CN106031273B - A kind of method of sending and receiving of subframe, base station and user equipment - Google Patents

A kind of method of sending and receiving of subframe, base station and user equipment Download PDF

Info

Publication number
CN106031273B
CN106031273B CN201580002051.0A CN201580002051A CN106031273B CN 106031273 B CN106031273 B CN 106031273B CN 201580002051 A CN201580002051 A CN 201580002051A CN 106031273 B CN106031273 B CN 106031273B
Authority
CN
China
Prior art keywords
subframe
carrier wave
imperfect
unauthorized carrier
base station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201580002051.0A
Other languages
Chinese (zh)
Other versions
CN106031273A (en
Inventor
李秉肇
权威
胡振兴
张戬
苗金华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN106031273A publication Critical patent/CN106031273A/en
Application granted granted Critical
Publication of CN106031273B publication Critical patent/CN106031273B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation

Abstract

The present invention provides a kind of method of sending and receiving of subframe, base station and UE, a complete subframe is spliced by the way that base station to be occupied to imperfect subframe between the initial time after unauthorized carrier wave and the initial position of next subframe and other subframes, it can use the imperfect subframe and send valid data, improve the service efficiency of unauthorized carrier wave, no matter and sending data since on which symbol, base station is all only with the data for shifting to an earlier date precoding one complete subframe, complete subframe without traversing all is pre-processed, and the process resource of base station is saved.Wherein, the sending method of subframe are as follows: base station is that UE configures unauthorized carrier wave and determines first imperfect subframe after the unauthorized carrier wave is occupied, and the splicing subframe with this first imperfect subframe splicing;Data in one TTI are encoded;Data after coding are sent to the UE by first imperfect subframe of the unauthorized carrier wave and its splicing subframe.

Description

A kind of method of sending and receiving of subframe, base station and user equipment
Technical field
The present invention relates to fields of communication technology more particularly to a kind of method of sending and receiving of subframe, base station and user to set It is standby.
Background technique
Unlicensed spectrum (English: Unlicensed Spectrum) refers to common frequency spectrum, and any organization or individual is It can be used.But (English: Listen Before Talk, abbreviation: LBT) is sent out afterwards using needing to follow when unlicensed spectrum first to listen Mechanism, i.e. communication equipment first listen to whether have other communication equipments sending data on channel before sending frame, if Channel idle, the communication equipment can transmit data;Otherwise, which wouldn't send data, but when avoiding one section Between after attempt again.Usual LBT needs to follow clear channel assessment (CCA) (English: Clear Channel Assessment, abbreviation CCA) principle and extension clear channel assessment (CCA) (English: Extended CCA, abbreviation: ECCA) principle, so-called CCA principle is communication Equipment needs the time span of at least one CCA observing time window of monitor channel, wherein when CCA observing time window is scheduled Between length, such as 20 microseconds (unit: us), if communication equipment does not listen to carrier wave in this CCA observing time window Signal, then it is assumed that this channel can be used for idle channel.If communication equipment listens in this CCA observing time window Carrier signal, then it is assumed that this channel is occupied, to be transferred to the ECCA stage.An integer can be generated in ECCA phase communication equipment Then random number R needs that the channel could be used in a channel idle point after continuously listening to R CCA observing time window.
Base station can dispose LTE carrier wave in unlicensed spectrum, but because after the competition to unlicensed spectrum resource of base station only A period of time (such as: 10 milliseconds) can be used, just cannot make after other communication equipment occupies the unlicensed spectrum resource With, therefore unlicensed spectrum can not stand alone as user equipment (English: User Equipment, abbreviation: UE) service, it can only conduct One secondary carrier provides data transport service for UE, and UE needs in addition to be anchored on an authorization frequency spectrum.
In long term evolution (English: Long Term Evolution, abbreviation: LTE) system, multi-transceiver technology such as Fig. 1 institute Show, timing relationship having the same between multiple member carriers, i.e., the frame boundaries and subframe number of major-minor carrier wave are all the same;It is major-minor The uplink feedback information of the downlink data of carrier wave is sent from one of carrier wave uplink, for example, main carrier is in son in Fig. 1 The affirmative acknowledgement (English: Acknowledge, abbreviation: ACK) sent on frame 5 is to the data sent in major-minor carrier wave subframe 1 Response;The data of one carrier wave can be by the Physical Downlink Control Channel (English: Physical Downlink of other carrier waves Control Channel, referred to as: PDCCH) dispatch, i.e., cross-carrier scheduling can also be dispatched, example by the PDCCH of the carrier wave itself Such as, in Fig. 1, carry out the data in cross-carrier scheduling secondary carrier subframe 0 using the PDCCH in main carrier subframe 0, but need to pay attention to , while one of scheduling mode can only be selected.
Frame structure in LTE system as shown in Fig. 2, a frame includes 10 subframes, each subframe include at least PDCCH and Physical Downlink Shared Channel (English: Physical Downlink Shared Channel, referred to as: PDSCH) symbol, optionally There may also be enhancing Physical Downlink Control Channel (English: Enhanced Physical Downlink Control Channel, referred to as: EPDCCH).Usual PDCCH occupy in the time domain each subframe preceding n orthogonal frequency division multiplexing (it is English: Orthogonal Frequency Division Multiplexing, referred to as: OFDM) symbol, and n≤3, PDSCH only take up OFDM symbol after OFDM symbol where control channel and reference signal, if being configured with EPDCCH, EPDCCH can be with In the part frequency domain resource of the region PDSCH.
As shown in figure 3, after base station confirms that unauthorized secondary carrier is idle by ECC A (or CCA), this is begun to use non-to award Power secondary carrier carries out data transmission.But base station occupies the initial time after unauthorized carrier wave and sub-frame boundary is possible without It is overlapped, for example, in Fig. 3, base station occupies the initial time after unauthorized carrier wave to the time between the initial position of subframe 0 just It is an incomplete subframe.And CCA the or ECCA stage before base station occupies unauthorized carrier wave is likely to occupy a subframe In PDCCH where preceding n OFDM symbol, cause to lack PDCCH and the data of the subframe can not be scheduled, thus nothing Method carries out data transmission.
Iing is proposed in the prior art can be in the initial time after base station occupies unauthorized carrier wave to the starting of next subframe Leading (English: Preamble) is sent in imperfect subframe between position, to keep base station to the unauthorized secondary carrier institute In the occupancy of channel resource.But since leading transmission phase can not send the scheduling data for UE, will lead to from this In the secondary time for occupying unauthorized carrier wave, there is the resource of an imperfect subframe not to be available, to cause the wave of channel resource Take.
In order to overcome the above technical defects, a kind of side that unauthorized secondary carrier data are sent is proposed in the prior art Method, it is believed that can be in the initial time after base station occupies unauthorized carrier wave to imperfect between the initial position of next subframe The scheduling data for being directed to UE are sent in subframe, and scheduling information corresponding to the scheduling data sent in the imperfect subframe is then It is sent in next subframe.For example, as shown in figure 4, non-using the next cross-carrier scheduling of the PDCCH in the subframe 3 of authorization main carrier Authorize the data in the subframe 2 of secondary carrier.But the data that N subframe is sent in existing LTE system are generally required in N-1 Subframe carries out coded treatment.It, can not be in the previous of first subframe since the first subframe in this method is imperfect subframe Subframe knows the number for the data symbol that first subframe can be used, this brings challenge to pre-coded data.In order to mention It is preceding to may be that data transmitted by imperfect subframe encode, base station needs to know in advance that each subframe occupies data symbol The case where, it may need unnecessarily to traverse all complete subframes so as to cause base station and be pre-processed, greatly be consumed The process resource of base station.
Summary of the invention
The embodiment of the invention provides a kind of method of sending and receiving of subframe, base station and UE, to solve the prior art Middle base station occupies in the initial time after unauthorized carrier wave to the imperfect subframe between the initial position of next subframe and sends Aiming at the problem that scheduling data of UE can waste the process resource of base station.
In a first aspect, the embodiment of the invention provides a kind of base stations, comprising:
Configuration unit, for configuring unauthorized carrier wave for UE;
Determination unit, for determining first imperfect subframe after the unauthorized carrier wave is occupied, and with this The splicing subframe of one imperfect subframe splicing;
Coding unit, for being encoded to the data in a TTI;
Transmission unit passes through first imperfect subframe of the unauthorized carrier wave and its spelling for the data after encoding It connects subframe and is sent to the UE.
With reference to first aspect, in the first possible implementation of the first aspect, institute is determined in the determination unit State unauthorized carrier wave it is occupied after, the transmission unit is also used to:
Secondary carrier, which is sent, by authorization carrier wave or the unauthorized carrier wave occupies notice to the UE, to notify the UE institute Stating base station, this occupies the initial time of the unauthorized carrier wave.
With reference to first aspect or the first possible implementation of first aspect, second in first aspect are possible In implementation, when determining the splicing subframe with first imperfect subframe splicing, the determination unit is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing with first imperfect subframe splicing Subframe;Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
The possible implementation of second with reference to first aspect, in the third possible implementation of first aspect In, if the determination unit determines that the last one imperfect subframe of the unauthorized carrier wave is to spell with first imperfect subframe The splicing subframe connect;Then
In the transmission unit by the data after coding by first imperfect subframe of the unauthorized carrier wave and its Splicing subframe is sent to before the UE, and the determination unit is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave after occupied and this occupancy of the base station The occupancy Duration Information of the unauthorized carrier wave determines the last one imperfect son after the unauthorized carrier wave is occupied The position of frame;
The transmission unit is specifically used for:
By the data after coding by the symbol of first imperfect subframe of the unauthorized carrier wave and the last one not The symbol of complete subframe is sent to the UE.
The third possible implementation with reference to first aspect, in the 4th kind of possible implementation of first aspect In, the occupancy Duration Information, which is configured by the base station and carries to occupy in notice in secondary carrier, is sent to the UE;Or Person
The occupancy Duration Information is pre-configured to be in the base station side and the side UE.
The third possible implementation with reference to first aspect, in the 5th kind of possible implementation of first aspect In, the base station further include:
Scheduling unit, for by the scheduling information of the data be placed on the unauthorized carrier wave the last one is imperfect On the PDCCH of subframe;Alternatively, the scheduling information of the data to be placed on to the last one imperfect son of the unauthorized carrier wave On the PDCCH of the subframe of the corresponding authorization carrier wave of frame;Alternatively, the scheduling information of the data is placed on the unauthorized carrier wave First imperfect subframe and the last one imperfect subframe EPDCCH on;Alternatively, the scheduling information of the data is put Set first imperfect subframe subframe for authorizing carrier wave corresponding with the last one imperfect subframe in the unauthorized carrier wave EPDCCH on.
The possible implementation of second with reference to first aspect, in the 6th kind of possible implementation of first aspect In, if the determination unit determines that second subframe of the unauthorized carrier wave is the splicing with first imperfect subframe splicing Subframe;Then
In the transmission unit by the data after coding by first imperfect subframe of the unauthorized carrier wave and its Splicing subframe is sent to before the UE, and the determination unit is specifically used for:
According to the symbol lengths M of first imperfect subframe, the splicing symbol lengths N of second subframe is determined;Wherein, should The symbol lengths M of first imperfect subframe includes symbol lengths, the control symbol that filling signal or targeting signal occupy The length of length and data symbol, and the sum of M and N are the symbol lengths of a complete subframe;
The transmission unit is specifically used for:
The symbol and second subframe that data after coding are passed through into first imperfect subframe of the unauthorized carrier wave Top n symbol be sent to the UE.
The 6th kind of possible implementation with reference to first aspect, in the 7th kind of possible implementation of first aspect In, the base station further include:
Scheduling unit, for the scheduling information of the data to be placed on to first imperfect son of the unauthorized carrier wave On the PDCCH of frame;Alternatively, by the scheduling information of the data be placed on the unauthorized carrier wave first imperfect subframe and On the EPDCCH of the top n symbol of second subframe.
The 6th kind of possible implementation with reference to first aspect, in the 8th kind of possible implementation of first aspect In, the scheduling unit is also used to:
It is scheduled the rear M symbol of second subframe of the unauthorized carrier wave as new imperfect subframe, and
The scheduling information for the data dispatched on the rear M symbol of second subframe is placed on the unauthorized carrier wave On the PDCCH of second subframe.
With reference to first aspect with the first any one into the 8th kind of possible implementation of first aspect, In 9th kind of possible implementation of one side, before the data after coding are sent to the UE, the transmission unit It is also used to:
Filling signal or targeting signal are sent on the unauthorized carrier wave to the UE, to keep to described unauthorized The occupancy of carrier wave and the position for notifying first imperfect subframe after unauthorized carrier wave described in the UE is occupied.
With reference to first aspect with the first any one into the 8th kind of possible implementation of first aspect, In tenth kind of possible implementation of one side, after the determination unit determines that the unauthorized carrier wave is occupied first After a imperfect subframe, the transmission unit is also used to:
It sends unauthorized carrier-wave transmission and is indicated to the UE, the unauthorized carrier-wave transmission instruction is used to indicate described non-award Weigh the length in the position and first imperfect subframe of first imperfect subframe of carrier wave for the data symbol of splicing.
Second aspect, the embodiment of the invention provides a kind of UE, comprising:
Receiving unit, the data sent for receiving base station by unauthorized carrier wave;
Determination unit, for determine the unauthorized carrier wave by the base station occupy after first imperfect subframe, with And the splicing subframe with this first imperfect subframe splicing;
Acquiring unit, for obtaining one in first imperfect subframe of the unauthorized carrier wave and its splicing subframe Coded data in TTI.
In conjunction with second aspect, in the first possible implementation of the second aspect, pass through in reception base station unauthorized Before the data that carrier wave is sent, the receiving unit is also used to:
Receive filling signal or targeting signal that the base station is sent by the unauthorized carrier wave, the filling signal Or targeting signal is for keeping the base station to the occupancy of the unauthorized carrier wave and notifying unauthorized load described in the UE The position of first imperfect subframe after wave is occupied;
In first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station, the determination unit It is specifically used for:
It is filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling signal or leading letter Number first imperfect subframe of the subframe confirmation after to be the unauthorized carrier wave occupied by the base station.
In conjunction with the possible implementation of the first of second aspect or second aspect, second in second aspect is possible First imperfect subframe in implementation, after the determination unit determines that the unauthorized carrier wave is occupied by the base station Before, the receiving unit is also used to:
It receives the base station and notice, the auxiliary load is occupied by the secondary carrier that authorization carrier wave or the unauthorized carrier wave are sent Wave occupancy notice is used to indicate the base station, and this occupies the initial time of the unauthorized carrier wave.
In conjunction with the possible implementation of the first of second aspect or second aspect, the third in second aspect is possible In implementation, in first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station, the determination Unit is specifically used for:
The unauthorized carrier-wave transmission instruction sent according to the base station, determines that the unauthorized carrier wave is occupied by the base station First imperfect subframe afterwards.
In conjunction with any one of the first of second aspect and second aspect into the third possible implementation, It is described when determining the splicing subframe with first imperfect subframe splicing in 4th kind of possible implementation of two aspects Determination unit is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing with first imperfect subframe splicing Subframe;Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
In the 4th kind of possible implementation in conjunction with second aspect, in the 5th kind of possible implementation of second aspect In, when determining the last one imperfect subframe of the unauthorized carrier wave, the determination unit is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave and the base station, this occupies described non-award The occupancy Duration Information for weighing carrier wave, determines the position of the last one imperfect subframe after the unauthorized carrier wave is occupied Set, and by the position of the last one determining imperfect subframe subframe confirmation be the unauthorized carrier wave the last one not Complete subframe.
In the 5th kind of possible implementation in conjunction with second aspect, in the 6th kind of possible implementation of second aspect In, the occupancy Duration Information, which is configured by the base station and carries to occupy in notice in secondary carrier, is sent to the UE;Or Person
The occupancy Duration Information is pre-configured to be in the base station side and the side UE.
In conjunction with any one of the first of second aspect and second aspect into the 6th kind of possible implementation, In 7th kind of possible implementation of two aspects, in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave When the upper coded data obtained in a TTI, the acquiring unit is specifically used for:
Determine the symbol lengths of first imperfect subframe and the length of data symbol;
According to the symbol lengths of first imperfect subframe, the length of the data symbol of splicing subframe is calculated;
It is obtained in a TTI on the data symbol in the data symbol and splicing subframe in first imperfect subframe Coded data.
In the 7th kind of possible implementation in conjunction with second aspect, in the 8th kind of possible implementation of second aspect In, in the length of the symbol lengths and data symbol that determine first imperfect subframe, the acquiring unit is specifically used In:
The detection of signal or targeting signal is filled to the unauthorized carrier wave, according to the of the unauthorized carrier wave The position that the symbol of filling signal or targeting signal is detected in one imperfect subframe calculates first imperfect subframe The symbol lengths that filling signal or targeting signal occupy in symbol lengths and first imperfect subframe;
The symbol lengths that are occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and The length for controlling symbol, calculates the length of the data symbol in first imperfect subframe;
Wherein, the symbol lengths of first imperfect subframe include that the symbol that occupies of filling signal or targeting signal is long The length of degree, the length of control symbol and data symbol.
In the 7th kind of possible implementation in conjunction with second aspect, in the 9th kind of possible implementation of second aspect In, in the length of the symbol lengths and data symbol that determine first imperfect subframe, the acquiring unit is specifically used In:
The unauthorized carrier-wave transmission instruction sent according to the base station, determines that first of the unauthorized carrier wave is imperfect The length of the symbol lengths of subframe and the data symbol in first imperfect subframe.
In the 4th kind of possible implementation in conjunction with second aspect, in the tenth kind of possible implementation of second aspect In, the determination unit determines that the last one imperfect subframe of the unauthorized carrier wave is to splice with first imperfect subframe Splicing subframe;Then
The UE further include:
Decoding unit, in the acquiring unit in first imperfect subframe of the unauthorized carrier wave and its splicing After obtaining the coded data in a TTI in subframe, based on the last one imperfect subframe from the unauthorized carrier wave The scheduling information obtained on PDCCH is decoded the coded data of acquisition;Alternatively, based on from the unauthorized carrier wave most The scheduling information obtained on the PDCCH of the subframe of the corresponding authorization carrier wave of the imperfect subframe of the latter, to the coded data of acquisition It is decoded;Alternatively, based on first imperfect subframe and the last one imperfect subframe from the unauthorized carrier wave Scheduling information is extracted on EPDCCH, and the data in spliced subframe are decoded;Alternatively, being based on from the unauthorized carrier wave First imperfect subframe authorization carrier wave corresponding with the last one imperfect subframe subframe EPDCCH on the tune that obtains Information is spent, the coded data of acquisition is decoded.
In the 4th kind of possible implementation in conjunction with second aspect, in a kind of the tenth possible realization side of second aspect In formula, the determination unit determines that second subframe of the unauthorized carrier wave is the splicing with first imperfect subframe splicing Subframe;Then
The UE further include:
Decoding unit, in the acquiring unit in first imperfect subframe of the unauthorized carrier wave and its splicing After obtaining the coded data in a TTI in subframe, based on first imperfect subframe from the unauthorized carrier wave The scheduling information obtained on PDCCH is decoded the coded data of acquisition;Alternatively, based on from the of the unauthorized carrier wave The scheduling information obtained on the EPDCCH of one imperfect subframe and second subframe, is decoded the coded data of acquisition.
5th aspect, the embodiment of the invention provides a kind of base stations, comprising:
Processor, for configuring unauthorized carrier wave for UE;Determine first after the unauthorized carrier wave is occupied it is endless Whole subframe, and the splicing subframe with this first imperfect subframe splicing;Data in one TTI are encoded;
Transceiver passes through first imperfect subframe of the unauthorized carrier wave and its splicing for the data after encoding Subframe is sent to the UE.
In conjunction with the 5th aspect, in the first possible implementation of the 5th aspect, described in processor determination After unauthorized carrier wave is occupied, the transceiver is also used to:
Secondary carrier, which is sent, by authorization carrier wave or the unauthorized carrier wave occupies notice to the UE, to notify the UE institute Stating base station, this occupies the initial time of the unauthorized carrier wave.
In conjunction with the first possible implementation of the 5th aspect or the 5th aspect, second at the 5th aspect is possible In implementation, when determining the splicing subframe with first imperfect subframe splicing, the processor is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing with first imperfect subframe splicing Subframe;Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
In conjunction with second of possible implementation of the 5th aspect, in the third possible implementation of the 5th aspect In, if the processor determines that the last one imperfect subframe of the unauthorized carrier wave is to splice with first imperfect subframe Splicing subframe;Then
The data after coding are passed through into first imperfect subframe of the unauthorized carrier wave and its spelling in the transceiver It connects subframe to be sent to before the UE, the processor is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave after occupied and this occupancy of the base station The occupancy Duration Information of the unauthorized carrier wave determines the last one imperfect son after the unauthorized carrier wave is occupied The position of frame;
The transceiver is specifically used for:
By the data after coding by the symbol of first imperfect subframe of the unauthorized carrier wave and the last one not The symbol of complete subframe is sent to the UE.
In conjunction with the third possible implementation of the 5th aspect, in the 4th kind of possible implementation of the 5th aspect In, the occupancy Duration Information, which is configured by the base station and carries to occupy in notice in secondary carrier, is sent to the UE;Or Person
The occupancy Duration Information is pre-configured to be in the base station side and the side UE.
In conjunction with the third possible implementation of the 5th aspect, in the 5th kind of possible implementation of the 5th aspect In, the processor is also used to:
The scheduling information of the data is placed on to the PDCCH of the last one imperfect subframe of the unauthorized carrier wave On;Alternatively, the scheduling information of the data is placed on the last one of the unauthorized carrier wave, imperfect subframe is corresponding awards On the PDCCH for weighing the subframe of carrier wave;Alternatively, the scheduling information of the data is placed on first of the unauthorized carrier wave not On the EPDCCH of complete subframe and the last one imperfect subframe;Alternatively, the scheduling information of the data is placed on described non- On the EPDCCH for authorizing first imperfect subframe of carrier wave subframe for authorizing carrier wave corresponding with the last one imperfect subframe.
In conjunction with second of possible implementation of the 5th aspect, in the 6th kind of possible implementation of the 5th aspect In, if the processor determines that second subframe of the unauthorized carrier wave is splicing with first imperfect subframe splicing Frame;Then
The data after coding are passed through into first imperfect subframe of the unauthorized carrier wave and its spelling in the transceiver It connects subframe to be sent to before the UE, the processor is specifically used for:
According to the symbol lengths M of first imperfect subframe, the splicing symbol lengths N of second subframe is determined;Wherein, should The symbol lengths M of first imperfect subframe includes symbol lengths, the control symbol that filling signal or targeting signal occupy The length of length and data symbol, and the sum of M and N are the symbol lengths of a complete subframe;
The transceiver is specifically used for:
The symbol and second subframe that data after coding are passed through into first imperfect subframe of the unauthorized carrier wave Top n symbol be sent to the UE.
In conjunction with the 6th kind of possible implementation of the 5th aspect, in the 7th kind of possible implementation of the 5th aspect In, the processor is also used to:
The scheduling information of the data is placed on the PDCCH of first imperfect subframe of the unauthorized carrier wave; Alternatively, the scheduling information of the data to be placed on to the first imperfect subframe and second subframe of the unauthorized carrier wave On the EPDCCH of top n symbol.
In conjunction with the 6th kind of possible implementation of the 5th aspect, in the 8th kind of possible implementation of the 5th aspect In, the processor is also used to:
It is scheduled the rear M symbol of second subframe of the unauthorized carrier wave as new imperfect subframe, and
The scheduling information for the data dispatched on the rear M symbol of second subframe is placed on the unauthorized carrier wave On the PDCCH of second subframe.
In conjunction with the first any one into the 8th kind of possible implementation of the 5th aspect and the 5th aspect, the In 9th kind of possible implementation of five aspects, before the data after coding are sent to the UE, the transceiver is also For:
Filling signal or targeting signal are sent on the unauthorized carrier wave to the UE, to keep to described unauthorized The occupancy of carrier wave and the position for notifying first imperfect subframe after unauthorized carrier wave described in the UE is occupied.
In conjunction with the first any one into the 8th kind of possible implementation of the 5th aspect and the 5th aspect, the In tenth kind of possible implementation of five aspects, first after the processor determines that the unauthorized carrier wave is occupied After imperfect subframe, the transceiver is also used to:
It sends unauthorized carrier-wave transmission and is indicated to the UE, the unauthorized carrier-wave transmission instruction is used to indicate described non-award Weigh the length in the position and first imperfect subframe of first imperfect subframe of carrier wave for the data symbol of splicing.
6th aspect, the embodiment of the invention provides a kind of UE characterized by comprising
Transceiver, the data sent for receiving base station by unauthorized carrier wave;
Processor, for determine the unauthorized carrier wave by the base station occupy after first imperfect subframe, and With the splicing subframe of this first imperfect subframe splicing;
The transceiver is also used to, and is obtained in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave Coded data in one TTI.
In conjunction with the 6th aspect, in the first possible implementation of the 6th aspect, pass through in reception base station unauthorized Before the data that carrier wave is sent, the transceiver is also used to:
Receive filling signal or targeting signal that the base station is sent by the unauthorized carrier wave, the filling signal Or targeting signal is for keeping the base station to the occupancy of the unauthorized carrier wave and notifying unauthorized load described in the UE The position of first imperfect subframe after wave is occupied;
In first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station, the processing utensil Body is used for:
It is filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling signal or leading letter Number first imperfect subframe of the subframe confirmation after to be the unauthorized carrier wave occupied by the base station.
In conjunction with the first possible implementation of the 6th aspect or the 6th aspect, second at the 6th aspect is possible In implementation, the processor determine the unauthorized carrier wave by the base station occupy after first imperfect subframe it Before, the transceiver is also used to:
It receives the base station and notice, the auxiliary load is occupied by the secondary carrier that authorization carrier wave or the unauthorized carrier wave are sent Wave occupancy notice is used to indicate the base station, and this occupies the initial time of the unauthorized carrier wave.
In conjunction with the first possible implementation of the 6th aspect or the 6th aspect, the third at the 6th aspect is possible In implementation, in first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station, the processing Implement body is used for:
The unauthorized carrier-wave transmission instruction sent according to the base station, determines that the unauthorized carrier wave is occupied by the base station First imperfect subframe afterwards.
In conjunction with the first any one into the third possible implementation of the 6th aspect and the 6th aspect, the It is described when determining the splicing subframe with first imperfect subframe splicing in 4th kind of possible implementation of six aspects Processor is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing with first imperfect subframe splicing Subframe;Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
In the 4th kind of possible implementation in conjunction with the 6th aspect, in the 5th kind of possible implementation of the 6th aspect In, when determining the last one imperfect subframe of the unauthorized carrier wave, the processor is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave and the base station, this occupies described non-award The occupancy Duration Information for weighing carrier wave, determines the position of the last one imperfect subframe after the unauthorized carrier wave is occupied Set, and by the position of the last one determining imperfect subframe subframe confirmation be the unauthorized carrier wave the last one not Complete subframe.
In the 5th kind of possible implementation in conjunction with the 6th aspect, in the 6th kind of possible implementation of the 6th aspect In, the occupancy Duration Information, which is configured by the base station and carries to occupy in notice in secondary carrier, is sent to the UE;Or Person
The occupancy Duration Information is pre-configured to be in the base station side and the side UE.
In conjunction with the first any one into the 6th kind of possible implementation of the 6th aspect and the 6th aspect, the In 7th kind of possible implementation of six aspects, in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave When the upper coded data obtained in a TTI, the processor is specifically used for:
Determine the symbol lengths of first imperfect subframe and the length of data symbol;
According to the symbol lengths of first imperfect subframe, the length of the data symbol of splicing subframe is calculated;
It is obtained in a TTI on the data symbol in the data symbol and splicing subframe in first imperfect subframe Coded data.
In the 7th kind of possible implementation in conjunction with the 6th aspect, in the 8th kind of possible implementation of the 6th aspect In, in the length of the symbol lengths and data symbol that determine first imperfect subframe, the processor is specifically used for:
The detection of signal or targeting signal is filled to the unauthorized carrier wave, according to the of the unauthorized carrier wave The position that the symbol of filling signal or targeting signal is detected in one imperfect subframe calculates first imperfect subframe The symbol lengths that filling signal or targeting signal occupy in symbol lengths and first imperfect subframe;
The symbol lengths that are occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and The length for controlling symbol, calculates the length of the data symbol in first imperfect subframe;
Wherein, the symbol lengths of first imperfect subframe include that the symbol that occupies of filling signal or targeting signal is long The length of degree, the length of control symbol and data symbol.
In the 7th kind of possible implementation in conjunction with the 6th aspect, in the 9th kind of possible implementation of the 6th aspect In, in the length of the symbol lengths and data symbol that determine first imperfect subframe, the processor is specifically used for:
The unauthorized carrier-wave transmission instruction sent according to the base station, determines that first of the unauthorized carrier wave is imperfect The length of the symbol lengths of subframe and the data symbol in first imperfect subframe.
In the 4th kind of possible implementation in conjunction with the 6th aspect, in the tenth kind of possible implementation of the 6th aspect In, the processor determines that the last one imperfect subframe of the unauthorized carrier wave is and first imperfect subframe splicing Splice subframe;Then
The coded number in a TTI is obtained in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave According to later, the processor is also used to:
Based on the scheduling information obtained from the PDCCH of the last one imperfect subframe of the unauthorized carrier wave, to obtaining The coded data taken is decoded;Alternatively, based on the corresponding authorization of the last one imperfect subframe from the unauthorized carrier wave The scheduling information obtained on the PDCCH of the subframe of carrier wave is decoded the coded data of acquisition;Alternatively, being based on from described non- It authorizes and extracts scheduling information on first imperfect subframe of carrier wave and the EPDCCH of the last one imperfect subframe, after splicing Subframe on data be decoded;Alternatively, based on from first imperfect subframe of the unauthorized carrier wave and the last one The scheduling information obtained on the EPDCCH of the corresponding subframe for authorizing carrier wave of imperfect subframe, solves the coded data of acquisition Code.
In the 4th kind of possible implementation in conjunction with the 6th aspect, in a kind of the tenth possible realization side of the 6th aspect In formula, the processor determines that second subframe of the unauthorized carrier wave is splicing with first imperfect subframe splicing Frame;Then
The coded number in a TTI is obtained in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave According to later, the processor is also used to:
Based on the scheduling information obtained from the PDCCH of first imperfect subframe of the unauthorized carrier wave, to acquisition Coded data be decoded;Alternatively, based on first imperfect subframe and second subframe from the unauthorized carrier wave The scheduling information obtained on EPDCCH is decoded the coded data of acquisition.
5th aspect, the embodiment of the invention provides a kind of sending methods of subframe, comprising:
Base station is that UE configures unauthorized carrier wave;
The base station determines first imperfect subframe after the unauthorized carrier wave is occupied, and not with this first The splicing subframe of complete subframe splicing;
The base station encodes the data in a TTI;
Data after coding are passed through first imperfect subframe of the unauthorized carrier wave and its splicing by the base station Frame is sent to the UE.
In conjunction with the 5th aspect, in the first possible implementation of the 5th aspect, the base station determines described non-award After power carrier wave is occupied, further includes:
The base station sends secondary carrier by authorization carrier wave or the unauthorized carrier wave and occupies notice to the UE, with notice Base station described in the UE this occupy the initial time of the unauthorized carrier wave.
In conjunction with the first possible implementation of the 5th aspect or the 5th aspect, second at the 5th aspect is possible In implementation, the base station determines the splicing subframe with first imperfect subframe splicing, comprising:
The base station determines that the last one imperfect subframe of the unauthorized carrier wave is to spell with first imperfect subframe The splicing subframe connect;Or
The base station determines that second subframe of the unauthorized carrier wave is the splicing with first imperfect subframe splicing Subframe.
In conjunction with second of possible implementation of the 5th aspect, in the third possible implementation of the 5th aspect In, it is and first imperfect subframe splicing if the base station determines the last one imperfect subframe of the unauthorized carrier wave Splice subframe;Then
Data after coding are passed through first imperfect subframe of the unauthorized carrier wave and its splicing by the base station Frame is sent to the UE, comprising:
The position and the base station of first imperfect subframe of the base station according to the unauthorized carrier wave after occupied This occupies the occupancy Duration Information of the unauthorized carrier wave, determines the last one after the unauthorized carrier wave is occupied The position of imperfect subframe;
The base station by the data after coding by the symbol of first imperfect subframe of the unauthorized carrier wave and most The symbol of the imperfect subframe of the latter is sent to the UE.
In conjunction with the third possible implementation of the 5th aspect, in the 4th kind of possible implementation of the 5th aspect In, the occupancy Duration Information, which is configured by the base station and carries to occupy in notice in secondary carrier, is sent to the UE;Or Person
The occupancy Duration Information is pre-configured to be in the base station side and the side UE.
In conjunction with the third possible implementation of the 5th aspect, in the 5th kind of possible implementation of the 5th aspect In, the method also includes:
The scheduling information of the data is placed on the last one imperfect subframe of the unauthorized carrier wave by the base station PDCCH on;Or
The scheduling information of the data is placed on the last one imperfect subframe of the unauthorized carrier wave by the base station On the PDCCH of the subframe of corresponding authorization carrier wave;Or
The base station by the scheduling information of the data be placed on the unauthorized carrier wave first imperfect subframe and On the EPDCCH of the last one imperfect subframe;Or
The base station by the scheduling information of the data be placed on the unauthorized carrier wave first imperfect subframe and On the EPDCCH of the corresponding subframe for authorizing carrier wave of the last one imperfect subframe.
In conjunction with second of possible implementation of the 5th aspect, in the 6th kind of possible implementation of the 5th aspect In, if the base station determines that second subframe of the unauthorized carrier wave is splicing with the imperfect frame splicing of first son Frame;Then
Data after coding are passed through first imperfect subframe of the unauthorized carrier wave and its splicing by the base station Frame is sent to the UE, comprising:
The base station determines the splicing symbol lengths of second subframe according to the symbol lengths M of first imperfect subframe N;Wherein, the symbol lengths M of first imperfect subframe includes symbol lengths, the control that filling signal or targeting signal occupy The length of symbol processed and the length of data symbol, and the sum of M and N are the symbol lengths of a complete subframe;
Data after coding are passed through the symbol of first imperfect subframe of the unauthorized carrier wave and by the base station The top n symbol of two subframes is sent to the UE.
In conjunction with the 6th kind of possible implementation of the 5th aspect, in the 7th kind of possible implementation of the 5th aspect In, the method also includes:
The scheduling information of the data is placed on first imperfect subframe of the unauthorized carrier wave by the base station On PDCCH;Or
The base station by the scheduling information of the data be placed on the unauthorized carrier wave first imperfect subframe and On the EPDCCH of the top n symbol of second subframe.
In conjunction with the 6th kind of possible implementation of the 5th aspect, in the 8th kind of possible implementation of the 5th aspect In, the method also includes:
The base station is carried out the rear M symbol of second subframe of the unauthorized carrier wave as new imperfect subframe Scheduling, and
The scheduling information for the data dispatched on the rear M symbol of second subframe is placed on the unauthorized carrier wave On the PDCCH of second subframe.
In conjunction with the first any one into the 8th kind of possible implementation of the 5th aspect and the 5th aspect, the In 9th kind of possible implementation of five aspects, the data after coding are sent to before the UE by the base station, further includes:
The base station sends filling signal or targeting signal to the UE, to keep to institute on the unauthorized carrier wave It states the occupancy of unauthorized carrier wave and notifies the position of first imperfect subframe after unauthorized carrier wave described in the UE is occupied It sets.
In conjunction with the first any one into the 8th kind of possible implementation of the 5th aspect and the 5th aspect, the In tenth kind of possible implementation of five aspects, the base station determine first after the unauthorized carrier wave is occupied it is endless After whole subframe, further includes:
The base station sends unauthorized carrier-wave transmission and is indicated to the UE, and the unauthorized carrier-wave transmission instruction is used to indicate Data symbol in the position of first imperfect subframe of the unauthorized carrier wave and first imperfect subframe for splicing Length.
6th aspect, the embodiment of the invention provides a kind of method of reseptances of subframe, comprising:
UE receives the data that base station is sent by unauthorized carrier wave;
The UE determines first imperfect subframe after the unauthorized carrier wave is occupied by the base station, and with this The splicing subframe of one imperfect subframe splicing;
The UE is obtained in a TTI in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave Coded data.
In conjunction with the 6th aspect, in the first possible implementation of the 6th aspect, the reception base station UE passes through unauthorized Before the data that carrier wave is sent, further includes:
The UE receives the filling signal or targeting signal that the base station is sent by the unauthorized carrier wave, described to fill out Signal or targeting signal are filled for keeping the base station to the occupancy of the unauthorized carrier wave and notifying non-described in the UE The position of first imperfect subframe after authorizing carrier wave occupied;
The UE determines the unauthorized carrier wave by first imperfect subframe after the occupancy of the base station, comprising:
The UE is filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling signal or The subframe confirmation of targeting signal is first imperfect subframe after the unauthorized carrier wave is occupied by the base station.
In conjunction with the first possible implementation of the 6th aspect or the 6th aspect, second at the 6th aspect is possible In implementation, the UE determines that the unauthorized carrier wave by before first imperfect subframe after the occupancy of the base station, is gone back Include:
The UE receives the base station and occupies notice, institute by the secondary carrier that authorization carrier wave or the unauthorized carrier wave are sent It states secondary carrier and occupies notice and be used to indicate the base station this occupies the initial time of the unauthorized carrier wave.
In conjunction with the first possible implementation of the 6th aspect or the 6th aspect, the third at the 6th aspect is possible In implementation, the UE determines the unauthorized carrier wave by first imperfect subframe after the occupancy of the base station, comprising:
The UE is indicated according to the unauthorized carrier-wave transmission that the base station is sent, and determines the unauthorized carrier wave by the base The first imperfect subframe stood after occupying.
In conjunction with the first any one into the third possible implementation of the 6th aspect and the 6th aspect, the In 4th kind of possible implementation of six aspects, the UE determines the splicing subframe with first imperfect subframe splicing, packet It includes:
The UE determines that the last one imperfect subframe of the unauthorized carrier wave is to splice with first imperfect subframe Splicing subframe;Or
The UE determines that second subframe of the unauthorized carrier wave is splicing with first imperfect subframe splicing Frame.
In the 4th kind of possible implementation in conjunction with the 6th aspect, in the 5th kind of possible implementation of the 6th aspect In, the UE determines the last one imperfect subframe of the unauthorized carrier wave, comprising:
The UE is according to the position of first imperfect subframe of the unauthorized carrier wave and this occupancy institute of the base station The occupancy Duration Information for stating unauthorized carrier wave determines the last one imperfect subframe after the unauthorized carrier wave is occupied Position, and by the position of the last one determining imperfect subframe subframe confirmation be the unauthorized carrier wave last A imperfect subframe.
In the 5th kind of possible implementation in conjunction with the 6th aspect, in the 6th kind of possible implementation of the 6th aspect In, the occupancy Duration Information, which is configured by the base station and carries to occupy in notice in secondary carrier, is sent to the UE;Or Person
The occupancy Duration Information is pre-configured to be in the base station side and the side UE.
In conjunction with the first any one into the 6th kind of possible implementation of the 6th aspect and the 6th aspect, the In 7th kind of possible implementation of six aspects, the UE is in first imperfect subframe of the unauthorized carrier wave and its spelling Connect the coded data obtained in a TTI in subframe, comprising:
The UE determines the symbol lengths of first imperfect subframe and the length of data symbol;
The UE calculates the length of the data symbol of splicing subframe according to the symbol lengths of first imperfect subframe;
The UE obtains one on the data symbol in the data symbol and splicing subframe in first imperfect subframe Coded data in TTI.
In the 7th kind of possible implementation in conjunction with the 6th aspect, in the 8th kind of possible implementation of the 6th aspect In, the UE determines the symbol lengths of first imperfect subframe and the length of data symbol, comprising:
The UE is filled the detection of signal or targeting signal to the unauthorized carrier wave, according in the unauthorized load The position that the symbol of filling signal or targeting signal is detected in first imperfect subframe of wave, calculate this first it is imperfect The symbol lengths that filling signal or targeting signal occupy in the symbol lengths of subframe and first imperfect subframe, and
The symbol lengths that are occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and The length for controlling symbol, calculates the length of the data symbol in first imperfect subframe;
Wherein, the symbol lengths of first imperfect subframe include that the symbol that occupies of filling signal or targeting signal is long The length of degree, the length of control symbol and data symbol.
In the 7th kind of possible implementation in conjunction with the 6th aspect, in the 9th kind of possible implementation of the 6th aspect In, the UE determines the symbol lengths of first imperfect subframe and the length of data symbol, comprising:
The UE is indicated according to the unauthorized carrier-wave transmission that the base station is sent, and determines first of the unauthorized carrier wave The length of the symbol lengths of imperfect subframe and the data symbol in first imperfect subframe.
In the 4th kind of possible implementation in conjunction with the 6th aspect, in the tenth kind of possible implementation of the 6th aspect In, the UE determines that the last one imperfect subframe of the unauthorized carrier wave is the splicing with first imperfect subframe splicing Subframe;Then
The UE is obtained in a TTI in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave After coded data, further includes:
The UE is based on the scheduling letter obtained from the PDCCH of the last one imperfect subframe of the unauthorized carrier wave Breath, is decoded the coded data of acquisition;Or
The UE is based on the corresponding subframe for authorizing carrier wave of the last one imperfect subframe from the unauthorized carrier wave The scheduling information obtained on PDCCH is decoded the coded data of acquisition;Or
The UE is based on the first imperfect subframe and the last one imperfect subframe from the unauthorized carrier wave Scheduling information is extracted on EPDCCH, and the data in spliced subframe are decoded;Or
The UE is corresponding with the last one imperfect subframe based on first imperfect subframe from the unauthorized carrier wave Authorization carrier wave subframe EPDCCH on the scheduling information that obtains, the coded data of acquisition is decoded.
In the 4th kind of possible implementation in conjunction with the 6th aspect, in a kind of the tenth possible realization side of the 6th aspect In formula, the UE determines that second subframe of the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing; Then
The UE is obtained in a TTI in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave After coded data, further includes:
The UE based on the scheduling information obtained from the PDCCH of first imperfect subframe of the unauthorized carrier wave, The coded data of acquisition is decoded;Or
The UE from the EPDCCH of first imperfect subframe of the unauthorized carrier wave and second subframe based on obtaining The scheduling information taken is decoded the coded data of acquisition.
Using scheme provided in an embodiment of the present invention, by the way that base station to be occupied to the initial time after unauthorized carrier wave and next Imperfect subframe and other subframes between the initial position of a subframe are spliced into a complete subframe, so that a complete subframe Coded data can be carried in two imperfect subframes, can use the imperfect subframe and send valid data, improve The service efficiency of unauthorized carrier wave, no matter and data are sent since on which symbol of imperfect subframe, base station is all only used The data of precoding in advance one complete subframe, the complete subframe without traversing all are pre-processed, and the place of base station is saved Manage resource.
Detailed description of the invention
Fig. 1 is the multi-transceiver technology schematic diagram under the prior art in LTE system;
Fig. 2 is the frame structure schematic diagram under the prior art in LTE system;
Fig. 3 is the schematic diagram that the end position of ECCA and sub-frame boundary are not overlapped in unauthorized secondary carrier under the prior art;
Fig. 4 is the schematic diagram for the method that a kind of unauthorized secondary carrier data provided under the prior art are sent;
Fig. 5 A, Fig. 5 B are the system architecture diagram for the application scenarios that the embodiment of the present invention is applicable in;
Fig. 6 is a kind of structural schematic diagram of base station provided in an embodiment of the present invention;
Fig. 7 is a kind of structural schematic diagram of UE provided in an embodiment of the present invention;
Fig. 8 is the structural schematic diagram of another base station provided in an embodiment of the present invention;
Fig. 9 is the structural schematic diagram of another kind UE provided in an embodiment of the present invention;
Figure 10 is a kind of flow chart of the sending method of subframe provided in an embodiment of the present invention;
Figure 11 is the first connection scheme schematic diagram provided in an embodiment of the present invention;
Figure 12 is second of connection scheme schematic diagram provided in an embodiment of the present invention;
Figure 13 is the schematic diagram that transmission secondary carrier provided in an embodiment of the present invention occupies notice;
Figure 14 is that the first scheduling information places schematic diagram under the first connection scheme provided in an embodiment of the present invention;
Figure 15 is that second of scheduling information places schematic diagram under the first connection scheme provided in an embodiment of the present invention;
Figure 16 is that the third scheduling information places schematic diagram under the first connection scheme provided in an embodiment of the present invention;
Figure 17 is that 4th kind of scheduling information places schematic diagram under the first connection scheme provided in an embodiment of the present invention;
Figure 18 is that the first scheduling information places schematic diagram under second of connection scheme provided in an embodiment of the present invention;
Figure 19 is that second of scheduling information places schematic diagram under second of connection scheme provided in an embodiment of the present invention;
Figure 20 is the scheduling of second subframe of unauthorized carrier wave under second of connection scheme provided in an embodiment of the present invention Schematic diagram;
Figure 21 is a kind of flow chart of the method for reseptance of subframe provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the invention provides a kind of method of sending and receiving of subframe, base station and UE, non-by occupying base station Initial time after authorization carrier wave is spliced into one with other subframes to the imperfect subframe between the initial position of next subframe A complete subframe enables the coded data of a complete subframe to be carried in two imperfect subframes, no matter from imperfect Which start to send data on symbol of subframe, base station all only with the data for shifting to an earlier date precoding one complete subframe, is not necessarily to traversal All complete subframes are pre-processed, and the process resource of base station is saved.
Technical solution of the present invention can be applied to following two system architecture:
Scene one: refering to shown in Fig. 5 A, under single base station communication scene of LTE system, UE passes through single base station and core net Connection, base station is directly connected with core net.
Scene two: refering to shown in Fig. 5 B, under more base station communication scenes of LTE system, UE passes through multiple base stations and core net It connects, connection is kept between multiple base stations, and at least one base station is directly connected with core net in this multiple base station.
It should be noted that technical solution of the present invention be equally applicable to be with other of frame structure identical as LTE system System.
Technical solution of the present invention is illustrated with each embodiment with reference to the accompanying drawings of the specification.
As shown in fig.6, the embodiment of the invention provides a kind of base station, for realizing the sending method of subframe, the base Station includes:
Configuration unit 601, for configuring unauthorized carrier wave for UE.
Determination unit 602, for determining first imperfect subframe after the unauthorized carrier wave is occupied, and with this The splicing subframe of first imperfect subframe splicing.
First imperfect subframe is for a channel occupancy duration.Lower secondary channel after channel release The initial position of occupancy is still first imperfect subframe.The imperfect subframe refers to, should for authorizing carrier wave The starting of subframe or end position do not conform to the sub-frame boundary alignment of authorization carrier wave.Such as first imperfect subframe initial position It is later than corresponding authorization carrier wave sub-frame boundary, end position and the alignment of corresponding authorization carrier wave sub-frame boundary.The last one is endless Whole subframe initial position and corresponding authorization carrier wave sub-frame boundary are aligned but end position is earlier than corresponding authorization carrier wave subframe side Boundary.The complete subframe of the splicing is to splice patrolling for the subframe for completing one TTI data of transmission using two imperfect subframes Concept is collected, is made of on the time two splicing subframes.In length and exactly equal to one subframe lengths are limited, it can be less than one Subframe lengths.
Wherein, first imperfect subframe of the unauthorized carrier wave and splicing subframe constitute a complete subframe,
Coding unit 603, for a Transmission Time Interval (English: Transmission Time Interval, letter Claim: TTI) in data encoded.
Transmission unit 604, for the data after encoding by first imperfect subframe of the unauthorized carrier wave and It splices subframe and is sent to the UE.
Optionally, after the determination unit 602 determines that the unauthorized carrier wave is occupied, the transmission unit 604 is also For: secondary carrier is sent by authorization carrier wave or the unauthorized carrier wave and occupies notice to the UE, to notify described in the UE Base station this occupy the initial time of the unauthorized carrier wave.
When determining the splicing subframe with first imperfect subframe splicing, the determination unit 602 is specifically used for: determining The last one imperfect subframe of the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing;Alternatively, really Second subframe of the fixed unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
Both connection schemes are described in detail below.
Scheme one,
If the determination unit 602 determine the last one imperfect subframe of the unauthorized carrier wave be with first it is endless The splicing subframe of whole subframe splicing, the then data after coding are passed through into the unauthorized carrier wave in the transmission unit 604 the One imperfect subframe and its splicing subframe are sent to before the UE, and the determination unit 602 is specifically used for: according to described non- Authorization carrier wave it is occupied after first imperfect subframe position and the base station this occupy accounting for for the unauthorized carrier wave With Duration Information, the position of the last one imperfect subframe after the unauthorized carrier wave is occupied is determined.
Then, the data after coding are passed through first imperfect son of the unauthorized carrier wave by the transmission unit 604 The symbol of frame and the symbol of the last one imperfect subframe are sent to the user equipment.
Wherein, the occupancy Duration Information is configured by the base station and carries to occupy in notice in secondary carrier and is sent to The UE;Alternatively, the occupancy Duration Information is pre-configured to be in the base station side and the side UE.
Further, under this connecting method of scheme one, the base station further include:
Scheduling unit 605, for by the scheduling information of the data be placed on the unauthorized carrier wave the last one not On the PDCCH of complete subframe;Alternatively, by the scheduling information of the data be placed on the unauthorized carrier wave the last one is endless On the PDCCH of the corresponding subframe for authorizing carrier wave of whole subframe;Alternatively, the scheduling information of the data is placed on described unauthorized In first imperfect subframe of carrier wave and the EPDCCH of the last one imperfect subframe;Alternatively, the scheduling of the data is believed Breath is placed on the first imperfect subframe and the corresponding carrier wave that authorizes of the last one imperfect subframe of the unauthorized carrier wave On the EPDCCH of subframe.
Scheme two,
If the determination unit 602 determines that second subframe of the unauthorized carrier wave is to spell with first imperfect subframe The splicing subframe connect, then it is in the transmission unit 604 that the data after coding are endless by first of the unauthorized carrier wave Whole subframe and its splicing subframe are sent to before the UE, and the determination unit 602 is specifically used for: according to first imperfect son The symbol lengths M of frame determines the splicing symbol lengths N of second subframe;Wherein, the symbol lengths of first imperfect subframe M include filling signal or targeting signal occupy symbol lengths, control the length of symbol and the length of data symbol, and M and N The sum of be a complete subframe symbol lengths.
Then, the data after coding are passed through first imperfect son of the unauthorized carrier wave by the transmission unit 604 The symbol of frame and the top n symbol of second subframe are sent to the UE.
Further, under this connecting method of scheme two, the base station further include:
Scheduling unit 605, for by the scheduling information of the data be placed on first of the unauthorized carrier wave it is endless On the PDCCH of whole subframe;Alternatively, the scheduling information of the data to be placed on to first imperfect son of the unauthorized carrier wave On the EPDCCH of frame and the top n symbol of second subframe.
Further, under this connecting method of scheme two, the scheduling unit 605 is also used to: will be described unauthorized The rear M symbol of second subframe of carrier wave is scheduled as new imperfect subframe, and will be at the rear M of second subframe The scheduling information for the data dispatched on symbol is placed on the PDCCH of second subframe of the unauthorized carrier wave.
Optionally, before the data after coding are sent to the UE, the transmission unit 604 is also used to: described Filling signal or targeting signal are sent on unauthorized carrier wave to the UE, to keep to the occupancy of the unauthorized carrier wave and Notify the position of first imperfect subframe after unauthorized carrier wave described in the UE is occupied.
Optionally, first imperfect subframe after the determination unit 602 determines that the unauthorized carrier wave is occupied Later, the transmission unit 604 is also used to: being sent unauthorized carrier-wave transmission and is indicated to the UE, the unauthorized carrier-wave transmission It indicates to be used to indicate in the position and first imperfect subframe of first imperfect subframe of the unauthorized carrier wave for spelling The length of the data symbol connect.
As shown in fig.7, the embodiment of the invention provides a kind of UE, for realizing the method for reseptance of subframe, the UE packet It includes:
Receiving unit 701, the data sent for receiving base station by unauthorized carrier wave.
Determination unit 702, for determine the unauthorized carrier wave by the base station occupy after first imperfect subframe, And the splicing subframe with this first imperfect subframe splicing.
Wherein, first imperfect subframe of the unauthorized carrier wave and splicing subframe constitute a complete subframe.
Acquiring unit 703, for being obtained in first imperfect subframe of the unauthorized carrier wave and its splicing subframe Coded data in one TTI.
Optionally, before receiving the data that base station is sent by unauthorized carrier wave, the receiving unit 701 is also used to: Receive filling signal that the base station is sent by the unauthorized carrier wave perhaps targeting signal filling signal or leading Signal is for keeping the base station to the occupancy of the unauthorized carrier wave and notifying unauthorized carrier wave described in the UE occupied The position of first imperfect subframe afterwards.
Correspondingly, described in first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station Determination unit 702 is specifically used for: being filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling The confirmation of the subframe of signal or targeting signal is first imperfect subframe after the unauthorized carrier wave is occupied by the base station.
Optionally, determine the unauthorized carrier wave by first after the occupancy of the base station not in the determination unit 702 Before complete subframe, the receiving unit 701 is also used to: being received the base station and is passed through authorization carrier wave or the unauthorized carrier wave hair The secondary carrier sent occupies notice, and the secondary carrier occupancy notice is used to indicate the base station, and this occupies the unauthorized carrier wave Initial time.
Optionally, described in first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station Determination unit 702 is specifically used for: being indicated according to the unauthorized carrier-wave transmission that the base station is sent, determines the unauthorized carrier wave quilt First imperfect subframe after the base station occupancy.
When determining the splicing subframe with first imperfect subframe splicing, the determination unit 702 is specifically used for: determining The last one imperfect subframe of the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing;Alternatively, really Second subframe of the fixed unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
Wherein, when determining the last one imperfect subframe of the unauthorized carrier wave, the determination unit 702 is specifically used In: according to the position of first imperfect subframe of the unauthorized carrier wave and this described unauthorized carrier wave of occupancy of the base station Occupancy Duration Information, determine the position of the last one imperfect subframe after the unauthorized carrier wave is occupied, and will Subframe confirmation on the position of the imperfect subframe of the last one determining is the last one imperfect son of the unauthorized carrier wave Frame.
Wherein, the occupancy Duration Information is configured by the base station and carries to occupy in notice in secondary carrier and is sent to The UE;Alternatively, the occupancy Duration Information is pre-configured to be in the base station side and the side UE.
Further, a TTI is obtained in first imperfect subframe of the unauthorized carrier wave and its splicing subframe When interior coded data, the acquiring unit 703 is specifically used for: determining the symbol lengths sum number of first imperfect subframe According to the length of symbol;According to the symbol lengths of first imperfect subframe, the length of the data symbol of splicing subframe is calculated;? The coded data in a TTI is obtained on the data symbol in data symbol and splicing subframe in one imperfect subframe.
Optionally, described to obtain in the length of the symbol lengths and data symbol that determine first imperfect subframe It takes unit 703 to be specifically used for: being filled the detection of signal or targeting signal to the unauthorized carrier wave, non-awarded according to described The position for detecting the symbol of filling signal or targeting signal in first imperfect subframe of carrier wave is weighed, calculates this first not The symbol lengths that filling signal or targeting signal occupy in the symbol lengths of complete subframe and first imperfect subframe;Root The symbol lengths that are occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and control symbol Length calculates the length of the data symbol in first imperfect subframe;Wherein, the symbol of first imperfect subframe is long Degree includes symbol lengths, the length of control symbol and the length of data symbol that filling signal or targeting signal occupy.
Optionally, described to obtain in the length of the symbol lengths and data symbol that determine first imperfect subframe It takes unit 703 to be specifically used for: being indicated according to the unauthorized carrier-wave transmission that the base station is sent, determine the of the unauthorized carrier wave The symbol lengths of one imperfect subframe and the length of the data symbol in first imperfect subframe.
If the determination unit 702 determine the last one imperfect subframe of the unauthorized carrier wave be with first it is endless The splicing subframe of whole subframe splicing, the then UE further include:
Decoding unit 704, for the acquiring unit 703 in first imperfect subframe of the unauthorized carrier wave and After it splices the coded data obtained in a TTI in subframe, based on from the unauthorized carrier wave the last one is imperfect The scheduling information obtained on the PDCCH of subframe is decoded the coded data of acquisition;Alternatively, being based on from the unauthorized load The scheduling information obtained on the PDCCH of the subframe of the corresponding authorization carrier wave of the imperfect subframe of the last one of wave, to the volume of acquisition Code data are decoded;Alternatively, based on first imperfect subframe and the last one imperfect son from the unauthorized carrier wave Scheduling information is extracted on the EPDCCH of frame, the data in spliced subframe are decoded;Alternatively, being based on from described unauthorized It is obtained on the EPDCCH of first imperfect subframe of carrier wave subframe for authorizing carrier wave corresponding with the last one imperfect subframe Scheduling information, the coded data of acquisition is decoded.
If the determination unit 702 determines that second subframe of the unauthorized carrier wave is to spell with first imperfect subframe The splicing subframe connect, the then UE further include:
Decoding unit 704, for the acquiring unit 703 in first imperfect subframe of the unauthorized carrier wave and After it splices the coded data obtained in a TTI in subframe, based on first imperfect son from the unauthorized carrier wave The scheduling information obtained on the PDCCH of frame is decoded the coded data of acquisition;Alternatively, being based on from the unauthorized carrier wave First imperfect subframe and second subframe EPDCCH on the scheduling information that obtains, the coded data of acquisition is solved Code.
As shown in fig.8, the embodiment of the invention also provides a kind of base station, it is described for realizing the sending method of subframe Base station includes:
Processor 801, for configuring unauthorized carrier wave for UE;Determine first after the unauthorized carrier wave is occupied not Complete subframe, and the splicing subframe with this first imperfect subframe splicing;Data in one TTI are encoded.
Wherein, first imperfect subframe of the unauthorized carrier wave and splicing subframe constitute a complete subframe.
Transceiver 802, for the data after encoding by first imperfect subframe of the unauthorized carrier wave and its Splicing subframe is sent to the UE.
Optionally, after the processor 801 determines that the unauthorized carrier wave is occupied, the transceiver 802 is also used to: Secondary carrier, which is sent, by authorization carrier wave or the unauthorized carrier wave occupies notice to the UE, to notify base station sheet described in the UE The secondary initial time for occupying the unauthorized carrier wave.
When determining the splicing subframe with first imperfect subframe splicing, the processor 801 is specifically used for: determining institute The last one the imperfect subframe for stating unauthorized carrier wave is the splicing subframe spliced with first imperfect subframe;Alternatively, determining Second subframe of the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
Both connection schemes are described in detail below.
Scheme one,
If the processor 801 determine the last one imperfect subframe of the unauthorized carrier wave be with first it is imperfect Data after coding are then passed through first of the unauthorized carrier wave by the splicing subframe of subframe splicing in the transceiver 802 Imperfect subframe and its splicing subframe are sent to before the UE, and the processor 801 is specifically used for: according to the unauthorized load This occupancy for occupying the unauthorized carrier wave of the position and the base station of first imperfect subframe after wave is occupied continues Temporal information determines the position of the last one imperfect subframe after the unauthorized carrier wave is occupied.
Then, first imperfect subframe that the data after coding are passed through the unauthorized carrier wave by the transceiver 802 Symbol and the symbol of the last one imperfect subframe be sent to the UE.
Wherein, the occupancy Duration Information is configured by the base station and carries to occupy in notice in secondary carrier and is sent to The UE;Alternatively, the occupancy Duration Information is pre-configured to be in the base station side and the side UE.
Further, under this connecting method of scheme one, the processor 801 is also used to: by the tune of the data On the PDCCH for the last one imperfect subframe that degree information is placed on the unauthorized carrier wave;Alternatively, by the scheduling of the data Information is placed on the PDCCH of the corresponding subframe for authorizing carrier wave of the last one imperfect subframe of the unauthorized carrier wave;Or Person, first imperfect subframe that the scheduling information of the data is placed on the unauthorized carrier wave are imperfect with the last one On the EPDCCH of subframe;Alternatively, the scheduling information of the data to be placed on to first imperfect son of the unauthorized carrier wave On the EPDCCH of the frame subframe for authorizing carrier wave corresponding with the last one imperfect subframe.
Scheme two,
If the processor 801 determines that second subframe of the unauthorized carrier wave is to splice with first imperfect subframe Splicing subframe, then the data after coding are passed through into first imperfect son of the unauthorized carrier wave in the transceiver 802 Frame and its splicing subframe are sent to before the UE, and the processor 801 is specifically used for: according to the symbol of first imperfect subframe Number length M, determines the splicing symbol lengths N of second subframe;Wherein, the symbol lengths M of first imperfect subframe includes Symbol lengths, the length of control symbol and the length of data symbol that filling signal or targeting signal occupy, and the sum of M and N For the symbol lengths of a complete subframe.
Then, first imperfect subframe that the data after coding are passed through the unauthorized carrier wave by the transceiver 802 Symbol and the top n symbol of second subframe be sent to the UE.
Further, under this connecting method of scheme two, the processor 801 is also used to: by the tune of the data On the PDCCH for first imperfect subframe that degree information is placed on the unauthorized carrier wave;Alternatively, the scheduling of the data is believed Breath is placed on the EPDCCH of first imperfect subframe of the unauthorized carrier wave and the top n symbol of second subframe.
Further, under this connecting method of scheme two, the processor 801 is also used to: by the unauthorized load The rear M symbol of second subframe of wave is scheduled as new imperfect subframe, and will be in the rear M symbol of second subframe On the PDCCH for second subframe that the scheduling information for the data dispatched on number is placed on the unauthorized carrier wave.
Optionally, before the data after coding are sent to the UE, the transceiver 802 is also used to: described non- It authorizes and sends filling signal or targeting signal on carrier wave to the UE, to keep the occupancy to the unauthorized carrier wave and lead to Know the position of first imperfect subframe after unauthorized carrier wave described in the UE is occupied.
Optionally, first imperfect subframe after the processor 801 determines that the unauthorized carrier wave is occupied it Afterwards, the transceiver 802 is also used to: being sent unauthorized carrier-wave transmission and is indicated to the UE, the unauthorized carrier-wave transmission instruction It is used to indicate in the position and first imperfect subframe of first imperfect subframe of the unauthorized carrier wave for splicing The length of data symbol.
As shown in fig.9, the embodiment of the invention provides a kind of UE, for realizing the method for reseptance of subframe, the UE packet It includes:
Transceiver 901, the data sent for receiving base station by unauthorized carrier wave.
Processor 902, for determine the unauthorized carrier wave by the base station occupy after first imperfect subframe, with And the splicing subframe with this first imperfect subframe splicing.
Wherein, first imperfect subframe of the unauthorized carrier wave and splicing subframe constitute a complete subframe
The transceiver 901 is also used to, in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave Obtain the coded data in a TTI.
Optionally, before receiving the data that base station is sent by unauthorized carrier wave, the transceiver 901 is also used to: being connect Receive filling signal that the base station is sent by the unauthorized carrier wave perhaps the targeting signal filling signal or leading letter Number for keeping the base station to the occupancy of the unauthorized carrier wave and after notifying that unauthorized carrier wave described in the UE is occupied First imperfect subframe position;
Correspondingly, described in first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station Processor 902 is specifically used for: being filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling letter Number or targeting signal first imperfect subframe of the subframe confirmation after to be the unauthorized carrier wave occupied by the base station.
Optionally, first after the processor 902 determines that the unauthorized carrier wave is occupied by the base station is endless Before whole subframe, the transceiver 901 is also used to: receiving what the base station was sent by authorization carrier wave or the unauthorized carrier wave Secondary carrier occupies notice, and the secondary carrier occupancy notice is used to indicate the base station, and this occupies the starting of the unauthorized carrier wave Moment.
Optionally, described in first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station Processor 902 is specifically used for: being indicated according to the unauthorized carrier-wave transmission that the base station is sent, determines the unauthorized carrier wave by institute State first imperfect subframe after base station occupies.
When determining the splicing subframe with first imperfect subframe splicing, the processor 902 is specifically used for: determining institute The last one the imperfect subframe for stating unauthorized carrier wave is the splicing subframe spliced with first imperfect subframe;Alternatively, determining Second subframe of the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
Wherein, when determining the last one imperfect subframe of the unauthorized carrier wave, the processor 902 is specifically used In: according to the position of first imperfect subframe of the unauthorized carrier wave and this described unauthorized carrier wave of occupancy of the base station Occupancy Duration Information, determine the position of the last one imperfect subframe after the unauthorized carrier wave is occupied, and will Subframe confirmation on the position of the imperfect subframe of the last one determining is the last one imperfect son of the unauthorized carrier wave Frame.
Wherein, the occupancy Duration Information is configured by the base station and carries to occupy in notice in secondary carrier and is sent to The UE;Alternatively, the occupancy Duration Information is pre-configured to be in the base station side and the side UE.
Further, a TTI is obtained in first imperfect subframe of the unauthorized carrier wave and its splicing subframe When interior coded data, the processor 902 is specifically used for: determining the symbol lengths and data of first imperfect subframe The length of symbol;According to the symbol lengths of first imperfect subframe, the length of the data symbol of splicing subframe is calculated;First The coded data in a TTI is obtained on the data symbol in data symbol and splicing subframe in a imperfect subframe.
Optionally, in the length of the symbol lengths and data symbol that determine first imperfect subframe, the place Reason device 902 is specifically used for: the detection of signal or targeting signal is filled to the unauthorized carrier wave, according to described unauthorized The position that the symbol of filling signal or targeting signal is detected in first imperfect subframe of carrier wave, calculate this first it is endless The symbol lengths that filling signal or targeting signal occupy in the symbol lengths of whole subframe and first imperfect subframe;According to The length of symbol lengths and control symbol that symbol lengths, filling signal or the targeting signal of first imperfect subframe occupy Degree, calculates the length of the data symbol in first imperfect subframe;Wherein, the symbol lengths of first imperfect subframe Symbol lengths, the length of control symbol and the length of data symbol occupied including filling signal or targeting signal.
Optionally, in the length of the symbol lengths and data symbol that determine first imperfect subframe, the place Reason device 902 is specifically used for: being indicated according to the unauthorized carrier-wave transmission that the base station is sent, determines the first of the unauthorized carrier wave The length of the symbol lengths of a imperfect subframe and the data symbol in first imperfect subframe.
If the processor 902 determine the last one imperfect subframe of the unauthorized carrier wave be with first it is imperfect The splicing subframe of subframe splicing then obtains one in first imperfect subframe of the unauthorized carrier wave and its splicing subframe After coded data in TTI, the processor 902 is also used to: based on from the unauthorized carrier wave the last one is imperfect The scheduling information obtained on the PDCCH of subframe is decoded the coded data of acquisition;Alternatively, being based on from the unauthorized load The scheduling information obtained on the PDCCH of the subframe of the corresponding authorization carrier wave of the imperfect subframe of the last one of wave, to the volume of acquisition Code data are decoded;Alternatively, based on first imperfect subframe and the last one imperfect son from the unauthorized carrier wave Scheduling information is extracted on the EPDCCH of frame, the data in spliced subframe are decoded;Alternatively, being based on from described unauthorized It is obtained on the EPDCCH of first imperfect subframe of carrier wave subframe for authorizing carrier wave corresponding with the last one imperfect subframe Scheduling information, the coded data of acquisition is decoded.
If the processor 902 determines that second subframe of the unauthorized carrier wave is to splice with first imperfect subframe Splicing subframe, then first imperfect subframe of the unauthorized carrier wave and its splicing subframe on obtain a TTI in After coded data, the processor 902 is also used to: based on first imperfect subframe from the unauthorized carrier wave The scheduling information obtained on PDCCH is decoded the coded data of acquisition;Alternatively, based on from the of the unauthorized carrier wave The scheduling information obtained on the EPDCCH of one imperfect subframe and second subframe, is decoded the coded data of acquisition.
As shown in fig.10, the implementing procedure of this method is such as the embodiment of the invention provides a kind of sending method of subframe Under:
Step 1001: base station is that UE configures unauthorized carrier wave.
The unauthorized carrier wave is the secondary carrier that the base station is UE configuration.
Step 1002: the base station determines first imperfect subframe after the unauthorized carrier wave is occupied, Yi Jiyu The splicing subframe of this first imperfect subframe splicing.
Wherein, first imperfect subframe of the unauthorized carrier wave and splicing subframe constitute a complete subframe.
For example, in practical application, base station can confirm that the unauthorized carrier wave sends data by CCA or ECCA Initial time.Specifically, the end position of CCA or ECCA is not overlapped with the boundary of subframe generally, for example, CCA or ECCA End position is at the Y OFDM symbol of X subframe, wherein Y is the positive integer less than 14.Particularly, when Y is greater than 3, It indicates that CCA the or ECCA stage occupies preceding 3 OFDM symbols where the PDCCH in X subframe, that is, will appear because lacking PDCCH and the case where can not be scheduled to the data of the subframe.
In order to using the unauthorized carrier wave it is occupied after initial time between the initial position of next subframe Imperfect subframe sends valid data, to improve the service efficiency of unauthorized carrier wave, the embodiment of the present invention proposes can should Imperfect subframe and other subframes of unauthorized carrier wave are spliced into a complete subframe.Specifically, can have but be not limited to following Two kinds of connection schemes:
Scheme one,
The base station determines that the last one imperfect subframe of the unauthorized carrier wave is to spell with first imperfect subframe The splicing subframe connect.
For example, as shown in figure 11, it is assumed that this occupy the subframe 2 on unauthorized carrier wave to totally 6 milliseconds of subframe 8 (unit: Ms the time), wherein subframe 2 and subframe 8 are imperfect subframe.Scheme one is that this is occupied to the front and back of unauthorized carrier wave Two imperfect subframes --- subframe 2 and subframe 8 are spliced into a complete subframe.
Scheme two,
The base station determines that second subframe of the unauthorized carrier wave is the splicing with first imperfect subframe splicing Subframe.
For example, as shown in figure 12, it is assumed that this occupy the subframe 2 on unauthorized carrier wave to totally 6 milliseconds of subframe 8 (unit: Ms the time), wherein subframe 2 and subframe 8 are imperfect subframe.Scheme two is that this is occupied the endless of unauthorized carrier wave Sub- frame --- the front portion of subframe 3 is spliced into a complete subframe by whole subframe 2 and its latter.Then, by the latter of subframe 3 Part and subframe 8 are scheduled as imperfect subframe, wherein rear portion and this kind of PDCCH of subframe 8 to subframe 3 The scheduling problem of unappropriated imperfect subframe has mature technology in the prior art to solve, and the present invention repeats no more.
It should be noted that the base station can only select one of connection scheme simultaneously, and the base station and described UE makes an appointment using identical connection scheme.
Optionally, after the base station determines that the unauthorized carrier wave is occupied, authorization carrier wave or described non-can also be passed through It authorizes carrier wave to send secondary carrier and occupies notice to the UE, to notify this described unauthorized carrier wave of occupancy of base station described in the UE Initial time, the UE carries out the data for sending from the unauthorized carrier wave of receiving and storing from the initial time Parsing.For example, as shown in figure 13, base station is sent secondary carrier using the PDCCH in authorization carrier wave subframe 3 and occupies notice to being taken The UE of business.
Optionally, after the base station determines first imperfect subframe after the unauthorized carrier wave is occupied, may be used also It is indicated to the UE to send unauthorized carrier-wave transmission, the unauthorized carrier-wave transmission instruction is used to indicate the unauthorized carrier wave First imperfect subframe position and first imperfect subframe in for splicing data symbol length.
Step 1003: the base station encodes the data in a TTI.
Step 1004: the base station by the data after coding by first imperfect subframe of the unauthorized carrier wave and It splices subframe and is sent to the UE.
Specifically, if using the first connection scheme in above-mentioned steps 1002, i.e., the described base station determines described non-award The last one the imperfect subframe for weighing carrier wave is the splicing subframe spliced with first imperfect subframe, then institute in step 1004 State base station this can account for according to the position of first imperfect subframe of the unauthorized carrier wave after occupied and the base station With the occupancy Duration Information of the unauthorized carrier wave, determine after the unauthorized carrier wave is occupied the last one is imperfect The position of subframe, then the data after coding are passed through the symbol of first imperfect subframe of the unauthorized carrier wave by the base station Number and the symbol of the last one imperfect subframe be sent to the UE.
Wherein, the occupancy Duration Information can be configured by the base station and carry to occupy in notice in secondary carrier and sent out Give the UE, the occupancy duration that base station occupies unauthorized carrier wave every time in this case can be it is unfixed, specifically The occupancy duration determined by base station after reinform to UE.Alternatively, the occupancy Duration Information is also possible to be pre-configured In the base station side and the user equipment side, base station is occupied according to the occupancy duration of agreement every time in this case Unauthorized carrier wave.
Further, the data in a TTI after coding are placed on the first of the unauthorized carrier wave by the base station It, can also be by the number in a TTI after the coding when on the data symbol of a imperfect subframe and the last one imperfect subframe The position of first imperfect subframe and the control symbol of the last one imperfect subframe is placed on according to corresponding scheduling information It sets.Wherein, scheduling information shows the corresponding data of the scheduling information and is destined to which UE and positioned at unauthorized carrier wave The information such as in any block resource.
Specifically, can have following four method to realize the placement of scheduling information:
The first: the base station by the scheduling information of the data be placed on the unauthorized carrier wave the last one is endless On the PDCCH of whole subframe.
For example, as shown in figure 14, base station is by former and later two imperfect subframes --- subframe 2 and the subframe on unauthorized carrier wave 8 are spliced into a complete subframe, and using the PDCCH of the subframe 8 on unauthorized carrier wave, are carried on unauthorized carrier wave to dispatch Data in subframe 2 and subframe 8.Correspondingly, UE needs to solve again after the subframe 2 and the concatenation of subframe 8 on unauthorized carrier wave Code.
Second: the base station by the scheduling information of the data be placed on the unauthorized carrier wave the last one is endless On the PDCCH of the corresponding subframe for authorizing carrier wave of whole subframe.
For example, as shown in figure 15, base station is by former and later two imperfect subframes --- subframe 2 and the subframe on unauthorized carrier wave 8 are spliced into a complete subframe, and use the PDCCH of the subframe on authorization carrier wave corresponding to the subframe 8 on unauthorized carrier wave, To dispatch the data in the subframe 2 and subframe 8 that are carried on unauthorized carrier wave.
The third: the base station is imperfect by the scheduling information of the data be placed on the unauthorized carrier wave first On the EPDCCH of subframe and the last one imperfect subframe.
For example, as shown in figure 16, base station is by former and later two imperfect subframes --- subframe 2 and the subframe on unauthorized carrier wave 8 are spliced into a complete subframe, and using the EPDCCH of subframe 2 and subframe 8 on unauthorized carrier wave, are carried on non-award to dispatch Weigh the data in the subframe 2 and subframe 8 of carrier wave.
4th kind: the base station is imperfect by the scheduling information of the data be placed on the unauthorized carrier wave first On the EPDCCH of the subframe subframe for authorizing carrier wave corresponding with the last one imperfect subframe.
For example, as shown in figure 17, base station is by former and later two imperfect subframes --- subframe 2 and the subframe on unauthorized carrier wave 8 are spliced into a complete subframe, and using the subframe on authorization carrier wave corresponding to the subframe 2 and subframe 8 on unauthorized carrier wave EPDCCH, to dispatch the data in the subframe 2 and subframe 8 that are carried on unauthorized carrier wave.
In addition, if using second of connection scheme in above-mentioned step 1102, i.e., the described base station determines the unauthorized load Second subframe of wave is the splicing subframe with first imperfect subframe splicing, then base station described in step 1104 can root According to the symbol lengths M of first imperfect subframe, the splicing symbol lengths N of second subframe is determined;Wherein, this first it is endless The symbol lengths M of whole subframe include filling signal or targeting signal occupy symbol lengths, control symbol length and data The length of symbol, and the sum of M and N are the symbol lengths of a complete subframe.Then the base station passes through the data after coding The symbol of first imperfect subframe of the unauthorized carrier wave and the top n symbol of second subframe are sent to the UE.
Further, the data in a TTI after coding are placed on the first of the unauthorized carrier wave by the base station It, can also be by the volume when on the data symbol for including in the data symbol of a imperfect subframe and the top n symbol of second subframe Scheduling information corresponding to the data in a TTI after code is placed on the control symbol and second of first imperfect subframe On the position for the control symbol for including in the top n symbol of a subframe.
Specifically, can have following two method to realize the placement of scheduling information:
The first: the base station is imperfect by the scheduling information of the data be placed on the unauthorized carrier wave first On the PDCCH of subframe.
For example, as shown in figure 18, the front portion of imperfect subframe 2 and subframe 3 on unauthorized carrier wave is spliced in base station For a complete subframe, and using the preceding n OFDM symbol of subframe 2 as the PDCCH of subframe 2, using the son on unauthorized carrier wave The PDCCH of frame 2 dispatches the data being carried in 3 front portion of subframe 2 and subframe, wherein n≤3.
Second: the base station is imperfect by the scheduling information of the data be placed on the unauthorized carrier wave first On the EPDCCH of the top n symbol of subframe and second subframe.
For example, as shown in figure 19, the front portion of imperfect subframe 2 and subframe 3 on unauthorized carrier wave is spliced in base station For a complete subframe, and son is carried on to dispatch using the EPDCCH of 3 front portion of subframe 2 and subframe on unauthorized carrier wave Data in 3 front portion of frame 2 and subframe.
Further, the base station is using the top n symbol of second subframe of the unauthorized carrier wave as splicing subframe It, can also be using the rear M symbol of second subframe of the unauthorized carrier wave as new after first imperfect subframe splicing Imperfect subframe be scheduled, and the scheduling information for the data dispatched on the rear M symbol of second subframe is placed on On the PDCCH of second subframe of the unauthorized carrier wave.
For example, as shown in figure 20, the front portion of imperfect subframe 2 and subframe 3 on unauthorized carrier wave is spliced in base station It is scheduled for a complete subframe, while the subsequent remainder of the subframe 3 imperfect subframe new as one being adjusted The PDCCH as subframe 3 is vacated in the n OFDM symbol that subframe 3 originates in degree, base station, remains for dispatching to be carried on behind subframe 3 Data in remaining part point.
It optionally, can also be in the unauthorized carrier wave before the data after coding are sent to the UE by the base station Upper transmission filling signal or targeting signal are to the UE, to keep the occupancy to the unauthorized carrier wave, and described in notice UE confirmed according to the testing result to filling signal or targeting signal first after the unauthorized carrier wave is occupied it is imperfect The position of subframe.
Refering to shown in Figure 21, the embodiment of the invention also provides a kind of method of reseptance of subframe, the implementing procedures of this method It is as follows:
Step 2101:UE receives the data that base station is sent by unauthorized carrier wave.
Wherein, the unauthorized carrier wave is the secondary carrier that the base station is the UE configuration.
Optionally, the UE is before receiving the data that base station is sent by unauthorized carrier wave, it is also possible to can receive institute Stating the filling signal that base station is sent by the unauthorized carrier wave, perhaps the targeting signal filling signal or targeting signal are used In keep the base station to the occupancy of the unauthorized carrier wave and after notifying that unauthorized carrier wave described in the UE is occupied the The position of one imperfect subframe.
Specifically, the UE determines the unauthorized carrier wave by the base station by filling signal or targeting signal detection The method of first imperfect subframe after occupancy are as follows: the UE is filled signal or targeting signal to the unauthorized carrier wave Detection, the subframe confirmation that will test filling signal or targeting signal is after the unauthorized carrier wave is occupied by the base station First imperfect subframe.
And before first imperfect subframe after the UE determines that the unauthorized carrier wave is occupied by the base station, it can Selection of land, the UE are also possible to that the secondary carrier occupancy that the base station is sent by authorization carrier wave or the unauthorized carrier wave can be received Notice, the secondary carrier occupancy notice is used to indicate the base station, and this occupies the initial time of the unauthorized carrier wave.Due to UE received data can will be stored in local from unauthorized carrier wave, therefore the UE is occupied according to the secondary carrier and notified, can To confirm the orthochronous for starting to parse the data sent on unauthorized carrier wave, to parse valid data.
Step 2102: the UE determine the unauthorized carrier wave by the base station occupy after first imperfect subframe, And the splicing subframe with this first imperfect subframe splicing.
Wherein, first imperfect subframe of the unauthorized carrier wave and splicing subframe constitute a complete subframe.
Wherein, the unauthorized carrier-wave transmission that the UE can be sent according to the base station indicates, determines the unauthorized load Wave is by first imperfect subframe after the occupancy of the base station.
For example, first imperfect subframe after being occupied with prespecified unauthorized carrier wave by the base station is to receive The previous subframe of the unauthorized carrier-wave transmission instruction.
Specifically, the embodiment of the present invention can have but be not limited to following two connection scheme:
Scheme one,
The UE determines that the last one imperfect subframe of the unauthorized carrier wave is to splice with first imperfect subframe Splicing subframe.
Specifically, the UE can be according to the position and the base station of first imperfect subframe of the unauthorized carrier wave This occupies the occupancy Duration Information of the unauthorized carrier wave, determines the last one after the unauthorized carrier wave is occupied The position of imperfect subframe, and be the unauthorized load by the subframe confirmation on the position of the last one determining imperfect subframe The imperfect subframe of the last one of wave.
Wherein, the occupancy Duration Information can be configured by the base station and carry to occupy in notice in secondary carrier and sent out The UE is given, the base station side and the user equipment side can also be pre-configured to be in.
Scheme two,
The UE determines that second subframe of the unauthorized carrier wave is splicing with first imperfect subframe splicing Frame.
It should be noted that the UE can only select one of connection scheme, and the UE and the base station simultaneously It makes an appointment using identical connection scheme.
Step 2103: the UE obtains one in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave Coded data in a TTI.
Specifically, the UE obtains one in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave The method of coded data in TTI are as follows: determine the symbol lengths of first imperfect subframe and the length of data symbol first Degree calculates the length of the data symbol of splicing subframe, finally first then according to the symbol lengths of first imperfect subframe The coded data in a TTI is obtained on the data symbol in data symbol and splicing subframe in a imperfect subframe.
For example, UE obtain certain using unauthorized carrier-wave transmission data the occupancy duration (including leading/filling/ Data/control section) it is 6ms, the starting subframe for starting transmission is subframe 2, primary sign is symbol 5 in subframe 2, it is known that this Secondary UE has received 5 complete subframes and former and later two imperfect subframes altogether, and (i.e. first imperfect in subframe 2 by UE Subframe) on occupy symbol 5 totally 10 symbol lengths (including sent out in subframe 2 to symbol 14 (subframe has 14 symbols) Leading/filling/data/the control section sent).If the splicing subframe of subframe 2 is that this occupies last of unauthorized carrier wave A subframe can be confirmed that subframe 8 (i.e. the 7th subframe) is ending subframe by calculating UE, and due to son as shown in figure 11 The sum of frame 2 and the symbol lengths of subframe 8 one is set to 14 symbols, therefore total symbol lengths of subframe 8 are 4 symbols.In subframe 2 Data symbol part is included in the symbol 5 of subframe 2 between symbol 14, and the data symbol part in subframe 8 is included in subframe 8 Symbol 1 is between symbol 4.UE is needed 10 symbols of subframe 2 and 4 symbols of subframe 8 splicing one complete subframe of composition Afterwards, the character position for deducting targeting signal, filling signal and control signal carries out data decoding again later.In addition, if subframe 2 Splicing subframe be this occupy second subframe of unauthorized carrier wave, as shown in figure 12, by calculate UE subframe 3 can be confirmed Symbol lengths in (i.e. second subframe) for splicing are 14-10=4 symbol, then UE is needed preceding 4 symbols of subframe 3 It is decoded with after 10 symbols splicing one complete subframe of composition of subframe 2.Due to that may be wrapped in preceding 4 symbols of subframe 3 N control symbol is contained, n≤3, this n controls the data that symbol is sent on rear 10 symbols of scheduling subframe 3, therefore UE may need to deduct in subframe 2 and the spliced complete subframe of subframe 3 character position of targeting signal and filling signal with And deduct and carry out data decoding again after the position of this n control symbol, and the data UE carried on rear 10 symbols of subframe 3 It needs in addition to be decoded.
In the embodiment of the present invention, the UE can have following two mode determine first of the unauthorized carrier wave not The complete symbol lengths of subframe and the length of data symbol:
The first: the UE is filled the detection of signal or targeting signal to the unauthorized carrier wave, according to inspection in institute State the position that the symbol of filling signal or targeting signal is detected in first imperfect subframe of unauthorized carrier wave, calculate this The symbol that filling signal or targeting signal occupy in the symbol lengths of one imperfect subframe and first imperfect subframe Length, and the symbol lengths that are occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and The length for controlling symbol, calculates the length of the data symbol in first imperfect subframe;Wherein, first imperfect son The symbol lengths of frame include filling signal or targeting signal occupy symbol lengths, control symbol length and data symbol Length.
For example, it is assumed that UE detects targeting signal during S to E symbols of the N subframe of unauthorized carrier wave, In, E >=S and E, S are positive integer, then it is assumed that the N subframe be base station occupy first after the unauthorized carrier wave it is imperfect Subframe, the E+1 symbol to contained between the last symbol of the N subframe data symbol occupancy position, Huo Zheke The position that control symbol occupies can be further included.Under the first connection scheme of the invention, i.e. first imperfect subframe Splicing subframe be base station this when occupying the last one imperfect subframe of unauthorized carrier wave, the E+1 symbol is sub to the N It is the position that data symbol occupies between the last symbol of frame;And under second of connection scheme of the invention, i.e., The splicing subframe of one imperfect subframe be base station this when occupying second subframe of unauthorized carrier wave, the E+1 symbol arrives After having deducted the n position that control symbol occupies between the last symbol of the N subframe, it is only the position of data symbol occupancy It sets.
Second: the UE indicates according to the unauthorized carrier-wave transmission that the base station is sent, and determines the unauthorized carrier wave First imperfect subframe symbol lengths and the data symbol in first imperfect subframe length.
Further, the UE obtains the coded data in a TTI from first imperfect subframe and its splicing subframe Afterwards, it is also necessary to extract corresponding scheduling information and the coded data in first imperfect subframe and its splicing subframe is solved Code.
If the UE determines that the last one imperfect subframe of the unauthorized carrier wave is and the in above-mentioned steps 2102 The splicing subframe of one imperfect subframe splicing, then the UE can based on from the unauthorized carrier wave the last one is imperfect The scheduling information obtained on the PDCCH of subframe is decoded the coded data of acquisition.Alternatively, the UE can be based on from institute The scheduling information obtained on the PDCCH of the corresponding subframe for authorizing carrier wave of the last one imperfect subframe of unauthorized carrier wave is stated, The coded data of acquisition is decoded.Alternatively, the UE can be based on first imperfect son from the unauthorized carrier wave Scheduling information is extracted on frame and the EPDCCH of the last one imperfect subframe, the data in spliced subframe are decoded. Alternatively, the UE can be corresponding with the last one imperfect subframe based on first imperfect subframe from the unauthorized carrier wave Authorization carrier wave subframe EPDCCH on the scheduling information that obtains, the coded data of acquisition is decoded.
If in above-mentioned steps 2102, the UE determine the unauthorized carrier wave second subframe be with first it is endless The splicing subframe of whole subframe splicing, then the UE can be based on first imperfect subframe from the unauthorized carrier wave The scheduling information obtained on PDCCH is decoded the coded data of acquisition.Alternatively, the UE is based on from the unauthorized load The scheduling information obtained on first imperfect subframe of wave and the EPDCCH of second subframe carries out the coded data of acquisition Decoding.
In conclusion technical solution provided in an embodiment of the present invention, by the way that base station to be occupied to the starting after unauthorized carrier wave Imperfect subframe and other subframes between moment and the initial position of next subframe are spliced into a complete subframe, so that one The coded data of a complete subframe can be carried in two imperfect subframes, be can use the imperfect subframe and sent significant figure According to, the service efficiency of unauthorized carrier wave is improved, no matter and the transmission data since on which symbol of imperfect subframe, base It stands all only with the data for shifting to an earlier date precoding one complete subframe, the complete subframe without traversing all is pre-processed, saved The process resource of base station.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from this hair to the embodiment of the present invention The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.

Claims (69)

1. a kind of base station characterized by comprising
Configuration unit, for being the unauthorized carrier wave of user device configuration;
Determination unit, for determining first imperfect subframe after the unauthorized carrier wave is occupied, and with this first The splicing subframe of imperfect subframe splicing;
Coding unit, for being encoded to the data in a TTI;
Transmission unit passes through first imperfect subframe of the unauthorized carrier wave and its splicing for the data after encoding Frame is sent to the user equipment.
2. base station as described in claim 1, which is characterized in that determine that the unauthorized carrier wave is occupied in the determination unit Afterwards, the transmission unit is also used to:
Secondary carrier, which is sent, by authorization carrier wave or the unauthorized carrier wave occupies notice to the user equipment, to notify the use Base station described in the equipment of family this occupy the initial time of the unauthorized carrier wave.
3. base station as claimed in claim 1 or 2, which is characterized in that determining the splicing with first imperfect subframe splicing When subframe, the determination unit is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing; Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
4. base station as claimed in claim 3, which is characterized in that if the determination unit determines the last of the unauthorized carrier wave One imperfect subframe is the splicing subframe with first imperfect subframe splicing;Then
The data after coding are passed through into first imperfect subframe of the unauthorized carrier wave and its splicing in the transmission unit Subframe is sent to before the user equipment, and the determination unit is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave after occupied and this occupancy of the base station The occupancy Duration Information of unauthorized carrier wave determines the last one imperfect subframe after the unauthorized carrier wave is occupied Position;
The transmission unit is specifically used for:
By the data after coding are by the symbol of first imperfect subframe of the unauthorized carrier wave and the last one is imperfect The symbol of subframe is sent to the user equipment.
5. base station as claimed in claim 4, which is characterized in that the occupancy Duration Information is configured and taken by the base station Band occupies in notice in secondary carrier and is sent to the user equipment;Or
The occupancy Duration Information is pre-configured to be in the base station side and the user equipment side.
6. base station as claimed in claim 4, which is characterized in that the base station further include:
Scheduling unit, for the scheduling information of the data to be placed on to the last one imperfect subframe of the unauthorized carrier wave Physical downlink control channel PDCCH on;Alternatively, the scheduling information of the data is placed on the last of the unauthorized carrier wave On the PDCCH of the corresponding subframe for authorizing carrier wave of one imperfect subframe;Alternatively, the scheduling information of the data is placed on institute State first imperfect subframe of unauthorized carrier wave and the enhancing Physical Downlink Control Channel of the last one imperfect subframe On EPDCCH;Alternatively, the scheduling information of the data to be placed on to first imperfect subframe and most of the unauthorized carrier wave On the EPDCCH of the subframe of the corresponding authorization carrier wave of the imperfect subframe of the latter.
7. base station as claimed in claim 3, which is characterized in that if the determination unit determines the second of the unauthorized carrier wave A subframe is the splicing subframe with first imperfect subframe splicing;Then
The data after coding are passed through into first imperfect subframe of the unauthorized carrier wave and its splicing in the transmission unit Subframe is sent to before the user equipment, and the determination unit is specifically used for:
According to the symbol lengths M of first imperfect subframe, the splicing symbol lengths N of second subframe is determined;Wherein, this first The symbol lengths M of a imperfect subframe include filling signal or targeting signal occupy symbol lengths, control symbol length With the length of data symbol, and the sum of M and N be a complete subframe symbol lengths;
The transmission unit is specifically used for:
Data after coding are passed through into the symbol of first imperfect subframe of the unauthorized carrier wave and the preceding N of second subframe A symbol is sent to the user equipment.
8. base station as claimed in claim 7, which is characterized in that the base station further include:
Scheduling unit, for the scheduling information of the data to be placed on to first imperfect subframe of the unauthorized carrier wave On PDCCH;Alternatively, the scheduling information of the data to be placed on to first imperfect subframe and second of the unauthorized carrier wave On the EPDCCH of the top n symbol of a subframe.
9. base station as claimed in claim 7, which is characterized in that the base station further includes scheduling unit:
The scheduling unit is also used to:
It is scheduled the rear M symbol of second subframe of the unauthorized carrier wave as new imperfect subframe, and
The scheduling information for the data dispatched on the rear M symbol of second subframe is placed on the second of the unauthorized carrier wave On the PDCCH of a subframe.
10. the base station as described in any one of claim 1-2, which is characterized in that the data after coding are being sent to institute Before stating user equipment, the transmission unit is also used to:
Filling signal or targeting signal are sent on the unauthorized carrier wave to the user equipment, to keep non-awarding to described It weighs the occupancy of carrier wave and notifies the position of first imperfect subframe after unauthorized carrier wave described in the user equipment is occupied It sets.
11. the base station as described in any one of claim 1-2, which is characterized in that determined in the determination unit described non- After first imperfect subframe after authorizing carrier wave occupied, the transmission unit is also used to:
It sends unauthorized carrier-wave transmission and is indicated to the user equipment, the unauthorized carrier-wave transmission instruction is used to indicate described non- Authorize the length in the position and first imperfect subframe of first imperfect subframe of carrier wave for the data symbol of splicing.
12. a kind of user equipment characterized by comprising
Receiving unit, the data sent for receiving base station by unauthorized carrier wave;
Determination unit, for determining the unauthorized carrier wave by first imperfect subframe after the occupancy of the base station, Yi Jiyu The splicing subframe of this first imperfect subframe splicing;
Acquiring unit, for obtaining a transmission in first imperfect subframe of the unauthorized carrier wave and its splicing subframe Coded data in time interval TTI.
13. user equipment as claimed in claim 12, which is characterized in that in the number that reception base station is sent by unauthorized carrier wave According to before, the receiving unit is also used to:
Receive filling signal that the base station is sent by the unauthorized carrier wave perhaps the targeting signal filling signal or Targeting signal is for keeping the base station to the occupancy of the unauthorized carrier wave and notifying unauthorized described in the user equipment The position of first imperfect subframe after carrier wave is occupied;
In first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station, the determination unit is specific For:
It is filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling signal or targeting signal Subframe confirmation is first imperfect subframe after the unauthorized carrier wave is occupied by the base station.
14. user equipment as described in claim 12 or 13, which is characterized in that determined in the determination unit described unauthorized By before first imperfect subframe after the occupancy of the base station, the receiving unit is also used to carrier wave:
It receives the base station and notice is occupied by the secondary carrier that authorization carrier wave or the unauthorized carrier wave are sent, the secondary carrier accounts for Being used to indicate the base station with notice, this occupies the initial time of the unauthorized carrier wave.
15. user equipment as described in claim 12 or 13, which is characterized in that determining the unauthorized carrier wave by the base When first imperfect subframe after occupying of standing, the determination unit is specifically used for:
The unauthorized carrier-wave transmission instruction sent according to the base station, after determining that the unauthorized carrier wave is occupied by the base station First imperfect subframe.
16. the user equipment as described in any one of claim 12-13, which is characterized in that endless in determination and first When the splicing subframe of whole subframe splicing, the determination unit is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing; Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
17. user equipment as claimed in claim 16, which is characterized in that determine the unauthorized carrier wave the last one not When complete subframe, the determination unit is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave and this described unauthorized load of occupancy of the base station The occupancy Duration Information of wave determines the position of the last one imperfect subframe after the unauthorized carrier wave is occupied, and By the subframe confirmation on the position of the last one determining imperfect subframe be the unauthorized carrier wave the last one is imperfect Subframe.
18. user equipment as claimed in claim 17, which is characterized in that the occupancy Duration Information is matched by the base station It sets and carries to occupy in notice in secondary carrier and be sent to the user equipment;Or
The occupancy Duration Information is pre-configured to be in the base station side and the user equipment side.
19. the user equipment as described in claim 12-13 any one, which is characterized in that the of the unauthorized carrier wave When obtaining the coded data in a TTI in one imperfect subframe and its splicing subframe, the acquiring unit is specifically used for:
Determine the symbol lengths of first imperfect subframe and the length of data symbol;
According to the symbol lengths of first imperfect subframe, the length of the data symbol of splicing subframe is calculated;
The coding in a TTI is obtained on the data symbol in the data symbol and splicing subframe in first imperfect subframe Data.
20. user equipment as claimed in claim 19, which is characterized in that in the symbol for determining first imperfect subframe When length and the length of data symbol, the acquiring unit is specifically used for:
The detection of signal or targeting signal is filled to the unauthorized carrier wave, according at first of the unauthorized carrier wave The position that the symbol of filling signal or targeting signal is detected in imperfect subframe calculates the symbol of first imperfect subframe The symbol lengths that filling signal or targeting signal occupy in length and first imperfect subframe;
The symbol lengths occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and control The length of symbol calculates the length of the data symbol in first imperfect subframe;
Wherein, the symbol lengths of first imperfect subframe include filling signal or targeting signal occupy symbol lengths, Control the length of symbol and the length of data symbol.
21. user equipment as claimed in claim 19, which is characterized in that in the symbol for determining first imperfect subframe When length and the length of data symbol, the acquiring unit is specifically used for:
The unauthorized carrier-wave transmission instruction sent according to the base station, determines first imperfect subframe of the unauthorized carrier wave Symbol lengths and the data symbol in first imperfect subframe length.
22. user equipment as claimed in claim 16, which is characterized in that the determination unit determines the unauthorized carrier wave The last one imperfect subframe is the splicing subframe with first imperfect subframe splicing;Then
The user equipment further include:
Decoding unit, in first imperfect subframe of the unauthorized carrier wave and its splicing subframe in the acquiring unit After the upper coded data obtained in a TTI, the physics based on the last one imperfect subframe from the unauthorized carrier wave The scheduling information obtained on down control channel PDCCH is decoded the coded data of acquisition;Alternatively, being based on from described non- The scheduling information obtained on the PDCCH of the subframe of the corresponding authorization carrier wave of the last one imperfect subframe of carrier wave is authorized, to obtaining The coded data taken is decoded;Alternatively, based on from the unauthorized carrier wave first imperfect subframe and the last one not Scheduling information is extracted on the enhancing Physical Downlink Control Channel EPDCCH of complete subframe, the data in spliced subframe are carried out Decoding;Alternatively, based on first imperfect subframe from the unauthorized carrier wave, imperfect subframe is corresponding awards with the last one The scheduling information obtained on the EPDCCH of the subframe of carrier wave is weighed, the coded data of acquisition is decoded.
23. user equipment as claimed in claim 16, which is characterized in that the determination unit determines the unauthorized carrier wave Second subframe is the splicing subframe with first imperfect subframe splicing;Then
The user equipment further include:
Decoding unit, in first imperfect subframe of the unauthorized carrier wave and its splicing subframe in the acquiring unit After the upper coded data obtained in a TTI, based on from the PDCCH of first imperfect subframe of the unauthorized carrier wave The scheduling information of acquisition is decoded the coded data of acquisition;Alternatively, based on endless from first of the unauthorized carrier wave The scheduling information obtained on the EPDCCH of whole subframe and second subframe, is decoded the coded data of acquisition.
24. a kind of base station characterized by comprising
Processor, for being the unauthorized carrier wave of user device configuration;Determine first after the unauthorized carrier wave is occupied not Complete subframe, and the splicing subframe with this first imperfect subframe splicing;To the data in a Transmission Time Interval TTI It is encoded;
Transceiver passes through first imperfect subframe of the unauthorized carrier wave and its splicing subframe for the data after encoding It is sent to the user equipment.
25. base station as claimed in claim 24, which is characterized in that determine that the unauthorized carrier wave is occupied in the processor Afterwards, the transceiver is also used to:
Secondary carrier, which is sent, by authorization carrier wave or the unauthorized carrier wave occupies notice to the user equipment, to notify the use Base station described in the equipment of family this occupy the initial time of the unauthorized carrier wave.
26. the base station as described in claim 24 or 25, which is characterized in that determining the spelling with first imperfect subframe splicing When connecing subframe, the processor is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing; Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
27. base station as claimed in claim 26, which is characterized in that if the processor determines the last of the unauthorized carrier wave One imperfect subframe is the splicing subframe with first imperfect subframe splicing;Then
The data after coding are passed through into first imperfect subframe of the unauthorized carrier wave and its splicing in the transceiver Frame is sent to before the user equipment, and the processor is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave after occupied and this occupancy of the base station The occupancy Duration Information of unauthorized carrier wave determines the last one imperfect subframe after the unauthorized carrier wave is occupied Position;
The transceiver is specifically used for:
By the data after coding are by the symbol of first imperfect subframe of the unauthorized carrier wave and the last one is imperfect The symbol of subframe is sent to the user equipment.
28. base station as claimed in claim 27, which is characterized in that the occupancy Duration Information is configured simultaneously by the base station It carries to occupy in notice in secondary carrier and is sent to the user equipment;Or
The occupancy Duration Information is pre-configured to be in the base station side and the user equipment side.
29. base station as claimed in claim 27, which is characterized in that the processor is also used to:
The scheduling information of the data is placed on to the physical down control of the last one imperfect subframe of the unauthorized carrier wave On channel PDCCH processed;Alternatively, the scheduling information of the data to be placed on to the last one imperfect son of the unauthorized carrier wave On the PDCCH of the subframe of the corresponding authorization carrier wave of frame;Alternatively, the scheduling information of the data is placed on the unauthorized carrier wave First imperfect subframe and the last one imperfect subframe enhancing Physical Downlink Control Channel EPDCCH on;Alternatively, will The scheduling information of the data is placed on the first imperfect subframe and the last one imperfect subframe of the unauthorized carrier wave On the EPDCCH of the subframe of corresponding authorization carrier wave.
30. base station as claimed in claim 26, which is characterized in that if the processor determines the second of the unauthorized carrier wave A subframe is the splicing subframe with first imperfect subframe splicing;Then
The data after coding are passed through into first imperfect subframe of the unauthorized carrier wave and its splicing in the transceiver Frame is sent to before the user equipment, and the processor is specifically used for:
According to the symbol lengths M of first imperfect subframe, the splicing symbol lengths N of second subframe is determined;Wherein, this first The symbol lengths M of a imperfect subframe include filling signal or targeting signal occupy symbol lengths, control symbol length With the length of data symbol, and the sum of M and N be a complete subframe symbol lengths;
The transceiver is specifically used for:
Data after coding are passed through into the symbol of first imperfect subframe of the unauthorized carrier wave and the preceding N of second subframe A symbol is sent to the user equipment.
31. base station as claimed in claim 30, which is characterized in that the processor is also used to:
The scheduling information of the data is placed on the PDCCH of first imperfect subframe of the unauthorized carrier wave;Alternatively, The scheduling information of the data is placed on to the top n of first imperfect subframe and second subframe of the unauthorized carrier wave On the EPDCCH of symbol.
32. base station as claimed in claim 30, which is characterized in that the processor is also used to:
It is scheduled the rear M symbol of second subframe of the unauthorized carrier wave as new imperfect subframe, and
The scheduling information for the data dispatched on the rear M symbol of second subframe is placed on the second of the unauthorized carrier wave On the PDCCH of a subframe.
33. the base station as described in any one of claim 24-25, which is characterized in that be sent to by the data after coding Before the user equipment, the transceiver is also used to:
Filling signal or targeting signal are sent on the unauthorized carrier wave to the user equipment, to keep non-awarding to described It weighs the occupancy of carrier wave and notifies the position of first imperfect subframe after unauthorized carrier wave described in the user equipment is occupied It sets.
34. the base station as described in any one of claim 24-25, which is characterized in that determined in the processor described non- After first imperfect subframe after authorizing carrier wave occupied, the transceiver is also used to:
It sends unauthorized carrier-wave transmission and is indicated to the user equipment, the unauthorized carrier-wave transmission instruction is used to indicate described non- Authorize the length in the position and first imperfect subframe of first imperfect subframe of carrier wave for the data symbol of splicing.
35. a kind of user equipment characterized by comprising
Transceiver, the data sent for receiving base station by unauthorized carrier wave;
Processor, for determine the unauthorized carrier wave by the base station occupy after first imperfect subframe, and with this The splicing subframe of first imperfect subframe splicing;
The transceiver is also used to, and obtains one in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave Coded data in Transmission Time Interval TTI.
36. user equipment as claimed in claim 35, which is characterized in that in the number that reception base station is sent by unauthorized carrier wave According to before, the transceiver is also used to:
Receive filling signal that the base station is sent by the unauthorized carrier wave perhaps the targeting signal filling signal or Targeting signal is for keeping the base station to the occupancy of the unauthorized carrier wave and notifying unauthorized described in the user equipment The position of first imperfect subframe after carrier wave is occupied;
In first imperfect subframe after determining that the unauthorized carrier wave is occupied by the base station, the processing implement body is used In:
It is filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling signal or targeting signal Subframe confirmation is first imperfect subframe after the unauthorized carrier wave is occupied by the base station.
37. the user equipment as described in claim 35 or 36, which is characterized in that determine the unauthorized load in the processor By before first imperfect subframe after the occupancy of the base station, the transceiver is also used to wave:
It receives the base station and notice is occupied by the secondary carrier that authorization carrier wave or the unauthorized carrier wave are sent, the secondary carrier accounts for Being used to indicate the base station with notice, this occupies the initial time of the unauthorized carrier wave.
38. the user equipment as described in claim 35 or 36, which is characterized in that determining the unauthorized carrier wave by the base When first imperfect subframe after occupying of standing, the processor is specifically used for:
The unauthorized carrier-wave transmission instruction sent according to the base station, after determining that the unauthorized carrier wave is occupied by the base station First imperfect subframe.
39. the user equipment as described in any one of claim 35-36, which is characterized in that endless in determination and first When the splicing subframe of whole subframe splicing, the processor is specifically used for:
The last one the imperfect subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing; Or
Second subframe for determining the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
40. user equipment as claimed in claim 39, which is characterized in that determine the unauthorized carrier wave the last one not When complete subframe, the processor is specifically used for:
According to the position of first imperfect subframe of the unauthorized carrier wave and this described unauthorized load of occupancy of the base station The occupancy Duration Information of wave determines the position of the last one imperfect subframe after the unauthorized carrier wave is occupied, and By the subframe confirmation on the position of the last one determining imperfect subframe be the unauthorized carrier wave the last one is imperfect Subframe.
41. user equipment as claimed in claim 40, which is characterized in that the occupancy Duration Information is matched by the base station It sets and carries to occupy in notice in secondary carrier and be sent to the user equipment;Or
The occupancy Duration Information is pre-configured to be in the base station side and the user equipment side.
42. the user equipment as described in claim 35-36 any one, which is characterized in that the of the unauthorized carrier wave When obtaining the coded data in a TTI in one imperfect subframe and its splicing subframe, the processor is specifically used for:
Determine the symbol lengths of first imperfect subframe and the length of data symbol;
According to the symbol lengths of first imperfect subframe, the length of the data symbol of splicing subframe is calculated;
The coding in a TTI is obtained on the data symbol in the data symbol and splicing subframe in first imperfect subframe Data.
43. user equipment as claimed in claim 42, which is characterized in that in the symbol for determining first imperfect subframe When length and the length of data symbol, the processor is specifically used for:
The detection of signal or targeting signal is filled to the unauthorized carrier wave, according at first of the unauthorized carrier wave The position that the symbol of filling signal or targeting signal is detected in imperfect subframe calculates the symbol of first imperfect subframe The symbol lengths that filling signal or targeting signal occupy in length and first imperfect subframe;
The symbol lengths occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and control The length of symbol calculates the length of the data symbol in first imperfect subframe;
Wherein, the symbol lengths of first imperfect subframe include filling signal or targeting signal occupy symbol lengths, Control the length of symbol and the length of data symbol.
44. user equipment as claimed in claim 42, which is characterized in that in the symbol for determining first imperfect subframe When length and the length of data symbol, the processor is specifically used for:
The unauthorized carrier-wave transmission instruction sent according to the base station, determines first imperfect subframe of the unauthorized carrier wave Symbol lengths and the data symbol in first imperfect subframe length.
45. user equipment as claimed in claim 39, which is characterized in that the processor determines the unauthorized carrier wave most The imperfect subframe of the latter is the splicing subframe with first imperfect subframe splicing;Then at first of the unauthorized carrier wave After obtaining the coded data in a TTI in imperfect subframe and its splicing subframe, the processor is also used to:
Based on the tune obtained from the physical downlink control channel PDCCH of the last one imperfect subframe of the unauthorized carrier wave Information is spent, the coded data of acquisition is decoded;Alternatively, based on the last one imperfect subframe from the unauthorized carrier wave The scheduling information obtained on the PDCCH of the subframe of corresponding authorization carrier wave, is decoded the coded data of acquisition;Alternatively, base Letter is controlled in the enhancing physical down of first imperfect subframe and the last one imperfect subframe from the unauthorized carrier wave Scheduling information is extracted on road EPDCCH, the data in spliced subframe are decoded;Alternatively, being based on from the unauthorized load It is obtained on the EPDCCH of first imperfect subframe of wave subframe for authorizing carrier wave corresponding with the last one imperfect subframe Scheduling information is decoded the coded data of acquisition.
46. user equipment as claimed in claim 39, which is characterized in that the processor determines the of the unauthorized carrier wave Two subframes are the splicing subframe with first imperfect subframe splicing;Then
The unauthorized carrier wave first imperfect subframe and its splicing subframe on obtain a TTI in coded data it Afterwards, the processor is also used to:
Based on the scheduling information obtained from the PDCCH of first imperfect subframe of the unauthorized carrier wave, to the volume of acquisition Code data are decoded;Alternatively, based on first imperfect subframe and second subframe from the unauthorized carrier wave The scheduling information obtained on EPDCCH is decoded the coded data of acquisition.
47. a kind of sending method of subframe characterized by comprising
Base station is the unauthorized carrier wave of user device configuration;
The base station determines first imperfect subframe after the unauthorized carrier wave is occupied, and with this first it is imperfect The splicing subframe of subframe splicing;
The base station encodes the data in a Transmission Time Interval TTI;
Data after coding are passed through first imperfect subframe of the unauthorized carrier wave and its splicing subframe hair by the base station Give the user equipment.
48. method as claimed in claim 47, which is characterized in that after the base station determines that the unauthorized carrier wave is occupied, Further include:
The base station sends secondary carrier by authorization carrier wave or the unauthorized carrier wave and occupies notice to the user equipment, with logical Knowing base station described in the user equipment, this occupies the initial time of the unauthorized carrier wave.
49. the method as described in claim 47 or 48, which is characterized in that the base station is determined spells with first imperfect subframe The splicing subframe connect, comprising:
The base station determines that the last one imperfect subframe of the unauthorized carrier wave is and first imperfect subframe splicing Splice subframe;Or
The base station determines that second subframe of the unauthorized carrier wave is the splicing subframe with first imperfect subframe splicing.
50. method as claimed in claim 49, which is characterized in that if the base station determines last of the unauthorized carrier wave A imperfect subframe is the splicing subframe with first imperfect subframe splicing;Then
Data after coding are passed through first imperfect subframe of the unauthorized carrier wave and its splicing subframe hair by the base station Give the user equipment, comprising:
The position and the base station of first imperfect subframe of the base station according to the unauthorized carrier wave after occupied this The occupancy Duration Information for occupying the unauthorized carrier wave, determine after the unauthorized carrier wave is occupied the last one is endless The position of whole subframe;
The base station by the data after coding by the symbol of first imperfect subframe of the unauthorized carrier wave and last The symbol of a imperfect subframe is sent to the user equipment.
51. method as claimed in claim 50, which is characterized in that the occupancy Duration Information is configured simultaneously by the base station It carries to occupy in notice in secondary carrier and is sent to the user equipment;Or
The occupancy Duration Information is pre-configured to be in the base station side and the user equipment side.
52. method as claimed in claim 50, which is characterized in that the method also includes:
The scheduling information of the data is placed on the object of the last one imperfect subframe of the unauthorized carrier wave by the base station It manages on down control channel PDCCH;Or
The last one imperfect subframe that the scheduling information of the data is placed on the unauthorized carrier wave by the base station is corresponding Authorization carrier wave subframe PDCCH on;Or
The scheduling information of the data is placed on first imperfect subframe of the unauthorized carrier wave and last by the base station On the enhancing Physical Downlink Control Channel EPDCCH of one imperfect subframe;Or
The scheduling information of the data is placed on first imperfect subframe of the unauthorized carrier wave and last by the base station On the EPDCCH of the corresponding subframe for authorizing carrier wave of one imperfect subframe.
53. method as claimed in claim 49, which is characterized in that if the base station determines second of the unauthorized carrier wave Subframe is the splicing subframe with the imperfect frame splicing of first son;Then
Data after coding are passed through first imperfect subframe of the unauthorized carrier wave and its splicing subframe hair by the base station Give the user equipment, comprising:
The base station determines the splicing symbol lengths N of second subframe according to the symbol lengths M of first imperfect subframe;Its In, the symbol lengths M of first imperfect subframe includes symbol lengths, the command character that filling signal or targeting signal occupy Number length and data symbol length, and the sum of M and N be a complete subframe symbol lengths;
Data after coding are passed through the symbol of first imperfect subframe of the unauthorized carrier wave and second by the base station The top n symbol of subframe is sent to the user equipment.
54. method as claimed in claim 53, which is characterized in that the method also includes:
The scheduling information of the data is placed on the PDCCH of first imperfect subframe of the unauthorized carrier wave by the base station On;Or
The scheduling information of the data is placed on first imperfect subframe and second of the unauthorized carrier wave by the base station On the EPDCCH of the top n symbol of a subframe.
55. method as claimed in claim 53, which is characterized in that the method also includes:
It is adjusted the rear M symbol of second subframe of the unauthorized carrier wave as new imperfect subframe the base station Degree, and
The scheduling information for the data dispatched on the rear M symbol of second subframe is placed on the second of the unauthorized carrier wave On the PDCCH of a subframe.
56. the method as described in any one of claim 47-48, which is characterized in that the base station is by the data after coding It is sent to before the user equipment, further includes:
The base station sends filling signal or targeting signal to the user equipment, with holding pair on the unauthorized carrier wave The occupancy of the unauthorized carrier wave and notify first after unauthorized carrier wave described in the user equipment is occupied it is imperfect The position of subframe.
57. the method as described in any one of claim 47-48, which is characterized in that the base station determines described unauthorized After first imperfect subframe after carrier wave is occupied, further includes:
The base station sends unauthorized carrier-wave transmission and is indicated to the user equipment, and the unauthorized carrier-wave transmission instruction is for referring to Show the data symbols in the position and first imperfect subframe of first imperfect subframe of the unauthorized carrier wave for splicing Number length.
58. a kind of method of reseptance of subframe characterized by comprising
User equipment receives the data that base station is sent by unauthorized carrier wave;
The user equipment determine the unauthorized carrier wave by the base station occupy after first imperfect subframe, and with this The splicing subframe of first imperfect subframe splicing;
The user equipment obtains a transmission in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave Coded data in time interval TTI.
59. method as claimed in claim 58, which is characterized in that user equipment receives what base station was sent by unauthorized carrier wave Before data, further includes:
The user equipment receives the filling signal or targeting signal that the base station is sent by the unauthorized carrier wave, described Filling signal or targeting signal are for keeping the base station to the occupancy of the unauthorized carrier wave and the user being notified to set The position of first imperfect subframe after the standby unauthorized carrier wave is occupied;
The user equipment determines the unauthorized carrier wave by first imperfect subframe after the occupancy of the base station, comprising:
The user equipment is filled the detection of signal or targeting signal to the unauthorized carrier wave, will test filling signal Or the subframe confirmation of targeting signal is first imperfect subframe after the unauthorized carrier wave is occupied by the base station.
60. the method as described in claim 58 or 59, which is characterized in that the user equipment determines the unauthorized carrier wave quilt Before first imperfect subframe after the base station occupancy, further includes:
The user equipment receives the base station and occupies notice by the secondary carrier that authorization carrier wave or the unauthorized carrier wave are sent, The secondary carrier occupancy notice is used to indicate the base station, and this occupies the initial time of the unauthorized carrier wave.
61. the method as described in claim 58 or 59, which is characterized in that the user equipment determines the unauthorized carrier wave quilt First imperfect subframe after the base station occupancy, comprising:
The user equipment is indicated according to the unauthorized carrier-wave transmission that the base station is sent, and determines that the unauthorized carrier wave is described First imperfect subframe after the occupancy of base station.
62. the method as described in any one of claim 58-59, which is characterized in that the user equipment determines and first The splicing subframe of a imperfect subframe splicing, comprising:
The user equipment determines that the last one imperfect subframe of the unauthorized carrier wave is to spell with first imperfect subframe The splicing subframe connect;Or
The user equipment determines that second subframe of the unauthorized carrier wave is the splicing with first imperfect subframe splicing Subframe.
63. method as claimed in claim 62, which is characterized in that the user equipment determines the last of the unauthorized carrier wave One imperfect subframe, comprising:
The user equipment is according to the position of first imperfect subframe of the unauthorized carrier wave and this occupancy of the base station The occupancy Duration Information of the unauthorized carrier wave determines the last one imperfect son after the unauthorized carrier wave is occupied The position of frame, and be the last of the unauthorized carrier wave by the subframe confirmation on the position of the last one determining imperfect subframe One imperfect subframe.
64. the method as described in claim 63, which is characterized in that the occupancy Duration Information is configured simultaneously by the base station It carries to occupy in notice in secondary carrier and is sent to the user equipment;Or
The occupancy Duration Information is pre-configured to be in the base station side and the user equipment side.
65. the method as described in claim 58-59 any one, which is characterized in that the user equipment is described unauthorized The coded data in a Transmission Time Interval TTI is obtained in the first imperfect subframe and its splicing subframe of carrier wave, comprising:
The user equipment determines the symbol lengths of first imperfect subframe and the length of data symbol;
The user equipment calculates the length of the data symbol of splicing subframe according to the symbol lengths of first imperfect subframe;
The user equipment obtains one on the data symbol in the data symbol and splicing subframe in first imperfect subframe Coded data in a TTI.
66. the method as described in claim 65, which is characterized in that the user equipment determines first imperfect subframe Symbol lengths and data symbol length, comprising:
The user equipment is filled the detection of signal or targeting signal to the unauthorized carrier wave, according to described unauthorized The position that the symbol of filling signal or targeting signal is detected in first imperfect subframe of carrier wave, calculate this first it is endless The symbol lengths that filling signal or targeting signal occupy in the symbol lengths of whole subframe and first imperfect subframe, and
The symbol lengths occupied according to the symbol lengths, filling signal or targeting signal of first imperfect subframe and control The length of symbol calculates the length of the data symbol in first imperfect subframe;
Wherein, the symbol lengths of first imperfect subframe include filling signal or targeting signal occupy symbol lengths, Control the length of symbol and the length of data symbol.
67. the method as described in claim 65, which is characterized in that the user equipment determines first imperfect subframe Symbol lengths and data symbol length, comprising:
The user equipment is indicated according to the unauthorized carrier-wave transmission that the base station is sent, and determines the first of the unauthorized carrier wave The length of the symbol lengths of a imperfect subframe and the data symbol in first imperfect subframe.
68. method as claimed in claim 62, which is characterized in that the user equipment determines the last of the unauthorized carrier wave One imperfect subframe is the splicing subframe with first imperfect subframe splicing;Then
The user equipment obtains a transmission in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave After coded data in time interval TTI, further includes:
Physical Downlink Control Channel of the user equipment based on the last one imperfect subframe from the unauthorized carrier wave The scheduling information obtained on PDCCH is decoded the coded data of acquisition;Or
The user equipment is based on the corresponding subframe for authorizing carrier wave of the last one imperfect subframe from the unauthorized carrier wave PDCCH on the scheduling information that obtains, the coded data of acquisition is decoded;Or
The user equipment is based on the first imperfect subframe and the last one imperfect subframe from the unauthorized carrier wave Scheduling information is extracted on enhancing Physical Downlink Control Channel EPDCCH, the data in spliced subframe are decoded;Or
The user equipment is based on the first imperfect subframe and the last one imperfect subframe pair from the unauthorized carrier wave The scheduling information obtained on the EPDCCH of the subframe for the authorization carrier wave answered, is decoded the coded data of acquisition.
69. method as claimed in claim 62, which is characterized in that the user equipment determines the second of the unauthorized carrier wave A subframe is the splicing subframe with first imperfect subframe splicing;Then
The user equipment obtains a transmission in the first imperfect subframe and its splicing subframe of the unauthorized carrier wave After coded data in time interval TTI, further includes:
The user equipment is based on the scheduling letter obtained from the PDCCH of first imperfect subframe of the unauthorized carrier wave Breath, is decoded the coded data of acquisition;Or
The user equipment is based on from the EPDCCH of first imperfect subframe of the unauthorized carrier wave and second subframe The scheduling information of acquisition is decoded the coded data of acquisition.
CN201580002051.0A 2015-01-31 2015-01-31 A kind of method of sending and receiving of subframe, base station and user equipment Active CN106031273B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/072062 WO2016119266A1 (en) 2015-01-31 2015-01-31 Subframe sending and receiving methods, base station, and user equipment

Publications (2)

Publication Number Publication Date
CN106031273A CN106031273A (en) 2016-10-12
CN106031273B true CN106031273B (en) 2019-08-27

Family

ID=56542259

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580002051.0A Active CN106031273B (en) 2015-01-31 2015-01-31 A kind of method of sending and receiving of subframe, base station and user equipment

Country Status (2)

Country Link
CN (1) CN106031273B (en)
WO (1) WO2016119266A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11070407B2 (en) * 2017-03-24 2021-07-20 Apple Inc. Partial uplink subframe transmissions on unlicensed carriers
CN108809566A (en) * 2017-05-04 2018-11-13 株式会社Ntt都科摩 The transmission of imperfect subframe and demodulation method, corresponding user equipment and base station
CN109906573B (en) * 2019-02-01 2021-11-02 北京小米移动软件有限公司 Transmission format determining method, device, base station, terminal and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102421131A (en) * 2011-07-26 2012-04-18 展讯通信(上海)有限公司 Mobile terminal, method and device for detecting FCCH (Frequency Correction Channel) frame
CN104301273A (en) * 2014-08-25 2015-01-21 中兴通讯股份有限公司 Method and base station for transmitting and receiving signals by using unauthorized carrier waves and user equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102137500B (en) * 2010-01-26 2013-10-02 华为技术有限公司 Method, base station and system for data transmission
WO2012141462A2 (en) * 2011-04-11 2012-10-18 엘지전자 주식회사 Method and device for transmitting reception acknowledgement information in a mobile communication system
US8923197B2 (en) * 2011-06-01 2014-12-30 Samsung Electronics Co., Ltd. Methods and apparatus to transmit and receive synchronization signal and system information in a wireless communication system
US9854446B2 (en) * 2011-07-07 2017-12-26 Lg Electronics Inc. Method and apparatus for transmitting a signal in a wireless communication system
CN103024770A (en) * 2011-09-21 2013-04-03 意法-爱立信有限公司 Dual-mode terminal and measuring method thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102421131A (en) * 2011-07-26 2012-04-18 展讯通信(上海)有限公司 Mobile terminal, method and device for detecting FCCH (Frequency Correction Channel) frame
CN104301273A (en) * 2014-08-25 2015-01-21 中兴通讯股份有限公司 Method and base station for transmitting and receiving signals by using unauthorized carrier waves and user equipment

Also Published As

Publication number Publication date
WO2016119266A1 (en) 2016-08-04
CN106031273A (en) 2016-10-12

Similar Documents

Publication Publication Date Title
CN103392369B (en) Communication means and device for carrier aggregation system
CN105634666B (en) A kind of data transmission method and device in unauthorized frequency range
CN105515747B (en) Distribution method of time frequency resources, device and the base station of resource request instruction information
CN108029119A (en) Method and related wireless terminal and the network node that the UL of configuration of territory when including is authorized are provided
CN102932950B (en) A kind of method and apparatus of Stochastic accessing in secondary cell
CN105515741A (en) Data transmission method in unlicensed frequency band and data transmission device
CN105874862B (en) A kind of method and apparatus that data are sent
CN105264997B (en) A kind of method, equipment and the system of data transmission
CN106060933A (en) Base station, user equipment, transmission control method for the base station and data transmission method for the user equipment
CN106031273B (en) A kind of method of sending and receiving of subframe, base station and user equipment
CN103167594A (en) Uplink transmitting power control method and user equipment
CN101835261B (en) Carrier aggregation system as well as channel transmission method, user equipment and base station therein
CN109005596A (en) A kind of method and apparatus of Competition adjustment window length
CN108605366A (en) Use the synchronization between the sending node of shared radio frequency frequency spectrum
CN105453470B (en) For transmitting the user apparatus and method of data
CN103906242B (en) A kind of wireless communications method, system and base station and user equipment
CN104717757B (en) A kind of data communications method, system and device
CN105453469B (en) Communication system, infrastructure equipment and method
CN110535608A (en) Uplink transmission resource determines methods, devices and systems
CN107295676A (en) Data transmission method and device
CN108023706A (en) Response message feedback method, base station and user equipment without authorized transmissions
CN106341891A (en) Data transmission method, client device and server device
CN109413745A (en) Uplink data transmission method in a kind of ofdm system
CN107846707A (en) A kind of method and apparatus in the UE for exempting to authorize, base station
CN105828448A (en) Channel occupation method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant