CN105992318B - Management method of deactivation timer and terminal - Google Patents

Management method of deactivation timer and terminal Download PDF

Info

Publication number
CN105992318B
CN105992318B CN201510072565.5A CN201510072565A CN105992318B CN 105992318 B CN105992318 B CN 105992318B CN 201510072565 A CN201510072565 A CN 201510072565A CN 105992318 B CN105992318 B CN 105992318B
Authority
CN
China
Prior art keywords
terminal
carrier
resources
resource
starting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510072565.5A
Other languages
Chinese (zh)
Other versions
CN105992318A (en
Inventor
陈中明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510072565.5A priority Critical patent/CN105992318B/en
Priority to PCT/CN2015/090998 priority patent/WO2016127654A1/en
Publication of CN105992318A publication Critical patent/CN105992318A/en
Application granted granted Critical
Publication of CN105992318B publication Critical patent/CN105992318B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a management method and a terminal for deactivating a timer, wherein the terminal starts a process of competing for resources on an unauthorized carrier; and the terminal starts or restarts a deactivation timer of the unauthorized carrier in the process of competing for the resources on the unauthorized carrier.

Description

Management method of deactivation timer and terminal
Technical Field
The present invention relates to mobile communication technologies, and in particular, to a method and a terminal for managing a deactivation timer.
Background
In a Long Term Evolution (LTE) system, a terminal in a connected state can only communicate with a base station through one serving cell, i.e., a carrier. In order to provide a higher data rate for a terminal, a Carrier Aggregation technology (CA) is proposed in a Long Term Evolution advanced (LTE-a) system, which can provide a larger bandwidth for a terminal with corresponding capability, thereby increasing the peak rate of the terminal. The maximum downlink transmission bandwidth supported by the LTE system is 20MHz, and carrier aggregation is to aggregate two or more Component Carriers (CCs) to support more than 20MHz, and the maximum downlink transmission bandwidth can support no more than 100 MHz. A terminal with carrier aggregation capability may simultaneously transceive data over multiple component carriers. Therefore, in the LTE-a system, after entering a connected state, a terminal may simultaneously communicate with a source base station through a plurality of Component carriers (e.g., CC1, CC2), the base station may assign a Primary Component Carrier (PCC) to the terminal through explicit configuration or according to a protocol convention, and other Component carriers are called Secondary Component Carriers (SCCs). A serving Cell on the PCC is referred to as a Primary serving Cell (Pcell), and a serving Cell on the SCC is referred to as a Secondary serving Cell (Scell). In view of the burstiness of the traffic, although the terminal is operated at the highest rate and may use up to 5 carriers, the actual traffic flow of the terminal is very little or close to zero in the burst gap. At this point, if the terminal continues to wait for data to be received on multiple carriers, a higher power overhead will result.
Therefore, in order to prolong the working time of the terminal, turn off the wireless transmitting and receiving equipment which is not required to be turned on and reduce the unnecessary battery consumption, the concept of activating and deactivating the carrier is introduced into the LTE-A system. Thus, the terminal performs data reception and transmission only on the activated carrier, such as monitoring of a Physical Downlink Control Channel (PDCCH); for the carriers which are not used temporarily, the base station deactivates the carriers through explicit command notification or implicit rule, so that the terminal does not monitor the PDCCH Channel, does not receive data on a Physical Downlink Shared Channel (PDSCH), and does not send uplink data, thereby achieving the purpose of saving power. It should be noted that the PCell is never deactivated by the base station, and the SCell can be flexibly activated and deactivated. Therefore, for further power saving, a deactivation timer corresponding to each SCell is introduced, that is, the terminal does not receive data scheduling when the deactivation timer expires, and the SCell is deactivated by itself through management of the deactivation timer.
In addition, with the rapid growth of data traffic, the licensed spectrum will not be able to withstand such huge data volumes in the near future; LTE operators consider deploying LTE in unlicensed spectrum resources, sharing data traffic in licensed carriers over unlicensed spectrum. Unlicensed carriers (i.e., unlicensed spectrum) refer to spectrum or carriers that can be used without authorization, subject to government regulations. For example, microwave ovens, remote control toy planes, Wireless mice, Wireless keyboards, Wireless Fidelity (WiFi), and the like all use unlicensed carriers. In some cases, the unlicensed carrier needs to be used by contention. When the base station or the terminal does not compete for the resource, the unauthorized carrier cannot be used; after the base station or the terminal contends for the resource, in the process of enabling the unlicensed carrier, the control information is still sent through the licensed carrier, that is, the PCell is also the licensed carrier, and the unlicensed carrier may be used as the Scell, which may be referred to as U-Scell for distinction. In the LTE-a system, in order to utilize the contended resources to the maximum extent, a deactivation process of an unlicensed carrier is introduced. However, there is no effective solution at present how the terminal manages the deactivation timer of the unlicensed carrier after introducing the deactivation process of the unlicensed carrier.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method and a terminal for managing a deactivation timer, which can effectively manage the deactivation timer of an unauthorized carrier.
In order to achieve the above purpose, the technical solution of the embodiment of the present invention is realized as follows:
the embodiment of the invention provides a management method for a deactivation timer, which comprises the following steps:
the terminal starts the process of competing for the resources on the unauthorized carrier;
and the terminal starts or restarts a deactivation timer of the unauthorized carrier in the process of competing for the resources on the unauthorized carrier.
In the above scheme, the starting or restarting the deactivation timer of the unlicensed carrier by the terminal in the process of contending for the resource on the unlicensed carrier includes: when the terminal activates the unauthorized carrier, the terminal starts a deactivation timer of the unauthorized carrier;
or, after the terminal activates the unauthorized carrier, starting a deactivation timer of the unauthorized carrier when the unauthorized carrier enters an activated state;
or, after the terminal competes for the resource, starting or restarting a deactivation timer of the unlicensed carrier when receiving uplink or downlink scheduling on the competed resource;
or after the terminal competes for the resource, starting a deactivation timer of the unauthorized carrier when the use of the competed resource is finished.
In the above scheme, the method further comprises: deactivating the unlicensed carrier when the deactivation timer times out.
In the foregoing solution, the starting of the process of contending for the resource on the unlicensed carrier includes:
when the terminal determines that the resources on the unauthorized carrier need to be contended, starting a process of contending the resources on the unauthorized carrier;
or, when the terminal receives the indication information that the base station needs to compete for the resource on the unlicensed carrier, starting a process of competing for the resource on the unlicensed carrier.
In the foregoing solution, the starting a process of contending for a resource on an unlicensed carrier when the terminal itself determines that the terminal needs to contend for the resource on the unlicensed carrier includes:
and when the terminal determines that the terminal needs to compete for the resources on the unauthorized carrier according to the uplink data volume to be sent, starting a process of competing for the resources on the unauthorized carrier.
In the above scheme, the starting, when the terminal receives the indication information that needs to contend for the resource on the unlicensed carrier and is sent by the base station, a process of contending for the resource on the unlicensed carrier includes:
when the base station determines that the terminal needs to compete for the resources on the unauthorized carrier according to the downlink data volume to be sent, the base station sends indication information of the resources on the unauthorized carrier needing to compete to the terminal; and after receiving the indication information, the terminal starts a process of competing for resources on the unauthorized carrier wave.
In the above scheme, the method further comprises: and after the resources are contended, reporting a contention success message carrying the time information and the bandwidth information of the contended resources to the base station.
The embodiment of the invention also provides a terminal, which comprises a first starting module and a second starting module;
the first starting module is used for starting a process of competing for resources on the unauthorized carrier;
the second starting module is configured to start or restart a deactivation timer of an unlicensed carrier in the process of contending for the resource on the unlicensed carrier.
In the foregoing solution, the second starting module is specifically configured to, when an unauthorized carrier is activated, start a deactivation timer of the unauthorized carrier; or, after activating the unauthorized carrier, starting a deactivation timer of the unauthorized carrier when the unauthorized carrier enters an activated state; or, after the resource is contended, starting or restarting a deactivation timer of the unauthorized carrier when receiving uplink or downlink scheduling on the contended resource; or after the contention of the resources is achieved, starting a deactivation timer of the unauthorized carrier when the usage of the contended resources is completed.
In the above scheme, the terminal further comprises a deactivation module; wherein,
the deactivation module is configured to deactivate the unauthorized carrier when the deactivation timer expires.
In the foregoing solution, the first starting module is specifically configured to, when it is determined that contention for resources on an unlicensed carrier is required, start a process of contending for resources on the unlicensed carrier; or, when receiving indication information that the base station needs to contend for the resource on the unlicensed carrier, starting a process of contending for the resource on the unlicensed carrier.
In the above scheme, the terminal further comprises a reporting module; wherein,
and the reporting module is used for reporting a competition success message carrying the time information and the bandwidth information of the contended resource to the base station after the resource is contended.
According to the management method and the terminal for deactivating the timer, provided by the embodiment of the invention, the terminal starts a process of competing for resources on the unauthorized carrier; and the terminal starts or restarts a deactivation timer of the unauthorized carrier in the process of competing for the resources on the unauthorized carrier. Therefore, the terminal can effectively manage the deactivation timer of the unauthorized carrier, thereby ensuring the automatic deactivation of the unauthorized carrier and further achieving the purpose of power saving.
Drawings
Fig. 1 is a diagram illustrating a relationship between activation of an unlicensed carrier and usage time of contention resources according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating an implementation of a method for managing a deactivation timer according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating an implementation of an application example of a management method based on a deactivation timer according to an embodiment of the present invention;
fig. 4 is a first schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a composition structure of a terminal according to an embodiment of the present invention.
Detailed Description
In the embodiment of the invention, a terminal starts a process of competing for resources on an unauthorized carrier; and the terminal starts or restarts a deactivation timer of the unauthorized carrier in the process of competing for the resources on the unauthorized carrier.
Here, it should be added that, for management of the deactivation timer of the unauthorized carrier, only the starting timing of the deactivation timer needs to be considered. However, there is no special processing for the termination time of the deactivation timer, and it is only necessary to wait for the deactivation timer to time out.
In addition, in order to better describe the management method of the deactivation timer according to the embodiment of the present invention, it is first required to know the relationship between the activation of the unlicensed carrier and the usage time of the contended resource, as shown in fig. 1, from time T1 to time T2, which belongs to the activation process of the terminal on the unlicensed carrier, and from time T2 to time T3, which belongs to the usage time of the contended resource by the terminal.
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
Fig. 2 is a schematic flow chart illustrating an implementation of a management method for a deactivation timer according to an embodiment of the present invention, and as shown in fig. 2, the management method for a deactivation timer according to the embodiment of the present invention includes:
step S201: the terminal starts the process of competing for the resources on the unauthorized carrier;
here, the process of the terminal initiating contention for resources on the unlicensed carrier includes: and when the terminal determines that the resources on the unlicensed carrier need to be contended, starting a process of contending the resources on the unlicensed carrier. Specifically, when the terminal determines that the terminal needs to compete for resources on the unlicensed carrier according to the amount of uplink data to be sent, the terminal starts a process of competing for the resources on the unlicensed carrier;
or, the process of the terminal starting contention for resources on the unlicensed carrier may further include: and when the terminal receives the indication information which is sent by the base station and needs to compete for the resources on the unauthorized carrier, starting the process of competing for the resources on the unauthorized carrier. Specifically, when the base station determines that the terminal needs to compete for the resource on the unlicensed carrier according to the amount of downlink data to be sent, the base station sends indication information of the resource on the unlicensed carrier that needs to be competed for to the terminal; further, after receiving the indication information, the terminal starts a process of contending for resources on the unlicensed carrier.
Step S202: and the terminal starts or restarts a deactivation timer of the unauthorized carrier in the process of competing for the resources on the unauthorized carrier.
Here, the terminal starting or restarting the deactivation timer of the unlicensed carrier in the process of contending for the resource on the unlicensed carrier may include the following four cases:
A) when the terminal activates the unauthorized carrier (corresponding to time T1 in FIG. 1), starting a deactivation timer of the unauthorized carrier;
B) when the terminal activates the unlicensed carrier and waits for the unlicensed carrier to enter an activated state (corresponding to time T2 in fig. 1), starting a deactivation timer of the unlicensed carrier;
in practical applications, the time T2 may be specified, that is, after the terminal activates the unlicensed carrier, the unlicensed carrier enters the active state after waiting for a specified time T1 to T2. The duration of this designated time T1 through T2 may be default or pre-configured. The duration of this specified time T1 to T2 can be configured to be 6ms, usually according to empirical values.
C) When the terminal contends for the resource and receives uplink or downlink scheduling on the contended resource (corresponding to the middle between time T2 and time T3 in fig. 1), starting or restarting a deactivation timer of the unlicensed carrier;
here, after the resource is contended, the terminal reports a contention success message carrying the time information and the bandwidth information of the contended resource to the base station, so that the base station reasonably schedules the terminal to transmit or receive data according to the time information and the bandwidth information of the contended resource.
D) When the terminal has contended for the resource, the deactivation timer of the unlicensed carrier is started when the usage of the contended resource is completed (corresponding to time T3 in fig. 1).
Further, the method may further include: deactivating the unlicensed carrier when the deactivation timer times out.
Therefore, by the method for managing the deactivation timer, the terminal can effectively manage the deactivation timer of the unauthorized carrier, thereby ensuring the automatic deactivation of the unauthorized carrier and further achieving the purpose of saving electricity.
Fig. 3 is a schematic view of an implementation flow of an application example of a management method based on a deactivation timer according to an embodiment of the present invention, and as shown in fig. 3, the application example includes the following steps:
step S301: a terminal initiates a Radio Resource Control (RRC) connection establishment process to a base station in an authorized carrier cell 1 and enters a connection state;
step S302: the terminal carries out carrier aggregation on the unauthorized carrier configured by the base station and the cell 1;
here, due to the increasing traffic, after the base station configures the terminal with the unlicensed carrier, the terminal performs carrier aggregation on the unlicensed carrier configured by the base station with the cell 1. At this time, the unlicensed carrier is in a deactivated state.
Step S303: the terminal starts the process of competing for the resources on the unauthorized carrier;
specifically, when the terminal determines that the terminal needs to compete for resources on the unlicensed carrier according to the amount of uplink data to be sent, the terminal starts a process of competing for the resources on the unlicensed carrier;
or when the base station determines that the terminal needs to compete for the resources on the unauthorized carrier according to the downlink data volume to be sent, sending indication information of the resources on the unauthorized carrier needing to be competed to the terminal; and after receiving the indication information, the terminal starts a process of competing for resources on the unauthorized carrier wave.
The indication information sent by the base station to the terminal carries resource information that needs to compete, such as occupied time, occupied bandwidth, and the like.
Step S304: after a terminal starts a process of competing for resources on an unauthorized carrier, starting or restarting a deactivation timer of the unauthorized carrier in the process of competing for the resources on the unauthorized carrier;
specifically, the method for starting or restarting a deactivation timer of an unlicensed carrier by a terminal in the process of contending for resources on the unlicensed carrier includes: starting a deactivation timer of the unlicensed carrier when the unlicensed carrier is activated; or, after activating the unauthorized carrier, starting a deactivation timer of the unauthorized carrier when the unauthorized carrier enters an activated state; or, after the resource is contended, starting or restarting a deactivation timer of the unauthorized carrier when receiving uplink or downlink scheduling on the contended resource; or after the contention of the resources is achieved, starting a deactivation timer of the unauthorized carrier when the usage of the contended resources is completed.
Step S305: after the terminal competes for the resource, reporting a competition success message carrying time information and bandwidth information of the competed resource to the base station;
step S306: the base station reasonably schedules the terminal to transmit or receive data according to the time information and the bandwidth information of the contended resources;
step S307: and when the deactivation timer is over time, the terminal deactivates the unauthorized carrier.
Fig. 4 is a first schematic structural diagram of a terminal according to an embodiment of the present invention, and as shown in fig. 4, the terminal includes a first starting module 401 and a second starting module 402;
the first starting module 401 is configured to start a process of contending for a resource on an unlicensed carrier;
here, the first starting module 401 is specifically configured to, when it is determined that contention for resources on the unlicensed carrier is required, start a process of contending for resources on the unlicensed carrier; or, when receiving indication information that the base station needs to contend for the resource on the unlicensed carrier, starting a process of contending for the resource on the unlicensed carrier.
The second starting module 402 is configured to start or restart a deactivation timer of an unlicensed carrier in the process of contending for a resource on the unlicensed carrier.
Here, the second starting module 402 is specifically configured to, when the unlicensed carrier is activated, start a deactivation timer of the unlicensed carrier; or, after activating the unauthorized carrier, starting a deactivation timer of the unauthorized carrier when the unauthorized carrier enters an activated state; or, after the resource is contended, starting or restarting a deactivation timer of the unauthorized carrier when receiving uplink or downlink scheduling on the contended resource; or after the contention of the resources is achieved, starting a deactivation timer of the unauthorized carrier when the usage of the contended resources is completed.
In one embodiment, as shown in fig. 5, the terminal further includes a deactivation module 403; wherein,
the deactivating module 403 is configured to deactivate the unlicensed carrier when the deactivation timer expires.
In an embodiment, as shown in fig. 5, the terminal further includes a reporting module 404; wherein,
the reporting module 404 is configured to report, to the base station, a contention success message carrying the time information and the bandwidth information of the contended resource after the resource is contended.
Each module in the terminal of the embodiment of the invention can be realized by a processor in the terminal, and also can be realized by a specific logic circuit; for example, in practical applications, the present invention can be realized by a Central Processing Unit (CPU), a Microprocessor (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like located in the terminal.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention.

Claims (8)

1. A method of managing a deactivation timer, the method comprising:
the terminal starts the process of competing for the resources on the unauthorized carrier;
the terminal starts or restarts a deactivation timer of the unauthorized carrier in the process of competing for the resources on the unauthorized carrier;
the terminal starts or restarts a deactivation timer of the unlicensed carrier in the process of competing for resources on the unlicensed carrier, and the deactivation timer comprises the following steps:
when the terminal activates the unauthorized carrier, the terminal starts a deactivation timer of the unauthorized carrier;
or, after the terminal activates the unauthorized carrier, starting a deactivation timer of the unauthorized carrier when the unauthorized carrier enters an activated state;
or, after the terminal competes for the resource, starting or restarting a deactivation timer of the unlicensed carrier when receiving uplink or downlink scheduling on the competed resource;
or after the terminal competes for the resource, starting a deactivation timer of the unauthorized carrier when the use of the competed resource is finished;
the method further comprises the following steps: and after the resources are contended, reporting a contention success message carrying the time information and the bandwidth information of the contended resources to the base station.
2. The method of claim 1, further comprising: deactivating the unlicensed carrier when the deactivation timer times out.
3. The method of claim 1, wherein the initiating the contention for the resource on the unlicensed carrier comprises:
when the terminal determines that the resources on the unauthorized carrier need to be contended, starting a process of contending the resources on the unauthorized carrier;
or, when the terminal receives the indication information that the base station needs to compete for the resource on the unlicensed carrier, starting a process of competing for the resource on the unlicensed carrier.
4. The method according to claim 3, wherein the starting of the process of contending for the resource on the unlicensed carrier when the terminal itself determines that contention for the resource on the unlicensed carrier is required comprises:
and when the terminal determines that the terminal needs to compete for the resources on the unauthorized carrier according to the uplink data volume to be sent, starting a process of competing for the resources on the unauthorized carrier.
5. The method according to claim 3, wherein the starting the process of contending for the resource on the unlicensed carrier when the terminal receives indication information sent by the base station that the terminal needs to contend for the resource on the unlicensed carrier includes:
when the base station determines that the terminal needs to compete for the resources on the unauthorized carrier according to the downlink data volume to be sent, the base station sends indication information of the resources on the unauthorized carrier needing to compete to the terminal; and after receiving the indication information, the terminal starts a process of competing for resources on the unauthorized carrier wave.
6. A terminal is characterized by comprising a first starting module, a second starting module and a reporting module;
the first starting module is used for starting a process of competing for resources on the unauthorized carrier;
the second starting module is configured to start or restart a deactivation timer of an unlicensed carrier in the process of contending for resources on the unlicensed carrier;
the second starting module is specifically configured to start a deactivation timer of the unlicensed carrier when the unlicensed carrier is activated; or, after activating the unauthorized carrier, starting a deactivation timer of the unauthorized carrier when the unauthorized carrier enters an activated state; or, after the resource is contended, starting or restarting a deactivation timer of the unauthorized carrier when receiving uplink or downlink scheduling on the contended resource; or after the resources are contended, starting a deactivation timer of the unauthorized carrier when the usage of the contended resources is finished;
and the reporting module is used for reporting a competition success message carrying the time information and the bandwidth information of the contended resource to the base station after the resource is contended.
7. The terminal of claim 6, further comprising a deactivation module; wherein,
the deactivation module is configured to deactivate the unauthorized carrier when the deactivation timer expires.
8. The terminal according to claim 6, wherein the first starting module is specifically configured to, when it is determined that contention for resources on the unlicensed carrier is required, start a process of contending for resources on the unlicensed carrier; or, when receiving indication information that the base station needs to contend for the resource on the unlicensed carrier, starting a process of contending for the resource on the unlicensed carrier.
CN201510072565.5A 2015-02-11 2015-02-11 Management method of deactivation timer and terminal Active CN105992318B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510072565.5A CN105992318B (en) 2015-02-11 2015-02-11 Management method of deactivation timer and terminal
PCT/CN2015/090998 WO2016127654A1 (en) 2015-02-11 2015-09-28 Deactivation timer management method, terminal, and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510072565.5A CN105992318B (en) 2015-02-11 2015-02-11 Management method of deactivation timer and terminal

Publications (2)

Publication Number Publication Date
CN105992318A CN105992318A (en) 2016-10-05
CN105992318B true CN105992318B (en) 2021-04-06

Family

ID=56614118

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510072565.5A Active CN105992318B (en) 2015-02-11 2015-02-11 Management method of deactivation timer and terminal

Country Status (2)

Country Link
CN (1) CN105992318B (en)
WO (1) WO2016127654A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105992386A (en) * 2015-02-12 2016-10-05 中兴通讯股份有限公司 Method and device for activating unauthorized carriers
CN108616880B (en) * 2017-01-17 2022-07-29 中兴通讯股份有限公司 Data transmission method, device and system
CN114071677B (en) * 2017-03-24 2024-05-14 华为技术有限公司 Indication information transmission method and device
CN109802793B (en) * 2017-11-17 2021-04-02 电信科学技术研究院 Processing method and device for partial bandwidth deactivation timer, terminal and equipment
CN110011752B (en) * 2018-01-04 2021-10-22 维沃移动通信有限公司 CQI reporting method, terminal equipment and network equipment
CN111406394A (en) * 2018-02-12 2020-07-10 Oppo广东移动通信有限公司 Method and device for transmitting data
CN110351023B (en) * 2018-04-04 2020-12-25 华为技术有限公司 Method and device for controlling timer

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102088433A (en) * 2009-12-08 2011-06-08 中兴通讯股份有限公司 Method and system of optimizing activation and deactivation of component carrier in multicarrier system
CN103503535A (en) * 2011-04-29 2014-01-08 诺基亚西门子网络公司 Method and apparatus for deactivating one of a primary cell and a secondary cell of a user device
CN103765824A (en) * 2011-07-14 2014-04-30 美国博通公司 Methods and apparatuses for provision of a flexible time sharing scheme on an unlicensed band of a system
US8724550B2 (en) * 2011-02-14 2014-05-13 Htc Corporation Apparatuses and methods for handling secondary cell (SCell) reactivation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102088433A (en) * 2009-12-08 2011-06-08 中兴通讯股份有限公司 Method and system of optimizing activation and deactivation of component carrier in multicarrier system
US8724550B2 (en) * 2011-02-14 2014-05-13 Htc Corporation Apparatuses and methods for handling secondary cell (SCell) reactivation
CN103503535A (en) * 2011-04-29 2014-01-08 诺基亚西门子网络公司 Method and apparatus for deactivating one of a primary cell and a secondary cell of a user device
CN103765824A (en) * 2011-07-14 2014-04-30 美国博通公司 Methods and apparatuses for provision of a flexible time sharing scheme on an unlicensed band of a system

Also Published As

Publication number Publication date
CN105992318A (en) 2016-10-05
WO2016127654A1 (en) 2016-08-18

Similar Documents

Publication Publication Date Title
CN105992318B (en) Management method of deactivation timer and terminal
CN111466150B (en) Method and apparatus for processing bandwidth part inactivity timer in wireless communication system
JP2023154090A (en) Operation in discontinuous reception mode using carrier aggregation
CN106664659B (en) Media access control in LTE-U
CN110475294B (en) Communication method, device and system
JP7478751B2 (en) User Equipment for Monitoring Downlink Control Channel - Patent application
CN101938841B (en) A kind of ascending resource acquisition methods, dispatching method, Apparatus and system
CN114745794A (en) Method and device for deactivating secondary cell and communication system
WO2018126665A1 (en) Switching method, base station and terminal
CN114557049B (en) Connection discontinuous reception for carrier aggregation
CN113163413B (en) Wireless communication method, terminal device and network device
CN111247867B (en) New radio beam management reporting operation with connected mode discontinuous reception
CN106714295B (en) Data transmission method and device
JP2024081789A (en) How to set data transmission type and terminal
WO2022143654A1 (en) Method for processing pdcch monitoring capabilities, terminal and network side device
CN111698768B (en) Communication method and device
WO2016127657A1 (en) Unlicensed-carrier activation method and apparatus
US10588082B2 (en) Wireless communication system, wireless communication network, wireless terminal, and wireless communication method
CN113243129B (en) Method and related equipment for blind detection of PDCCH
CN115399054A (en) Discontinuous reception during early data transfer
CN102421116B (en) De-activation management method of timing reference cell and equipment
US20230422342A1 (en) Sidelink Discontinuous Reception Configuration Method, Device, and Non-transitory Computer-Readable Storage Medium
RU2798797C2 (en) User equipment used in downlink control channel monitoring
US20220295538A1 (en) User Equipment Configured Grant Activitation
CN114448581A (en) Scheduling method of sidelink DRX (discontinuous reception), terminal and network side equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant