CN105992318B - Management method of deactivation timer and terminal - Google Patents
Management method of deactivation timer and terminal Download PDFInfo
- Publication number
- CN105992318B CN105992318B CN201510072565.5A CN201510072565A CN105992318B CN 105992318 B CN105992318 B CN 105992318B CN 201510072565 A CN201510072565 A CN 201510072565A CN 105992318 B CN105992318 B CN 105992318B
- Authority
- CN
- China
- Prior art keywords
- terminal
- carrier
- resources
- resource
- starting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000009849 deactivation Effects 0.000 title claims abstract description 83
- 238000007726 management method Methods 0.000 title abstract description 12
- 238000000034 method Methods 0.000 claims abstract description 71
- 230000003213 activating effect Effects 0.000 claims description 5
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 239000000969 carrier Substances 0.000 description 13
- 230000002776 aggregation Effects 0.000 description 5
- 238000004220 aggregation Methods 0.000 description 5
- 238000001228 spectrum Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000001994 activation Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 230000004913 activation Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 241000699670 Mus sp. Species 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention provides a management method and a terminal for deactivating a timer, wherein the terminal starts a process of competing for resources on an unauthorized carrier; and the terminal starts or restarts a deactivation timer of the unauthorized carrier in the process of competing for the resources on the unauthorized carrier.
Description
Technical Field
The present invention relates to mobile communication technologies, and in particular, to a method and a terminal for managing a deactivation timer.
Background
In a Long Term Evolution (LTE) system, a terminal in a connected state can only communicate with a base station through one serving cell, i.e., a carrier. In order to provide a higher data rate for a terminal, a Carrier Aggregation technology (CA) is proposed in a Long Term Evolution advanced (LTE-a) system, which can provide a larger bandwidth for a terminal with corresponding capability, thereby increasing the peak rate of the terminal. The maximum downlink transmission bandwidth supported by the LTE system is 20MHz, and carrier aggregation is to aggregate two or more Component Carriers (CCs) to support more than 20MHz, and the maximum downlink transmission bandwidth can support no more than 100 MHz. A terminal with carrier aggregation capability may simultaneously transceive data over multiple component carriers. Therefore, in the LTE-a system, after entering a connected state, a terminal may simultaneously communicate with a source base station through a plurality of Component carriers (e.g., CC1, CC2), the base station may assign a Primary Component Carrier (PCC) to the terminal through explicit configuration or according to a protocol convention, and other Component carriers are called Secondary Component Carriers (SCCs). A serving Cell on the PCC is referred to as a Primary serving Cell (Pcell), and a serving Cell on the SCC is referred to as a Secondary serving Cell (Scell). In view of the burstiness of the traffic, although the terminal is operated at the highest rate and may use up to 5 carriers, the actual traffic flow of the terminal is very little or close to zero in the burst gap. At this point, if the terminal continues to wait for data to be received on multiple carriers, a higher power overhead will result.
Therefore, in order to prolong the working time of the terminal, turn off the wireless transmitting and receiving equipment which is not required to be turned on and reduce the unnecessary battery consumption, the concept of activating and deactivating the carrier is introduced into the LTE-A system. Thus, the terminal performs data reception and transmission only on the activated carrier, such as monitoring of a Physical Downlink Control Channel (PDCCH); for the carriers which are not used temporarily, the base station deactivates the carriers through explicit command notification or implicit rule, so that the terminal does not monitor the PDCCH Channel, does not receive data on a Physical Downlink Shared Channel (PDSCH), and does not send uplink data, thereby achieving the purpose of saving power. It should be noted that the PCell is never deactivated by the base station, and the SCell can be flexibly activated and deactivated. Therefore, for further power saving, a deactivation timer corresponding to each SCell is introduced, that is, the terminal does not receive data scheduling when the deactivation timer expires, and the SCell is deactivated by itself through management of the deactivation timer.
In addition, with the rapid growth of data traffic, the licensed spectrum will not be able to withstand such huge data volumes in the near future; LTE operators consider deploying LTE in unlicensed spectrum resources, sharing data traffic in licensed carriers over unlicensed spectrum. Unlicensed carriers (i.e., unlicensed spectrum) refer to spectrum or carriers that can be used without authorization, subject to government regulations. For example, microwave ovens, remote control toy planes, Wireless mice, Wireless keyboards, Wireless Fidelity (WiFi), and the like all use unlicensed carriers. In some cases, the unlicensed carrier needs to be used by contention. When the base station or the terminal does not compete for the resource, the unauthorized carrier cannot be used; after the base station or the terminal contends for the resource, in the process of enabling the unlicensed carrier, the control information is still sent through the licensed carrier, that is, the PCell is also the licensed carrier, and the unlicensed carrier may be used as the Scell, which may be referred to as U-Scell for distinction. In the LTE-a system, in order to utilize the contended resources to the maximum extent, a deactivation process of an unlicensed carrier is introduced. However, there is no effective solution at present how the terminal manages the deactivation timer of the unlicensed carrier after introducing the deactivation process of the unlicensed carrier.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method and a terminal for managing a deactivation timer, which can effectively manage the deactivation timer of an unauthorized carrier.
In order to achieve the above purpose, the technical solution of the embodiment of the present invention is realized as follows:
the embodiment of the invention provides a management method for a deactivation timer, which comprises the following steps:
the terminal starts the process of competing for the resources on the unauthorized carrier;
and the terminal starts or restarts a deactivation timer of the unauthorized carrier in the process of competing for the resources on the unauthorized carrier.
In the above scheme, the starting or restarting the deactivation timer of the unlicensed carrier by the terminal in the process of contending for the resource on the unlicensed carrier includes: when the terminal activates the unauthorized carrier, the terminal starts a deactivation timer of the unauthorized carrier;
or, after the terminal activates the unauthorized carrier, starting a deactivation timer of the unauthorized carrier when the unauthorized carrier enters an activated state;
or, after the terminal competes for the resource, starting or restarting a deactivation timer of the unlicensed carrier when receiving uplink or downlink scheduling on the competed resource;
or after the terminal competes for the resource, starting a deactivation timer of the unauthorized carrier when the use of the competed resource is finished.
In the above scheme, the method further comprises: deactivating the unlicensed carrier when the deactivation timer times out.
In the foregoing solution, the starting of the process of contending for the resource on the unlicensed carrier includes:
when the terminal determines that the resources on the unauthorized carrier need to be contended, starting a process of contending the resources on the unauthorized carrier;
or, when the terminal receives the indication information that the base station needs to compete for the resource on the unlicensed carrier, starting a process of competing for the resource on the unlicensed carrier.
In the foregoing solution, the starting a process of contending for a resource on an unlicensed carrier when the terminal itself determines that the terminal needs to contend for the resource on the unlicensed carrier includes:
and when the terminal determines that the terminal needs to compete for the resources on the unauthorized carrier according to the uplink data volume to be sent, starting a process of competing for the resources on the unauthorized carrier.
In the above scheme, the starting, when the terminal receives the indication information that needs to contend for the resource on the unlicensed carrier and is sent by the base station, a process of contending for the resource on the unlicensed carrier includes:
when the base station determines that the terminal needs to compete for the resources on the unauthorized carrier according to the downlink data volume to be sent, the base station sends indication information of the resources on the unauthorized carrier needing to compete to the terminal; and after receiving the indication information, the terminal starts a process of competing for resources on the unauthorized carrier wave.
In the above scheme, the method further comprises: and after the resources are contended, reporting a contention success message carrying the time information and the bandwidth information of the contended resources to the base station.
The embodiment of the invention also provides a terminal, which comprises a first starting module and a second starting module;
the first starting module is used for starting a process of competing for resources on the unauthorized carrier;
the second starting module is configured to start or restart a deactivation timer of an unlicensed carrier in the process of contending for the resource on the unlicensed carrier.
In the foregoing solution, the second starting module is specifically configured to, when an unauthorized carrier is activated, start a deactivation timer of the unauthorized carrier; or, after activating the unauthorized carrier, starting a deactivation timer of the unauthorized carrier when the unauthorized carrier enters an activated state; or, after the resource is contended, starting or restarting a deactivation timer of the unauthorized carrier when receiving uplink or downlink scheduling on the contended resource; or after the contention of the resources is achieved, starting a deactivation timer of the unauthorized carrier when the usage of the contended resources is completed.
In the above scheme, the terminal further comprises a deactivation module; wherein,
the deactivation module is configured to deactivate the unauthorized carrier when the deactivation timer expires.
In the foregoing solution, the first starting module is specifically configured to, when it is determined that contention for resources on an unlicensed carrier is required, start a process of contending for resources on the unlicensed carrier; or, when receiving indication information that the base station needs to contend for the resource on the unlicensed carrier, starting a process of contending for the resource on the unlicensed carrier.
In the above scheme, the terminal further comprises a reporting module; wherein,
and the reporting module is used for reporting a competition success message carrying the time information and the bandwidth information of the contended resource to the base station after the resource is contended.
According to the management method and the terminal for deactivating the timer, provided by the embodiment of the invention, the terminal starts a process of competing for resources on the unauthorized carrier; and the terminal starts or restarts a deactivation timer of the unauthorized carrier in the process of competing for the resources on the unauthorized carrier. Therefore, the terminal can effectively manage the deactivation timer of the unauthorized carrier, thereby ensuring the automatic deactivation of the unauthorized carrier and further achieving the purpose of power saving.
Drawings
Fig. 1 is a diagram illustrating a relationship between activation of an unlicensed carrier and usage time of contention resources according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating an implementation of a method for managing a deactivation timer according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating an implementation of an application example of a management method based on a deactivation timer according to an embodiment of the present invention;
fig. 4 is a first schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a composition structure of a terminal according to an embodiment of the present invention.
Detailed Description
In the embodiment of the invention, a terminal starts a process of competing for resources on an unauthorized carrier; and the terminal starts or restarts a deactivation timer of the unauthorized carrier in the process of competing for the resources on the unauthorized carrier.
Here, it should be added that, for management of the deactivation timer of the unauthorized carrier, only the starting timing of the deactivation timer needs to be considered. However, there is no special processing for the termination time of the deactivation timer, and it is only necessary to wait for the deactivation timer to time out.
In addition, in order to better describe the management method of the deactivation timer according to the embodiment of the present invention, it is first required to know the relationship between the activation of the unlicensed carrier and the usage time of the contended resource, as shown in fig. 1, from time T1 to time T2, which belongs to the activation process of the terminal on the unlicensed carrier, and from time T2 to time T3, which belongs to the usage time of the contended resource by the terminal.
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
Fig. 2 is a schematic flow chart illustrating an implementation of a management method for a deactivation timer according to an embodiment of the present invention, and as shown in fig. 2, the management method for a deactivation timer according to the embodiment of the present invention includes:
step S201: the terminal starts the process of competing for the resources on the unauthorized carrier;
here, the process of the terminal initiating contention for resources on the unlicensed carrier includes: and when the terminal determines that the resources on the unlicensed carrier need to be contended, starting a process of contending the resources on the unlicensed carrier. Specifically, when the terminal determines that the terminal needs to compete for resources on the unlicensed carrier according to the amount of uplink data to be sent, the terminal starts a process of competing for the resources on the unlicensed carrier;
or, the process of the terminal starting contention for resources on the unlicensed carrier may further include: and when the terminal receives the indication information which is sent by the base station and needs to compete for the resources on the unauthorized carrier, starting the process of competing for the resources on the unauthorized carrier. Specifically, when the base station determines that the terminal needs to compete for the resource on the unlicensed carrier according to the amount of downlink data to be sent, the base station sends indication information of the resource on the unlicensed carrier that needs to be competed for to the terminal; further, after receiving the indication information, the terminal starts a process of contending for resources on the unlicensed carrier.
Step S202: and the terminal starts or restarts a deactivation timer of the unauthorized carrier in the process of competing for the resources on the unauthorized carrier.
Here, the terminal starting or restarting the deactivation timer of the unlicensed carrier in the process of contending for the resource on the unlicensed carrier may include the following four cases:
A) when the terminal activates the unauthorized carrier (corresponding to time T1 in FIG. 1), starting a deactivation timer of the unauthorized carrier;
B) when the terminal activates the unlicensed carrier and waits for the unlicensed carrier to enter an activated state (corresponding to time T2 in fig. 1), starting a deactivation timer of the unlicensed carrier;
in practical applications, the time T2 may be specified, that is, after the terminal activates the unlicensed carrier, the unlicensed carrier enters the active state after waiting for a specified time T1 to T2. The duration of this designated time T1 through T2 may be default or pre-configured. The duration of this specified time T1 to T2 can be configured to be 6ms, usually according to empirical values.
C) When the terminal contends for the resource and receives uplink or downlink scheduling on the contended resource (corresponding to the middle between time T2 and time T3 in fig. 1), starting or restarting a deactivation timer of the unlicensed carrier;
here, after the resource is contended, the terminal reports a contention success message carrying the time information and the bandwidth information of the contended resource to the base station, so that the base station reasonably schedules the terminal to transmit or receive data according to the time information and the bandwidth information of the contended resource.
D) When the terminal has contended for the resource, the deactivation timer of the unlicensed carrier is started when the usage of the contended resource is completed (corresponding to time T3 in fig. 1).
Further, the method may further include: deactivating the unlicensed carrier when the deactivation timer times out.
Therefore, by the method for managing the deactivation timer, the terminal can effectively manage the deactivation timer of the unauthorized carrier, thereby ensuring the automatic deactivation of the unauthorized carrier and further achieving the purpose of saving electricity.
Fig. 3 is a schematic view of an implementation flow of an application example of a management method based on a deactivation timer according to an embodiment of the present invention, and as shown in fig. 3, the application example includes the following steps:
step S301: a terminal initiates a Radio Resource Control (RRC) connection establishment process to a base station in an authorized carrier cell 1 and enters a connection state;
step S302: the terminal carries out carrier aggregation on the unauthorized carrier configured by the base station and the cell 1;
here, due to the increasing traffic, after the base station configures the terminal with the unlicensed carrier, the terminal performs carrier aggregation on the unlicensed carrier configured by the base station with the cell 1. At this time, the unlicensed carrier is in a deactivated state.
Step S303: the terminal starts the process of competing for the resources on the unauthorized carrier;
specifically, when the terminal determines that the terminal needs to compete for resources on the unlicensed carrier according to the amount of uplink data to be sent, the terminal starts a process of competing for the resources on the unlicensed carrier;
or when the base station determines that the terminal needs to compete for the resources on the unauthorized carrier according to the downlink data volume to be sent, sending indication information of the resources on the unauthorized carrier needing to be competed to the terminal; and after receiving the indication information, the terminal starts a process of competing for resources on the unauthorized carrier wave.
The indication information sent by the base station to the terminal carries resource information that needs to compete, such as occupied time, occupied bandwidth, and the like.
Step S304: after a terminal starts a process of competing for resources on an unauthorized carrier, starting or restarting a deactivation timer of the unauthorized carrier in the process of competing for the resources on the unauthorized carrier;
specifically, the method for starting or restarting a deactivation timer of an unlicensed carrier by a terminal in the process of contending for resources on the unlicensed carrier includes: starting a deactivation timer of the unlicensed carrier when the unlicensed carrier is activated; or, after activating the unauthorized carrier, starting a deactivation timer of the unauthorized carrier when the unauthorized carrier enters an activated state; or, after the resource is contended, starting or restarting a deactivation timer of the unauthorized carrier when receiving uplink or downlink scheduling on the contended resource; or after the contention of the resources is achieved, starting a deactivation timer of the unauthorized carrier when the usage of the contended resources is completed.
Step S305: after the terminal competes for the resource, reporting a competition success message carrying time information and bandwidth information of the competed resource to the base station;
step S306: the base station reasonably schedules the terminal to transmit or receive data according to the time information and the bandwidth information of the contended resources;
step S307: and when the deactivation timer is over time, the terminal deactivates the unauthorized carrier.
Fig. 4 is a first schematic structural diagram of a terminal according to an embodiment of the present invention, and as shown in fig. 4, the terminal includes a first starting module 401 and a second starting module 402;
the first starting module 401 is configured to start a process of contending for a resource on an unlicensed carrier;
here, the first starting module 401 is specifically configured to, when it is determined that contention for resources on the unlicensed carrier is required, start a process of contending for resources on the unlicensed carrier; or, when receiving indication information that the base station needs to contend for the resource on the unlicensed carrier, starting a process of contending for the resource on the unlicensed carrier.
The second starting module 402 is configured to start or restart a deactivation timer of an unlicensed carrier in the process of contending for a resource on the unlicensed carrier.
Here, the second starting module 402 is specifically configured to, when the unlicensed carrier is activated, start a deactivation timer of the unlicensed carrier; or, after activating the unauthorized carrier, starting a deactivation timer of the unauthorized carrier when the unauthorized carrier enters an activated state; or, after the resource is contended, starting or restarting a deactivation timer of the unauthorized carrier when receiving uplink or downlink scheduling on the contended resource; or after the contention of the resources is achieved, starting a deactivation timer of the unauthorized carrier when the usage of the contended resources is completed.
In one embodiment, as shown in fig. 5, the terminal further includes a deactivation module 403; wherein,
the deactivating module 403 is configured to deactivate the unlicensed carrier when the deactivation timer expires.
In an embodiment, as shown in fig. 5, the terminal further includes a reporting module 404; wherein,
the reporting module 404 is configured to report, to the base station, a contention success message carrying the time information and the bandwidth information of the contended resource after the resource is contended.
Each module in the terminal of the embodiment of the invention can be realized by a processor in the terminal, and also can be realized by a specific logic circuit; for example, in practical applications, the present invention can be realized by a Central Processing Unit (CPU), a Microprocessor (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like located in the terminal.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention.
Claims (8)
1. A method of managing a deactivation timer, the method comprising:
the terminal starts the process of competing for the resources on the unauthorized carrier;
the terminal starts or restarts a deactivation timer of the unauthorized carrier in the process of competing for the resources on the unauthorized carrier;
the terminal starts or restarts a deactivation timer of the unlicensed carrier in the process of competing for resources on the unlicensed carrier, and the deactivation timer comprises the following steps:
when the terminal activates the unauthorized carrier, the terminal starts a deactivation timer of the unauthorized carrier;
or, after the terminal activates the unauthorized carrier, starting a deactivation timer of the unauthorized carrier when the unauthorized carrier enters an activated state;
or, after the terminal competes for the resource, starting or restarting a deactivation timer of the unlicensed carrier when receiving uplink or downlink scheduling on the competed resource;
or after the terminal competes for the resource, starting a deactivation timer of the unauthorized carrier when the use of the competed resource is finished;
the method further comprises the following steps: and after the resources are contended, reporting a contention success message carrying the time information and the bandwidth information of the contended resources to the base station.
2. The method of claim 1, further comprising: deactivating the unlicensed carrier when the deactivation timer times out.
3. The method of claim 1, wherein the initiating the contention for the resource on the unlicensed carrier comprises:
when the terminal determines that the resources on the unauthorized carrier need to be contended, starting a process of contending the resources on the unauthorized carrier;
or, when the terminal receives the indication information that the base station needs to compete for the resource on the unlicensed carrier, starting a process of competing for the resource on the unlicensed carrier.
4. The method according to claim 3, wherein the starting of the process of contending for the resource on the unlicensed carrier when the terminal itself determines that contention for the resource on the unlicensed carrier is required comprises:
and when the terminal determines that the terminal needs to compete for the resources on the unauthorized carrier according to the uplink data volume to be sent, starting a process of competing for the resources on the unauthorized carrier.
5. The method according to claim 3, wherein the starting the process of contending for the resource on the unlicensed carrier when the terminal receives indication information sent by the base station that the terminal needs to contend for the resource on the unlicensed carrier includes:
when the base station determines that the terminal needs to compete for the resources on the unauthorized carrier according to the downlink data volume to be sent, the base station sends indication information of the resources on the unauthorized carrier needing to compete to the terminal; and after receiving the indication information, the terminal starts a process of competing for resources on the unauthorized carrier wave.
6. A terminal is characterized by comprising a first starting module, a second starting module and a reporting module;
the first starting module is used for starting a process of competing for resources on the unauthorized carrier;
the second starting module is configured to start or restart a deactivation timer of an unlicensed carrier in the process of contending for resources on the unlicensed carrier;
the second starting module is specifically configured to start a deactivation timer of the unlicensed carrier when the unlicensed carrier is activated; or, after activating the unauthorized carrier, starting a deactivation timer of the unauthorized carrier when the unauthorized carrier enters an activated state; or, after the resource is contended, starting or restarting a deactivation timer of the unauthorized carrier when receiving uplink or downlink scheduling on the contended resource; or after the resources are contended, starting a deactivation timer of the unauthorized carrier when the usage of the contended resources is finished;
and the reporting module is used for reporting a competition success message carrying the time information and the bandwidth information of the contended resource to the base station after the resource is contended.
7. The terminal of claim 6, further comprising a deactivation module; wherein,
the deactivation module is configured to deactivate the unauthorized carrier when the deactivation timer expires.
8. The terminal according to claim 6, wherein the first starting module is specifically configured to, when it is determined that contention for resources on the unlicensed carrier is required, start a process of contending for resources on the unlicensed carrier; or, when receiving indication information that the base station needs to contend for the resource on the unlicensed carrier, starting a process of contending for the resource on the unlicensed carrier.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510072565.5A CN105992318B (en) | 2015-02-11 | 2015-02-11 | Management method of deactivation timer and terminal |
PCT/CN2015/090998 WO2016127654A1 (en) | 2015-02-11 | 2015-09-28 | Deactivation timer management method, terminal, and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510072565.5A CN105992318B (en) | 2015-02-11 | 2015-02-11 | Management method of deactivation timer and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105992318A CN105992318A (en) | 2016-10-05 |
CN105992318B true CN105992318B (en) | 2021-04-06 |
Family
ID=56614118
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510072565.5A Active CN105992318B (en) | 2015-02-11 | 2015-02-11 | Management method of deactivation timer and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105992318B (en) |
WO (1) | WO2016127654A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105992386A (en) * | 2015-02-12 | 2016-10-05 | 中兴通讯股份有限公司 | Method and device for activating unauthorized carriers |
CN108616880B (en) * | 2017-01-17 | 2022-07-29 | 中兴通讯股份有限公司 | Data transmission method, device and system |
CN114071677B (en) * | 2017-03-24 | 2024-05-14 | 华为技术有限公司 | Indication information transmission method and device |
CN109802793B (en) * | 2017-11-17 | 2021-04-02 | 电信科学技术研究院 | Processing method and device for partial bandwidth deactivation timer, terminal and equipment |
CN110011752B (en) * | 2018-01-04 | 2021-10-22 | 维沃移动通信有限公司 | CQI reporting method, terminal equipment and network equipment |
CN111406394A (en) * | 2018-02-12 | 2020-07-10 | Oppo广东移动通信有限公司 | Method and device for transmitting data |
CN110351023B (en) * | 2018-04-04 | 2020-12-25 | 华为技术有限公司 | Method and device for controlling timer |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102088433A (en) * | 2009-12-08 | 2011-06-08 | 中兴通讯股份有限公司 | Method and system of optimizing activation and deactivation of component carrier in multicarrier system |
CN103503535A (en) * | 2011-04-29 | 2014-01-08 | 诺基亚西门子网络公司 | Method and apparatus for deactivating one of a primary cell and a secondary cell of a user device |
CN103765824A (en) * | 2011-07-14 | 2014-04-30 | 美国博通公司 | Methods and apparatuses for provision of a flexible time sharing scheme on an unlicensed band of a system |
US8724550B2 (en) * | 2011-02-14 | 2014-05-13 | Htc Corporation | Apparatuses and methods for handling secondary cell (SCell) reactivation |
-
2015
- 2015-02-11 CN CN201510072565.5A patent/CN105992318B/en active Active
- 2015-09-28 WO PCT/CN2015/090998 patent/WO2016127654A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102088433A (en) * | 2009-12-08 | 2011-06-08 | 中兴通讯股份有限公司 | Method and system of optimizing activation and deactivation of component carrier in multicarrier system |
US8724550B2 (en) * | 2011-02-14 | 2014-05-13 | Htc Corporation | Apparatuses and methods for handling secondary cell (SCell) reactivation |
CN103503535A (en) * | 2011-04-29 | 2014-01-08 | 诺基亚西门子网络公司 | Method and apparatus for deactivating one of a primary cell and a secondary cell of a user device |
CN103765824A (en) * | 2011-07-14 | 2014-04-30 | 美国博通公司 | Methods and apparatuses for provision of a flexible time sharing scheme on an unlicensed band of a system |
Also Published As
Publication number | Publication date |
---|---|
CN105992318A (en) | 2016-10-05 |
WO2016127654A1 (en) | 2016-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105992318B (en) | Management method of deactivation timer and terminal | |
CN111466150B (en) | Method and apparatus for processing bandwidth part inactivity timer in wireless communication system | |
JP2023154090A (en) | Operation in discontinuous reception mode using carrier aggregation | |
CN106664659B (en) | Media access control in LTE-U | |
CN110475294B (en) | Communication method, device and system | |
JP7478751B2 (en) | User Equipment for Monitoring Downlink Control Channel - Patent application | |
CN101938841B (en) | A kind of ascending resource acquisition methods, dispatching method, Apparatus and system | |
CN114745794A (en) | Method and device for deactivating secondary cell and communication system | |
WO2018126665A1 (en) | Switching method, base station and terminal | |
CN114557049B (en) | Connection discontinuous reception for carrier aggregation | |
CN113163413B (en) | Wireless communication method, terminal device and network device | |
CN111247867B (en) | New radio beam management reporting operation with connected mode discontinuous reception | |
CN106714295B (en) | Data transmission method and device | |
JP2024081789A (en) | How to set data transmission type and terminal | |
WO2022143654A1 (en) | Method for processing pdcch monitoring capabilities, terminal and network side device | |
CN111698768B (en) | Communication method and device | |
WO2016127657A1 (en) | Unlicensed-carrier activation method and apparatus | |
US10588082B2 (en) | Wireless communication system, wireless communication network, wireless terminal, and wireless communication method | |
CN113243129B (en) | Method and related equipment for blind detection of PDCCH | |
CN115399054A (en) | Discontinuous reception during early data transfer | |
CN102421116B (en) | De-activation management method of timing reference cell and equipment | |
US20230422342A1 (en) | Sidelink Discontinuous Reception Configuration Method, Device, and Non-transitory Computer-Readable Storage Medium | |
RU2798797C2 (en) | User equipment used in downlink control channel monitoring | |
US20220295538A1 (en) | User Equipment Configured Grant Activitation | |
CN114448581A (en) | Scheduling method of sidelink DRX (discontinuous reception), terminal and network side equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |