CN107548070A - Data transmission method, apparatus and system - Google Patents
Data transmission method, apparatus and system Download PDFInfo
- Publication number
- CN107548070A CN107548070A CN201610482725.8A CN201610482725A CN107548070A CN 107548070 A CN107548070 A CN 107548070A CN 201610482725 A CN201610482725 A CN 201610482725A CN 107548070 A CN107548070 A CN 107548070A
- Authority
- CN
- China
- Prior art keywords
- data
- resource
- frequency range
- unauthorized
- allocation result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 168
- 238000000034 method Methods 0.000 title claims abstract description 80
- 238000012546 transfer Methods 0.000 claims abstract description 101
- 238000009826 distribution Methods 0.000 claims description 75
- 238000001514 detection method Methods 0.000 claims description 46
- 238000004891 communication Methods 0.000 claims description 29
- 235000013399 edible fruits Nutrition 0.000 claims description 2
- 238000013468 resource allocation Methods 0.000 description 14
- 238000010586 diagram Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000003993 interaction Effects 0.000 description 3
- 238000001228 spectrum Methods 0.000 description 3
- 239000002699 waste material Substances 0.000 description 3
- 241001269238 Data Species 0.000 description 2
- 230000001174 ascending effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000010267 cellular communication Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000002245 particle Substances 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
Abstract
The invention provides a kind of data transmission method, apparatus and system, wherein, this method includes:The data transfer request that one or more source device reports is received, wherein, data transfer request is used for the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;It is respectively that one or more source device distributes the unauthorized resource of frequency range according to data transfer request, obtains the allocation result of the unauthorized resource of frequency range;Allocation result is issued, wherein, source device and/or purpose equipment transmit D2D data according to allocation result in unauthorized frequency range, solve the problems, such as that D2D data can not realize transmission of the D2D data in unauthorized frequency range in unauthorized band transmissions in correlation technique.
Description
Technical field
The present invention relates to the communications field, in particular to a kind of data transmission method, apparatus and system.
Background technology
In the cell mobile communication systems centered on base station, there are still covering and capacity etc. to ask for system
Topic.Numerous studies show that device-to-device (Device-to-Device, referred to as D2D) communication is saving resource, reducing interference
There is advantageous advantage with efficiency of transmission etc. is lifted.In D2D communication modes, data friendship is directly carried out between user
Mutually without by base station, base station only needs control device communication on a macro scale.In consideration of it, D2D technologies are combined with LTE system,
The communication load of base station can be greatly reduced, the coverage of cell is expanded and improves the Service Quality of Cell Edge User
Amount, so as to improve the total throughout of cell.
It is improper deep with D2D-LTE technical research, to LTE/LTE-A cellular communication systems and the D2D communication technologys
Resource allocation methods also emerge in an endless stream.But the resource allocation methods of the D2D communication technologys are to authorize frequency range to carry out at present.
However, with widespread deployment of the forth generation GSM in the whole world, LTE spectrum utilization gradually reaches bottleneck, further carried
Height authorizes the utilization rate of frequency spectrum to need the technological innovation of essence or thoroughly carry out the upgrading of hardware device, and cost is too big.
Can not be the unauthorized band transmissions the problem of for D2D data in correlation technique, there is presently no efficiently solve
Scheme.
The content of the invention
The embodiments of the invention provide a kind of data transmission method, apparatus and system, at least to solve D2D in correlation technique
Data can not be the unauthorized band transmissions the problem of.
According to one embodiment of present invention, there is provided a kind of data transmission method, including:Receive one or more source
The data transfer request that equipment reports, wherein, the data transfer request is used to set with purpose to base station requests transmission sources equipment
Device-to-device D2D data between standby;It is respectively one or more of source devices point according to the data transfer request
With the unauthorized resource of frequency range, the allocation result of the unauthorized resource of frequency range is obtained;The allocation result is issued, wherein, it is described
Source device and/or the purpose equipment transmit the D2D data according to the allocation result in unauthorized frequency range.
Alternatively, issuing the allocation result includes:The allocation result is issued to one or more of source devices
With one or more of source devices corresponding to purpose equipment;Or the allocation result is issued to one or more of
Source device.
Alternatively, the allocation result is being issued to one or more of source devices and one or more of sources
In the case of purpose equipment corresponding to equipment, the allocation result includes:For the unauthorized resource of frequency range of each source device distribution
The Resource Block identification of block and for being controlled to the data transmitted on the unauthorized resource of frequency range block first control letter
Breath, wherein, the Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;The allocation result is being issued to institute
In the case of stating one or more source device, the allocation result includes:For the unauthorized frequency range money of each source device distribution
The Resource Block identification of source block, wherein, the Resource Block identification is used for unauthorized resource of frequency range block described in unique mark.
Alternatively, the time slot of the communication frame in the unauthorized frequency range includes at least one of:Dedicated time slot, it is standby when
Gap, shared time slot.
Alternatively, it is that one or more of source devices distribute the unauthorized resource of frequency range according to the data transfer request
Including:The second control letter that the transmission being used for the D2D data according to being carried in the data transfer request is controlled
Breath is defined as the ratio of the resource of each source device distribution, wherein, the resource includes at least one of:Dedicated time slot provides
Source, spare time slot resource, shared time interval resource;According to the ratio of the resource of determination and each data transfer request
Second control information of middle carrying is the resource block that each source device is distributed on the dedicated time slot and/or spare time slot.
Alternatively, before the allocation result is issued, methods described also includes:First is carried out to the unauthorized frequency range
Clear channel assessment (CCA) CCA is detected;In the case of the first CCA detections successfully, confirm to take the unauthorized frequency range.
According to another embodiment of the invention, there is provided a kind of data transmission method, including:Data are sent to base station to pass
Defeated request, wherein, the data transfer request is used to ask the device-to-device D2D numbers between transmission sources equipment and purpose equipment
According to;Receive the allocation result for the unauthorized resource of frequency range that the base station issues;According to the allocation result in unauthorized frequency range
The D2D data are sent to the purpose equipment.
Alternatively, the allocation result includes:To transmit the resource of the unauthorized resource of frequency range block of the D2D data distributions
Block identification and the first control information for being controlled to the data transmitted on the unauthorized resource of frequency range block, wherein,
The Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;Or the allocation result includes:For the source
The Resource Block identification of the unauthorized resource of frequency range block of equipment distribution, wherein, the Resource Block identification is used for non-described in unique mark
Authorize resource of frequency range block.
Alternatively, include in the allocation result:In the case of the Resource Block identification and first control information, root
Sending the D2D data in the unauthorized frequency range according to the allocation result includes:Non- corresponding to the Resource Block identification
Authorize and the D2D data are sent according to the instruction of first control information in the resource of frequency range.
Alternatively, include in the allocation result:In the case of the Resource Block identification, according to the allocation result in institute
State and the D2D data are sent in unauthorized frequency range include:Sent corresponding to the Resource Block identification in the unauthorized resource of frequency range
For the 3rd control information being controlled to transmission of the D2D data in the unauthorized frequency range and the D2D data.
Alternatively, the time slot of the communication frame in the unauthorized frequency range includes at least one of:Dedicated time slot, it is standby when
Gap, shared time slot;The allocation result includes:To transmit the resource block mark on the dedicated time slot of the D2D data distributions
Know and/or to transmit the Resource Block identification on the spare time slot of the D2D data distributions.
Alternatively, sending the D2D data in the unauthorized frequency range according to the allocation result includes:In distribution
Second is carried out to the dedicated time slot resource block on dedicated time slot resource block corresponding to Resource Block identification on the dedicated time slot
CCA is detected;In the case of the 2nd CCA detections successfully, the D2D data are sent on the dedicated time slot resource block.
Alternatively, it is right on the dedicated time slot resource block corresponding to the Resource Block identification on the dedicated time slot of distribution
After the dedicated time slot resource block carries out the 2nd CCA detections, methods described also includes:Detect and lose in the 2nd CCA
In the case of losing, to described standby on spare time slot resource block corresponding to the Resource Block identification on the spare time slot of distribution
Time interval resource block carries out the 3rd CCA detections of pre-set priority;It is pre- waiting in the case of the 3rd CCA detection failures
If the 3rd CCA detections of the pre-set priority are re-started after duration to the spare time slot resource block;Or described
In the case of three CCA detections successfully, the source device transmits the D2D data on the spare time slot resource block.
Alternatively, the pre-set priority is higher than the priority that the CCA of base station side is detected, and/or, the pre-set priority
For the limit priority of equipment side.
Alternatively, corresponding to the Resource Block identification on the spare time slot of distribution on spare time slot resource block to described
After spare time slot resource block carries out the 3rd CCA detections of pre-set priority, methods described also includes:When the source device is in institute
When stating the transmission that the D2D data are not completed on spare time slot resource block, the D2D data are completed on the shared time slot
Transmission.
According to another embodiment of the invention, there is provided a kind of data transmission method, including:Reception base station issues non-
Authorize the allocation result of the resource of frequency range or for being controlled to transmission of the device-to-device D2D data in unauthorized frequency range
The 3rd control information;The D2D is received in unauthorized frequency range according to the allocation result or the 3rd control information
Data.
Alternatively, the D2D data are received in unauthorized frequency range according to the allocation result includes:In the distribution knot
Detected on the unauthorized resource of frequency range block of fruit instruction and receive the D2D data.
Alternatively, the D2D data are received in unauthorized frequency range according to the 3rd control information includes:According to described
3rd control information judges whether to receive the D2D data;In the case where judging to receive the D2D data, described
Detected on the unauthorized resource of frequency range block of three control information instruction and receive the D2D data.
According to another embodiment of the invention, there is provided a kind of data transmission device, including:First receiving module, use
In receiving the data transfer request that reports of one or more source device, wherein, the data transfer request is used for please to base station
Seek the device-to-device D2D data between transmission sources equipment and purpose equipment;Distribute module, for being asked according to the data transfer
Ask respectively one or more of source devices to distribute the unauthorized resource of frequency range, obtain the distribution of the unauthorized resource of frequency range
As a result;Module is issued, for issuing the allocation result, wherein, the source device and/or the purpose equipment are according to described point
The D2D data are transmitted in unauthorized frequency range with result.
Alternatively, the module that issues is used for:The allocation result is issued to one or more of source devices and institute
State purpose equipment corresponding to one or more source device;Or the allocation result is issued to one or more of sources
Equipment.
Alternatively, it is used to issue the allocation result to one or more of source devices and institute in the module that issues
In the case of stating purpose equipment corresponding to one or more source device, the allocation result includes:Distributed for each source device
The Resource Block identification of unauthorized resource of frequency range block and for being controlled to the data transmitted on the unauthorized resource of frequency range block
First control information of system, wherein, the Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;Under described
Hair module is used in the case of issuing the allocation result to one or more of source devices, and the allocation result includes:
The Resource Block identification of unauthorized resource of frequency range block is distributed for each source device, wherein, the Resource Block identification is used for unique mark
The unauthorized resource of frequency range block.
According to another embodiment of the invention, there is provided a kind of data transmission device, including:First sending module, use
In sending data transfer request to base station, wherein, the data transfer request be used to asking transmission sources equipment and purpose equipment it
Between device-to-device D2D data;Second receiving module, the distribution of the unauthorized resource of frequency range issued for receiving the base station
As a result;Second sending module, for sending the D2D to the purpose equipment in unauthorized frequency range according to the allocation result
Data.
Alternatively, the allocation result includes:To transmit the resource of the unauthorized resource of frequency range block of the D2D data distributions
Block identification and the first control information for being controlled to the data transmitted on the unauthorized resource of frequency range block, wherein,
The Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;Or the allocation result includes:For the source
The Resource Block identification of the unauthorized resource of frequency range block of equipment distribution, wherein, the Resource Block identification is used for non-described in unique mark
Authorize resource of frequency range block.
Alternatively, second sending module is used for:Include in the allocation result:The Resource Block identification and described
In the case of one control information, corresponding to the Resource Block identification in the unauthorized resource of frequency range according to first control information
Instruction send the D2D data.
Alternatively, second sending module is used for:Include in the allocation result:The situation of the Resource Block identification
Under, it is used for being sent corresponding to the Resource Block identification in the unauthorized resource of frequency range to the D2D data in the unauthorized frequency
The 3rd control information and the D2D data that transmission in section is controlled.
According to another embodiment of the invention, there is provided a kind of data transmission device, including:3rd receiving module, use
In receive the allocation result of the unauthorized resource of frequency range that base station issues or for device-to-device D2D data in unauthorized frequency
The 3rd control information that transmission in section is controlled;4th receiving module, for according to the allocation result or described
Three control information receive the D2D data in unauthorized frequency range.
Alternatively, the 4th receiving module is used for:Examined on the unauthorized resource of frequency range block of allocation result instruction
Survey and receive the D2D data.
Alternatively, the 4th receiving module is used for:Judge whether to receive the D2D numbers according to the 3rd control information
According to;In the case where judging to receive the D2D data, on the unauthorized resource of frequency range block of the 3rd control information instruction
Detect and receive the D2D data.
According to another embodiment of the invention, there is provided a kind of data transmission system, including:Base station, source device and mesh
Equipment, wherein, the base station, the data transfer request reported for receiving one or more described source device, wherein, institute
Data transfer request is stated to be used for the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;According to
The data transfer request is respectively that one or more of source devices distribute the unauthorized resource of frequency range, is obtained described unauthorized
The allocation result of the resource of frequency range;The allocation result is issued, wherein, the source device and/or the purpose equipment are according to
Allocation result transmits the D2D data in unauthorized frequency range;The source device, passed for sending the data to the base station
Defeated request;Receive the allocation result for the unauthorized resource of frequency range that the base station issues;According to the allocation result in unauthorized frequency
Purpose equipment described in Duan Shangxiang sends the D2D data;The purpose equipment, the unauthorized frequency issued for receiving the base station
Duan Ziyuan allocation result or for being controlled to transmission of the D2D data in unauthorized frequency range the 3rd control letter
Breath;The D2D data are received in unauthorized frequency range according to the allocation result or the 3rd control information.
Alternatively, the base station is used for:The allocation result is issued to one or more of source devices and described one
Purpose equipment corresponding to individual or multiple source devices;Or the allocation result is issued to one or more of source devices.
Alternatively, it is used to issue the allocation result to one or more of source devices and described one in the base station
In the case of purpose equipment corresponding to individual or multiple source devices, the allocation result includes:Awarded for the distribution of each source device is non-
Weigh the Resource Block identification of resource of frequency range block and for being controlled to the data transmitted on the unauthorized resource of frequency range block
First control information, wherein, the Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;Used in the base station
In the case of the allocation result to one or more of source devices are issued, the allocation result includes:For each source
Equipment distributes the Resource Block identification of unauthorized resource of frequency range block, wherein, the Resource Block identification is used for non-described in unique mark award
Weigh resource of frequency range block.
Alternatively, the source device is used for:Include in the allocation result:The Resource Block identification and first control
In the case of information, corresponding to the Resource Block identification in the unauthorized resource of frequency range according to the instruction of first control information
Send the D2D data.
Alternatively, the source device is used for:Include in the allocation result:In the case of the Resource Block identification, in institute
State and sent corresponding to Resource Block identification in the unauthorized resource of frequency range for the biography to the D2D data in the unauthorized frequency range
Defeated the 3rd control information being controlled and the D2D data.
Alternatively, the purpose equipment is used for:Detected simultaneously on the unauthorized resource of frequency range block of allocation result instruction
Receive the D2D data.
Alternatively, the purpose equipment is used for:Judge whether to receive the D2D data according to the 3rd control information;
In the case where judging to receive the D2D data, examined on the unauthorized resource of frequency range block of the 3rd control information instruction
Survey and receive the D2D data.
By the present invention, the data transfer request that one or more source device reports is received, wherein, data transfer request
For to the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;According to data transfer request point
Not Wei one or more source device distribute the unauthorized resource of frequency range, obtain the allocation result of the unauthorized resource of frequency range;Issue point
With result, wherein, source device and/or purpose equipment transmit D2D data according to allocation result in unauthorized frequency range, thus may be used
See, use the resource of D2D data distribution unauthorized frequency range of the such scheme by base station between source device and purpose equipment, and
Issue and the D2D is transmitted in unauthorized frequency range according to the allocation result for the source device and/or the purpose equipment
The allocation result of data, it is thereby achieved that transmission of the D2D data in unauthorized frequency range, so as to solve D2D in correlation technique
Data can not be the unauthorized band transmissions the problem of.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, forms the part of the application, this hair
Bright schematic description and description is used to explain the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is a kind of flow chart of data transmission method according to embodiments of the present invention;
Fig. 2 is the flow chart of another data transmission method according to embodiments of the present invention;
Fig. 3 is the flow chart of another data transmission method according to embodiments of the present invention;
Fig. 4 is a kind of structured flowchart of data transmission device according to embodiments of the present invention;
Fig. 5 is the structured flowchart of another data transmission device according to embodiments of the present invention;
Fig. 6 is the structured flowchart of another data transmission device according to embodiments of the present invention;
Fig. 7 is the schematic diagram for the instruction that control information is transmitted according to the UE of alternative embodiment of the present invention;
Fig. 8 is the schematic diagram that resource allocation is carried out according to the base station of alternative embodiment of the present invention;
Fig. 9 is the schematic diagram according to the DCI format of alternative embodiment of the present invention;
Figure 10 is the flow chart carried out data transmission according to a kind of UE of alternative embodiment of the present invention;
Figure 11 is the flow chart carried out data transmission according to another UE of alternative embodiment of the present invention.
Embodiment
Describe the present invention in detail below with reference to accompanying drawing and in conjunction with the embodiments.It should be noted that do not conflicting
In the case of, the feature in embodiment and embodiment in the application can be mutually combined.
It should be noted that term " first " in description and claims of this specification and above-mentioned accompanying drawing, "
Two " etc. be for distinguishing similar object, without for describing specific order or precedence.
Embodiment 1
A kind of data transmission method is provided in the present embodiment, and Fig. 1 is that a kind of data according to embodiments of the present invention pass
The flow chart of transmission method, as shown in figure 1, the flow comprises the following steps:
Step S102, the data transfer request that one or more source device reports is received, wherein, data transfer request is used
In to the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;
Step S104, it is respectively that one or more source device distributes the unauthorized resource of frequency range according to data transfer request,
Obtain the allocation result of the unauthorized resource of frequency range;
Step S106, issues allocation result, wherein, source device and/or purpose equipment are according to allocation result in unauthorized frequency
D2D data are transmitted in section.
Alternatively, above-mentioned data transmission method can be, but not limited in the scene applied to D2D data transfers.Such as:For
The equipment distribution resource of D2D data transfers simultaneously carries out the scene of D2D data transfers.
Alternatively, above-mentioned data transmission method can be, but not limited to be applied to base station, such as:Macro base station, micro-base station, slightly
Base station, Home eNodeB etc..
By above-mentioned steps, the data transfer request that one or more source device reports is received, wherein, data transfer please
Ask for the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;According to data transfer request
Respectively one or more source device distributes the unauthorized resource of frequency range, obtains the allocation result of the unauthorized resource of frequency range;Issue
Allocation result, wherein, source device and/or purpose equipment transmit D2D data according to allocation result in unauthorized frequency range, thus may be used
See, use the resource of D2D data distribution unauthorized frequency range of the such scheme by base station between source device and purpose equipment, and
The allocation result for transmitting D2D data in unauthorized frequency range according to allocation result for source device and/or purpose equipment is issued, because
This, realizes transmission of the D2D data in unauthorized frequency range, can not be unauthorized so as to solve D2D data in correlation technique
The problem of band transmissions.
Alternatively, the allocation result that base station issues can be sent to source device and purpose equipment simultaneously, can also only send
To source device.Such as:Issue purpose corresponding to allocation result to one or more source device and one or more source device
Equipment;Or allocation result is issued to one or more source device.
Alternatively, mesh corresponding to allocation result to one or more source device and one or more source device is being issued
Equipment in the case of, allocation result can be, but not limited to include:The unauthorized resource of frequency range block distributed for each source device
Resource Block identification and the first control information for being controlled to the data transmitted on unauthorized resource of frequency range block, wherein,
Resource Block identification is used for the unauthorized resource of frequency range block of unique mark;Issuing feelings of the allocation result to one or more source device
Under condition, allocation result can be, but not limited to include:The Resource Block identification of the unauthorized resource of frequency range block distributed for each source device,
Wherein, Resource Block identification is used for the unauthorized resource of frequency range block of unique mark.
It is alternatively possible to according to the slot segmentation that different occupation modes is the communication frame in unauthorized frequency range.Such as:It is non-
Authorizing the time slot of the communication frame in frequency range includes at least one of:Dedicated time slot, spare time slot, shared time slot.Wherein, it is special
Time slot can be the time interval resource used by specified equipment, and dedicated time slot is dedicated for transmitting the data of designated equipment.It is standby
Time slot can be pre-assigned to designated equipment, and spare time slot can also transmit other and set in addition to the data of transmission designated equipment
Standby data.
Alternatively, can be according in data transfer request in order to complete the transmission of data on dedicated time slot as far as possible
The second control information for being used for the transmission to D2D data and being controlled carried, such as:Second control information can be, but not limited to
It is the available resource ratio of three kinds of slot allocation apparatus, further according to the ratio of distribution including data volume waiting for transmission and data type
Example distribution resource.Such as:The second control that the transmission being used for D2D data according to being carried in data transfer request is controlled
Information is defined as the ratio of the resource of each source device distribution, wherein, resource includes at least one of:Dedicated time slot resource,
Spare time slot resource, shared time interval resource, according to the carried in the ratio of the resource of determination and each data transfer request
Two control information are the resource block that each source device is distributed on dedicated time slot and/or spare time slot.
Alternatively, in order to ensure the availability of resource, before above-mentioned steps S106, can be, but not limited to carry out channel
CCA is detected, if detected successfully, unauthorized frequency range is taken.Such as:First clear channel assessment (CCA) is carried out to unauthorized frequency range
CCA is detected, and in the case of the first CCA detections successfully, confirms to take unauthorized frequency range.
Another data transmission method is additionally provided in the present embodiment, and Fig. 2 is another kind according to embodiments of the present invention
The flow chart of data transmission method, as shown in Fig. 2 the flow comprises the following steps:
Step S202, to base station send data transfer request, wherein, data transfer request be used for ask transmission sources equipment with
Device-to-device D2D data between purpose equipment;
Step S204, receive the allocation result for the unauthorized resource of frequency range that base station issues;
Step S206, D2D data are sent to purpose equipment in unauthorized frequency range according to allocation result.
Alternatively, above-mentioned data transmission method can be, but not limited in the scene applied to D2D data transfers.Such as:For
The equipment distribution resource of D2D data transfers simultaneously carries out the scene of D2D data transfers.
Alternatively, above-mentioned data transmission method can be, but not limited to the equipment for being applied to transmission D2D data, such as:Transmission
The source device of D2D data.
By above-mentioned steps, data transfer request is sent to base station, wherein, data transfer request is used to ask transmission sources to set
The standby device-to-device D2D data between purpose equipment;Receive the allocation result for the unauthorized resource of frequency range that base station issues;Root
According to allocation result in unauthorized frequency range to purpose equipment send D2D data, it can be seen that, use such scheme according to base station for
The allocation result transmission D2D data of the resource of the unauthorized frequency range of D2D data distributions between source device and purpose equipment, because
This, realizes transmission of the D2D data in unauthorized frequency range, can not be unauthorized so as to solve D2D data in correlation technique
The problem of band transmissions.
Alternatively, allocation result can be, but not limited to include:To transmit the unauthorized resource of frequency range block of D2D data distributions
Resource Block identification and the first control information for being controlled to the data transmitted on unauthorized resource of frequency range block, wherein,
Resource Block identification is used for the unauthorized resource of frequency range block of unique mark;Or allocation result can be, but not limited to include:For source device
The Resource Block identification of the unauthorized resource of frequency range block of distribution, wherein, Resource Block identification is used for the unauthorized resource of frequency range of unique mark
Block.
Alternatively, include in allocation result:In the case of Resource Block identification and the first control information, in above-mentioned steps S206
In, D2D data are being sent according to the instruction of the first control information in the unauthorized resource of frequency range corresponding to Resource Block identification.
Alternatively, include in allocation result:In the case of Resource Block identification, in above-mentioned steps S206, in resource block mark
The 3rd control for being controlled to transmission of the D2D data in unauthorized frequency range is sent corresponding to knowledge in the unauthorized resource of frequency range
Information processed and D2D data.
Alternatively, the time slot of the communication frame in unauthorized frequency range can be, but not limited to include at least one of:When special
Gap, spare time slot, shared time slot;Allocation result can be, but not limited to include:To transmit on the dedicated time slot of D2D data distributions
Resource Block identification and/or for transmission D2D data distributions spare time slot on Resource Block identification.
Alternatively, in above-mentioned steps S206, the 2nd CCA inspections can be first carried out to unauthorized frequency range before transmitting the data
Survey.Such as:To dedicated time slot resource block on dedicated time slot resource block corresponding to Resource Block identification on the dedicated time slot of distribution
The 2nd CCA detections are carried out, in the case of the 2nd CCA detections successfully, D2D data are sent on dedicated time slot resource block.
Alternatively, corresponding to the Resource Block identification on the dedicated time slot of distribution on dedicated time slot resource block to dedicated time slot
, can be in the resource block on the spare time slot of distribution if the 2nd CCA detection failures after resource block carries out the 2nd CCA detections
The 3rd CCA for carrying out pre-set priority on spare time slot resource block to spare time slot resource block corresponding to mark is detected, the 3rd
In the case of CCA detection failures, the 3rd of pre-set priority is re-started to spare time slot resource block after preset duration is waited
CCA is detected;Or in the case of the 3rd CCA detections successfully, source device transmits D2D data on spare time slot resource block.
Alternatively, pre-set priority can be, but not limited to the priority detected higher than the CCA of base station side, and/or, preset excellent
First level can be, but not limited to as the limit priority of equipment side.
Alternatively, dedicated time slot does not complete the D2D equipment of transmission, then when spare time slot carries out data transmission, it is necessary to elder generation
CCA detections are performed, CCA detections now are higher than the priority for the CCA that dedicated time slot performs.Spare time slot does not complete transmission
D2D equipment, then when shared time slot carries out data transmission, it is necessary to first carry out CCA detections, spare time slot is compared in CCA detections now
The CCA of execution priority is high.
Alternatively, corresponding to the Resource Block identification on the spare time slot of distribution on spare time slot resource block to spare time slot
After resource block carries out the 3rd CCA detections of pre-set priority, if source device does not complete D2D numbers on spare time slot resource block
According to transmission, the transmission of D2D data can be completed on shared time slot.
Another data transmission method is additionally provided in the present embodiment, and Fig. 3 is another according to embodiments of the present invention
The flow chart of data transmission method, as shown in figure 3, the flow comprises the following steps:
Step S302, receive the allocation result for the unauthorized resource of frequency range that base station issues or for device-to-device
The 3rd control information that transmission of the D2D data in unauthorized frequency range is controlled;
Step S304, D2D data are received in unauthorized frequency range according to allocation result or the 3rd control information.
Alternatively, above-mentioned data transmission method can be, but not limited in the scene applied to D2D data transfers.Such as:For
The equipment distribution resource of D2D data transfers simultaneously carries out the scene of D2D data transfers.
Alternatively, above-mentioned data transmission method can be, but not limited to the equipment for being applied to transmission D2D data, such as:Transmission
The purpose equipment of D2D data.
By above-mentioned steps, receive the unauthorized resource of frequency range that base station issues allocation result or for equipment to setting
The 3rd control information that standby transmission of the D2D data in unauthorized frequency range is controlled;Controlled according to allocation result or the 3rd
Information receives D2D data in unauthorized frequency range, it can be seen that, use such scheme according to base station for source device and purpose equipment
Between D2D data distributions unauthorized frequency range resource allocation result or receive be used for device-to-device D2D
The 3rd control information that transmission of the data in unauthorized frequency range is controlled receives D2D data in unauthorized frequency range, therefore,
Transmission of the D2D data in unauthorized frequency range is realized, can not be in unauthorized frequency range so as to solve D2D data in correlation technique
The problem of transmission.
Alternatively, in above-mentioned steps S304, if what is received is allocation result, can be indicated in allocation result non-
Authorize and detected on resource of frequency range block and receive D2D data.
Alternatively, in above-mentioned steps S304, if what is received is the 3rd control information, can be believed according to the 3rd control
Breath judges whether to receive D2D data, in the case where judging to receive D2D data, in the unauthorized of the 3rd control information instruction
Detected on resource of frequency range block and receive D2D data.
Embodiment 2
A kind of data transmission device is additionally provided in the present embodiment, and the device is used to realize above-described embodiment and preferred reality
Mode is applied, had carried out repeating no more for explanation.As used below, term " module " can realize the soft of predetermined function
The combination of part and/or hardware.Although device described by following examples is preferably realized with software, hardware, or
The realization of the combination of software and hardware is also what may and be contemplated.
Fig. 4 is a kind of structured flowchart of data transmission device according to embodiments of the present invention, as shown in figure 4, the device bag
Include:
First receiving module 42, the data transfer request reported for receiving one or more source device, wherein, data
Transmission request is used for the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;
Distribute module 44, coupled to the first receiving module 42, for being respectively one according to data transfer request or more
Individual source device distributes the unauthorized resource of frequency range, obtains the allocation result of the unauthorized resource of frequency range;
Module 46 is issued, coupled to distribute module 44, for issuing allocation result, wherein, source device and/or purpose equipment
D2D data are transmitted in unauthorized frequency range according to allocation result.
Alternatively, above-mentioned data transmission device can be, but not limited in the scene applied to D2D data transfers.Such as:For
The equipment distribution resource of D2D data transfers simultaneously carries out the scene of D2D data transfers.
Alternatively, above-mentioned data transmission device can be, but not limited to be applied to base station, such as:Macro base station, micro-base station, slightly
Base station, Home eNodeB etc..
By said apparatus, the first receiving module receives the data transfer request that one or more source device reports, its
In, data transfer request is used for the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;Distribution
Module is respectively that one or more source device distributes the unauthorized resource of frequency range according to data transfer request, obtains unauthorized frequency range
The allocation result of resource;Issue module and issue allocation result, wherein, source device and/or purpose equipment are according to allocation result non-
Authorize and D2D data transmitted in frequency range, it can be seen that, use such scheme by base station between source device and purpose equipment
The resource of the unauthorized frequency range of D2D data distributions, and issue for source device and/or purpose equipment according to allocation result unauthorized
The allocation result of D2D data is transmitted in frequency range, it is thereby achieved that transmission of the D2D data in unauthorized frequency range, so as to solve
D2D data can not be the unauthorized band transmissions the problem of in correlation technique.
Alternatively, module 46 is issued to be used for:Allocation result is issued to one or more source device and one or more
Purpose equipment corresponding to source device;Or allocation result is issued to one or more source device.
Alternatively, module 46 is being issued for issuing allocation result to one or more source device and one or more
In the case of purpose equipment corresponding to source device, allocation result can be, but not limited to include:For non-the awarding of each source device distribution
Weigh the Resource Block identification and first for being controlled to the data transmitted on unauthorized resource of frequency range block of resource of frequency range block
Control information, wherein, Resource Block identification is used for the unauthorized resource of frequency range block of unique mark.
Alternatively, in the case where issuing module 46 and being used to issue allocation result to one or more source device, distribution
As a result can be, but not limited to include:The Resource Block identification of the unauthorized resource of frequency range block distributed for each source device, wherein, resource
Block identification is used for the unauthorized resource of frequency range block of unique mark.
Alternatively, the time slot of the communication frame in unauthorized frequency range can be, but not limited to include at least one of:When special
Gap, spare time slot, shared time slot.
Alternatively, distribute module is used for:The transmission being used for D2D data according to being carried in data transfer request is controlled
Second control information of system is defined as the ratio of the resource of each source device distribution, wherein, resource includes at least one of:Specially
With time interval resource, spare time slot resource, shared time interval resource;According to the ratio of the resource of determination and each data transfer request
Second control information of middle carrying is the resource block that each source device is distributed on dedicated time slot and/or spare time slot.
Alternatively, the device is additionally operable to:Before allocation result is issued, the first idle channel is carried out to unauthorized frequency range and commented
Estimate CCA detections, in the case of the first CCA detections successfully, confirm to take unauthorized frequency range.
Another data transmission device is additionally provided in the present embodiment, and Fig. 5 is another kind according to embodiments of the present invention
The structured flowchart of data transmission device, as shown in figure 5, the device includes:
First sending module 52, for sending data transfer request to base station, wherein, data transfer request is used to ask to pass
Device-to-device D2D data between defeated source device and purpose equipment;
Second receiving module 54, coupled to the first sending module 52, the unauthorized resource of frequency range issued for receiving base station
Allocation result;
Second sending module 56, coupled to the second receiving module 54, for according to allocation result in unauthorized frequency range to
Purpose equipment sends D2D data.
Alternatively, above-mentioned data transmission device can be, but not limited in the scene applied to D2D data transfers.Such as:For
The equipment distribution resource of D2D data transfers simultaneously carries out the scene of D2D data transfers.
Alternatively, above-mentioned data transmission device can be, but not limited to the equipment for being applied to transmission D2D data, such as:Transmission
The source device of D2D data.
By said apparatus, the first sending module sends data transfer request to base station, wherein, data transfer request is used for
Ask the device-to-device D2D data between transmission sources equipment and purpose equipment;Second receiving module 54 receives what base station issued
The allocation result of the unauthorized resource of frequency range;Second sending module is sent according to allocation result in unauthorized frequency range to purpose equipment
D2D data, it can be seen that, use the non-of D2D data distribution of the such scheme according to base station between source device and purpose equipment
The allocation result transmission D2D data of the resource of frequency range are authorized, it is thereby achieved that transmission of the D2D data in unauthorized frequency range, from
And solve the problems, such as that D2D data can not be in unauthorized band transmissions in correlation technique.
Alternatively, allocation result can be, but not limited to include:To transmit the unauthorized resource of frequency range block of D2D data distributions
Resource Block identification and the first control information for being controlled to the data transmitted on unauthorized resource of frequency range block, wherein,
Resource Block identification is used for the unauthorized resource of frequency range block of unique mark;Or allocation result can be, but not limited to include:For source device
The Resource Block identification of the unauthorized resource of frequency range block of distribution, wherein, Resource Block identification is used for the unauthorized resource of frequency range of unique mark
Block.
Alternatively, include in allocation result:In the case of Resource Block identification and the first control information, the second sending module 56
For:D2D data are being sent according to the instruction of the first control information in the unauthorized resource of frequency range corresponding to Resource Block identification.
Alternatively, include in allocation result:In the case of Resource Block identification, the second sending module 56 is used for:In resource block
Sent corresponding to mark in the unauthorized resource of frequency range for transmission of the D2D data in unauthorized frequency range is controlled the 3rd
Control information and D2D data.
Alternatively, the time slot of the communication frame in unauthorized frequency range can be, but not limited to include at least one of:When special
Gap, spare time slot, shared time slot;Allocation result can be, but not limited to include:To transmit on the dedicated time slot of D2D data distributions
Resource Block identification and/or for transmission D2D data distributions spare time slot on Resource Block identification.
Alternatively, the second sending module 56 is used for:When special corresponding to the Resource Block identification on the dedicated time slot of distribution
The 2nd CCA detections are carried out on gap resource block to dedicated time slot resource block;In the case of the 2nd CCA detections successfully, when special
D2D data are sent on gap resource block.
Alternatively, the device is additionally operable to:Dedicated time slot resource corresponding to Resource Block identification on the dedicated time slot of distribution
After carrying out the 2nd CCA detections to dedicated time slot resource block on block, in the case of the 2nd CCA detection failures, in the standby of distribution
Carry out the of pre-set priority on spare time slot resource block to spare time slot resource block corresponding to the Resource Block identification on time slot
Three CCA are detected;In the case of the 3rd CCA detection failures, spare time slot resource block is re-started after preset duration is waited
The 3rd CCA detections of pre-set priority;Or in the case of the 3rd CCA detections successfully, source device is in spare time slot resource block
Upper transmission D2D data.
Alternatively, pre-set priority can be, but not limited to the priority detected higher than the CCA of base station side, and/or, preset excellent
First level can be, but not limited to as the limit priority of equipment side.
Alternatively, dedicated time slot does not complete the D2D equipment of transmission, then when spare time slot carries out data transmission, it is necessary to elder generation
CCA detections are performed, CCA detections now are higher than the priority for the CCA that dedicated time slot performs.Spare time slot does not complete transmission
D2D equipment, then when shared time slot carries out data transmission, it is necessary to first carry out CCA detections, spare time slot is compared in CCA detections now
The CCA of execution priority is high.
Alternatively, the device is additionally operable to:Spare time slot resource corresponding to Resource Block identification on the spare time slot of distribution
After the 3rd CCA detections for carrying out pre-set priority on block to spare time slot resource block, when source device is in spare time slot resource block
During the transmission of upper unfinished D2D data, the transmission of D2D data is completed on shared time slot.
Another data transmission device is additionally provided in the present embodiment, and Fig. 6 is another according to embodiments of the present invention
The structured flowchart of data transmission device, as shown in fig. 6, the device includes:
3rd receiving module 62, the allocation result of the unauthorized resource of frequency range issued for receiving base station or for pair setting
The 3rd control information that the standby transmission to equipment D2D data in unauthorized frequency range is controlled;
4th receiving module 64, coupled to the 3rd receiving module 62, for according to allocation result or the 3rd control information
D2D data are received in unauthorized frequency range.
Alternatively, above-mentioned data transmission device can be, but not limited in the scene applied to D2D data transfers.Such as:For
The equipment distribution resource of D2D data transfers simultaneously carries out the scene of D2D data transfers.
Alternatively, above-mentioned data transmission device can be, but not limited to the equipment for being applied to transmission D2D data, such as:Transmission
The purpose equipment of D2D data.
By said apparatus, the 3rd receiving module receives the allocation result or use for the unauthorized resource of frequency range that base station issues
In the 3rd control information being controlled to transmission of the device-to-device D2D data in unauthorized frequency range;4th receiving module
D2D data are received in unauthorized frequency range according to allocation result or the 3rd control information, it can be seen that, using such scheme root
Allocation result or reception according to the resource of the unauthorized frequency range of D2D data distribution of the base station between source device and purpose equipment
To for the 3rd control information that is controlled to transmission of the device-to-device D2D data in unauthorized frequency range unauthorized
D2D data are received in frequency range, it is thereby achieved that transmission of the D2D data in unauthorized frequency range, so as to solve in correlation technique
D2D data can not be the unauthorized band transmissions the problem of.
Alternatively, the 4th receiving module 64 is used for:Detect and connect on the unauthorized resource of frequency range block of allocation result instruction
Receive D2D data.
Alternatively, the 4th receiving module 64 is used for:Judged whether to receive D2D data according to the 3rd control information;Judging
In the case of going out to receive D2D data, detected on the unauthorized resource of frequency range block of the 3rd control information instruction and receive D2D numbers
According to.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, Ke Yitong
Cross in the following manner realization, but not limited to this:Above-mentioned module is respectively positioned in same processor;Or above-mentioned module is respectively positioned at more
In individual processor.
Embodiment 3
A kind of data transmission system is provided in the present embodiment, and the system includes:Base station, source device and purpose equipment,
Wherein,
Base station, the data transfer request reported for receiving one or more source device, wherein, data transfer request is used
In to the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;Distinguished according to data transfer request
The unauthorized resource of frequency range is distributed for one or more source device, obtains the allocation result of the unauthorized resource of frequency range;Issue distribution
As a result, wherein, source device and/or purpose equipment transmit D2D data according to allocation result in unauthorized frequency range;
Source device, for sending data transfer request to base station;Receive the distribution for the unauthorized resource of frequency range that base station issues
As a result;D2D data are sent to purpose equipment in unauthorized frequency range according to allocation result;
Purpose equipment, the allocation result of the unauthorized resource of frequency range issued for receiving base station or for D2D data
The 3rd control information that transmission in unauthorized frequency range is controlled;Awarded according to allocation result or the 3rd control information non-
Weigh and D2D data are received in frequency range.
Alternatively, base station is used for:Allocation result is issued to one or more source device and one or more source device
Corresponding purpose equipment;Or allocation result is issued to one or more source device.
Alternatively, it is used to issue allocation result to one or more source device and one or more source device in base station
In the case of corresponding purpose equipment, allocation result includes:The resource block of unauthorized resource of frequency range block is distributed for each source device
Mark and the first control information for being controlled to the data transmitted on unauthorized resource of frequency range block, wherein, resource block
Identify and be used for the unauthorized resource of frequency range block of unique mark;It is used to issue allocation result to one or more source device in base station
In the case of, allocation result includes:The Resource Block identification of unauthorized resource of frequency range block is distributed for each source device, wherein, resource block
Identify and be used for the unauthorized resource of frequency range block of unique mark.
Alternatively, source device is used for:Include in allocation result:In the case of Resource Block identification and the first control information,
D2D data are sent according to the instruction of the first control information in the unauthorized resource of frequency range corresponding to Resource Block identification.
Alternatively, source device is used for:Include in allocation result:It is corresponding in Resource Block identification in the case of Resource Block identification
The unauthorized resource of frequency range on send the 3rd control information for being controlled to transmission of the D2D data in unauthorized frequency range
With D2D data.
Alternatively, purpose equipment is used for:Detected on the unauthorized resource of frequency range block of allocation result instruction and receive D2D numbers
According to.
Alternatively, purpose equipment is used for:Judged whether to receive D2D data according to the 3rd control information;Judging to receive
In the case of D2D data, detected on the unauthorized resource of frequency range block of the 3rd control information instruction and receive D2D data.
It is described in detail with reference to alternative embodiment of the present invention.
Frequency spectrum access (License Assisted Access, referred to as LAA) technology is authorized based on auxiliary, the present invention can
Select embodiment to provide a kind of resource allocation methods towards D2D communications, the problem of to mitigate LTE base station high load capacity, improve D2D
Communicate the resource utilization in unauthorized frequency range.Therefore, this alternative embodiment is conceived to money of the D2D communications in unauthorized frequency range
Source distribution method, consider in varied situations (such as:Be successfully accessed first and access failure first) resource utilization, it is real
Existing following functions:
1) base station reports situation to carry out pre-allocation of resources according to D2D UE, and when base station detects idle channel, UE can
To carry out corresponding data transfer according to the resource allocation result of base station.
2) different D2D UE carry out related data transmission according to the resource allocation result of base station using unauthorized frequency range.UE
Progress CCA, which is detected, is successfully then directly connected to corresponding dedicated time slot, if CCA fails, is transferred to spare time slot or shared
Slot transmission data.
3) D2D communication frames are divided into dedicated time slot (dedicated slot), spare time slot (spare slot) and are total to
Enjoy time slot (shared slot):The information that the communication resource corresponding to dedicated time slot is reported by base station according to UE is allocated;It is standby
For time slot by base station according to reporting the UE of transmission demand to be pre-allocated, corresponding UE simply possesses priority access power, might not must
Corresponding resource must be linked into, other UE can also be at war with access to the resource;The communication resource of shared time slot then use with
The mode that machine competition is kept out of the way accesses, and reduces the possibility clashed between different D2D UE.The above-mentioned method of salary distribution can reduce money
Source wastes, and improves resource utilization.
What this alternative embodiment proposed is a kind of resource of the high resource utilization to be communicated for D2D in unauthorized frequency range
Distribution method.On the basis of the FBE frame structures that LAA is proposed, according to the characteristic of D2D communications, base station is utilized to carry out macro-control
With allocating in advance for resource, by the way that communication frame is divided into dedicated time slot (dedicated slot), spare time slot (spare
Slot) and shared time slot (shared slot) method, solve it is a variety of in the case of (UE carry out CCA success and UE carry out CCA
The problem of unsuccessfully) how reducing the wasting of resources.Specific slot allocation method can be by D2D UE data volume and type of service
Determine.
This alternative embodiment provides two examples:D2D UE are reported and distributing slot resources example and D2D efficient datas
Transmit example.
In D2D UE and base station resource allocation example, mainly under LAA scenes, in unauthorized frequency range between D2D UE
On communication.
Although D2D communications are carried out in unauthorized frequency range corresponding to this example, but still can be controlled by base station
With corresponding resource allocation, the process of control and corresponding resource allocation can authorize frequency range to carry out.
In regular hour window ranges, producing the D2D UE of business transmission demand can transmit to base station reported data
Ask, the business classification and the data volume that are carried in the data transfer request that base station reports according to the UE collected carry out pre- point of resource
Match somebody with somebody, and to D2D UE corresponding to sending and receiving end to issuing identical random seed.The resource allocation methods provided in this example can be with
Comprise the following steps:
Step 11, UE reported datas transmission request:D2D UE pass through dispatch request (Scheduling on PUCCH
Request, referred to as SR) notify base station oneself to there is uplink scheduling request to transmit, request base station eNodeB is that its distribution is up
Resource.Fig. 7 is the schematic diagram for the instruction that control information is transmitted according to the UE of alternative embodiment of the present invention, as shown in fig. 7, corresponding UE
By such as data-source device ID of the control information needed for data transfer, data purpose equipment ID, type of service, data volume, priority
Etc. reporting base station.
Step 12, base station carries out the resource allocation of unauthorized frequency range:Base station carries out resource according to D2D UE reported result
Distribution.Fig. 8 is the schematic diagram that resource allocation is carried out according to the base station of alternative embodiment of the present invention, as shown in figure 8, in this example
The time slot of communication frame in unauthorized frequency range is divided into following three kinds:Dedicated time slot, spare time slot and shared time slot.Base station according to
The information that UE is reported determines the proportioning of above-mentioned three kinds of time slots, ensures that D2D communications are as much as possible and is transmitted on dedicated time slot.Its
In, the resource on dedicated time slot can be allocated completely by base station, and the minimum particle size of resource allocation can be MRB (Mini
Resource Block).Such as:One MRB includes 14 OFDM symbols in time domain, and time domain size is two time slots, i.e.,
1ms;12 continuous subcarriers are included on frequency domain, frequency domain size is 180kHz.In view of what is be likely to occur in transmitting procedure
The situation of CCA failures, for spare time slot, base station reports order to carry out pre-allocation of resources, but actual transmissions according to D2D UE's
During be allocated resource it is possible to being taken by other UE.Resource to sharing time slot, base station is without distribution.
Step 13, the allocation result of base station down distributing resource:Base station can according to agreement 36.212 and 36.213, mainly by
PDCCH sends down dispatch information to UE.Fig. 9 is according to the schematic diagram of the DCI format of alternative embodiment of the present invention, such as Fig. 9 institutes
Show, each PDCCH can only carry certain format DCI, the i.e. corresponding specific UE of a PDCCH, it is contemplated that mesh
Preceding PDCCH still has remaining bit, can extend DCI form, it is carried corresponding base station allocation result.
In the data transfer example based on base station allocation result, under LAA scene, in order to avoid with Wi-Fi signal
Or other LAA signals disturb, listem-before-talk (Listen Before Talk, referred to as LBT) side is typically taken
Formula, corresponding frame structure are then embodied in, and before actually data are sent, clear channel assessment (CCA) (Clear is had in corresponding frame structure
Channel Assessment, referred to as CCA).
The citation form of the frame structure used in this example is the setting (FBE) based on frame, and this example is intended to avoid resource
Waste, improve resource utilization, it is main to consider that UE progress accesses CCA successes first and UE carries out access CCA first and failed two kinds
In the case of data transmission procedure, Figure 10 is the flow chart carried out data transmission according to a kind of UE of alternative embodiment of the present invention,
As shown in Figure 10, the flow includes following process:
D2D communications first have to confirm holding for frequency range by CCA before the progress of unauthorized frequency range, CCA inspections now
Survey is completed by base station., will also be by corresponding D2D UE again before D2D data interactions after confirming to the holding of channel in base station
Secondary carry out CCA, to ensure the occupancy to channel.CCA end positions should be identical corresponding to same time slot, i.e., valid data transmit
Starting point should be identical.
In dedicated time slot, each UE carries out data transmission according to the arbitration result of base station, first has to carry out before being transmitted
CCA is detected.Assuming that UE1 and UE2 be present, wherein UE1 is transmitting terminal, and UE2 is receiving terminal, and base station is that UE1 and UE2 distributes identical
MRB is numbered.If UE1 carries out CCA failures in dedicated time slot, show that the resource of distribution is taken by other business, then corresponding number
It is transmitted according to spare time slot is transferred to, UE2 can utilize identical MRB numberings to be linked among corresponding resource.
In spare time slot, it is contemplated that in the situation for the CCA failures that dedicated time slot is likely to occur, base station is by D2D
Preliminary distribution has been carried out to resource to the method for distribution MRB numberings.Although base station has carried out the predistribution of resource in advance,
Caused bursty data can also be transmitted by taking the resource of spare time slot in transmitting procedure.In order to ensure as far as possible
The D2D UE for failing to complete data interaction in dedicated time slot take resource, and in spare time slot, D2D UE use higher priority
CCA is detected, and probability is seized to improve it.By above-mentioned design, the D2D UE that data transfer is not completed in dedicated time slot will more hold
Easily access channel carries out corresponding resource transmission.
In shared time slot, the D2D UE for failing to complete data interaction in dedicated time slot and spare time slot will be existing by D2D
Access way completes data transfer.Such as UE1 is as transmitting terminal and UE2 is as receiving terminal, before data transfer, UE1 can be to UE2
The control signaling for including ID marks is sent, UE2 can determine whether data source is correct after receiving demodulation, if correctly,
Receive follow-up data;If incorrect, UE2 rejects follow-up data.
In addition, the energy that base station detects after n CCA is carried out is less than threshold value, then it is assumed that channel can take, number
According to having completed to interact.Base station can select to withdraw channel, carry out the data transfer of next round.
The difference of resource mode is distributed according to base station, this example additionally provides another unauthorized frequency range towards D2D data
Interactive method.Figure 11 is the flow chart carried out data transmission according to another UE of alternative embodiment of the present invention, such as Figure 11 institutes
Show, the flow comprises the following steps:
Step S1102, D2D UE report transmission to ask.D2D UE pass through SR (Scheduling on PUCCH
Request, SR) notify base station oneself to there is uplink scheduling request to transmit, request eNodeB distributes ascending resource for it.Then,
Corresponding UE is on the ascending resource that base station is distributed by the control information of data transfer such as data-source device ID, data purpose equipment
ID, type of service, data volume, priority etc. report base station.(method is with the Step 1 in 2.2.1)
Step S1104, base station according to reported result, be only assigned to D2D UE be used for transmit subframe, specific resource divides
Voluntarily determined by D2D UE with situation.Base station allocation result issues.
Step S1106, detection, in the case where detecting channel idle, perform step S1108 newly to whether idle.
Step S1108, D2D UE sends corresponding control information among D2D control domains, includes the MRB moneys of data transfer
The information such as source, transport-type, reference signal (Reference Signal).It is possible in view of D2D UE in the resource of distribution
There is the situation of CCA failures, it is also necessary to provide the candidate resource for data transfer in control domain, guarantee to complete accordingly
Data transfer.
Step S1110, D2D UE completes corresponding data transfer according to the control information in control domain.Transmitting every time
Before, D2D UE will carry out CCA detections, to ensure to hold channel.To ensure that the occupancy on same time slot is different simultaneously
The end position that the D2D UE of frequency range carry out CCA is identical, i.e. the original position of valid data transmission is consistent.
In summary, the data transmission method in the embodiment of the present invention and alternative embodiment, apparatus and system are by communication frame
Data transmission period be divided into dedicated time slot, spare time slot and shared time slot, resource point is fixed by base station in dedicated time slot
Match somebody with somebody, for having reported UE data transfer, resource utilization is high, is not in collision.Secondly, the design of spare time slot can solve
Certainly under CCA failure scenarios, the problem of how corresponding data quickly accesses other available resources, because corresponding CCA is unsuccessfully counted
According to the CCA that set of UE it is shorter, therefore higher channel use priority can be obtained, ensure that the complete of corresponding data business
Transmission.There can be other D2D of bursty data when the data transfer retransmitted after standby resources are not by CCA failures takes
UE contention access uses, and avoids the waste of resource, improves resource utilization.
The above embodiments are merely illustrative of the technical solutions of the present invention rather than is limited, the ordinary skill of this area
Technical scheme can be modified by personnel or equivalent substitution, without departing from the spirit and scope of the present invention, this
The protection domain of invention should be to be defined described in claim.
Embodiment 4
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation
The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but a lot
In the case of the former be more preferably embodiment.Based on such understanding, technical scheme is substantially in other words to existing
The part that technology contributes can be embodied in the form of software product, and the computer software product is stored in a storage
In medium (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, calculate
Machine, server, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention additionally provide a kind of storage medium.Alternatively, in the present embodiment, above-mentioned storage medium can
The program code for performing following steps to be arranged to storage to be used for:
S11, receive the data transfer request that one or more source device reports, wherein, data transfer request be used for
Device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;
S12, it is respectively that one or more source device distributes the unauthorized resource of frequency range according to data transfer request, obtains non-
Authorize the allocation result of the resource of frequency range;
S13, allocation result is issued, wherein, source device and/or purpose equipment upload according to allocation result in unauthorized frequency range
Defeated D2D data.
Alternatively, storage medium is also configured to the program generation that storage is used to perform the method and step of above-described embodiment record
Code:
S21, data transfer request is sent to base station, wherein, data transfer request is used to ask transmission sources equipment and purpose
Device-to-device D2D data between equipment;
S22, receive the allocation result for the unauthorized resource of frequency range that base station issues;
S23, D2D data are sent to purpose equipment in unauthorized frequency range according to allocation result.
Alternatively, in the present embodiment, above-mentioned storage medium can include but is not limited to:USB flash disk, read-only storage (ROM,
Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disc or
CD etc. is various can be with the medium of store program codes.
Alternatively, in the present embodiment, processor performs above-mentioned implementation according to the program code stored in storage medium
The method and step that example is recorded.
Alternatively, the specific example in the present embodiment may be referred to described in above-described embodiment and optional embodiment
Example, the present embodiment will not be repeated here.
Obviously, those skilled in the art should be understood that above-mentioned each module of the invention or each step can be with general
Computing device realize that they can be concentrated on single computing device, or be distributed in multiple computing devices and formed
Network on, alternatively, they can be realized with the program code that computing device can perform, it is thus possible to they are stored
Performed in the storage device by computing device, and in some cases, can be with different from shown in order execution herein
The step of going out or describing, they are either fabricated to each integrated circuit modules respectively or by multiple modules in them or
Step is fabricated to single integrated circuit module to realize.So, the present invention is not restricted to any specific hardware and software combination.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies
Change, equivalent substitution, improvement etc., should be included in the scope of the protection.
Claims (35)
- A kind of 1. data transmission method, it is characterised in that including:The data transfer request that one or more source device reports is received, wherein, the data transfer request is used for base station Ask the device-to-device D2D data between transmission sources equipment and purpose equipment;It is respectively that one or more of source devices distribute the unauthorized resource of frequency range according to the data transfer request, obtains institute State the allocation result of the unauthorized resource of frequency range;The allocation result is issued, wherein, the source device and/or the purpose equipment are according to the allocation result unauthorized The D2D data are transmitted in frequency range.
- 2. according to the method for claim 1, it is characterised in that issuing the allocation result includes:Issue mesh corresponding to the allocation result to one or more of source devices and one or more of source devices Equipment;OrThe allocation result is issued to one or more of source devices.
- 3. according to the method for claim 2, it is characterised in thatIssuing corresponding to the allocation result to one or more of source devices and one or more of source devices In the case of purpose equipment, the allocation result includes:The resource block mark of unauthorized resource of frequency range block is distributed for each source device Knowledge and the first control information for being controlled to the data transmitted on the unauthorized resource of frequency range block, wherein, it is described Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;In the case where issuing the allocation result to one or more of source devices, the allocation result includes:To be every Individual source device distributes the Resource Block identification of unauthorized resource of frequency range block, wherein, the Resource Block identification is used for described in unique mark Unauthorized resource of frequency range block.
- 4. according to the method for claim 1, it is characterised in that the time slot of the communication frame in the unauthorized frequency range include with It is at least one lower:Dedicated time slot, spare time slot, shared time slot.
- 5. according to the method for claim 4, it is characterised in that according to the data transfer request to be one or more Individual source device, which distributes the unauthorized resource of frequency range, to be included:According to the second control information for being used for the transmission to the D2D data and being controlled carried in the data transfer request It is defined as the ratio of the resource of each source device distribution, wherein, the resource includes at least one of:Dedicated time slot resource, Spare time slot resource, shared time interval resource;According to second control information carried in the ratio of the resource of determination and each data transfer request The resource block distributed for each source device on the dedicated time slot and/or spare time slot.
- 6. method according to any one of claim 1 to 5, it is characterised in that before the allocation result is issued, institute Stating method also includes:First clear channel assessment (CCA) CCA detections are carried out to the unauthorized frequency range;In the case of the first CCA detections successfully, confirm to take the unauthorized frequency range.
- A kind of 7. data transmission method, it is characterised in that including:Data transfer request is sent to base station, wherein, the data transfer request is used to ask transmission sources equipment and purpose equipment Between device-to-device D2D data;Receive the allocation result for the unauthorized resource of frequency range that the base station issues;The D2D data are sent to the purpose equipment in unauthorized frequency range according to the allocation result.
- 8. according to the method for claim 7, it is characterised in thatThe allocation result includes:To transmit the Resource Block identification and use of the unauthorized resource of frequency range block of the D2D data distributions In the first control information that the data to being transmitted on the unauthorized resource of frequency range block are controlled, wherein, the resource block Identify and be used for unauthorized resource of frequency range block described in unique mark;OrThe allocation result includes:The Resource Block identification of the unauthorized resource of frequency range block distributed for the source device, wherein, it is described Resource Block identification is used for unauthorized resource of frequency range block described in unique mark.
- 9. according to the method for claim 8, it is characterised in that include in the allocation result:The Resource Block identification and In the case of first control information, the D2D packets are sent in the unauthorized frequency range according to the allocation result Include:Corresponding to the Resource Block identification in the unauthorized resource of frequency range according to the instruction of first control information send described in D2D data.
- 10. according to the method for claim 8, it is characterised in that include in the allocation result:The Resource Block identification In the case of, sending the D2D data in the unauthorized frequency range according to the allocation result includes:It is used for being sent corresponding to the Resource Block identification in the unauthorized resource of frequency range to the D2D data in the unauthorized frequency The 3rd control information and the D2D data that transmission in section is controlled.
- 11. according to the method for claim 7, it is characterised in thatThe time slot of communication frame in the unauthorized frequency range includes at least one of:Dedicated time slot, spare time slot, it is shared when Gap;The allocation result includes:To transmit the Resource Block identification on the dedicated time slot of the D2D data distributions and/or being Transmit the Resource Block identification on the spare time slot of the D2D data distributions.
- 12. according to the method for claim 11, it is characterised in that according to the allocation result in the unauthorized frequency range Sending the D2D data includes:The dedicated time slot is provided on dedicated time slot resource block corresponding to Resource Block identification on the dedicated time slot of distribution Source block carries out the 2nd CCA detections;In the case of the 2nd CCA detections successfully, the D2D data are sent on the dedicated time slot resource block.
- 13. according to the method for claim 12, it is characterised in that the Resource Block identification on the dedicated time slot of distribution After the 2nd CCA detections are carried out to the dedicated time slot resource block on the corresponding dedicated time slot resource block, the side Method also includes:It is standby corresponding to the Resource Block identification on the spare time slot of distribution in the case of the 2nd CCA detection failures Detected with the 3rd CCA for carrying out pre-set priority on time slot resource block to the spare time slot resource block;In the case of the 3rd CCA detection failures, the spare time slot resource block is entered again after preset duration is waited The 3rd CCA detections of the row pre-set priority;Or in the case of the 3rd CCA detections successfully, the source device exists The D2D data are transmitted on the spare time slot resource block.
- 14. according to the method for claim 13, it is characterised in that the pre-set priority detects higher than the CCA of base station side Priority, and/or, the pre-set priority be equipment side limit priority.
- 15. according to the method for claim 13, it is characterised in that the Resource Block identification on the spare time slot of distribution After the 3rd CCA detections for carrying out pre-set priority on corresponding spare time slot resource block to the spare time slot resource block, institute Stating method also includes:When the source device is not completing the transmission of the D2D data on the spare time slot resource block, when described shared The transmission of the D2D data is completed in gap.
- A kind of 16. data transmission method, it is characterised in that including:Receive the allocation result of the unauthorized resource of frequency range that base station issues or for device-to-device D2D data unauthorized The 3rd control information that transmission in frequency range is controlled;The D2D data are received in unauthorized frequency range according to the allocation result or the 3rd control information.
- 17. according to the method for claim 16, it is characterised in that received according to the allocation result in unauthorized frequency range The D2D data include:Detected on the unauthorized resource of frequency range block of allocation result instruction and receive the D2D data.
- 18. according to the method for claim 16, it is characterised in that according to the 3rd control information in unauthorized frequency range Receiving the D2D data includes:Judge whether to receive the D2D data according to the 3rd control information;In the case where judging to receive the D2D data, in the unauthorized resource of frequency range block of the 3rd control information instruction It is upper to detect and receive the D2D data.
- A kind of 19. data transmission device, it is characterised in that including:First receiving module, the data transfer request reported for receiving one or more source device, wherein, the data pass It is defeated to ask for the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;Distribute module, for being respectively that one or more of source devices distribute unauthorized frequency according to the data transfer request Duan Ziyuan, obtain the allocation result of the unauthorized resource of frequency range;Module is issued, for issuing the allocation result, wherein, the source device and/or the purpose equipment are according to described point The D2D data are transmitted in unauthorized frequency range with result.
- 20. device according to claim 19, it is characterised in that the module that issues is used for:Issue mesh corresponding to the allocation result to one or more of source devices and one or more of source devices Equipment;OrThe allocation result is issued to one or more of source devices.
- 21. device according to claim 20, it is characterised in thatIt is described issue module be used for issue the allocation result to one or more of source devices and it is one or In the case of purpose equipment corresponding to multiple source devices, the allocation result includes:Unauthorized frequency range is distributed for each source device The Resource Block identification of resource block and for being controlled to the data transmitted on the unauthorized resource of frequency range block first control Information processed, wherein, the Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;It is described issue module be used for issue the allocation result to one or more of source devices in the case of, described point Include with result:The Resource Block identification of unauthorized resource of frequency range block is distributed for each source device, wherein, the Resource Block identification is used In unauthorized resource of frequency range block described in unique mark.
- A kind of 22. data transmission device, it is characterised in that including:First sending module, for sending data transfer request to base station, wherein, the data transfer request is used to ask to transmit Device-to-device D2D data between source device and purpose equipment;Second receiving module, the allocation result of the unauthorized resource of frequency range issued for receiving the base station;Second sending module, for sending the D2D to the purpose equipment in unauthorized frequency range according to the allocation result Data.
- 23. device according to claim 22, it is characterised in thatThe allocation result includes:To transmit the Resource Block identification and use of the unauthorized resource of frequency range block of the D2D data distributions In the first control information that the data to being transmitted on the unauthorized resource of frequency range block are controlled, wherein, the resource block Identify and be used for unauthorized resource of frequency range block described in unique mark;OrThe allocation result includes:The Resource Block identification of the unauthorized resource of frequency range block distributed for the source device, wherein, it is described Resource Block identification is used for unauthorized resource of frequency range block described in unique mark.
- 24. device according to claim 23, it is characterised in that second sending module is used for:Include in the allocation result:In the case of the Resource Block identification and first control information, in the resource block The D2D data are sent according to the instruction of first control information in the unauthorized resource of frequency range corresponding to mark.
- 25. device according to claim 23, it is characterised in that second sending module is used for:Include in the allocation result:In the case of the Resource Block identification, in unauthorized frequency corresponding to the Resource Block identification Sent on Duan Ziyuan for the 3rd control information that is controlled to transmission of the D2D data in the unauthorized frequency range and The D2D data.
- A kind of 26. data transmission device, it is characterised in that including:3rd receiving module, the allocation result of the unauthorized resource of frequency range issued for receiving base station or for equipment to setting The 3rd control information that standby transmission of the D2D data in unauthorized frequency range is controlled;4th receiving module, for receiving institute in unauthorized frequency range according to the allocation result or the 3rd control information State D2D data.
- 27. device according to claim 26, it is characterised in that the 4th receiving module is used for:Detected on the unauthorized resource of frequency range block of allocation result instruction and receive the D2D data.
- 28. device according to claim 26, it is characterised in that the 4th receiving module is used for:Judge whether to receive the D2D data according to the 3rd control information;In the case where judging to receive the D2D data, in the unauthorized resource of frequency range block of the 3rd control information instruction It is upper to detect and receive the D2D data.
- A kind of 29. data transmission system, it is characterised in that including:Base station, source device and purpose equipment, wherein,The base station, the data transfer request reported for receiving one or more described source device, wherein, the data pass It is defeated to ask for the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;According to the data Transmission request is respectively that one or more of source devices distribute the unauthorized resource of frequency range, obtains the unauthorized resource of frequency range Allocation result;The allocation result is issued, wherein, the source device and/or the purpose equipment are according to the allocation result The D2D data are transmitted in unauthorized frequency range;The source device, for sending the data transfer request to the base station;Receive the unauthorized frequency that the base station issues Duan Ziyuan allocation result;The D2D data are sent to the purpose equipment in unauthorized frequency range according to the allocation result;The purpose equipment, the allocation result of the unauthorized resource of frequency range issued for receiving the base station or for described The 3rd control information that transmission of the D2D data in unauthorized frequency range is controlled;According to the allocation result or described Three control information receive the D2D data in unauthorized frequency range.
- 30. system according to claim 29, it is characterised in that the base station is used for:Issue mesh corresponding to the allocation result to one or more of source devices and one or more of source devices Equipment;OrThe allocation result is issued to one or more of source devices.
- 31. system according to claim 30, it is characterised in thatIt is used to issue the allocation result in the base station to one or more of source devices and one or more of In the case of purpose equipment corresponding to source device, the allocation result includes:The unauthorized resource of frequency range is distributed for each source device The Resource Block identification of block and for being controlled to the data transmitted on the unauthorized resource of frequency range block first control letter Breath, wherein, the Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;In the case of being used to issue the allocation result to one or more of source devices in the base station, the distribution knot Fruit includes:The Resource Block identification of unauthorized resource of frequency range block is distributed for each source device, wherein, the Resource Block identification is used for only The one mark unauthorized resource of frequency range block.
- 32. system according to claim 31, it is characterised in that the source device is used for:Include in the allocation result:In the case of the Resource Block identification and first control information, in the resource block The D2D data are sent according to the instruction of first control information in the unauthorized resource of frequency range corresponding to mark.
- 33. system according to claim 31, it is characterised in that the source device is used for:Include in the allocation result:In the case of the Resource Block identification, in unauthorized frequency corresponding to the Resource Block identification Sent on Duan Ziyuan for the 3rd control information that is controlled to transmission of the D2D data in the unauthorized frequency range and The D2D data.
- 34. system according to claim 29, it is characterised in that the purpose equipment is used for:Detected on the unauthorized resource of frequency range block of allocation result instruction and receive the D2D data.
- 35. system according to claim 30, it is characterised in that the purpose equipment is used for:Judge whether to receive the D2D data according to the 3rd control information;In the case where judging to receive the D2D data, in the unauthorized resource of frequency range block of the 3rd control information instruction It is upper to detect and receive the D2D data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610482725.8A CN107548070B (en) | 2016-06-27 | 2016-06-27 | Data transmission method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610482725.8A CN107548070B (en) | 2016-06-27 | 2016-06-27 | Data transmission method, device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107548070A true CN107548070A (en) | 2018-01-05 |
CN107548070B CN107548070B (en) | 2023-10-27 |
Family
ID=60961366
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610482725.8A Active CN107548070B (en) | 2016-06-27 | 2016-06-27 | Data transmission method, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107548070B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109496400A (en) * | 2018-10-16 | 2019-03-19 | 北京小米移动软件有限公司 | Method, apparatus, base station and the terminal of retransmission information |
CN110831225A (en) * | 2018-08-08 | 2020-02-21 | 华为技术有限公司 | Method and device for transmitting signals |
CN110891314A (en) * | 2018-09-11 | 2020-03-17 | 华为技术有限公司 | Communication method, resource allocation method and device |
CN111405678A (en) * | 2020-02-19 | 2020-07-10 | 重庆邮电大学 | CSMA-CA method based on virtual carrier sensing and priority scheduling |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102083138A (en) * | 2011-01-14 | 2011-06-01 | 北京邮电大学 | Method for simultaneously multiplexing multiple cellular user resources by D2D (Device-to-Device) user pair |
CN103582077A (en) * | 2012-08-07 | 2014-02-12 | 华为技术有限公司 | Inter-cell D2D communication method, UE and base station |
CN104918207A (en) * | 2015-05-08 | 2015-09-16 | 上海交通大学 | Multi-D2D communication resource allocation method in heterogeneous network based on frequency spectrum resource allocation |
CN105101430A (en) * | 2014-05-08 | 2015-11-25 | 中兴通讯股份有限公司 | Configuration, distribution method, and apparatus of D2D resource |
WO2016078396A1 (en) * | 2014-11-21 | 2016-05-26 | 中兴通讯股份有限公司 | Method and device for occupying unlicensed carrier |
-
2016
- 2016-06-27 CN CN201610482725.8A patent/CN107548070B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102083138A (en) * | 2011-01-14 | 2011-06-01 | 北京邮电大学 | Method for simultaneously multiplexing multiple cellular user resources by D2D (Device-to-Device) user pair |
CN103582077A (en) * | 2012-08-07 | 2014-02-12 | 华为技术有限公司 | Inter-cell D2D communication method, UE and base station |
CN105101430A (en) * | 2014-05-08 | 2015-11-25 | 中兴通讯股份有限公司 | Configuration, distribution method, and apparatus of D2D resource |
WO2016078396A1 (en) * | 2014-11-21 | 2016-05-26 | 中兴通讯股份有限公司 | Method and device for occupying unlicensed carrier |
CN104918207A (en) * | 2015-05-08 | 2015-09-16 | 上海交通大学 | Multi-D2D communication resource allocation method in heterogeneous network based on frequency spectrum resource allocation |
Non-Patent Citations (1)
Title |
---|
SAMSUNG: "R1-135222 "Evaluation results of resource allocation scheme for D2D communication"", 《3GPP TSG_RAN\WG1_RL1》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110831225A (en) * | 2018-08-08 | 2020-02-21 | 华为技术有限公司 | Method and device for transmitting signals |
CN110891314A (en) * | 2018-09-11 | 2020-03-17 | 华为技术有限公司 | Communication method, resource allocation method and device |
CN109496400A (en) * | 2018-10-16 | 2019-03-19 | 北京小米移动软件有限公司 | Method, apparatus, base station and the terminal of retransmission information |
CN109496400B (en) * | 2018-10-16 | 2021-10-08 | 北京小米移动软件有限公司 | Method, device, base station and terminal for retransmitting information |
US11832221B2 (en) | 2018-10-16 | 2023-11-28 | Beijing Xiaomi Mobile Software Co., Ltd. | Information retransmission method and apparatus, base station, and terminal |
CN111405678A (en) * | 2020-02-19 | 2020-07-10 | 重庆邮电大学 | CSMA-CA method based on virtual carrier sensing and priority scheduling |
CN111405678B (en) * | 2020-02-19 | 2023-02-17 | 重庆邮电大学 | CSMA-CA method based on virtual carrier sensing and priority scheduling |
Also Published As
Publication number | Publication date |
---|---|
CN107548070B (en) | 2023-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107079455B (en) | Method and apparatus for communication using unlicensed band in mobile communication system | |
US11129138B2 (en) | Resource selection method and corresponding equipment | |
US20190132856A1 (en) | Method and apparatus for scheduling uplink data in mobile communication system | |
CN106686691B (en) | A kind of random access response RAR transmission method and relevant device | |
CN104869526B (en) | A kind of communication of device-to-device and its resource allocation methods, equipment | |
US10917916B2 (en) | Method and device for transmitting PRACH signals in unauthorized spectrum | |
CN106453182A (en) | Preamble transmission method and apparatus | |
CN105532044B (en) | The sending, receiving method and device of data frame | |
CN107872860A (en) | A kind of uplink signal transmission method, device and system | |
CN104540230A (en) | Uplink scheduling method and uplink scheduling device | |
CN107041000A (en) | The transmission method and device of ascending control information | |
CN107251631A (en) | Obtain the distributed control method of fair Radio Resource access | |
US11871380B2 (en) | Resource selection method and corresponding equipment | |
CN106470492A (en) | Resource occupying method, device and user equipment | |
CN106470502A (en) | A kind of scheduling of resource of the unauthorized frequency range of LTE, using method and device | |
CN107548070A (en) | Data transmission method, apparatus and system | |
CN106455087A (en) | Competitive resource determining method and device | |
US11395284B2 (en) | Method and apparatus of indicating alternative resource at collision of configured grants | |
CN106488384A (en) | A kind of method and device sending packet | |
CN106454710A (en) | Resource allocation method and resource allocation device based on D2D (Device-to-Device) communication, base station and terminal | |
CN107950070A (en) | Method and apparatus for sending data in a wireless communication system | |
CN107734548A (en) | The channel sending method and device of V2X communications | |
CN107682930A (en) | A kind of resource selection method and device | |
CN108605314A (en) | A kind of uplink data transmission method and relevant device | |
CN105828450A (en) | Competition access method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |