CN106031273B - A kind of method of sending and receiving of subframe, base station and user equipment - Google Patents
A kind of method of sending and receiving of subframe, base station and user equipment Download PDFInfo
- Publication number
- CN106031273B CN106031273B CN201580002051.0A CN201580002051A CN106031273B CN 106031273 B CN106031273 B CN 106031273B CN 201580002051 A CN201580002051 A CN 201580002051A CN 106031273 B CN106031273 B CN 106031273B
- Authority
- CN
- China
- Prior art keywords
- subframe
- carrier wave
- imperfect
- unauthorized carrier
- base station
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
Abstract
The present invention provides a kind of method of sending and receiving of subframe, base station and UE, a complete subframe is spliced by the way that base station to be occupied to imperfect subframe between the initial time after unauthorized carrier wave and the initial position of next subframe and other subframes, it can use the imperfect subframe and send valid data, improve the service efficiency of unauthorized carrier wave, no matter and sending data since on which symbol, base station is all only with the data for shifting to an earlier date precoding one complete subframe, complete subframe without traversing all is pre-processed, and the process resource of base station is saved.Wherein, the sending method of subframe are as follows: base station is that UE configures unauthorized carrier wave and determines first imperfect subframe after the unauthorized carrier wave is occupied, and the splicing subframe with this first imperfect subframe splicing;Data in one TTI are encoded;Data after coding are sent to the UE by first imperfect subframe of the unauthorized carrier wave and its splicing subframe.
Description
Technical field
The present invention relates to fields of communication technology more particularly to a kind of method of sending and receiving of subframe, base station and user to set
It is standby.
Background technique
Unlicensed spectrum (English: Unlicensed Spectrum) refers to common frequency spectrum, and any organization or individual is
It can be used.But (English: Listen Before Talk, abbreviation: LBT) is sent out afterwards using needing to follow when unlicensed spectrum first to listen
Mechanism, i.e. communication equipment first listen to whether have other communication equipments sending data on channel before sending frame, if
Channel idle, the communication equipment can transmit data;Otherwise, which wouldn't send data, but when avoiding one section
Between after attempt again.Usual LBT needs to follow clear channel assessment (CCA) (English: Clear Channel Assessment, abbreviation
CCA) principle and extension clear channel assessment (CCA) (English: Extended CCA, abbreviation: ECCA) principle, so-called CCA principle is communication
Equipment needs the time span of at least one CCA observing time window of monitor channel, wherein when CCA observing time window is scheduled
Between length, such as 20 microseconds (unit: us), if communication equipment does not listen to carrier wave in this CCA observing time window
Signal, then it is assumed that this channel can be used for idle channel.If communication equipment listens in this CCA observing time window
Carrier signal, then it is assumed that this channel is occupied, to be transferred to the ECCA stage.An integer can be generated in ECCA phase communication equipment
Then random number R needs that the channel could be used in a channel idle point after continuously listening to R CCA observing time window.
Base station can dispose LTE carrier wave in unlicensed spectrum, but because after the competition to unlicensed spectrum resource of base station only
A period of time (such as: 10 milliseconds) can be used, just cannot make after other communication equipment occupies the unlicensed spectrum resource
With, therefore unlicensed spectrum can not stand alone as user equipment (English: User Equipment, abbreviation: UE) service, it can only conduct
One secondary carrier provides data transport service for UE, and UE needs in addition to be anchored on an authorization frequency spectrum.
In long term evolution (English: Long Term Evolution, abbreviation: LTE) system, multi-transceiver technology such as Fig. 1 institute
Show, timing relationship having the same between multiple member carriers, i.e., the frame boundaries and subframe number of major-minor carrier wave are all the same;It is major-minor
The uplink feedback information of the downlink data of carrier wave is sent from one of carrier wave uplink, for example, main carrier is in son in Fig. 1
The affirmative acknowledgement (English: Acknowledge, abbreviation: ACK) sent on frame 5 is to the data sent in major-minor carrier wave subframe 1
Response;The data of one carrier wave can be by the Physical Downlink Control Channel (English: Physical Downlink of other carrier waves
Control Channel, referred to as: PDCCH) dispatch, i.e., cross-carrier scheduling can also be dispatched, example by the PDCCH of the carrier wave itself
Such as, in Fig. 1, carry out the data in cross-carrier scheduling secondary carrier subframe 0 using the PDCCH in main carrier subframe 0, but need to pay attention to
, while one of scheduling mode can only be selected.
Frame structure in LTE system as shown in Fig. 2, a frame includes 10 subframes, each subframe include at least PDCCH and
Physical Downlink Shared Channel (English: Physical Downlink Shared Channel, referred to as: PDSCH) symbol, optionally
There may also be enhancing Physical Downlink Control Channel (English: Enhanced Physical Downlink Control
Channel, referred to as: EPDCCH).Usual PDCCH occupy in the time domain each subframe preceding n orthogonal frequency division multiplexing (it is English:
Orthogonal Frequency Division Multiplexing, referred to as: OFDM) symbol, and n≤3, PDSCH only take up
OFDM symbol after OFDM symbol where control channel and reference signal, if being configured with EPDCCH, EPDCCH can be with
In the part frequency domain resource of the region PDSCH.
As shown in figure 3, after base station confirms that unauthorized secondary carrier is idle by ECC A (or CCA), this is begun to use non-to award
Power secondary carrier carries out data transmission.But base station occupies the initial time after unauthorized carrier wave and sub-frame boundary is possible without
It is overlapped, for example, in Fig. 3, base station occupies the initial time after unauthorized carrier wave to the time between the initial position of subframe 0 just
It is an incomplete subframe.And CCA the or ECCA stage before base station occupies unauthorized carrier wave is likely to occupy a subframe
In PDCCH where preceding n OFDM symbol, cause to lack PDCCH and the data of the subframe can not be scheduled, thus nothing
Method carries out data transmission.
Iing is proposed in the prior art can be in the initial time after base station occupies unauthorized carrier wave to the starting of next subframe
Leading (English: Preamble) is sent in imperfect subframe between position, to keep base station to the unauthorized secondary carrier institute
In the occupancy of channel resource.But since leading transmission phase can not send the scheduling data for UE, will lead to from this
In the secondary time for occupying unauthorized carrier wave, there is the resource of an imperfect subframe not to be available, to cause the wave of channel resource
Take.
In order to overcome the above technical defects, a kind of side that unauthorized secondary carrier data are sent is proposed in the prior art
Method, it is believed that can be in the initial time after base station occupies unauthorized carrier wave to imperfect between the initial position of next subframe
The scheduling data for being directed to UE are sent in subframe, and scheduling information corresponding to the scheduling data sent in the imperfect subframe is then
It is sent in next subframe.For example, as shown in figure 4, non-using the next cross-carrier scheduling of the PDCCH in the subframe 3 of authorization main carrier
Authorize the data in the subframe 2 of secondary carrier.But the data that N subframe is sent in existing LTE system are generally required in N-1
Subframe carries out coded treatment.It, can not be in the previous of first subframe since the first subframe in this method is imperfect subframe
Subframe knows the number for the data symbol that first subframe can be used, this brings challenge to pre-coded data.In order to mention
It is preceding to may be that data transmitted by imperfect subframe encode, base station needs to know in advance that each subframe occupies data symbol
The case where, it may need unnecessarily to traverse all complete subframes so as to cause base station and be pre-processed, greatly be consumed
The process resource of base station.
Summary of the invention
The embodiment of the invention provides a kind of method of sending and receiving of subframe, base station and UE, to solve the prior art
Middle base station occupies in the initial time after unauthorized carrier wave to the imperfect subframe between the initial position of next subframe and sends
Aiming at the problem that scheduling data of UE can waste the process resource of base station.
In a first aspect, the embodiment of the invention provides a kind of base stations, comprising:
Configuration unit, for configuring unauthorized carrier wave for UE;
Determination unit, for determining first imperfect subframe after the unauthorized carrier wave is occupied, and with this
The splicing subframe of one imperfect subframe splicing;
Coding unit, for being encoded to the data in a TTI;
Transmission unit passes through first imperfect subframe of the unauthorized carrier wave and its spelling for the data after encoding
It connects subframe and is sent to the UE.
With reference to first aspect, in the first possible implementation of the first aspect, institute is determined in the determination unit
State unauthorized carrier wave it is occupied after, the transmission unit is also used to:
Secondary carrier, which is sent, by authorization carrier wave or the unauthorized carrier wave occupies notice to the UE, to notify the UE institute
Stating base station, this occupies the initial time of the unauthorized carrier wave.
With reference to first aspect or the first possible implementation of first aspect, second in first aspect are possible
In implementation, when determining the splicing subframe with first imperfect subframe splicing, the determination unit is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing with first imperfect subframe splicing
Subframe;Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
The possible implementation of second with reference to first aspect, in the third possible implementation of first aspect
In, if the determination unit determines that the last one imperfect subframe of the unauthorized carrier wave is to spell with first imperfect subframe
The splicing subframe connect;Then
In the transmission unit by the data after coding by first imperfect subframe of the unauthorized carrier wave and its
Splicing subframe is sent to before the UE, and the determination unit is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave after occupied and this occupancy of the base station
The occupancy Duration Information of the unauthorized carrier wave determines the last one imperfect son after the unauthorized carrier wave is occupied
The position of frame;
The transmission unit is specifically used for:
By the data after coding by the symbol of first imperfect subframe of the unauthorized carrier wave and the last one not
The symbol of complete subframe is sent to the UE.
The third possible implementation with reference to first aspect, in the 4th kind of possible implementation of first aspect
In, the occupancy Duration Information, which is configured by the base station and carries to occupy in notice in secondary carrier, is sent to the UE;Or
Person
The occupancy Duration Information is pre-configured to be in the base station side and the side UE.
The third possible implementation with reference to first aspect, in the 5th kind of possible implementation of first aspect
In, the base station further include:
Scheduling unit, for by the scheduling information of the data be placed on the unauthorized carrier wave the last one is imperfect
On the PDCCH of subframe;Alternatively, the scheduling information of the data to be placed on to the last one imperfect son of the unauthorized carrier wave
On the PDCCH of the subframe of the corresponding authorization carrier wave of frame;Alternatively, the scheduling information of the data is placed on the unauthorized carrier wave
First imperfect subframe and the last one imperfect subframe EPDCCH on;Alternatively, the scheduling information of the data is put
Set first imperfect subframe subframe for authorizing carrier wave corresponding with the last one imperfect subframe in the unauthorized carrier wave
EPDCCH on.
The possible implementation of second with reference to first aspect, in the 6th kind of possible implementation of first aspect
In, if the determination unit determines that second subframe of the unauthorized carrier wave is the splicing with first imperfect subframe splicing
Subframe;Then
In the transmission unit by the data after coding by first imperfect subframe of the unauthorized carrier wave and its
Splicing subframe is sent to before the UE, and the determination unit is specifically used for:
According to the symbol lengths M of first imperfect subframe, the splicing symbol lengths N of second subframe is determined;Wherein, should
The symbol lengths M of first imperfect subframe includes symbol lengths, the control symbol that filling signal or targeting signal occupy
The length of length and data symbol, and the sum of M and N are the symbol lengths of a complete subframe;
The transmission unit is specifically used for:
The symbol and second subframe that data after coding are passed through into first imperfect subframe of the unauthorized carrier wave
Top n symbol be sent to the UE.
The 6th kind of possible implementation with reference to first aspect, in the 7th kind of possible implementation of first aspect
In, the base station further include:
Scheduling unit, for the scheduling information of the data to be placed on to first imperfect son of the unauthorized carrier wave
On the PDCCH of frame;Alternatively, by the scheduling information of the data be placed on the unauthorized carrier wave first imperfect subframe and
On the EPDCCH of the top n symbol of second subframe.
The 6th kind of possible implementation with reference to first aspect, in the 8th kind of possible implementation of first aspect
In, the scheduling unit is also used to:
It is scheduled the rear M symbol of second subframe of the unauthorized carrier wave as new imperfect subframe, and
The scheduling information for the data dispatched on the rear M symbol of second subframe is placed on the unauthorized carrier wave
On the PDCCH of second subframe.
With reference to first aspect with the first any one into the 8th kind of possible implementation of first aspect,
In 9th kind of possible implementation of one side, before the data after coding are sent to the UE, the transmission unit
It is also used to:
Filling signal or targeting signal are sent on the unauthorized carrier wave to the UE, to keep to described unauthorized
The occupancy of carrier wave and the position for notifying first imperfect subframe after unauthorized carrier wave described in the UE is occupied.
With reference to first aspect with the first any one into the 8th kind of possible implementation of first aspect,
In tenth kind of possible implementation of one side, after the determination unit determines that the unauthorized carrier wave is occupied first
After a imperfect subframe, the transmission unit is also used to:
It sends unauthorized carrier-wave transmission and is indicated to the UE, the unauthorized carrier-wave transmission instruction is used to indicate described non-award
Weigh the length in the position and first imperfect subframe of first imperfect subframe of carrier wave for the data symbol of splicing.
Second aspect, the embodiment of the invention provides a kind of UE, comprising:
Receiving unit, the data sent for receiving base station by unauthorized carrier wave;
Determination unit, for determine the unauthorized carrier wave by the base station occupy after first imperfect subframe, with
And the splicing subframe with this first imperfect subframe splicing;
Acquiring unit, for obtaining one in first imperfect subframe of the unauthorized carrier wave and its splicing subframe
Coded data in TTI.
In conjunction with second aspect, in the first possible implementation of the second aspect, pass through in reception base station unauthorized
Before the data that carrier wave is sent, the receiving unit is also used to:
Receive filling signal or targeting signal that the base station is sent by the unauthorized carrier wave, the filling signal
Or targeting signal is for keeping the base station to the occupancy of the unauthorized carrier wave and notifying unauthorized load described in the UE
The position of first imperfect subframe after wave is occupied;
In first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station, the determination unit
It is specifically used for:
It is filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling signal or leading letter
Number first imperfect subframe of the subframe confirmation after to be the unauthorized carrier wave occupied by the base station.
In conjunction with the possible implementation of the first of second aspect or second aspect, second in second aspect is possible
First imperfect subframe in implementation, after the determination unit determines that the unauthorized carrier wave is occupied by the base station
Before, the receiving unit is also used to:
It receives the base station and notice, the auxiliary load is occupied by the secondary carrier that authorization carrier wave or the unauthorized carrier wave are sent
Wave occupancy notice is used to indicate the base station, and this occupies the initial time of the unauthorized carrier wave.
In conjunction with the possible implementation of the first of second aspect or second aspect, the third in second aspect is possible
In implementation, in first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station, the determination
Unit is specifically used for:
The unauthorized carrier-wave transmission instruction sent according to the base station, determines that the unauthorized carrier wave is occupied by the base station
First imperfect subframe afterwards.
In conjunction with any one of the first of second aspect and second aspect into the third possible implementation,
It is described when determining the splicing subframe with first imperfect subframe splicing in 4th kind of possible implementation of two aspects
Determination unit is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing with first imperfect subframe splicing
Subframe;Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
In the 4th kind of possible implementation in conjunction with second aspect, in the 5th kind of possible implementation of second aspect
In, when determining the last one imperfect subframe of the unauthorized carrier wave, the determination unit is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave and the base station, this occupies described non-award
The occupancy Duration Information for weighing carrier wave, determines the position of the last one imperfect subframe after the unauthorized carrier wave is occupied
Set, and by the position of the last one determining imperfect subframe subframe confirmation be the unauthorized carrier wave the last one not
Complete subframe.
In the 5th kind of possible implementation in conjunction with second aspect, in the 6th kind of possible implementation of second aspect
In, the occupancy Duration Information, which is configured by the base station and carries to occupy in notice in secondary carrier, is sent to the UE;Or
Person
The occupancy Duration Information is pre-configured to be in the base station side and the side UE.
In conjunction with any one of the first of second aspect and second aspect into the 6th kind of possible implementation,
In 7th kind of possible implementation of two aspects, in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
When the upper coded data obtained in a TTI, the acquiring unit is specifically used for:
Determine the symbol lengths of first imperfect subframe and the length of data symbol;
According to the symbol lengths of first imperfect subframe, the length of the data symbol of splicing subframe is calculated;
It is obtained in a TTI on the data symbol in the data symbol and splicing subframe in first imperfect subframe
Coded data.
In the 7th kind of possible implementation in conjunction with second aspect, in the 8th kind of possible implementation of second aspect
In, in the length of the symbol lengths and data symbol that determine first imperfect subframe, the acquiring unit is specifically used
In:
The detection of signal or targeting signal is filled to the unauthorized carrier wave, according to the of the unauthorized carrier wave
The position that the symbol of filling signal or targeting signal is detected in one imperfect subframe calculates first imperfect subframe
The symbol lengths that filling signal or targeting signal occupy in symbol lengths and first imperfect subframe;
The symbol lengths that are occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and
The length for controlling symbol, calculates the length of the data symbol in first imperfect subframe;
Wherein, the symbol lengths of first imperfect subframe include that the symbol that occupies of filling signal or targeting signal is long
The length of degree, the length of control symbol and data symbol.
In the 7th kind of possible implementation in conjunction with second aspect, in the 9th kind of possible implementation of second aspect
In, in the length of the symbol lengths and data symbol that determine first imperfect subframe, the acquiring unit is specifically used
In:
The unauthorized carrier-wave transmission instruction sent according to the base station, determines that first of the unauthorized carrier wave is imperfect
The length of the symbol lengths of subframe and the data symbol in first imperfect subframe.
In the 4th kind of possible implementation in conjunction with second aspect, in the tenth kind of possible implementation of second aspect
In, the determination unit determines that the last one imperfect subframe of the unauthorized carrier wave is to splice with first imperfect subframe
Splicing subframe;Then
The UE further include:
Decoding unit, in the acquiring unit in first imperfect subframe of the unauthorized carrier wave and its splicing
After obtaining the coded data in a TTI in subframe, based on the last one imperfect subframe from the unauthorized carrier wave
The scheduling information obtained on PDCCH is decoded the coded data of acquisition;Alternatively, based on from the unauthorized carrier wave most
The scheduling information obtained on the PDCCH of the subframe of the corresponding authorization carrier wave of the imperfect subframe of the latter, to the coded data of acquisition
It is decoded;Alternatively, based on first imperfect subframe and the last one imperfect subframe from the unauthorized carrier wave
Scheduling information is extracted on EPDCCH, and the data in spliced subframe are decoded;Alternatively, being based on from the unauthorized carrier wave
First imperfect subframe authorization carrier wave corresponding with the last one imperfect subframe subframe EPDCCH on the tune that obtains
Information is spent, the coded data of acquisition is decoded.
In the 4th kind of possible implementation in conjunction with second aspect, in a kind of the tenth possible realization side of second aspect
In formula, the determination unit determines that second subframe of the unauthorized carrier wave is the splicing with first imperfect subframe splicing
Subframe;Then
The UE further include:
Decoding unit, in the acquiring unit in first imperfect subframe of the unauthorized carrier wave and its splicing
After obtaining the coded data in a TTI in subframe, based on first imperfect subframe from the unauthorized carrier wave
The scheduling information obtained on PDCCH is decoded the coded data of acquisition;Alternatively, based on from the of the unauthorized carrier wave
The scheduling information obtained on the EPDCCH of one imperfect subframe and second subframe, is decoded the coded data of acquisition.
5th aspect, the embodiment of the invention provides a kind of base stations, comprising:
Processor, for configuring unauthorized carrier wave for UE;Determine first after the unauthorized carrier wave is occupied it is endless
Whole subframe, and the splicing subframe with this first imperfect subframe splicing;Data in one TTI are encoded;
Transceiver passes through first imperfect subframe of the unauthorized carrier wave and its splicing for the data after encoding
Subframe is sent to the UE.
In conjunction with the 5th aspect, in the first possible implementation of the 5th aspect, described in processor determination
After unauthorized carrier wave is occupied, the transceiver is also used to:
Secondary carrier, which is sent, by authorization carrier wave or the unauthorized carrier wave occupies notice to the UE, to notify the UE institute
Stating base station, this occupies the initial time of the unauthorized carrier wave.
In conjunction with the first possible implementation of the 5th aspect or the 5th aspect, second at the 5th aspect is possible
In implementation, when determining the splicing subframe with first imperfect subframe splicing, the processor is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing with first imperfect subframe splicing
Subframe;Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
In conjunction with second of possible implementation of the 5th aspect, in the third possible implementation of the 5th aspect
In, if the processor determines that the last one imperfect subframe of the unauthorized carrier wave is to splice with first imperfect subframe
Splicing subframe;Then
The data after coding are passed through into first imperfect subframe of the unauthorized carrier wave and its spelling in the transceiver
It connects subframe to be sent to before the UE, the processor is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave after occupied and this occupancy of the base station
The occupancy Duration Information of the unauthorized carrier wave determines the last one imperfect son after the unauthorized carrier wave is occupied
The position of frame;
The transceiver is specifically used for:
By the data after coding by the symbol of first imperfect subframe of the unauthorized carrier wave and the last one not
The symbol of complete subframe is sent to the UE.
In conjunction with the third possible implementation of the 5th aspect, in the 4th kind of possible implementation of the 5th aspect
In, the occupancy Duration Information, which is configured by the base station and carries to occupy in notice in secondary carrier, is sent to the UE;Or
Person
The occupancy Duration Information is pre-configured to be in the base station side and the side UE.
In conjunction with the third possible implementation of the 5th aspect, in the 5th kind of possible implementation of the 5th aspect
In, the processor is also used to:
The scheduling information of the data is placed on to the PDCCH of the last one imperfect subframe of the unauthorized carrier wave
On;Alternatively, the scheduling information of the data is placed on the last one of the unauthorized carrier wave, imperfect subframe is corresponding awards
On the PDCCH for weighing the subframe of carrier wave;Alternatively, the scheduling information of the data is placed on first of the unauthorized carrier wave not
On the EPDCCH of complete subframe and the last one imperfect subframe;Alternatively, the scheduling information of the data is placed on described non-
On the EPDCCH for authorizing first imperfect subframe of carrier wave subframe for authorizing carrier wave corresponding with the last one imperfect subframe.
In conjunction with second of possible implementation of the 5th aspect, in the 6th kind of possible implementation of the 5th aspect
In, if the processor determines that second subframe of the unauthorized carrier wave is splicing with first imperfect subframe splicing
Frame;Then
The data after coding are passed through into first imperfect subframe of the unauthorized carrier wave and its spelling in the transceiver
It connects subframe to be sent to before the UE, the processor is specifically used for:
According to the symbol lengths M of first imperfect subframe, the splicing symbol lengths N of second subframe is determined;Wherein, should
The symbol lengths M of first imperfect subframe includes symbol lengths, the control symbol that filling signal or targeting signal occupy
The length of length and data symbol, and the sum of M and N are the symbol lengths of a complete subframe;
The transceiver is specifically used for:
The symbol and second subframe that data after coding are passed through into first imperfect subframe of the unauthorized carrier wave
Top n symbol be sent to the UE.
In conjunction with the 6th kind of possible implementation of the 5th aspect, in the 7th kind of possible implementation of the 5th aspect
In, the processor is also used to:
The scheduling information of the data is placed on the PDCCH of first imperfect subframe of the unauthorized carrier wave;
Alternatively, the scheduling information of the data to be placed on to the first imperfect subframe and second subframe of the unauthorized carrier wave
On the EPDCCH of top n symbol.
In conjunction with the 6th kind of possible implementation of the 5th aspect, in the 8th kind of possible implementation of the 5th aspect
In, the processor is also used to:
It is scheduled the rear M symbol of second subframe of the unauthorized carrier wave as new imperfect subframe, and
The scheduling information for the data dispatched on the rear M symbol of second subframe is placed on the unauthorized carrier wave
On the PDCCH of second subframe.
In conjunction with the first any one into the 8th kind of possible implementation of the 5th aspect and the 5th aspect, the
In 9th kind of possible implementation of five aspects, before the data after coding are sent to the UE, the transceiver is also
For:
Filling signal or targeting signal are sent on the unauthorized carrier wave to the UE, to keep to described unauthorized
The occupancy of carrier wave and the position for notifying first imperfect subframe after unauthorized carrier wave described in the UE is occupied.
In conjunction with the first any one into the 8th kind of possible implementation of the 5th aspect and the 5th aspect, the
In tenth kind of possible implementation of five aspects, first after the processor determines that the unauthorized carrier wave is occupied
After imperfect subframe, the transceiver is also used to:
It sends unauthorized carrier-wave transmission and is indicated to the UE, the unauthorized carrier-wave transmission instruction is used to indicate described non-award
Weigh the length in the position and first imperfect subframe of first imperfect subframe of carrier wave for the data symbol of splicing.
6th aspect, the embodiment of the invention provides a kind of UE characterized by comprising
Transceiver, the data sent for receiving base station by unauthorized carrier wave;
Processor, for determine the unauthorized carrier wave by the base station occupy after first imperfect subframe, and
With the splicing subframe of this first imperfect subframe splicing;
The transceiver is also used to, and is obtained in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
Coded data in one TTI.
In conjunction with the 6th aspect, in the first possible implementation of the 6th aspect, pass through in reception base station unauthorized
Before the data that carrier wave is sent, the transceiver is also used to:
Receive filling signal or targeting signal that the base station is sent by the unauthorized carrier wave, the filling signal
Or targeting signal is for keeping the base station to the occupancy of the unauthorized carrier wave and notifying unauthorized load described in the UE
The position of first imperfect subframe after wave is occupied;
In first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station, the processing utensil
Body is used for:
It is filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling signal or leading letter
Number first imperfect subframe of the subframe confirmation after to be the unauthorized carrier wave occupied by the base station.
In conjunction with the first possible implementation of the 6th aspect or the 6th aspect, second at the 6th aspect is possible
In implementation, the processor determine the unauthorized carrier wave by the base station occupy after first imperfect subframe it
Before, the transceiver is also used to:
It receives the base station and notice, the auxiliary load is occupied by the secondary carrier that authorization carrier wave or the unauthorized carrier wave are sent
Wave occupancy notice is used to indicate the base station, and this occupies the initial time of the unauthorized carrier wave.
In conjunction with the first possible implementation of the 6th aspect or the 6th aspect, the third at the 6th aspect is possible
In implementation, in first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station, the processing
Implement body is used for:
The unauthorized carrier-wave transmission instruction sent according to the base station, determines that the unauthorized carrier wave is occupied by the base station
First imperfect subframe afterwards.
In conjunction with the first any one into the third possible implementation of the 6th aspect and the 6th aspect, the
It is described when determining the splicing subframe with first imperfect subframe splicing in 4th kind of possible implementation of six aspects
Processor is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing with first imperfect subframe splicing
Subframe;Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
In the 4th kind of possible implementation in conjunction with the 6th aspect, in the 5th kind of possible implementation of the 6th aspect
In, when determining the last one imperfect subframe of the unauthorized carrier wave, the processor is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave and the base station, this occupies described non-award
The occupancy Duration Information for weighing carrier wave, determines the position of the last one imperfect subframe after the unauthorized carrier wave is occupied
Set, and by the position of the last one determining imperfect subframe subframe confirmation be the unauthorized carrier wave the last one not
Complete subframe.
In the 5th kind of possible implementation in conjunction with the 6th aspect, in the 6th kind of possible implementation of the 6th aspect
In, the occupancy Duration Information, which is configured by the base station and carries to occupy in notice in secondary carrier, is sent to the UE;Or
Person
The occupancy Duration Information is pre-configured to be in the base station side and the side UE.
In conjunction with the first any one into the 6th kind of possible implementation of the 6th aspect and the 6th aspect, the
In 7th kind of possible implementation of six aspects, in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
When the upper coded data obtained in a TTI, the processor is specifically used for:
Determine the symbol lengths of first imperfect subframe and the length of data symbol;
According to the symbol lengths of first imperfect subframe, the length of the data symbol of splicing subframe is calculated;
It is obtained in a TTI on the data symbol in the data symbol and splicing subframe in first imperfect subframe
Coded data.
In the 7th kind of possible implementation in conjunction with the 6th aspect, in the 8th kind of possible implementation of the 6th aspect
In, in the length of the symbol lengths and data symbol that determine first imperfect subframe, the processor is specifically used for:
The detection of signal or targeting signal is filled to the unauthorized carrier wave, according to the of the unauthorized carrier wave
The position that the symbol of filling signal or targeting signal is detected in one imperfect subframe calculates first imperfect subframe
The symbol lengths that filling signal or targeting signal occupy in symbol lengths and first imperfect subframe;
The symbol lengths that are occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and
The length for controlling symbol, calculates the length of the data symbol in first imperfect subframe;
Wherein, the symbol lengths of first imperfect subframe include that the symbol that occupies of filling signal or targeting signal is long
The length of degree, the length of control symbol and data symbol.
In the 7th kind of possible implementation in conjunction with the 6th aspect, in the 9th kind of possible implementation of the 6th aspect
In, in the length of the symbol lengths and data symbol that determine first imperfect subframe, the processor is specifically used for:
The unauthorized carrier-wave transmission instruction sent according to the base station, determines that first of the unauthorized carrier wave is imperfect
The length of the symbol lengths of subframe and the data symbol in first imperfect subframe.
In the 4th kind of possible implementation in conjunction with the 6th aspect, in the tenth kind of possible implementation of the 6th aspect
In, the processor determines that the last one imperfect subframe of the unauthorized carrier wave is and first imperfect subframe splicing
Splice subframe;Then
The coded number in a TTI is obtained in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
According to later, the processor is also used to:
Based on the scheduling information obtained from the PDCCH of the last one imperfect subframe of the unauthorized carrier wave, to obtaining
The coded data taken is decoded;Alternatively, based on the corresponding authorization of the last one imperfect subframe from the unauthorized carrier wave
The scheduling information obtained on the PDCCH of the subframe of carrier wave is decoded the coded data of acquisition;Alternatively, being based on from described non-
It authorizes and extracts scheduling information on first imperfect subframe of carrier wave and the EPDCCH of the last one imperfect subframe, after splicing
Subframe on data be decoded;Alternatively, based on from first imperfect subframe of the unauthorized carrier wave and the last one
The scheduling information obtained on the EPDCCH of the corresponding subframe for authorizing carrier wave of imperfect subframe, solves the coded data of acquisition
Code.
In the 4th kind of possible implementation in conjunction with the 6th aspect, in a kind of the tenth possible realization side of the 6th aspect
In formula, the processor determines that second subframe of the unauthorized carrier wave is splicing with first imperfect subframe splicing
Frame;Then
The coded number in a TTI is obtained in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
According to later, the processor is also used to:
Based on the scheduling information obtained from the PDCCH of first imperfect subframe of the unauthorized carrier wave, to acquisition
Coded data be decoded;Alternatively, based on first imperfect subframe and second subframe from the unauthorized carrier wave
The scheduling information obtained on EPDCCH is decoded the coded data of acquisition.
5th aspect, the embodiment of the invention provides a kind of sending methods of subframe, comprising:
Base station is that UE configures unauthorized carrier wave;
The base station determines first imperfect subframe after the unauthorized carrier wave is occupied, and not with this first
The splicing subframe of complete subframe splicing;
The base station encodes the data in a TTI;
Data after coding are passed through first imperfect subframe of the unauthorized carrier wave and its splicing by the base station
Frame is sent to the UE.
In conjunction with the 5th aspect, in the first possible implementation of the 5th aspect, the base station determines described non-award
After power carrier wave is occupied, further includes:
The base station sends secondary carrier by authorization carrier wave or the unauthorized carrier wave and occupies notice to the UE, with notice
Base station described in the UE this occupy the initial time of the unauthorized carrier wave.
In conjunction with the first possible implementation of the 5th aspect or the 5th aspect, second at the 5th aspect is possible
In implementation, the base station determines the splicing subframe with first imperfect subframe splicing, comprising:
The base station determines that the last one imperfect subframe of the unauthorized carrier wave is to spell with first imperfect subframe
The splicing subframe connect;Or
The base station determines that second subframe of the unauthorized carrier wave is the splicing with first imperfect subframe splicing
Subframe.
