CN106160967A - The transmission method of a kind of unauthorized resource and device - Google Patents

The transmission method of a kind of unauthorized resource and device Download PDF

Info

Publication number
CN106160967A
CN106160967A CN201510145660.3A CN201510145660A CN106160967A CN 106160967 A CN106160967 A CN 106160967A CN 201510145660 A CN201510145660 A CN 201510145660A CN 106160967 A CN106160967 A CN 106160967A
Authority
CN
China
Prior art keywords
resource
unauthorized carrier
transmission node
base station
carrier resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201510145660.3A
Other languages
Chinese (zh)
Inventor
杨玲
苟伟
戴博
夏树强
彭佛才
毕峰
李新彩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510145660.3A priority Critical patent/CN106160967A/en
Priority to PCT/CN2016/076167 priority patent/WO2016155480A1/en
Publication of CN106160967A publication Critical patent/CN106160967A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses transmission method and the device of a kind of unauthorized resource, the process that first transmission node performs includes: the first transmission node carries out CCA detection on the unauthorized carrier resource specified, when the described unauthorized carrier resource free time being detected, sending instruction information on public resource or appointment resource or send instruction information and carry out a data transfer, described instruction information is used for notifying that described unauthorized carrier resource takies.The process that second transmission node performs includes: the second transmission node detects on public resource or appointment resource, when instruction information being detected, judge that the unauthorized carrier resource whether described second transmission node can use described first transmission node to compete carries out data transmission according to described instruction message content.Embodiment of the present invention scheme is used to be greatly improved the utilization rate of unauthorized carrier resource.

Description

The transmission method of a kind of unauthorized resource and device
Technical field
The present invention relates to wireless communication technology, particularly relate to transmission method and the device of a kind of unauthorized resource.
Background technology
Unauthorized carrier wave has a following feature:
1, free/low expense (need not buy unlicensed spectrum, frequency spectrum resource is zero cost);
2, requirements for sale is low, and (individual, enterprise can participate in disposing low cost, and the equipment of equipment vendor can Arbitrarily to dispose);
3, available bandwidth is big (the unauthorized frequency range of 5GHz, 2.4GHz can use);
4, share resource (when multiple different systems are all runed wherein or same system different operators fortune When seeking wherein, it may be considered that the mode of some shared resources, improve spectrum efficiency);
5, wireless access technology many (across different communication standards, cooperation difficulty, network topology is various);
6, wireless access website many (number of users is big, and cooperation difficulty is big, and centralized management expense is big);
7, many (multi-service is mentioned and can run wherein, such as machine to machine (Machine in application Machine, referred to as M2M), vehicle to vehicle (Vehicle to Vehicle, referred to as V2V)).
In the evolution process of LTE, LTE Rel-13 version starts registration study in JIUYUE, 2014, One of them important content is exactly that LTE system uses unauthorized carrier operation.This technology will make LTE System can use the unauthorized carrier wave that presently, there are, and is greatly promoted the potential frequency spectrum resource of LTE system, LTE system is made to be obtained in that lower frequency spectrum cost.
But LTE utilizes unauthorized carrier wave to carry out data transmission aspect faces problems, wherein problem it One is exactly, after UE side participates in the competition of unauthorized carrier resource and competes successfully, how will successfully to take non-awarding The information fast notification of power carrier resource is gone out, and carries out transmitting uplink data the most efficiently.For This problem, the most not yet has concrete scheme.
Summary of the invention
The technical problem to be solved in the present invention is to provide transmission method and the device of a kind of unauthorized resource, ginseng Compete and compete successful transmission node with unauthorized carrier resource and quickly will can successfully take unauthorized load The information of ripple resource notifies that the resource competed to other transmission nodes multiplexing carries out data transmission.
For solving above-mentioned technical problem, the invention provides the transmission method of a kind of unauthorized resource, described Method includes:
First transmission node detects at the unauthorized carrier resource enterprising line space channel assessment CCA specified, When the described unauthorized carrier resource free time being detected, public resource or appointment resource send instruction Information or send instruction information and carry out a data transfer, described instruction information is used for notifying described non- Carrier resource is authorized to take.
Alternatively, described first transmission node includes first terminal.
Alternatively, described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes, Minimum zone is a complete OFDM symbol.
Alternatively, described public resource includes following resource in time domain: perform first after CCA success Individual complete OFDM symbol;Or, perform according with from first complete OFDM after CCA success Number start the OFDM symbol in the sub-frame boundary performing CCA;Or, after performing CCA success The OFDM symbol to next sub-frame boundary is started from first complete OFDM symbol;Described public affairs Altogether resource includes following resource on frequency domain: whole frequency domain resource;Or, whole frequency domain takies predetermined The resource of bandwidth;Or, the one or more Physical Resource Block PRB being made up of multiple subcarriers.
Alternatively, described appointment resource is positioned on unauthorized carrier resource, for performing the after CCA success One OFDM symbol starts to present sub-frame to terminate, or performs first after the subframe of CCA place Subframe.
Alternatively, described appointment resource is Physical Uplink Shared Channel PUSCH resource.
Alternatively, described instruction information is additionally operable to judge that described second transmission node is for the second transmission node The no unauthorized carrier resource that competition can be used to arrive, including following information: Sounding Reference Signal SRS; Or, major-minor synchronizing sequence PSS/SSS;Or, targeting sequencing Preamble;Described second transmission node Including with one or more in lower node: the first base station belonging to described first terminal, described first base station Adjacent base station, the described unauthorized carrier resource specified has been carried out CCA detection but do not compete non- Authorize the other-end of carrier resource;Described instruction information comprises following information: cell identity information.
Alternatively, described instruction information also comprises following information: operator identifier and/or the multiplexing of same frequency indicate Mark.
Alternatively, described instruction information is obtained by basic sequence, and described basic sequence uses following methods to obtain:
Basic sequenceWherein u represents sequence set sequence number, u ∈ 0,1 ..., N-1}, N are packet count, v It is the basic sequence number in group, time slot nsInterior sequence set sequence number u is obtained by following formula:
U=(fgh(ns)+fss) mod N, wherein fgh(ns) it is that group redirects pattern, fssFor sequential shift pattern;
Described fgh(ns) use following formula to obtain:
Wherein c is pseudo-random sequence, described pseudo-random sequence Initialization value uses following formula to obtain:WhereinFor cell ID;
Described fssEmploying following methods obtains:
For Physical Uplink Control Channel PUCCH,
For Physical Uplink Shared Channel PUSCH,Wherein △ssFor fortune Battalion's trade mark is known, △ss∈ 0,1 ..., m}, m are operator's number;
For Sounding Reference Signal SRS,
Alternatively, described first transmission node is also authorizing the equipment on carrier wave to send out in equipment D2D resource Send described instruction information.
For solving above-mentioned technical problem, present invention also offers the transmitting device of a kind of unauthorized resource, institute Stating device and be positioned at the first transmission node, described device includes first detection module and sending module, wherein:
Described first detection module, at the unauthorized carrier resource enterprising line space channel assessment specified CCA detects;
At described first detection module, described sending module, for detecting that described unauthorized carrier resource is empty Idle, sends instruction information on public resource or appointment resource or sends instruction information and carry out one Data transfer, described instruction information is used for notifying that described unauthorized carrier resource takies.
Alternatively, described first transmission node includes first terminal.
Alternatively, described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes, Minimum zone is a complete OFDM symbol;
Described appointment resource is positioned on unauthorized carrier resource, for first after execution CCA success OFDM symbol starts to present sub-frame to terminate, or performs first subframe after the subframe of CCA place.
Alternatively, described instruction information is additionally operable to judge that described second transmission node is for the second transmission node The no unauthorized carrier resource that competition can be used to arrive, including following information: Sounding Reference Signal SRS; Or, major-minor synchronizing sequence PSS/SSS;Or, targeting sequencing Preamble;
Described second transmission node includes with one or more in lower node: belonging to described first terminal One base station, the adjacent base station of described first base station, the described unauthorized carrier resource specified is carried out CCA detects but does not competes the other-end of unauthorized carrier resource;
Described instruction information comprises following information: cell identity information.
Alternatively, described instruction information also comprises following information: operator identifier and/or the multiplexing of same frequency indicate Mark.
Alternatively, described device also includes indicating information computational module, is used for using basic sequence to obtain described Instruction information, described instruction information computational module is calculated described basic sequence in the following ways
Alternatively, described sending module is additionally operable to authorizing the equipment on carrier wave to send out in equipment D2D resource Send described instruction information.
Another technical problem that the invention solves the problems that is to provide transmission method and the dress of a kind of unauthorized resource Put, improve the utilization rate of unauthorized carrier wave.
For solving above-mentioned technical problem, present invention also offers the transmission method of a kind of unauthorized resource, institute The method of stating includes:
Second transmission node detects, when instruction information being detected on public resource or appointment resource Time, judge whether described second transmission node can use described first transmission according to described instruction message content The unauthorized carrier resource that node is competed carries out data transmission.
Alternatively, described first transmission node includes first terminal;
Described second transmission node includes with one or more in lower node: belonging to described first terminal One base station, the adjacent base station of described first base station, described unauthorized carrier resource has carried out idle letter Road assessment CCA detects but does not competes the other-end of unauthorized carrier resource.
Alternatively, described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes, Minimum zone is a complete OFDM symbol;
Described appointment resource is the Physical Uplink Shared Channel PUSCH money being positioned on unauthorized carrier resource Source.
Alternatively, described second transmission node includes the first base station belonging to described first terminal;
Described judge whether described second transmission node can use described first according to described instruction message content The unauthorized carrier resource that transmission node is competed carries out data transmission, including:
Described first base station receives described instruction message, it is believed that described first transmission node competition is unauthorized Carrier resource success, it is possible to use described unauthorized carrier resource carries out data transmission;Or
Described first base station receives to comprise in described instruction message, and described instruction message and refers to frequency multiplexing Indicating is known, and the most described first base station broadcast notice uses described unauthorized carrier wave with the adjacent base station of operator Resource, after carrying out resource negotiation, described first base station and the end under the adjacent base station of described same operator End is carried out data transmission by multiplex mode on described unauthorized carrier resource.
Alternatively, described second transmission node includes the adjacent base station of the first base station belonging to described first terminal;
Described judge whether described second transmission node can use described first according to described instruction message content The unauthorized carrier resource that transmission node is competed carries out data transmission, including:
Described adjacent base station receives described instruction message, it is judged that the operator identifier in described instruction message Identical with self, and described instruction message comprises with frequency multiplexing sign, then with same operator under its He carries out resource negotiation in base station, after carrying out resource negotiation, with other base stations under described same operator in institute State and carried out data transmission by multiplex mode on unauthorized carrier resource.
Alternatively, described second transmission node is included on described unauthorized carrier resource and has carried out CCA inspection Survey but do not compete the other-end of unauthorized carrier resource;
Described second transmission node detects on public resource or appointment resource, including: described end Hold and on described public resource or appointment resource, carry out blind check and receive described instruction message, and to receiving Instruction information resolve;
Described judge whether described second transmission node can use described first according to described instruction message content The unauthorized carrier resource that transmission node is competed carries out data transmission, including:
If the cell ID in instruction information described in described terminal judges is identical with the cell ID of self, Then think the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described unauthorized Carried out data transmission by multiplex mode on carrier resource;Or,
Indicate cell ID in message with self cell ID described in described terminal judges if it is different, But operator identifier is identical with the operator identifier of self and comprises in described instruction message with frequency multiplexing instruction Mark, then it is assumed that the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described Carried out data transmission by multiplex mode on unauthorized carrier resource.
Alternatively, described method also includes: when described second transmission node can not correctly resolve instruction information, Then abandon carrying out blind check, only at the letter of described unauthorized carrier wave on described public resource or appointment resource Road carries out CCA detection in taking the phase in real time;Or abandon within the channel occupancy phase of described unauthorized carrier wave Carry out CCA detection.
Alternatively, described terminal is carried out data transmission by multiplex mode on described unauthorized carrier resource, Including:
The described terminal first complete OFDM symbol or first after public resource or appointment resource Individual subframe position carries out data transmission according to pre-scheduling information.
Alternatively, carried out data transmission the unauthorized carrier resource used by multiplex mode, including: The resource of instruction in pre-scheduling information, or, the terminal room carried out data transmission by multiplex mode is autonomous The resource consulted.
For solving above-mentioned technical problem, present invention also offers the transmitting device of a kind of unauthorized resource, institute Stating device and be positioned at the second transmission node, described device includes the second detection module and transport module, wherein:
Described second detection module, for detecting on public resource or appointment resource;
Described transport module, for when described second detection module detects instruction information, according to described Instruction message content judges whether described second transmission node can use described first transmission node to compete Unauthorized carrier resource carries out data transmission.
Alternatively, described first transmission node includes first terminal;
Described second transmission node includes with one or more in lower node: belonging to described first terminal One base station, the adjacent base station of described first base station, described unauthorized carrier resource has carried out idle letter Road assessment CCA detects but does not competes the other-end of unauthorized carrier resource.
Alternatively, described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes, Minimum zone is a complete OFDM symbol;
Described appointment resource is the Physical Uplink Shared Channel PUSCH money being positioned on unauthorized carrier resource Source.
Alternatively, described second transmission node includes the first base station belonging to described first terminal;
According to described instruction message content, described transport module judges whether described second transmission node can use The unauthorized carrier resource that described first transmission node is competed carries out data transmission, including:
Described transport module judges that described second detection module receives described instruction message, it is believed that described One transmission node competes the success of unauthorized carrier resource, it is possible to use described unauthorized carrier resource number According to transmission;Or
Described transport module judges that described second detection module receives described instruction message and is resolved to described Comprising in instruction message with frequency multiplexing sign, the most described transport module broadcast notice is with the phase of operator Adjacent base station uses described unauthorized carrier resource, after carrying out resource negotiation, with the phase of described same operator Terminal under adjacent base station is carried out data transmission by multiplex mode on described unauthorized carrier resource.
Alternatively, described second transmission node includes the adjacent base station of the first base station belonging to described first terminal;
According to described instruction message content, described transport module judges whether described second transmission node can use The unauthorized carrier resource that described first transmission node is competed carries out data transmission, including:
Described transport module judges the operator identifier in the instruction message that described second detection module receives Identical with self, and described instruction message comprises with frequency multiplexing sign, then with same operator under its He carries out resource negotiation in base station, after carrying out resource negotiation, with other base stations under described same operator in institute State and carried out data transmission by multiplex mode on unauthorized carrier resource.
Alternatively, described second transmission node is included on described unauthorized carrier resource and has carried out CCA inspection Survey but do not compete the other-end of unauthorized carrier resource;
Described second detection module detects at public resource or specify in resource, including: described the Two detection modules carry out blind check on described public resource or appointment resource and receive described instruction message, and The instruction information received is resolved;
According to described instruction message content, described transport module judges whether described second transmission node can use The unauthorized carrier resource that described first transmission node is competed carries out data transmission, including:
If described transport module judges cell ID in the described instruction information cell ID phase with self With, then it is assumed that the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described non- Authorize and carried out data transmission by multiplex mode on carrier resource;Or,
If described transport module judges the cell ID in described instruction message and the cell ID of self not With, but operator identifier is identical with the operator identifier of self and comprises with multiplexing the most frequently in described instruction message Sign, then it is assumed that the unauthorized carrier resource can competed with the first transmission node described in multiplexing, Carried out data transmission by multiplex mode on described unauthorized carrier resource.
Alternatively, described second detection module is additionally operable to, when can not correctly resolve instruction information, abandon Blind check is carried out, only in the channel occupancy phase of described unauthorized carrier wave on described public resource or appointment resource Carry out CCA detection the most in real time;Or abandon carrying out CCA within the channel occupancy phase of described unauthorized carrier wave Detection.
Alternatively, described transport module carries out data by multiplex mode on described unauthorized carrier resource Transmission, including: the described transport module first complete OFDM after public resource or appointment resource Symbol or first subframe position carries out data transmission according to pre-scheduling information.
Embodiments provide UE in a kind of unauthorized resource and send message and the method for data transmission, After UE assists base station to seize unauthorized carrier wave in unlicensed spectrum, quickly notice own base station and / or neighbor base station and participate in competition but do not compete the unauthorized carrier resource of successful UE whether can Situation.According to this notification message can Shi Tong community and/or carry out frequency division multiplexing with the UE under operator, Substantially increase the utilization rate of unauthorized carrier resource.Additionally, by the indicator sequence sent, Ke Nengbang Help base station to obtain channel conditions more accurately, improve the quality of communication.Meanwhile, base station is made to specify resource On detect, reduce further base station energy consumption and reduce blind check time, substantially increase base station Work efficiency.
Other features and advantages of the present invention will illustrate in the following description, and, partly from froming the perspective of Bright book becomes apparent, or understands by implementing the present invention.The purpose of the present invention is excellent with other Point can be realized by structure specifically noted in description, claims and accompanying drawing and be obtained.
Accompanying drawing explanation
Accompanying drawing is used for providing being further appreciated by technical solution of the present invention, and constitutes one of description Point, it is used for explaining technical scheme together with embodiments herein, is not intended that the present invention The restriction of technical scheme.
Fig. 1 is the embodiment of the present invention 1 flow chart;
Fig. 2 is the embodiment of the present invention 2 apparatus structure schematic diagram;
Fig. 3 is the embodiment of the present invention 3 flow chart;
Fig. 4 is the embodiment of the present invention 4 apparatus structure schematic diagram;
Fig. 5 is that application example 1UE assists base station to compete unauthorized carrier wave and the overall flow figure of data transmission;
Fig. 6 a-b is the time-frequency partition structure schematic diagram of application example 2 public resource;
Fig. 7 a-b is that application example 3 specifies resource structures schematic diagram;
Fig. 8 is that application example 4 is competed successful UE and sent the concrete mistake of SRS signal on public resource Journey schematic diagram;
Fig. 9 is that application example 5 uses D2D mechanism to realize UE to notify the schematic diagram of other nodes.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing Embodiments of the invention are described in detail.It should be noted that in the case of not conflicting, this Shen Embodiment in please and the feature in embodiment can mutual combination in any.
Can be at the computer of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing System performs.And, although show logical order in flow charts, but in some cases, Can be to be different from the step shown or described by order execution herein.
Embodiment one
The present embodiment describes the process that in the transmission method of a kind of unauthorized resource, the first transmission node performs, As it is shown in figure 1, include:
Step 1, the first transmission node is at the unauthorized carrier resource enterprising line space channel assessment CCA specified Detection;
Described first transmission node includes first terminal.
Step 2, when the described unauthorized carrier resource free time being detected, in public resource or appointment resource Upper transmission instruction information or send instruction information and carry out a data transfer, described instruction information is used for Notify that described unauthorized carrier resource takies.
Described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes, minimum zone It it is a complete OFDM symbol.
Specifically, described public resource includes following resource in time domain: perform first after CCA success Individual complete OFDM symbol;Or, perform according with from first complete OFDM after CCA success Number start the OFDM symbol in the sub-frame boundary performing CCA;Or, after performing CCA success The OFDM symbol to next sub-frame boundary is started from first complete OFDM symbol;Described public affairs Altogether resource includes following resource on frequency domain: whole frequency domain resource;Or, whole frequency domain takies predetermined The resource of bandwidth;Or, the one or more Physical Resource Block PRB being made up of multiple subcarriers.
Described appointment resource is positioned on unauthorized carrier resource, for first after execution CCA success OFDM symbol starts to present sub-frame to terminate, or performs first subframe after the subframe of CCA place.
Preferably, described appointment resource is Physical Uplink Shared Channel PUSCH resource.
Above-mentioned for representing that unauthorized resource the most occupied instruction information can be one and not carry content Null message.
In a preferred embodiment, described instruction information is additionally operable to judge described for the second transmission node Whether two transmission nodes can use the unauthorized carrier resource that competition is arrived, including following information: channel detection Reference signal SRS;Or, major-minor synchronizing sequence PSS/SSS;Or, targeting sequencing Preamble;
Described second transmission node includes with one or more in lower node: belonging to described first terminal One base station, the adjacent base station of described first base station, the described unauthorized carrier resource specified is carried out CCA detects but does not competes the other-end of unauthorized carrier resource.
In order to judge for the second transmission node, described instruction information comprises following information: community is marked Knowledge information.Preferably, described instruction information also comprises following information: operator identifier and/or with frequency multiplexing Sign.
Above-mentioned SRS, PSS/SSS or Preamble all can be by basic sequencesObtaining, wherein u represents sequence Row group sequence number, u ∈ 0,1 ..., N-1}, N are packet count, and v is the basic sequence number in group, time slot nsInterior sequence Row group sequence number u is obtained by following formula:
U=(fgh(ns)+fss) mod N, wherein fgh(ns) it is that group redirects pattern, fssFor sequential shift pattern;
Described fgh(ns) use following formula to obtain:Wherein c be pseudo-with Machine sequence, the initialization value of described pseudo-random sequence uses following formula to obtain:WhereinFor Cell ID;
Described fssEmploying following methods obtains:
For Physical Uplink Control Channel PUCCH,
For Physical Uplink Shared Channel PUSCH,Wherein △ssFor fortune Battalion's trade mark is known, △ss∈ 0,1 ..., m}, m are operator's number;
For Sounding Reference Signal SRS,
In a preferred embodiment, described first transmission node can also authorize the equipment pair on carrier wave Described instruction information is sent in equipment D2D resource.
Embodiment two
The device realizing said method is positioned at the first transmission node, as in figure 2 it is shown, include the first detection mould Block and sending module, wherein:
Described first detection module, at the unauthorized carrier resource enterprising line space channel assessment specified CCA detects;
At described first detection module, described sending module, for detecting that described unauthorized carrier resource is empty Idle, sends instruction information on public resource or appointment resource or sends instruction information and carry out one Data transfer, described instruction information is used for notifying that described unauthorized carrier resource takies.
It is noted that the method that the equipment provided due to the present embodiment can realize above-described embodiment one, Therefore other operate the corresponding contents that may refer to embodiment one in detail, do not repeat them here.
Embodiment three
The present embodiment describes the process that in the transmission method of a kind of unauthorized resource, the second transmission node performs, As it is shown on figure 3, described method includes:
Step 1, the second transmission node detects on public resource or appointment resource;
The position of described public resource and appointment resource sees described in embodiment one.
Step 2, when instruction information being detected, judges described second transmission according to described instruction message content The unauthorized carrier resource whether node can use described first transmission node to compete carries out data transmission.
In this example, the first transmission node includes first terminal;Second transmission node includes with in lower node One or more: the first base station belonging to described first terminal, the adjacent base station of described first base station, Carry out clear channel assessment (CCA) CCA detection on described unauthorized carrier resource but do not compete unauthorized carrier wave The other-end of resource.
When described second transmission node includes the first base station belonging to described first terminal, this first base station uses In the following manner judges whether the unauthorized carrier resource number that described first transmission node can be used to compete According to transmission:
Described first base station receives described instruction message, it is believed that described first transmission node competition is unauthorized Carrier resource success, it is possible to use described unauthorized carrier resource carries out data transmission;Or
Described first base station receives to comprise in described instruction message, and described instruction message and refers to frequency multiplexing Indicating is known, and the most described first base station broadcast notice uses described unauthorized carrier wave with the adjacent base station of operator Resource, after carrying out resource negotiation, described first base station and the end under the adjacent base station of described same operator End is carried out data transmission by multiplex mode on described unauthorized carrier resource.
When described second transmission node includes the adjacent base station of the first base station belonging to described first terminal, this phase Adjacent base station judges whether the unauthorized carrier wave that described first transmission node can be used to compete in the following ways Resource carries out data transmission:
Described adjacent base station receives described instruction message, it is judged that the operator identifier in described instruction message Identical with self, and described instruction message comprises with frequency multiplexing sign, then with same operator under its He carries out resource negotiation in base station, after carrying out resource negotiation, with other base stations under described same operator in institute State and carried out data transmission by multiplex mode on unauthorized carrier resource.
When described second transmission node be included on described unauthorized carrier resource carried out CCA detection but not Competition is to the other-end of unauthorized carrier resource;Described terminal is at described public resource or specifies in resource Carry out blind check and receive described instruction message, and the instruction information received is resolved;And use with Under type judges whether that the unauthorized carrier resource that described first transmission node can be used to compete carries out data Transmission:
If the cell ID in instruction information described in described terminal judges is identical with the cell ID of self, Then think the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described unauthorized Carried out data transmission by multiplex mode on carrier resource;Or,
Indicate cell ID in message with self cell ID described in described terminal judges if it is different, But operator identifier is identical with the operator identifier of self and comprises in described instruction message with frequency multiplexing instruction Mark, then it is assumed that the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described Carried out data transmission by multiplex mode on unauthorized carrier resource.
If described terminal can not correctly resolve instruction information, then abandon in described public resource or appointment Carry out blind check in resource, only within the channel occupancy phase of described unauthorized carrier wave, carry out CCA detection in real time; Or abandon carrying out CCA detection within the channel occupancy phase of described unauthorized carrier wave.
Above-mentioned terminal carries out data transmission referring to by multiplex mode on unauthorized carrier resource: described end Hold first complete OFDM symbol after public resource or appointment resource or first subframe position Carry out data transmission according to pre-scheduling information.By multiplex mode carry out data transmission being used unauthorized Carrier resource, including: the resource of instruction in pre-scheduling information, or, carry out data by multiplex mode The good resource of terminal room autonomous negotiating of transmission.
Embodiment four
The transmitting device of a kind of unauthorized resource realizing above-described embodiment three method is positioned at the second transmission joint Point, as shown in Figure 4, including the second detection module and transport module, wherein:
Described second detection module, for detecting on public resource or appointment resource;
Described transport module, for when described second detection module detects instruction information, according to described Instruction message content judges whether described second transmission node can use described first transmission node to compete Unauthorized carrier resource carries out data transmission.
It is noted that the method that the equipment provided due to the present embodiment can realize above-described embodiment three, Therefore other operate the corresponding contents that may refer to embodiment three in detail, do not repeat them here.
Below by several application examples, said method is illustrated.
Application example 1
UE assists base station to compete the overall flow of unauthorized carrier wave and data transmission as shown in Figure 5.Concrete bag Including UE assists own base station to carry out seizing of unauthorized carrier resource, and then after successful contention to resource, Notice peripheral base station and other UE, and carry out the process of uplink.Comprise the following steps:
Step 1, base station sends uplink scheduling authorization (UL grant), notice below UE competition to UE Information: need to assist the unauthorized carrier number of competition, subframe numbers, execution clear channel assessment (CCA) (Clear Channel Assessment, is called for short CCA) initial time position, any block of competing on unauthorized carrier wave Resource, pre-scheduling information;
Alternatively, this competition information is gone back portability operator identifier and/or with frequency multiplexing instruction etc., in order to UE carries out uplink FDM transmission.
Step 2, receives the UE of the competition information that base station sends, and performs CCA in the position specified, when Described UE carries out CCA when channel idle being detected, at once at the public resource appointed with base station in advance Or send an instruction information in appointment resource or send instruction information and data.
Step 3, competes the base station belonging to successful UE and adjacent base station and other are not competed successfully UE detects and receives on public resource or appointment resource;
Detection purpose be: for not competing successful UE, in order to know whether can with seize The unauthorized carrier wave competed to the UE multiplexing together of unauthorized carrier wave.For described base station or adjacent For base station, in order to judge whether it is that subordinate UE robs and accounts for unauthorized carrier resource or whether can use non- Authorize carrier resource.Specifically, for UE own base station, in order to know that subordinate UE is the most successful Rob the unauthorized carrier resource accounting for specifying;For neighbouring with operator base station, in order to know whether with frequency Multiplexing enables, thus is used together, by frequency division multiplexing, the unauthorized carrier resource competed and carries out data biography Defeated;For other UE, account for resource to detect whether that Shi Tong community UE robs, or multiple with frequency Rob with UE in the same carrier cell under enable and account for resource, thus judge whether this node can use and seize The most whether the unauthorized carrier resource arrived, can carry out multiuser multiplexing uplink.
For competing successfully UE own base station, public resource or appointment resource receive described instruction letter Breath, resolves information content further, if detection is the instruction information that subordinate UE sends, then it is assumed that UE The unauthorized carrier resource of detection is seized successfully and can use.If parsing is that subordinate UE sends and with frequency Multiplexing identification enables, then own base station needs to broadcast unauthorized carrier wave available information to adjacent by X2 mouth With operator base station, and carry out resource negotiation, under this base station and adjacent same operator, base station has data to send out The UE sent, the subframe after public resource or appointment resource carries out upstream data according to the resource consulted Transmission, own base station and then need to take in duration in real time at unauthorized carrier wave with base station under operator Detect and receive upstream data.If it is indicated that information is SRS signal, then base station know channel can In the case of, in addition it is also necessary to carry out the measurement of up channel according to SRS signal, the result of measurement may be used for this Data transfer or prepare for next data transfer.If compete successful UE at public resource or Specify and have sent instruction information and a upstream data in resource, then own base station is receiving in instruction information After, in the case of knowing that channel can be used, it is also performed to the reception of upstream data.
For UE side, if not competing successful UE to detect that instruction information Shi Tong community UE sends Then thinking that channel can be used, according to pre-scheduling information, on unauthorized carrier wave, these UE use frequency division multiplexing Mode carries out data transmission.If not competing successful UE to detect that instruction information is UE under same operator Send and enable with frequency instruction, then these UE can pass in the resource location consulted before enterprising row data Defeated.And the original position carried out data transmission is: first after public resource or appointment resource complete OFDM symbol or first subframe position starts.
Application example 2
As seen in figures 6a-b, public resource is with FBE (Frame Based to the time-frequency partition structure of public resource Equipment, equipment based on frame structure) LBT (Listen Before Talk, listem-before-talk) be Illustrate its possible concrete time-domain position of anticipating.According to the above-mentioned definition to public resource, its maximum magnitude is Perform first complete symbols after CCA success to terminate to next sub-frame boundary, i.e. public resource is maximum Scope may not exceed two subframes, minimum zone be perform CCA success after a complete OFDM Symbol.
Public resource schematical sections from Fig. 6 it can be seen that in time domain public resource be by one or Multiple OFDM symbol composition, i.e. least unit in public resource time domain is a complete OFDM Symbol.And the position according to different CCA position public resources changes the most therewith, performs further The position of CCA is determined by base station.
In Fig. 6Represent LBT subframe,Represent public resource,Represent descending sub frame,Table Show special subframe,Represent sub-frame of uplink.
As shown in Figure 6 a, for UE when the original position of a subframe starts to perform CCA competition, If UE performs CCA and competes moment of unauthorized carrier resource OFDM symbol complete less than Border, then UE needs to send a Seize ACK message in the residue time-domain resource of this OFDM symbol, as Instruction information, it is to avoid other UE of native system or different system (such as Wi-Fi system) node (STA) Seize this unauthorized carrier wave.If UE performs CCA and competes the moment of unauthorized carrier resource precisely The border of one complete OFDM symbol, for above-mentioned two situations, the original position of public resource is all From the beginning of UE performs first complete OFDM symbol original position after CCA competes resource, root Send the size and determining of content (instruction information or instruction information and data) according to UE and take one or the most Individual OFDM symbol.
As shown in Figure 6 b, public resource can also divide according to frequency domain.Its public resource is successful execution CCA takies the resource of bandwidth or by multiple subcarriers on frequency domain after competing unauthorized carrier resource The one or more Physical Resource Block PRB constituted, time domain at most can take execution CCA continuously The next subframe of frame terminates.
Public resource be mainly used for send notification signal so that base station and do not compete successful UE public Detect and receive this notification signal in resource altogether, in order to obtain the situation that takies of unauthorized carrier wave, reduce base The loss that real-time blind check of standing brings.
Application example 3
Fig. 7 for specify resource schematic diagram, as shown in Figure 7, it is intended that for transmission notice base station and other The resource of UE be according to UE perform CCA position depending on, it is intended that resource always in successful execution After CCA, first OFDM symbol starts to this sub-frame boundary.
The position of CCA is performed in the beginning situation of a subframe for UE, it is intended that resource (as PUSCH) as shown in Figure 7a.If the position of execution CCA is at the end of a subframe, then specify money Source is the PUSCH resource in next subframe, as shown in Figure 7b.It is to say, successful contention is to non- The UE authorizing carrier resource can send an instruction information or instruction information sum in the resource specified According to, it being used for notifying base station and other UE, which unauthorized carrier wave has been preempted.Optionally, notice institute Belong to base station and carry out upstream data reception.Equally, base station and other UE also can be in the resource specified detections up This instruction information.Specify resource effect the same with the effect of public resource, be all to refer to as a transmission Show the transport vehicle of information.
Application example 4
This example is mainly discussed in detail the generation process performing the instruction information that the successful UE of CCA sends. Mainly introduce two kinds of instruction information generating modes: one is by normal in amendment LTE PHY Basic sequence generate required instruction information.The second is to define the indicator sequence that UE sends.
The first process obtaining required instruction information by amendment basic sequence is as follows:
After competing unauthorized carrier wave for UE side, the instruction information of transmission may include that SRS (detection Reference signal), PSS/SSS (main synchronizing sequence/secondary synchronization sequences) and Preamble (leading) etc., These signals are all by basic sequenceObtain through certain process.Therefore main detailed description is satisfied sends out The sequence sent is carried Cell ID, operator identifier and the basic sequence with information such as frequency multiplexing instructionsRaw One-tenth process.
Basic sequenceSend the original series of instruction information for UE side, wherein have N number of packet, u table Show group number u ∈ 0,1 ..., N-1}, v are the basic sequences number in group.Sequence group number u is determined by following formula:
Time slot nsInterior sequence set sequence number u is redirected pattern f by groupgh(ns) and sequential shift pattern fssObtain, i.e. U=(fgh(ns)+fss) mod N, give f heregh(ns) and fssNew generating mode, if needing in sequence to take Band Cell ID identifies the most original group and redirects switch open, represents that cell ID instruction is opened in this example, As described in following formula:
Wherein, the initialization value of pseudo-random sequence c generates with Cell ID value, is:WhereinFor cell ID.
And further, sequence needs additionally carry operator identifier and then can obtain according to the following equation :
For PUCCH, fssCan obtain with Cell ID and N mould, be: WhereinFor cell ID.
For PUSCH, sequence can be carried Cell ID and operator identifier, so fssCan by under Formula obtains:Wherein △ssFor operator identifier, △ss∈ 0,1 ..., m}, m For operator's number, operator identifier can be known by base station.
For SRS,WhereinFor cell ID.
Described parameter can be differently configured with flexible configuration, and the information carried in indicator sequence is the most different.Enter One step, if the indicator sequence sent needing carry with frequency Warning Mark (0 or 1), can be used this The sequence generated is scrambled and a new sequence by individual mark.
Specific in the present embodiment, above-mentioned middle N preferably takes 30, so can continue to use value in standard, but It is not limited to this value.According to domestic three common big operators, value is 3 to m.Method one is not change Being replaced on the basis of former formula framework, therefore standardization effort amount is minimum.
Method two: define an indicator sequence.Detailed process is as follows:
Assuming that number is m in UE ID set, i.e. { a0,…,am-1, in Cell ID set, number is n Individual, i.e. { b0,…,bn-1, in operator collective, number is p, i.e. { c0,c1,…cp}.Optionally, it is assumed that with Frequently multiplexing identification 0 or 1.According to the different permutation and combination of the element in these three or four set, available M*n*p or m*n*p*2 sequence.The most each sequence represents a kind of permutation and combination method.Such as: sequence Row 0 identify UE ID=a0, Cell ID=b0, operator ID=c0, with frequency multiplexing identification 0, the like. Depending on the length of custom list is according to amount of bandwidth.
The value of m, n, p does not limits, and preferred p can value be 2.
Above two method, according to concrete instruction information needs the content carried different and can be suitable Modify.The above-mentioned information carried is only for example, and can be not limited to above-mentioned in other embodiments The information carried.
Application example 5
This example mainly describes in detail after UE competes unauthorized carrier resource, sends the finger described in a upper example Show that information notice base station and other UE oneself have seized successful carrier wave and the concrete mistake carried out data transmission Journey, concrete step is as described below:
Step one, performs CCA for UE side, base station triggers or the UE specified on unauthorized carrier wave Detection operation;
Here, the UE that base station triggers participates in competing on unauthorized carrier wave is included in the predefined cycle ginseng The UE, the UE receiving UL grant that compete with unauthorized carrier wave or by Paging (paging) message The UE etc. triggered.These UE can detect on the CCA position of base station notice, and for difference Frame structure, perform the position of CCA and number be different from.For FBE, perform the position of CCA Can be at the beginning of a subframe or subframe end position.For LBE (Load Based Equipment, Equipment based on load), position in subframe, the position of execution CCA is uncertain, and CCA Number the most indefinite.These can be configured by base station side.
Here, for FBE, the position that above-mentioned UE performs CCA is identical, so there will be these UE competes the unauthorized carrier resource situation that base station is specified simultaneously.And for LBE, due to each UE The random back value generated is different, the most only there will be a final successful contention of UE unauthorized to specify Carrier wave.
Step 2, competes successful UE in step one, send and seize on public resource or appointment resource The instruction information notice base station of the unauthorized carrier wave of success and other UE, or transmission instruction information and UE are certainly The upstream data of body.
Public resource described here or appointment resource are the resource introduced in example 2 and example 3, herein No longer carry out repeated description.UE send instruction information can be SRS, Preamble, PSS/SSS or Sign etc..Preferably sending SRS signal, corresponding sequence generating mode refers to example 4.
Illustrate and compete successful UE transmission instruction letter on the public resource of definition or appointment resource Breath or instruction information and data.For FBE structure, described in step one, it is possible that many Individual UE competes the situation of unauthorized carrier wave simultaneously, and for this situation, these UE are in the public money of definition By the way of time-division, frequency division or code division, instruction information or instruction letter is carried out on source or appointment resource Breath and the transmission of data.For LBE, perform CCA every time and only have a UE successful contention to resource, This UE can public resource or specify send in resource an instruction information or instruction information and self Data.
Step 3, this base station and neighbouring base station and do not compete successful UE all at public resource or refer to Determining to detect and receive instruction message in resource, this base station is also performed to the reception of upstream data.
This base station receives this instruction message on public resource or the resource specified and (could be for notice Or the instruction information measured) or indicate message and data, during resolving, base station solves The data failure that code UE sends, then base station can only understand subordinate UE success by the message received The unauthorized carrier wave that competition is arrived.Now, there are two kinds for the treatment of methods base station: the first is by subordinate UE's Schedule information sends.For the unauthorized carrier resource allowing the UE having data to send in this community arrive in competition Enterprising line frequency divides multiplexing transmission data.UE side needs after receiving the schedule information that base station sends, ability Corresponding resource carries out uplink.The second is the n-th subframe before UE performs CCA Issued uplink scheduling information, UE compete resource time be engraved in n+k (k≤4) subframe before, Base station starts to receive the data sent from UE side in the n-th+k subframe.As long as at public resource or refer to Determine to receive in resource unauthorized carrier resource can UE in n+k subframe, all begin through time-division, frequently Divide or the mode of code division carries out transmitting uplink data.
If it is indicated that the same frequency multiplexing function carried in information is opened, i.e. carry with frequency multiplexing instruction, then Base station need by X2 mouth broadcast notice neighbouring with other communities under operator can unauthorized carrier wave Resource, and hold consultation realize UE under different districts data transmission.If do not made with frequency multiplexing function Can, only in this community, UE can carry out the transmission of data by multiplex mode, and then base station is then taking The upstream data that subordinate UE sends is received in channel duration.
Additionally, neighbouring different operators base station receives this instruction message, i.e. think that this unauthorized carrier wave is Through occupied, stop detecting.
For not competing successful UE, public resource or appointment resource detect instruction information, resolves Its Cell ID judge whether be same community or carry in resolving whether instruction information operator identifier and With frequency multiplexing instruction.If not competing successful UE to parse instruction information and carry the Cell identical with self ID, then this UE thinks that specific unauthorized carrier wave can be used, at public resource or specify after resource first In subframe or performing after CCA detects that the UE of channel idle has sent its data, those can be just Really parse channel can UE can carry out transmitting uplink data by the way of frequency division multiplexing.If not Competing successful UE, to parse the Cell ID carried in instruction information different from self, but operator identifier The same and enable with frequency multiplexing, then these UE it is believed that on specific unauthorized carrier wave resource can use, and According to being about scheduled on public resource or specifying after resource in first subframe or letter detected performing CCA After the idle UE in road has sent its data, those can correctly parse channel can UE can pass through The mode of frequency division multiplexing carries out transmitting uplink data.If not competing successful UE can not parse instruction letter Cell ID, operator identifier and same frequency multiplexing instruction in breath, then these UE think that channel is unavailable.
For resolving the incorrect UE of instruction information, can process by the following method:
First method: abandon detecting on public resource or appointment resource, but at channel occupancy Channel Detection is carried out in real time in phase.Mainly in carrying out data transmission on the unauthorized carrier wave competed UE, the situation that data transmission in advance is complete, channel resource utilization ratio can be improved further.
The channel occupancy phase starts to calculate from performing CCA successful UE transmission Seize ACK message.This UE is at letter Road takies can carry out a data transfer, in the channel occupancy phase in the public resource in the phase or appointment resource Unauthorized carrier resource after Nei can also carry out data transmission.
Second method: directly abandon the detection of channel busy within the unauthorized carrier occupancy phase.Do so can The biggest channel resource can be caused to waste.
Application example 6
Fig. 8 is that this example is competed successful UE and sent the detailed process of SRS signal on public resource and show It is intended to;
Specific in this example, perform the Seize ACK message (such as instruction information) that the successful UE of CCA sends On the one hand being used for notifying that base station is the most successfully robbed accounts for specific unauthorized carrier wave, and another aspect is used for base station Carry out the measurement of up channel.
As shown in Figure 8, the moment started a subframe has the UE of unauthorized carrier wave competition qualification and holds Row CCA detects, if the UE participating in competition performs CCA success, but the CCA successful moment is not enough One complete OFDM symbol border, the most preferably sends a Seize ACK message.If competition arrive time Carve the border being precisely a complete OFDM symbol, then on preferred public resource after CCA SRS signal is sent by the way of frequency division or code division.It is emphasized that the SRS letter sent here Number it is not only and to play notice base station road occupying situation, be additionally operable to the up channel matter telling base station to carry out these UE Measurement, i.e. signals base measure bandwidth is much, the cycle, which subframe etc., such base station will Receive from competing the SRS signal taken for notice that successfully UE sends, measure each further UE, to channel conditions between base station, distributes suitable resource and MCS preferably to each UE.
If the position that each UE performs CCA is different, only one of which UE1 performs CCA success, And have sent the SRS information of correspondence.Do not compete successful UE2 and UE3 at public resource or to specify Receive and detect the Seize ACK message that UE1 sends in resource.If UE2 receives and detects that UE1 sends Signal in the Cell ID that carries identical with self, then UE2 sends self SRS letter on public resource Number, i.e. channel conditions between it and base station of notice base station measurement.And the Cell ID that UE3 detects and self Difference, but detect and Seize ACK message carries with frequency multiplexing instruction and enable, i.e. UE1 and UE3 is same The UE of the different districts under operator, then UE3 also sends the SRS letter of self equally on public resource Number.Whereas if UE2 and UE3 can not correctly resolve Seize ACK message, then UE2 and UE3 or put Abandon reception, it is believed that this carrier wave is unavailable, stop detection.Within the unauthorized carrier occupancy phase, one is straight The idle condition of row detection channel.
The most always on public resource the base station of detection it is known that the channel conditions of other UE, it is simple to According to the channel measurement information reported, issue suitable MCS grade, improve transmission quality.
In order to avoid the website of different system entered within the time that base station and other UE detection receive instruction information Row resource is seized, and the UE competed can repeat to send Seize ACK message always.
Application example 7
Fig. 9 is that this example uses D2D mechanism to realize UE and notify the schematic diagram of other nodes.
Use D2D mechanism, it is assumed that base station side specifies correspondence can in advance all UE on unauthorized carrier wave Resource, have preferable X2 interface between this base station and neighbor base station and synchronize preferably, not compete successfully UE detects on channel (PSSCH) detecting carrier wave busy just to get started at D2D to share.
As it is shown in figure 9, in all UE participating in competition, UE1 is successful in t on unauthorized carrier wave Competition is to unauthorized carrier wave, and now, UE1 will authorize transmission in the corresponding resource of PSSCH on carrier wave The instruction information of agreement in advance, so, other UE (such as UE2, UE3) just can receive on PSSCH To this sequence, thus stop this carrier wave is carried out CCA detection.Meanwhile, this base station and adjacent base station are also The instruction information of agreement can be detected in PSSCH resource.Since so, UE1 just accounts for the most successfully robbing The message informing of this unauthorized carrier resource gives other base stations and UE.Meanwhile, successful UE1 is competed Also need on unauthorized carrier wave, send one for representing channel occupied instruction information, it is to avoid other Node is seized.
It should be noted that the PSSCH resource in D2D is permissible in each subframe and each time slot Flexible configuration.
Do so, it is also possible to solve multiple UE and rob the situation accounting for same unauthorized carrier wave simultaneously.Because Can there is oneself independent resource at each UE of PSSCH, thus without producing conflict, considerably increase Base station be correctly decoded efficiency.So that base station obtains available unauthorized carrier information.
The above, only presently preferred embodiments of the present invention, it is not intended to limit the protection of the present invention Scope, all any amendment, equivalent and improvement etc. made within the spirit and principles in the present invention, Should be included within the scope of the present invention.
Although the embodiment that disclosed herein is as above, but described content only readily appreciates the present invention And the embodiment used, it is not limited to the present invention.Technology people in any art of the present invention Member, on the premise of without departing from the spirit and scope that disclosed herein, can be in the form implemented and thin Any amendment and change is carried out on joint, but the scope of patent protection of the present invention, still must be with appended right Claim is defined in the range of standard.

Claims (34)

1. the transmission method of a unauthorized resource, it is characterised in that described method includes:
First transmission node detects at the unauthorized carrier resource enterprising line space channel assessment CCA specified, When the described unauthorized carrier resource free time being detected, public resource or appointment resource send instruction Information or send instruction information and carry out a data transfer, described instruction information is used for notifying described non- Carrier resource is authorized to take.
Method the most according to claim 1, it is characterised in that
Described first transmission node includes first terminal.
Method the most according to claim 1, it is characterised in that
Described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes, minimum zone It it is a complete OFDM symbol.
Method the most according to claim 3, it is characterised in that
Described public resource includes following resource in time domain:
Perform first complete OFDM symbol after CCA success;Or,
Perform starting to the subframe performing CCA from first complete OFDM symbol after CCA success OFDM symbol in border;Or,
Perform starting to next sub-frame boundary from first complete OFDM symbol after CCA success In OFDM symbol;
Described public resource includes following resource on frequency domain:
Whole frequency domain resource;Or,
The resource of bandwidth is taken on whole frequency domain;Or,
The one or more Physical Resource Block PRB being made up of multiple subcarriers.
Method the most according to claim 1, it is characterised in that
Described appointment resource is positioned on unauthorized carrier resource, for first after execution CCA success OFDM symbol starts to present sub-frame to terminate, or performs first subframe after the subframe of CCA place.
Method the most according to claim 5, it is characterised in that
Described appointment resource is Physical Uplink Shared Channel PUSCH resource.
Method the most according to claim 2, it is characterised in that
Described instruction information is additionally operable to judge that described second transmission node whether can for the second transmission node The unauthorized carrier resource that competition is arrived, including following information: Sounding Reference Signal SRS;Or, Major-minor synchronizing sequence PSS/SSS;Or, targeting sequencing Preamble;
Described second transmission node includes with one or more in lower node: belonging to described first terminal One base station, the adjacent base station of described first base station, the described unauthorized carrier resource specified is carried out CCA detects but does not competes the other-end of unauthorized carrier resource;
Described instruction information comprises following information: cell identity information.
Method the most according to claim 7, it is characterised in that
Described instruction information also comprises following information: operator identifier and/or with frequency multiplexing sign.
Method the most according to claim 8, it is characterised in that
Described instruction information is obtained by basic sequence, and described basic sequence uses following methods to obtain:
Basic sequenceWherein u represents sequence set sequence number, u ∈ 0,1 ..., N-1}, N are packet count, v It is the basic sequence number in group, time slot nsInterior sequence set sequence number u is obtained by following formula:
U=(fgh(ns)+fss) mod N, wherein fgh(ns) it is that group redirects pattern, fssFor sequential shift pattern;
Described fgh(ns) use following formula to obtain:
Wherein c is pseudo-random sequence, described pseudo-random sequence Initialization value uses following formula to obtain:WhereinFor cell ID;
Described fssEmploying following methods obtains:
For Physical Uplink Control Channel PUCCH,
For Physical Uplink Shared Channel PUSCH,Wherein △ssFor fortune Battalion's trade mark is known, △ss∈ 0,1 ..., m}, m are operator's number;
For Sounding Reference Signal SRS,
Method the most according to claim 1, it is characterised in that described method also includes:
Described first transmission node is also authorizing the equipment on carrier wave to send described finger in equipment D2D resource Show information.
The transmission method of 11. 1 kinds of unauthorized resources, it is characterised in that described method includes:
Second transmission node detects, when instruction information being detected on public resource or appointment resource Time, judge whether described second transmission node can use described first transmission according to described instruction message content The unauthorized carrier resource that node is competed carries out data transmission.
12. methods according to claim 11, it is characterised in that
Described first transmission node includes first terminal;
Described second transmission node includes with one or more in lower node: belonging to described first terminal One base station, the adjacent base station of described first base station, described unauthorized carrier resource has carried out idle letter Road assessment CCA detects but does not competes the other-end of unauthorized carrier resource.
13. methods according to claim 11, it is characterised in that
Described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes, minimum zone It it is a complete OFDM symbol;
Described appointment resource is the Physical Uplink Shared Channel PUSCH money being positioned on unauthorized carrier resource Source.
14. according to the method described in claim 11 or 12 or 13, it is characterised in that
Described second transmission node includes the first base station belonging to described first terminal;
Described judge whether described second transmission node can use described first according to described instruction message content The unauthorized carrier resource that transmission node is competed carries out data transmission, including:
Described first base station receives described instruction message, it is believed that described first transmission node competition is unauthorized Carrier resource success, it is possible to use described unauthorized carrier resource carries out data transmission;Or
Described first base station receives to comprise in described instruction message, and described instruction message and refers to frequency multiplexing Indicating is known, and the most described first base station broadcast notice uses described unauthorized carrier wave with the adjacent base station of operator Resource, after carrying out resource negotiation, described first base station and the end under the adjacent base station of described same operator End is carried out data transmission by multiplex mode on described unauthorized carrier resource.
15. according to the method described in claim 11 or 12 or 13, it is characterised in that
Described second transmission node includes the adjacent base station of the first base station belonging to described first terminal;
Described judge whether described second transmission node can use described first according to described instruction message content The unauthorized carrier resource that transmission node is competed carries out data transmission, including:
Described adjacent base station receives described instruction message, it is judged that the operator identifier in described instruction message Identical with self, and described instruction message comprises with frequency multiplexing sign, then with same operator under its He carries out resource negotiation in base station, after carrying out resource negotiation, with other base stations under described same operator in institute State and carried out data transmission by multiplex mode on unauthorized carrier resource.
16. according to the method described in claim 11 or 12 or 13, it is characterised in that
Described second transmission node is included on described unauthorized carrier resource and has carried out CCA detection but the most competing Strive the other-end of unauthorized carrier resource;
Described second transmission node detects on public resource or appointment resource, including: described end Hold and on described public resource or appointment resource, carry out blind check and receive described instruction message, and to receiving Instruction information resolve;
Described judge whether described second transmission node can use described first according to described instruction message content The unauthorized carrier resource that transmission node is competed carries out data transmission, including:
If the cell ID in instruction information described in described terminal judges is identical with the cell ID of self, Then think the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described unauthorized Carried out data transmission by multiplex mode on carrier resource;Or,
Indicate cell ID in message with self cell ID described in described terminal judges if it is different, But operator identifier is identical with the operator identifier of self and comprises in described instruction message with frequency multiplexing instruction Mark, then it is assumed that the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described Carried out data transmission by multiplex mode on unauthorized carrier resource.
17. methods according to claim 16, it is characterised in that
Described method also includes: when described second transmission node can not correctly resolve instruction information, then abandon Described public resource or appointment resource carry out blind check, only at the channel occupancy of described unauthorized carrier wave CCA detection is carried out in real time in phase;Or abandon carrying out within the channel occupancy phase of described unauthorized carrier wave CCA detects.
18. methods according to claim 16, it is characterised in that
Described terminal is carried out data transmission by multiplex mode on described unauthorized carrier resource, including:
The described terminal first complete OFDM symbol or first after public resource or appointment resource Individual subframe position carries out data transmission according to pre-scheduling information.
19. methods according to claim 16, it is characterised in that
The unauthorized carrier resource used is carried out data transmission by multiplex mode, including: pre-scheduling is believed The resource of instruction in breath, or, the terminal room autonomous negotiating carried out data transmission by multiplex mode is good Resource.
The transmitting device of 20. 1 kinds of unauthorized resources, it is characterised in that described device is positioned at the first transmission Node, described device includes first detection module and sending module, wherein:
Described first detection module, at the unauthorized carrier resource enterprising line space channel assessment specified CCA detects;
At described first detection module, described sending module, for detecting that described unauthorized carrier resource is empty Idle, sends instruction information on public resource or appointment resource or sends instruction information and carry out one Data transfer, described instruction information is used for notifying that described unauthorized carrier resource takies.
21. devices according to claim 20, it is characterised in that
Described first transmission node includes first terminal.
22. devices according to claim 20, it is characterised in that
Described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes, minimum zone It it is a complete OFDM symbol;
Described appointment resource is positioned on unauthorized carrier resource, for first after execution CCA success OFDM symbol starts to present sub-frame to terminate, or performs first subframe after the subframe of CCA place.
23. devices according to claim 21, it is characterised in that
Described instruction information is additionally operable to judge that described second transmission node whether can for the second transmission node The unauthorized carrier resource that competition is arrived, including following information: Sounding Reference Signal SRS;Or, Major-minor synchronizing sequence PSS/SSS;Or, targeting sequencing Preamble;
Described second transmission node includes with one or more in lower node: belonging to described first terminal One base station, the adjacent base station of described first base station, the described unauthorized carrier resource specified is carried out CCA detects but does not competes the other-end of unauthorized carrier resource;
Described instruction information comprises following information: cell identity information.
24. devices according to claim 23, it is characterised in that
Described instruction information also comprises following information: operator identifier and/or with frequency multiplexing sign.
25. devices according to claim 23, it is characterised in that
Described device also includes indicating information computational module, is used for using basic sequence to obtain described instruction information, Described instruction information computational module is calculated described basic sequence in the following waysWherein u represents Sequence set sequence number, u ∈ 0,1 ..., N-1}, N are packet count, and v is the basic sequence number in group, time slot nsIn Sequence set sequence number u is obtained by following formula:
U=(fgh(ns)+fss) mod N, wherein fgh(ns) it is that group redirects pattern, fssFor sequential shift pattern;
Described fgh(ns) use following formula to obtain:
Wherein c is pseudo-random sequence, described pseudo-random sequence Initialization value uses following formula to obtain:WhereinFor cell ID;
Described fssEmploying following methods obtains:
For Physical Uplink Control Channel PUCCH,
For Physical Uplink Shared Channel PUSCH,Wherein △ssFor fortune Battalion's trade mark is known, △ss∈ 0,1 ..., m}, m are operator's number;
For Sounding Reference Signal SRS,
26. devices according to claim 20, it is characterised in that
Described sending module is additionally operable to authorizing the equipment on carrier wave to send described finger in equipment D2D resource Show information.
The transmitting device of 27. 1 kinds of unauthorized resources, it is characterised in that described device is positioned at the second transmission Node, described device includes the second detection module and transport module, wherein:
Described second detection module, for detecting on public resource or appointment resource;
Described transport module, for when described second detection module detects instruction information, according to described Instruction message content judges whether described second transmission node can use described first transmission node to compete Unauthorized carrier resource carries out data transmission.
28. devices according to claim 27, it is characterised in that
Described first transmission node includes first terminal;
Described second transmission node includes with one or more in lower node: belonging to described first terminal One base station, the adjacent base station of described first base station, described unauthorized carrier resource has carried out idle letter Road assessment CCA detects but does not competes the other-end of unauthorized carrier resource.
29. devices according to claim 27, it is characterised in that
Described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes, minimum zone It it is a complete OFDM symbol;
Described appointment resource is the Physical Uplink Shared Channel PUSCH money being positioned on unauthorized carrier resource Source.
30. according to the device described in claim 27 or 28 or 29, it is characterised in that
Described second transmission node includes the first base station belonging to described first terminal;
According to described instruction message content, described transport module judges whether described second transmission node can use The unauthorized carrier resource that described first transmission node is competed carries out data transmission, including:
Described transport module judges that described second detection module receives described instruction message, it is believed that described One transmission node competes the success of unauthorized carrier resource, it is possible to use described unauthorized carrier resource number According to transmission;Or
Described transport module judges that described second detection module receives described instruction message and is resolved to described Comprising in instruction message with frequency multiplexing sign, the most described transport module broadcast notice is with the phase of operator Adjacent base station uses described unauthorized carrier resource, after carrying out resource negotiation, with the phase of described same operator Terminal under adjacent base station is carried out data transmission by multiplex mode on described unauthorized carrier resource.
31. according to the device described in claim 27 or 28 or 29, it is characterised in that
Described second transmission node includes the adjacent base station of the first base station belonging to described first terminal;
According to described instruction message content, described transport module judges whether described second transmission node can use The unauthorized carrier resource that described first transmission node is competed carries out data transmission, including:
Described transport module judges the operator identifier in the instruction message that described second detection module receives Identical with self, and described instruction message comprises with frequency multiplexing sign, then with same operator under its He carries out resource negotiation in base station, after carrying out resource negotiation, with other base stations under described same operator in institute State and carried out data transmission by multiplex mode on unauthorized carrier resource.
32. according to the device described in claim 27 or 28 or 29, it is characterised in that
Described second transmission node is included on described unauthorized carrier resource and has carried out CCA detection but the most competing Strive the other-end of unauthorized carrier resource;
Described second detection module detects at public resource or specify in resource, including: described the Two detection modules carry out blind check on described public resource or appointment resource and receive described instruction message, and The instruction information received is resolved;
According to described instruction message content, described transport module judges whether described second transmission node can use The unauthorized carrier resource that described first transmission node is competed carries out data transmission, including:
If described transport module judges cell ID in the described instruction information cell ID phase with self With, then it is assumed that the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described non- Authorize and carried out data transmission by multiplex mode on carrier resource;Or,
If described transport module judges the cell ID in described instruction message and the cell ID of self not With, but operator identifier is identical with the operator identifier of self and comprises with multiplexing the most frequently in described instruction message Sign, then it is assumed that the unauthorized carrier resource can competed with the first transmission node described in multiplexing, Carried out data transmission by multiplex mode on described unauthorized carrier resource.
33. devices according to claim 32, it is characterised in that
Described second detection module is additionally operable to, when can not correctly resolve instruction information, abandon described public Carry out blind check in resource or appointment resource, only enter in real time within the channel occupancy phase of described unauthorized carrier wave Row CCA detects;Or abandon carrying out CCA detection within the channel occupancy phase of described unauthorized carrier wave.
34. devices according to claim 32, it is characterised in that
Described transport module is carried out data transmission by multiplex mode on described unauthorized carrier resource, bag Include:
Described transport module public resource or specify first complete OFDM symbol after resource or First subframe position carries out data transmission according to pre-scheduling information.
CN201510145660.3A 2015-03-30 2015-03-30 The transmission method of a kind of unauthorized resource and device Withdrawn CN106160967A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510145660.3A CN106160967A (en) 2015-03-30 2015-03-30 The transmission method of a kind of unauthorized resource and device
PCT/CN2016/076167 WO2016155480A1 (en) 2015-03-30 2016-03-11 Method and device for transmitting unlicensed resources

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510145660.3A CN106160967A (en) 2015-03-30 2015-03-30 The transmission method of a kind of unauthorized resource and device

Publications (1)

Publication Number Publication Date
CN106160967A true CN106160967A (en) 2016-11-23

Family

ID=57006468

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510145660.3A Withdrawn CN106160967A (en) 2015-03-30 2015-03-30 The transmission method of a kind of unauthorized resource and device

Country Status (2)

Country Link
CN (1) CN106160967A (en)
WO (1) WO2016155480A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108270804A (en) * 2016-12-30 2018-07-10 上海诺基亚贝尔股份有限公司 For the communication means and communication equipment of the transmission of the duplication of signal
WO2018196092A1 (en) * 2017-04-25 2018-11-01 华为技术有限公司 Random access method and device
CN109286988A (en) * 2017-07-19 2019-01-29 维沃移动通信有限公司 Transmission method, equipment and computer readable storage medium under unauthorized frequency range
CN110115000A (en) * 2019-03-27 2019-08-09 北京小米移动软件有限公司 Channel indicating means and device
CN110366248A (en) * 2018-04-04 2019-10-22 中兴通讯股份有限公司 Uplink, communication means, device and base station, terminal, storage medium
CN110622599A (en) * 2017-05-13 2019-12-27 Lg 电子株式会社 V2X signal transmission method of terminal having limited transmission capability in multi-carrier system and terminal using the same
WO2020052673A1 (en) * 2018-09-14 2020-03-19 中国信息通信研究院 Unlicensed frequency band uplink shared channel scheduling method, mobile terminal and network device
CN110972327A (en) * 2018-09-28 2020-04-07 维沃移动通信有限公司 Signal transmission method and communication equipment based on unauthorized frequency band
CN111557113A (en) * 2020-04-07 2020-08-18 北京小米移动软件有限公司 Indication method and device for transmission data, communication equipment and storage medium
CN111656834A (en) * 2018-04-04 2020-09-11 中兴通讯股份有限公司 Method, device and system for preempting uplink transmission resource in wireless communication
CN111757542A (en) * 2018-01-12 2020-10-09 Oppo广东移动通信有限公司 Method and apparatus for signal transmission
WO2022001144A1 (en) * 2020-06-30 2022-01-06 华为技术有限公司 Inter-system interference avoidance method, device and system
WO2023001078A1 (en) * 2021-07-21 2023-01-26 中兴通讯股份有限公司 Channel sharing method and device, and storage medium
CN111656834B (en) * 2018-04-04 2024-05-31 中兴通讯股份有限公司 Method, apparatus and system for preempting uplink transmission resources in wireless communication

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112737753B (en) * 2017-06-09 2022-02-15 华为技术有限公司 Signal transmission method, related equipment and system
GB2576198B (en) * 2018-08-09 2020-07-29 Tcl Communication Ltd Transmission resource sharing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130012134A1 (en) * 2011-07-07 2013-01-10 Cisco Technology, Inc. Dynamic Clear Channel Assessment Using Spectrum Intelligent Interference Nulling
WO2015023909A2 (en) * 2013-08-16 2015-02-19 Qualcomm Incorporated Uplink procedures for lte/lte-a communication systems with unlicensed spectrum
CN104486013A (en) * 2014-12-19 2015-04-01 宇龙计算机通信科技(深圳)有限公司 Channel detection method, channel detection system, terminal and base station
CN106034018A (en) * 2015-03-17 2016-10-19 中兴通讯股份有限公司 Carrier wave multiplexing method and site thereof

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130203429A1 (en) * 2010-10-13 2013-08-08 Nokia Corporation Method and apparatus for enabling scheduled transmission
WO2016015318A1 (en) * 2014-07-31 2016-02-04 华为技术有限公司 Data transmission method and communication device
CN105307180B (en) * 2015-09-25 2018-09-14 宇龙计算机通信科技(深圳)有限公司 A kind of data transmission method and device based on LAA systems

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130012134A1 (en) * 2011-07-07 2013-01-10 Cisco Technology, Inc. Dynamic Clear Channel Assessment Using Spectrum Intelligent Interference Nulling
WO2015023909A2 (en) * 2013-08-16 2015-02-19 Qualcomm Incorporated Uplink procedures for lte/lte-a communication systems with unlicensed spectrum
CN104486013A (en) * 2014-12-19 2015-04-01 宇龙计算机通信科技(深圳)有限公司 Channel detection method, channel detection system, terminal and base station
CN106034018A (en) * 2015-03-17 2016-10-19 中兴通讯股份有限公司 Carrier wave multiplexing method and site thereof

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108270804A (en) * 2016-12-30 2018-07-10 上海诺基亚贝尔股份有限公司 For the communication means and communication equipment of the transmission of the duplication of signal
CN108270804B (en) * 2016-12-30 2021-02-09 上海诺基亚贝尔股份有限公司 Communication method and communication device for the transmission of a replica of a signal
WO2018196092A1 (en) * 2017-04-25 2018-11-01 华为技术有限公司 Random access method and device
US10999875B2 (en) 2017-04-25 2021-05-04 Huawei Technologies Co., Ltd. Random access method and apparatus
CN109314998A (en) * 2017-04-25 2019-02-05 华为技术有限公司 A kind of accidental access method and device
CN109314998B (en) * 2017-04-25 2020-12-15 华为技术有限公司 Random access method and device
CN110622599A (en) * 2017-05-13 2019-12-27 Lg 电子株式会社 V2X signal transmission method of terminal having limited transmission capability in multi-carrier system and terminal using the same
CN110622599B (en) * 2017-05-13 2022-12-27 Lg 电子株式会社 V2X signal transmission method of terminal having limited transmission capability in multi-carrier system and terminal using the same
CN109286988B (en) * 2017-07-19 2021-01-08 维沃移动通信有限公司 Transmission method and device under unlicensed frequency band and computer-readable storage medium
CN109286988A (en) * 2017-07-19 2019-01-29 维沃移动通信有限公司 Transmission method, equipment and computer readable storage medium under unauthorized frequency range
CN111757542A (en) * 2018-01-12 2020-10-09 Oppo广东移动通信有限公司 Method and apparatus for signal transmission
US11622383B2 (en) 2018-01-12 2023-04-04 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Method and device for channel sensing and signal transmission
US11419148B2 (en) 2018-01-12 2022-08-16 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Method and device for channel sensing and signal transmission
CN111656834A (en) * 2018-04-04 2020-09-11 中兴通讯股份有限公司 Method, device and system for preempting uplink transmission resource in wireless communication
CN110366248A (en) * 2018-04-04 2019-10-22 中兴通讯股份有限公司 Uplink, communication means, device and base station, terminal, storage medium
CN110366248B (en) * 2018-04-04 2024-04-30 中兴通讯股份有限公司 Uplink transmission and communication method and device, base station, terminal and storage medium
CN111656834B (en) * 2018-04-04 2024-05-31 中兴通讯股份有限公司 Method, apparatus and system for preempting uplink transmission resources in wireless communication
WO2020052673A1 (en) * 2018-09-14 2020-03-19 中国信息通信研究院 Unlicensed frequency band uplink shared channel scheduling method, mobile terminal and network device
CN110972327A (en) * 2018-09-28 2020-04-07 维沃移动通信有限公司 Signal transmission method and communication equipment based on unauthorized frequency band
CN110115000A (en) * 2019-03-27 2019-08-09 北京小米移动软件有限公司 Channel indicating means and device
US11943173B2 (en) 2019-03-27 2024-03-26 Beijing Xiaomi Mobile Software Co., Ltd. Channel indication methods and apparatuses
CN111557113A (en) * 2020-04-07 2020-08-18 北京小米移动软件有限公司 Indication method and device for transmission data, communication equipment and storage medium
CN111557113B (en) * 2020-04-07 2023-09-19 北京小米移动软件有限公司 Indication method, device, communication equipment and storage medium for transmitting data
WO2022001144A1 (en) * 2020-06-30 2022-01-06 华为技术有限公司 Inter-system interference avoidance method, device and system
WO2023001078A1 (en) * 2021-07-21 2023-01-26 中兴通讯股份有限公司 Channel sharing method and device, and storage medium

Also Published As

Publication number Publication date
WO2016155480A1 (en) 2016-10-06

Similar Documents

Publication Publication Date Title
CN106160967A (en) The transmission method of a kind of unauthorized resource and device
CN105684488B (en) A kind of data transmission method and communication equipment
CN105848165B (en) Method, system, base station and user equipment for using unauthorized resources
CN104968052B (en) Configuring method, configuring system, apparatus, receiving method, receiving system, and terminal
WO2017014606A1 (en) Method and device for communication in narrow band system
EP3178172B1 (en) Synchronization signals for device-to-device communications
US9609503B2 (en) Method and device for detecting and generating synchronization signal for device-to-device wireless communication
CN104301273B (en) Method for transmitting and receiving signal by using unauthorized carrier, base station and user equipment
ES2663854T3 (en) Communications device and procedures
WO2017125009A1 (en) Method and apparatus for sending sounding reference signal
JP6736043B2 (en) base station
CN107734560A (en) Method for transmitting signals, communication equipment and communication system
CN104782217B (en) Information transferring method, base station and user equipment
WO2016178515A1 (en) Signal receiving method and apparatus in device-to-device wireless communication
CN106453181A (en) Information processing method, device and system
CN106376050A (en) Setting/determining method and device of subcarrier spacing of reference numerology, base station and terminal
CN103686676A (en) Communication method and device of device-to-device communication system and system
CN107836092A (en) Low latency physical uplink control channel with dispatch request and channel condition information
CN106658584A (en) Signal sending and receiving and interference measurement methods and equipment thereof
EP3240223B1 (en) Method and device for resource management in an unlicensed carrier
US11696314B2 (en) Communication system
CN105099639A (en) Method and device for transmitting control channel and communication node
CN107770872B (en) Data transmission method and equipment on unlicensed spectrum
CN107370589A (en) Method for transmitting signals, device and user equipment
CN104796367B (en) A kind of sending method of synchronizing information, detection method and user equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20161123

WW01 Invention patent application withdrawn after publication