CN106160967A - The transmission method of a kind of unauthorized resource and device - Google Patents
The transmission method of a kind of unauthorized resource and device Download PDFInfo
- Publication number
- CN106160967A CN106160967A CN201510145660.3A CN201510145660A CN106160967A CN 106160967 A CN106160967 A CN 106160967A CN 201510145660 A CN201510145660 A CN 201510145660A CN 106160967 A CN106160967 A CN 106160967A
- Authority
- CN
- China
- Prior art keywords
- resource
- unauthorized carrier
- transmission node
- base station
- carrier resource
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses transmission method and the device of a kind of unauthorized resource, the process that first transmission node performs includes: the first transmission node carries out CCA detection on the unauthorized carrier resource specified, when the described unauthorized carrier resource free time being detected, sending instruction information on public resource or appointment resource or send instruction information and carry out a data transfer, described instruction information is used for notifying that described unauthorized carrier resource takies.The process that second transmission node performs includes: the second transmission node detects on public resource or appointment resource, when instruction information being detected, judge that the unauthorized carrier resource whether described second transmission node can use described first transmission node to compete carries out data transmission according to described instruction message content.Embodiment of the present invention scheme is used to be greatly improved the utilization rate of unauthorized carrier resource.
Description
Technical field
The present invention relates to wireless communication technology, particularly relate to transmission method and the device of a kind of unauthorized resource.
Background technology
Unauthorized carrier wave has a following feature:
1, free/low expense (need not buy unlicensed spectrum, frequency spectrum resource is zero cost);
2, requirements for sale is low, and (individual, enterprise can participate in disposing low cost, and the equipment of equipment vendor can
Arbitrarily to dispose);
3, available bandwidth is big (the unauthorized frequency range of 5GHz, 2.4GHz can use);
4, share resource (when multiple different systems are all runed wherein or same system different operators fortune
When seeking wherein, it may be considered that the mode of some shared resources, improve spectrum efficiency);
5, wireless access technology many (across different communication standards, cooperation difficulty, network topology is various);
6, wireless access website many (number of users is big, and cooperation difficulty is big, and centralized management expense is big);
7, many (multi-service is mentioned and can run wherein, such as machine to machine (Machine in application
Machine, referred to as M2M), vehicle to vehicle (Vehicle to Vehicle, referred to as V2V)).
In the evolution process of LTE, LTE Rel-13 version starts registration study in JIUYUE, 2014,
One of them important content is exactly that LTE system uses unauthorized carrier operation.This technology will make LTE
System can use the unauthorized carrier wave that presently, there are, and is greatly promoted the potential frequency spectrum resource of LTE system,
LTE system is made to be obtained in that lower frequency spectrum cost.
But LTE utilizes unauthorized carrier wave to carry out data transmission aspect faces problems, wherein problem it
One is exactly, after UE side participates in the competition of unauthorized carrier resource and competes successfully, how will successfully to take non-awarding
The information fast notification of power carrier resource is gone out, and carries out transmitting uplink data the most efficiently.For
This problem, the most not yet has concrete scheme.
Summary of the invention
The technical problem to be solved in the present invention is to provide transmission method and the device of a kind of unauthorized resource, ginseng
Compete and compete successful transmission node with unauthorized carrier resource and quickly will can successfully take unauthorized load
The information of ripple resource notifies that the resource competed to other transmission nodes multiplexing carries out data transmission.
For solving above-mentioned technical problem, the invention provides the transmission method of a kind of unauthorized resource, described
Method includes:
First transmission node detects at the unauthorized carrier resource enterprising line space channel assessment CCA specified,
When the described unauthorized carrier resource free time being detected, public resource or appointment resource send instruction
Information or send instruction information and carry out a data transfer, described instruction information is used for notifying described non-
Carrier resource is authorized to take.
Alternatively, described first transmission node includes first terminal.
Alternatively, described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes,
Minimum zone is a complete OFDM symbol.
Alternatively, described public resource includes following resource in time domain: perform first after CCA success
Individual complete OFDM symbol;Or, perform according with from first complete OFDM after CCA success
Number start the OFDM symbol in the sub-frame boundary performing CCA;Or, after performing CCA success
The OFDM symbol to next sub-frame boundary is started from first complete OFDM symbol;Described public affairs
Altogether resource includes following resource on frequency domain: whole frequency domain resource;Or, whole frequency domain takies predetermined
The resource of bandwidth;Or, the one or more Physical Resource Block PRB being made up of multiple subcarriers.
Alternatively, described appointment resource is positioned on unauthorized carrier resource, for performing the after CCA success
One OFDM symbol starts to present sub-frame to terminate, or performs first after the subframe of CCA place
Subframe.
Alternatively, described appointment resource is Physical Uplink Shared Channel PUSCH resource.
Alternatively, described instruction information is additionally operable to judge that described second transmission node is for the second transmission node
The no unauthorized carrier resource that competition can be used to arrive, including following information: Sounding Reference Signal SRS;
Or, major-minor synchronizing sequence PSS/SSS;Or, targeting sequencing Preamble;Described second transmission node
Including with one or more in lower node: the first base station belonging to described first terminal, described first base station
Adjacent base station, the described unauthorized carrier resource specified has been carried out CCA detection but do not compete non-
Authorize the other-end of carrier resource;Described instruction information comprises following information: cell identity information.
Alternatively, described instruction information also comprises following information: operator identifier and/or the multiplexing of same frequency indicate
Mark.
Alternatively, described instruction information is obtained by basic sequence, and described basic sequence uses following methods to obtain:
Basic sequenceWherein u represents sequence set sequence number, u ∈ 0,1 ..., N-1}, N are packet count, v
It is the basic sequence number in group, time slot nsInterior sequence set sequence number u is obtained by following formula:
U=(fgh(ns)+fss) mod N, wherein fgh(ns) it is that group redirects pattern, fssFor sequential shift pattern;
Described fgh(ns) use following formula to obtain:
Wherein c is pseudo-random sequence, described pseudo-random sequence
Initialization value uses following formula to obtain:WhereinFor cell ID;
Described fssEmploying following methods obtains:
For Physical Uplink Control Channel PUCCH,
For Physical Uplink Shared Channel PUSCH,Wherein △ssFor fortune
Battalion's trade mark is known, △ss∈ 0,1 ..., m}, m are operator's number;
For Sounding Reference Signal SRS,
Alternatively, described first transmission node is also authorizing the equipment on carrier wave to send out in equipment D2D resource
Send described instruction information.
For solving above-mentioned technical problem, present invention also offers the transmitting device of a kind of unauthorized resource, institute
Stating device and be positioned at the first transmission node, described device includes first detection module and sending module, wherein:
Described first detection module, at the unauthorized carrier resource enterprising line space channel assessment specified
CCA detects;
At described first detection module, described sending module, for detecting that described unauthorized carrier resource is empty
Idle, sends instruction information on public resource or appointment resource or sends instruction information and carry out one
Data transfer, described instruction information is used for notifying that described unauthorized carrier resource takies.
Alternatively, described first transmission node includes first terminal.
Alternatively, described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes,
Minimum zone is a complete OFDM symbol;
Described appointment resource is positioned on unauthorized carrier resource, for first after execution CCA success
OFDM symbol starts to present sub-frame to terminate, or performs first subframe after the subframe of CCA place.
Alternatively, described instruction information is additionally operable to judge that described second transmission node is for the second transmission node
The no unauthorized carrier resource that competition can be used to arrive, including following information: Sounding Reference Signal SRS;
Or, major-minor synchronizing sequence PSS/SSS;Or, targeting sequencing Preamble;
Described second transmission node includes with one or more in lower node: belonging to described first terminal
One base station, the adjacent base station of described first base station, the described unauthorized carrier resource specified is carried out
CCA detects but does not competes the other-end of unauthorized carrier resource;
Described instruction information comprises following information: cell identity information.
Alternatively, described instruction information also comprises following information: operator identifier and/or the multiplexing of same frequency indicate
Mark.
Alternatively, described device also includes indicating information computational module, is used for using basic sequence to obtain described
Instruction information, described instruction information computational module is calculated described basic sequence in the following ways
Alternatively, described sending module is additionally operable to authorizing the equipment on carrier wave to send out in equipment D2D resource
Send described instruction information.
Another technical problem that the invention solves the problems that is to provide transmission method and the dress of a kind of unauthorized resource
Put, improve the utilization rate of unauthorized carrier wave.
For solving above-mentioned technical problem, present invention also offers the transmission method of a kind of unauthorized resource, institute
The method of stating includes:
Second transmission node detects, when instruction information being detected on public resource or appointment resource
Time, judge whether described second transmission node can use described first transmission according to described instruction message content
The unauthorized carrier resource that node is competed carries out data transmission.
Alternatively, described first transmission node includes first terminal;
Described second transmission node includes with one or more in lower node: belonging to described first terminal
One base station, the adjacent base station of described first base station, described unauthorized carrier resource has carried out idle letter
Road assessment CCA detects but does not competes the other-end of unauthorized carrier resource.
Alternatively, described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes,
Minimum zone is a complete OFDM symbol;
Described appointment resource is the Physical Uplink Shared Channel PUSCH money being positioned on unauthorized carrier resource
Source.
Alternatively, described second transmission node includes the first base station belonging to described first terminal;
Described judge whether described second transmission node can use described first according to described instruction message content
The unauthorized carrier resource that transmission node is competed carries out data transmission, including:
Described first base station receives described instruction message, it is believed that described first transmission node competition is unauthorized
Carrier resource success, it is possible to use described unauthorized carrier resource carries out data transmission;Or
Described first base station receives to comprise in described instruction message, and described instruction message and refers to frequency multiplexing
Indicating is known, and the most described first base station broadcast notice uses described unauthorized carrier wave with the adjacent base station of operator
Resource, after carrying out resource negotiation, described first base station and the end under the adjacent base station of described same operator
End is carried out data transmission by multiplex mode on described unauthorized carrier resource.
Alternatively, described second transmission node includes the adjacent base station of the first base station belonging to described first terminal;
Described judge whether described second transmission node can use described first according to described instruction message content
The unauthorized carrier resource that transmission node is competed carries out data transmission, including:
Described adjacent base station receives described instruction message, it is judged that the operator identifier in described instruction message
Identical with self, and described instruction message comprises with frequency multiplexing sign, then with same operator under its
He carries out resource negotiation in base station, after carrying out resource negotiation, with other base stations under described same operator in institute
State and carried out data transmission by multiplex mode on unauthorized carrier resource.
Alternatively, described second transmission node is included on described unauthorized carrier resource and has carried out CCA inspection
Survey but do not compete the other-end of unauthorized carrier resource;
Described second transmission node detects on public resource or appointment resource, including: described end
Hold and on described public resource or appointment resource, carry out blind check and receive described instruction message, and to receiving
Instruction information resolve;
Described judge whether described second transmission node can use described first according to described instruction message content
The unauthorized carrier resource that transmission node is competed carries out data transmission, including:
If the cell ID in instruction information described in described terminal judges is identical with the cell ID of self,
Then think the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described unauthorized
Carried out data transmission by multiplex mode on carrier resource;Or,
Indicate cell ID in message with self cell ID described in described terminal judges if it is different,
But operator identifier is identical with the operator identifier of self and comprises in described instruction message with frequency multiplexing instruction
Mark, then it is assumed that the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described
Carried out data transmission by multiplex mode on unauthorized carrier resource.
Alternatively, described method also includes: when described second transmission node can not correctly resolve instruction information,
Then abandon carrying out blind check, only at the letter of described unauthorized carrier wave on described public resource or appointment resource
Road carries out CCA detection in taking the phase in real time;Or abandon within the channel occupancy phase of described unauthorized carrier wave
Carry out CCA detection.
Alternatively, described terminal is carried out data transmission by multiplex mode on described unauthorized carrier resource,
Including:
The described terminal first complete OFDM symbol or first after public resource or appointment resource
Individual subframe position carries out data transmission according to pre-scheduling information.
Alternatively, carried out data transmission the unauthorized carrier resource used by multiplex mode, including:
The resource of instruction in pre-scheduling information, or, the terminal room carried out data transmission by multiplex mode is autonomous
The resource consulted.
For solving above-mentioned technical problem, present invention also offers the transmitting device of a kind of unauthorized resource, institute
Stating device and be positioned at the second transmission node, described device includes the second detection module and transport module, wherein:
Described second detection module, for detecting on public resource or appointment resource;
Described transport module, for when described second detection module detects instruction information, according to described
Instruction message content judges whether described second transmission node can use described first transmission node to compete
Unauthorized carrier resource carries out data transmission.
Alternatively, described first transmission node includes first terminal;
Described second transmission node includes with one or more in lower node: belonging to described first terminal
One base station, the adjacent base station of described first base station, described unauthorized carrier resource has carried out idle letter
Road assessment CCA detects but does not competes the other-end of unauthorized carrier resource.
Alternatively, described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes,
Minimum zone is a complete OFDM symbol;
Described appointment resource is the Physical Uplink Shared Channel PUSCH money being positioned on unauthorized carrier resource
Source.
Alternatively, described second transmission node includes the first base station belonging to described first terminal;
According to described instruction message content, described transport module judges whether described second transmission node can use
The unauthorized carrier resource that described first transmission node is competed carries out data transmission, including:
Described transport module judges that described second detection module receives described instruction message, it is believed that described
One transmission node competes the success of unauthorized carrier resource, it is possible to use described unauthorized carrier resource number
According to transmission;Or
Described transport module judges that described second detection module receives described instruction message and is resolved to described
Comprising in instruction message with frequency multiplexing sign, the most described transport module broadcast notice is with the phase of operator
Adjacent base station uses described unauthorized carrier resource, after carrying out resource negotiation, with the phase of described same operator
Terminal under adjacent base station is carried out data transmission by multiplex mode on described unauthorized carrier resource.
Alternatively, described second transmission node includes the adjacent base station of the first base station belonging to described first terminal;
According to described instruction message content, described transport module judges whether described second transmission node can use
The unauthorized carrier resource that described first transmission node is competed carries out data transmission, including:
Described transport module judges the operator identifier in the instruction message that described second detection module receives
Identical with self, and described instruction message comprises with frequency multiplexing sign, then with same operator under its
He carries out resource negotiation in base station, after carrying out resource negotiation, with other base stations under described same operator in institute
State and carried out data transmission by multiplex mode on unauthorized carrier resource.
Alternatively, described second transmission node is included on described unauthorized carrier resource and has carried out CCA inspection
Survey but do not compete the other-end of unauthorized carrier resource;
Described second detection module detects at public resource or specify in resource, including: described the
Two detection modules carry out blind check on described public resource or appointment resource and receive described instruction message, and
The instruction information received is resolved;
According to described instruction message content, described transport module judges whether described second transmission node can use
The unauthorized carrier resource that described first transmission node is competed carries out data transmission, including:
If described transport module judges cell ID in the described instruction information cell ID phase with self
With, then it is assumed that the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described non-
Authorize and carried out data transmission by multiplex mode on carrier resource;Or,
If described transport module judges the cell ID in described instruction message and the cell ID of self not
With, but operator identifier is identical with the operator identifier of self and comprises with multiplexing the most frequently in described instruction message
Sign, then it is assumed that the unauthorized carrier resource can competed with the first transmission node described in multiplexing,
Carried out data transmission by multiplex mode on described unauthorized carrier resource.
Alternatively, described second detection module is additionally operable to, when can not correctly resolve instruction information, abandon
Blind check is carried out, only in the channel occupancy phase of described unauthorized carrier wave on described public resource or appointment resource
Carry out CCA detection the most in real time;Or abandon carrying out CCA within the channel occupancy phase of described unauthorized carrier wave
Detection.
Alternatively, described transport module carries out data by multiplex mode on described unauthorized carrier resource
Transmission, including: the described transport module first complete OFDM after public resource or appointment resource
Symbol or first subframe position carries out data transmission according to pre-scheduling information.
Embodiments provide UE in a kind of unauthorized resource and send message and the method for data transmission,
After UE assists base station to seize unauthorized carrier wave in unlicensed spectrum, quickly notice own base station and
/ or neighbor base station and participate in competition but do not compete the unauthorized carrier resource of successful UE whether can
Situation.According to this notification message can Shi Tong community and/or carry out frequency division multiplexing with the UE under operator,
Substantially increase the utilization rate of unauthorized carrier resource.Additionally, by the indicator sequence sent, Ke Nengbang
Help base station to obtain channel conditions more accurately, improve the quality of communication.Meanwhile, base station is made to specify resource
On detect, reduce further base station energy consumption and reduce blind check time, substantially increase base station
Work efficiency.
Other features and advantages of the present invention will illustrate in the following description, and, partly from froming the perspective of
Bright book becomes apparent, or understands by implementing the present invention.The purpose of the present invention is excellent with other
Point can be realized by structure specifically noted in description, claims and accompanying drawing and be obtained.
Accompanying drawing explanation
Accompanying drawing is used for providing being further appreciated by technical solution of the present invention, and constitutes one of description
Point, it is used for explaining technical scheme together with embodiments herein, is not intended that the present invention
The restriction of technical scheme.
Fig. 1 is the embodiment of the present invention 1 flow chart;
Fig. 2 is the embodiment of the present invention 2 apparatus structure schematic diagram;
Fig. 3 is the embodiment of the present invention 3 flow chart;
Fig. 4 is the embodiment of the present invention 4 apparatus structure schematic diagram;
Fig. 5 is that application example 1UE assists base station to compete unauthorized carrier wave and the overall flow figure of data transmission;
Fig. 6 a-b is the time-frequency partition structure schematic diagram of application example 2 public resource;
Fig. 7 a-b is that application example 3 specifies resource structures schematic diagram;
Fig. 8 is that application example 4 is competed successful UE and sent the concrete mistake of SRS signal on public resource
Journey schematic diagram;
Fig. 9 is that application example 5 uses D2D mechanism to realize UE to notify the schematic diagram of other nodes.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing
Embodiments of the invention are described in detail.It should be noted that in the case of not conflicting, this Shen
Embodiment in please and the feature in embodiment can mutual combination in any.
Can be at the computer of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing
System performs.And, although show logical order in flow charts, but in some cases,
Can be to be different from the step shown or described by order execution herein.
Embodiment one
The present embodiment describes the process that in the transmission method of a kind of unauthorized resource, the first transmission node performs,
As it is shown in figure 1, include:
Step 1, the first transmission node is at the unauthorized carrier resource enterprising line space channel assessment CCA specified
Detection;
Described first transmission node includes first terminal.
Step 2, when the described unauthorized carrier resource free time being detected, in public resource or appointment resource
Upper transmission instruction information or send instruction information and carry out a data transfer, described instruction information is used for
Notify that described unauthorized carrier resource takies.
Described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes, minimum zone
It it is a complete OFDM symbol.
Specifically, described public resource includes following resource in time domain: perform first after CCA success
Individual complete OFDM symbol;Or, perform according with from first complete OFDM after CCA success
Number start the OFDM symbol in the sub-frame boundary performing CCA;Or, after performing CCA success
The OFDM symbol to next sub-frame boundary is started from first complete OFDM symbol;Described public affairs
Altogether resource includes following resource on frequency domain: whole frequency domain resource;Or, whole frequency domain takies predetermined
The resource of bandwidth;Or, the one or more Physical Resource Block PRB being made up of multiple subcarriers.
Described appointment resource is positioned on unauthorized carrier resource, for first after execution CCA success
OFDM symbol starts to present sub-frame to terminate, or performs first subframe after the subframe of CCA place.
Preferably, described appointment resource is Physical Uplink Shared Channel PUSCH resource.
Above-mentioned for representing that unauthorized resource the most occupied instruction information can be one and not carry content
Null message.
In a preferred embodiment, described instruction information is additionally operable to judge described for the second transmission node
Whether two transmission nodes can use the unauthorized carrier resource that competition is arrived, including following information: channel detection
Reference signal SRS;Or, major-minor synchronizing sequence PSS/SSS;Or, targeting sequencing Preamble;
Described second transmission node includes with one or more in lower node: belonging to described first terminal
One base station, the adjacent base station of described first base station, the described unauthorized carrier resource specified is carried out
CCA detects but does not competes the other-end of unauthorized carrier resource.
In order to judge for the second transmission node, described instruction information comprises following information: community is marked
Knowledge information.Preferably, described instruction information also comprises following information: operator identifier and/or with frequency multiplexing
Sign.
Above-mentioned SRS, PSS/SSS or Preamble all can be by basic sequencesObtaining, wherein u represents sequence
Row group sequence number, u ∈ 0,1 ..., N-1}, N are packet count, and v is the basic sequence number in group, time slot nsInterior sequence
Row group sequence number u is obtained by following formula:
U=(fgh(ns)+fss) mod N, wherein fgh(ns) it is that group redirects pattern, fssFor sequential shift pattern;
Described fgh(ns) use following formula to obtain:Wherein c be pseudo-with
Machine sequence, the initialization value of described pseudo-random sequence uses following formula to obtain:WhereinFor
Cell ID;
Described fssEmploying following methods obtains:
For Physical Uplink Control Channel PUCCH,
For Physical Uplink Shared Channel PUSCH,Wherein △ssFor fortune
Battalion's trade mark is known, △ss∈ 0,1 ..., m}, m are operator's number;
For Sounding Reference Signal SRS,
In a preferred embodiment, described first transmission node can also authorize the equipment pair on carrier wave
Described instruction information is sent in equipment D2D resource.
Embodiment two
The device realizing said method is positioned at the first transmission node, as in figure 2 it is shown, include the first detection mould
Block and sending module, wherein:
Described first detection module, at the unauthorized carrier resource enterprising line space channel assessment specified
CCA detects;
At described first detection module, described sending module, for detecting that described unauthorized carrier resource is empty
Idle, sends instruction information on public resource or appointment resource or sends instruction information and carry out one
Data transfer, described instruction information is used for notifying that described unauthorized carrier resource takies.
It is noted that the method that the equipment provided due to the present embodiment can realize above-described embodiment one,
Therefore other operate the corresponding contents that may refer to embodiment one in detail, do not repeat them here.
Embodiment three
The present embodiment describes the process that in the transmission method of a kind of unauthorized resource, the second transmission node performs,
As it is shown on figure 3, described method includes:
Step 1, the second transmission node detects on public resource or appointment resource;
The position of described public resource and appointment resource sees described in embodiment one.
Step 2, when instruction information being detected, judges described second transmission according to described instruction message content
The unauthorized carrier resource whether node can use described first transmission node to compete carries out data transmission.
In this example, the first transmission node includes first terminal;Second transmission node includes with in lower node
One or more: the first base station belonging to described first terminal, the adjacent base station of described first base station,
Carry out clear channel assessment (CCA) CCA detection on described unauthorized carrier resource but do not compete unauthorized carrier wave
The other-end of resource.
When described second transmission node includes the first base station belonging to described first terminal, this first base station uses
In the following manner judges whether the unauthorized carrier resource number that described first transmission node can be used to compete
According to transmission:
Described first base station receives described instruction message, it is believed that described first transmission node competition is unauthorized
Carrier resource success, it is possible to use described unauthorized carrier resource carries out data transmission;Or
Described first base station receives to comprise in described instruction message, and described instruction message and refers to frequency multiplexing
Indicating is known, and the most described first base station broadcast notice uses described unauthorized carrier wave with the adjacent base station of operator
Resource, after carrying out resource negotiation, described first base station and the end under the adjacent base station of described same operator
End is carried out data transmission by multiplex mode on described unauthorized carrier resource.
When described second transmission node includes the adjacent base station of the first base station belonging to described first terminal, this phase
Adjacent base station judges whether the unauthorized carrier wave that described first transmission node can be used to compete in the following ways
Resource carries out data transmission:
Described adjacent base station receives described instruction message, it is judged that the operator identifier in described instruction message
Identical with self, and described instruction message comprises with frequency multiplexing sign, then with same operator under its
He carries out resource negotiation in base station, after carrying out resource negotiation, with other base stations under described same operator in institute
State and carried out data transmission by multiplex mode on unauthorized carrier resource.
When described second transmission node be included on described unauthorized carrier resource carried out CCA detection but not
Competition is to the other-end of unauthorized carrier resource;Described terminal is at described public resource or specifies in resource
Carry out blind check and receive described instruction message, and the instruction information received is resolved;And use with
Under type judges whether that the unauthorized carrier resource that described first transmission node can be used to compete carries out data
Transmission:
If the cell ID in instruction information described in described terminal judges is identical with the cell ID of self,
Then think the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described unauthorized
Carried out data transmission by multiplex mode on carrier resource;Or,
Indicate cell ID in message with self cell ID described in described terminal judges if it is different,
But operator identifier is identical with the operator identifier of self and comprises in described instruction message with frequency multiplexing instruction
Mark, then it is assumed that the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described
Carried out data transmission by multiplex mode on unauthorized carrier resource.
If described terminal can not correctly resolve instruction information, then abandon in described public resource or appointment
Carry out blind check in resource, only within the channel occupancy phase of described unauthorized carrier wave, carry out CCA detection in real time;
Or abandon carrying out CCA detection within the channel occupancy phase of described unauthorized carrier wave.
Above-mentioned terminal carries out data transmission referring to by multiplex mode on unauthorized carrier resource: described end
Hold first complete OFDM symbol after public resource or appointment resource or first subframe position
Carry out data transmission according to pre-scheduling information.By multiplex mode carry out data transmission being used unauthorized
Carrier resource, including: the resource of instruction in pre-scheduling information, or, carry out data by multiplex mode
The good resource of terminal room autonomous negotiating of transmission.
Embodiment four
The transmitting device of a kind of unauthorized resource realizing above-described embodiment three method is positioned at the second transmission joint
Point, as shown in Figure 4, including the second detection module and transport module, wherein:
Described second detection module, for detecting on public resource or appointment resource;
Described transport module, for when described second detection module detects instruction information, according to described
Instruction message content judges whether described second transmission node can use described first transmission node to compete
Unauthorized carrier resource carries out data transmission.
It is noted that the method that the equipment provided due to the present embodiment can realize above-described embodiment three,
Therefore other operate the corresponding contents that may refer to embodiment three in detail, do not repeat them here.
Below by several application examples, said method is illustrated.
Application example 1
UE assists base station to compete the overall flow of unauthorized carrier wave and data transmission as shown in Figure 5.Concrete bag
Including UE assists own base station to carry out seizing of unauthorized carrier resource, and then after successful contention to resource,
Notice peripheral base station and other UE, and carry out the process of uplink.Comprise the following steps:
Step 1, base station sends uplink scheduling authorization (UL grant), notice below UE competition to UE
Information: need to assist the unauthorized carrier number of competition, subframe numbers, execution clear channel assessment (CCA) (Clear
Channel Assessment, is called for short CCA) initial time position, any block of competing on unauthorized carrier wave
Resource, pre-scheduling information;
Alternatively, this competition information is gone back portability operator identifier and/or with frequency multiplexing instruction etc., in order to
UE carries out uplink FDM transmission.
Step 2, receives the UE of the competition information that base station sends, and performs CCA in the position specified, when
Described UE carries out CCA when channel idle being detected, at once at the public resource appointed with base station in advance
Or send an instruction information in appointment resource or send instruction information and data.
Step 3, competes the base station belonging to successful UE and adjacent base station and other are not competed successfully
UE detects and receives on public resource or appointment resource;
Detection purpose be: for not competing successful UE, in order to know whether can with seize
The unauthorized carrier wave competed to the UE multiplexing together of unauthorized carrier wave.For described base station or adjacent
For base station, in order to judge whether it is that subordinate UE robs and accounts for unauthorized carrier resource or whether can use non-
Authorize carrier resource.Specifically, for UE own base station, in order to know that subordinate UE is the most successful
Rob the unauthorized carrier resource accounting for specifying;For neighbouring with operator base station, in order to know whether with frequency
Multiplexing enables, thus is used together, by frequency division multiplexing, the unauthorized carrier resource competed and carries out data biography
Defeated;For other UE, account for resource to detect whether that Shi Tong community UE robs, or multiple with frequency
Rob with UE in the same carrier cell under enable and account for resource, thus judge whether this node can use and seize
The most whether the unauthorized carrier resource arrived, can carry out multiuser multiplexing uplink.
For competing successfully UE own base station, public resource or appointment resource receive described instruction letter
Breath, resolves information content further, if detection is the instruction information that subordinate UE sends, then it is assumed that UE
The unauthorized carrier resource of detection is seized successfully and can use.If parsing is that subordinate UE sends and with frequency
Multiplexing identification enables, then own base station needs to broadcast unauthorized carrier wave available information to adjacent by X2 mouth
With operator base station, and carry out resource negotiation, under this base station and adjacent same operator, base station has data to send out
The UE sent, the subframe after public resource or appointment resource carries out upstream data according to the resource consulted
Transmission, own base station and then need to take in duration in real time at unauthorized carrier wave with base station under operator
Detect and receive upstream data.If it is indicated that information is SRS signal, then base station know channel can
In the case of, in addition it is also necessary to carry out the measurement of up channel according to SRS signal, the result of measurement may be used for this
Data transfer or prepare for next data transfer.If compete successful UE at public resource or
Specify and have sent instruction information and a upstream data in resource, then own base station is receiving in instruction information
After, in the case of knowing that channel can be used, it is also performed to the reception of upstream data.
For UE side, if not competing successful UE to detect that instruction information Shi Tong community UE sends
Then thinking that channel can be used, according to pre-scheduling information, on unauthorized carrier wave, these UE use frequency division multiplexing
Mode carries out data transmission.If not competing successful UE to detect that instruction information is UE under same operator
Send and enable with frequency instruction, then these UE can pass in the resource location consulted before enterprising row data
Defeated.And the original position carried out data transmission is: first after public resource or appointment resource complete
OFDM symbol or first subframe position starts.
Application example 2
As seen in figures 6a-b, public resource is with FBE (Frame Based to the time-frequency partition structure of public resource
Equipment, equipment based on frame structure) LBT (Listen Before Talk, listem-before-talk) be
Illustrate its possible concrete time-domain position of anticipating.According to the above-mentioned definition to public resource, its maximum magnitude is
Perform first complete symbols after CCA success to terminate to next sub-frame boundary, i.e. public resource is maximum
Scope may not exceed two subframes, minimum zone be perform CCA success after a complete OFDM
Symbol.
Public resource schematical sections from Fig. 6 it can be seen that in time domain public resource be by one or
Multiple OFDM symbol composition, i.e. least unit in public resource time domain is a complete OFDM
Symbol.And the position according to different CCA position public resources changes the most therewith, performs further
The position of CCA is determined by base station.
In Fig. 6Represent LBT subframe,Represent public resource,Represent descending sub frame,Table
Show special subframe,Represent sub-frame of uplink.
As shown in Figure 6 a, for UE when the original position of a subframe starts to perform CCA competition,
If UE performs CCA and competes moment of unauthorized carrier resource OFDM symbol complete less than
Border, then UE needs to send a Seize ACK message in the residue time-domain resource of this OFDM symbol, as
Instruction information, it is to avoid other UE of native system or different system (such as Wi-Fi system) node (STA)
Seize this unauthorized carrier wave.If UE performs CCA and competes the moment of unauthorized carrier resource precisely
The border of one complete OFDM symbol, for above-mentioned two situations, the original position of public resource is all
From the beginning of UE performs first complete OFDM symbol original position after CCA competes resource, root
Send the size and determining of content (instruction information or instruction information and data) according to UE and take one or the most
Individual OFDM symbol.
As shown in Figure 6 b, public resource can also divide according to frequency domain.Its public resource is successful execution
CCA takies the resource of bandwidth or by multiple subcarriers on frequency domain after competing unauthorized carrier resource
The one or more Physical Resource Block PRB constituted, time domain at most can take execution CCA continuously
The next subframe of frame terminates.
Public resource be mainly used for send notification signal so that base station and do not compete successful UE public
Detect and receive this notification signal in resource altogether, in order to obtain the situation that takies of unauthorized carrier wave, reduce base
The loss that real-time blind check of standing brings.
Application example 3
Fig. 7 for specify resource schematic diagram, as shown in Figure 7, it is intended that for transmission notice base station and other
The resource of UE be according to UE perform CCA position depending on, it is intended that resource always in successful execution
After CCA, first OFDM symbol starts to this sub-frame boundary.
The position of CCA is performed in the beginning situation of a subframe for UE, it is intended that resource (as
PUSCH) as shown in Figure 7a.If the position of execution CCA is at the end of a subframe, then specify money
Source is the PUSCH resource in next subframe, as shown in Figure 7b.It is to say, successful contention is to non-
The UE authorizing carrier resource can send an instruction information or instruction information sum in the resource specified
According to, it being used for notifying base station and other UE, which unauthorized carrier wave has been preempted.Optionally, notice institute
Belong to base station and carry out upstream data reception.Equally, base station and other UE also can be in the resource specified detections up
This instruction information.Specify resource effect the same with the effect of public resource, be all to refer to as a transmission
Show the transport vehicle of information.
Application example 4
This example is mainly discussed in detail the generation process performing the instruction information that the successful UE of CCA sends.
Mainly introduce two kinds of instruction information generating modes: one is by normal in amendment LTE PHY
Basic sequence generate required instruction information.The second is to define the indicator sequence that UE sends.
The first process obtaining required instruction information by amendment basic sequence is as follows:
After competing unauthorized carrier wave for UE side, the instruction information of transmission may include that SRS (detection
Reference signal), PSS/SSS (main synchronizing sequence/secondary synchronization sequences) and Preamble (leading) etc.,
These signals are all by basic sequenceObtain through certain process.Therefore main detailed description is satisfied sends out
The sequence sent is carried Cell ID, operator identifier and the basic sequence with information such as frequency multiplexing instructionsRaw
One-tenth process.
Basic sequenceSend the original series of instruction information for UE side, wherein have N number of packet, u table
Show group number u ∈ 0,1 ..., N-1}, v are the basic sequences number in group.Sequence group number u is determined by following formula:
Time slot nsInterior sequence set sequence number u is redirected pattern f by groupgh(ns) and sequential shift pattern fssObtain, i.e.
U=(fgh(ns)+fss) mod N, give f heregh(ns) and fssNew generating mode, if needing in sequence to take
Band Cell ID identifies the most original group and redirects switch open, represents that cell ID instruction is opened in this example,
As described in following formula:
Wherein, the initialization value of pseudo-random sequence c generates with Cell ID value, is:WhereinFor cell ID.
And further, sequence needs additionally carry operator identifier and then can obtain according to the following equation
:
For PUCCH, fssCan obtain with Cell ID and N mould, be:
WhereinFor cell ID.
For PUSCH, sequence can be carried Cell ID and operator identifier, so fssCan by under
Formula obtains:Wherein △ssFor operator identifier, △ss∈ 0,1 ..., m}, m
For operator's number, operator identifier can be known by base station.
For SRS,WhereinFor cell ID.
Described parameter can be differently configured with flexible configuration, and the information carried in indicator sequence is the most different.Enter
One step, if the indicator sequence sent needing carry with frequency Warning Mark (0 or 1), can be used this
The sequence generated is scrambled and a new sequence by individual mark.
Specific in the present embodiment, above-mentioned middle N preferably takes 30, so can continue to use value in standard, but
It is not limited to this value.According to domestic three common big operators, value is 3 to m.Method one is not change
Being replaced on the basis of former formula framework, therefore standardization effort amount is minimum.
Method two: define an indicator sequence.Detailed process is as follows:
Assuming that number is m in UE ID set, i.e. { a0,…,am-1, in Cell ID set, number is n
Individual, i.e. { b0,…,bn-1, in operator collective, number is p, i.e. { c0,c1,…cp}.Optionally, it is assumed that with
Frequently multiplexing identification 0 or 1.According to the different permutation and combination of the element in these three or four set, available
M*n*p or m*n*p*2 sequence.The most each sequence represents a kind of permutation and combination method.Such as: sequence
Row 0 identify UE ID=a0, Cell ID=b0, operator ID=c0, with frequency multiplexing identification 0, the like.
Depending on the length of custom list is according to amount of bandwidth.
The value of m, n, p does not limits, and preferred p can value be 2.
Above two method, according to concrete instruction information needs the content carried different and can be suitable
Modify.The above-mentioned information carried is only for example, and can be not limited to above-mentioned in other embodiments
The information carried.
Application example 5
This example mainly describes in detail after UE competes unauthorized carrier resource, sends the finger described in a upper example
Show that information notice base station and other UE oneself have seized successful carrier wave and the concrete mistake carried out data transmission
Journey, concrete step is as described below:
Step one, performs CCA for UE side, base station triggers or the UE specified on unauthorized carrier wave
Detection operation;
Here, the UE that base station triggers participates in competing on unauthorized carrier wave is included in the predefined cycle ginseng
The UE, the UE receiving UL grant that compete with unauthorized carrier wave or by Paging (paging) message
The UE etc. triggered.These UE can detect on the CCA position of base station notice, and for difference
Frame structure, perform the position of CCA and number be different from.For FBE, perform the position of CCA
Can be at the beginning of a subframe or subframe end position.For LBE (Load Based Equipment,
Equipment based on load), position in subframe, the position of execution CCA is uncertain, and CCA
Number the most indefinite.These can be configured by base station side.
Here, for FBE, the position that above-mentioned UE performs CCA is identical, so there will be these
UE competes the unauthorized carrier resource situation that base station is specified simultaneously.And for LBE, due to each UE
The random back value generated is different, the most only there will be a final successful contention of UE unauthorized to specify
Carrier wave.
Step 2, competes successful UE in step one, send and seize on public resource or appointment resource
The instruction information notice base station of the unauthorized carrier wave of success and other UE, or transmission instruction information and UE are certainly
The upstream data of body.
Public resource described here or appointment resource are the resource introduced in example 2 and example 3, herein
No longer carry out repeated description.UE send instruction information can be SRS, Preamble, PSS/SSS or
Sign etc..Preferably sending SRS signal, corresponding sequence generating mode refers to example 4.
Illustrate and compete successful UE transmission instruction letter on the public resource of definition or appointment resource
Breath or instruction information and data.For FBE structure, described in step one, it is possible that many
Individual UE competes the situation of unauthorized carrier wave simultaneously, and for this situation, these UE are in the public money of definition
By the way of time-division, frequency division or code division, instruction information or instruction letter is carried out on source or appointment resource
Breath and the transmission of data.For LBE, perform CCA every time and only have a UE successful contention to resource,
This UE can public resource or specify send in resource an instruction information or instruction information and self
Data.
Step 3, this base station and neighbouring base station and do not compete successful UE all at public resource or refer to
Determining to detect and receive instruction message in resource, this base station is also performed to the reception of upstream data.
This base station receives this instruction message on public resource or the resource specified and (could be for notice
Or the instruction information measured) or indicate message and data, during resolving, base station solves
The data failure that code UE sends, then base station can only understand subordinate UE success by the message received
The unauthorized carrier wave that competition is arrived.Now, there are two kinds for the treatment of methods base station: the first is by subordinate UE's
Schedule information sends.For the unauthorized carrier resource allowing the UE having data to send in this community arrive in competition
Enterprising line frequency divides multiplexing transmission data.UE side needs after receiving the schedule information that base station sends, ability
Corresponding resource carries out uplink.The second is the n-th subframe before UE performs CCA
Issued uplink scheduling information, UE compete resource time be engraved in n+k (k≤4) subframe before,
Base station starts to receive the data sent from UE side in the n-th+k subframe.As long as at public resource or refer to
Determine to receive in resource unauthorized carrier resource can UE in n+k subframe, all begin through time-division, frequently
Divide or the mode of code division carries out transmitting uplink data.
If it is indicated that the same frequency multiplexing function carried in information is opened, i.e. carry with frequency multiplexing instruction, then
Base station need by X2 mouth broadcast notice neighbouring with other communities under operator can unauthorized carrier wave
Resource, and hold consultation realize UE under different districts data transmission.If do not made with frequency multiplexing function
Can, only in this community, UE can carry out the transmission of data by multiplex mode, and then base station is then taking
The upstream data that subordinate UE sends is received in channel duration.
Additionally, neighbouring different operators base station receives this instruction message, i.e. think that this unauthorized carrier wave is
Through occupied, stop detecting.
For not competing successful UE, public resource or appointment resource detect instruction information, resolves
Its Cell ID judge whether be same community or carry in resolving whether instruction information operator identifier and
With frequency multiplexing instruction.If not competing successful UE to parse instruction information and carry the Cell identical with self
ID, then this UE thinks that specific unauthorized carrier wave can be used, at public resource or specify after resource first
In subframe or performing after CCA detects that the UE of channel idle has sent its data, those can be just
Really parse channel can UE can carry out transmitting uplink data by the way of frequency division multiplexing.If not
Competing successful UE, to parse the Cell ID carried in instruction information different from self, but operator identifier
The same and enable with frequency multiplexing, then these UE it is believed that on specific unauthorized carrier wave resource can use, and
According to being about scheduled on public resource or specifying after resource in first subframe or letter detected performing CCA
After the idle UE in road has sent its data, those can correctly parse channel can UE can pass through
The mode of frequency division multiplexing carries out transmitting uplink data.If not competing successful UE can not parse instruction letter
Cell ID, operator identifier and same frequency multiplexing instruction in breath, then these UE think that channel is unavailable.
For resolving the incorrect UE of instruction information, can process by the following method:
First method: abandon detecting on public resource or appointment resource, but at channel occupancy
Channel Detection is carried out in real time in phase.Mainly in carrying out data transmission on the unauthorized carrier wave competed
UE, the situation that data transmission in advance is complete, channel resource utilization ratio can be improved further.
The channel occupancy phase starts to calculate from performing CCA successful UE transmission Seize ACK message.This UE is at letter
Road takies can carry out a data transfer, in the channel occupancy phase in the public resource in the phase or appointment resource
Unauthorized carrier resource after Nei can also carry out data transmission.
Second method: directly abandon the detection of channel busy within the unauthorized carrier occupancy phase.Do so can
The biggest channel resource can be caused to waste.
Application example 6
Fig. 8 is that this example is competed successful UE and sent the detailed process of SRS signal on public resource and show
It is intended to;
Specific in this example, perform the Seize ACK message (such as instruction information) that the successful UE of CCA sends
On the one hand being used for notifying that base station is the most successfully robbed accounts for specific unauthorized carrier wave, and another aspect is used for base station
Carry out the measurement of up channel.
As shown in Figure 8, the moment started a subframe has the UE of unauthorized carrier wave competition qualification and holds
Row CCA detects, if the UE participating in competition performs CCA success, but the CCA successful moment is not enough
One complete OFDM symbol border, the most preferably sends a Seize ACK message.If competition arrive time
Carve the border being precisely a complete OFDM symbol, then on preferred public resource after CCA
SRS signal is sent by the way of frequency division or code division.It is emphasized that the SRS letter sent here
Number it is not only and to play notice base station road occupying situation, be additionally operable to the up channel matter telling base station to carry out these UE
Measurement, i.e. signals base measure bandwidth is much, the cycle, which subframe etc., such base station will
Receive from competing the SRS signal taken for notice that successfully UE sends, measure each further
UE, to channel conditions between base station, distributes suitable resource and MCS preferably to each UE.
If the position that each UE performs CCA is different, only one of which UE1 performs CCA success,
And have sent the SRS information of correspondence.Do not compete successful UE2 and UE3 at public resource or to specify
Receive and detect the Seize ACK message that UE1 sends in resource.If UE2 receives and detects that UE1 sends
Signal in the Cell ID that carries identical with self, then UE2 sends self SRS letter on public resource
Number, i.e. channel conditions between it and base station of notice base station measurement.And the Cell ID that UE3 detects and self
Difference, but detect and Seize ACK message carries with frequency multiplexing instruction and enable, i.e. UE1 and UE3 is same
The UE of the different districts under operator, then UE3 also sends the SRS letter of self equally on public resource
Number.Whereas if UE2 and UE3 can not correctly resolve Seize ACK message, then UE2 and UE3 or put
Abandon reception, it is believed that this carrier wave is unavailable, stop detection.Within the unauthorized carrier occupancy phase, one is straight
The idle condition of row detection channel.
The most always on public resource the base station of detection it is known that the channel conditions of other UE, it is simple to
According to the channel measurement information reported, issue suitable MCS grade, improve transmission quality.
In order to avoid the website of different system entered within the time that base station and other UE detection receive instruction information
Row resource is seized, and the UE competed can repeat to send Seize ACK message always.
Application example 7
Fig. 9 is that this example uses D2D mechanism to realize UE and notify the schematic diagram of other nodes.
Use D2D mechanism, it is assumed that base station side specifies correspondence can in advance all UE on unauthorized carrier wave
Resource, have preferable X2 interface between this base station and neighbor base station and synchronize preferably, not compete successfully
UE detects on channel (PSSCH) detecting carrier wave busy just to get started at D2D to share.
As it is shown in figure 9, in all UE participating in competition, UE1 is successful in t on unauthorized carrier wave
Competition is to unauthorized carrier wave, and now, UE1 will authorize transmission in the corresponding resource of PSSCH on carrier wave
The instruction information of agreement in advance, so, other UE (such as UE2, UE3) just can receive on PSSCH
To this sequence, thus stop this carrier wave is carried out CCA detection.Meanwhile, this base station and adjacent base station are also
The instruction information of agreement can be detected in PSSCH resource.Since so, UE1 just accounts for the most successfully robbing
The message informing of this unauthorized carrier resource gives other base stations and UE.Meanwhile, successful UE1 is competed
Also need on unauthorized carrier wave, send one for representing channel occupied instruction information, it is to avoid other
Node is seized.
It should be noted that the PSSCH resource in D2D is permissible in each subframe and each time slot
Flexible configuration.
Do so, it is also possible to solve multiple UE and rob the situation accounting for same unauthorized carrier wave simultaneously.Because
Can there is oneself independent resource at each UE of PSSCH, thus without producing conflict, considerably increase
Base station be correctly decoded efficiency.So that base station obtains available unauthorized carrier information.
The above, only presently preferred embodiments of the present invention, it is not intended to limit the protection of the present invention
Scope, all any amendment, equivalent and improvement etc. made within the spirit and principles in the present invention,
Should be included within the scope of the present invention.
Although the embodiment that disclosed herein is as above, but described content only readily appreciates the present invention
And the embodiment used, it is not limited to the present invention.Technology people in any art of the present invention
Member, on the premise of without departing from the spirit and scope that disclosed herein, can be in the form implemented and thin
Any amendment and change is carried out on joint, but the scope of patent protection of the present invention, still must be with appended right
Claim is defined in the range of standard.
Claims (34)
1. the transmission method of a unauthorized resource, it is characterised in that described method includes:
First transmission node detects at the unauthorized carrier resource enterprising line space channel assessment CCA specified,
When the described unauthorized carrier resource free time being detected, public resource or appointment resource send instruction
Information or send instruction information and carry out a data transfer, described instruction information is used for notifying described non-
Carrier resource is authorized to take.
Method the most according to claim 1, it is characterised in that
Described first transmission node includes first terminal.
Method the most according to claim 1, it is characterised in that
Described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes, minimum zone
It it is a complete OFDM symbol.
Method the most according to claim 3, it is characterised in that
Described public resource includes following resource in time domain:
Perform first complete OFDM symbol after CCA success;Or,
Perform starting to the subframe performing CCA from first complete OFDM symbol after CCA success
OFDM symbol in border;Or,
Perform starting to next sub-frame boundary from first complete OFDM symbol after CCA success
In OFDM symbol;
Described public resource includes following resource on frequency domain:
Whole frequency domain resource;Or,
The resource of bandwidth is taken on whole frequency domain;Or,
The one or more Physical Resource Block PRB being made up of multiple subcarriers.
Method the most according to claim 1, it is characterised in that
Described appointment resource is positioned on unauthorized carrier resource, for first after execution CCA success
OFDM symbol starts to present sub-frame to terminate, or performs first subframe after the subframe of CCA place.
Method the most according to claim 5, it is characterised in that
Described appointment resource is Physical Uplink Shared Channel PUSCH resource.
Method the most according to claim 2, it is characterised in that
Described instruction information is additionally operable to judge that described second transmission node whether can for the second transmission node
The unauthorized carrier resource that competition is arrived, including following information: Sounding Reference Signal SRS;Or,
Major-minor synchronizing sequence PSS/SSS;Or, targeting sequencing Preamble;
Described second transmission node includes with one or more in lower node: belonging to described first terminal
One base station, the adjacent base station of described first base station, the described unauthorized carrier resource specified is carried out
CCA detects but does not competes the other-end of unauthorized carrier resource;
Described instruction information comprises following information: cell identity information.
Method the most according to claim 7, it is characterised in that
Described instruction information also comprises following information: operator identifier and/or with frequency multiplexing sign.
Method the most according to claim 8, it is characterised in that
Described instruction information is obtained by basic sequence, and described basic sequence uses following methods to obtain:
Basic sequenceWherein u represents sequence set sequence number, u ∈ 0,1 ..., N-1}, N are packet count, v
It is the basic sequence number in group, time slot nsInterior sequence set sequence number u is obtained by following formula:
U=(fgh(ns)+fss) mod N, wherein fgh(ns) it is that group redirects pattern, fssFor sequential shift pattern;
Described fgh(ns) use following formula to obtain:
Wherein c is pseudo-random sequence, described pseudo-random sequence
Initialization value uses following formula to obtain:WhereinFor cell ID;
Described fssEmploying following methods obtains:
For Physical Uplink Control Channel PUCCH,
For Physical Uplink Shared Channel PUSCH,Wherein △ssFor fortune
Battalion's trade mark is known, △ss∈ 0,1 ..., m}, m are operator's number;
For Sounding Reference Signal SRS,
Method the most according to claim 1, it is characterised in that described method also includes:
Described first transmission node is also authorizing the equipment on carrier wave to send described finger in equipment D2D resource
Show information.
The transmission method of 11. 1 kinds of unauthorized resources, it is characterised in that described method includes:
Second transmission node detects, when instruction information being detected on public resource or appointment resource
Time, judge whether described second transmission node can use described first transmission according to described instruction message content
The unauthorized carrier resource that node is competed carries out data transmission.
12. methods according to claim 11, it is characterised in that
Described first transmission node includes first terminal;
Described second transmission node includes with one or more in lower node: belonging to described first terminal
One base station, the adjacent base station of described first base station, described unauthorized carrier resource has carried out idle letter
Road assessment CCA detects but does not competes the other-end of unauthorized carrier resource.
13. methods according to claim 11, it is characterised in that
Described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes, minimum zone
It it is a complete OFDM symbol;
Described appointment resource is the Physical Uplink Shared Channel PUSCH money being positioned on unauthorized carrier resource
Source.
14. according to the method described in claim 11 or 12 or 13, it is characterised in that
Described second transmission node includes the first base station belonging to described first terminal;
Described judge whether described second transmission node can use described first according to described instruction message content
The unauthorized carrier resource that transmission node is competed carries out data transmission, including:
Described first base station receives described instruction message, it is believed that described first transmission node competition is unauthorized
Carrier resource success, it is possible to use described unauthorized carrier resource carries out data transmission;Or
Described first base station receives to comprise in described instruction message, and described instruction message and refers to frequency multiplexing
Indicating is known, and the most described first base station broadcast notice uses described unauthorized carrier wave with the adjacent base station of operator
Resource, after carrying out resource negotiation, described first base station and the end under the adjacent base station of described same operator
End is carried out data transmission by multiplex mode on described unauthorized carrier resource.
15. according to the method described in claim 11 or 12 or 13, it is characterised in that
Described second transmission node includes the adjacent base station of the first base station belonging to described first terminal;
Described judge whether described second transmission node can use described first according to described instruction message content
The unauthorized carrier resource that transmission node is competed carries out data transmission, including:
Described adjacent base station receives described instruction message, it is judged that the operator identifier in described instruction message
Identical with self, and described instruction message comprises with frequency multiplexing sign, then with same operator under its
He carries out resource negotiation in base station, after carrying out resource negotiation, with other base stations under described same operator in institute
State and carried out data transmission by multiplex mode on unauthorized carrier resource.
16. according to the method described in claim 11 or 12 or 13, it is characterised in that
Described second transmission node is included on described unauthorized carrier resource and has carried out CCA detection but the most competing
Strive the other-end of unauthorized carrier resource;
Described second transmission node detects on public resource or appointment resource, including: described end
Hold and on described public resource or appointment resource, carry out blind check and receive described instruction message, and to receiving
Instruction information resolve;
Described judge whether described second transmission node can use described first according to described instruction message content
The unauthorized carrier resource that transmission node is competed carries out data transmission, including:
If the cell ID in instruction information described in described terminal judges is identical with the cell ID of self,
Then think the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described unauthorized
Carried out data transmission by multiplex mode on carrier resource;Or,
Indicate cell ID in message with self cell ID described in described terminal judges if it is different,
But operator identifier is identical with the operator identifier of self and comprises in described instruction message with frequency multiplexing instruction
Mark, then it is assumed that the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described
Carried out data transmission by multiplex mode on unauthorized carrier resource.
17. methods according to claim 16, it is characterised in that
Described method also includes: when described second transmission node can not correctly resolve instruction information, then abandon
Described public resource or appointment resource carry out blind check, only at the channel occupancy of described unauthorized carrier wave
CCA detection is carried out in real time in phase;Or abandon carrying out within the channel occupancy phase of described unauthorized carrier wave
CCA detects.
18. methods according to claim 16, it is characterised in that
Described terminal is carried out data transmission by multiplex mode on described unauthorized carrier resource, including:
The described terminal first complete OFDM symbol or first after public resource or appointment resource
Individual subframe position carries out data transmission according to pre-scheduling information.
19. methods according to claim 16, it is characterised in that
The unauthorized carrier resource used is carried out data transmission by multiplex mode, including: pre-scheduling is believed
The resource of instruction in breath, or, the terminal room autonomous negotiating carried out data transmission by multiplex mode is good
Resource.
The transmitting device of 20. 1 kinds of unauthorized resources, it is characterised in that described device is positioned at the first transmission
Node, described device includes first detection module and sending module, wherein:
Described first detection module, at the unauthorized carrier resource enterprising line space channel assessment specified
CCA detects;
At described first detection module, described sending module, for detecting that described unauthorized carrier resource is empty
Idle, sends instruction information on public resource or appointment resource or sends instruction information and carry out one
Data transfer, described instruction information is used for notifying that described unauthorized carrier resource takies.
21. devices according to claim 20, it is characterised in that
Described first transmission node includes first terminal.
22. devices according to claim 20, it is characterised in that
Described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes, minimum zone
It it is a complete OFDM symbol;
Described appointment resource is positioned on unauthorized carrier resource, for first after execution CCA success
OFDM symbol starts to present sub-frame to terminate, or performs first subframe after the subframe of CCA place.
23. devices according to claim 21, it is characterised in that
Described instruction information is additionally operable to judge that described second transmission node whether can for the second transmission node
The unauthorized carrier resource that competition is arrived, including following information: Sounding Reference Signal SRS;Or,
Major-minor synchronizing sequence PSS/SSS;Or, targeting sequencing Preamble;
Described second transmission node includes with one or more in lower node: belonging to described first terminal
One base station, the adjacent base station of described first base station, the described unauthorized carrier resource specified is carried out
CCA detects but does not competes the other-end of unauthorized carrier resource;
Described instruction information comprises following information: cell identity information.
24. devices according to claim 23, it is characterised in that
Described instruction information also comprises following information: operator identifier and/or with frequency multiplexing sign.
25. devices according to claim 23, it is characterised in that
Described device also includes indicating information computational module, is used for using basic sequence to obtain described instruction information,
Described instruction information computational module is calculated described basic sequence in the following waysWherein u represents
Sequence set sequence number, u ∈ 0,1 ..., N-1}, N are packet count, and v is the basic sequence number in group, time slot nsIn
Sequence set sequence number u is obtained by following formula:
U=(fgh(ns)+fss) mod N, wherein fgh(ns) it is that group redirects pattern, fssFor sequential shift pattern;
Described fgh(ns) use following formula to obtain:
Wherein c is pseudo-random sequence, described pseudo-random sequence
Initialization value uses following formula to obtain:WhereinFor cell ID;
Described fssEmploying following methods obtains:
For Physical Uplink Control Channel PUCCH,
For Physical Uplink Shared Channel PUSCH,Wherein △ssFor fortune
Battalion's trade mark is known, △ss∈ 0,1 ..., m}, m are operator's number;
For Sounding Reference Signal SRS,
26. devices according to claim 20, it is characterised in that
Described sending module is additionally operable to authorizing the equipment on carrier wave to send described finger in equipment D2D resource
Show information.
The transmitting device of 27. 1 kinds of unauthorized resources, it is characterised in that described device is positioned at the second transmission
Node, described device includes the second detection module and transport module, wherein:
Described second detection module, for detecting on public resource or appointment resource;
Described transport module, for when described second detection module detects instruction information, according to described
Instruction message content judges whether described second transmission node can use described first transmission node to compete
Unauthorized carrier resource carries out data transmission.
28. devices according to claim 27, it is characterised in that
Described first transmission node includes first terminal;
Described second transmission node includes with one or more in lower node: belonging to described first terminal
One base station, the adjacent base station of described first base station, described unauthorized carrier resource has carried out idle letter
Road assessment CCA detects but does not competes the other-end of unauthorized carrier resource.
29. devices according to claim 27, it is characterised in that
Described public resource is positioned on unauthorized carrier resource, and maximum magnitude is two subframes, minimum zone
It it is a complete OFDM symbol;
Described appointment resource is the Physical Uplink Shared Channel PUSCH money being positioned on unauthorized carrier resource
Source.
30. according to the device described in claim 27 or 28 or 29, it is characterised in that
Described second transmission node includes the first base station belonging to described first terminal;
According to described instruction message content, described transport module judges whether described second transmission node can use
The unauthorized carrier resource that described first transmission node is competed carries out data transmission, including:
Described transport module judges that described second detection module receives described instruction message, it is believed that described
One transmission node competes the success of unauthorized carrier resource, it is possible to use described unauthorized carrier resource number
According to transmission;Or
Described transport module judges that described second detection module receives described instruction message and is resolved to described
Comprising in instruction message with frequency multiplexing sign, the most described transport module broadcast notice is with the phase of operator
Adjacent base station uses described unauthorized carrier resource, after carrying out resource negotiation, with the phase of described same operator
Terminal under adjacent base station is carried out data transmission by multiplex mode on described unauthorized carrier resource.
31. according to the device described in claim 27 or 28 or 29, it is characterised in that
Described second transmission node includes the adjacent base station of the first base station belonging to described first terminal;
According to described instruction message content, described transport module judges whether described second transmission node can use
The unauthorized carrier resource that described first transmission node is competed carries out data transmission, including:
Described transport module judges the operator identifier in the instruction message that described second detection module receives
Identical with self, and described instruction message comprises with frequency multiplexing sign, then with same operator under its
He carries out resource negotiation in base station, after carrying out resource negotiation, with other base stations under described same operator in institute
State and carried out data transmission by multiplex mode on unauthorized carrier resource.
32. according to the device described in claim 27 or 28 or 29, it is characterised in that
Described second transmission node is included on described unauthorized carrier resource and has carried out CCA detection but the most competing
Strive the other-end of unauthorized carrier resource;
Described second detection module detects at public resource or specify in resource, including: described the
Two detection modules carry out blind check on described public resource or appointment resource and receive described instruction message, and
The instruction information received is resolved;
According to described instruction message content, described transport module judges whether described second transmission node can use
The unauthorized carrier resource that described first transmission node is competed carries out data transmission, including:
If described transport module judges cell ID in the described instruction information cell ID phase with self
With, then it is assumed that the unauthorized carrier resource can competed with the first transmission node described in multiplexing, described non-
Authorize and carried out data transmission by multiplex mode on carrier resource;Or,
If described transport module judges the cell ID in described instruction message and the cell ID of self not
With, but operator identifier is identical with the operator identifier of self and comprises with multiplexing the most frequently in described instruction message
Sign, then it is assumed that the unauthorized carrier resource can competed with the first transmission node described in multiplexing,
Carried out data transmission by multiplex mode on described unauthorized carrier resource.
33. devices according to claim 32, it is characterised in that
Described second detection module is additionally operable to, when can not correctly resolve instruction information, abandon described public
Carry out blind check in resource or appointment resource, only enter in real time within the channel occupancy phase of described unauthorized carrier wave
Row CCA detects;Or abandon carrying out CCA detection within the channel occupancy phase of described unauthorized carrier wave.
34. devices according to claim 32, it is characterised in that
Described transport module is carried out data transmission by multiplex mode on described unauthorized carrier resource, bag
Include:
Described transport module public resource or specify first complete OFDM symbol after resource or
First subframe position carries out data transmission according to pre-scheduling information.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510145660.3A CN106160967A (en) | 2015-03-30 | 2015-03-30 | The transmission method of a kind of unauthorized resource and device |
PCT/CN2016/076167 WO2016155480A1 (en) | 2015-03-30 | 2016-03-11 | Method and device for transmitting unlicensed resources |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510145660.3A CN106160967A (en) | 2015-03-30 | 2015-03-30 | The transmission method of a kind of unauthorized resource and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106160967A true CN106160967A (en) | 2016-11-23 |
Family
ID=57006468
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510145660.3A Withdrawn CN106160967A (en) | 2015-03-30 | 2015-03-30 | The transmission method of a kind of unauthorized resource and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106160967A (en) |
WO (1) | WO2016155480A1 (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108270804A (en) * | 2016-12-30 | 2018-07-10 | 上海诺基亚贝尔股份有限公司 | For the communication means and communication equipment of the transmission of the duplication of signal |
WO2018196092A1 (en) * | 2017-04-25 | 2018-11-01 | 华为技术有限公司 | Random access method and device |
CN109286988A (en) * | 2017-07-19 | 2019-01-29 | 维沃移动通信有限公司 | Transmission method, equipment and computer readable storage medium under unauthorized frequency range |
CN110115000A (en) * | 2019-03-27 | 2019-08-09 | 北京小米移动软件有限公司 | Channel indicating means and device |
CN110366248A (en) * | 2018-04-04 | 2019-10-22 | 中兴通讯股份有限公司 | Uplink, communication means, device and base station, terminal, storage medium |
CN110622599A (en) * | 2017-05-13 | 2019-12-27 | Lg 电子株式会社 | V2X signal transmission method of terminal having limited transmission capability in multi-carrier system and terminal using the same |
WO2020052673A1 (en) * | 2018-09-14 | 2020-03-19 | 中国信息通信研究院 | Unlicensed frequency band uplink shared channel scheduling method, mobile terminal and network device |
CN110972327A (en) * | 2018-09-28 | 2020-04-07 | 维沃移动通信有限公司 | Signal transmission method and communication equipment based on unauthorized frequency band |
CN111557113A (en) * | 2020-04-07 | 2020-08-18 | 北京小米移动软件有限公司 | Indication method and device for transmission data, communication equipment and storage medium |
CN111656834A (en) * | 2018-04-04 | 2020-09-11 | 中兴通讯股份有限公司 | Method, device and system for preempting uplink transmission resource in wireless communication |
CN111757542A (en) * | 2018-01-12 | 2020-10-09 | Oppo广东移动通信有限公司 | Method and apparatus for signal transmission |
WO2022001144A1 (en) * | 2020-06-30 | 2022-01-06 | 华为技术有限公司 | Inter-system interference avoidance method, device and system |
WO2023001078A1 (en) * | 2021-07-21 | 2023-01-26 | 中兴通讯股份有限公司 | Channel sharing method and device, and storage medium |
CN111656834B (en) * | 2018-04-04 | 2024-05-31 | 中兴通讯股份有限公司 | Method, apparatus and system for preempting uplink transmission resources in wireless communication |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112737753B (en) * | 2017-06-09 | 2022-02-15 | 华为技术有限公司 | Signal transmission method, related equipment and system |
GB2576198B (en) * | 2018-08-09 | 2020-07-29 | Tcl Communication Ltd | Transmission resource sharing |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130012134A1 (en) * | 2011-07-07 | 2013-01-10 | Cisco Technology, Inc. | Dynamic Clear Channel Assessment Using Spectrum Intelligent Interference Nulling |
WO2015023909A2 (en) * | 2013-08-16 | 2015-02-19 | Qualcomm Incorporated | Uplink procedures for lte/lte-a communication systems with unlicensed spectrum |
CN104486013A (en) * | 2014-12-19 | 2015-04-01 | 宇龙计算机通信科技(深圳)有限公司 | Channel detection method, channel detection system, terminal and base station |
CN106034018A (en) * | 2015-03-17 | 2016-10-19 | 中兴通讯股份有限公司 | Carrier wave multiplexing method and site thereof |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130203429A1 (en) * | 2010-10-13 | 2013-08-08 | Nokia Corporation | Method and apparatus for enabling scheduled transmission |
WO2016015318A1 (en) * | 2014-07-31 | 2016-02-04 | 华为技术有限公司 | Data transmission method and communication device |
CN105307180B (en) * | 2015-09-25 | 2018-09-14 | 宇龙计算机通信科技(深圳)有限公司 | A kind of data transmission method and device based on LAA systems |
-
2015
- 2015-03-30 CN CN201510145660.3A patent/CN106160967A/en not_active Withdrawn
-
2016
- 2016-03-11 WO PCT/CN2016/076167 patent/WO2016155480A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130012134A1 (en) * | 2011-07-07 | 2013-01-10 | Cisco Technology, Inc. | Dynamic Clear Channel Assessment Using Spectrum Intelligent Interference Nulling |
WO2015023909A2 (en) * | 2013-08-16 | 2015-02-19 | Qualcomm Incorporated | Uplink procedures for lte/lte-a communication systems with unlicensed spectrum |
CN104486013A (en) * | 2014-12-19 | 2015-04-01 | 宇龙计算机通信科技(深圳)有限公司 | Channel detection method, channel detection system, terminal and base station |
CN106034018A (en) * | 2015-03-17 | 2016-10-19 | 中兴通讯股份有限公司 | Carrier wave multiplexing method and site thereof |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108270804A (en) * | 2016-12-30 | 2018-07-10 | 上海诺基亚贝尔股份有限公司 | For the communication means and communication equipment of the transmission of the duplication of signal |
CN108270804B (en) * | 2016-12-30 | 2021-02-09 | 上海诺基亚贝尔股份有限公司 | Communication method and communication device for the transmission of a replica of a signal |
WO2018196092A1 (en) * | 2017-04-25 | 2018-11-01 | 华为技术有限公司 | Random access method and device |
US10999875B2 (en) | 2017-04-25 | 2021-05-04 | Huawei Technologies Co., Ltd. | Random access method and apparatus |
CN109314998A (en) * | 2017-04-25 | 2019-02-05 | 华为技术有限公司 | A kind of accidental access method and device |
CN109314998B (en) * | 2017-04-25 | 2020-12-15 | 华为技术有限公司 | Random access method and device |
CN110622599A (en) * | 2017-05-13 | 2019-12-27 | Lg 电子株式会社 | V2X signal transmission method of terminal having limited transmission capability in multi-carrier system and terminal using the same |
CN110622599B (en) * | 2017-05-13 | 2022-12-27 | Lg 电子株式会社 | V2X signal transmission method of terminal having limited transmission capability in multi-carrier system and terminal using the same |
CN109286988B (en) * | 2017-07-19 | 2021-01-08 | 维沃移动通信有限公司 | Transmission method and device under unlicensed frequency band and computer-readable storage medium |
CN109286988A (en) * | 2017-07-19 | 2019-01-29 | 维沃移动通信有限公司 | Transmission method, equipment and computer readable storage medium under unauthorized frequency range |
CN111757542A (en) * | 2018-01-12 | 2020-10-09 | Oppo广东移动通信有限公司 | Method and apparatus for signal transmission |
US11622383B2 (en) | 2018-01-12 | 2023-04-04 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method and device for channel sensing and signal transmission |
US11419148B2 (en) | 2018-01-12 | 2022-08-16 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method and device for channel sensing and signal transmission |
CN111656834A (en) * | 2018-04-04 | 2020-09-11 | 中兴通讯股份有限公司 | Method, device and system for preempting uplink transmission resource in wireless communication |
CN110366248A (en) * | 2018-04-04 | 2019-10-22 | 中兴通讯股份有限公司 | Uplink, communication means, device and base station, terminal, storage medium |
CN110366248B (en) * | 2018-04-04 | 2024-04-30 | 中兴通讯股份有限公司 | Uplink transmission and communication method and device, base station, terminal and storage medium |
CN111656834B (en) * | 2018-04-04 | 2024-05-31 | 中兴通讯股份有限公司 | Method, apparatus and system for preempting uplink transmission resources in wireless communication |
WO2020052673A1 (en) * | 2018-09-14 | 2020-03-19 | 中国信息通信研究院 | Unlicensed frequency band uplink shared channel scheduling method, mobile terminal and network device |
CN110972327A (en) * | 2018-09-28 | 2020-04-07 | 维沃移动通信有限公司 | Signal transmission method and communication equipment based on unauthorized frequency band |
CN110115000A (en) * | 2019-03-27 | 2019-08-09 | 北京小米移动软件有限公司 | Channel indicating means and device |
US11943173B2 (en) | 2019-03-27 | 2024-03-26 | Beijing Xiaomi Mobile Software Co., Ltd. | Channel indication methods and apparatuses |
CN111557113A (en) * | 2020-04-07 | 2020-08-18 | 北京小米移动软件有限公司 | Indication method and device for transmission data, communication equipment and storage medium |
CN111557113B (en) * | 2020-04-07 | 2023-09-19 | 北京小米移动软件有限公司 | Indication method, device, communication equipment and storage medium for transmitting data |
WO2022001144A1 (en) * | 2020-06-30 | 2022-01-06 | 华为技术有限公司 | Inter-system interference avoidance method, device and system |
WO2023001078A1 (en) * | 2021-07-21 | 2023-01-26 | 中兴通讯股份有限公司 | Channel sharing method and device, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2016155480A1 (en) | 2016-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106160967A (en) | The transmission method of a kind of unauthorized resource and device | |
CN105684488B (en) | A kind of data transmission method and communication equipment | |
CN105848165B (en) | Method, system, base station and user equipment for using unauthorized resources | |
CN104968052B (en) | Configuring method, configuring system, apparatus, receiving method, receiving system, and terminal | |
WO2017014606A1 (en) | Method and device for communication in narrow band system | |
EP3178172B1 (en) | Synchronization signals for device-to-device communications | |
US9609503B2 (en) | Method and device for detecting and generating synchronization signal for device-to-device wireless communication | |
CN104301273B (en) | Method for transmitting and receiving signal by using unauthorized carrier, base station and user equipment | |
ES2663854T3 (en) | Communications device and procedures | |
WO2017125009A1 (en) | Method and apparatus for sending sounding reference signal | |
JP6736043B2 (en) | base station | |
CN107734560A (en) | Method for transmitting signals, communication equipment and communication system | |
CN104782217B (en) | Information transferring method, base station and user equipment | |
WO2016178515A1 (en) | Signal receiving method and apparatus in device-to-device wireless communication | |
CN106453181A (en) | Information processing method, device and system | |
CN106376050A (en) | Setting/determining method and device of subcarrier spacing of reference numerology, base station and terminal | |
CN103686676A (en) | Communication method and device of device-to-device communication system and system | |
CN107836092A (en) | Low latency physical uplink control channel with dispatch request and channel condition information | |
CN106658584A (en) | Signal sending and receiving and interference measurement methods and equipment thereof | |
EP3240223B1 (en) | Method and device for resource management in an unlicensed carrier | |
US11696314B2 (en) | Communication system | |
CN105099639A (en) | Method and device for transmitting control channel and communication node | |
CN107770872B (en) | Data transmission method and equipment on unlicensed spectrum | |
CN107370589A (en) | Method for transmitting signals, device and user equipment | |
CN104796367B (en) | A kind of sending method of synchronizing information, detection method and user equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20161123 |
|
WW01 | Invention patent application withdrawn after publication |