CN112073975B - Unauthorized spectrum edge sharing method and device for multi-hop communication between terminals - Google Patents

Unauthorized spectrum edge sharing method and device for multi-hop communication between terminals Download PDF

Info

Publication number
CN112073975B
CN112073975B CN202010821431.XA CN202010821431A CN112073975B CN 112073975 B CN112073975 B CN 112073975B CN 202010821431 A CN202010821431 A CN 202010821431A CN 112073975 B CN112073975 B CN 112073975B
Authority
CN
China
Prior art keywords
terminals
terminal
time
frequency resource
channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010821431.XA
Other languages
Chinese (zh)
Other versions
CN112073975A (en
Inventor
宋令阳
张泓亮
王鹏飞
边凯归
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University
Original Assignee
Peking University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University filed Critical Peking University
Priority to CN202010821431.XA priority Critical patent/CN112073975B/en
Publication of CN112073975A publication Critical patent/CN112073975A/en
Application granted granted Critical
Publication of CN112073975B publication Critical patent/CN112073975B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0446Resources in time domain, e.g. slots or frames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0453Resources in frequency domain, e.g. a carrier in FDMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/53Allocation or scheduling criteria for wireless resources based on regulatory allocation policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an unauthorized spectrum edge sharing method and device for multi-hop communication between terminals, electronic equipment and a storage medium. The method comprises the following steps: receiving sensing results of a plurality of first terminals in a cell to unauthorized channels, acquiring an interference value of each unauthorized channel in the sensing results, selecting the unauthorized channel with the minimum interference value as a target unauthorized channel, dividing the target unauthorized channel into a plurality of sub-channels, combining time domain resources to obtain a plurality of time frequency resources, and distributing the time frequency resources to the plurality of first terminals according to the utility of each first terminal on each time frequency resource. By selecting the unauthorized channel with the minimum interference value as the target unauthorized channel and allocating the time-frequency resources to the plurality of first terminals according to the utility of each first terminal on each time-frequency resource, the upper limit of users supported by the communication system can be improved and the sum of the transmission rates of all LTE users and multi-hop D2D users can be increased under the condition of reducing the interference to the Wi-Fi system.

Description

Unauthorized spectrum edge sharing method and device for multi-hop communication between terminals
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an unlicensed spectrum edge sharing method and apparatus for multi-hop communications between terminals.
Background
In a hot spot area with a large number of multi-hop (multi-hop D2D) communications among terminals, the authorized spectrum of the existing cellular network may not meet the data requirement of the hot spot area, while in the related art, for example, Wi-Fi Direct technology, which implements Wi-Fi Direct between different devices to transmit data, it can only build a network through IEEE802.11 protocol. In this way, the user can only establish the D2D connection by one user acting as an access point and another user accessing.
In the Wi-Fi direct technology, cellular data traffic is unloaded by utilizing Wi-Fi direct data transmission, however, an IEEE802.11 protocol used by the Wi-Fi direct is a best-effort service and cannot guarantee that a user can access the Wi-Fi direct technology, if other Wi-Fi users are in use on a current channel, the access cannot be performed, so that the service quality cannot be guaranteed, and the cellular and Wi-Fi systems are lack of coordination, so that the data transmission of the scheme is generally low in efficiency.
Disclosure of Invention
The embodiment of the invention provides an unauthorized spectrum edge sharing method and device for multi-hop communication between terminals, aiming at improving the upper limit of users which can be supported by using a cellular spectrum to carry out LTE and D2D communication and increasing the sum of the transmission rates of all LTE users and multi-hop D2D users.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides an unlicensed spectrum edge sharing method for multi-hop communication between terminals, which is applied to a base station, and in a duty cycle, the following steps are performed:
receiving sensing results of a plurality of first terminals to an unauthorized channel in a cell, wherein the first terminals comprise multi-hop communication user terminals and/or LTE user terminals;
obtaining the interference value of each unauthorized channel in the sensing result, and selecting the unauthorized channel with the minimum interference value as a target unauthorized channel;
aggregating the target unauthorized channel with the original channel of each first terminal respectively so that each first terminal can access the target unauthorized channel;
when the plurality of first terminals are detected to be accessed into the target unauthorized channel, dividing the target unauthorized channel into a plurality of sub-channels, and combining time domain resources to obtain a plurality of time frequency resources;
allocating time-frequency resources to the plurality of first terminals according to the utility size of each first terminal on each time-frequency resource to obtain a time-frequency resource allocation strategy;
and sending the time frequency resource allocation strategy to the first terminals so that the first terminals perform data transmission according to the time frequency resource allocation strategy.
Optionally, the duty cycle comprises at least: a channel selection period and a first sensing transmission period, wherein the first sensing transmission period is used for data transmission of the first terminal;
if the first terminal is a multi-hop communication user terminal, the first sensing transmission period is all periods except the channel selection period in the duty cycle;
if the first terminal is an LTE user terminal, the first sensing transmission period is all periods except the channel selection period and a reserved subframe in the duty cycle, the reserved subframe is used for reserving a second terminal of a target unauthorized channel for data transmission, and the second terminal is a Wi-Fi user terminal.
Optionally, allocating time-frequency resources to the plurality of first terminals according to the utility size of each first terminal on each time-frequency resource to obtain a time-frequency resource allocation strategy, including the following steps:
step 1: acquiring the transmission rate of each first terminal on each time-frequency resource of a target unauthorized channel, and establishing a bias list of each first terminal, wherein the bias list of each first terminal comprises a plurality of time-frequency resources, and the time-frequency resources in the bias list are sequentially arranged from large to small according to the transmission rate;
step 2: sequentially matching each first terminal which does not reach the time domain resource matching threshold to the first time frequency resource in the corresponding bias list;
and step 3: if the first time frequency resource does not reach the user matching threshold, establishing a matching relation between the first terminal and the first time frequency resource;
and 4, step 4: if the first time-frequency resource reaches a user matching threshold, but the sum rate of the first terminals is larger than that of the first terminals in the current matching relationship by establishing the matching relationship between the first terminals and the first time-frequency resource, establishing the matching relationship between the first terminals and the first time-frequency resource to replace the current matching relationship, otherwise, failing to establish the matching relationship, and keeping the current matching relationship;
and 5: after all the first terminals which do not reach the time domain resource matching threshold are sequentially matched with the first time frequency resource in the corresponding bias list, the current matching relation between the first terminal corresponding to the target unauthorized channel and the time frequency resource is obtained;
step 6: updating a bias list of each first terminal according to the current matching relation between the first terminal corresponding to the target unauthorized channel and the time-frequency resource;
and 7: and (5) repeatedly executing the step (2) to the step (6) until all the first terminals reach the time domain resource matching threshold, and obtaining a time frequency resource allocation strategy.
Optionally, the method further comprises: the method comprises the steps that an aggressive strategy and a friendly strategy are adopted, the aggressive strategy is provided with a first preset value, the friendly strategy is provided with a second preset value, and the first preset value is larger than the second preset value;
and under the aggressive strategy, allowing the first terminals with the number within the first preset value to perform data transmission on the target unauthorized channel, and under the friendly strategy, allowing the first terminals with the number within the second preset value to perform data transmission on the target unauthorized channel.
In a second aspect, an embodiment of the present invention provides an unlicensed spectrum edge sharing apparatus for multi-hop communication between terminals, including:
the receiving module is used for receiving sensing results of a plurality of first terminals to an unauthorized channel in a cell, wherein the first terminals comprise multi-hop communication user terminals and/or LTE user terminals;
the selection module is used for acquiring the interference value of each unauthorized channel in the sensing result and selecting the unauthorized channel with the minimum interference value as a target unauthorized channel;
the aggregation module is used for aggregating the target unauthorized channel with an original channel of each first terminal respectively so as to enable each first terminal to access the target unauthorized channel;
an obtaining module, configured to, after it is detected that the plurality of first terminals access the target unlicensed channel, divide the target unlicensed channel into a plurality of sub-channels, and obtain a plurality of time-frequency resources in combination with time-domain resources;
the distribution module is used for distributing the time frequency resources to the plurality of first terminals according to the utility size of each first terminal on each time frequency resource to obtain a time frequency resource distribution strategy;
a sending module, configured to send the time-frequency resource allocation policy to the plurality of first terminals, so that the plurality of first terminals perform data transmission according to the time-frequency resource allocation policy.
Optionally, the duty cycle comprises at least: a channel selection period and a first sensing transmission period, wherein the first sensing transmission period is used for data transmission of the first terminal;
if the first terminal is a multi-hop communication user terminal, the first sensing transmission period is all periods except the channel selection period in the duty cycle;
if the first terminal is an LTE user terminal, the first sensing transmission period is all periods except the channel selection period and a reserved subframe in the duty cycle, the reserved subframe is used for reserving a second terminal of a target unauthorized channel for data transmission, and the second terminal is a Wi-Fi user terminal.
Optionally, the allocation module includes:
a first establishing submodule, configured to perform step 1: acquiring the transmission rate of each first terminal on each time-frequency resource of a target unauthorized channel, and establishing a bias list of each first terminal, wherein the bias list of each first terminal comprises a plurality of time-frequency resources, and the time-frequency resources in the bias list are sequentially arranged from large to small according to the transmission rate;
a matching sub-module for performing step 2: sequentially matching each first terminal which does not reach the time domain resource matching threshold to the first time frequency resource in the corresponding bias list;
a second establishing submodule, configured to perform step 3: if the first time frequency resource does not reach the user matching threshold, establishing a matching relation between the first terminal and the first time frequency resource;
a third establishing submodule, configured to perform step 4: if the first time-frequency resource reaches a user matching threshold, but the sum rate of the first terminals is larger than that of the first terminals in the current matching relationship by establishing the matching relationship between the first terminals and the first time-frequency resource, establishing the matching relationship between the first terminals and the first time-frequency resource to replace the current matching relationship, otherwise, failing to establish the matching relationship, and keeping the current matching relationship;
a first obtaining submodule, configured to perform step 5: after all the first terminals which do not reach the time domain resource matching threshold are sequentially matched with the first time frequency resource in the corresponding bias list, the current matching relation between the first terminal corresponding to the target unauthorized channel and the time frequency resource is obtained;
an update submodule, configured to perform step 6: updating a bias list of each first terminal according to the current matching relation between the first terminal corresponding to the target unauthorized channel and the time-frequency resource;
a second obtaining submodule, configured to perform step 7: and (5) repeatedly executing the step (2) to the step (6) until all the first terminals reach the time domain resource matching threshold, and obtaining a time frequency resource allocation strategy.
Optionally, the apparatus further comprises:
the strategy execution module is used for executing an aggressive strategy and a friendly strategy, the aggressive strategy is provided with a first preset value, the friendly strategy is provided with a second preset value, and the first preset value is larger than the second preset value;
and the strategy execution module is used for allowing the first terminals with the number within the first preset value to perform data transmission on the target unauthorized channel under the aggressive strategy, and allowing the first terminals with the number within the second preset value to perform data transmission on the target unauthorized channel under the friendly strategy.
In a third aspect, an embodiment of the present invention additionally provides an electronic device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the unlicensed spectrum edge sharing method for multi-hop communication between terminals according to the first aspect.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements the steps of the unlicensed spectrum edge sharing method for multi-hop communication between terminals according to the first aspect.
In the embodiment of the invention, the sensing result of a plurality of first terminals in a cell to an unauthorized channel is received, the interference value of each unauthorized channel in the sensing result is obtained, the unauthorized channel with the minimum interference value is selected as a target unauthorized channel, the target unauthorized channel is aggregated with the original channel of each first terminal respectively, so that each first terminal can access the target unauthorized channel, when detecting that a plurality of first terminals access a target unauthorized channel, dividing the target unauthorized channel into a plurality of sub-channels, and combining time domain resources to obtain a plurality of time frequency resources, and allocating time-frequency resources to the plurality of first terminals according to the utility size of each first terminal on each time-frequency resource to obtain a time-frequency resource allocation strategy, and sending the time-frequency resource allocation strategy to the plurality of first terminals so that the plurality of first terminals execute data transmission according to the time-frequency resource allocation strategy. By selecting the unauthorized channel with the minimum interference value as the target unauthorized channel and allocating the time-frequency resources to the plurality of first terminals according to the utility size of each first terminal on each time-frequency resource for data transmission of the first terminals, the upper limit of users supported by LTE and D2D communication by simply using a cellular frequency spectrum can be improved and the sum of the transmission rates of all LTE users and multi-hop D2D users can be increased under the condition of reducing the interference to a Wi-Fi system.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without inventive labor.
Fig. 1 is a schematic view of an application scenario of an unlicensed spectrum edge sharing method for multi-hop communication between terminals according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating steps of an unlicensed spectrum edge sharing method for multi-hop communication between terminals according to an embodiment of the present invention;
fig. 3 is a diagram illustrating an example of a time domain resource matching process of an unlicensed spectrum edge sharing method for multi-hop communication between terminals according to an embodiment of the present invention;
fig. 4 is an exemplary diagram of a time domain resource matching result of an unlicensed spectrum edge sharing method for multi-hop communication between terminals according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating an unlicensed spectrum edge sharing method for multi-hop communication between terminals according to an embodiment of the present invention;
fig. 6 is a schematic diagram of an unlicensed spectrum edge sharing apparatus for multi-hop communication between terminals according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device in an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Before specifically describing the technical solution of the present invention, terms related to the present invention will be explained.
D2D:
English is called as a whole: device to Device
Chinese interpretation: the terminal direct communication refers to a mode that terminals directly communicate through multiplexing cellular frequency bands without a base station, and a D2D user can transmit data in a multi-hop mode.
Multi-hop D2D users are allowed to use a multiplexing mode in both licensed and unlicensed spectrum. That is, multiple multi-hop D2D users are able to transmit on a licensed or unlicensed sub-channel that is already occupied by LTE users. Therefore, the simultaneous sub-channel allocation to D2D and LTE users can effectively avoid interference to improve the overall performance of the system.
LTE:
English is called as a whole: long Term Evolution
Chinese interpretation: long term evolution (lte) is a cellular technology used in fourth generation (4G) mobile communications.
Duty cycle: the period for which the D2D and LTE users attempt to access the unlicensed frequency band includes at least two parts, namely channel selection and sensing transmission, and channel access is reselected at the beginning of each duty cycle.
Fig. 1 is a schematic view of an application scenario of an unlicensed spectrum edge sharing method for multi-hop communication between terminals in an embodiment of the present invention. As shown in fig. 1, there are three types of users under the coverage of the base station, which are LTE users, multi-hop D2D users and Wi-Fi users, respectively. The respective characteristics of the three types of users are as follows:
1) an LTE user: cellular and unlicensed frequency bands may be utilized for communication and data transmission, communicating with a base station according to the LTE communication protocol. However, in a dense network, when using unlicensed frequency band communication, reserved subframes are reserved for Wi-Fi users during the duty cycle.
2) Multi-hop D2D user: the cellular frequency band and the unauthorized frequency band used by the LTE user can be multiplexed for communication and data transmission, and multi-hop communication between terminals is carried out without passing through a base station. When communication is performed using the unlicensed band, data transmission can be performed using the entire duty cycle.
3) Wi-Fi users: communications are conducted in accordance with the IEEE802.11 protocol using unlicensed frequency bands.
Fig. 2 is a flowchart of steps of an unlicensed spectrum edge sharing method for multi-hop communication between terminals according to an embodiment of the present invention, and as shown in fig. 2, the method is applied to a base station, and performs the following steps in a duty cycle:
step S201: and receiving the sensing result of a plurality of first terminals to an unauthorized channel in a cell, wherein the first terminals comprise multi-hop communication user terminals and/or LTE user terminals.
In this embodiment, the first terminals are a multi-hop D2D user terminal and an LTE user terminal, and the multiple first terminals in the coverage area of the base station sense an unlicensed channel in the coverage area of the base station, where the unlicensed channel may be an unlicensed channel used by a Wi-Fi user terminal. The plurality of first terminals count the perceived unauthorized channels and send the counted results to the base station, and the base station receives the perceived results of the plurality of first terminals to the unauthorized channels in the cell so as to select a target unauthorized channel for data transmission of the plurality of first terminals.
Step S202: and acquiring the interference value of each unauthorized channel in the sensing result, and selecting the unauthorized channel with the minimum interference value as a target unauthorized channel.
In this embodiment, after obtaining the sensing results of the plurality of first terminals, the base station calculates the interference values of the plurality of unauthorized channels in the sensing results, specifically, the base station may obtain the communication quality of each WiFi user terminal from the WiFi AP, and obtain the number of interfered WiFi users on each unauthorized channel according to the communication qualities of the plurality of WiFi user terminals, so as to obtain the interference value of each unauthorized channel, where the interference value is proportional to the number of interfered WiFi users, and the larger the number of interfered WiFi users, the larger the interference value. The base station selects the unlicensed channel with the minimum interference value as a target unlicensed channel for data transmission of the plurality of first terminals.
Step S203: and aggregating the target unauthorized channel with the original channel of each first terminal respectively so as to enable each first terminal to access the target unauthorized channel.
In this embodiment, the base station aggregates the selected target unauthorized channel with the original channel of each first terminal, specifically, the carrier aggregation method is used to aggregate the channels, if the first terminal is an LTE user terminal, the target unauthorized channel and the original channel of the LTE user terminal are subjected to carrier aggregation, and if the first terminal is a multi-hop communication user terminal, the target unauthorized channel and the original channel multiplexed by the multi-hop communication user terminal are subjected to carrier aggregation, so that each first terminal can access the target unauthorized channel and transmit data.
Step S204: and when the plurality of first terminals are detected to be accessed into the target unauthorized channel, dividing the target unauthorized channel into a plurality of sub-channels, and combining time domain resources to obtain a plurality of time frequency resources.
In this embodiment, after the base station detects that a plurality of first terminals access the target unlicensed channel, the target unlicensed channel is divided into a plurality of sub-channels so as to simultaneously transmit data to the plurality of first terminals, the time domain resource of the whole duty cycle includes a time domain resource for data transmission, the time domain resource for data transmission is divided into a plurality of data transmission sub-cycles, and a plurality of time-frequency resources are obtained by combining the plurality of sub-channels, so that the plurality of time-frequency resources are allocated to the plurality of first terminals accessing the target unlicensed channel.
Step S205: and allocating the time frequency resources to the plurality of first terminals according to the utility size of each first terminal on each time frequency resource to obtain a time frequency resource allocation strategy.
In this embodiment, the base station calculates the utility size of each first terminal on each time-frequency resource, and specifically, the utility size of each first terminal on each time-frequency resource may be calculated by using a shannon formula, which is not described in detail herein. And allocating time-frequency resources to the plurality of first terminals according to the utility size of each first terminal on each time-frequency resource to obtain a time-frequency resource allocation strategy so as to increase the sum of the transmission rates of all LTE users and multi-hop D2D users.
In a possible embodiment, the step S205 includes the following sub-steps:
step S205-1: the method comprises the steps of obtaining the transmission rate of each first terminal on each time-frequency resource of a target unauthorized channel, and establishing a bias list of each first terminal, wherein the bias list of each first terminal comprises a plurality of time-frequency resources, and the time-frequency resources in the bias list are sequentially arranged from large to small according to the transmission rate.
In this embodiment, the transmission rate of each first terminal on each time-frequency resource may be obtained through a simulation calculation, so as to establish a bias list of each first terminal, where the first terminal is a terminal accessing a target unlicensed channel.
The bias list of each first terminal comprises a plurality of time-frequency resources, and the time-frequency resources in the bias list are sequentially arranged from large to small according to the transmission rate.
Step S205-2: and sequentially matching each first terminal which does not reach the time domain resource matching threshold to the first time frequency resource in the corresponding bias list.
In this embodiment, in order to make the transmission rate of the first terminal on the allocated time-frequency resources as large as possible, during matching, each first terminal that does not reach the time-domain resource matching threshold may be sequentially matched with the first time-frequency resource in the corresponding bias list. Specifically, the time domain resource matching threshold of each first terminal may be set to 3, and when the number of time domain resource matches of each first terminal does not exceed 3, the base station may match the time domain resource with the first time frequency resource in the corresponding bias list. Each first terminal only matches one time frequency resource each time, and the next first terminal matches the first time frequency resource in the bias list corresponding to the next first terminal.
Step S205-3: and if the first time frequency resource does not reach the user matching threshold, establishing the matching relation between the first terminal and the first time frequency resource.
In this embodiment, each time-frequency resource is provided with a user matching threshold, and specifically, the user matching threshold of each time-frequency resource may be set to 2, that is, each time-frequency resource may match 2 first terminals at most, and if the first time-frequency resource matching the first terminal does not reach the user matching threshold, a matching relationship between the first terminal and the first time-frequency resource in the bias list corresponding to the first terminal is established.
Step S205-4: if the first time-frequency resource reaches a user matching threshold, but the establishment of the matching relationship between the first terminal and the first time-frequency resource enables the sum rate of the first terminals to be larger than that of the first terminals in the current matching relationship, the establishment of the matching relationship between the first terminal and the first time-frequency resource is performed to replace the current matching relationship, otherwise, the establishment of the matching relationship is failed, and the current matching relationship is maintained.
In this embodiment, if the first time-frequency resource has reached the user matching threshold, but the matching relationship between the first terminal and the first time-frequency resource is established, so that the summation rate of the plurality of first terminals corresponding to the target unlicensed channel is greater than the summation rate of the plurality of first terminals in the current matching relationship, then a matching relationship between the first terminal and the first time frequency resource is established to replace the current matching relationship, if the current matching relationship is multiple, but the establishment of the matching relationship between the first terminal and the first time-frequency resource can make the sum rate of the plurality of first terminals corresponding to the target unauthorized channel greater than the sum rate of the plurality of first terminals corresponding to at least one matching relationship in the current matching relationship, then a matching relationship between the first terminal and the first time-frequency resource is established to replace the matching relationship which minimizes the sum rate of the plurality of first terminals in the current matching relationship.
Wherein the sum rate is the sum of the transmission rates of a plurality of first terminals accessing the target unlicensed channel.
Step S205-5: and after all the first terminals which do not reach the time domain resource matching threshold are sequentially matched with the first time frequency resource in the corresponding bias list, obtaining the current matching relation between the first terminal corresponding to the target unauthorized channel and the time frequency resource.
In this embodiment, all the first terminals that do not reach the time domain resource matching threshold are sequentially matched with the first time frequency resource in the corresponding bias list, and after each first terminal that does not reach the time domain resource matching threshold completes one matching, a round of matching is completed, so as to obtain the current matching relationship between the first terminal and the time frequency resource in the target unlicensed channel.
Step S205-6: and updating the bias list of each first terminal according to the current matching relation between the first terminal corresponding to the target unauthorized channel and the time frequency resource.
In this embodiment, after each round of matching is completed, the bias list of each first terminal is updated according to the current matching relationship between each first terminal and the time-frequency resource, and the time-frequency resource corresponding to each first terminal successfully matched during matching is deleted from the bias list corresponding to the first terminal.
Step S205-7: and (4) repeatedly executing the step (S205-2) to the step (S205-6) until all the first terminals reach the time domain resource matching threshold, and obtaining a time frequency resource allocation strategy.
In this embodiment, the steps S205-2 to S205-6 are repeatedly executed, and each first terminal that does not reach the time domain resource matching threshold is sequentially matched with the first time frequency resource in the updated bias list corresponding to the first terminal until all the first terminals reach the time domain resource matching threshold, so as to finally obtain the time frequency resource allocation policy corresponding to the target unlicensed channel.
By the method, the time-frequency resource allocation corresponding to each target unauthorized channel can be more reasonable, the upper limit of users supported by LTE and D2D communication by simply using cellular frequency spectrum is improved, and the sum of the transmission rates of all LTE users and multi-hop D2D users is increased.
Fig. 3 is a diagram illustrating an example of a time domain resource matching process of an unlicensed spectrum edge sharing method for multi-hop communication between terminals according to an embodiment of the present invention. Fig. 4 is an exemplary diagram of a time domain resource matching result of an unlicensed spectrum edge sharing method for multi-hop communication between terminals in an embodiment of the present invention.
As shown in FIGS. 3 and 4, V1, V2, and V3 are first user terminals, W1,1、W1,2、W2,1、W2,2、W3,1And W3,2For time frequency resources, assuming that the user matching threshold of each time frequency resource is 2, the time domain resource matching threshold of each first terminal is 3, and the previous rounds of time frequency resource matching are performed, and the obtained current matching relationship is as follows: V1-W1,2、V2-W1,1、V2-W1,2、V2-W3,1、V3-W2,2And V3-W3,2The bias list of V1 is: w3,2、W2,1、W2,2、W1,1And W3,1The bias list of V3 is: w1,2、W3,1、W1,1And W2,1Since the first terminal that has reached the time domain resource matching threshold does not perform time domain resource matching any more, the bias list of the first terminal is an empty set, and here, V2 has reached the time domain resource matching threshold and does not perform time domain resource matching any more, so the bias list of V2 is an empty set. When a new round of time domain resource matching starts, each first terminal which does not reach the time domain resource matching threshold is sequentially matched with the first time frequency resource in the corresponding bias list, that is, as shown by a dotted line in fig. 3, V1 and W are matched3,2Matching is performed, and V3 is matched with W1,2Match is made because of W1,2Has reached the user match threshold, but W1,2Service V3 is able to get a larger sum rate than service V2, so the dematching relationship V2-W1,2Establishing a matching relationship V3-W1,2And W is3,2If the user matching threshold is not reached, establishing a matching relation V1-W3,2Thus, the time-frequency resource matching result in fig. 4 is obtained: V1-W1,2、V1-W3,2、V2-W1,1、V2-W3,1、V3-W1,2、V3-W2,2And V3-W3,2And the updated bias according to the obtained time-frequency resource matching resultThe list is: the bias list for V1 is: w2,1、W2,2、W1,1And W3,1The bias list of V2 is: w2,1、W3,2And W2,2Since V3 has reached the time domain resource matching threshold and no more time domain resource matching is performed, the bias list of V3 is an empty set.
Step S206: and sending the time frequency resource allocation strategy to the first terminals so that the first terminals perform data transmission according to the time frequency resource allocation strategy.
In this embodiment, the time-frequency resource allocation policy is sent to each corresponding first terminal, so that the first terminals transmit data according to the time-frequency resource allocation policy, thereby increasing the upper limit of users that can be supported by using the cellular spectrum alone for LTE and D2D communication, and increasing the sum of transmission rates of all LTE users and multi-hop D2D users.
In one possible embodiment, the duty cycle includes at least: a channel selection period and a first sensing transmission period, wherein the first sensing transmission period is used for data transmission of the first terminal;
if the first terminal is a multi-hop communication user terminal, the first sensing transmission period is all periods except the channel selection period in the duty cycle;
if the first terminal is an LTE user terminal, the first sensing transmission period is all periods except the channel selection period and a reserved subframe in the duty cycle, the reserved subframe is used for reserving a second terminal of a target unauthorized channel for data transmission, and the second terminal is a Wi-Fi user terminal.
In this embodiment, the duty cycle at least includes a channel selection period and a first sensing transmission period, where the channel selection period is used for the base station to select the target unlicensed channel, and the first sensing transmission period is used for the base station to perform calculation of a time-frequency resource allocation policy, scheduling and allocation of time-frequency resources, and data transmission of the first terminal.
For the multi-hop D2D ue, because the shorter transmission distance and the lower transmission power can share the unlicensed channel with the Wi-Fi ue in the whole occupied period, if the first terminal is a multi-hop communication ue, the first sensing transmission period is all periods except the channel selection period in the duty cycle.
If the first terminal is an LTE user terminal, the first perception transmission period is all periods except a channel selection period and a reserved subframe in a duty cycle, and the reserved subframe is used for reserving a second terminal of the target unauthorized channel for data transmission, so that the interference on an original Wi-Fi user on the target unauthorized channel is reduced.
In one possible embodiment, the method further comprises: the method comprises the steps that an aggressive strategy and a friendly strategy are adopted, the aggressive strategy is provided with a first preset value, the friendly strategy is provided with a second preset value, and the first preset value is larger than the second preset value;
and under the aggressive strategy, allowing the first terminals with the number within the first preset value to perform data transmission on the target unauthorized channel, and under the friendly strategy, allowing the first terminals with the number within the second preset value to perform data transmission on the target unauthorized channel.
In the embodiment, a time-frequency resource allocation strategy for an LTE user terminal and a multi-hop communication user terminal is related to how a base station adjusts interference on a Wi-Fi system, and an aggressive strategy and a friendly strategy are simultaneously set, wherein the aggressive strategy is provided with a first preset value, the friendly strategy is provided with a second preset value, and the first preset value is greater than the second preset value;
under the aggressive strategy, allowing the first terminals with the quantity within the first preset value to perform data transmission on the target unauthorized channel, allowing the base station to perform time-frequency resource allocation only for the first terminals with the quantity within the first preset value accessed into the target unauthorized channel, under the friendly strategy, allowing the first terminals with the quantity within the second preset value to perform data transmission on the target unauthorized channel, and allowing the base station to perform time-frequency resource allocation for the first terminals with the quantity within the second preset value accessed into the target unauthorized channel.
Fig. 5 is a flowchart of steps of an unlicensed spectrum edge sharing method for multi-hop communication between terminals in an embodiment of the present invention, where as shown in fig. 5, a whole duty cycle includes a channel selection period and a sensing transmission period, in the channel selection period, a base station and first terminals both perform unlicensed spectrum sensing, and the first terminals send sensed unlicensed channels to the base station, then the base station determines, according to a sensing result of the base station and a calculation of an interference value, whether idle unlicensed channels exist in the unlicensed channels sensed by the respective first terminals, if not, sensing is continued, if yes, a channel with a small number of interfered Wi-Fi users is selected and aggregated to an original channel of each first terminal, and then scheduling and allocating time-frequency resources to each first terminal is performed, so that each first terminal performs data transmission, if the first terminal is an LTE user terminal, in a first sensing transmission period of the sensing transmission period, a reserved subframe needs to be left for the Wi-Fi user terminal to perform data transmission, and if the first terminal is a multi-hop communication user terminal, in the reserved subframe, the multi-hop communication user terminal can also perform data transmission.
In the embodiment of the invention, the sensing result of a plurality of first terminals in a cell to an unauthorized channel is received, the interference value of each unauthorized channel in the sensing result is obtained, the unauthorized channel with the minimum interference value is selected as a target unauthorized channel, the target unauthorized channel is aggregated with the original channel of each first terminal respectively so as to enable each first terminal to access the target unauthorized channel, when detecting that a plurality of first terminals access a target unauthorized channel, dividing the target unauthorized channel into a plurality of sub-channels, and combining time domain resources to obtain a plurality of time frequency resources, and allocating time-frequency resources to the plurality of first terminals according to the utility size of each first terminal on each time-frequency resource to obtain a time-frequency resource allocation strategy, and sending the time-frequency resource allocation strategy to the plurality of first terminals so that the plurality of first terminals execute data transmission according to the time-frequency resource allocation strategy. By selecting the unauthorized channel with the minimum interference value as the target unauthorized channel and allocating the time-frequency resources to the plurality of first terminals according to the utility size of each first terminal on each time-frequency resource for data transmission of the first terminals, the upper limit of users supported by LTE and D2D communication by simply using a cellular frequency spectrum can be improved and the sum of the transmission rates of all LTE users and multi-hop D2D users can be increased under the condition of reducing the interference to a Wi-Fi system.
Based on the same inventive concept, an embodiment of the present invention provides an unlicensed spectrum edge sharing device for multi-hop communication between terminals, where fig. 6 is a schematic diagram of an unlicensed spectrum edge sharing device for multi-hop communication between terminals in an embodiment of the present invention, and as shown in fig. 6, the device includes:
a receiving module 601, configured to receive sensing results of multiple first terminals to an unlicensed channel in a cell, where the first terminals include a multi-hop communication user terminal and/or an LTE user terminal;
a selecting module 602, configured to obtain an interference value of each unlicensed channel in the sensing result, and select an unlicensed channel with a smallest interference value as a target unlicensed channel;
an aggregating module 603, configured to aggregate the target unlicensed channel with an original channel of each first terminal, so that each first terminal can access the target unlicensed channel;
an obtaining module 604, configured to, after it is detected that the plurality of first terminals access the target unlicensed channel, divide the target unlicensed channel into a plurality of sub-channels, and obtain a plurality of time-frequency resources in combination with time-domain resources;
an allocating module 605, configured to allocate, according to the utility size of each first terminal on each time-frequency resource, the time-frequency resources to the plurality of first terminals, so as to obtain a time-frequency resource allocation policy;
a sending module 606, configured to send the time-frequency resource allocation policy to the multiple first terminals, so that the multiple first terminals perform data transmission according to the time-frequency resource allocation policy.
Optionally, the duty cycle comprises at least: a channel selection period and a first sensing transmission period, wherein the first sensing transmission period is used for data transmission of the first terminal;
if the first terminal is a multi-hop communication user terminal, the first sensing transmission period is all periods except the channel selection period in the duty cycle;
if the first terminal is an LTE user terminal, the first sensing transmission period is all periods except the channel selection period and a reserved subframe in the duty cycle, the reserved subframe is used for reserving a second terminal of a target unauthorized channel for data transmission, and the second terminal is a Wi-Fi user terminal.
Optionally, the allocation module includes:
a first establishing submodule, configured to perform step 1: acquiring the transmission rate of each first terminal on each time-frequency resource of a target unauthorized channel, and establishing a bias list of each first terminal, wherein the bias list of each first terminal comprises a plurality of time-frequency resources, and the time-frequency resources in the bias list are sequentially arranged from large to small according to the transmission rate;
a matching sub-module for performing step 2: sequentially matching each first terminal which does not reach the time domain resource matching threshold to the first time frequency resource in the corresponding bias list;
a second establishing submodule, configured to perform step 3: if the first time frequency resource does not reach the user matching threshold, establishing a matching relation between the first terminal and the first time frequency resource;
a third establishing submodule, configured to perform step 4: if the first time-frequency resource reaches a user matching threshold, but the sum rate of the first terminals is larger than that of the first terminals in the current matching relationship by establishing the matching relationship between the first terminals and the first time-frequency resource, establishing the matching relationship between the first terminals and the first time-frequency resource to replace the current matching relationship, otherwise, failing to establish the matching relationship, and keeping the current matching relationship;
a first obtaining submodule, configured to perform step 5: after all the first terminals which do not reach the time domain resource matching threshold are sequentially matched with the first time frequency resource in the corresponding bias list, the current matching relation between the first terminal corresponding to the target unauthorized channel and the time frequency resource is obtained;
an update submodule, configured to perform step 6: updating a bias list of each first terminal according to the current matching relation between the first terminal corresponding to the target unauthorized channel and the time-frequency resource;
a second obtaining submodule, configured to perform step 7: and (5) repeatedly executing the step (2) to the step (6) until all the first terminals reach the time domain resource matching threshold, and obtaining a time frequency resource allocation strategy.
Optionally, the apparatus further comprises:
the strategy execution module is used for executing an aggressive strategy and a friendly strategy, the aggressive strategy is provided with a first preset value, the friendly strategy is provided with a second preset value, and the first preset value is larger than the second preset value;
and the strategy execution module is used for allowing the first terminals with the number within the first preset value to perform data transmission on the target unauthorized channel under the aggressive strategy, and allowing the first terminals with the number within the second preset value to perform data transmission on the target unauthorized channel under the friendly strategy.
Fig. 7 is a schematic structural diagram of an electronic device in an embodiment of the present invention, and as shown in fig. 7, the present application further provides an electronic device, including:
a processor 71;
a memory 72 having instructions stored thereon, and a computer program stored on the memory and executable on the processor, which when executed by the processor 71, causes the apparatus to perform a method of unlicensed spectrum edge sharing for multi-hop communication between terminals.
The present application further provides a non-transitory computer-readable storage medium having stored thereon a computer program, which, when executed by a processor 71 of an electronic device, enables the electronic device to execute an unlicensed spectrum edge sharing method that implements one kind of inter-terminal multi-hop communication.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The unauthorized spectrum edge sharing method, the unauthorized spectrum edge sharing device, the electronic device and the readable storage medium for multi-hop communication between terminals provided by the invention are introduced in detail, and specific examples are applied in the text to explain the principle and the implementation of the invention, and the description of the above embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (8)

1. An unlicensed spectrum edge sharing method for multi-hop communication between terminals is applied to a base station, and is characterized in that the following steps are executed in a duty cycle:
receiving sensing results of a plurality of first terminals to an unauthorized channel in a cell, wherein the first terminals comprise multi-hop communication user terminals and/or LTE user terminals;
obtaining the interference value of each unauthorized channel in the sensing result, and selecting the unauthorized channel with the minimum interference value as a target unauthorized channel;
aggregating the target unauthorized channel with the original channel of each first terminal respectively so that each first terminal can access the target unauthorized channel;
when the plurality of first terminals are detected to be accessed into the target unauthorized channel, dividing the target unauthorized channel into a plurality of sub-channels, and combining time domain resources to obtain a plurality of time frequency resources;
allocating time-frequency resources to the plurality of first terminals according to the utility size of each first terminal on each time-frequency resource to obtain a time-frequency resource allocation strategy;
sending the time frequency resource allocation strategy to the first terminals so that the first terminals perform data transmission according to the time frequency resource allocation strategy;
the method comprises the following steps of allocating time frequency resources to a plurality of first terminals according to the utility size of each first terminal on each time frequency resource to obtain a time frequency resource allocation strategy, wherein the method comprises the following steps:
step 1: acquiring the transmission rate of each first terminal on each time-frequency resource of a target unauthorized channel, and establishing a bias list of each first terminal, wherein the bias list of each first terminal comprises a plurality of time-frequency resources, and the time-frequency resources in the bias list are sequentially arranged from large to small according to the transmission rate;
step 2: sequentially matching each first terminal which does not reach the time domain resource matching threshold to the first time frequency resource in the corresponding bias list;
and step 3: if the first time frequency resource does not reach the user matching threshold, establishing a matching relation between the first terminal and the first time frequency resource;
and 4, step 4: if the first time-frequency resource reaches a user matching threshold, but the sum rate of the first terminals is larger than that of the first terminals in the current matching relationship by establishing the matching relationship between the first terminals and the first time-frequency resource, establishing the matching relationship between the first terminals and the first time-frequency resource to replace the current matching relationship, otherwise, failing to establish the matching relationship, and keeping the current matching relationship;
and 5: after all the first terminals which do not reach the time domain resource matching threshold are sequentially matched with the first time frequency resource in the corresponding bias list, the current matching relation between the first terminal corresponding to the target unauthorized channel and the time frequency resource is obtained;
step 6: updating a bias list of each first terminal according to the current matching relation between the first terminal corresponding to the target unauthorized channel and the time-frequency resource;
and 7: and (5) repeatedly executing the step (2) to the step (6) until all the first terminals reach the time domain resource matching threshold, and obtaining a time frequency resource allocation strategy.
2. The method of claim 1, wherein the duty cycle comprises at least: a channel selection period and a first sensing transmission period, wherein the first sensing transmission period is used for data transmission of the first terminal;
if the first terminal is a multi-hop communication user terminal, the first sensing transmission period is all periods except the channel selection period in the duty cycle;
if the first terminal is an LTE user terminal, the first sensing transmission period is all periods except the channel selection period and a reserved subframe in the duty cycle, the reserved subframe is used for reserving a second terminal of a target unauthorized channel for data transmission, and the second terminal is a Wi-Fi user terminal.
3. The method of claim 1, further comprising: the method comprises the steps that an aggressive strategy and a friendly strategy are adopted, the aggressive strategy is provided with a first preset value, the friendly strategy is provided with a second preset value, and the first preset value is larger than the second preset value;
and under the aggressive strategy, allowing the first terminals with the number within the first preset value to perform data transmission on the target unauthorized channel, and under the friendly strategy, allowing the first terminals with the number within the second preset value to perform data transmission on the target unauthorized channel.
4. An unlicensed spectrum edge sharing apparatus for multi-hop communication between terminals, comprising:
the receiving module is used for receiving sensing results of a plurality of first terminals to an unauthorized channel in a cell, wherein the first terminals comprise multi-hop communication user terminals and/or LTE user terminals;
the selection module is used for acquiring the interference value of each unauthorized channel in the sensing result and selecting the unauthorized channel with the minimum interference value as a target unauthorized channel;
the aggregation module is used for aggregating the target unauthorized channel with an original channel of each first terminal respectively so as to enable each first terminal to access the target unauthorized channel;
an obtaining module, configured to, after it is detected that the plurality of first terminals access the target unlicensed channel, divide the target unlicensed channel into a plurality of sub-channels, and obtain a plurality of time-frequency resources in combination with time-domain resources;
the distribution module is used for distributing the time frequency resources to the plurality of first terminals according to the utility size of each first terminal on each time frequency resource to obtain a time frequency resource distribution strategy;
a sending module, configured to send the time-frequency resource allocation policy to the plurality of first terminals, so that the plurality of first terminals perform data transmission according to the time-frequency resource allocation policy;
wherein the allocation module comprises:
a first establishing submodule, configured to perform step 1: acquiring the transmission rate of each first terminal on each time-frequency resource of a target unauthorized channel, and establishing a bias list of each first terminal, wherein the bias list of each first terminal comprises a plurality of time-frequency resources, and the time-frequency resources in the bias list are sequentially arranged from large to small according to the transmission rate;
a matching sub-module for performing step 2: sequentially matching each first terminal which does not reach the time domain resource matching threshold to the first time frequency resource in the corresponding bias list;
a second establishing submodule, configured to perform step 3: if the first time frequency resource does not reach the user matching threshold, establishing a matching relation between the first terminal and the first time frequency resource;
a third establishing submodule, configured to perform step 4: if the first time-frequency resource reaches a user matching threshold, but the sum rate of the first terminals is larger than that of the first terminals in the current matching relationship by establishing the matching relationship between the first terminals and the first time-frequency resource, establishing the matching relationship between the first terminals and the first time-frequency resource to replace the current matching relationship, otherwise, failing to establish the matching relationship, and keeping the current matching relationship;
a first obtaining submodule, configured to perform step 5: after all the first terminals which do not reach the time domain resource matching threshold are sequentially matched with the first time frequency resource in the corresponding bias list, the current matching relation between the first terminal corresponding to the target unauthorized channel and the time frequency resource is obtained;
an update submodule, configured to perform step 6: updating a bias list of each first terminal according to the current matching relation between the first terminal corresponding to the target unauthorized channel and the time-frequency resource;
a second obtaining submodule, configured to perform step 7: and (5) repeatedly executing the step (2) to the step (6) until all the first terminals reach the time domain resource matching threshold, and obtaining a time frequency resource allocation strategy.
5. The apparatus of claim 4, wherein the duty cycle comprises at least: a channel selection period and a first sensing transmission period, wherein the first sensing transmission period is used for data transmission of the first terminal;
if the first terminal is a multi-hop communication user terminal, the first sensing transmission period is all periods except the channel selection period in the duty cycle;
if the first terminal is an LTE user terminal, the first sensing transmission period is all periods except the channel selection period and a reserved subframe in the duty cycle, the reserved subframe is used for reserving a second terminal of a target unauthorized channel for data transmission, and the second terminal is a Wi-Fi user terminal.
6. The apparatus of claim 4, further comprising:
the strategy execution module is used for executing an aggressive strategy and a friendly strategy, the aggressive strategy is provided with a first preset value, the friendly strategy is provided with a second preset value, and the first preset value is larger than the second preset value;
and the strategy execution module is used for allowing the first terminals with the number within the first preset value to perform data transmission on the target unauthorized channel under the aggressive strategy, and allowing the first terminals with the number within the second preset value to perform data transmission on the target unauthorized channel under the friendly strategy.
7. An electronic device, comprising: memory, processor and computer program stored on the memory and executable on the processor, which when executed by the processor, implement the unlicensed spectrum edge sharing method for multi-hop communication between terminals according to any of claims 1 to 3.
8. A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, implements the unlicensed spectrum edge sharing method for multi-hop communication between terminals according to any of claims 1 to 3.
CN202010821431.XA 2020-08-14 2020-08-14 Unauthorized spectrum edge sharing method and device for multi-hop communication between terminals Active CN112073975B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010821431.XA CN112073975B (en) 2020-08-14 2020-08-14 Unauthorized spectrum edge sharing method and device for multi-hop communication between terminals

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010821431.XA CN112073975B (en) 2020-08-14 2020-08-14 Unauthorized spectrum edge sharing method and device for multi-hop communication between terminals

Publications (2)

Publication Number Publication Date
CN112073975A CN112073975A (en) 2020-12-11
CN112073975B true CN112073975B (en) 2021-07-06

Family

ID=73661754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010821431.XA Active CN112073975B (en) 2020-08-14 2020-08-14 Unauthorized spectrum edge sharing method and device for multi-hop communication between terminals

Country Status (1)

Country Link
CN (1) CN112073975B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105392202A (en) * 2014-09-01 2016-03-09 三星电子株式会社 Scheme for communication in mobile communication system using unlicensed frequency band
CN106465340A (en) * 2014-04-10 2017-02-22 三星电子株式会社 Method and apparatus for using unlicensed band channel in cellular wireless communication system
CN108401245A (en) * 2017-02-08 2018-08-14 知鑫知识产权服务(上海)有限公司 Data sharing method in a kind of licensing free frequency band cluster towards D2D equipment
CN109548130A (en) * 2018-12-28 2019-03-29 浙江大学城市学院 Distributed power-economizing method based on unlicensed band D2D system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8792900B2 (en) * 2010-09-23 2014-07-29 Nokia Corporation Autonomous unlicensed band reuse in mixed cellular and device-to-device network
US9100941B2 (en) * 2012-05-24 2015-08-04 Nokia Solutions And Networks Oy Using unique preambles for D2D communications in LTE

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106465340A (en) * 2014-04-10 2017-02-22 三星电子株式会社 Method and apparatus for using unlicensed band channel in cellular wireless communication system
CN105392202A (en) * 2014-09-01 2016-03-09 三星电子株式会社 Scheme for communication in mobile communication system using unlicensed frequency band
CN108401245A (en) * 2017-02-08 2018-08-14 知鑫知识产权服务(上海)有限公司 Data sharing method in a kind of licensing free frequency band cluster towards D2D equipment
CN109548130A (en) * 2018-12-28 2019-03-29 浙江大学城市学院 Distributed power-economizing method based on unlicensed band D2D system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
D2D-U: Device-to-Device Communications in Unlicensed Bands for 5G System;Hongliang Zhang等;《IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS》;20170317;第16卷(第6期);第Ⅱ-Ⅴ节,图1、3 *

Also Published As

Publication number Publication date
CN112073975A (en) 2020-12-11

Similar Documents

Publication Publication Date Title
CN106455081B (en) Resource allocation method and resource allocation device
KR102087656B1 (en) Method and apparatus for distributed scheduling of resources in a device to divice communication system
WO2016184190A1 (en) Resource use method, device and system
US20130136013A1 (en) Handshaking Protocol Using Bursts in OFDMA Frame Structure
WO2018059412A1 (en) Uplink signal transmission method, apparatus, system, communications device, and storage medium
CN109392134A (en) A kind of resource selection method and device
WO2015140039A1 (en) Telecommunications apparatus and methods
KR101813822B1 (en) Sending method and sending device for d2d discovery signal
WO2020029698A1 (en) Uplink channel resource indication and determination method, and base station, terminal and medium
CN112073974B (en) Unauthorized spectrum edge access and anti-interference method and device for cooperative terminal communication
WO2013030773A1 (en) Method and apparatus for allocating device-to-device discovery portion
WO2017167078A1 (en) Carrier wave prb resource allocation method, device, and computer storage medium
CN107113874B (en) Base station, user terminal and data transmission method
US20170325229A1 (en) Cellular network access method and apparatus
CN108702346B (en) Uplink resource allocation
KR101996581B1 (en) Data transfer method and apparatus
WO2017118053A1 (en) Channel occupancy determination method and apparatus
CN107548070B (en) Data transmission method, device and system
CN109845312B (en) Data transmission method and device, computer equipment and system
CN110383914B (en) Information sending method, device, terminal, access network equipment and system
CN112188637B (en) Wireless communication method, user equipment and network equipment
CN111770473B (en) Unlicensed spectrum access and carrier aggregation method and device for cellular internet of vehicles
CN112073975B (en) Unauthorized spectrum edge sharing method and device for multi-hop communication between terminals
CN115915419A (en) Resource indicating method, resource selecting method, electronic equipment and storage medium
CN104170309A (en) Resource management method and resource management device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant