CN105848165A - Unauthorized resource use methods and system, base station, and user equipment - Google Patents

Unauthorized resource use methods and system, base station, and user equipment Download PDF

Info

Publication number
CN105848165A
CN105848165A CN201510018155.2A CN201510018155A CN105848165A CN 105848165 A CN105848165 A CN 105848165A CN 201510018155 A CN201510018155 A CN 201510018155A CN 105848165 A CN105848165 A CN 105848165A
Authority
CN
China
Prior art keywords
unauthorized
resource
cell
configuration information
resource configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510018155.2A
Other languages
Chinese (zh)
Other versions
CN105848165B (en
Inventor
李新彩
苟伟
毕峰
彭佛才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510018155.2A priority Critical patent/CN105848165B/en
Priority to PCT/CN2015/092985 priority patent/WO2016112721A1/en
Publication of CN105848165A publication Critical patent/CN105848165A/en
Application granted granted Critical
Publication of CN105848165B publication Critical patent/CN105848165B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses an unauthorized resource use method that is applied to a base station. The method includes the steps of acquiring an unauthorized resource that is used in a cell; and broadcasting configuration information of the unauthorized resource of the cell to other base stations, so as to enable the other base stations to determine configuration of unauthorized resources of the other base stations according to the configuration information of the unauthorized resource of the cell. The present invention further discloses an unauthorized resource use method applied to user equipment (UE), a base station, UE, and an unauthorized resource use system.