In conjunction with second of possible implementation of the 5th aspect, in the third possible implementation of the 5th aspect
In, it is and first imperfect subframe splicing if the base station determines the last one imperfect subframe of the unauthorized carrier wave
Splice subframe;Then
Data after coding are passed through first imperfect subframe of the unauthorized carrier wave and its splicing by the base station
Frame is sent to the UE, comprising:
The position and the base station of first imperfect subframe of the base station according to the unauthorized carrier wave after occupied
This occupies the occupancy Duration Information of the unauthorized carrier wave, determines the last one after the unauthorized carrier wave is occupied
The position of imperfect subframe;
The base station by the data after coding by the symbol of first imperfect subframe of the unauthorized carrier wave and most
The symbol of the imperfect subframe of the latter is sent to the UE.
In conjunction with the third possible implementation of the 5th aspect, in the 4th kind of possible implementation of the 5th aspect
In, the occupancy Duration Information, which is configured by the base station and carries to occupy in notice in secondary carrier, is sent to the UE;Or
Person
The occupancy Duration Information is pre-configured to be in the base station side and the side UE.
In conjunction with the third possible implementation of the 5th aspect, in the 5th kind of possible implementation of the 5th aspect
In, the method also includes:
The scheduling information of the data is placed on the last one imperfect subframe of the unauthorized carrier wave by the base station
PDCCH on;Or
The scheduling information of the data is placed on the last one imperfect subframe of the unauthorized carrier wave by the base station
On the PDCCH of the subframe of corresponding authorization carrier wave;Or
The base station by the scheduling information of the data be placed on the unauthorized carrier wave first imperfect subframe and
On the EPDCCH of the last one imperfect subframe;Or
The base station by the scheduling information of the data be placed on the unauthorized carrier wave first imperfect subframe and
On the EPDCCH of the corresponding subframe for authorizing carrier wave of the last one imperfect subframe.
In conjunction with second of possible implementation of the 5th aspect, in the 6th kind of possible implementation of the 5th aspect
In, if the base station determines that second subframe of the unauthorized carrier wave is splicing with the imperfect frame splicing of first son
Frame;Then
Data after coding are passed through first imperfect subframe of the unauthorized carrier wave and its splicing by the base station
Frame is sent to the UE, comprising:
The base station determines the splicing symbol lengths of second subframe according to the symbol lengths M of first imperfect subframe
N;Wherein, the symbol lengths M of first imperfect subframe includes symbol lengths, the control that filling signal or targeting signal occupy
The length of symbol processed and the length of data symbol, and the sum of M and N are the symbol lengths of a complete subframe;
Data after coding are passed through the symbol of first imperfect subframe of the unauthorized carrier wave and by the base station
The top n symbol of two subframes is sent to the UE.
In conjunction with the 6th kind of possible implementation of the 5th aspect, in the 7th kind of possible implementation of the 5th aspect
In, the method also includes:
The scheduling information of the data is placed on first imperfect subframe of the unauthorized carrier wave by the base station
On PDCCH;Or
The base station by the scheduling information of the data be placed on the unauthorized carrier wave first imperfect subframe and
On the EPDCCH of the top n symbol of second subframe.
In conjunction with the 6th kind of possible implementation of the 5th aspect, in the 8th kind of possible implementation of the 5th aspect
In, the method also includes:
The base station is carried out the rear M symbol of second subframe of the unauthorized carrier wave as new imperfect subframe
Scheduling, and
The scheduling information for the data dispatched on the rear M symbol of second subframe is placed on the unauthorized carrier wave
On the PDCCH of second subframe.
In conjunction with the first any one into the 8th kind of possible implementation of the 5th aspect and the 5th aspect, the
In 9th kind of possible implementation of five aspects, the data after coding are sent to before the UE by the base station, further includes:
The base station sends filling signal or targeting signal to the UE, to keep to institute on the unauthorized carrier wave
It states the occupancy of unauthorized carrier wave and notifies the position of first imperfect subframe after unauthorized carrier wave described in the UE is occupied
It sets.
In conjunction with the first any one into the 8th kind of possible implementation of the 5th aspect and the 5th aspect, the
In tenth kind of possible implementation of five aspects, the base station determine first after the unauthorized carrier wave is occupied it is endless
After whole subframe, further includes:
The base station sends unauthorized carrier-wave transmission and is indicated to the UE, and the unauthorized carrier-wave transmission instruction is used to indicate
Data symbol in the position of first imperfect subframe of the unauthorized carrier wave and first imperfect subframe for splicing
Length.
6th aspect, the embodiment of the invention provides a kind of method of reseptances of subframe, comprising:
UE receives the data that base station is sent by unauthorized carrier wave;
The UE determines first imperfect subframe after the unauthorized carrier wave is occupied by the base station, and with this
The splicing subframe of one imperfect subframe splicing;
The UE is obtained in a TTI in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
Coded data.
In conjunction with the 6th aspect, in the first possible implementation of the 6th aspect, the reception base station UE passes through unauthorized
Before the data that carrier wave is sent, further includes:
The UE receives the filling signal or targeting signal that the base station is sent by the unauthorized carrier wave, described to fill out
Signal or targeting signal are filled for keeping the base station to the occupancy of the unauthorized carrier wave and notifying non-described in the UE
The position of first imperfect subframe after authorizing carrier wave occupied;
The UE determines the unauthorized carrier wave by first imperfect subframe after the occupancy of the base station, comprising:
The UE is filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling signal or
The subframe confirmation of targeting signal is first imperfect subframe after the unauthorized carrier wave is occupied by the base station.
In conjunction with the first possible implementation of the 6th aspect or the 6th aspect, second at the 6th aspect is possible
In implementation, the UE determines that the unauthorized carrier wave by before first imperfect subframe after the occupancy of the base station, is gone back
Include:
The UE receives the base station and occupies notice, institute by the secondary carrier that authorization carrier wave or the unauthorized carrier wave are sent
It states secondary carrier and occupies notice and be used to indicate the base station this occupies the initial time of the unauthorized carrier wave.
In conjunction with the first possible implementation of the 6th aspect or the 6th aspect, the third at the 6th aspect is possible
In implementation, the UE determines the unauthorized carrier wave by first imperfect subframe after the occupancy of the base station, comprising:
The UE is indicated according to the unauthorized carrier-wave transmission that the base station is sent, and determines the unauthorized carrier wave by the base
The first imperfect subframe stood after occupying.
In conjunction with the first any one into the third possible implementation of the 6th aspect and the 6th aspect, the
In 4th kind of possible implementation of six aspects, the UE determines the splicing subframe with first imperfect subframe splicing, packet
It includes:
The UE determines that the last one imperfect subframe of the unauthorized carrier wave is to splice with first imperfect subframe
Splicing subframe;Or
The UE determines that second subframe of the unauthorized carrier wave is splicing with first imperfect subframe splicing
Frame.
In the 4th kind of possible implementation in conjunction with the 6th aspect, in the 5th kind of possible implementation of the 6th aspect
In, the UE determines the last one imperfect subframe of the unauthorized carrier wave, comprising:
The UE is according to the position of first imperfect subframe of the unauthorized carrier wave and this occupancy institute of the base station
The occupancy Duration Information for stating unauthorized carrier wave determines the last one imperfect subframe after the unauthorized carrier wave is occupied
Position, and by the position of the last one determining imperfect subframe subframe confirmation be the unauthorized carrier wave last
A imperfect subframe.
In the 5th kind of possible implementation in conjunction with the 6th aspect, in the 6th kind of possible implementation of the 6th aspect
In, the occupancy Duration Information, which is configured by the base station and carries to occupy in notice in secondary carrier, is sent to the UE;Or
Person
The occupancy Duration Information is pre-configured to be in the base station side and the side UE.
In conjunction with the first any one into the 6th kind of possible implementation of the 6th aspect and the 6th aspect, the
In 7th kind of possible implementation of six aspects, the UE is in first imperfect subframe of the unauthorized carrier wave and its spelling
Connect the coded data obtained in a TTI in subframe, comprising:
The UE determines the symbol lengths of first imperfect subframe and the length of data symbol;
The UE calculates the length of the data symbol of splicing subframe according to the symbol lengths of first imperfect subframe;
The UE obtains one on the data symbol in the data symbol and splicing subframe in first imperfect subframe
Coded data in TTI.
In the 7th kind of possible implementation in conjunction with the 6th aspect, in the 8th kind of possible implementation of the 6th aspect
In, the UE determines the symbol lengths of first imperfect subframe and the length of data symbol, comprising:
The UE is filled the detection of signal or targeting signal to the unauthorized carrier wave, according in the unauthorized load
The position that the symbol of filling signal or targeting signal is detected in first imperfect subframe of wave, calculate this first it is imperfect
The symbol lengths that filling signal or targeting signal occupy in the symbol lengths of subframe and first imperfect subframe, and
The symbol lengths that are occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and
The length for controlling symbol, calculates the length of the data symbol in first imperfect subframe;
Wherein, the symbol lengths of first imperfect subframe include that the symbol that occupies of filling signal or targeting signal is long
The length of degree, the length of control symbol and data symbol.
In the 7th kind of possible implementation in conjunction with the 6th aspect, in the 9th kind of possible implementation of the 6th aspect
In, the UE determines the symbol lengths of first imperfect subframe and the length of data symbol, comprising:
The UE is indicated according to the unauthorized carrier-wave transmission that the base station is sent, and determines first of the unauthorized carrier wave
The length of the symbol lengths of imperfect subframe and the data symbol in first imperfect subframe.
In the 4th kind of possible implementation in conjunction with the 6th aspect, in the tenth kind of possible implementation of the 6th aspect
In, the UE determines that the last one imperfect subframe of the unauthorized carrier wave is the splicing with first imperfect subframe splicing
Subframe;Then
The UE is obtained in a TTI in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
After coded data, further includes:
The UE is based on the scheduling letter obtained from the PDCCH of the last one imperfect subframe of the unauthorized carrier wave
Breath, is decoded the coded data of acquisition;Or
The UE is based on the corresponding subframe for authorizing carrier wave of the last one imperfect subframe from the unauthorized carrier wave
The scheduling information obtained on PDCCH is decoded the coded data of acquisition;Or
The UE is based on the first imperfect subframe and the last one imperfect subframe from the unauthorized carrier wave
Scheduling information is extracted on EPDCCH, and the data in spliced subframe are decoded;Or
The UE is corresponding with the last one imperfect subframe based on first imperfect subframe from the unauthorized carrier wave
Authorization carrier wave subframe EPDCCH on the scheduling information that obtains, the coded data of acquisition is decoded.
In the 4th kind of possible implementation in conjunction with the 6th aspect, in a kind of the tenth possible realization side of the 6th aspect
In formula, the UE determines that second subframe of the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing;
Then
The UE is obtained in a TTI in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
After coded data, further includes:
The UE based on the scheduling information obtained from the PDCCH of first imperfect subframe of the unauthorized carrier wave,
The coded data of acquisition is decoded;Or
The UE from the EPDCCH of first imperfect subframe of the unauthorized carrier wave and second subframe based on obtaining
The scheduling information taken is decoded the coded data of acquisition.
Using scheme provided in an embodiment of the present invention, by the way that base station to be occupied to the initial time after unauthorized carrier wave and next
Imperfect subframe and other subframes between the initial position of a subframe are spliced into a complete subframe, so that a complete subframe
Coded data can be carried in two imperfect subframes, can use the imperfect subframe and send valid data, improve
The service efficiency of unauthorized carrier wave, no matter and data are sent since on which symbol of imperfect subframe, base station is all only used
The data of precoding in advance one complete subframe, the complete subframe without traversing all are pre-processed, and the place of base station is saved
Manage resource.
Detailed description of the invention
Fig. 1 is the multi-transceiver technology schematic diagram under the prior art in LTE system;
Fig. 2 is the frame structure schematic diagram under the prior art in LTE system;
Fig. 3 is the schematic diagram that the end position of ECCA and sub-frame boundary are not overlapped in unauthorized secondary carrier under the prior art;
Fig. 4 is the schematic diagram for the method that a kind of unauthorized secondary carrier data provided under the prior art are sent;
Fig. 5 A, Fig. 5 B are the system architecture diagram for the application scenarios that the embodiment of the present invention is applicable in;
Fig. 6 is a kind of structural schematic diagram of base station provided in an embodiment of the present invention;
Fig. 7 is a kind of structural schematic diagram of UE provided in an embodiment of the present invention;
Fig. 8 is the structural schematic diagram of another base station provided in an embodiment of the present invention;
Fig. 9 is the structural schematic diagram of another kind UE provided in an embodiment of the present invention;
Figure 10 is a kind of flow chart of the sending method of subframe provided in an embodiment of the present invention;
Figure 11 is the first connection scheme schematic diagram provided in an embodiment of the present invention;
Figure 12 is second of connection scheme schematic diagram provided in an embodiment of the present invention;
Figure 13 is the schematic diagram that transmission secondary carrier provided in an embodiment of the present invention occupies notice;
Figure 14 is that the first scheduling information places schematic diagram under the first connection scheme provided in an embodiment of the present invention;
Figure 15 is that second of scheduling information places schematic diagram under the first connection scheme provided in an embodiment of the present invention;
Figure 16 is that the third scheduling information places schematic diagram under the first connection scheme provided in an embodiment of the present invention;
Figure 17 is that 4th kind of scheduling information places schematic diagram under the first connection scheme provided in an embodiment of the present invention;
Figure 18 is that the first scheduling information places schematic diagram under second of connection scheme provided in an embodiment of the present invention;
Figure 19 is that second of scheduling information places schematic diagram under second of connection scheme provided in an embodiment of the present invention;
Figure 20 is the scheduling of second subframe of unauthorized carrier wave under second of connection scheme provided in an embodiment of the present invention
Schematic diagram;
Figure 21 is a kind of flow chart of the method for reseptance of subframe provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the invention provides a kind of method of sending and receiving of subframe, base station and UE, non-by occupying base station
Initial time after authorization carrier wave is spliced into one with other subframes to the imperfect subframe between the initial position of next subframe
A complete subframe enables the coded data of a complete subframe to be carried in two imperfect subframes, no matter from imperfect
Which start to send data on symbol of subframe, base station all only with the data for shifting to an earlier date precoding one complete subframe, is not necessarily to traversal
All complete subframes are pre-processed, and the process resource of base station is saved.
Technical solution of the present invention can be applied to following two system architecture:
Scene one: refering to shown in Fig. 5 A, under single base station communication scene of LTE system, UE passes through single base station and core net
Connection, base station is directly connected with core net.
Scene two: refering to shown in Fig. 5 B, under more base station communication scenes of LTE system, UE passes through multiple base stations and core net
It connects, connection is kept between multiple base stations, and at least one base station is directly connected with core net in this multiple base station.
It should be noted that technical solution of the present invention be equally applicable to be with other of frame structure identical as LTE system
System.
Technical solution of the present invention is illustrated with each embodiment with reference to the accompanying drawings of the specification.
As shown in fig.6, the embodiment of the invention provides a kind of base station, for realizing the sending method of subframe, the base
Station includes:
Configuration unit 601, for configuring unauthorized carrier wave for UE.
Determination unit 602, for determining first imperfect subframe after the unauthorized carrier wave is occupied, and with this
The splicing subframe of first imperfect subframe splicing.
First imperfect subframe is for a channel occupancy duration.Lower secondary channel after channel release
The initial position of occupancy is still first imperfect subframe.The imperfect subframe refers to, should for authorizing carrier wave
The starting of subframe or end position do not conform to the sub-frame boundary alignment of authorization carrier wave.Such as first imperfect subframe initial position
It is later than corresponding authorization carrier wave sub-frame boundary, end position and the alignment of corresponding authorization carrier wave sub-frame boundary.The last one is endless
Whole subframe initial position and corresponding authorization carrier wave sub-frame boundary are aligned but end position is earlier than corresponding authorization carrier wave subframe side
Boundary.The complete subframe of the splicing is to splice patrolling for the subframe for completing one TTI data of transmission using two imperfect subframes
Concept is collected, is made of on the time two splicing subframes.In length and exactly equal to one subframe lengths are limited, it can be less than one
Subframe lengths.
Wherein, first imperfect subframe of the unauthorized carrier wave and splicing subframe constitute a complete subframe,
Coding unit 603, for a Transmission Time Interval (English: Transmission Time Interval, letter
Claim: TTI) in data encoded.
Transmission unit 604, for the data after encoding by first imperfect subframe of the unauthorized carrier wave and
It splices subframe and is sent to the UE.
Optionally, after the determination unit 602 determines that the unauthorized carrier wave is occupied, the transmission unit 604 is also
For: secondary carrier is sent by authorization carrier wave or the unauthorized carrier wave and occupies notice to the UE, to notify described in the UE
Base station this occupy the initial time of the unauthorized carrier wave.
When determining the splicing subframe with first imperfect subframe splicing, the determination unit 602 is specifically used for: determining
The last one imperfect subframe of the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing;Alternatively, really
Second subframe of the fixed unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
Both connection schemes are described in detail below.
Scheme one,
If the determination unit 602 determine the last one imperfect subframe of the unauthorized carrier wave be with first it is endless
The splicing subframe of whole subframe splicing, the then data after coding are passed through into the unauthorized carrier wave in the transmission unit 604 the
One imperfect subframe and its splicing subframe are sent to before the UE, and the determination unit 602 is specifically used for: according to described non-
Authorization carrier wave it is occupied after first imperfect subframe position and the base station this occupy accounting for for the unauthorized carrier wave
With Duration Information, the position of the last one imperfect subframe after the unauthorized carrier wave is occupied is determined.
Then, the data after coding are passed through first imperfect son of the unauthorized carrier wave by the transmission unit 604
The symbol of frame and the symbol of the last one imperfect subframe are sent to the user equipment.
Wherein, the occupancy Duration Information is configured by the base station and carries to occupy in notice in secondary carrier and is sent to
The UE;Alternatively, the occupancy Duration Information is pre-configured to be in the base station side and the side UE.
Further, under this connecting method of scheme one, the base station further include:
Scheduling unit 605, for by the scheduling information of the data be placed on the unauthorized carrier wave the last one not
On the PDCCH of complete subframe;Alternatively, by the scheduling information of the data be placed on the unauthorized carrier wave the last one is endless
On the PDCCH of the corresponding subframe for authorizing carrier wave of whole subframe;Alternatively, the scheduling information of the data is placed on described unauthorized
In first imperfect subframe of carrier wave and the EPDCCH of the last one imperfect subframe;Alternatively, the scheduling of the data is believed
Breath is placed on the first imperfect subframe and the corresponding carrier wave that authorizes of the last one imperfect subframe of the unauthorized carrier wave
On the EPDCCH of subframe.
Scheme two,
If the determination unit 602 determines that second subframe of the unauthorized carrier wave is to spell with first imperfect subframe
The splicing subframe connect, then it is in the transmission unit 604 that the data after coding are endless by first of the unauthorized carrier wave
Whole subframe and its splicing subframe are sent to before the UE, and the determination unit 602 is specifically used for: according to first imperfect son
The symbol lengths M of frame determines the splicing symbol lengths N of second subframe;Wherein, the symbol lengths of first imperfect subframe
M include filling signal or targeting signal occupy symbol lengths, control the length of symbol and the length of data symbol, and M and N
The sum of be a complete subframe symbol lengths.
Then, the data after coding are passed through first imperfect son of the unauthorized carrier wave by the transmission unit 604
The symbol of frame and the top n symbol of second subframe are sent to the UE.
Further, under this connecting method of scheme two, the base station further include:
Scheduling unit 605, for by the scheduling information of the data be placed on first of the unauthorized carrier wave it is endless
On the PDCCH of whole subframe;Alternatively, the scheduling information of the data to be placed on to first imperfect son of the unauthorized carrier wave
On the EPDCCH of frame and the top n symbol of second subframe.
Further, under this connecting method of scheme two, the scheduling unit 605 is also used to: will be described unauthorized
The rear M symbol of second subframe of carrier wave is scheduled as new imperfect subframe, and will be at the rear M of second subframe
The scheduling information for the data dispatched on symbol is placed on the PDCCH of second subframe of the unauthorized carrier wave.
Optionally, before the data after coding are sent to the UE, the transmission unit 604 is also used to: described
Filling signal or targeting signal are sent on unauthorized carrier wave to the UE, to keep to the occupancy of the unauthorized carrier wave and
Notify the position of first imperfect subframe after unauthorized carrier wave described in the UE is occupied.
Optionally, first imperfect subframe after the determination unit 602 determines that the unauthorized carrier wave is occupied
Later, the transmission unit 604 is also used to: being sent unauthorized carrier-wave transmission and is indicated to the UE, the unauthorized carrier-wave transmission
It indicates to be used to indicate in the position and first imperfect subframe of first imperfect subframe of the unauthorized carrier wave for spelling
The length of the data symbol connect.
As shown in fig.7, the embodiment of the invention provides a kind of UE, for realizing the method for reseptance of subframe, the UE packet
It includes:
Receiving unit 701, the data sent for receiving base station by unauthorized carrier wave.
Determination unit 702, for determine the unauthorized carrier wave by the base station occupy after first imperfect subframe,
And the splicing subframe with this first imperfect subframe splicing.
Wherein, first imperfect subframe of the unauthorized carrier wave and splicing subframe constitute a complete subframe.
Acquiring unit 703, for being obtained in first imperfect subframe of the unauthorized carrier wave and its splicing subframe
Coded data in one TTI.
Optionally, before receiving the data that base station is sent by unauthorized carrier wave, the receiving unit 701 is also used to:
Receive filling signal that the base station is sent by the unauthorized carrier wave perhaps targeting signal filling signal or leading
Signal is for keeping the base station to the occupancy of the unauthorized carrier wave and notifying unauthorized carrier wave described in the UE occupied
The position of first imperfect subframe afterwards.
Correspondingly, described in first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station
Determination unit 702 is specifically used for: being filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling
The confirmation of the subframe of signal or targeting signal is first imperfect subframe after the unauthorized carrier wave is occupied by the base station.
Optionally, determine the unauthorized carrier wave by first after the occupancy of the base station not in the determination unit 702
Before complete subframe, the receiving unit 701 is also used to: being received the base station and is passed through authorization carrier wave or the unauthorized carrier wave hair
The secondary carrier sent occupies notice, and the secondary carrier occupancy notice is used to indicate the base station, and this occupies the unauthorized carrier wave
Initial time.
Optionally, described in first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station
Determination unit 702 is specifically used for: being indicated according to the unauthorized carrier-wave transmission that the base station is sent, determines the unauthorized carrier wave quilt
First imperfect subframe after the base station occupancy.
When determining the splicing subframe with first imperfect subframe splicing, the determination unit 702 is specifically used for: determining
The last one imperfect subframe of the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing;Alternatively, really
Second subframe of the fixed unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
Wherein, when determining the last one imperfect subframe of the unauthorized carrier wave, the determination unit 702 is specifically used
In: according to the position of first imperfect subframe of the unauthorized carrier wave and this described unauthorized carrier wave of occupancy of the base station
Occupancy Duration Information, determine the position of the last one imperfect subframe after the unauthorized carrier wave is occupied, and will
Subframe confirmation on the position of the imperfect subframe of the last one determining is the last one imperfect son of the unauthorized carrier wave
Frame.
Wherein, the occupancy Duration Information is configured by the base station and carries to occupy in notice in secondary carrier and is sent to
The UE;Alternatively, the occupancy Duration Information is pre-configured to be in the base station side and the side UE.
Further, a TTI is obtained in first imperfect subframe of the unauthorized carrier wave and its splicing subframe
When interior coded data, the acquiring unit 703 is specifically used for: determining the symbol lengths sum number of first imperfect subframe
According to the length of symbol;According to the symbol lengths of first imperfect subframe, the length of the data symbol of splicing subframe is calculated;?
The coded data in a TTI is obtained on the data symbol in data symbol and splicing subframe in one imperfect subframe.
Optionally, described to obtain in the length of the symbol lengths and data symbol that determine first imperfect subframe
It takes unit 703 to be specifically used for: being filled the detection of signal or targeting signal to the unauthorized carrier wave, non-awarded according to described
The position for detecting the symbol of filling signal or targeting signal in first imperfect subframe of carrier wave is weighed, calculates this first not
The symbol lengths that filling signal or targeting signal occupy in the symbol lengths of complete subframe and first imperfect subframe;Root
The symbol lengths that are occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and control symbol
Length calculates the length of the data symbol in first imperfect subframe;Wherein, the symbol of first imperfect subframe is long
Degree includes symbol lengths, the length of control symbol and the length of data symbol that filling signal or targeting signal occupy.
Optionally, described to obtain in the length of the symbol lengths and data symbol that determine first imperfect subframe
It takes unit 703 to be specifically used for: being indicated according to the unauthorized carrier-wave transmission that the base station is sent, determine the of the unauthorized carrier wave
The symbol lengths of one imperfect subframe and the length of the data symbol in first imperfect subframe.
If the determination unit 702 determine the last one imperfect subframe of the unauthorized carrier wave be with first it is endless
The splicing subframe of whole subframe splicing, the then UE further include:
Decoding unit 704, for the acquiring unit 703 in first imperfect subframe of the unauthorized carrier wave and
After it splices the coded data obtained in a TTI in subframe, based on from the unauthorized carrier wave the last one is imperfect
The scheduling information obtained on the PDCCH of subframe is decoded the coded data of acquisition;Alternatively, being based on from the unauthorized load
The scheduling information obtained on the PDCCH of the subframe of the corresponding authorization carrier wave of the imperfect subframe of the last one of wave, to the volume of acquisition
Code data are decoded;Alternatively, based on first imperfect subframe and the last one imperfect son from the unauthorized carrier wave
Scheduling information is extracted on the EPDCCH of frame, the data in spliced subframe are decoded;Alternatively, being based on from described unauthorized
It is obtained on the EPDCCH of first imperfect subframe of carrier wave subframe for authorizing carrier wave corresponding with the last one imperfect subframe
Scheduling information, the coded data of acquisition is decoded.
If the determination unit 702 determines that second subframe of the unauthorized carrier wave is to spell with first imperfect subframe
The splicing subframe connect, the then UE further include:
Decoding unit 704, for the acquiring unit 703 in first imperfect subframe of the unauthorized carrier wave and
After it splices the coded data obtained in a TTI in subframe, based on first imperfect son from the unauthorized carrier wave
The scheduling information obtained on the PDCCH of frame is decoded the coded data of acquisition;Alternatively, being based on from the unauthorized carrier wave
First imperfect subframe and second subframe EPDCCH on the scheduling information that obtains, the coded data of acquisition is solved
Code.
As shown in fig.8, the embodiment of the invention also provides a kind of base station, it is described for realizing the sending method of subframe
Base station includes:
Processor 801, for configuring unauthorized carrier wave for UE;Determine first after the unauthorized carrier wave is occupied not
Complete subframe, and the splicing subframe with this first imperfect subframe splicing;Data in one TTI are encoded.
Wherein, first imperfect subframe of the unauthorized carrier wave and splicing subframe constitute a complete subframe.
Transceiver 802, for the data after encoding by first imperfect subframe of the unauthorized carrier wave and its
Splicing subframe is sent to the UE.
Optionally, after the processor 801 determines that the unauthorized carrier wave is occupied, the transceiver 802 is also used to:
Secondary carrier, which is sent, by authorization carrier wave or the unauthorized carrier wave occupies notice to the UE, to notify base station sheet described in the UE
The secondary initial time for occupying the unauthorized carrier wave.
When determining the splicing subframe with first imperfect subframe splicing, the processor 801 is specifically used for: determining institute
The last one the imperfect subframe for stating unauthorized carrier wave is the splicing subframe spliced with first imperfect subframe;Alternatively, determining
Second subframe of the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
Both connection schemes are described in detail below.
Scheme one,
If the processor 801 determine the last one imperfect subframe of the unauthorized carrier wave be with first it is imperfect
Data after coding are then passed through first of the unauthorized carrier wave by the splicing subframe of subframe splicing in the transceiver 802
Imperfect subframe and its splicing subframe are sent to before the UE, and the processor 801 is specifically used for: according to the unauthorized load
This occupancy for occupying the unauthorized carrier wave of the position and the base station of first imperfect subframe after wave is occupied continues
Temporal information determines the position of the last one imperfect subframe after the unauthorized carrier wave is occupied.
Then, first imperfect subframe that the data after coding are passed through the unauthorized carrier wave by the transceiver 802
Symbol and the symbol of the last one imperfect subframe be sent to the UE.
Wherein, the occupancy Duration Information is configured by the base station and carries to occupy in notice in secondary carrier and is sent to
The UE;Alternatively, the occupancy Duration Information is pre-configured to be in the base station side and the side UE.
Further, under this connecting method of scheme one, the processor 801 is also used to: by the tune of the data
On the PDCCH for the last one imperfect subframe that degree information is placed on the unauthorized carrier wave;Alternatively, by the scheduling of the data
Information is placed on the PDCCH of the corresponding subframe for authorizing carrier wave of the last one imperfect subframe of the unauthorized carrier wave;Or
Person, first imperfect subframe that the scheduling information of the data is placed on the unauthorized carrier wave are imperfect with the last one
On the EPDCCH of subframe;Alternatively, the scheduling information of the data to be placed on to first imperfect son of the unauthorized carrier wave
On the EPDCCH of the frame subframe for authorizing carrier wave corresponding with the last one imperfect subframe.
Scheme two,
If the processor 801 determines that second subframe of the unauthorized carrier wave is to splice with first imperfect subframe
Splicing subframe, then the data after coding are passed through into first imperfect son of the unauthorized carrier wave in the transceiver 802
Frame and its splicing subframe are sent to before the UE, and the processor 801 is specifically used for: according to the symbol of first imperfect subframe
Number length M, determines the splicing symbol lengths N of second subframe;Wherein, the symbol lengths M of first imperfect subframe includes
Symbol lengths, the length of control symbol and the length of data symbol that filling signal or targeting signal occupy, and the sum of M and N
For the symbol lengths of a complete subframe.
Then, first imperfect subframe that the data after coding are passed through the unauthorized carrier wave by the transceiver 802
Symbol and the top n symbol of second subframe be sent to the UE.
Further, under this connecting method of scheme two, the processor 801 is also used to: by the tune of the data
On the PDCCH for first imperfect subframe that degree information is placed on the unauthorized carrier wave;Alternatively, the scheduling of the data is believed
Breath is placed on the EPDCCH of first imperfect subframe of the unauthorized carrier wave and the top n symbol of second subframe.
Further, under this connecting method of scheme two, the processor 801 is also used to: by the unauthorized load
The rear M symbol of second subframe of wave is scheduled as new imperfect subframe, and will be in the rear M symbol of second subframe
On the PDCCH for second subframe that the scheduling information for the data dispatched on number is placed on the unauthorized carrier wave.
Optionally, before the data after coding are sent to the UE, the transceiver 802 is also used to: described non-
It authorizes and sends filling signal or targeting signal on carrier wave to the UE, to keep the occupancy to the unauthorized carrier wave and lead to
Know the position of first imperfect subframe after unauthorized carrier wave described in the UE is occupied.
Optionally, first imperfect subframe after the processor 801 determines that the unauthorized carrier wave is occupied it
Afterwards, the transceiver 802 is also used to: being sent unauthorized carrier-wave transmission and is indicated to the UE, the unauthorized carrier-wave transmission instruction
It is used to indicate in the position and first imperfect subframe of first imperfect subframe of the unauthorized carrier wave for splicing
The length of data symbol.
As shown in fig.9, the embodiment of the invention provides a kind of UE, for realizing the method for reseptance of subframe, the UE packet
It includes:
Transceiver 901, the data sent for receiving base station by unauthorized carrier wave.
Processor 902, for determine the unauthorized carrier wave by the base station occupy after first imperfect subframe, with
And the splicing subframe with this first imperfect subframe splicing.
Wherein, first imperfect subframe of the unauthorized carrier wave and splicing subframe constitute a complete subframe
The transceiver 901 is also used to, in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
Obtain the coded data in a TTI.
Optionally, before receiving the data that base station is sent by unauthorized carrier wave, the transceiver 901 is also used to: being connect
Receive filling signal that the base station is sent by the unauthorized carrier wave perhaps the targeting signal filling signal or leading letter
Number for keeping the base station to the occupancy of the unauthorized carrier wave and after notifying that unauthorized carrier wave described in the UE is occupied
First imperfect subframe position;
Correspondingly, described in first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station
Processor 902 is specifically used for: being filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling letter
Number or targeting signal first imperfect subframe of the subframe confirmation after to be the unauthorized carrier wave occupied by the base station.
Optionally, first after the processor 902 determines that the unauthorized carrier wave is occupied by the base station is endless
Before whole subframe, the transceiver 901 is also used to: receiving what the base station was sent by authorization carrier wave or the unauthorized carrier wave
Secondary carrier occupies notice, and the secondary carrier occupancy notice is used to indicate the base station, and this occupies the starting of the unauthorized carrier wave
Moment.
Optionally, described in first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station
Processor 902 is specifically used for: being indicated according to the unauthorized carrier-wave transmission that the base station is sent, determines the unauthorized carrier wave by institute
State first imperfect subframe after base station occupies.
When determining the splicing subframe with first imperfect subframe splicing, the processor 902 is specifically used for: determining institute
The last one the imperfect subframe for stating unauthorized carrier wave is the splicing subframe spliced with first imperfect subframe;Alternatively, determining
Second subframe of the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
Wherein, when determining the last one imperfect subframe of the unauthorized carrier wave, the processor 902 is specifically used
In: according to the position of first imperfect subframe of the unauthorized carrier wave and this described unauthorized carrier wave of occupancy of the base station
Occupancy Duration Information, determine the position of the last one imperfect subframe after the unauthorized carrier wave is occupied, and will
Subframe confirmation on the position of the imperfect subframe of the last one determining is the last one imperfect son of the unauthorized carrier wave
Frame.
Wherein, the occupancy Duration Information is configured by the base station and carries to occupy in notice in secondary carrier and is sent to
The UE;Alternatively, the occupancy Duration Information is pre-configured to be in the base station side and the side UE.
Further, a TTI is obtained in first imperfect subframe of the unauthorized carrier wave and its splicing subframe
When interior coded data, the processor 902 is specifically used for: determining the symbol lengths and data of first imperfect subframe
The length of symbol;According to the symbol lengths of first imperfect subframe, the length of the data symbol of splicing subframe is calculated;First
The coded data in a TTI is obtained on the data symbol in data symbol and splicing subframe in a imperfect subframe.
Optionally, in the length of the symbol lengths and data symbol that determine first imperfect subframe, the place
Reason device 902 is specifically used for: the detection of signal or targeting signal is filled to the unauthorized carrier wave, according to described unauthorized
The position that the symbol of filling signal or targeting signal is detected in first imperfect subframe of carrier wave, calculate this first it is endless
The symbol lengths that filling signal or targeting signal occupy in the symbol lengths of whole subframe and first imperfect subframe;According to
The length of symbol lengths and control symbol that symbol lengths, filling signal or the targeting signal of first imperfect subframe occupy
Degree, calculates the length of the data symbol in first imperfect subframe;Wherein, the symbol lengths of first imperfect subframe
Symbol lengths, the length of control symbol and the length of data symbol occupied including filling signal or targeting signal.
Optionally, in the length of the symbol lengths and data symbol that determine first imperfect subframe, the place
Reason device 902 is specifically used for: being indicated according to the unauthorized carrier-wave transmission that the base station is sent, determines the first of the unauthorized carrier wave
The length of the symbol lengths of a imperfect subframe and the data symbol in first imperfect subframe.
If the processor 902 determine the last one imperfect subframe of the unauthorized carrier wave be with first it is imperfect
The splicing subframe of subframe splicing then obtains one in first imperfect subframe of the unauthorized carrier wave and its splicing subframe
After coded data in TTI, the processor 902 is also used to: based on from the unauthorized carrier wave the last one is imperfect
The scheduling information obtained on the PDCCH of subframe is decoded the coded data of acquisition;Alternatively, being based on from the unauthorized load
The scheduling information obtained on the PDCCH of the subframe of the corresponding authorization carrier wave of the imperfect subframe of the last one of wave, to the volume of acquisition
Code data are decoded;Alternatively, based on first imperfect subframe and the last one imperfect son from the unauthorized carrier wave
Scheduling information is extracted on the EPDCCH of frame, the data in spliced subframe are decoded;Alternatively, being based on from described unauthorized
It is obtained on the EPDCCH of first imperfect subframe of carrier wave subframe for authorizing carrier wave corresponding with the last one imperfect subframe
Scheduling information, the coded data of acquisition is decoded.
If the processor 902 determines that second subframe of the unauthorized carrier wave is to splice with first imperfect subframe
Splicing subframe, then first imperfect subframe of the unauthorized carrier wave and its splicing subframe on obtain a TTI in
After coded data, the processor 902 is also used to: based on first imperfect subframe from the unauthorized carrier wave
The scheduling information obtained on PDCCH is decoded the coded data of acquisition;Alternatively, based on from the of the unauthorized carrier wave
The scheduling information obtained on the EPDCCH of one imperfect subframe and second subframe, is decoded the coded data of acquisition.
As shown in fig.10, the implementing procedure of this method is such as the embodiment of the invention provides a kind of sending method of subframe
Under:
Step 1001: base station is that UE configures unauthorized carrier wave.
The unauthorized carrier wave is the secondary carrier that the base station is UE configuration.
Step 1002: the base station determines first imperfect subframe after the unauthorized carrier wave is occupied, Yi Jiyu
The splicing subframe of this first imperfect subframe splicing.
Wherein, first imperfect subframe of the unauthorized carrier wave and splicing subframe constitute a complete subframe.
For example, in practical application, base station can confirm that the unauthorized carrier wave sends data by CCA or ECCA
Initial time.Specifically, the end position of CCA or ECCA is not overlapped with the boundary of subframe generally, for example, CCA or ECCA
End position is at the Y OFDM symbol of X subframe, wherein Y is the positive integer less than 14.Particularly, when Y is greater than 3,
It indicates that CCA the or ECCA stage occupies preceding 3 OFDM symbols where the PDCCH in X subframe, that is, will appear because lacking
PDCCH and the case where can not be scheduled to the data of the subframe.
In order to using the unauthorized carrier wave it is occupied after initial time between the initial position of next subframe
Imperfect subframe sends valid data, to improve the service efficiency of unauthorized carrier wave, the embodiment of the present invention proposes can should
Imperfect subframe and other subframes of unauthorized carrier wave are spliced into a complete subframe.Specifically, can have but be not limited to following
Two kinds of connection schemes:
Scheme one,
The base station determines that the last one imperfect subframe of the unauthorized carrier wave is to spell with first imperfect subframe
The splicing subframe connect.
For example, as shown in figure 11, it is assumed that this occupy the subframe 2 on unauthorized carrier wave to totally 6 milliseconds of subframe 8 (unit:
Ms the time), wherein subframe 2 and subframe 8 are imperfect subframe.Scheme one is that this is occupied to the front and back of unauthorized carrier wave
Two imperfect subframes --- subframe 2 and subframe 8 are spliced into a complete subframe.
Scheme two,
The base station determines that second subframe of the unauthorized carrier wave is the splicing with first imperfect subframe splicing
Subframe.
For example, as shown in figure 12, it is assumed that this occupy the subframe 2 on unauthorized carrier wave to totally 6 milliseconds of subframe 8 (unit:
Ms the time), wherein subframe 2 and subframe 8 are imperfect subframe.Scheme two is that this is occupied the endless of unauthorized carrier wave
Sub- frame --- the front portion of subframe 3 is spliced into a complete subframe by whole subframe 2 and its latter.Then, by the latter of subframe 3
Part and subframe 8 are scheduled as imperfect subframe, wherein rear portion and this kind of PDCCH of subframe 8 to subframe 3
The scheduling problem of unappropriated imperfect subframe has mature technology in the prior art to solve, and the present invention repeats no more.
It should be noted that the base station can only select one of connection scheme simultaneously, and the base station and described
UE makes an appointment using identical connection scheme.
Optionally, after the base station determines that the unauthorized carrier wave is occupied, authorization carrier wave or described non-can also be passed through
It authorizes carrier wave to send secondary carrier and occupies notice to the UE, to notify this described unauthorized carrier wave of occupancy of base station described in the UE
Initial time, the UE carries out the data for sending from the unauthorized carrier wave of receiving and storing from the initial time
Parsing.For example, as shown in figure 13, base station is sent secondary carrier using the PDCCH in authorization carrier wave subframe 3 and occupies notice to being taken
The UE of business.
Optionally, after the base station determines first imperfect subframe after the unauthorized carrier wave is occupied, may be used also
It is indicated to the UE to send unauthorized carrier-wave transmission, the unauthorized carrier-wave transmission instruction is used to indicate the unauthorized carrier wave
First imperfect subframe position and first imperfect subframe in for splicing data symbol length.
Step 1003: the base station encodes the data in a TTI.
Step 1004: the base station by the data after coding by first imperfect subframe of the unauthorized carrier wave and
It splices subframe and is sent to the UE.
Specifically, if using the first connection scheme in above-mentioned steps 1002, i.e., the described base station determines described non-award
The last one the imperfect subframe for weighing carrier wave is the splicing subframe spliced with first imperfect subframe, then institute in step 1004
State base station this can account for according to the position of first imperfect subframe of the unauthorized carrier wave after occupied and the base station
With the occupancy Duration Information of the unauthorized carrier wave, determine after the unauthorized carrier wave is occupied the last one is imperfect
The position of subframe, then the data after coding are passed through the symbol of first imperfect subframe of the unauthorized carrier wave by the base station
Number and the symbol of the last one imperfect subframe be sent to the UE.
Wherein, the occupancy Duration Information can be configured by the base station and carry to occupy in notice in secondary carrier and sent out
Give the UE, the occupancy duration that base station occupies unauthorized carrier wave every time in this case can be it is unfixed, specifically
The occupancy duration determined by base station after reinform to UE.Alternatively, the occupancy Duration Information is also possible to be pre-configured
In the base station side and the user equipment side, base station is occupied according to the occupancy duration of agreement every time in this case
Unauthorized carrier wave.
Further, the data in a TTI after coding are placed on the first of the unauthorized carrier wave by the base station
It, can also be by the number in a TTI after the coding when on the data symbol of a imperfect subframe and the last one imperfect subframe
The position of first imperfect subframe and the control symbol of the last one imperfect subframe is placed on according to corresponding scheduling information
It sets.Wherein, scheduling information shows the corresponding data of the scheduling information and is destined to which UE and positioned at unauthorized carrier wave
The information such as in any block resource.
Specifically, can have following four method to realize the placement of scheduling information:
The first: the base station by the scheduling information of the data be placed on the unauthorized carrier wave the last one is endless
On the PDCCH of whole subframe.
For example, as shown in figure 14, base station is by former and later two imperfect subframes --- subframe 2 and the subframe on unauthorized carrier wave
8 are spliced into a complete subframe, and using the PDCCH of the subframe 8 on unauthorized carrier wave, are carried on unauthorized carrier wave to dispatch
Data in subframe 2 and subframe 8.Correspondingly, UE needs to solve again after the subframe 2 and the concatenation of subframe 8 on unauthorized carrier wave
Code.
Second: the base station by the scheduling information of the data be placed on the unauthorized carrier wave the last one is endless
On the PDCCH of the corresponding subframe for authorizing carrier wave of whole subframe.
For example, as shown in figure 15, base station is by former and later two imperfect subframes --- subframe 2 and the subframe on unauthorized carrier wave
8 are spliced into a complete subframe, and use the PDCCH of the subframe on authorization carrier wave corresponding to the subframe 8 on unauthorized carrier wave,
To dispatch the data in the subframe 2 and subframe 8 that are carried on unauthorized carrier wave.
The third: the base station is imperfect by the scheduling information of the data be placed on the unauthorized carrier wave first
On the EPDCCH of subframe and the last one imperfect subframe.
For example, as shown in figure 16, base station is by former and later two imperfect subframes --- subframe 2 and the subframe on unauthorized carrier wave
8 are spliced into a complete subframe, and using the EPDCCH of subframe 2 and subframe 8 on unauthorized carrier wave, are carried on non-award to dispatch
Weigh the data in the subframe 2 and subframe 8 of carrier wave.
4th kind: the base station is imperfect by the scheduling information of the data be placed on the unauthorized carrier wave first
On the EPDCCH of the subframe subframe for authorizing carrier wave corresponding with the last one imperfect subframe.
For example, as shown in figure 17, base station is by former and later two imperfect subframes --- subframe 2 and the subframe on unauthorized carrier wave
8 are spliced into a complete subframe, and using the subframe on authorization carrier wave corresponding to the subframe 2 and subframe 8 on unauthorized carrier wave
EPDCCH, to dispatch the data in the subframe 2 and subframe 8 that are carried on unauthorized carrier wave.
In addition, if using second of connection scheme in above-mentioned step 1102, i.e., the described base station determines the unauthorized load
Second subframe of wave is the splicing subframe with first imperfect subframe splicing, then base station described in step 1104 can root
According to the symbol lengths M of first imperfect subframe, the splicing symbol lengths N of second subframe is determined;Wherein, this first it is endless
The symbol lengths M of whole subframe include filling signal or targeting signal occupy symbol lengths, control symbol length and data
The length of symbol, and the sum of M and N are the symbol lengths of a complete subframe.Then the base station passes through the data after coding
The symbol of first imperfect subframe of the unauthorized carrier wave and the top n symbol of second subframe are sent to the UE.
Further, the data in a TTI after coding are placed on the first of the unauthorized carrier wave by the base station
It, can also be by the volume when on the data symbol for including in the data symbol of a imperfect subframe and the top n symbol of second subframe
Scheduling information corresponding to the data in a TTI after code is placed on the control symbol and second of first imperfect subframe
On the position for the control symbol for including in the top n symbol of a subframe.
Specifically, can have following two method to realize the placement of scheduling information:
The first: the base station is imperfect by the scheduling information of the data be placed on the unauthorized carrier wave first
On the PDCCH of subframe.
For example, as shown in figure 18, the front portion of imperfect subframe 2 and subframe 3 on unauthorized carrier wave is spliced in base station
For a complete subframe, and using the preceding n OFDM symbol of subframe 2 as the PDCCH of subframe 2, using the son on unauthorized carrier wave
The PDCCH of frame 2 dispatches the data being carried in 3 front portion of subframe 2 and subframe, wherein n≤3.
Second: the base station is imperfect by the scheduling information of the data be placed on the unauthorized carrier wave first
On the EPDCCH of the top n symbol of subframe and second subframe.
For example, as shown in figure 19, the front portion of imperfect subframe 2 and subframe 3 on unauthorized carrier wave is spliced in base station
For a complete subframe, and son is carried on to dispatch using the EPDCCH of 3 front portion of subframe 2 and subframe on unauthorized carrier wave
Data in 3 front portion of frame 2 and subframe.
Further, the base station is using the top n symbol of second subframe of the unauthorized carrier wave as splicing subframe
It, can also be using the rear M symbol of second subframe of the unauthorized carrier wave as new after first imperfect subframe splicing
Imperfect subframe be scheduled, and the scheduling information for the data dispatched on the rear M symbol of second subframe is placed on
On the PDCCH of second subframe of the unauthorized carrier wave.
For example, as shown in figure 20, the front portion of imperfect subframe 2 and subframe 3 on unauthorized carrier wave is spliced in base station
It is scheduled for a complete subframe, while the subsequent remainder of the subframe 3 imperfect subframe new as one being adjusted
The PDCCH as subframe 3 is vacated in the n OFDM symbol that subframe 3 originates in degree, base station, remains for dispatching to be carried on behind subframe 3
Data in remaining part point.
It optionally, can also be in the unauthorized carrier wave before the data after coding are sent to the UE by the base station
Upper transmission filling signal or targeting signal are to the UE, to keep the occupancy to the unauthorized carrier wave, and described in notice
UE confirmed according to the testing result to filling signal or targeting signal first after the unauthorized carrier wave is occupied it is imperfect
The position of subframe.
Refering to shown in Figure 21, the embodiment of the invention also provides a kind of method of reseptance of subframe, the implementing procedures of this method
It is as follows:
Step 2101:UE receives the data that base station is sent by unauthorized carrier wave.
Wherein, the unauthorized carrier wave is the secondary carrier that the base station is the UE configuration.
Optionally, the UE is before receiving the data that base station is sent by unauthorized carrier wave, it is also possible to can receive institute
Stating the filling signal that base station is sent by the unauthorized carrier wave, perhaps the targeting signal filling signal or targeting signal are used
In keep the base station to the occupancy of the unauthorized carrier wave and after notifying that unauthorized carrier wave described in the UE is occupied the
The position of one imperfect subframe.
Specifically, the UE determines the unauthorized carrier wave by the base station by filling signal or targeting signal detection
The method of first imperfect subframe after occupancy are as follows: the UE is filled signal or targeting signal to the unauthorized carrier wave
Detection, the subframe confirmation that will test filling signal or targeting signal is after the unauthorized carrier wave is occupied by the base station
First imperfect subframe.
And before first imperfect subframe after the UE determines that the unauthorized carrier wave is occupied by the base station, it can
Selection of land, the UE are also possible to that the secondary carrier occupancy that the base station is sent by authorization carrier wave or the unauthorized carrier wave can be received
Notice, the secondary carrier occupancy notice is used to indicate the base station, and this occupies the initial time of the unauthorized carrier wave.Due to
UE received data can will be stored in local from unauthorized carrier wave, therefore the UE is occupied according to the secondary carrier and notified, can
To confirm the orthochronous for starting to parse the data sent on unauthorized carrier wave, to parse valid data.
Step 2102: the UE determine the unauthorized carrier wave by the base station occupy after first imperfect subframe,
And the splicing subframe with this first imperfect subframe splicing.
Wherein, first imperfect subframe of the unauthorized carrier wave and splicing subframe constitute a complete subframe.
Wherein, the unauthorized carrier-wave transmission that the UE can be sent according to the base station indicates, determines the unauthorized load
Wave is by first imperfect subframe after the occupancy of the base station.
For example, first imperfect subframe after being occupied with prespecified unauthorized carrier wave by the base station is to receive
The previous subframe of the unauthorized carrier-wave transmission instruction.
Specifically, the embodiment of the present invention can have but be not limited to following two connection scheme:
Scheme one,
The UE determines that the last one imperfect subframe of the unauthorized carrier wave is to splice with first imperfect subframe
Splicing subframe.
Specifically, the UE can be according to the position and the base station of first imperfect subframe of the unauthorized carrier wave
This occupies the occupancy Duration Information of the unauthorized carrier wave, determines the last one after the unauthorized carrier wave is occupied
The position of imperfect subframe, and be the unauthorized load by the subframe confirmation on the position of the last one determining imperfect subframe
The imperfect subframe of the last one of wave.
Wherein, the occupancy Duration Information can be configured by the base station and carry to occupy in notice in secondary carrier and sent out
The UE is given, the base station side and the user equipment side can also be pre-configured to be in.
Scheme two,
The UE determines that second subframe of the unauthorized carrier wave is splicing with first imperfect subframe splicing
Frame.
It should be noted that the UE can only select one of connection scheme, and the UE and the base station simultaneously
It makes an appointment using identical connection scheme.
Step 2103: the UE obtains one in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
Coded data in a TTI.
Specifically, the UE obtains one in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
The method of coded data in TTI are as follows: determine the symbol lengths of first imperfect subframe and the length of data symbol first
Degree calculates the length of the data symbol of splicing subframe, finally first then according to the symbol lengths of first imperfect subframe
The coded data in a TTI is obtained on the data symbol in data symbol and splicing subframe in a imperfect subframe.
For example, UE obtain certain using unauthorized carrier-wave transmission data the occupancy duration (including leading/filling/
Data/control section) it is 6ms, the starting subframe for starting transmission is subframe 2, primary sign is symbol 5 in subframe 2, it is known that this
Secondary UE has received 5 complete subframes and former and later two imperfect subframes altogether, and (i.e. first imperfect in subframe 2 by UE
Subframe) on occupy symbol 5 totally 10 symbol lengths (including sent out in subframe 2 to symbol 14 (subframe has 14 symbols)
Leading/filling/data/the control section sent).If the splicing subframe of subframe 2 is that this occupies last of unauthorized carrier wave
A subframe can be confirmed that subframe 8 (i.e. the 7th subframe) is ending subframe by calculating UE, and due to son as shown in figure 11
The sum of frame 2 and the symbol lengths of subframe 8 one is set to 14 symbols, therefore total symbol lengths of subframe 8 are 4 symbols.In subframe 2
Data symbol part is included in the symbol 5 of subframe 2 between symbol 14, and the data symbol part in subframe 8 is included in subframe 8
Symbol 1 is between symbol 4.UE is needed 10 symbols of subframe 2 and 4 symbols of subframe 8 splicing one complete subframe of composition
Afterwards, the character position for deducting targeting signal, filling signal and control signal carries out data decoding again later.In addition, if subframe 2
Splicing subframe be this occupy second subframe of unauthorized carrier wave, as shown in figure 12, by calculate UE subframe 3 can be confirmed
Symbol lengths in (i.e. second subframe) for splicing are 14-10=4 symbol, then UE is needed preceding 4 symbols of subframe 3
It is decoded with after 10 symbols splicing one complete subframe of composition of subframe 2.Due to that may be wrapped in preceding 4 symbols of subframe 3
N control symbol is contained, n≤3, this n controls the data that symbol is sent on rear 10 symbols of scheduling subframe 3, therefore
UE may need to deduct in subframe 2 and the spliced complete subframe of subframe 3 character position of targeting signal and filling signal with
And deduct and carry out data decoding again after the position of this n control symbol, and the data UE carried on rear 10 symbols of subframe 3
It needs in addition to be decoded.
In the embodiment of the present invention, the UE can have following two mode determine first of the unauthorized carrier wave not
The complete symbol lengths of subframe and the length of data symbol:
The first: the UE is filled the detection of signal or targeting signal to the unauthorized carrier wave, according to inspection in institute
State the position that the symbol of filling signal or targeting signal is detected in first imperfect subframe of unauthorized carrier wave, calculate this
The symbol that filling signal or targeting signal occupy in the symbol lengths of one imperfect subframe and first imperfect subframe
Length, and the symbol lengths that are occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and
The length for controlling symbol, calculates the length of the data symbol in first imperfect subframe;Wherein, first imperfect son
The symbol lengths of frame include filling signal or targeting signal occupy symbol lengths, control symbol length and data symbol
Length.
For example, it is assumed that UE detects targeting signal during S to E symbols of the N subframe of unauthorized carrier wave,
In, E >=S and E, S are positive integer, then it is assumed that the N subframe be base station occupy first after the unauthorized carrier wave it is imperfect
Subframe, the E+1 symbol to contained between the last symbol of the N subframe data symbol occupancy position, Huo Zheke
The position that control symbol occupies can be further included.Under the first connection scheme of the invention, i.e. first imperfect subframe
Splicing subframe be base station this when occupying the last one imperfect subframe of unauthorized carrier wave, the E+1 symbol is sub to the N
It is the position that data symbol occupies between the last symbol of frame;And under second of connection scheme of the invention, i.e.,
The splicing subframe of one imperfect subframe be base station this when occupying second subframe of unauthorized carrier wave, the E+1 symbol arrives
After having deducted the n position that control symbol occupies between the last symbol of the N subframe, it is only the position of data symbol occupancy
It sets.
Second: the UE indicates according to the unauthorized carrier-wave transmission that the base station is sent, and determines the unauthorized carrier wave
First imperfect subframe symbol lengths and the data symbol in first imperfect subframe length.
Further, the UE obtains the coded data in a TTI from first imperfect subframe and its splicing subframe
Afterwards, it is also necessary to extract corresponding scheduling information and the coded data in first imperfect subframe and its splicing subframe is solved
Code.
If the UE determines that the last one imperfect subframe of the unauthorized carrier wave is and the in above-mentioned steps 2102
The splicing subframe of one imperfect subframe splicing, then the UE can based on from the unauthorized carrier wave the last one is imperfect
The scheduling information obtained on the PDCCH of subframe is decoded the coded data of acquisition.Alternatively, the UE can be based on from institute
The scheduling information obtained on the PDCCH of the corresponding subframe for authorizing carrier wave of the last one imperfect subframe of unauthorized carrier wave is stated,
The coded data of acquisition is decoded.Alternatively, the UE can be based on first imperfect son from the unauthorized carrier wave
Scheduling information is extracted on frame and the EPDCCH of the last one imperfect subframe, the data in spliced subframe are decoded.
Alternatively, the UE can be corresponding with the last one imperfect subframe based on first imperfect subframe from the unauthorized carrier wave
Authorization carrier wave subframe EPDCCH on the scheduling information that obtains, the coded data of acquisition is decoded.
If in above-mentioned steps 2102, the UE determine the unauthorized carrier wave second subframe be with first it is endless
The splicing subframe of whole subframe splicing, then the UE can be based on first imperfect subframe from the unauthorized carrier wave
The scheduling information obtained on PDCCH is decoded the coded data of acquisition.Alternatively, the UE is based on from the unauthorized load
The scheduling information obtained on first imperfect subframe of wave and the EPDCCH of second subframe carries out the coded data of acquisition
Decoding.
In conclusion technical solution provided in an embodiment of the present invention, by the way that base station to be occupied to the starting after unauthorized carrier wave
Imperfect subframe and other subframes between moment and the initial position of next subframe are spliced into a complete subframe, so that one
The coded data of a complete subframe can be carried in two imperfect subframes, be can use the imperfect subframe and sent significant figure
According to, the service efficiency of unauthorized carrier wave is improved, no matter and the transmission data since on which symbol of imperfect subframe, base
It stands all only with the data for shifting to an earlier date precoding one complete subframe, the complete subframe without traversing all is pre-processed, saved
The process resource of base station.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from this hair to the embodiment of the present invention
The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention
And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.
Claims (69)
1. a kind of base station characterized by comprising
Configuration unit, for being the unauthorized carrier wave of user device configuration;
Determination unit, for determining first imperfect subframe after the unauthorized carrier wave is occupied, and with this first
The splicing subframe of imperfect subframe splicing;
Coding unit, for being encoded to the data in a TTI;
Transmission unit passes through first imperfect subframe of the unauthorized carrier wave and its splicing for the data after encoding
Frame is sent to the user equipment.
2. base station as described in claim 1, which is characterized in that determine that the unauthorized carrier wave is occupied in the determination unit
Afterwards, the transmission unit is also used to:
Secondary carrier, which is sent, by authorization carrier wave or the unauthorized carrier wave occupies notice to the user equipment, to notify the use
Base station described in the equipment of family this occupy the initial time of the unauthorized carrier wave.
3. base station as claimed in claim 1 or 2, which is characterized in that determining the splicing with first imperfect subframe splicing
When subframe, the determination unit is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing;
Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
4. base station as claimed in claim 3, which is characterized in that if the determination unit determines the last of the unauthorized carrier wave
One imperfect subframe is the splicing subframe with first imperfect subframe splicing;Then
The data after coding are passed through into first imperfect subframe of the unauthorized carrier wave and its splicing in the transmission unit
Subframe is sent to before the user equipment, and the determination unit is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave after occupied and this occupancy of the base station
The occupancy Duration Information of unauthorized carrier wave determines the last one imperfect subframe after the unauthorized carrier wave is occupied
Position;
The transmission unit is specifically used for:
By the data after coding are by the symbol of first imperfect subframe of the unauthorized carrier wave and the last one is imperfect
The symbol of subframe is sent to the user equipment.
5. base station as claimed in claim 4, which is characterized in that the occupancy Duration Information is configured and taken by the base station
Band occupies in notice in secondary carrier and is sent to the user equipment;Or
The occupancy Duration Information is pre-configured to be in the base station side and the user equipment side.
6. base station as claimed in claim 4, which is characterized in that the base station further include:
Scheduling unit, for the scheduling information of the data to be placed on to the last one imperfect subframe of the unauthorized carrier wave
Physical downlink control channel PDCCH on;Alternatively, the scheduling information of the data is placed on the last of the unauthorized carrier wave
On the PDCCH of the corresponding subframe for authorizing carrier wave of one imperfect subframe;Alternatively, the scheduling information of the data is placed on institute
State first imperfect subframe of unauthorized carrier wave and the enhancing Physical Downlink Control Channel of the last one imperfect subframe
On EPDCCH;Alternatively, the scheduling information of the data to be placed on to first imperfect subframe and most of the unauthorized carrier wave
On the EPDCCH of the subframe of the corresponding authorization carrier wave of the imperfect subframe of the latter.
7. base station as claimed in claim 3, which is characterized in that if the determination unit determines the second of the unauthorized carrier wave
A subframe is the splicing subframe with first imperfect subframe splicing;Then
The data after coding are passed through into first imperfect subframe of the unauthorized carrier wave and its splicing in the transmission unit
Subframe is sent to before the user equipment, and the determination unit is specifically used for:
According to the symbol lengths M of first imperfect subframe, the splicing symbol lengths N of second subframe is determined;Wherein, this first
The symbol lengths M of a imperfect subframe include filling signal or targeting signal occupy symbol lengths, control symbol length
With the length of data symbol, and the sum of M and N be a complete subframe symbol lengths;
The transmission unit is specifically used for:
Data after coding are passed through into the symbol of first imperfect subframe of the unauthorized carrier wave and the preceding N of second subframe
A symbol is sent to the user equipment.
8. base station as claimed in claim 7, which is characterized in that the base station further include:
Scheduling unit, for the scheduling information of the data to be placed on to first imperfect subframe of the unauthorized carrier wave
On PDCCH;Alternatively, the scheduling information of the data to be placed on to first imperfect subframe and second of the unauthorized carrier wave
On the EPDCCH of the top n symbol of a subframe.
9. base station as claimed in claim 7, which is characterized in that the base station further includes scheduling unit:
The scheduling unit is also used to:
It is scheduled the rear M symbol of second subframe of the unauthorized carrier wave as new imperfect subframe, and
The scheduling information for the data dispatched on the rear M symbol of second subframe is placed on the second of the unauthorized carrier wave
On the PDCCH of a subframe.
10. the base station as described in any one of claim 1-2, which is characterized in that the data after coding are being sent to institute
Before stating user equipment, the transmission unit is also used to:
Filling signal or targeting signal are sent on the unauthorized carrier wave to the user equipment, to keep non-awarding to described
It weighs the occupancy of carrier wave and notifies the position of first imperfect subframe after unauthorized carrier wave described in the user equipment is occupied
It sets.
11. the base station as described in any one of claim 1-2, which is characterized in that determined in the determination unit described non-
After first imperfect subframe after authorizing carrier wave occupied, the transmission unit is also used to:
It sends unauthorized carrier-wave transmission and is indicated to the user equipment, the unauthorized carrier-wave transmission instruction is used to indicate described non-
Authorize the length in the position and first imperfect subframe of first imperfect subframe of carrier wave for the data symbol of splicing.
12. a kind of user equipment characterized by comprising
Receiving unit, the data sent for receiving base station by unauthorized carrier wave;
Determination unit, for determining the unauthorized carrier wave by first imperfect subframe after the occupancy of the base station, Yi Jiyu
The splicing subframe of this first imperfect subframe splicing;
Acquiring unit, for obtaining a transmission in first imperfect subframe of the unauthorized carrier wave and its splicing subframe
Coded data in time interval TTI.
13. user equipment as claimed in claim 12, which is characterized in that in the number that reception base station is sent by unauthorized carrier wave
According to before, the receiving unit is also used to:
Receive filling signal that the base station is sent by the unauthorized carrier wave perhaps the targeting signal filling signal or
Targeting signal is for keeping the base station to the occupancy of the unauthorized carrier wave and notifying unauthorized described in the user equipment
The position of first imperfect subframe after carrier wave is occupied;
In first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station, the determination unit is specific
For:
It is filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling signal or targeting signal
Subframe confirmation is first imperfect subframe after the unauthorized carrier wave is occupied by the base station.
14. user equipment as described in claim 12 or 13, which is characterized in that determined in the determination unit described unauthorized
By before first imperfect subframe after the occupancy of the base station, the receiving unit is also used to carrier wave:
It receives the base station and notice is occupied by the secondary carrier that authorization carrier wave or the unauthorized carrier wave are sent, the secondary carrier accounts for
Being used to indicate the base station with notice, this occupies the initial time of the unauthorized carrier wave.
15. user equipment as described in claim 12 or 13, which is characterized in that determining the unauthorized carrier wave by the base
When first imperfect subframe after occupying of standing, the determination unit is specifically used for:
The unauthorized carrier-wave transmission instruction sent according to the base station, after determining that the unauthorized carrier wave is occupied by the base station
First imperfect subframe.
16. the user equipment as described in any one of claim 12-13, which is characterized in that endless in determination and first
When the splicing subframe of whole subframe splicing, the determination unit is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing;
Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
17. user equipment as claimed in claim 16, which is characterized in that determine the unauthorized carrier wave the last one not
When complete subframe, the determination unit is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave and this described unauthorized load of occupancy of the base station
The occupancy Duration Information of wave determines the position of the last one imperfect subframe after the unauthorized carrier wave is occupied, and
By the subframe confirmation on the position of the last one determining imperfect subframe be the unauthorized carrier wave the last one is imperfect
Subframe.
18. user equipment as claimed in claim 17, which is characterized in that the occupancy Duration Information is matched by the base station
It sets and carries to occupy in notice in secondary carrier and be sent to the user equipment;Or
The occupancy Duration Information is pre-configured to be in the base station side and the user equipment side.
19. the user equipment as described in claim 12-13 any one, which is characterized in that the of the unauthorized carrier wave
When obtaining the coded data in a TTI in one imperfect subframe and its splicing subframe, the acquiring unit is specifically used for:
Determine the symbol lengths of first imperfect subframe and the length of data symbol;
According to the symbol lengths of first imperfect subframe, the length of the data symbol of splicing subframe is calculated;
The coding in a TTI is obtained on the data symbol in the data symbol and splicing subframe in first imperfect subframe
Data.
20. user equipment as claimed in claim 19, which is characterized in that in the symbol for determining first imperfect subframe
When length and the length of data symbol, the acquiring unit is specifically used for:
The detection of signal or targeting signal is filled to the unauthorized carrier wave, according at first of the unauthorized carrier wave
The position that the symbol of filling signal or targeting signal is detected in imperfect subframe calculates the symbol of first imperfect subframe
The symbol lengths that filling signal or targeting signal occupy in length and first imperfect subframe;
The symbol lengths occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and control
The length of symbol calculates the length of the data symbol in first imperfect subframe;
Wherein, the symbol lengths of first imperfect subframe include filling signal or targeting signal occupy symbol lengths,
Control the length of symbol and the length of data symbol.
21. user equipment as claimed in claim 19, which is characterized in that in the symbol for determining first imperfect subframe
When length and the length of data symbol, the acquiring unit is specifically used for:
The unauthorized carrier-wave transmission instruction sent according to the base station, determines first imperfect subframe of the unauthorized carrier wave
Symbol lengths and the data symbol in first imperfect subframe length.
22. user equipment as claimed in claim 16, which is characterized in that the determination unit determines the unauthorized carrier wave
The last one imperfect subframe is the splicing subframe with first imperfect subframe splicing;Then
The user equipment further include:
Decoding unit, in first imperfect subframe of the unauthorized carrier wave and its splicing subframe in the acquiring unit
After the upper coded data obtained in a TTI, the physics based on the last one imperfect subframe from the unauthorized carrier wave
The scheduling information obtained on down control channel PDCCH is decoded the coded data of acquisition;Alternatively, being based on from described non-
The scheduling information obtained on the PDCCH of the subframe of the corresponding authorization carrier wave of the last one imperfect subframe of carrier wave is authorized, to obtaining
The coded data taken is decoded;Alternatively, based on from the unauthorized carrier wave first imperfect subframe and the last one not
Scheduling information is extracted on the enhancing Physical Downlink Control Channel EPDCCH of complete subframe, the data in spliced subframe are carried out
Decoding;Alternatively, based on first imperfect subframe from the unauthorized carrier wave, imperfect subframe is corresponding awards with the last one
The scheduling information obtained on the EPDCCH of the subframe of carrier wave is weighed, the coded data of acquisition is decoded.
23. user equipment as claimed in claim 16, which is characterized in that the determination unit determines the unauthorized carrier wave
Second subframe is the splicing subframe with first imperfect subframe splicing;Then
The user equipment further include:
Decoding unit, in first imperfect subframe of the unauthorized carrier wave and its splicing subframe in the acquiring unit
After the upper coded data obtained in a TTI, based on from the PDCCH of first imperfect subframe of the unauthorized carrier wave
The scheduling information of acquisition is decoded the coded data of acquisition;Alternatively, based on endless from first of the unauthorized carrier wave
The scheduling information obtained on the EPDCCH of whole subframe and second subframe, is decoded the coded data of acquisition.
24. a kind of base station characterized by comprising
Processor, for being the unauthorized carrier wave of user device configuration;Determine first after the unauthorized carrier wave is occupied not
Complete subframe, and the splicing subframe with this first imperfect subframe splicing;To the data in a Transmission Time Interval TTI
It is encoded;
Transceiver passes through first imperfect subframe of the unauthorized carrier wave and its splicing subframe for the data after encoding
It is sent to the user equipment.
25. base station as claimed in claim 24, which is characterized in that determine that the unauthorized carrier wave is occupied in the processor
Afterwards, the transceiver is also used to:
Secondary carrier, which is sent, by authorization carrier wave or the unauthorized carrier wave occupies notice to the user equipment, to notify the use
Base station described in the equipment of family this occupy the initial time of the unauthorized carrier wave.
26. the base station as described in claim 24 or 25, which is characterized in that determining the spelling with first imperfect subframe splicing
When connecing subframe, the processor is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing;
Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
27. base station as claimed in claim 26, which is characterized in that if the processor determines the last of the unauthorized carrier wave
One imperfect subframe is the splicing subframe with first imperfect subframe splicing;Then
The data after coding are passed through into first imperfect subframe of the unauthorized carrier wave and its splicing in the transceiver
Frame is sent to before the user equipment, and the processor is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave after occupied and this occupancy of the base station
The occupancy Duration Information of unauthorized carrier wave determines the last one imperfect subframe after the unauthorized carrier wave is occupied
Position;
The transceiver is specifically used for:
By the data after coding are by the symbol of first imperfect subframe of the unauthorized carrier wave and the last one is imperfect
The symbol of subframe is sent to the user equipment.
28. base station as claimed in claim 27, which is characterized in that the occupancy Duration Information is configured simultaneously by the base station
It carries to occupy in notice in secondary carrier and is sent to the user equipment;Or
The occupancy Duration Information is pre-configured to be in the base station side and the user equipment side.
29. base station as claimed in claim 27, which is characterized in that the processor is also used to:
The scheduling information of the data is placed on to the physical down control of the last one imperfect subframe of the unauthorized carrier wave
On channel PDCCH processed;Alternatively, the scheduling information of the data to be placed on to the last one imperfect son of the unauthorized carrier wave
On the PDCCH of the subframe of the corresponding authorization carrier wave of frame;Alternatively, the scheduling information of the data is placed on the unauthorized carrier wave
First imperfect subframe and the last one imperfect subframe enhancing Physical Downlink Control Channel EPDCCH on;Alternatively, will
The scheduling information of the data is placed on the first imperfect subframe and the last one imperfect subframe of the unauthorized carrier wave
On the EPDCCH of the subframe of corresponding authorization carrier wave.
30. base station as claimed in claim 26, which is characterized in that if the processor determines the second of the unauthorized carrier wave
A subframe is the splicing subframe with first imperfect subframe splicing;Then
The data after coding are passed through into first imperfect subframe of the unauthorized carrier wave and its splicing in the transceiver
Frame is sent to before the user equipment, and the processor is specifically used for:
According to the symbol lengths M of first imperfect subframe, the splicing symbol lengths N of second subframe is determined;Wherein, this first
The symbol lengths M of a imperfect subframe include filling signal or targeting signal occupy symbol lengths, control symbol length
With the length of data symbol, and the sum of M and N be a complete subframe symbol lengths;
The transceiver is specifically used for:
Data after coding are passed through into the symbol of first imperfect subframe of the unauthorized carrier wave and the preceding N of second subframe
A symbol is sent to the user equipment.
31. base station as claimed in claim 30, which is characterized in that the processor is also used to:
The scheduling information of the data is placed on the PDCCH of first imperfect subframe of the unauthorized carrier wave;Alternatively,
The scheduling information of the data is placed on to the top n of first imperfect subframe and second subframe of the unauthorized carrier wave
On the EPDCCH of symbol.
32. base station as claimed in claim 30, which is characterized in that the processor is also used to:
It is scheduled the rear M symbol of second subframe of the unauthorized carrier wave as new imperfect subframe, and
The scheduling information for the data dispatched on the rear M symbol of second subframe is placed on the second of the unauthorized carrier wave
On the PDCCH of a subframe.
33. the base station as described in any one of claim 24-25, which is characterized in that be sent to by the data after coding
Before the user equipment, the transceiver is also used to:
Filling signal or targeting signal are sent on the unauthorized carrier wave to the user equipment, to keep non-awarding to described
It weighs the occupancy of carrier wave and notifies the position of first imperfect subframe after unauthorized carrier wave described in the user equipment is occupied
It sets.
34. the base station as described in any one of claim 24-25, which is characterized in that determined in the processor described non-
After first imperfect subframe after authorizing carrier wave occupied, the transceiver is also used to:
It sends unauthorized carrier-wave transmission and is indicated to the user equipment, the unauthorized carrier-wave transmission instruction is used to indicate described non-
Authorize the length in the position and first imperfect subframe of first imperfect subframe of carrier wave for the data symbol of splicing.
35. a kind of user equipment characterized by comprising
Transceiver, the data sent for receiving base station by unauthorized carrier wave;
Processor, for determine the unauthorized carrier wave by the base station occupy after first imperfect subframe, and with this
The splicing subframe of first imperfect subframe splicing;
The transceiver is also used to, and obtains one in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
Coded data in Transmission Time Interval TTI.
36. user equipment as claimed in claim 35, which is characterized in that in the number that reception base station is sent by unauthorized carrier wave
According to before, the transceiver is also used to:
Receive filling signal that the base station is sent by the unauthorized carrier wave perhaps the targeting signal filling signal or
Targeting signal is for keeping the base station to the occupancy of the unauthorized carrier wave and notifying unauthorized described in the user equipment
The position of first imperfect subframe after carrier wave is occupied;
In first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station, the processing implement body is used
In:
It is filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling signal or targeting signal
Subframe confirmation is first imperfect subframe after the unauthorized carrier wave is occupied by the base station.
37. the user equipment as described in claim 35 or 36, which is characterized in that determine the unauthorized load in the processor
By before first imperfect subframe after the occupancy of the base station, the transceiver is also used to wave:
It receives the base station and notice is occupied by the secondary carrier that authorization carrier wave or the unauthorized carrier wave are sent, the secondary carrier accounts for
Being used to indicate the base station with notice, this occupies the initial time of the unauthorized carrier wave.
38. the user equipment as described in claim 35 or 36, which is characterized in that determining the unauthorized carrier wave by the base
When first imperfect subframe after occupying of standing, the processor is specifically used for:
The unauthorized carrier-wave transmission instruction sent according to the base station, after determining that the unauthorized carrier wave is occupied by the base station
First imperfect subframe.
39. the user equipment as described in any one of claim 35-36, which is characterized in that endless in determination and first
When the splicing subframe of whole subframe splicing, the processor is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing;
Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
40. user equipment as claimed in claim 39, which is characterized in that determine the unauthorized carrier wave the last one not
When complete subframe, the processor is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave and this described unauthorized load of occupancy of the base station
The occupancy Duration Information of wave determines the position of the last one imperfect subframe after the unauthorized carrier wave is occupied, and
By the subframe confirmation on the position of the last one determining imperfect subframe be the unauthorized carrier wave the last one is imperfect
Subframe.
41. user equipment as claimed in claim 40, which is characterized in that the occupancy Duration Information is matched by the base station
It sets and carries to occupy in notice in secondary carrier and be sent to the user equipment;Or
The occupancy Duration Information is pre-configured to be in the base station side and the user equipment side.
42. the user equipment as described in claim 35-36 any one, which is characterized in that the of the unauthorized carrier wave
When obtaining the coded data in a TTI in one imperfect subframe and its splicing subframe, the processor is specifically used for:
Determine the symbol lengths of first imperfect subframe and the length of data symbol;
According to the symbol lengths of first imperfect subframe, the length of the data symbol of splicing subframe is calculated;
The coding in a TTI is obtained on the data symbol in the data symbol and splicing subframe in first imperfect subframe
Data.
43. user equipment as claimed in claim 42, which is characterized in that in the symbol for determining first imperfect subframe
When length and the length of data symbol, the processor is specifically used for:
The detection of signal or targeting signal is filled to the unauthorized carrier wave, according at first of the unauthorized carrier wave
The position that the symbol of filling signal or targeting signal is detected in imperfect subframe calculates the symbol of first imperfect subframe
The symbol lengths that filling signal or targeting signal occupy in length and first imperfect subframe;
The symbol lengths occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and control
The length of symbol calculates the length of the data symbol in first imperfect subframe;
Wherein, the symbol lengths of first imperfect subframe include filling signal or targeting signal occupy symbol lengths,
Control the length of symbol and the length of data symbol.
44. user equipment as claimed in claim 42, which is characterized in that in the symbol for determining first imperfect subframe
When length and the length of data symbol, the processor is specifically used for:
The unauthorized carrier-wave transmission instruction sent according to the base station, determines first imperfect subframe of the unauthorized carrier wave
Symbol lengths and the data symbol in first imperfect subframe length.
45. user equipment as claimed in claim 39, which is characterized in that the processor determines the unauthorized carrier wave most
The imperfect subframe of the latter is the splicing subframe with first imperfect subframe splicing;Then at first of the unauthorized carrier wave
After obtaining the coded data in a TTI in imperfect subframe and its splicing subframe, the processor is also used to:
Based on the tune obtained from the physical downlink control channel PDCCH of the last one imperfect subframe of the unauthorized carrier wave
Information is spent, the coded data of acquisition is decoded;Alternatively, based on the last one imperfect subframe from the unauthorized carrier wave
The scheduling information obtained on the PDCCH of the subframe of corresponding authorization carrier wave, is decoded the coded data of acquisition;Alternatively, base
Letter is controlled in the enhancing physical down of first imperfect subframe and the last one imperfect subframe from the unauthorized carrier wave
Scheduling information is extracted on road EPDCCH, the data in spliced subframe are decoded;Alternatively, being based on from the unauthorized load
It is obtained on the EPDCCH of first imperfect subframe of wave subframe for authorizing carrier wave corresponding with the last one imperfect subframe
Scheduling information is decoded the coded data of acquisition.
46. user equipment as claimed in claim 39, which is characterized in that the processor determines the of the unauthorized carrier wave
Two subframes are the splicing subframe with first imperfect subframe splicing;Then
The unauthorized carrier wave first imperfect subframe and its splicing subframe on obtain a TTI in coded data it
Afterwards, the processor is also used to:
Based on the scheduling information obtained from the PDCCH of first imperfect subframe of the unauthorized carrier wave, to the volume of acquisition
Code data are decoded;Alternatively, based on first imperfect subframe and second subframe from the unauthorized carrier wave
The scheduling information obtained on EPDCCH is decoded the coded data of acquisition.
47. a kind of sending method of subframe characterized by comprising
Base station is the unauthorized carrier wave of user device configuration;
The base station determines first imperfect subframe after the unauthorized carrier wave is occupied, and with this first it is imperfect
The splicing subframe of subframe splicing;
The base station encodes the data in a Transmission Time Interval TTI;
Data after coding are passed through first imperfect subframe of the unauthorized carrier wave and its splicing subframe hair by the base station
Give the user equipment.
48. method as claimed in claim 47, which is characterized in that after the base station determines that the unauthorized carrier wave is occupied,
Further include:
The base station sends secondary carrier by authorization carrier wave or the unauthorized carrier wave and occupies notice to the user equipment, with logical
Knowing base station described in the user equipment, this occupies the initial time of the unauthorized carrier wave.
49. the method as described in claim 47 or 48, which is characterized in that the base station is determined spells with first imperfect subframe
The splicing subframe connect, comprising:
The base station determines that the last one imperfect subframe of the unauthorized carrier wave is and first imperfect subframe splicing
Splice subframe;Or
The base station determines that second subframe of the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
50. method as claimed in claim 49, which is characterized in that if the base station determines last of the unauthorized carrier wave
A imperfect subframe is the splicing subframe with first imperfect subframe splicing;Then
Data after coding are passed through first imperfect subframe of the unauthorized carrier wave and its splicing subframe hair by the base station
Give the user equipment, comprising:
The position and the base station of first imperfect subframe of the base station according to the unauthorized carrier wave after occupied this
The occupancy Duration Information for occupying the unauthorized carrier wave, determine after the unauthorized carrier wave is occupied the last one is endless
The position of whole subframe;
The base station by the data after coding by the symbol of first imperfect subframe of the unauthorized carrier wave and last
The symbol of a imperfect subframe is sent to the user equipment.
51. method as claimed in claim 50, which is characterized in that the occupancy Duration Information is configured simultaneously by the base station
It carries to occupy in notice in secondary carrier and is sent to the user equipment;Or
The occupancy Duration Information is pre-configured to be in the base station side and the user equipment side.
52. method as claimed in claim 50, which is characterized in that the method also includes:
The scheduling information of the data is placed on the object of the last one imperfect subframe of the unauthorized carrier wave by the base station
It manages on down control channel PDCCH;Or
The last one imperfect subframe that the scheduling information of the data is placed on the unauthorized carrier wave by the base station is corresponding
Authorization carrier wave subframe PDCCH on;Or
The scheduling information of the data is placed on first imperfect subframe of the unauthorized carrier wave and last by the base station
On the enhancing Physical Downlink Control Channel EPDCCH of one imperfect subframe;Or
The scheduling information of the data is placed on first imperfect subframe of the unauthorized carrier wave and last by the base station
On the EPDCCH of the corresponding subframe for authorizing carrier wave of one imperfect subframe.
53. method as claimed in claim 49, which is characterized in that if the base station determines second of the unauthorized carrier wave
Subframe is the splicing subframe with the imperfect frame splicing of first son;Then
Data after coding are passed through first imperfect subframe of the unauthorized carrier wave and its splicing subframe hair by the base station
Give the user equipment, comprising:
The base station determines the splicing symbol lengths N of second subframe according to the symbol lengths M of first imperfect subframe;Its
In, the symbol lengths M of first imperfect subframe includes symbol lengths, the command character that filling signal or targeting signal occupy
Number length and data symbol length, and the sum of M and N be a complete subframe symbol lengths;
Data after coding are passed through the symbol of first imperfect subframe of the unauthorized carrier wave and second by the base station
The top n symbol of subframe is sent to the user equipment.
54. method as claimed in claim 53, which is characterized in that the method also includes:
The scheduling information of the data is placed on the PDCCH of first imperfect subframe of the unauthorized carrier wave by the base station
On;Or
The scheduling information of the data is placed on first imperfect subframe and second of the unauthorized carrier wave by the base station
On the EPDCCH of the top n symbol of a subframe.
55. method as claimed in claim 53, which is characterized in that the method also includes:
It is adjusted the rear M symbol of second subframe of the unauthorized carrier wave as new imperfect subframe the base station
Degree, and
The scheduling information for the data dispatched on the rear M symbol of second subframe is placed on the second of the unauthorized carrier wave
On the PDCCH of a subframe.
56. the method as described in any one of claim 47-48, which is characterized in that the base station is by the data after coding
It is sent to before the user equipment, further includes:
The base station sends filling signal or targeting signal to the user equipment, with holding pair on the unauthorized carrier wave
The occupancy of the unauthorized carrier wave and notify first after unauthorized carrier wave described in the user equipment is occupied it is imperfect
The position of subframe.
57. the method as described in any one of claim 47-48, which is characterized in that the base station determines described unauthorized
After first imperfect subframe after carrier wave is occupied, further includes:
The base station sends unauthorized carrier-wave transmission and is indicated to the user equipment, and the unauthorized carrier-wave transmission instruction is for referring to
Show the data symbols in the position and first imperfect subframe of first imperfect subframe of the unauthorized carrier wave for splicing
Number length.
58. a kind of method of reseptance of subframe characterized by comprising
User equipment receives the data that base station is sent by unauthorized carrier wave;
The user equipment determine the unauthorized carrier wave by the base station occupy after first imperfect subframe, and with this
The splicing subframe of first imperfect subframe splicing;
The user equipment obtains a transmission in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
Coded data in time interval TTI.
59. method as claimed in claim 58, which is characterized in that user equipment receives what base station was sent by unauthorized carrier wave
Before data, further includes:
The user equipment receives the filling signal or targeting signal that the base station is sent by the unauthorized carrier wave, described
Filling signal or targeting signal are for keeping the base station to the occupancy of the unauthorized carrier wave and the user being notified to set
The position of first imperfect subframe after the standby unauthorized carrier wave is occupied;
The user equipment determines the unauthorized carrier wave by first imperfect subframe after the occupancy of the base station, comprising:
The user equipment is filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling signal
Or the subframe confirmation of targeting signal is first imperfect subframe after the unauthorized carrier wave is occupied by the base station.
60. the method as described in claim 58 or 59, which is characterized in that the user equipment determines the unauthorized carrier wave quilt
Before first imperfect subframe after the base station occupancy, further includes:
The user equipment receives the base station and occupies notice by the secondary carrier that authorization carrier wave or the unauthorized carrier wave are sent,
The secondary carrier occupancy notice is used to indicate the base station, and this occupies the initial time of the unauthorized carrier wave.
61. the method as described in claim 58 or 59, which is characterized in that the user equipment determines the unauthorized carrier wave quilt
First imperfect subframe after the base station occupancy, comprising:
The user equipment is indicated according to the unauthorized carrier-wave transmission that the base station is sent, and determines that the unauthorized carrier wave is described
First imperfect subframe after the occupancy of base station.
62. the method as described in any one of claim 58-59, which is characterized in that the user equipment determines and first
The splicing subframe of a imperfect subframe splicing, comprising:
The user equipment determines that the last one imperfect subframe of the unauthorized carrier wave is to spell with first imperfect subframe
The splicing subframe connect;Or
The user equipment determines that second subframe of the unauthorized carrier wave is the splicing with first imperfect subframe splicing
Subframe.
63. method as claimed in claim 62, which is characterized in that the user equipment determines the last of the unauthorized carrier wave
One imperfect subframe, comprising:
The user equipment is according to the position of first imperfect subframe of the unauthorized carrier wave and this occupancy of the base station
The occupancy Duration Information of the unauthorized carrier wave determines the last one imperfect son after the unauthorized carrier wave is occupied
The position of frame, and be the last of the unauthorized carrier wave by the subframe confirmation on the position of the last one determining imperfect subframe
One imperfect subframe.
64. the method as described in claim 63, which is characterized in that the occupancy Duration Information is configured simultaneously by the base station
It carries to occupy in notice in secondary carrier and is sent to the user equipment;Or
The occupancy Duration Information is pre-configured to be in the base station side and the user equipment side.
65. the method as described in claim 58-59 any one, which is characterized in that the user equipment is described unauthorized
The coded data in a Transmission Time Interval TTI is obtained in the first imperfect subframe and its splicing subframe of carrier wave, comprising:
The user equipment determines the symbol lengths of first imperfect subframe and the length of data symbol;
The user equipment calculates the length of the data symbol of splicing subframe according to the symbol lengths of first imperfect subframe;
The user equipment obtains one on the data symbol in the data symbol and splicing subframe in first imperfect subframe
Coded data in a TTI.
66. the method as described in claim 65, which is characterized in that the user equipment determines first imperfect subframe
Symbol lengths and data symbol length, comprising:
The user equipment is filled the detection of signal or targeting signal to the unauthorized carrier wave, according to described unauthorized
The position that the symbol of filling signal or targeting signal is detected in first imperfect subframe of carrier wave, calculate this first it is endless
The symbol lengths that filling signal or targeting signal occupy in the symbol lengths of whole subframe and first imperfect subframe, and
The symbol lengths occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and control
The length of symbol calculates the length of the data symbol in first imperfect subframe;
Wherein, the symbol lengths of first imperfect subframe include filling signal or targeting signal occupy symbol lengths,
Control the length of symbol and the length of data symbol.
67. the method as described in claim 65, which is characterized in that the user equipment determines first imperfect subframe
Symbol lengths and data symbol length, comprising:
The user equipment is indicated according to the unauthorized carrier-wave transmission that the base station is sent, and determines the first of the unauthorized carrier wave
The length of the symbol lengths of a imperfect subframe and the data symbol in first imperfect subframe.
68. method as claimed in claim 62, which is characterized in that the user equipment determines the last of the unauthorized carrier wave
One imperfect subframe is the splicing subframe with first imperfect subframe splicing;Then
The user equipment obtains a transmission in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
After coded data in time interval TTI, further includes:
Physical Downlink Control Channel of the user equipment based on the last one imperfect subframe from the unauthorized carrier wave
The scheduling information obtained on PDCCH is decoded the coded data of acquisition;Or
The user equipment is based on the corresponding subframe for authorizing carrier wave of the last one imperfect subframe from the unauthorized carrier wave
PDCCH on the scheduling information that obtains, the coded data of acquisition is decoded;Or
The user equipment is based on the first imperfect subframe and the last one imperfect subframe from the unauthorized carrier wave
Scheduling information is extracted on enhancing Physical Downlink Control Channel EPDCCH, the data in spliced subframe are decoded;Or
The user equipment is based on the first imperfect subframe and the last one imperfect subframe pair from the unauthorized carrier wave
The scheduling information obtained on the EPDCCH of the subframe for the authorization carrier wave answered, is decoded the coded data of acquisition.
69. method as claimed in claim 62, which is characterized in that the user equipment determines the second of the unauthorized carrier wave
A subframe is the splicing subframe with first imperfect subframe splicing;Then
The user equipment obtains a transmission in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave
After coded data in time interval TTI, further includes:
The user equipment is based on the scheduling letter obtained from the PDCCH of first imperfect subframe of the unauthorized carrier wave
Breath, is decoded the coded data of acquisition;Or
The user equipment is based on from the EPDCCH of first imperfect subframe of the unauthorized carrier wave and second subframe
The scheduling information of acquisition is decoded the coded data of acquisition.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2015/072062 WO2016119266A1 (en) | 2015-01-31 | 2015-01-31 | Subframe sending and receiving methods, base station, and user equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106031273A CN106031273A (en) | 2016-10-12 |
CN106031273B true CN106031273B (en) | 2019-08-27 |
Family
ID=56542259
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580002051.0A Active CN106031273B (en) | 2015-01-31 | 2015-01-31 | A kind of method of sending and receiving of subframe, base station and user equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106031273B (en) |
WO (1) | WO2016119266A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11070407B2 (en) * | 2017-03-24 | 2021-07-20 | Apple Inc. | Partial uplink subframe transmissions on unlicensed carriers |
CN108809566A (en) * | 2017-05-04 | 2018-11-13 | 株式会社Ntt都科摩 | The transmission of imperfect subframe and demodulation method, corresponding user equipment and base station |
CN109906573B (en) * | 2019-02-01 | 2021-11-02 | 北京小米移动软件有限公司 | Transmission format determining method, device, base station, terminal and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102421131A (en) * | 2011-07-26 | 2012-04-18 | 展讯通信(上海)有限公司 | Mobile terminal, method and device for detecting FCCH (Frequency Correction Channel) frame |
CN104301273A (en) * | 2014-08-25 | 2015-01-21 | 中兴通讯股份有限公司 | Method and base station for transmitting and receiving signals by using unauthorized carrier waves and user equipment |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102137500B (en) * | 2010-01-26 | 2013-10-02 | 华为技术有限公司 | Method, base station and system for data transmission |
WO2012141462A2 (en) * | 2011-04-11 | 2012-10-18 | 엘지전자 주식회사 | Method and device for transmitting reception acknowledgement information in a mobile communication system |
US8923197B2 (en) * | 2011-06-01 | 2014-12-30 | Samsung Electronics Co., Ltd. | Methods and apparatus to transmit and receive synchronization signal and system information in a wireless communication system |
US9854446B2 (en) * | 2011-07-07 | 2017-12-26 | Lg Electronics Inc. | Method and apparatus for transmitting a signal in a wireless communication system |
CN103024770A (en) * | 2011-09-21 | 2013-04-03 | 意法-爱立信有限公司 | Dual-mode terminal and measuring method thereof |
-
2015
- 2015-01-31 CN CN201580002051.0A patent/CN106031273B/en active Active
- 2015-01-31 WO PCT/CN2015/072062 patent/WO2016119266A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102421131A (en) * | 2011-07-26 | 2012-04-18 | 展讯通信(上海)有限公司 | Mobile terminal, method and device for detecting FCCH (Frequency Correction Channel) frame |
CN104301273A (en) * | 2014-08-25 | 2015-01-21 | 中兴通讯股份有限公司 | Method and base station for transmitting and receiving signals by using unauthorized carrier waves and user equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2016119266A1 (en) | 2016-08-04 |
CN106031273A (en) | 2016-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103392369B (en) | Communication means and device for carrier aggregation system | |
CN105634666B (en) | A kind of data transmission method and device in unauthorized frequency range | |
CN105515747B (en) | Distribution method of time frequency resources, device and the base station of resource request instruction information | |
CN108029119A (en) | Method and related wireless terminal and the network node that the UL of configuration of territory when including is authorized are provided | |
CN102932950B (en) | A kind of method and apparatus of Stochastic accessing in secondary cell | |
CN105515741A (en) | Data transmission method in unlicensed frequency band and data transmission device | |
CN105874862B (en) | A kind of method and apparatus that data are sent | |
CN105264997B (en) | A kind of method, equipment and the system of data transmission | |
CN106060933A (en) | Base station, user equipment, transmission control method for the base station and data transmission method for the user equipment | |
CN106031273B (en) | A kind of method of sending and receiving of subframe, base station and user equipment | |
CN103167594A (en) | Uplink transmitting power control method and user equipment | |
CN101835261B (en) | Carrier aggregation system as well as channel transmission method, user equipment and base station therein | |
CN109005596A (en) | A kind of method and apparatus of Competition adjustment window length | |
CN108605366A (en) | Use the synchronization between the sending node of shared radio frequency frequency spectrum | |
CN105453470B (en) | For transmitting the user apparatus and method of data | |
CN103906242B (en) | A kind of wireless communications method, system and base station and user equipment | |
CN104717757B (en) | A kind of data communications method, system and device | |
CN105453469B (en) | Communication system, infrastructure equipment and method | |
CN110535608A (en) | Uplink transmission resource determines methods, devices and systems | |
CN107295676A (en) | Data transmission method and device | |
CN108023706A (en) | Response message feedback method, base station and user equipment without authorized transmissions | |
CN106341891A (en) | Data transmission method, client device and server device | |
CN109413745A (en) | Uplink data transmission method in a kind of ofdm system | |
CN107846707A (en) | A kind of method and apparatus in the UE for exempting to authorize, base station | |
CN105828448A (en) | Channel occupation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |