first RAT may comprise a new radio(NR), and the second RAT may comprise a long-term evolution (LTE).

According to various embodiments, the entity may comprise a packet dataconvergence protocol (PDCP) entity.

According to various embodiments, the first signalling message may betransmitted with information informing that the duplication is performedon the first RAT and the second RAT.

According to various embodiments, the first wireless device may receive,from a second wireless device to which the first signalling message andthe second signalling message are transmitted, a first response messagefor at least one of the first signalling message and the secondsignalling message on the carrier of the first RAT, and a secondresponse message duplicated from the first response message on thecarrier of the second RAT.

According to various embodiments, the first signalling message and thesecond signalling message may comprise a PC5 request message. The firstresponse message and the second response message may comprise a PC5response message.

According to various embodiments, the first wireless device may performa sidelink transmission to the second wireless device on the carrier ofthe first RAT after receiving the first response message and the secondresponse message.

FIG. 17 shows an example of signalling message exchange between UEsaccording to an embodiment of the present disclosure. The signalling maycomprise sidelink PC5 signalling, and the UEs may communicate sidelinkcommunication with each other.

Referring to FIG. 17, in step S1701, the UE1 may receive a sidelinkconfiguration for configuring a duplication on different RATs from anetwork. The UE1 may determine a transmission of a signalling messagefor a service via the first RAT. If a duplication is configured for thesignalling message, the signalling message may indicate at least one ofa duplication on a single RAT or a duplication on different RATs, thecarrier(s) where the UE1 transmits the signalling messages withduplication, the RAT(s) where the UE1 transmits the signalling messageswith duplication, the carrier(s) where the UE2 can transmit a responsemessage and the UE1 will monitor to receive the response message, or theRAT(s) where the UE2 can transmit a response message and the UE1 willmonitor to receive the response message. The service may comprise aunicast service. The transmission of the signalling message may comprisesidelink broadcast transmission.

If a duplication is configured for the signalling message, the UE1 maydetermine whether or not more than one carrier of the first RAT isavailable for transmission of the signalling message. The UE1 maydetermine that more than one carrier of the first RAT is not availablefor transmission of the signalling message in at least one of thefollowing cases:

1) the UE1 cannot select more than one carrier for the first RAT due tolimited UE capability.

2) the service associated with the signalling message is not mapped tomore than one carrier of the first RAT

3) the type of the signalling message is not mapped to more than onecarrier of the first RAT

4) a logical channel (or a radio bearer) of the signalling message isnot mapped to more than one carrier of the first RAT

5) the priority associated with the signalling message (e.g. logicalchannel priority) is above or equal to a threshold indicated by thenetwork.

6) the priority associated with the signalling message (e.g. logicalchannel priority) is below or equal to a threshold indicated by thenetwork.

7) the network controlling the UE1 indicates to the UE1 that the firstRAT is not available for duplication.

8) a duplication of the signalling message is configured only for thesecond RAT by pre-configuration or configured by the network.

If more than one carrier of the first RAT is not available forduplication, the UE1 may determine whether or not the second RAT isavailable for transmission of the signalling message. The UE1 maydetermine that the second RAT is available for transmission of thesignalling message in at least one of the following cases:

1) the service associated with the signalling message is mapped to thesecond RAT

2) the type of the signalling message is mapped to the second RAT

3) a logical channel (or a radio bearer) of the signalling message ismapped to the second RAT

4) the priority associated with the signalling message (e.g. logicalchannel priority) is above or equal to a threshold indicated by thenetwork. Alternatively, the priority associated with the signallingmessage (e.g. logical channel priority) is below or equal to a thresholdindicated by the network.

5) the network controlling the UE1 indicates to the UE1 that the secondRAT is available for transmission of the signalling message

6) a duplication of the signalling message is configured bypre-configuration or configured by the network.

The first RAT may comprise NR while the second RAT may comprise LTE.

If the first RAT is available for duplication, the UE1 may duplicate thesignalling message for the first RAT. Then, the UE1 may perform atransmission of the signalling message on a carrier of the first RAT andtransmission of the duplicated signalling message on another carrier ofthe first RAT. The UE1 may perform duplication in the PDCP entity of thefirst RAT (i.e., NR PDCP).

After a transmission of the signalling message with duplication, if theUE1 indicates a duplication in the signalling message, the UE1 maymonitor the carriers of the first RAT where the signalling message wastransmitted in order to receive a response message from the UE2.

After a transmission of the signalling message with duplication, if theUE1 indicates no duplication in the signalling message, the UE1 maymonitor one of the carriers of the first RAT where the signallingmessage was transmitted in order to receive a response message from theUE2. The UE1 may indicate the monitored carrier in the signallingmessage.

In step S1703, if the first RAT is not available for duplication but thesecond RAT is available for duplication, the UE1 may duplicate thesignalling message for the first RAT and the second RAT.

In step S1705, the UE1 may select a carrier of the first RAT (e.g., NRcarrier 1) and a carrier of the second RAT (e.g., LTE carrier 2).

In step S1707, the UE1 may perform a transmission of the signallingmessage on a carrier of the first RAT and a transmission of theduplicated signalling message on a carrier of the second RAT.

If configured, when NACK feedback is received from the UE2, the UE1 mayre-transmit the signalling message on the first RAT.

The UE1 may re-transmit the signalling message on the second RAT withoutany feedback, or the UE1 may not perform retransmission on the secondRAT.

After a transmission of the signalling message with duplication, if theUE1 indicates duplication in the signalling message, the UE1 may monitorthe carrier of the first RAT and the carrier of the second RAT in orderto receive a response message from the UE2. If neither the first RAT northe second RAT are available for duplication, the UE1 may not performduplication so that the UE1 can perform a transmission of the signallingmessage only on a carrier of the first RAT.

Transmission of the signalling message may comprise a transmission ofSCI and a transmission of a MAC PDU carrying the signalling message. IfNR PDCP is used for delivery of the MAC PDU, the SCI and/or the headerof the MAC PDU may indicate that NR PDCP is used for delivery of thesignalling message.

The UE2 may receive the SCI and/or the MAC PDU carrying the signallingmessage. If the SCI and/or the header of the MAC PDU indicates that NRPDCP is used for the signalling message, the UE2 may establish an NRPDCP entity and deliver the data unit included in the received MAC PDUto the NR PDCP entity. Then, the NR PDCP entity of the UE2 may deliverthe data unit to the PC5-RRC and/or the PC5-S protocol entity whichinterprets the signalling message.

A field included in the header of the MAC PDU, such as logical channelID (LCID) and/or a version field (i.e., V field) in the header of theMAC PDU may be used to indicate NR PDCP.

In step S1709, upon receiving the signalling message from the UE1, ifthe signalling message indicates the duplication on different RATs, theUE2 may duplicate a response message.

In step S1711, the UE2 may select a carrier of the first RAT (e.g., NRcarrier 1) and a carrier of the second RAT (e.g., LTE carrier 2), totransmit the response message.

In step S1713, the UE2 may transmit the response message on differentRATs. However, if the signalling message indicates the duplication on asingle RAT, the UE2 may duplicate the response message and transmit theresponse message on the single RAT.

Upon receiving the response message from the UE2, the UE1 may begin toperform sidelink transmission on the first RAT for the service. Thesidelink transmission may comprise sidelink unicast transmission.

FIG. 18 shows a UE to implement an embodiment of the present disclosure.The present disclosure described above for UE side may be applied tothis embodiment.

A UE includes a processor 1810, a power management module 1811, abattery 1812, a display 1813, a keypad 1814, a subscriber identificationmodule (SIM) card 1815, a memory 1820, a transceiver 1830, one or moreantennas 1831, a speaker 1840, and a microphone 1841. The processor 1810may be configured to implement proposed functions, procedures and/ormethods described in this description. Layers of the radio interfaceprotocol may be implemented in the processor 1810. The processor 1810may include application-specific integrated circuit (ASIC), otherchipset, logic circuit and/or data processing device. The processor 1810may be an application processor (AP). The processor 1810 may include atleast one of a digital signal processor (DSP), a central processing unit(CPU), a graphics processing unit (GPU), a modem (modulator anddemodulator). An example of the processor 1810 may be found inSNAPDRAGON™ series of processors made by Qualcomm®, EXYNOS™ series ofprocessors made by Samsung®, A series of processors made by Apple®,HELIO™ series of processors made by MediaTek®, ATOM™ series ofprocessors made by Intel® or a corresponding next generation processor.

The processor 1810 may be configured to, or configured to control thetransceiver 1830 to implement steps performed by the UE and/or thewireless device throughout the disclosure.

The power management module 1811 manages power for the processor 1810and/or the transceiver 1830. The battery 1812 supplies power to thepower management module 1811. The display 1813 outputs results processedby the processor 1810. The keypad 1814 receives inputs to be used by theprocessor 1810. The keypad 1814 may be shown on the display 1813. TheSIM card 1815 is an integrated circuit that is intended to securelystore the international mobile subscriber identity (IMSI) number and itsrelated key, which are used to identify and authenticate subscribers onmobile telephony devices (such as mobile phones and computers). It isalso possible to store contact information on many SIM cards.

The memory 1820 is operatively coupled with the processor 1810 andstores a variety of information to operate the processor 1810. Thememory 1820 may include read-only memory (ROM), random access memory(RAM), flash memory, memory card, storage medium and/or other storagedevice. When the embodiments are implemented in software, the techniquesdescribed herein can be implemented with modules (e.g., procedures,functions, and so on) that perform the functions described herein. Themodules can be stored in the memory 1820 and executed by the processor1810. The memory 1820 can be implemented within the processor 1810 orexternal to the processor 1810 in which case those can becommunicatively coupled to the processor 1810 via various means as isknown in the art.

The transceiver 1830 is operatively coupled with the processor 1810, andtransmits and/or receives a radio signal. The transceiver 1830 includesa transmitter and a receiver. The transceiver 1830 may include basebandcircuitry to process radio frequency signals. The transceiver 1830controls the one or more antennas 1831 to transmit and/or receive aradio signal.

The speaker 1840 outputs sound-related results processed by theprocessor 1810. The microphone 1841 receives sound-related inputs to beused by the processor 1810.

FIG. 19 shows another example of a wireless communication system towhich the technical features of the present disclosure can be applied.

Referring to FIG. 19, the wireless communication system may include afirst device 1910 (i.e., first device 210) and a second device 1920(i.e., second device 220).

The first device 1910 may include at least one transceiver, such as atransceiver 1911, and at least one processing chip, such as a processingchip 1912. The processing chip 1912 may include at least one processor,such a processor 1913, and at least one memory, such as a memory 1914.The memory may be operably connectable to the processor 1913. The memory1914 may store various types of information and/or instructions. Thememory 1914 may store a software code 1915 which implements instructionsthat, when executed by the processor 1913, perform operations of thefirst device 910 described throughout the disclosure. For example, thesoftware code 1915 may implement instructions that, when executed by theprocessor 1913, perform the functions, procedures, and/or methods of thefirst device 1910 described throughout the disclosure. For example, thesoftware code 1915 may control the processor 1913 to perform one or moreprotocols. For example, the software code 1915 may control the processor1913 to perform one or more layers of the radio interface protocol.

The second device 1920 may include at least one transceiver, such as atransceiver 1921, and at least one processing chip, such as a processingchip 1922. The processing chip 1922 may include at least one processor,such a processor 1923, and at least one memory, such as a memory 1924.The memory may be operably connectable to the processor 1923. The memory1924 may store various types of information and/or instructions. Thememory 1924 may store a software code 1925 which implements instructionsthat, when executed by the processor 1923, perform operations of thesecond device 1920 described throughout the disclosure. For example, thesoftware code 1925 may implement instructions that, when executed by theprocessor 1923, perform the functions, procedures, and/or methods of thesecond device 1920 described throughout the disclosure. For example, thesoftware code 1925 may control the processor 1923 to perform one or moreprotocols. For example, the software code 1925 may control the processor1923 to perform one or more layers of the radio interface protocol.

The present disclosure may be applied to various future technologies,such as AI, robots, autonomous-driving/self-driving vehicles, and/orextended reality (XR).

<AI>

AI refers to artificial intelligence and/or the field of studyingmethodology for making it. Machine learning is a field of studyingmethodologies that define and solve various problems dealt with in AI.Machine learning may be defined as an algorithm that enhances theperformance of a task through a steady experience with any task.

An artificial neural network (ANN) is a model used in machine learning.It can mean a whole model of problem-solving ability, consisting ofartificial neurons (nodes) that form a network of synapses. An ANN canbe defined by a connection pattern between neurons in different layers,a learning process for updating model parameters, and/or an activationfunction for generating an output value. An ANN may include an inputlayer, an output layer, and optionally one or more hidden layers. Eachlayer may contain one or more neurons, and an ANN may include a synapsethat links neurons to neurons. In an ANN, each neuron can output asummation of the activation function for input signals, weights, anddeflections input through the synapse. Model parameters are parametersdetermined through learning, including deflection of neurons and/orweights of synaptic connections. The hyper-parameter means a parameterto be set in the machine learning algorithm before learning, andincludes a learning rate, a repetition number, a mini batch size, aninitialization function, etc. The objective of the ANN learning can beseen as determining the model parameters that minimize the lossfunction. The loss function can be used as an index to determine optimalmodel parameters in learning process of ANN.

Machine learning can be divided into supervised learning, unsupervisedlearning, and reinforcement learning, depending on the learning method.Supervised learning is a method of learning ANN with labels given tolearning data. Labels are the answers (or result values) that ANN mustinfer when learning data is input to ANN. Unsupervised learning can meana method of learning ANN without labels given to learning data.Reinforcement learning can mean a learning method in which an agentdefined in an environment learns to select a behavior and/or sequence ofactions that maximizes cumulative compensation in each state.

Machine learning, which is implemented as a deep neural network (DNN)that includes multiple hidden layers among ANN, is also called deeplearning. Deep learning is part of machine learning. In the following,machine learning is used to mean deep learning.

FIG. 20 shows an example of an AI device to which the technical featuresof the present disclosure can be applied.

The AI device 2000 may be implemented as a stationary device or a mobiledevice, such as a TV, a projector, a mobile phone, a smartphone, adesktop computer, a notebook, a digital broadcasting terminal, a PDA, aPMP, a navigation device, a tablet PC, a wearable device, a set-top box(STB), a digital multimedia broadcasting (DMB) receiver, a radio, awashing machine, a refrigerator, a digital signage, a robot, a vehicle,etc.

Referring to FIG. 20, the AI device 2000 may include a communicationpart 2010, an input part 2020, a learning processor 2030, a sensing part2040, an output part 2050, a memory 2060, and a processor 2070.

The communication part 2010 can transmit and/or receive data to and/orfrom external devices such as the AI devices and the AI server usingwire and/or wireless communication technology. For example, thecommunication part 2010 can transmit and/or receive sensor information,a user input, a learning model, and a control signal with externaldevices. The communication technology used by the communication part2010 may include a global system for mobile communication (GSM), a codedivision multiple access (CDMA), an LTE/LTE-A, a 5G, a WLAN, a Wi-Fi,Bluetooth™, radio frequency identification (RFID), infrared dataassociation (IrDA), ZigBee, and/or near field communication (NFC).

The input part 2020 can acquire various kinds of data. The input part2020 may include a camera for inputting a video signal, a microphone forreceiving an audio signal, and a user input part for receivinginformation from a user. A camera and/or a microphone may be treated asa sensor, and a signal obtained from a camera and/or a microphone may bereferred to as sensing data and/or sensor information. The input part2020 can acquire input data to be used when acquiring an output usinglearning data and a learning model for model learning. The input part2020 may obtain raw input data, in which case the processor 2070 or thelearning processor 2030 may extract input features by preprocessing theinput data.

The learning processor 2030 may learn a model composed of an ANN usinglearning data. The learned ANN can be referred to as a learning model.The learning model can be used to infer result values for new input datarather than learning data, and the inferred values can be used as abasis for determining which actions to perform. The learning processor2030 may perform AI processing together with the learning processor ofthe AI server. The learning processor 2030 may include a memoryintegrated and/or implemented in the AI device 2000. Alternatively, thelearning processor 2030 may be implemented using the memory 2060, anexternal memory directly coupled to the AI device 2000, and/or a memorymaintained in an external device.

The sensing part 2040 may acquire at least one of internal informationof the AI device 2000, environment information of the AI device 2000,and/or the user information using various sensors. The sensors includedin the sensing part 2040 may include a proximity sensor, an illuminancesensor, an acceleration sensor, a magnetic sensor, a gyro sensor, aninertial sensor, an RGB sensor, an IR sensor, a fingerprint recognitionsensor, an ultrasonic sensor, an optical sensor, a microphone, a lightdetection and ranging (LIDAR), and/or a radar.

The output part 2050 may generate an output related to visual, auditory,tactile, etc. The output part 2050 may include a display unit foroutputting visual information, a speaker for outputting auditoryinformation, and/or a haptic module for outputting tactile information.

The memory 2060 may store data that supports various functions of the AIdevice 2000. For example, the memory 2060 may store input data acquiredby the input part 2020, learning data, a learning model, a learninghistory, etc.

The processor 2070 may determine at least one executable operation ofthe AI device 2000 based on information determined and/or generatedusing a data analysis algorithm and/or a machine learning algorithm. Theprocessor 2070 may then control the components of the AI device 2000 toperform the determined operation. The processor 2070 may request,retrieve, receive, and/or utilize data in the learning processor 2030and/or the memory 2060, and may control the components of the AI device2000 to execute the predicted operation and/or the operation determinedto be desirable among the at least one executable operation. Theprocessor 2070 may generate a control signal for controlling theexternal device, and may transmit the generated control signal to theexternal device, when the external device needs to be linked to performthe determined operation. The processor 2070 may obtain the intentioninformation for the user input and determine the user's requirementsbased on the obtained intention information. The processor 2070 may useat least one of a speech-to-text (STT) engine for converting speechinput into a text string and/or a natural language processing (NLP)engine for acquiring intention information of a natural language, toobtain the intention information corresponding to the user input. Atleast one of the STT engine and/or the NLP engine may be configured asan ANN, at least a part of which is learned according to a machinelearning algorithm. At least one of the STT engine and/or the NLP enginemay be learned by the learning processor 2030 and/or learned by thelearning processor of the AI server, and/or learned by their distributedprocessing. The processor 2070 may collect history information includingthe operation contents of the AI device 2000 and/or the user's feedbackon the operation, etc. The processor 2070 may store the collectedhistory information in the memory 2060 and/or the learning processor2030, and/or transmit to an external device such as the AI server. Thecollected history information can be used to update the learning model.The processor 2070 may control at least some of the components of AIdevice 2000 to drive an application program stored in memory 2060.Furthermore, the processor 2070 may operate two or more of thecomponents included in the AI device 2000 in combination with each otherfor driving the application program.

FIG. 21 shows an example of an AI system to which the technical featuresof the present disclosure can be applied.

Referring to FIG. 21, in the AI system, at least one of an AI server2120, a robot 2110 a, an autonomous vehicle 2110 b, an XR device 2110 c,a smartphone 2110 d and/or a home appliance 2110 e is connected to acloud network 2100. The robot 2110 a, the autonomous vehicle 2110 b, theXR device 2110 c, the smartphone 2110 d, and/or the home appliance 2110e to which the AI technology is applied may be referred to as AI devices2110 a to 2110 e.

The cloud network 2100 may refer to a network that forms part of a cloudcomputing infrastructure and/or resides in a cloud computinginfrastructure. The cloud network 2100 may be configured using a 3Gnetwork, a 4G or LTE network, and/or a 5G network. That is, each of thedevices 2110 a to 2110 e and 2120 consisting the AI system may beconnected to each other through the cloud network 2100. In particular,each of the devices 2110 a to 2110 e and 2120 may communicate with eachother through a base station, but may directly communicate with eachother without using a base station.

The AI server 2120 may include a server for performing AI processing anda server for performing operations on big data. The AI server 2120 isconnected to at least one or more of AI devices constituting the AIsystem, i.e. the robot 2110 a, the autonomous vehicle 2110 b, the XRdevice 2110 c, the smartphone 2110 d and/or the home appliance 2110 ethrough the cloud network 2100, and may assist at least some AIprocessing of the connected AI devices 2110 a to 2110 e. The AI server2120 can learn the ANN according to the machine learning algorithm onbehalf of the AI devices 2110 a to 2110 e, and can directly store thelearning models and/or transmit them to the AI devices 2110 a to 2110 e.The AI server 2120 may receive the input data from the AI devices 2110 ato 2110 e, infer the result value with respect to the received inputdata using the learning model, generate a response and/or a controlcommand based on the inferred result value, and transmit the generateddata to the AI devices 2110 a to 2110 e. Alternatively, the AI devices2110 a to 2110 e may directly infer a result value for the input datausing a learning model, and generate a response and/or a control commandbased on the inferred result value.

Various embodiments of the AI devices 2110 a to 2110 e to which thetechnical features of the present disclosure can be applied will bedescribed. The AI devices 2110 a to 2110 e shown in FIG. 21 can be seenas specific embodiments of the AI device 2000 shown in FIG. 20.

The present disclosure can have various advantageous effects.

For example, a wireless device may duplicate and transmit a signallingmessage on different RATs and transmit information indicating that theduplication is performed by an entity of a specific RAT (e.g., NR), sothat the wireless device can support a reliable transmission of thesignalling message (e.g., control plane message).

For example, a UE can support a reliable transmission of a control planemessage in sidelink by using multiple RATs, in particular when V2Xsidelink communication is configured in both LTE and NR for a unicastservice.

Various embodiments of the present disclosure are beneficial in that thesystem can provide reliable delivery of signalling to UEs in sidelinktransmissions.

Advantageous effects which can be obtained through specific embodimentsof the present disclosure are not limited to the advantageous effectslisted above. For example, there may be a variety of technical effectsthat a person having ordinary skill in the related art can understandand/or derive from the present disclosure. Accordingly, the specificeffects of the present disclosure are not limited to those explicitlydescribed herein, but may include various effects that may be understoodor derived from the technical features of the present disclosure.

In view of the exemplary systems described herein, methodologies thatmay be implemented in accordance with the disclosed subject matter havebeen described with reference to several flow diagrams. While forpurposed of simplicity, the methodologies are shown and described as aseries of steps or blocks, it is to be understood and appreciated thatthe claimed subject matter is not limited by the order of the steps orblocks, as some steps may occur in different orders or concurrently withother steps from what is depicted and described herein. Moreover, oneskilled in the art would understand that the steps illustrated in theflow diagram are not exclusive and other steps may be included or one ormore of the steps in the example flow diagram may be deleted withoutaffecting the scope of the present disclosure.

Claims in the present description can be combined in a various way. Forinstance, technical features in method claims of the present descriptioncan be combined to be implemented or performed in an apparatus, andtechnical features in apparatus claims can be combined to be implementedor performed in a method. Further, technical features in method claim(s)and apparatus claim(s) can be combined to be implemented or performed inan apparatus. Further, technical features in method claim(s) andapparatus claim(s) can be combined to be implemented or performed in amethod. Other implementations are within the scope of the followingclaims.

What is claimed is:
 1. A method performed by a first wireless device ina wireless communication system, the method comprising: generating, byan entity of a first radio access technology (RAT), a first signallingmessage duplicated from a second signalling message; and transmittingthe first signalling message on a carrier of the first RAT and thesecond signalling message on a carrier of a second RAT, wherein thesecond signalling message is transmitted with information informing thata duplication is performed by the entity of the first RAT, and whereinthe entity is an upper entity with respect to a media access control(MAC) entity.
 2. The method of claim 1, wherein the generating of thefirst signalling message comprises performing the duplication of thesecond signalling message to obtain the first signalling messageduplicated from the second signalling message, and wherein theduplication is performed based on that a single carrier is available forthe first RAT and at least one carrier on the second RAT is availablefor the duplication.
 3. The method of claim 1, wherein the transmittingof the first signalling message and the signalling message comprisestransmitting, to a second wireless device via sidelink, the firstsignalling message on a carrier of the first RAT and the secondsignalling message on a carrier of a second RAT, further comprising:receiving, from the second wireless device via sidelink, feedbackinformation for at least one of the first signalling message or thesecond signalling message; and performing a re-transmission of at leastone of the first signalling message or the second signalling message onthe carrier of the first RAT, to the second wireless device viasidelink.
 4. The method of claim 1, wherein the information comprisessidelink control information (SCI) informing that the duplication isperformed by the entity of the first RAT.
 5. The method of claim 1,wherein the second signalling message is included in a MAC protocol dataunit (PDU), and wherein the information is included in a header of theMAC PDU.
 6. The method of claim 5, wherein the information correspondsto a logical channel identity (LCID) field of the header of the MAC PDU,or a version field of the header of the MAC PDU.
 7. The method of claim1, wherein the first RAT comprises a new radio (NR), and the second RATcomprises a long-term evolution (LTE).
 8. The method of claim 1, whereinthe entity comprises a packet data convergence protocol (PDCP) entity.9. The method of claim 1, wherein the first signalling message istransmitted with information informing that the duplication is performedon the first RAT and the second RAT.
 10. The method of claim 1, furthercomprising: receiving, from a second wireless device to which the firstsignalling message and the second signalling message are transmitted, afirst response message for at least one of the first signalling messageand the second signalling message on the carrier of the first RAT, and asecond response message duplicated from the first response message onthe carrier of the second RAT.
 11. The method of claim 10, wherein thefirst signalling message and the second signalling message comprise aPC5 request message, and wherein the first response message and thesecond response message comprise a PC5 response message.
 12. The methodof claim 10, further comprising: after receiving the first responsemessage and the second response message, performing a sidelinktransmission to the second wireless device on the carrier of the firstRAT.
 13. The method of claim 1, wherein the first wireless device is incommunication with at least one of a user equipment, a network, and/orautonomous vehicles other than the wireless device.
 14. A wirelessdevice in a wireless communication system comprising: a transceiver; amemory; and at least one processor operatively coupled to thetransceiver and the memory, and configured to: generate, by an entity ofa first radio access technology (RAT), a first signalling messageduplicated from a second signalling message, and control the transceiverto transmit the first signalling message on a carrier of the first RATand the second signalling message on a carrier of a second RAT, whereinthe second signalling message is transmitted with information informingthat a duplication is performed by the entity of the first RAT, andwherein the entity is an upper entity with respect to a media accesscontrol (MAC) entity.
 15. A processor for a wireless device in awireless communication system, wherein the processor is configured tocontrol the wireless device to perform operations comprising:generating, by an entity of a first radio access technology (RAT), afirst signalling message duplicated from a second signalling message;and transmitting the first signalling message on a carrier of the firstRAT and the second signalling message on a carrier of a second RAT,wherein the second signalling message is transmitted with informationinforming that a duplication is performed by the entity of the firstRAT, and wherein the entity is an upper entity with respect to a mediaaccess control (MAC) entity.