Description

Method, system, base station and user equipment for using unauthorized resources
Technical Field
The present invention relates to wireless communication technologies, and in particular, to a method, a system, a base station, and a User Equipment (UE) for using an unauthorized resource.
Background
The unlicensed carrier has: the method has the characteristics of low cost, low admission requirement, low cost, capability of coordinating resources, multiple supported wireless access technologies, multiple wireless access sites, multiple applications and the like, thereby becoming a research hotspot.
In the Evolution process of Long Term Evolution (LTE), in the study of LTE Rel-13 release, an important content is that the LTE system works by using an unlicensed carrier. The technology enables the LTE system to use the existing unlicensed carrier, greatly improves the potential spectrum resources of the LTE system, and enables the LTE system to obtain lower spectrum cost.
However, LTE systems using unlicensed carriers face a number of problems, including: in unlicensed carrier operation, transmission of some signals or channels of the LTE system is necessary. For example, timing synchronization is performed on a Physical Random Access Channel (PRACH), Channel Sounding Reference Signal (SRS) and Cell-specific Reference Signal (CRS) transmission are used to measure Channel quality of an unlicensed carrier, and transmission of uplink and downlink control channels and data channels is performed. However, the transmission resources of these channels or signals are shared by multiple cells of multiple operators, and if the base stations do not perform resource coordination, collision or strong interference problems may occur due to the multiple cells transmitting using the same resources. Therefore, how to coordinate the resources of the LTE physical channels or signals on the unlicensed carriers among multiple users or base stations of multiple operators is a problem to be solved.
Disclosure of Invention
In order to solve the existing technical problem, embodiments of the present invention provide a method, a system, a base station, and a UE for using an unauthorized resource.
The embodiment of the invention provides a method for using unauthorized resources, which is applied to a base station and comprises the following steps:
obtaining the unauthorized resource used by the cell;
and broadcasting the unauthorized resource configuration information of the cell to other base stations so that the other base stations determine the unauthorized resource configuration of the cell according to the unauthorized resource configuration information of the cell.
In the foregoing solution, the acquiring the unauthorized resource used by the cell includes:
obtaining the unauthorized resource used by the cell in a resource competition mode; or,
coordinating with other base stations in advance, and taking predefined unauthorized resources obtained by coordination as unauthorized resources used by the cell; or,
acquiring the use information of the unauthorized resources of other cells; and acquiring the unauthorized resource used by the cell according to the unauthorized resource used by the other cell.
In the above scheme, the obtaining of the unauthorized resource used by the cell in the contention mode includes:
and the UE or the trigger subordinate UE carries out resource competition on the set unauthorized carrier wave to obtain the unauthorized resource used by the cell.
In the above solution, the pre-coordinating with other base stations in advance, and using the predefined unauthorized resource obtained by the coordination as the unauthorized resource used by the cell, includes:
obtaining the unauthorized resource used by the cell by adopting any one of different Orthogonal Frequency Division Multiplexing (OFDM) symbols, different time slots, different subframes, the same, different periods and/or offset time division, different unauthorized Frequency band Frequency division and different sequence code division modes; or,
grouping or setting different sets of all the unauthorized resources, wherein the unauthorized resources contained in each group or set are all orthogonal or partially orthogonal; and acquiring the unauthorized resource used by the cell by adopting a mode different from the group or set of other cells.
In the foregoing solution, the obtaining the unauthorized resource used by the cell by using a mode different from a group or a set of other cells includes:
acquiring unauthorized resources used by a cell according to a preset corresponding relation between the cell and a group or a set; or,
acquiring the unauthorized resource used by the cell by combining the random number generated by the hash function or the random sequence with the corresponding relation between the function or the random number and the group or the set; or,
and acquiring the unauthorized resource used by the cell by monitoring the common channel or the unauthorized resource group or the set indication information used by other cells which occupy the signal bearing.
In the foregoing solution, the obtaining the use information of the unauthorized resource of the other cell includes:
obtaining the use information of the unauthorized resources of other cells through blind detection; or,
acquiring the use information of the unauthorized resources of other cells by intercepting the relevant information of the unauthorized resource use sent by other base stations on the unauthorized common channel; or,
acquiring the use information of the unauthorized resources of other cells by receiving the occupation signals sent by other cells; or,
the use indication information of the unlicensed resources of other cells is obtained through a Physical Broadcast Channel (PBCH) or a system message.
In the above scheme, the usage information of the unauthorized resource of the other cell is obtained by displaying a signaling bearer or by mapping relationship between a sequence and the unauthorized resource.
In the above solution, the broadcasting the unauthorized resource configuration information of the cell to other base stations is:
and broadcasting the unauthorized resource configuration information of the cell through an unauthorized common channel, a PBCH or an occupied signal.
In the foregoing solution, the broadcasting the unlicensed resource configuration information of the cell via the unlicensed common channel includes:
directly carrying the unauthorized resource configuration information through the unauthorized common channel; or,
mapping the unauthorized resource configuration information at the frequency domain position of the unauthorized common channel; the frequency domain positions correspond to the unauthorized resource configuration information one by one; or,
mapping the unauthorized resource configuration information through a sequence sent by the unauthorized common channel; the sequence corresponds to unauthorized configuration information one by one; or,
and transmitting the unauthorized resource configuration information through a pattern of a preset reference signal transmitted by the unauthorized common channel.
In the above scheme, the occupancy signal has at least one of the following characteristics:
the occupied signals correspond to the unauthorized resource configuration information one by one;
the root sequence of the occupied signal is the same as the root sequence of the transmitted reference signal;
the occupied signal cyclic shift indicates the number of subframes of the non-authorized resource transmission data channel occupied by the cell;
the pattern of the occupancy signal indicates the format and periodicity of the PRACH channel, and/or the symbol index of the SRS.
In the foregoing solution, the other base station includes: the base station of the operator different from the base station broadcasting the unauthorized resource configuration information of the local cell and the base station of the operator same as the base station broadcasting the unauthorized resource configuration information of the local cell.
In the foregoing solution, the broadcasted unauthorized resource configuration information includes: and one or more of time domain resource, frequency domain resource and code domain resource configuration information.
In the above scheme, the broadcasted unauthorized resource configuration information is unauthorized resource configuration information of an SRS and/or a PRACH.
In the above scheme, the broadcasted unauthorized resource configuration information of the SRS is all or part of the existing SRS resource configuration information, or is the symbol resource configuration information of the newly added SRS.
In the above scheme, the broadcasted unauthorized resource configuration information of the PRACH is all or part of the existing PRACH resource configuration, or is newly added PRACH sequence resource configuration information.
In the above scheme, the method further comprises:
and informing the unauthorized resource configuration information of the subordinate UE in a mode of mapping a common channel, a PBCH, physical signaling or an occupied signal.
In the above scheme, the physical signaling is Downlink Control Information (DCI) or Radio Resource Control (RRC) message.
In the above scheme, the method further comprises:
and transmitting a channel or a signal on the unauthorized resource corresponding to the unauthorized resource configuration information.
The embodiment of the invention also provides a use method of the unauthorized resource, which is applied to the UE and comprises the following steps:
receiving a signaling sent by a base station;
and according to the signaling, carrying out resource competition on the corresponding unauthorized carrier or sending a physical channel or a signal on the corresponding unauthorized resource.
In the foregoing solution, when the signaling is a resource preemption signaling, the resource preemption signaling is implemented by at least one of the following manners: scheduling signaling indication, NACK information indication, defined RRC message bearer.
In the above scheme, when the signaling is an unlicensed resource configuration signaling, the unlicensed resource configuration information is carried by a common channel, an occupied signal, a PBCH, or a physical signaling.
In the above scheme, all the unauthorized resource configuration information corresponding to the physical channel or signal includes a preset first part of unauthorized resource configuration information, a preset second part of unauthorized resource configuration information, and a preset third part of unauthorized resource configuration information; the first part of unauthorized resource configuration information is carried through a common channel or an occupied signal, the second part of unauthorized resource configuration information is carried through a PBCH, and the third part of unauthorized resource configuration information is carried through a physical signaling.
In the above scheme, the physical signaling is: RRC message, or DCI.
In the above scheme, the signaling is an unauthorized resource configuration signaling; the sending a physical channel or signal on a corresponding unlicensed carrier according to the signaling includes:
according to the unlicensed resource configuration information, a physical channel or a signal is transmitted on the unlicensed resources in one of a Time Division Multiplexing (TDM), a Frequency Division Multiplexing (FDM), a Code Division Multiplexing (CDM) or different resource groups.
In the above scheme, the physical channel or signal adopts a full bandwidth mapping mode.
In the foregoing solution, after contending for a resource on a corresponding unlicensed carrier, the method further includes:
immediately sending SRS, PRACH leader sequence, or repeatedly sending one of the first N symbols, ZC sequence and PN sequence of uplink data; n is a positive integer less than or equal to 6.
An embodiment of the present invention further provides a base station, including: an acquisition unit and a broadcast unit; wherein,
the acquiring unit is used for acquiring the unauthorized resource used by the cell;
the broadcast unit is configured to broadcast the unauthorized resource configuration information of the local cell to other base stations, so that the other base stations determine the unauthorized resource configuration of the local cell according to the unauthorized resource configuration information of the local cell.
In the foregoing solution, the obtaining unit is specifically configured to: obtaining the unauthorized resource used by the cell in a resource competition mode; or,
coordinating with other base stations in advance, and taking predefined unauthorized resources obtained by coordination as unauthorized resources used by the cell; or,
acquiring the use information of the unauthorized resources of other cells; and acquiring the unauthorized resource used by the cell according to the unauthorized resource used by the other cell.
In the foregoing solution, the broadcast unit is specifically configured to: and broadcasting the unauthorized resource configuration information of the cell through an unauthorized common channel, a PBCH or an occupied signal.
In the foregoing solution, the base station further includes: a configuration information notification unit, configured to notify the unauthorized resource configuration information of the subordinate UE through a common channel, a PBCH, a physical signaling, or an occupied signal mapping manner.
In the foregoing solution, the base station further includes: and the data sending unit is used for sending a channel or a signal on the unauthorized resource corresponding to the unauthorized resource configuration information.
An embodiment of the present invention further provides a UE, including: a receiving unit and an execution unit; wherein,
the receiving unit is used for receiving a signaling sent by a base station;
the execution unit is configured to perform resource contention on a corresponding unlicensed carrier according to the signaling, or send a physical channel or a signal on a corresponding unlicensed resource.
In the foregoing solution, the execution unit is further configured to immediately transmit an SRS, a preamble sequence, or one of first N symbols, ZC sequences, and PN sequences for repeatedly transmitting uplink data after contending for a resource on a corresponding unlicensed carrier; n is a positive integer less than or equal to 6.
The embodiment of the present invention further provides a system for using unauthorized resources, including: a first base station and more than one second base station; wherein,
the first base station is used for acquiring the unauthorized resource used by the cell; and broadcasting the unauthorized resource configuration information of the cell to the second base station so that the second base station determines the unauthorized resource configuration of the cell according to the unauthorized resource configuration information of the cell of the first base station.
The second base station is configured to receive the unauthorized resource configuration information broadcast by the first base station.
In the above solution, the system further includes: the UE is used for receiving the signaling sent by the first base station; and performing resource competition on the corresponding unauthorized carrier or transmitting a physical channel or a signal on the corresponding unauthorized resource according to the signaling.
According to the method, the system, the base station and the UE for using the unauthorized resource, provided by the embodiment of the invention, the base station obtains the unauthorized resource used by the cell; the unauthorized resource configuration information of the cell is broadcasted to other base stations, so that the other base stations can determine the unauthorized resource configuration of the cell according to the unauthorized resource configuration information of the cell; the UE receives the signaling sent by the base station; according to the signaling, resource competition is carried out on the corresponding unauthorized carrier wave, or a physical channel or a signal is sent on the corresponding unauthorized resource, so that base stations of different cells of different operators can carry out data sending on the unauthorized carrier wave on the premise of interference coordination/avoidance, and the spectrum efficiency is improved.
Drawings
In the drawings, which are not necessarily drawn to scale, like reference numerals may describe similar components in different views. Like reference numerals having different letter suffixes may represent different examples of similar components. The drawings illustrate generally, by way of example, but not by way of limitation, various embodiments discussed herein.
FIG. 1 is a flow chart illustrating a method for using unauthorized resources according to an embodiment of the present invention;
FIG. 2 is a diagram illustrating unauthorized resource partitioning according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating an unauthorized resource grouping according to an embodiment of the present invention;
FIG. 4 is a flow chart illustrating another method for using unauthorized resources according to an embodiment of the present invention;
fig. 5 is a schematic view of resource partitioning corresponding to PRACH in the second embodiment of the present invention;
FIG. 6 is a schematic diagram of time division of symbols of different calibration regions corresponding to resources of a third SRS in accordance with the embodiment of the present invention;
FIG. 7 is a diagram of multiplexing unauthorized resources by four different UEs according to the embodiment of the present invention;
fig. 8 is a schematic diagram of a sixth uplink and downlink subframe according to an embodiment of the present invention;
fig. 9 is a schematic flow chart of a method for coordinating unauthorized carriers and transmitting data at a base station side according to an embodiment of the present invention;
fig. 10 is a flowchart illustrating an unlicensed carrier coordination and data transmission method on the eight UE sides according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of a nine-base-station according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of a nine-UE in accordance with an embodiment of the present invention;
fig. 13 is a schematic structural diagram of a system for using a nine-unauthorized resource according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples.
Before describing the embodiments of the present invention, the features of the unlicensed carrier will be described in detail. The unlicensed carrier has the following characteristics:
1. free/low cost: unlicensed spectrum does not need to be purchased, and spectrum resources are zero cost.
2. The admission requirement is low, the cost is low: individuals and enterprises can participate in deployment, and equipment of equipment manufacturers can be deployed at will.
3. Resources can be coordinated: when a plurality of different systems operate in the same system, or different operators of the same system operate in the same system, some resource coordination modes can be considered, and the spectrum efficiency is improved.
4. The supported wireless access technologies are many: different communication standards can be used, but the cooperation difficulty is high, and the network topology is various.
5. The wireless access sites are many: the number of users is large, but the cooperation difficulty is large, and the centralized management overhead is large.
6. The application is as follows: various services may operate therein, such as: machine-to-machine (M2M, machine) business, automobile-to-automobile (V2V, Vehicle to Vehicle) business, etc.
The unlicensed carrier is used in the LTE system, so that potential spectrum resources of the LTE system can be greatly improved, and the LTE system can obtain lower spectrum cost. When the LTE system operates with unlicensed carriers, since some signals or transmission resources of the signals, which are shared by multiple cells of multiple operators, are necessary for transmission of the signals or the channels, if non-carrier spectrum resource coordination is not performed between base stations, collision or strong interference problems may occur due to the multiple cells transmitting using the same resource. Therefore, how to coordinate the resources of the LTE physical channels or signals on the unlicensed carriers among multiple users or base stations of multiple operators is a problem to be solved.
However, for the problem of resource coordination of each specific physical channel or signal of multiple operator unlicensed frequency bands of the LTE system and the problem of interference avoidance between base stations or users, no detailed and specific solution is available at present.
Based on this, in various embodiments of the invention: obtaining the unauthorized resource used by the cell; and broadcasting the unauthorized resource configuration information of the cell to other base stations, so that the other base stations can determine the unauthorized resource configuration of the cell according to the unauthorized resource configuration information of the cell.
Example one
In this embodiment, a method for using unauthorized resources is applied to a base station, and as shown in fig. 1, the method includes the following steps:
step 101: obtaining the unauthorized resource used by the cell;
specifically, the unauthorized resource used by the cell is obtained in a resource competition manner; or,
coordinating with other base stations in advance, and taking predefined unauthorized resources obtained by coordination as unauthorized resources used by the cell; or,
acquiring the use information of the unauthorized resources of other cells; and acquiring the unauthorized resource used by the cell according to the unauthorized resource used by the other cell.
The obtaining of the unauthorized resource used by the cell in the contention mode specifically includes:
and the UE or the trigger subordinate UE carries out resource competition on the set unauthorized carrier wave to obtain the unauthorized resource used by the cell.
Here, the subordinate UE may be an idle UE, a UE that receives a scheduling request, or a UE that is allowed to be scheduled.
In the latter two ways, the base station or the subordinate UE may send signals or channels directly on the coordinated resources without performing a clean channel assessment procedure.
Here, in actual application, all the unauthorized resources may be divided into two parts, one part is a resource shared by all cells, and the part of the resource requires the base station to obtain the unauthorized resource used by the cell in a resource contention manner; and the other part is the resources not shared by all the cells, and the part of the resources needs the base station to obtain the unauthorized resources used by the cell in a manner of coordinating with other base stations. Wherein the division of the unauthorized resources may be divided according to network needs.
The pre-coordinating with other base stations, using the predefined unauthorized resource obtained by the coordination as the unauthorized resource used by the cell, specifically includes:
acquiring the unauthorized resource used by the cell by adopting any one of different OFDM symbols, different time slots, different subframes which are the same, different periods and/or offset time division, different unauthorized frequency band frequency division and different sequence code division modes; or,
all the unauthorized resources can be grouped or set into different sets, and the unauthorized resources contained in each group or set are all orthogonal or partially orthogonal, so that the interference can be effectively avoided; and acquiring the unauthorized resource used by the cell by adopting a mode different from the group or set of other cells.
The obtaining of the unauthorized resource used by the cell by using a mode different from a group or a set of other cells specifically includes:
acquiring unauthorized resources used by a cell according to a preset corresponding relation between the cell and a group or a set; or,
acquiring unauthorized resources used by the cell by using a random number generated by a hash (hash) function or a random sequence and combining the corresponding relation between the function or the random number and a group or a set; or,
and acquiring the unauthorized resource used by the cell by monitoring the common channel or the unauthorized resource group or the set indication information used by other cells which occupy the signal bearing.
Here, the function used is similar in form to one of the following:
f ( k ) = Σ i = k k + 10 c ( i ) * 2 i - k , f ( i ) = f ( i - 1 ) + Σ k = i i + 5 c ( k ) * 2 k - i ; or,
f ( k ) = f ( k - 1 ) * Σ k = i i + 5 c ( k ) * 2 k - i .
wherein,initializing once every radio frame or period T, and k is a subframe or a variation period T.
The hash function is related to a cell ID and a time slot; the random sequence is a sequence with irrelevance, such as an m sequence, a gold sequence and the like.
The obtaining of the usage information of the unauthorized resource of the other cell specifically includes:
obtaining the use information of the unauthorized resources of other cells through blind detection; or,
acquiring the use information of the unauthorized resources of other cells by intercepting the relevant information of the unauthorized resource use sent by other base stations on the unauthorized common channel; or,
acquiring the use information of the unauthorized resources of other cells by receiving the occupation signals sent by other cells; or,
and acquiring the use indication information of the unauthorized resources of other cells through an air interface PBCH or system information.
The usage information of the unauthorized resource of the other cell can be obtained by displaying a signaling bearer or by mapping relationship between a sequence and the unauthorized resource.
Step 102: and broadcasting the unauthorized resource configuration information of the cell to other base stations, so that the other base stations can determine the unauthorized resource configuration of the cell according to the unauthorized resource configuration information of the cell.
Here, the unlicensed resource configuration of the cell may include one or more of time domain resource, frequency domain resource, and code domain resource configuration; accordingly, the broadcasted unauthorized resource configuration information may include: and one or more of time domain resource, frequency domain resource and code domain resource configuration information. In actual application, the broadcasted unauthorized resource configuration information is the unauthorized resource configuration information of the SRS and/or the PRACH; wherein,
the broadcasted unauthorized resource configuration information of the SRS is all or partial information of the existing SRS resource configuration, or symbol resource configuration information of a newly added SRS;
the broadcasted unauthorized resource configuration information of the PRACH is all or part of the existing PRACH resource configuration information or newly added PRACH sequence resource configuration information.
The unlicensed resources are used for transmitting physical channels or signals.
Wherein the information transmitted using the unlicensed resource may include: one or more of a PRACH preamble sequence, an SRS, a Physical Uplink Shared Channel (PUSCH), a Physical Uplink Control Channel (PUCCH), a demodulation Reference Signal (DMRS), a CRS, a Channel state Indication Reference Signal (CSI-RS), a Positioning Reference Signal (PRS), a Demodulation Reference Signal (DRS), a Physical Downlink Control Channel (PDCCH), a Physical Downlink Shared Channel (PDSCH), or other channels or signals for synchronization measurement.
Accordingly, in practical applications, when multiple channels or signals are transmitted, the unlicensed resource configuration information may indicate a portion(s) of the multiple channels or signals transmitted, and for another portion of the channels or signals transmitted, other base stations may determine through other signals or channels received.
The broadcasting of the unauthorized resource configuration information of the cell to other base stations specifically includes:
and broadcasting the unauthorized resource configuration information of the cell through an unauthorized common channel, a PBCH or an occupied signal.
The broadcasting the unlicensed resource configuration information of the cell through the unlicensed common channel specifically includes:
directly carrying the unauthorized resource configuration information through the unauthorized common channel; or,
mapping the unauthorized resource configuration information at the frequency domain position of the unauthorized common channel; the frequency domain positions correspond to the unauthorized resource configuration information one by one; or,
mapping the unauthorized resource configuration information through a sequence sent by the unauthorized common channel; the sequence corresponds to unauthorized configuration information one by one; or,
and transmitting the unauthorized resource configuration information through a pattern of a preset reference signal transmitted by the unauthorized common channel.
Wherein, when the sequence transmitted through the unlicensed common channel maps the unlicensed resource configuration information, in other words, when the sequence transmitted on the unlicensed common channel is transmitted on some predefined unlicensed carriers according to a predefined period, the transmitted sequence is transmitted on the first several OFDM symbols of the channel. Here, in practical applications, the transmitted sequence may be transmitted at the first 1,2 or 3 OFAMs of the channel.
The occupation signal can represent the occupation of unauthorized resources on one hand; and on the other hand, the unauthorized resource configuration information of the cell can be represented.
The occupation signal may correspond to the unauthorized resource configuration information one to one.
The root sequence of the occupancy signal may be the same as the root sequence of the transmission reference signal.
The occupied signal cyclic shift may indicate the number of subframes for the local cell to occupy the unlicensed resource to transmit the data channel.
The pattern of the occupancy signal may indicate a format and periodicity of a PRACH channel and/or a symbol index of an SRS.
The other base station includes: base stations of different operators and base stations of the same operator.
When the other base stations are base stations of the same operator, the unauthorized resource configuration information may be directly interacted through X2, so as to perform interference coordination of the unauthorized resource.
The method may further comprise:
and informing the unauthorized resource configuration information of the subordinate UE in a mode of mapping a common channel, a PBCH, physical signaling or an occupied signal.
The physical signaling includes a system message, which may specifically be a DCI or RRC message.
The method may further comprise: and transmitting a channel or a signal on the unauthorized resource corresponding to the unauthorized resource configuration information.
As can be seen from the above description, in practical applications, there are several ways for the coordination of unauthorized resources and the data transmission:
the first method is as follows: the Listen Before Talk (LBT) mechanism is completely adopted, that is, a base station or UE needs to perform sensing or resource contention Before sending data, and only a base station and/or a UE under the base station that detects that resources are idle or contend for unlicensed resources can send information on an unlicensed carrier.
The second method comprises the following steps: the LBT mechanism is not followed, i.e. the base station or UE does not need to listen to the unlicensed carrier or perform resource contention to send data according to predefined coordinated unlicensed resources.
The third method comprises the following steps: the unlicensed resources are divided into two parts, as shown in fig. 2, one part of the unlicensed resources adopts the LBT mechanism, and the rest of the resources do not follow the LBT mechanism.
In practical application, for the PUSCH, PUCCH, DMRS, PDCCH, and PDSCH, different base stations transmit on the unlicensed carrier in the first mode.
For channels or signals used for synchronization or measurement, such as PRACH, SRS, CRS, CSI-RS, PRS, DRS and the like, different base stations transmit on an unlicensed carrier in a second mode or a third mode.
The synchronization channel or the measurement signal may be transmitted through a channel that can be directly used without performing a resource contention or a clean channel estimation procedure.
Different base stations of the same operator can configure different PRACH and SRS resources for neighboring cells through wired, air interface signaling or negotiation at X2 port.
If negotiation is possible for two base stations of different operators, the coordination mode of the two base stations under the same operator is preferably adopted, otherwise, the configuration of unauthorized resources can be performed on two adjacent cells in the following mode:
the first method is as follows: the first base station sends resource allocation indication information of the cell through a common channel on an unlicensed carrier, and the second base station selects to allocate different resources of the cell after detecting the indication information, such as different OFDM symbols, or different subframe patterns, or different periods or offsets, or different frequency bands, different codes, and the like.
And the common channel is transmitted on a preset unauthorized carrier wave according to a preset period.
The second method comprises the following steps: the base station obtains the use indication information of the unauthorized resource of other cells by receiving the occupied signals sent by other cells, thereby selecting and configuring different resources of the cell.
The third method comprises the following steps: the base station directly detects the resource allocation signaling sent by other base stations to the UE through an air interface physical broadcast channel or system information to acquire the use indication information of the unauthorized resource of other cells, and then selects different resources to allocate to the cell.
Specifically, corresponding unauthorized resources can be implicitly obtained by intercepting preamble sequences or reference signals sent by other base stations or other base station subordinate UEs, the sequences can be agreed with the resources in advance, and then different resources are selected and configured to the cell.
The method is as follows: the resources PRACH and SRS corresponding to the non-authorization are grouped in advance, as shown in fig. 3, the grouping may be divided only according to a certain time domain, frequency domain, or code domain, or all time frequency and sequences may be divided uniformly without being divided into a certain domain, and different resources of the cell are selectively configured according to the grouping.
Specifically, firstly, all the resources are divided into a plurality of large sets according to the number of operators, for example, the set index is x ═ {0, 1.. said., M }, M is an integer greater than or equal to the operator, that is, the x index of the same operator is the same, then, a plurality of subsets are included in each large set for each cell, that is, a subset of the set can be selected from the resource groups used by a certain cell, and the subset index y ═ 0, 1.. said., N }, so that the unauthorized PRACH and SRS resources of a certain cell of a certain operator can be uniquely determined through two dimensions (x, y).
Then, the first M pieces of the predefined preamble sequence are in one-to-one correspondence with the large set index. The first base station or the subordinate UE sends a leader sequence or the cyclic shift of the sequence on a public channel of the unlicensed carrier, other base stations or the UE can know the resource large set index corresponding to the operator by monitoring the sequence, and then different resources of the cell are selected and configured according to the resource large set indexes.
Or the resource subset index used is determined by a function or a random number generated by a random sequence.
The preamble sequence may also be sent on a resource using LBT, that is, a base station or UE contending for the resource sends the preamble sequence on a contended unlicensed carrier, on one hand, to use the preamble sequence to make an occupation signal to prevent other base stations from using the resource, and after detecting the preamble, the base station or UE under the base station may use the resource, on the other hand, to indicate a set of PRACH or SRS resources used by the base station or the operator, and the base stations of other operators may select different sets to configure to a subordinate UE.
Adjacent cells of different base stations of the same operator use different unauthorized resources through air interface interaction negotiation, or determine the used resource subset index through random numbers generated by functions or random sequences.
The base station notifies the coordinated cell resource configuration information to other base stations through a common channel or an occupied signal, and notifies the UE through a system message, a physical broadcast channel, a control signaling or an RRC message.
The unauthorized resource configuration may include: at least one of an OFDM symbol index, a slot index, a period, an offset, a PRB index and number, a sequence index, a cyclic shift, and a comb (comb), etc.
Another method for using unauthorized resources in this embodiment is applied to a UE, and as shown in fig. 4, the method includes the following steps:
step 401: receiving a signaling sent by a base station;
here, the signaling may be resource preemption signaling or unlicensed resource configuration signaling.
Step 402: and according to the signaling, carrying out resource competition on the corresponding unauthorized carrier or sending a physical channel or a signal on the corresponding unauthorized resource.
Specifically, when the signaling is a resource preemption signaling, performing resource contention on a corresponding unauthorized carrier; and when the signaling is the unauthorized resource configuration signaling, sending a physical channel or a signal on the corresponding unauthorized resource according to the unauthorized resource configuration information corresponding to the unauthorized resource configuration signaling.
Wherein the resource preemption signaling can be implemented by at least one of the following modes: scheduling signaling indication, NACK information indication, defined RRC message bearer.
The unlicensed resource configuration information may be carried by a common channel, an occupied signal, a PBCH, or a physical signaling.
When the method is actually applied, all the unauthorized resource configuration information corresponding to the physical channel or signal can be divided into a first part, a second part and a third part according to needs in a predefined way; in other words, all the unauthorized resource configuration information corresponding to the physical channel or signal includes a preset first part of unauthorized resource configuration information, a preset second part of unauthorized resource configuration information, and a preset third part of unauthorized resource configuration information; the first part of unauthorized resource configuration information is carried through a common channel or an occupied signal, the second part of unauthorized resource configuration information is carried through a PBCH, and the third part of unauthorized resource configuration information is carried through a physical signaling.
The physical signaling may be: RRC message or DCI, the physical signaling may be sent on a licensed or unlicensed carrier.
Here, when the unlicensed resource configuration information indicates resource locations of data channels for the DCI, the unlicensed resource configuration information indicates resource locations of the data channels of multiple subframes.
The unauthorized resource configuration information may include: at least one of an OFDM symbol index, a slot index, a period, an offset, a PRB index and number, a sequence index, a cyclic shift, and a comb, etc.
The sending a physical channel or a signal on the corresponding unauthorized resource according to the unauthorized resource configuration information corresponding to the unauthorized resource configuration signaling specifically includes:
and according to the unauthorized resource configuration information, transmitting the physical channel or signal on the unauthorized resource in a TDM, FDM, CDM or one of different resource groups.
In practical application, the unauthorized resource may include two parts, one part is obtained through contention of the base station to which the UE belongs, or the UE itself, or other UEs of the same base station, and the other part is obtained through negotiation between the base station to which the UE belongs and other base stations.
After contending for resources on the corresponding unlicensed carrier, the method may further include:
immediately sending SRS, PRACH leader sequence, or repeatedly sending one of the first N symbols, ZC sequence and PN sequence of uplink data; wherein N is a positive integer less than or equal to 6.
The physical channels or signals adopt a full bandwidth mapping mode.
In the method of the embodiment of the invention, a base station acquires unauthorized resources used by a cell; the unauthorized resource configuration information of the cell is broadcasted to other base stations, so that the other base stations can determine the unauthorized resource configuration of the cell according to the unauthorized resource configuration information of the cell; the UE receives the signaling sent by the base station; according to the signaling, resource competition is carried out on the corresponding unauthorized carrier wave, or a physical channel or a signal is sent on the corresponding unauthorized resource, so that the problem of resource coordination when each cell sends the physical channel or the signal when the LTE system operates in the frequency band of the unauthorized carrier wave can be solved, and under the premise of interference coordination/avoidance, base stations or UE of different cells of different operators can send data on the unauthorized carrier wave, thereby improving the spectrum efficiency.
Example two
This embodiment describes a resource coordination and transmission method for PRACH on an unlicensed carrier.
The unlicensed resources corresponding to the PRACH include time domain resources, frequency domain resources, and preamble (preamble) resources, and the resource configuration of each cell may be extended on the basis of the original 64 types specified by the LTE.
The PRACH on the unlicensed carrier may be transmitted in several ways.
The first method comprises the following steps: transmitting by means of LBT
Cells of different operators may transmit uplink and downlink data on an unlicensed carrier, so that there may be a case where multiple cells simultaneously use the unlicensed carrier to transmit PRACH for timing synchronization. For this case, different cells of different operators may coordinate the use of limited unlicensed resources by one of the following:
the first method is as follows: different operator cells acquire the unauthorized resources of the PRACH in a TDM coordination mode.
The obtained unauthorized resource may specifically be: the unit of time division can be multiplexing by taking 1,2, 3 or integral multiple of 3 subframes as a unit; or, different operator cells directly realize that different UEs transmit PRACH on the unlicensed carrier wave in a time division manner in an LBT manner; or, the adjacent cells transmit the same preamble sequence on the same unlicensed carrier through different sub-frame time division.
The system frame numbers allocated to the PRACH of different cells are as follows:
a first cell: 1,5,10,13,17,20,22,24,27, 31;
the second cell: 3,7,9,11,15,17,23,25,28, 32;
a third cell: 6,12,14,16,18,21,26,28, 30;
a fourth cell: 2,4,8,11,15,19,21,24,26,29.
The second method comprises the following steps: and the UE of different operator cells acquires the unauthorized resource of the PRACH in an FDM coordination mode.
The obtained unauthorized resource may specifically be: the method includes that an unlicensed resource is divided into a plurality of frequency bands which are equally spaced or non-uniform according to a frequency domain in a predefined manner, each frequency band comprises 6 Physical Resource Blocks (PRBs), and UEs of cells of different operators can simultaneously transmit the same PRACH sequence on unlicensed carriers of different frequency bands.
The third method comprises the following steps: different operator cells UE adopt CDM coordination mode to obtain the unauthorized resource of PRACH, namely different operator cells UE adopt CDM mode to send PRACH on the same unauthorized carrier wave at the same time.
The obtained unauthorized resource may specifically be: grouping the existing 838 preambles in a predefined manner, selecting different groups for different cells, or using different cyclic shifts of the same root sequence by adjacent cells, so as to implement that the PRACH is simultaneously transmitted on the same unlicensed carrier by using the CDM scheme; or, the number of 64 root sequences in each cell within a certain time is randomly selected, so as to realize that the PRACH is simultaneously transmitted on the same unlicensed carrier by adopting a CDM mode. Different random numbers can be generated through random sequences, and the random sequences corresponding to the random numbers are associated with the subframe numbers and the cell IDs, so that the adjacent cells can achieve the effect of interference randomization.
Correspondingly, different cells realize the coordination of the several kinds of unauthorized resources of the PRACH by one of the following coordination methods, that is, notify other cells of the PRACH resource configuration information or configuration indication information of the local cell:
the method comprises the following steps: a predefined manner, that is, multiple operators determine resources of PRACH on an unlicensed carrier of each operator through mutual negotiation, and the unlicensed resources of the PRACH of adjacent cells are different, such as different time domain location resources, different frequency bands, or different preambles and the like; after the determination, the UE of each operator cell sends the PRACH at the predefined time or the predefined unauthorized frequency band, so that the condition of serious collision is avoided.
The second method comprises the following steps: the signaling notification mode is that the network access base station sends the PRACH resource configuration information or configuration indication information of the cell UE through the unauthorized common channel, and the cells of the subsequent different operators select other different PRACH unauthorized resources for the adjacent cells to configure.
For example, assuming that the base station a is a base station that starts to use the unlicensed carrier first in the geographic location (in practical application, the first base station that starts to use the unlicensed carrier may be determined according to the actual deployment situation of the operator of the geographic location L1), the base station a will send the PRACH resource configuration information of the local cell on the unlicensed common channel, and this information may be sent through display signaling or notified to other base stations through other means.
The method for sending the PRACH resource configuration information of the cell may be as follows: directly carrying PRACH resource configuration information on an unauthorized carrier of a base station A through a common channel; wherein, the resource configuration information mainly includes: the method comprises the steps of uplink bandwidth, a PRACH frequency domain position f1, a time domain period t1, and the number of ZC root sequences of a lead code 1-20.
Or, the method for sending the PRACH resource configuration information of the cell may be: the frequency domain position of the common channel maps resource configuration group number information of the PRACH, for example, the frequency domain position f2 corresponds to the group number 7 of the PRACH resource configuration.
Or, the method for sending the PRACH resource configuration information of the cell may be: predefining a one-to-one correspondence relationship between the sequences and the configuration groups to determine resource groups, for example, a sequence 00110110 identifies a corresponding group number 9; the sequence carried by the common channel maps the PRACH resource configuration group on the unlicensed carrier.
It should be noted that: the PRACH resource configuration information of the cell on the public channel is periodically sent, if other follow-up base stations use the unauthorized carrier, the public channel is firstly subjected to blind detection, the used or standby unauthorized resource is determined according to the blind detection result, and then different unauthorized resources are selected.
Or, the method for sending the PRACH resource configuration information of the cell may be: and the base station or the subordinate UE which occupies the unauthorized resource sends the PRACH resource configuration indication information of the cell through the occupied signal. The indication information is a display bit indication or an indication by means of implicit mapping. The PRACH resource configuration information is one or more of a time domain resource configuration, a frequency domain resource configuration, or a code domain resource configuration.
The third method comprises the following steps: in the blind detection method, the cells of subsequent different operators firstly access the PRACH sent by the adjacent cells through blind detection, and then select different PRACH configurations for the cell after determining the configuration of the PRACH unauthorized resource of the first access cell.
Here, the cells of the same operator may implement different time domain or frequency domain or preamble configurations of PRACH resources on the unlicensed carrier through air interface interactive negotiation, thereby avoiding a serious collision problem when neighboring cells configure the same PRACH unlicensed resources.
After the base stations negotiate according to the method, the PRACH specific resource configuration information on the unauthorized resource of the cell is notified to the UE of the cell through system information or paging information, and the UE sends the corresponding PRACH on the corresponding unauthorized resource at the corresponding moment according to the configuration information. Wherein,
in practical application, if multiple UEs in the same cell transmit the same preamble in the same time-frequency resource, the contention conflict problem may occur, and at this time, the contention conflict problem may be solved by using the existing subsequent contention scheme, which is not described herein again.
In addition, in addition to the above three methods for informing other cells of the PRACH resource configuration information or configuration indication information of the local cell, the unauthorized resources of the PRACH may be predefined and grouped according to time domain (different subframes or system frames), frequency domain, or preamble.
For example, preamble with root sequence number of 0 ~ 837 is grouped.
Specific grouping methods and numbering examples contained by each group are as follows:
a first group: 1, M +1,2M +1,3M +1,4M +1,5M +1, … …, (Q-1) · M + 1;
second group: 2, M +2,2M +2,3M +2,4M +2,5M +2, … …, (Q-1) · M + 2;
third group: 3, M +3,2M +3,3M +3,4M +3,5M +3, … …, (Q-1) · M + 3;
…………………………
group M: m,2M,3M,4M,5M,6M, … …, Q · M.
Wherein Q, M are all positive integers.
The base station randomly selects a group of resources to be allocated to the cell at intervals, or the leader group index of each cell is determined by random numbers generated by random sequences, and the sequences and the random numbers determined to be used by adjacent cells are different.
It should be noted that the coordination of the unauthorized resources of the cells of different operators can be performed from two aspects:
in one aspect, as shown in fig. 5, the resource configuration corresponding to the existing PRACH may be directly divided.
For example, for FDD, the existing 64 configurations of the original LTE are divided according to the operators, for example, subframe 2 with PRACH configuration index parameter of 26 defined in the existing LTE may be allocated to the UE of one operator for use, subframe 5 is used by the UE of another operator, and subframe 8 is shared by two operators; alternatively, the original 64 configurations may be divided, and different operators may allocate different ones of them.
On the other hand, a new resource allocation may be added on the basis of the PRACH resource allocation specified in the existing LTE, and the resource allocations of different operators are different.
For example, for FDD, a new configuration index 65 is added, the preamble format is 0, the corresponding system frame is an integer multiple of 3, and the subframe is 0.
Besides the method for coordinated transmission of the unlicensed PRACH, the following methods may be adopted by cells of different operators:
and the negotiation is not considered in the first configuration, different configurations are selected after the serious interference or collision is found, and then the configuration of changing the PRACH by the UE of the cell is informed through system information or RRC information.
In the non-LBT mode, the unauthorized resource coordination method provided by the embodiment can avoid the problem of resource collision caused by the fact that multiple cells simultaneously use unauthorized resources to send PRACH, thereby effectively realizing resource coordination on the premise of avoiding interference.
And the second method comprises the following steps: transmitting by means of LBT
The base station or the base station triggers subordinate UE to monitor or compete for resources on a predefined carrier to acquire unauthorized resources. In this way, only subordinate UEs of base stations competing for unlicensed resources can transmit PRACH on an unlicensed carrier. A subordinate UE of a base station that does not contend for unlicensed resources may not be able to transmit PRACH on the corresponding unlicensed carrier for a period of time.
In this case, a UE that does not contend for a resource may transmit a PRACH through a channel that can be directly used without performing resource contention or a clean channel assessment procedure.
And the third is that: sending by means of LBT and non-LBT combination
Specifically, it is predefined that some PRACH unauthorized resources are acquired in a non-LBT manner, and other PRACH unauthorized resources are acquired in an LBT manner.
For the UE, on the one hand, the PRACH may be sent according to predefined negotiated unlicensed resources. On the other hand, the unauthorized resource competition can be performed on the PRACH unauthorized resource acquired by the LBT mode, and the PRACH can be transmitted after the resources are competed, so that the access probability can be increased.
It can be seen from the above description that, through coordination of different operators, the problem of collision and interference caused by the fact that UEs in multiple cells simultaneously transmit the same preamble sequence on the same unlicensed carrier is solved, and the access delay is reduced.
EXAMPLE III
This embodiment describes a method for coordinating and transmitting an SRS unlicensed resource in multiple cells of different operators.
The SRS unlicensed resources may include time domain resources (OFDM symbols, subframes), frequency domain resources, and code domain resources corresponding to different sequences and cyclic shifts.
The SRS on the unlicensed carrier may be transmitted in several ways.
The first method comprises the following steps: transmission mode using non-LBT
In this way, multiple cells of multiple operators are allowed to directly acquire SRS unlicensed resources without contention, so that UEs subordinate to the multiple cells of the multiple operators transmit SRS on an unlicensed carrier, but in order to avoid interference, the multiple operators are required to perform resource coordination. The specific implementation methods for multi-operator multi-cell SRS resource coordination include the following:
the method comprises the following steps: different operators are distinguished by adopting different OFDM symbols or time slot time division modes, different base stations of the same operator negotiate through an X2 port that UE of different cells sends SRS through different sub-frame time division, frequency division or code division modes.
Specifically, as shown in fig. 4, multiple operator cells transmit SRS through different OFDM symbols.
Different operators may differentiate the unlicensed symbol resources of SRS by one of the following means, i.e. negotiate the unlicensed resources of SRS:
the first method is as follows: a predefined manner;
specifically, after negotiation, each operator may fixedly use one or more OFDM symbols of each subframe.
The second method comprises the following steps: signaling;
specifically, the network access base station sends the indication information of the OFDM symbol where the SRS of the UE of the cell is located through the unlicensed common channel, and subsequently, the cells of different operators select other different OFDM symbols. The indication information of the OFDM symbol where the SRS is located on the unlicensed common channel is periodically sent, and all base stations need to blindly detect the unlicensed common channel to acquire the OFDM symbol where the SRS of the UE of different operator cells is located.
Or, the base station or the subordinate UE which preempts the unauthorized resource sends the SRS resource configuration indication information of the cell through the occupation signal. The indication information is a display bit indication or an indication by means of implicit mapping. For example, an OFDM symbol where a 3-bit display indication is located is defined, or a specific symbol index is implicitly obtained through a predefined occupancy signal, such as a mapping relationship between a sequence index and different symbols.
Here, the way of knowing the OFDM symbol where the SRS is located through the reference signal pattern transmitted through the common channel is as follows:
assuming that the reference signal is a CRS, one way maps a symbol index by a frequency domain offset position of the CRS, frequency-shifting 0 subcarrier is a first OFDM symbol, 2 is a second OFDM symbol, and so on;
alternatively, the mapping relationship between the periodic offset and the symbol is predefined by the reference signal. The mapping relationship is shown in table 1:
TABLE 1
The third method comprises the following steps: blind detection;
specifically, the subsequent cells detect OFDM symbols one by one, and agree with some judgment rules, finally determine the unauthorized resource allocation of SRS of other adjacent operator cells, and then allocate different SRS unauthorized resources to the cell.
The method is as follows: acquiring SRS unauthorized resources used by other cells by monitoring or detecting occupied signals, and then configuring different SRS unauthorized resources for the cell;
the fifth mode is as follows: obtaining SRS subframe set of a certain cell by receiving broadcast system messages sent by other base stations, and then selecting different subframe sets, such as configuring T in the cellSFCAnd ΔSFCThe two parameters are different from the above; here, TSFCRepresents a subframe period; deltaSFCIndicating the subframe offset.
Besides the coordination mode, the neighboring cells of the same operator may also directly interact with the SRS configuration message through X2 to perform interference coordination of the SRS unlicensed resource, and the interference coordination method may adopt one of the following methods:
one, subframe time division, namely different subframes of different cells SRS, through configuring TSFCAnd ΔSFCOne of the two parameters is implemented differently. Different UEs in the same cell may further be configured with different periods and offset time divisions.
Secondly, SRS subframes of different cell UEs are the same, and frequency domain positions are different;
and thirdly, the SRS bandwidths of the different cell UEs are the same, the root sequences are different (different groups), and the same cell UE adopts different cyclic shift orthogonalizations.
Then, the base station broadcasts the SRS symbol of the own cell through PBCH, and notifies the UE of relevant parameters such as SRS period, offset, bandwidth, cyclic shift, comb, etc. through RRC message. The same UE completes the detection of the whole bandwidth through multiple different frequency domain position configurations.
Other methods for performing SRS unlicensed resource coordination similar to different operators include: different operators transmit the SRS through different unlicensed frequency bands in a frequency division manner; different cells of the same operator negotiate different OFDM symbols/different sub-frame time divisions, or narrowband SRS frequency division in the maximum frequency band, or code division; the sequences used by all UEs in the same cell are from the same sequence group, and SRS orthogonalization is achieved with cyclic shift or comb when UEs have the same bandwidth, so that orthogonality is naturally achieved with FDM when having different bandwidths.
The second method comprises the following steps: and sending the SRS unauthorized resources of different cells of different operators in a grouped coordination mode.
First, it is predefined to group all SRS unlicensed resources (subframe, symbol, frequency domain, root sequence), or to group SRS unlicensed resources only in a certain domain.
The set of SRS unauthorized resources of the same operator forms a large set, the set index is x {0, 1.. multidot.M }, each large set further includes several subsets for each cell, i.e. the set of SRS unauthorized resources used by a certain cell can select a subset in the set, and the subset index y {0, 1.. multidot.N }, so that the SRS unauthorized resources of a certain cell of a certain operator can be uniquely determined by two dimensions (x, y).
Then, the network access base station broadcasts the indication information in the unauthorized common channel to indicate the group number used by the SRS of the cell, and other base stations acquire the configuration information of the unauthorized resource of the SRS of the cell by monitoring the indication information, so that the cells of different adjacent operators select different x values, and the cells of the same operator select different y values.
The other base stations may also implicitly obtain the corresponding SRS configuration group through the cell ID of the first network access base station, and particularly, the value of y may be associated with the cell ID.
Or, other base stations may implicitly obtain configuration groups (leader sequence (838) grouping, one-to-one correspondence, then PRACH resource of a certain cell corresponds to SRS configuration of the cell) through PRACH resource of the cell trapped in the network base station in a Broadcast Control Channel (BCCH), and other cells obtain PRACH resource of the cell by receiving BCCH, thereby indirectly obtaining configuration information of SRS unlicensed resource of the cell, and then selecting different groups.
Or, the configuration information of the cell SRS unlicensed resource is implicitly obtained through a sequence used by an occupied signal sent by the base station or the UE on the unlicensed carrier. Here also the sequence of occupied signals and the SRS resource configuration are predefined one-to-one correspondence.
And finally, the base station informs the SRS resource configuration parameters of the UE SRS sequence cyclic shift, comb and the like of the local cell through RRC information.
As can be seen from the above description, cells of different operators coordinate to use SRS unlicensed resources in a non-LBT manner, so that multiple UEs can transmit SRS on an unlicensed carrier and measure a U carrier on the premise of interference coordination/avoidance, and a subsequent base station can perform reasonable uplink scheduling/resource allocation when contending for resources based on a measurement result, thereby improving spectrum efficiency.
And the second method comprises the following steps: transmission scheme using LBT
Specifically, the LBT transmission scheme is as follows: the base station or the base station triggers subordinate UE to monitor or compete for resources on the predefined carrier to acquire the unauthorized resources, only the subordinate UE of the base station competing for the unauthorized resources can send the SRS, and the subordinate UE of the base station not competing for the resources cannot send the SRS.
In this way, the process of dynamically transmitting the SRS by the UE is as follows:
first, the base station itself or the base station triggers the subordinate UE to perform resource contention of the unauthorized resource.
Then, suppose that the base station itself competes for the unlicensed resource at time n, and the base station sends DCI through the licensed carrier or the contended unlicensed carrier to trigger the UE of the cell to send the SRS while or after sending the occupied signal on the contended unlicensed resource.
In the LBT transmission scheme, the time to preempt the resource is uncertain, so the UE usually transmits the aperiodic SRS. In order to support more UEs to transmit the SRS in the occupied time, the SRS resource is expanded to a plurality of OFDM symbols of one subframe, and the frequency domain structure of each symbol is the same as that of the SRS of one subframe of the original LTE.
The DCI contains signaling indicating the OFDM symbol index used for SRS of each UE, and other parameter sets (including bandwidth, frequency domain position, comb, cyclic shift, antenna port and period, etc.) are configured to the UE through RRC message.
In practical applications, a new DCI format may be defined, and the format is specifically used for triggering multiple UEs to perform SRS transmission. Specifically, several bits in the DCI are needed to indicate the OFDM symbol, the parameter set, in which the aperiodic SRS of a particular UE is located.
Optionally, during the occupied time, some subframes or OFDM symbols are predefined to transmit SRS, and other subframes or symbols are used for transmitting uplink and downlink data.
And after the UE receives the signaling, the SRS is transmitted at the n + k moment according to the indicated parameters. In consideration of the limitation of the occupied time and the period, the value of k should be as small as possible, so as to ensure that the UE which occupies the time as much as possible completes the measurement.
In practical application, in the LBT transmission mode, the SRS bandwidth may be full bandwidth.
If the UE contends for the unlicensed resource at the time n, the UE may immediately transmit the SRS on the camped unlicensed carrier according to the SRS resource indication information configured by the base station last time, and the SRS may be continuously and repeatedly transmitted to serve as the camping signal.
Here, the occupancy signal has two roles:
one function is that the UE can be used as an occupied signal to indicate that the unlicensed resource is occupied, and at the same time, inform other base stations and the UE under which base station of which operator the UE occupies the unlicensed resource, so that the other base stations cannot use the resource, and the home base station can schedule data or send control information on a carrier of the unlicensed resource, so as to allow the UE to send an SRS; or, the UE of the same base station transmits data on the carrier according to the scheduling information before the base station.
Another effect is that measurements can be made on the channel.
The SRS unlicensed resource used as the camping signal is a dedicated part and all other base stations can receive the SRS as the camping signal. Therefore, after receiving the SRS broadcasted by the UE, the other base station knows that the unlicensed carrier has been occupied by the other device, and will not seize the unlicensed resource within a subsequent period of time.
Accordingly, after receiving the SRS serving as an occupied signal, the base station to which the UE belongs may perform data scheduling using the unlicensed resource occupied by the UE on the one hand, and may estimate channel quality based on the received SRS on the other hand, so as to allocate a proper Modulation and Coding Scheme (MCS) to the UE when scheduling the carrier next time. For the case that the unlicensed carrier is used for Time Division Duplexing (TDD), the measurement result may also be used for scheduling downlink data.
The LBT transmission mode does not need to consider the problem of interference of a plurality of operators, and for a contended cell, compared with the traditional SRS transmission mode under LTE, the SRS transmission mode increases the transmission opportunity and capacity expansion, ensures that the UE under the base station contending to the resource can perform measurement, and the base station performs uplink scheduling based on the measurement result or TDD performs Multiple-input Multiple-Output (MIMO) transmission by utilizing channel reciprocity. At this time, the UE that does not contend for the resource may transmit the SRS through a channel that can be directly used without performing resource contention or a clean channel estimation procedure, so as to reduce the measurement delay.
And the third is that: sending by means of LBT and non-LBT combination
Specifically, in some time, different operators perform predefined negotiation (or grouping), signaling notification, blind detection, or implicit mapping, so as to finally implement that the SRS of the UE in the neighboring cell multiplexes the unlicensed resources (i.e., in a non-LBT manner) through different OFDM symbols/subframes in a time division manner or in a frequency division manner or in a code division manner; other times are sent with LBT. In this way, the base station performs scheduling based on the most recent measurement results.
Wherein certain times may be predefined ones of the non-contiguous times. For example, LBT transmission is not needed from the beginning of the time when the subframe number satisfies mod (n, T) ═ k; where n is the system frame number, T is a predefined period, k is an offset, and the duration is 10ms or 20ms or 50ms, etc.
In this manner, the SRS is transmitted in a combination of periodic and aperiodic manner. The periodic transmission means: transmitting through non-LBT coordinated resources, wherein the non-periodic transmission refers to: by contention transmission, the transmission opportunity increases to meet the measurement requirements.
As can be seen from the above description, by using the combination of LBT and non-LBT to transmit SRS in this embodiment, the base station can perform reasonable uplink scheduling/resource allocation when contending for resources based on the measurement result, thereby improving the spectrum efficiency. In addition, the measurement opportunity is increased, the UE under the base station competing to the resource can be ensured to carry out measurement, and the base station carries out uplink scheduling or TDD utilizes the channel reciprocity to carry out MIMO transmission based on the recent measurement result.
Example four
This embodiment describes a resource coordination method for data channels (PUSCH and PDSCH) on unlicensed carriers.
The data channels of different operators may coordinate the unlicensed resources by one of the following:
the first method is as follows: predefined static configuration mode
Different operators negotiate to use different unauthorized resources for data channel transmission respectively; for example, the unlicensed resource is divided into a plurality of segments according to the time domain, and the same operator uses a plurality of consecutive or non-consecutive time segments; or, the unlicensed resource is divided into a plurality of frequency segments according to the frequency domain, and the same operator uses several frequency segments which are continuous or discontinuous.
Or, different operators may transmit data simultaneously in the same unlicensed frequency band, but the data is scrambled by using different orthogonal codes or non-orthogonal codes. The orthogonal code may be a PN code or a ZC root sequence.
The second method comprises the following steps: semi-static or dynamic configuration mode
The base station of the first operator broadcasts the unlicensed resources used by the data channel of the cell, such as which subframes, which carriers, and the orthogonal codes used, through the common channel, and the base station of the second operator listens to the information and then selects different resources to be configured for the data channel.
When the unauthorized resource used by the data channel of the cell is broadcasted, the specific resource indication may adopt one of the following manners:
the first method is as follows: and displaying a signaling notification mode, namely directly carrying the used resources through the proprietary signaling and the bits.
The second method comprises the following steps: the implicit notification mode implicitly indicates the used resources through a preamble or a reference signal.
Specifically, a mapping relation between a ZC root sequence of a preamble or a reference signal and an unlicensed resource is predefined, where the preamble or the reference signal may be sent as an occupied signal on an unlicensed carrier or a common channel.
Resource coordination of data transmission of unauthorized resources for different cells of the same operator, in addition to the above manner, the unauthorized resources can be used directly by means of X2 mutual information negotiation.
Specifically, as shown in fig. 7, for the resource allocation and transmission of PDSCH/PUSCH on the unlicensed resource, one of the following methods may be adopted:
the first method comprises the following steps: each subframe corresponds to the PDSCH/PUSCH of one UE, and the PDSCH/PUSCH of different UEs is transmitted on different OFDM symbols or different subframes.
The UE of different operators can realize the transmission of data of different UEs on different subframes through an LBT mode, and different UEs of the same base station indicate the subframe index through base station scheduling signaling.
The second method comprises the following steps: each subframe or a plurality of subframes correspond to PDSCH/PUSCHs of different UEs, and different UEs of different operators can multiplex unauthorized resources in a frequency division mode.
The third method comprises the following steps: the PDSCH/PUSCH of multiple UEs are transmitted simultaneously on the same unlicensed carrier, and users of different operators are distinguished by different orthogonal or non-orthogonal codes (NOMA).
Here, the UEs may belong to the same or different operators, and the specific resource location may be indicated by DCI of the base station. One piece of DCI may indicate the transmission modes of multiple subframes of a certain UE at the same time, that is, a multi-subframe scheduling mode is used, or one piece of DCI indicates the transmission modes of multiple UEs at the same time, that is, the scheduling information of multiple UEs is included in one piece of DCI in a joint coding mode; wherein the DCI can be transmitted in a licensed carrier or an unlicensed carrier.
The method can realize the coordinated transmission of the UE data of different operators on the unauthorized carrier.
EXAMPLE five
This embodiment describes a transmission method in which the UE uses LBT and non-LBT in combination on the unlicensed carrier.
The transmission mode combining LBT and non-LBT refers to the following steps: on one hand, the UE may send an uplink signal, such as SRS, PRACH, etc., in a non-LBT manner configured by the base station; on the other hand, the UE may also directly transmit the uplink physical channel or signal on the camped unlicensed carrier, that is, transmit in the LBT manner.
For example, suppose that at time N, a UE competes for an unlicensed carrier resource, and immediately sends an SRS or a preamble PRACH on the carrier, where the sent uplink signal may indicate that the carrier is occupied and is prevented from being snatched by other UEs or base stations, and on the other hand, by monitoring a sequence of the uplink signal, other UEs or base stations may know which base station of which operator snatches the resource and implicitly obtain a PRACH and SRS configuration set corresponding to the base station to which the UE belongs; the base stations of different operators will then allocate different resources to neighbouring cells to avoid interference. Meanwhile, the UE under the same base station may also perform data transmission on the resource under the scheduling of the base station.
And then the UE contending to the unlicensed carrier resources can transmit PUSCH, or PUCCH and DMRS on the carrier according to the scheduling information previously transmitted by the base station. The channel may be a full bandwidth map or sent on an unlicensed carrier in FDM manner by multiple UEs as currently specified by LTE.
Here, when transmitting in the LBT manner, the base station needs to notify the scheduling information to the UE through DCI before the UE contends for the resource.
If the configuration is sent in a non-LBT manner, UEs of different operators may send PUSCH, PUCCH, PRACH, or SRS on an unlicensed carrier simultaneously in a frequency-division or code-division manner.
The following method can be adopted to coordinate the unauthorized resources:
and dividing the unauthorized resources, wherein one part is transmitted in an LBT mode, and the other part is transmitted in a non-LBT mode.
First, predefining all the unlicensed resources to be divided, wherein one part is used for the base station contending to the unlicensed resources to configure the unlicensed resources of the UE in the cell (LBT mode), and the other part is used for the UE under the base station not contending to the unlicensed resources (LBT mode).
The divided unlicensed resources may be time domain resources or frequency domain resources.
For the part of unauthorized resources in the LBT mode, different cells of different operators share and use in a contention mode, and for the part of unauthorized resources in the non-LBT mode, different cells of different base stations of different operators use in a manner of coordinating interference.
And the UE sends uplink data or receives downlink data on the corresponding unauthorized carrier at the corresponding moment according to the received indication.
By the method, on one hand, equal transmission unauthorized opportunities of the UE can be ensured, on the other hand, interference can be suppressed, and data transmission or measurement time is prolonged.
EXAMPLE six
This embodiment explains resource coordination of each channel when an unlicensed carrier is transmitted.
For the case where multiple channels are simultaneously transmitted on an unlicensed carrier, the following process may be performed:
for the case where an unlicensed carrier is used for uplink transmission: if the PRACH and the SRS of the same UE are transmitted on the same unauthorized resource at the same time, the UE needs to give up the transmission of the SRS, so as to avoid the interference on the PRACH; if the PUCCH and SRS of the same UE are transmitted on the same unlicensed carrier at the same time, the UE also needs to drop SRS transmission or adopt a PUCCH puncturing structure. And the transmission of the SRS is compensated by other occupied signals or a dynamically triggered transmission mode or channel detection is carried out by the DMRS to replace the SRS to complete channel measurement on the unlicensed carrier. For the case of simultaneous transmission of PUSCH and SRS, different symbol time divisions may be predefined.
For an unlicensed carrier that uses a frame structure form similar to TDD, for example, the frame structure shown in fig. 8 may be used, the PDCCH, the PDSCH, and other uplink channels or signals are sent in a time division manner, and the SRS, the CRS, and the DRS are usually sent after a Clear Channel Assessment (CCA), the uplink subframe is used for transmitting the PRACH or the PUSCH, and the downlink subframe is used for sending the PDCCH, the ePDCCH, and the PDSCH.
And the transmission on the unlicensed carriers of a plurality of channels is realized by the channel coordination mode.
EXAMPLE seven
In this embodiment, a specific process of the unlicensed carrier coordination and the data transmission method is described from the base station side, as shown in fig. 9, the process mainly includes the following steps:
step 901: the base station selects an unauthorized carrier wave to be subjected to data scheduling transmission;
step 902: the base station judges whether the resource needs to be monitored first for resource competition, if so, step 903 is executed, otherwise, step 905 is executed;
step 903: the base station itself or triggers subordinate UE to perform resource competition;
step 904: after the contention to the resource, transmitting data on the contended unauthorized carrier;
step 905: and transmitting or receiving data at the coordinated time or scrambling by a coordinated code according to the result of resource coordination.
Here, resource coordination is a static, semi-static, or dynamic approach.
Wherein, the static mode is as follows: different operators negotiate or allocate fixed unlicensed resources.
The semi-static mode is as follows: the base station broadcasts the unauthorized resource indication information used by the cell to other base stations through a common channel so that the other base stations can select different unauthorized resources.
The dynamic mode is as follows: the base station indicates the non-authorized resource of the cell through the occupied signal or the physical signaling, and other base stations select different non-authorized resources according to the information.
Example eight
In this embodiment, an unlicensed carrier coordination and data transmission process is described from a UE side, as shown in fig. 10, the process mainly includes the following steps:
step 1001: UE receives a signaling sent by a base station;
here, the received signaling is an unauthorized resource preemption indication signaling or a scheduling signaling, or an unauthorized resource configuration signaling of a physical channel or a signal.
Step 1002: the UE judges whether the non-authorized resource needs to be contended according to the signaling, if so, the step 1003 is executed, otherwise, the step 1005 is executed;
step 1003: the UE carries out resource competition on the corresponding unauthorized carrier according to the signaling indication;
here, the resource preemption signaling may also be indicated by scheduling signaling.
For example, assume that the base station sends resource preemption signaling at time N, which is carried by RRC dedicated message or directly carried by UL grant, or implicitly indicated by PHICH channel.
Then, after receiving the signaling, the UE starts resource competition after N time, that is, clean channel evaluation, and if the channel is idle or competes for resources, the UE immediately sends an occupation signal to occupy the channel to prevent it from being snatched by other base stations or UEs, where the occupation signal is SRS, or preamble or other ZC sequence or PN sequence, and the sequence is in one-to-one correspondence with the cell ID, and after receiving the message, other base stations or UEs can know which cell competes for resources.
If the UE does not receive the UL grant, the resource base station occupied by the UE may be used to send downlink data, and at this time, the UE needs to receive the downlink data sent by the base station through blind detection.
Step 1004: after the contention to the resource, transmitting or receiving data on the contended unauthorized resource;
here, the UE may transmit data after the unlicensed carrier and the corresponding primary carrier are aligned.
Step 1005: and transmitting the physical channel or the signal on the corresponding unauthorized carrier at the corresponding time according to the configuration signaling.
Example nine
To implement the method of the embodiment of the present invention, this embodiment provides a base station, as shown in fig. 11, where the base station includes: an acquisition unit 111 and a broadcast unit 112; wherein,
the acquiring unit 111 is configured to acquire an unauthorized resource used by the cell;
the broadcasting unit 112 is configured to broadcast the unauthorized resource configuration information of the local cell to other base stations, so that the other base stations can determine the unauthorized resource configuration of the local cell according to the unauthorized resource configuration information of the local cell.
The obtaining unit 111 is specifically configured to: obtaining the unauthorized resource used by the cell in a resource competition mode; or,
coordinating with other base stations in advance, and taking predefined unauthorized resources obtained by coordination as unauthorized resources used by the cell; or,
acquiring the use information of the unauthorized resources of other cells; and acquiring the unauthorized resource used by the cell according to the unauthorized resource used by the other cell.
The obtaining of the unauthorized resource used by the cell in the contention mode specifically includes:
and the UE or the trigger subordinate UE carries out resource competition on the set unauthorized carrier wave to obtain the unauthorized resource used by the cell.
Here, the subordinate UE may be an idle UE, a UE that receives a scheduling request, or a UE that is allowed to be scheduled.
In the latter two ways, the base station or the subordinate UE may send signals or channels directly on the coordinated resources without performing a clean channel assessment procedure.
Here, in actual application, all the unauthorized resources may be divided into two parts, one part is a resource shared by all cells, and the part of the resource requires the base station to obtain the unauthorized resource used by the cell in a resource contention manner; and the other part is the resources not shared by all the cells, and the part of the resources needs the base station to obtain the unauthorized resources used by the cell in a manner of coordinating with other base stations. Wherein the division of the unauthorized resources may be divided according to network needs.
The pre-coordinating with other base stations, using the predefined unauthorized resource obtained by the coordination as the unauthorized resource used by the cell, specifically includes:
acquiring the unauthorized resource used by the cell by adopting any one of different OFDM symbols, different time slots, different subframes which are the same, different periods and/or offset time division, different unauthorized frequency band frequency division and different sequence code division modes; or,
all the unauthorized resources can be grouped or set into different sets, and the unauthorized resources contained in each group or set are all orthogonal or partially orthogonal, so that the interference can be effectively avoided; and acquiring the unauthorized resource used by the cell by adopting a mode different from the group or set of other cells.
The obtaining of the unauthorized resource used by the cell by using a mode different from a group or a set of other cells specifically includes:
acquiring unauthorized resources used by a cell according to a preset corresponding relation between the cell and a group or a set; or,
acquiring the unauthorized resource used by the cell by using a random number generated by a hash function or a random sequence and combining the corresponding relation between the function or the random number and the group or the set; or,
and acquiring the unauthorized resource used by the cell by monitoring the common channel or the unauthorized resource group or the set indication information used by other cells which occupy the signal bearing.
Here, the function used is similar in form to one of the following:
f ( k ) = Σ i = k k + 10 c ( i ) * 2 i - k , f ( i ) = f ( i - 1 ) + Σ k = i i + 5 c ( k ) * 2 k - i ; or,
f ( k ) = f ( k - 1 ) * Σ k = i i + 5 c ( k ) * 2 k - i .
wherein,initializing once every radio frame or period T, and k is a subframe or a variation period T.
The hash function is related to a cell ID and a time slot; the random sequence is a sequence with irrelevance, such as an m sequence, a gold sequence and the like.
The obtaining of the usage information of the unauthorized resource of the other cell specifically includes:
obtaining the use information of the unauthorized resources of other cells through blind detection; or,
acquiring the use information of the unauthorized resources of other cells by intercepting the relevant information of the unauthorized resource use sent by other base stations on the unauthorized common channel; or,
acquiring the use information of the unauthorized resources of other cells by receiving the occupation signals sent by other cells; or,
and acquiring the use indication information of the unauthorized resources of other cells through an air interface PBCH or system information.
The usage information of the unauthorized resource of the other cell can be obtained by displaying a signaling bearer or by mapping relationship between a sequence and the unauthorized resource.
The unauthorized resource configuration of the cell may include one or more of time domain resource, frequency domain resource and code domain resource configuration; accordingly, the broadcasted unauthorized resource configuration information may include: and one or more of time domain resource, frequency domain resource and code domain resource configuration information. In actual application, the broadcasted unauthorized resource configuration information is the unauthorized resource configuration information of the SRS and/or the PRACH; wherein,
the broadcasted unauthorized resource configuration information of the SRS is all or partial information of the existing SRS resource configuration, or symbol resource configuration information of a newly added SRS;
the broadcasted unauthorized resource configuration information of the PRACH is all or part of the existing PRACH resource configuration information or newly added PRACH sequence resource configuration information.
The unlicensed resources are used for transmitting physical channels or signals.
Wherein the information transmitted using the unlicensed resource may include: one or more of a PRACH preamble sequence, SRS, PUSCH, PUCCH, DMRS, CRS, CSI-RS, PRS, DRS, PDCCH, PDSCH, or other channel or signal for synchronization measurements.
Accordingly, in practical applications, when multiple channels or signals are transmitted, the unlicensed resource configuration information may indicate a portion(s) of the multiple channels or signals transmitted, and for another portion of the channels or signals transmitted, other base stations may determine through other signals or channels received.
The broadcasting unit 112 is specifically configured to: and broadcasting the unauthorized resource configuration information of the cell through an unauthorized common channel, a PBCH or an occupied signal.
The broadcasting the unlicensed resource configuration information of the cell through the unlicensed common channel specifically includes:
directly carrying the unauthorized resource configuration information through the unauthorized common channel; or,
mapping the unauthorized resource configuration information at the frequency domain position of the unauthorized common channel; the frequency domain positions correspond to the unauthorized resource configuration information one by one; or,
mapping the unauthorized resource configuration information through a sequence sent by the unauthorized common channel; the sequence corresponds to unauthorized configuration information one by one; or,
and transmitting the unauthorized resource configuration information through a pattern of a preset reference signal transmitted by the unauthorized common channel.
Wherein, when the sequence transmitted through the unlicensed common channel maps the unlicensed resource configuration information, in other words, when the sequence transmitted on the unlicensed common channel is transmitted on some predefined unlicensed carriers according to a predefined period, the transmitted sequence is transmitted on the first several OFDM symbols of the channel. Here, in practical applications, the transmitted sequence may be transmitted at the first 1,2 or 3 OFAMs of the channel.
The occupation signal can represent the occupation of unauthorized resources on one hand; and on the other hand, the unauthorized resource configuration information of the cell can be represented.
The occupation signal may correspond to the unauthorized resource configuration information one to one.
The root sequence of the occupancy signal may be the same as the root sequence of the transmission reference signal.
The occupied signal cyclic shift may indicate the number of subframes for the local cell to occupy the unlicensed resource to transmit the data channel.
The pattern of the occupancy signal may indicate a format and periodicity of a PRACH channel and/or a symbol index of an SRS.
The other base station includes: base stations of different operators and base stations of the same operator.
When the other base stations are base stations of the same operator, the unauthorized resource configuration information may be directly interacted through X2, so as to perform interference coordination of the unauthorized resource.
The base station may further include: a configuration information notification unit, configured to notify the unauthorized resource configuration information of the subordinate UE through a common channel, a PBCH, a physical signaling, or an occupied signal mapping manner.
The physical signaling includes a system message, which may specifically be a DCI or RRC message.
The base station may further include: and the data sending unit is used for sending a channel or a signal on the unauthorized resource corresponding to the unauthorized resource configuration information.
In practical application, the obtaining Unit 111 may be implemented by a Central Processing Unit (CPU), a Micro Control Unit (MCU), a Digital Signal Processor (DSP), or a Programmable logic array (FPGA) in the base station in combination with a transceiver; the broadcasting unit 112, the configuration information notifying unit, and the data transmitting unit may be implemented by a transmitter in a base station.
As can be seen from the above description, in practical applications, there are several ways for the coordination of unauthorized resources and the data transmission:
the first method is as follows: the LBT mechanism is fully adopted, that is, the base station or UE needs to perform sensing or resource contention before sending data, and only the base station and/or the UE under the base station which detects the resource is free or contends to the unlicensed resource can send information on the unlicensed carrier.
The second method comprises the following steps: the LBT mechanism is not followed, i.e. the base station or UE does not need to listen to the unlicensed carrier or perform resource contention to send data according to predefined coordinated unlicensed resources.
The third method comprises the following steps: the unlicensed resources are divided into two parts, as shown in fig. 2, one part of the unlicensed resources adopts the LBT mechanism, and the rest of the resources do not follow the LBT mechanism.
In practical application, for the PUSCH, PUCCH, DMRS, PDCCH, and PDSCH, different base stations transmit on the unlicensed carrier in the first mode.
For channels or signals used for synchronization or measurement, such as PRACH, SRS, CRS, CSI-RS, PRS, DRS and the like, different base stations transmit on an unlicensed carrier in a second mode or a third mode.
The synchronization channel or the measurement signal may be transmitted through a channel that can be directly used without performing a resource contention or a clean channel estimation procedure.
Different base stations of the same operator can configure different PRACH and SRS resources for neighboring cells through wired, air interface signaling or negotiation at X2 port.
If negotiation is possible for two base stations of different operators, the coordination mode of the two base stations under the same operator is preferably adopted, otherwise, the configuration of unauthorized resources can be performed on two adjacent cells in the following mode:
the first method is as follows: the first base station sends resource allocation indication information of the cell through a common channel on an unlicensed carrier, and the second base station selects to allocate different resources of the cell after detecting the indication information, such as different OFDM symbols, or different subframe patterns, or different periods or offsets, or different frequency bands, different codes, and the like.
And the common channel is transmitted on a preset unauthorized carrier wave according to a preset period.
The second method comprises the following steps: the base station obtains the use indication information of the unauthorized resource of other cells by receiving the occupied signals sent by other cells, thereby selecting and configuring different resources of the cell.
The third method comprises the following steps: the base station directly detects the resource allocation signaling sent by other base stations to the UE through an air interface physical broadcast channel or system information to acquire the use indication information of the unauthorized resource of other cells, and then selects different resources to allocate to the cell.
Specifically, corresponding unauthorized resources can be implicitly obtained by intercepting preamble sequences or reference signals sent by other base stations or other base station subordinate UEs, the sequences can be agreed with the resources in advance, and then different resources are selected and configured to the cell.
The method is as follows: the resources PRACH and SRS corresponding to the non-authorization are grouped in advance, as shown in fig. 3, the grouping may be divided only according to a certain time domain, frequency domain, or code domain, or all time frequency and sequences may be divided uniformly without being divided into a certain domain, and different resources of the cell are selectively configured according to the grouping.
Specifically, firstly, all the resources are divided into a plurality of large sets according to the number of operators, for example, the set index is x ═ {0, 1.. said., M }, M is an integer greater than or equal to the operator, that is, the x index of the same operator is the same, then, a plurality of subsets are included in each large set for each cell, that is, a subset of the set can be selected from the resource groups used by a certain cell, and the subset index y ═ 0, 1.. said., N }, so that the unauthorized PRACH and SRS resources of a certain cell of a certain operator can be uniquely determined through two dimensions (x, y).
Then, the first M pieces of the predefined preamble sequence are in one-to-one correspondence with the large set index. The first base station or the subordinate UE sends a leader sequence or the cyclic shift of the sequence on a public channel of the unlicensed carrier, other base stations or the UE can know the resource large set index corresponding to the operator by monitoring the sequence, and then different resources of the cell are selected and configured according to the resource large set indexes.
Or the resource subset index used is determined by a function or a random number generated by a random sequence.
The preamble sequence may also be sent on a resource using LBT, that is, a base station or UE contending for the resource sends the preamble sequence on a contended unlicensed carrier, on one hand, to use the preamble sequence to make an occupation signal to prevent other base stations from using the resource, and after detecting the preamble, the base station or UE under the base station may use the resource, on the other hand, to indicate a set of PRACH or SRS resources used by the base station or the operator, and the base stations of other operators may select different sets to configure to a subordinate UE.
Adjacent cells of different base stations of the same operator use different unauthorized resources through air interface interaction negotiation, or determine the used resource subset index through random numbers generated by functions or random sequences.
The base station notifies the coordinated cell resource configuration information to other base stations through a common channel or an occupied signal, and notifies the UE through a system message, a physical broadcast channel, a control signaling or an RRC message.
The unauthorized resource configuration may include: at least one of an OFDM symbol index, a slot index, a period, an offset, a PRB index and number, a sequence index, a cyclic shift, and a comb, etc.
In order to implement the method according to the embodiment of the present invention, this embodiment further provides a UE, as shown in fig. 12, where the UE includes: a receiving unit 121 and an executing unit 122; wherein,
the receiving unit 121 is configured to receive a signaling sent by a base station;
the executing unit 122 is configured to perform resource contention on a corresponding unlicensed carrier according to the signaling, or send a physical channel or a signal on a corresponding unlicensed resource.
Wherein the signaling may be resource preemption signaling or unauthorized resource configuration signaling.
The execution unit 122 is specifically configured to: when the signaling is a resource preemption signaling, performing resource competition on a corresponding unauthorized carrier; and when the signaling is the unauthorized resource configuration signaling, sending a physical channel or a signal on the corresponding unauthorized resource according to the unauthorized resource configuration information corresponding to the unauthorized resource configuration signaling.
Here, the resource preemption signaling may be implemented by at least one of: scheduling signaling indication, NACK information indication, defined RRC message bearer.
The unlicensed resource configuration information may be carried by a common channel, an occupied signal, a PBCH, or a physical signaling.
When the method is actually applied, all the unauthorized resource configuration information corresponding to the physical channel or signal can be divided into a first part, a second part and a third part according to needs in a predefined way; in other words, all the unauthorized resource configuration information corresponding to the physical channel or signal includes a preset first part of unauthorized resource configuration information, a preset second part of unauthorized resource configuration information, and a preset third part of unauthorized resource configuration information; the first part of unauthorized resource configuration information is carried through a common channel or an occupied signal, the second part of unauthorized resource configuration information is carried through a PBCH, and the third part of unauthorized resource configuration information is carried through a physical signaling.
The physical signaling may be: RRC message or DCI, the physical signaling may be sent on a licensed or unlicensed carrier.
Here, when the unlicensed resource configuration information indicates resource locations of data channels for the DCI, the unlicensed resource configuration information indicates resource locations of the data channels of multiple subframes.
The unauthorized resource configuration information may include: at least one of an OFDM symbol index, a slot index, a period, an offset, a PRB index and number, a sequence index, a cyclic shift, and a comb, etc.
The sending a physical channel or a signal on the corresponding unauthorized resource according to the unauthorized resource configuration information corresponding to the unauthorized resource configuration signaling specifically includes:
the execution unit 122 sends physical channels or signals on the unlicensed resources in one of TDM, FDM, CDM or different resource groups according to the unlicensed resource configuration information.
In practical application, the unauthorized resource may include two parts, one part is obtained through contention of the base station to which the UE belongs, or the UE itself, or other UEs of the same base station, and the other part is obtained through negotiation between the base station to which the UE belongs and other base stations.
The execution unit 122 is further configured to immediately send an SRS and a PRACH preamble sequence after contending for a resource on a corresponding unlicensed carrier, or repeatedly send one of the first N symbols of uplink data, a ZC sequence, and a PN sequence; wherein N is a positive integer less than or equal to 6.
The physical channels or signals adopt a full bandwidth mapping mode.
In practical applications, the receiving unit 121 may be implemented by a receiver in the UE, and the executing unit 122 may be implemented by a CPU, an MCU, a DSP, or an FPGA in the UE in combination with the receiver.
In order to implement the method according to the embodiment of the present invention, this embodiment further provides a system for using unauthorized resources, as shown in fig. 13, where the system includes: a first base station 131 and one or more second base stations 132; wherein,
the first base station 131 is configured to acquire an unauthorized resource used by the cell; and broadcasting the unauthorized resource configuration information of the cell to the second base station, so that the second base station can determine the unauthorized resource configuration of the cell according to the unauthorized resource configuration information of the cell of the first base station 131.
The second base station 132 is configured to receive the unauthorized resource configuration information broadcast by the first base station 131.
The second base station 132 and the first base station 131 may belong to the same operator or may belong to different operators.
The system may further include a UE configured to receive signaling sent by the first base station 131; and performing resource competition on the corresponding unauthorized carrier or transmitting a physical channel or a signal on the corresponding unauthorized resource according to the signaling.
It should be noted that: the specific processing procedures of the first base station 131 and the UE are already described in the above embodiments, and are not described again.
In this embodiment, a base station obtains an unauthorized resource used by a cell; the unauthorized resource configuration information of the cell is broadcasted to other base stations, so that the other base stations can determine the unauthorized resource configuration of the cell according to the unauthorized resource configuration information of the cell; the UE receives the signaling sent by the base station; according to the signaling, resource competition is carried out on the corresponding unauthorized carrier wave, or a physical channel or a signal is sent on the corresponding unauthorized resource, so that the problem of resource coordination when each cell sends the physical channel or the signal when the LTE system operates in the frequency band of the unauthorized carrier wave can be solved, and under the premise of interference coordination/avoidance, base stations or UE of different cells of different operators can send data on the unauthorized carrier wave, thereby improving the spectrum efficiency.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (35)

1. A method for using unauthorized resources, applied to a base station, the method comprising:
obtaining the unauthorized resource used by the cell;
and broadcasting the unauthorized resource configuration information of the cell to other base stations so that the other base stations determine the unauthorized resource configuration of the cell according to the unauthorized resource configuration information of the cell.
2. The method of claim 1, wherein the acquiring the unlicensed resources used by the cell comprises:
obtaining the unauthorized resource used by the cell in a resource competition mode; or,
coordinating with other base stations in advance, and taking predefined unauthorized resources obtained by coordination as unauthorized resources used by the cell; or,
acquiring the use information of the unauthorized resources of other cells; and acquiring the unauthorized resource used by the cell according to the unauthorized resource used by the other cell.
3. The method of claim 2, wherein the obtaining of the unlicensed resource used by the cell in the contention mode includes:
and the UE or the UE triggering the subordinate user equipment carries out resource competition on the set unauthorized carrier wave so as to obtain the unauthorized resource used by the cell.
4. The method according to claim 2, wherein said coordinating with other base stations in advance, and using the predefined unlicensed resources obtained by coordination as the unlicensed resources used by the cell, includes:
acquiring the unauthorized resource used by the cell by adopting any one of different Orthogonal Frequency Division Multiplexing (OFDM) symbols, different time slots, different subframes, same, different periods and/or offset time division, different unauthorized frequency band frequency division and different sequence code division modes; or,
grouping or setting different sets of all the unauthorized resources, wherein the unauthorized resources contained in each group or set are all orthogonal or partially orthogonal; and acquiring the unauthorized resource used by the cell by adopting a mode different from the group or set of other cells.
5. The method according to claim 4, wherein the obtaining the unlicensed resources used by the cell by adopting a different manner from the group or set of other cells comprises:
acquiring unauthorized resources used by a cell according to a preset corresponding relation between the cell and a group or a set; or,
acquiring the unauthorized resource used by the cell by combining the random number generated by the hash function or the random sequence with the corresponding relation between the function or the random number and the group or the set; or,
and acquiring the unauthorized resource used by the cell by monitoring the common channel or the unauthorized resource group or the set indication information used by other cells which occupy the signal bearing.
6. The method of claim 2, wherein the obtaining the usage information of the unlicensed resources of the other cell comprises:
obtaining the use information of the unauthorized resources of other cells through blind detection; or,
acquiring the use information of the unauthorized resources of other cells by intercepting the relevant information of the unauthorized resource use sent by other base stations on the unauthorized common channel; or,
acquiring the use information of the unauthorized resources of other cells by receiving the occupation signals sent by other cells; or,
and acquiring the use indication information of the unauthorized resources of other cells through an air interface physical broadcast channel PBCH or system information.
7. The method of claim 2, wherein the usage information of the unlicensed resources in the other cells is obtained by displaying a signaling bearer or by mapping a sequence to the unlicensed resources.
8. The method of claim 1, wherein the broadcasting of the unlicensed resource configuration information of the cell to other base stations is:
and broadcasting the unauthorized resource configuration information of the cell through an unauthorized common channel, a PBCH or an occupied signal.
9. The method of claim 8, wherein the broadcasting the unlicensed resource configuration information of the cell via an unlicensed common channel comprises:
directly carrying the unauthorized resource configuration information through the unauthorized common channel; or,
mapping the unauthorized resource configuration information at the frequency domain position of the unauthorized common channel; the frequency domain positions correspond to the unauthorized resource configuration information one by one; or,
mapping the unauthorized resource configuration information through a sequence sent by the unauthorized common channel; the sequence corresponds to unauthorized configuration information one by one; or,
and transmitting the unauthorized resource configuration information through a pattern of a preset reference signal transmitted by the unauthorized common channel.
10. The method of claim 8, wherein the occupancy signal has at least one of the following characteristics:
the occupied signals correspond to the unauthorized resource configuration information one by one;
the root sequence of the occupied signal is the same as the root sequence of the transmitted reference signal;
the occupied signal cyclic shift indicates the number of subframes of the non-authorized resource transmission data channel occupied by the cell;
the pattern of the occupancy signal indicates the format and the period of a Physical Random Access Channel (PRACH) and/or the symbol index of a channel Sounding Reference Signal (SRS).
11. The method of claim 1, wherein the other base stations comprise: the base station of the operator different from the base station broadcasting the unauthorized resource configuration information of the local cell and the base station of the operator same as the base station broadcasting the unauthorized resource configuration information of the local cell.
12. The method of claim 1, wherein the broadcasted unauthorized resource configuration information comprises: and one or more of time domain resource, frequency domain resource and code domain resource configuration information.
13. The method of claim 12, wherein the broadcasted unlicensed resource configuration information is unlicensed resource configuration information of an SRS and/or a PRACH.
14. The method of claim 13, wherein the broadcasted unauthorized resource configuration information of the SRS is all or part of information of an existing SRS resource configuration, or is symbol resource configuration information of a newly added SRS.
15. The method of claim 13, wherein the broadcasted unauthorized resource configuration information of the PRACH is all or part of existing PRACH resource configuration, or is newly added PRACH sequence resource configuration information.
16. The method of claim 1, further comprising:
and informing the unauthorized resource configuration information of the subordinate UE in a mode of mapping a common channel, a PBCH, physical signaling or an occupied signal.
17. The method of claim 16, wherein the physical signaling is Downlink Control Information (DCI) or a Radio Resource Control (RRC) message.
18. The method of claim 1, further comprising:
and transmitting a channel or a signal on the unauthorized resource corresponding to the unauthorized resource configuration information.
19. A method for using unauthorized resources, applied to a UE, the method comprising:
receiving a signaling sent by a base station;
and according to the signaling, carrying out resource competition on the corresponding unauthorized carrier or sending a physical channel or a signal on the corresponding unauthorized resource.
20. The method of claim 19, wherein when the signaling is resource preemption signaling, the resource preemption signaling is implemented by at least one of: scheduling signaling indication, NACK information indication, defined RRC message bearer.
21. The method of claim 19, wherein when the signaling is unlicensed resource configuration signaling, the unlicensed resource configuration information is carried by a common channel, an occupied signal, a PBCH, or a physical signaling.
22. The method according to claim 21, wherein all the unlicensed resource configuration information corresponding to the physical channel or signal includes a preset first part of unlicensed resource configuration information, a preset second part of unlicensed resource configuration information, and a preset third part of unlicensed resource configuration information; the first part of unauthorized resource configuration information is carried through a common channel or an occupied signal, the second part of unauthorized resource configuration information is carried through a PBCH, and the third part of unauthorized resource configuration information is carried through a physical signaling.
23. The method of claim 21, wherein the physical signaling is: RRC message, or DCI.
24. The method of claim 19, wherein the signaling is unlicensed resource configuration signaling; the sending a physical channel or signal on a corresponding unlicensed carrier according to the signaling includes:
and according to the configuration information of the unauthorized resources, transmitting the physical channels or signals on the unauthorized resources in one of a Time Division Multiplexing (TDM), a Frequency Division Multiplexing (FDM), a Code Division Multiplexing (CDM) mode or a mode of different resource groups.
25. The method of claim 19, wherein the physical channels or signals are mapped using full bandwidth.
26. The method of claim 19, wherein after contending for resources on a corresponding unlicensed carrier, the method further comprises:
immediately sending SRS, PRACH leader sequence, or repeatedly sending one of the first N symbols, ZC sequence and PN sequence of uplink data; n is a positive integer less than or equal to 6.
27. A base station, characterized in that the base station comprises: an acquisition unit and a broadcast unit; wherein,
the acquiring unit is used for acquiring the unauthorized resource used by the cell;
the broadcast unit is configured to broadcast the unauthorized resource configuration information of the local cell to other base stations, so that the other base stations determine the unauthorized resource configuration of the local cell according to the unauthorized resource configuration information of the local cell.
28. The base station of claim 27, wherein the obtaining unit is specifically configured to: obtaining the unauthorized resource used by the cell in a resource competition mode; or,
coordinating with other base stations in advance, and taking predefined unauthorized resources obtained by coordination as unauthorized resources used by the cell; or,
acquiring the use information of the unauthorized resources of other cells; and acquiring the unauthorized resource used by the cell according to the unauthorized resource used by the other cell.
29. The base station of claim 27, wherein the broadcasting unit is specifically configured to: and broadcasting the unauthorized resource configuration information of the cell through an unauthorized common channel, a PBCH or an occupied signal.
30. The base station of claim 27, wherein the base station further comprises: a configuration information notification unit, configured to notify the unauthorized resource configuration information of the subordinate UE through a common channel, a PBCH, a physical signaling, or an occupied signal mapping manner.
31. The base station of claim 27, wherein the base station further comprises: and the data sending unit is used for sending a channel or a signal on the unauthorized resource corresponding to the unauthorized resource configuration information.
32. A UE, wherein the UE comprises: a receiving unit and an execution unit; wherein,
the receiving unit is used for receiving a signaling sent by a base station;
the execution unit is configured to perform resource contention on a corresponding unlicensed carrier according to the signaling, or send a physical channel or a signal on a corresponding unlicensed resource.
33. The UE of claim 32, wherein the performing unit is further configured to transmit one of an SRS, a preamble sequence, or a first N symbols, a ZC sequence, and a PN sequence for repeatedly transmitting uplink data immediately after contending for resources on a corresponding unlicensed carrier; n is a positive integer less than or equal to 6.
34. A system for using unauthorized resources, the system comprising: a first base station and more than one second base station; wherein,
the first base station is used for acquiring the unauthorized resource used by the cell; and broadcasting the unauthorized resource configuration information of the cell to the second base station so that the second base station determines the unauthorized resource configuration of the cell according to the unauthorized resource configuration information of the cell of the first base station.
The second base station is configured to receive the unauthorized resource configuration information broadcast by the first base station.
35. The system of claim 34, further comprising: the UE is used for receiving the signaling sent by the first base station; and performing resource competition on the corresponding unauthorized carrier or transmitting a physical channel or a signal on the corresponding unauthorized resource according to the signaling.
CN201510018155.2A 2015-01-14 2015-01-14 Method, system, base station and user equipment for using unauthorized resources Active CN105848165B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510018155.2A CN105848165B (en) 2015-01-14 2015-01-14 Method, system, base station and user equipment for using unauthorized resources
PCT/CN2015/092985 WO2016112721A1 (en) 2015-01-14 2015-10-27 Unauthorized resources application method and system, base station, ue and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510018155.2A CN105848165B (en) 2015-01-14 2015-01-14 Method, system, base station and user equipment for using unauthorized resources

Publications (2)

Publication Number Publication Date
CN105848165A true CN105848165A (en) 2016-08-10
CN105848165B CN105848165B (en) 2022-01-18

Family

ID=56405215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510018155.2A Active CN105848165B (en) 2015-01-14 2015-01-14 Method, system, base station and user equipment for using unauthorized resources

Country Status (2)

Country Link
CN (1) CN105848165B (en)
WO (1) WO2016112721A1 (en)

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106793069A (en) * 2016-11-28 2017-05-31 京信通信技术(广州)有限公司 A kind of localization method and device
CN106793068A (en) * 2016-11-28 2017-05-31 京信通信技术(广州)有限公司 A kind of SRS resource collocation method and device
CN106851662A (en) * 2017-01-18 2017-06-13 京信通信技术(广州)有限公司 A kind of unlicensed spectrum resource allocation methods and device
WO2018028434A1 (en) * 2016-08-11 2018-02-15 中兴通讯股份有限公司 Data transmission method and apparatus
WO2018027911A1 (en) * 2016-08-12 2018-02-15 Lenovo Innovations Limited (Hong Kong) Non-orthogonal communication
CN107800523A (en) * 2016-09-02 2018-03-13 上海诺基亚贝尔股份有限公司 Method and apparatus for allocating random access channel resource
CN107925518A (en) * 2015-08-21 2018-04-17 Lg 电子株式会社 The method of effective subframe for unauthorized band and the device using this method are determined in a wireless communication system
CN107959546A (en) * 2016-10-18 2018-04-24 华为技术有限公司 The adaptive configuration method of adjustment and device of a kind of narrowband systems interface-free resources
WO2018082589A1 (en) * 2016-11-04 2018-05-11 华为技术有限公司 Method for transmitting data, terminal device and network device
WO2018103611A1 (en) * 2016-12-09 2018-06-14 上海朗帛通信技术有限公司 Method and apparatus for user equipment and base station
WO2018127178A1 (en) * 2017-01-06 2018-07-12 华为技术有限公司 Data transmission method and device
CN108289335A (en) * 2017-01-10 2018-07-17 中兴通讯股份有限公司 Data transmission method for uplink and device, terminal
CN109152046A (en) * 2017-06-19 2019-01-04 中国移动通信有限公司研究院 A kind of ascending resource configuration method and relevant device
WO2019015590A1 (en) * 2017-07-18 2019-01-24 华为技术有限公司 Transmission method and device thereof
CN109314967A (en) * 2018-09-06 2019-02-05 北京小米移动软件有限公司 Data transmission method, equipment and device
WO2019033367A1 (en) * 2017-08-17 2019-02-21 华为技术有限公司 Information sending method and device
CN109804680A (en) * 2016-10-13 2019-05-24 高通股份有限公司 Cooperative resource discovering
CN110267350A (en) * 2018-03-12 2019-09-20 中兴通讯股份有限公司 Downlink, ascending transmission method, device and base station, terminal, storage medium
WO2019218925A1 (en) * 2018-05-16 2019-11-21 索尼公司 Electronic apparatus and method for wireless communication and computer-readable storage medium
CN110574473A (en) * 2017-03-02 2019-12-13 株式会社Ntt都科摩 User terminal and wireless communication method
WO2020015528A1 (en) * 2018-07-18 2020-01-23 维沃移动通信有限公司 Method and apparatus for performing scheduling and listening on unlicensed frequency band
WO2020020004A1 (en) * 2018-07-24 2020-01-30 上海朗帛通信技术有限公司 User equipment for wireless communication and method and device of base station
CN110784905A (en) * 2018-07-25 2020-02-11 财团法人工业技术研究院 Network access method and user equipment using the same
CN110832945A (en) * 2017-07-07 2020-02-21 高通股份有限公司 Channel access and medium reservation mechanism
CN110971355A (en) * 2018-09-28 2020-04-07 华为技术有限公司 Configuration method of uplink dynamic-authorization-free transmission and communication device
WO2020182152A1 (en) * 2019-03-13 2020-09-17 中兴通讯股份有限公司 Data transmission method and device, user equipment, base station, communication system and storage medium
WO2020199138A1 (en) * 2019-04-02 2020-10-08 Zte Corporation Downlink control signaling in wireless communication
CN109152005B (en) * 2017-06-15 2021-01-22 电信科学技术研究院 Uplink beam indication method, UE, base station and storage medium
CN112534923A (en) * 2018-08-10 2021-03-19 索尼公司 Electronic device, method, and storage medium for wireless communication system
WO2021103033A1 (en) * 2019-11-30 2021-06-03 华为技术有限公司 Resource indication method and apparatus in unlicensed frequency spectrum
CN113225730A (en) * 2020-02-06 2021-08-06 联发科技股份有限公司 Method for UE capability information transfer supporting NR-U and user equipment thereof
CN113595700A (en) * 2018-06-28 2021-11-02 中兴通讯股份有限公司 Transmission link configuration using reference signal mapping
WO2022147805A1 (en) * 2021-01-08 2022-07-14 Oppo广东移动通信有限公司 Positioning measurement method, terminal device, network device

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10356812B2 (en) 2017-02-06 2019-07-16 Qualcomm Incorporated Variable-length transmission schemes
CN109327868B (en) * 2017-07-31 2023-10-10 北京三星通信技术研究有限公司 Cell measurement method and device, and cell switching method and device
WO2018194352A1 (en) 2017-04-17 2018-10-25 Samsung Electronics Co., Ltd. Method and device for uplink power control
KR102210990B1 (en) 2017-04-17 2021-02-02 삼성전자 주식회사 Method and apparatus for uplink power control
CN116017709A (en) * 2018-01-16 2023-04-25 上海朗帛通信技术有限公司 User equipment, method and device in base station for wireless communication
CN110475343A (en) * 2018-05-10 2019-11-19 索尼公司 Electronic device, wireless communications method and computer-readable medium
CN110582119B (en) * 2018-06-11 2022-11-25 上海朗帛通信技术有限公司 Method and device used in user equipment and base station for wireless communication
GB2576198B (en) * 2018-08-09 2020-07-29 Tcl Communication Ltd Transmission resource sharing
CN111565456B (en) * 2019-02-14 2023-05-02 中国信息通信研究院 Method and equipment for configuring uplink shared channel resources
CN113273302B (en) * 2019-03-29 2023-02-28 Oppo广东移动通信有限公司 Wireless communication method, terminal equipment and network equipment
CN114258150B (en) * 2020-09-25 2023-11-24 维沃移动通信有限公司 Channel access selection method, device, communication equipment and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120108179A1 (en) * 2010-10-29 2012-05-03 Nokia Corporation Coexistence of heterogeneous secondary networks
WO2012070855A2 (en) * 2010-11-24 2012-05-31 Lg Electronics Inc. Method of communicating data based on an unlicensed band in a wireless communication system
EP2528370A1 (en) * 2011-05-04 2012-11-28 Motorola Mobility LLC Method and apparatus for providing user equipment access to tv white space resources by a broadband cellular network
CN102843696A (en) * 2011-06-21 2012-12-26 中国移动通信集团设计院有限公司 Method, device and system for sharing spectrum resource among wireless systems
CN103069882A (en) * 2010-08-13 2013-04-24 瑞典爱立信有限公司 Dual operation of user equipment in licensed and unlicensed spectrum
WO2013069978A1 (en) * 2011-11-08 2013-05-16 엘지전자 주식회사 Method for acquiring information on occupied channel of device which subscribes to information service in television white space band

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150126207A1 (en) * 2012-05-31 2015-05-07 Nokia Corporation Coexistence of lte operated in unlicesnsed band

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103069882A (en) * 2010-08-13 2013-04-24 瑞典爱立信有限公司 Dual operation of user equipment in licensed and unlicensed spectrum
US20120108179A1 (en) * 2010-10-29 2012-05-03 Nokia Corporation Coexistence of heterogeneous secondary networks
WO2012070855A2 (en) * 2010-11-24 2012-05-31 Lg Electronics Inc. Method of communicating data based on an unlicensed band in a wireless communication system
EP2528370A1 (en) * 2011-05-04 2012-11-28 Motorola Mobility LLC Method and apparatus for providing user equipment access to tv white space resources by a broadband cellular network
CN102843696A (en) * 2011-06-21 2012-12-26 中国移动通信集团设计院有限公司 Method, device and system for sharing spectrum resource among wireless systems
WO2013069978A1 (en) * 2011-11-08 2013-05-16 엘지전자 주식회사 Method for acquiring information on occupied channel of device which subscribes to information service in television white space band

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZTE: "Potential solutions to obtain unlicensed spectrum", 《3GPP TSG RAN WG1 MEETING #79 R1-144826》 *

Cited By (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11019501B2 (en) 2015-08-21 2021-05-25 Lg Electronics Inc. Method for determining valid subframe for non-licensed band in wireless communication system, and apparatus using the method
CN107925518A (en) * 2015-08-21 2018-04-17 Lg 电子株式会社 The method of effective subframe for unauthorized band and the device using this method are determined in a wireless communication system
CN107925518B (en) * 2015-08-21 2021-04-13 Lg 电子株式会社 Method for determining valid subframe for unlicensed band in wireless communication system and apparatus using the same
US11425756B2 (en) 2016-08-11 2022-08-23 Zte Corporation Data transmission method and apparatus
WO2018028434A1 (en) * 2016-08-11 2018-02-15 中兴通讯股份有限公司 Data transmission method and apparatus
CN107734710A (en) * 2016-08-11 2018-02-23 中兴通讯股份有限公司 A kind of method and device of data transfer
US10700824B2 (en) 2016-08-12 2020-06-30 Lenovo Innovations Limited (Hong Kong) Non-orthogonal communication
WO2018027911A1 (en) * 2016-08-12 2018-02-15 Lenovo Innovations Limited (Hong Kong) Non-orthogonal communication
CN107800523A (en) * 2016-09-02 2018-03-13 上海诺基亚贝尔股份有限公司 Method and apparatus for allocating random access channel resource
CN107800523B (en) * 2016-09-02 2021-03-19 上海诺基亚贝尔股份有限公司 Method and apparatus for configuring random access channel resources
TWI762513B (en) * 2016-10-13 2022-05-01 美商高通公司 Wireless communication method and apparatus for coordinated resource discovery, and article of manufacture having related instructions thereon
CN109804680A (en) * 2016-10-13 2019-05-24 高通股份有限公司 Cooperative resource discovering
US11395250B2 (en) 2016-10-13 2022-07-19 Qualcomm Incorporated Coordinated resource discovery
CN109804680B (en) * 2016-10-13 2021-08-10 高通股份有限公司 Coordinated resource discovery
WO2018072684A1 (en) * 2016-10-18 2018-04-26 华为技术有限公司 Adaptive allocation adjustment method and apparatus for air interface resource of narrowband system
CN107959546A (en) * 2016-10-18 2018-04-24 华为技术有限公司 The adaptive configuration method of adjustment and device of a kind of narrowband systems interface-free resources
WO2018082589A1 (en) * 2016-11-04 2018-05-11 华为技术有限公司 Method for transmitting data, terminal device and network device
CN106793069A (en) * 2016-11-28 2017-05-31 京信通信技术(广州)有限公司 A kind of localization method and device
CN106793068A (en) * 2016-11-28 2017-05-31 京信通信技术(广州)有限公司 A kind of SRS resource collocation method and device
WO2018103611A1 (en) * 2016-12-09 2018-06-14 上海朗帛通信技术有限公司 Method and apparatus for user equipment and base station
US11343850B2 (en) 2016-12-09 2022-05-24 Shanghai Langbo Communication Technology Company Limited Method and device in UE and base station
WO2018127178A1 (en) * 2017-01-06 2018-07-12 华为技术有限公司 Data transmission method and device
US10892868B2 (en) 2017-01-06 2021-01-12 Huawei Technologies Co., Ltd. Data transmission method and apparatus
CN108289335B (en) * 2017-01-10 2023-07-14 中兴通讯股份有限公司 Data transmission method and device and terminal
CN108289335A (en) * 2017-01-10 2018-07-17 中兴通讯股份有限公司 Data transmission method for uplink and device, terminal
WO2018130081A1 (en) * 2017-01-10 2018-07-19 中兴通讯股份有限公司 Data transmission method and device, and terminal
WO2018133631A1 (en) * 2017-01-18 2018-07-26 京信通信系统(中国)有限公司 Method and apparatus for allocating unlicensed frequency spectrum resource
CN106851662B (en) * 2017-01-18 2019-11-19 京信通信系统(中国)有限公司 A kind of unlicensed spectrum resource allocation methods and device
CN106851662A (en) * 2017-01-18 2017-06-13 京信通信技术(广州)有限公司 A kind of unlicensed spectrum resource allocation methods and device
CN110574473A (en) * 2017-03-02 2019-12-13 株式会社Ntt都科摩 User terminal and wireless communication method
CN109152005B (en) * 2017-06-15 2021-01-22 电信科学技术研究院 Uplink beam indication method, UE, base station and storage medium
CN109152046A (en) * 2017-06-19 2019-01-04 中国移动通信有限公司研究院 A kind of ascending resource configuration method and relevant device
CN110832945B (en) * 2017-07-07 2021-06-29 高通股份有限公司 Channel access and medium reservation mechanism
CN110832945A (en) * 2017-07-07 2020-02-21 高通股份有限公司 Channel access and medium reservation mechanism
US11206687B2 (en) 2017-07-07 2021-12-21 Qualcomm Incorporated Channel access and medium reservation mechanism
WO2019015590A1 (en) * 2017-07-18 2019-01-24 华为技术有限公司 Transmission method and device thereof
US11606776B2 (en) 2017-07-18 2023-03-14 Huawei Technologies Co., Ltd. Transmission method and apparatus thereof
CN109275191B (en) * 2017-07-18 2021-03-30 华为技术有限公司 Transmission method and device thereof
CN109275191A (en) * 2017-07-18 2019-01-25 华为技术有限公司 A kind of transmission method and its device
WO2019033367A1 (en) * 2017-08-17 2019-02-21 华为技术有限公司 Information sending method and device
US11470640B2 (en) 2018-03-12 2022-10-11 Zte Corporation Downlink and uplink transmission methods and devices, base station, terminal, and storage medium
CN110267350A (en) * 2018-03-12 2019-09-20 中兴通讯股份有限公司 Downlink, ascending transmission method, device and base station, terminal, storage medium
WO2019218925A1 (en) * 2018-05-16 2019-11-21 索尼公司 Electronic apparatus and method for wireless communication and computer-readable storage medium
US11425710B2 (en) 2018-05-16 2022-08-23 Sony Corporation Multiple access technologies in a new radio system
US11894951B2 (en) 2018-06-28 2024-02-06 Zte Corporation Transmission link configuration using reference signal mapping
CN113595700A (en) * 2018-06-28 2021-11-02 中兴通讯股份有限公司 Transmission link configuration using reference signal mapping
CN110740018A (en) * 2018-07-18 2020-01-31 维沃移动通信有限公司 Scheduling method, monitoring method and device on unlicensed frequency band
WO2020015528A1 (en) * 2018-07-18 2020-01-23 维沃移动通信有限公司 Method and apparatus for performing scheduling and listening on unlicensed frequency band
CN110753398B (en) * 2018-07-24 2022-03-01 上海朗帛通信技术有限公司 Method and device used in user equipment and base station for wireless communication
WO2020020004A1 (en) * 2018-07-24 2020-01-30 上海朗帛通信技术有限公司 User equipment for wireless communication and method and device of base station
US11343838B2 (en) 2018-07-24 2022-05-24 Shanghai Langbo Communication Technology Company Limited Method and device in UE and base station for wireless communication
CN110753398A (en) * 2018-07-24 2020-02-04 上海朗帛通信技术有限公司 Method and device used in user equipment and base station for wireless communication
US11140613B2 (en) 2018-07-25 2021-10-05 Industrial Technology Research Institute Network access method and UE using the same
CN110784905B (en) * 2018-07-25 2021-11-16 财团法人工业技术研究院 Network access method and user equipment using the same
CN110784905A (en) * 2018-07-25 2020-02-11 财团法人工业技术研究院 Network access method and user equipment using the same
US11997716B2 (en) 2018-08-10 2024-05-28 Sony Group Corporation Electronic device for wireless communication system, method and storage medium
CN112534923A (en) * 2018-08-10 2021-03-19 索尼公司 Electronic device, method, and storage medium for wireless communication system
WO2020047799A1 (en) * 2018-09-06 2020-03-12 北京小米移动软件有限公司 Data transmission method, device and apparatus
CN109314967B (en) * 2018-09-06 2023-10-10 北京小米移动软件有限公司 Data transmission method, device and apparatus
CN109314967A (en) * 2018-09-06 2019-02-05 北京小米移动软件有限公司 Data transmission method, equipment and device
US11950281B2 (en) 2018-09-06 2024-04-02 Beijing Xiaomi Mobile Software Co., Ltd. Method and device for transmitting data
CN110971355A (en) * 2018-09-28 2020-04-07 华为技术有限公司 Configuration method of uplink dynamic-authorization-free transmission and communication device
WO2020182152A1 (en) * 2019-03-13 2020-09-17 中兴通讯股份有限公司 Data transmission method and device, user equipment, base station, communication system and storage medium
WO2020199138A1 (en) * 2019-04-02 2020-10-08 Zte Corporation Downlink control signaling in wireless communication
US12069684B2 (en) 2019-04-02 2024-08-20 Zte Corporation Downlink control signaling in wireless communication
WO2021103033A1 (en) * 2019-11-30 2021-06-03 华为技术有限公司 Resource indication method and apparatus in unlicensed frequency spectrum
CN113225730A (en) * 2020-02-06 2021-08-06 联发科技股份有限公司 Method for UE capability information transfer supporting NR-U and user equipment thereof
CN113225730B (en) * 2020-02-06 2024-05-28 联发科技股份有限公司 Method for supporting NR-U UE capability information transfer and user equipment thereof
WO2022147805A1 (en) * 2021-01-08 2022-07-14 Oppo广东移动通信有限公司 Positioning measurement method, terminal device, network device

Also Published As

Publication number Publication date
WO2016112721A1 (en) 2016-07-21
CN105848165B (en) 2022-01-18

Similar Documents

Publication Publication Date Title
CN105848165B (en) Method, system, base station and user equipment for using unauthorized resources
JP7070983B2 (en) Methods and devices for mapping control information in wireless communication systems
CN106376050B (en) Setting/determining method and device of subcarrier interval, base station and terminal
CN108604971B (en) Method and apparatus for radio resource allocation in a narrowband communication system
JP6717942B2 (en) Uplink control channel configuration for unlicensed carriers
CN110708153B (en) Wireless communication over unlicensed radio frequency spectrum
EP3554155B1 (en) Resource indication method and user equipment
US11259321B2 (en) SRS carrier based switching on unlicensed bands
EP2868142B1 (en) Sounding reference signal (srs) mechanism for intracell device-to-device (d2d) communication
JP7132396B2 (en) Directed Physical Random Access Channel Resource Management
CN109274476B (en) Control channel transmission and receiving method, base station and user equipment
JP2019146187A (en) Method and apparatus for using channel state information reference signal in wireless communication system
CN110024442A (en) The method and user equipment of minimum system information are provided in a wireless communication system
US20230262660A1 (en) Communication method and device in wireless communication system supporting sidelink carrier aggregation
US20180192321A1 (en) Reference Signal In A Communications Network
EP2536087A1 (en) Method for generating reference signal, base station and terminal
CN105636223B (en) A kind of uplink dispatch method, apparatus and system
US11570760B2 (en) Uplink channel multiplexing and waveform selection
WO2014033460A1 (en) Mobile communications system, network element and method for resource allocation on a virtual carrier for machine-type communications with a narrow band epdcch
US20160242200A1 (en) Data Scheduling Method and Apparatus, Base Station, and Terminal
CN102595604B (en) Method and system for transmitting control information from base station to terminal
US20160242039A1 (en) Methods, Computer Programs, Network Nodes and Communication Device
WO2016070675A1 (en) Method and device for sending downlink information and receiving downlink information
CN108476114B (en) Method of interleaving mode selection for low CM/PAPR transmission
CN111465101A (en) Apparatus and method for performing positioning in new radio

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant