CN107548070A - Data transmission method, apparatus and system - Google Patents

Data transmission method, apparatus and system Download PDF

Info

Publication number
CN107548070A
CN107548070A CN201610482725.8A CN201610482725A CN107548070A CN 107548070 A CN107548070 A CN 107548070A CN 201610482725 A CN201610482725 A CN 201610482725A CN 107548070 A CN107548070 A CN 107548070A
Authority
CN
China
Prior art keywords
data
resource
frequency range
unauthorized
allocation result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610482725.8A
Other languages
Chinese (zh)
Other versions
CN107548070B (en
Inventor
许文俊
付卓然
赵捷
李雪
苟伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610482725.8A priority Critical patent/CN107548070B/en
Publication of CN107548070A publication Critical patent/CN107548070A/en
Application granted granted Critical
Publication of CN107548070B publication Critical patent/CN107548070B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a kind of data transmission method, apparatus and system, wherein, this method includes:The data transfer request that one or more source device reports is received, wherein, data transfer request is used for the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;It is respectively that one or more source device distributes the unauthorized resource of frequency range according to data transfer request, obtains the allocation result of the unauthorized resource of frequency range;Allocation result is issued, wherein, source device and/or purpose equipment transmit D2D data according to allocation result in unauthorized frequency range, solve the problems, such as that D2D data can not realize transmission of the D2D data in unauthorized frequency range in unauthorized band transmissions in correlation technique.

Description

Data transmission method, apparatus and system
Technical field
The present invention relates to the communications field, in particular to a kind of data transmission method, apparatus and system.
Background technology
In the cell mobile communication systems centered on base station, there are still covering and capacity etc. to ask for system Topic.Numerous studies show that device-to-device (Device-to-Device, referred to as D2D) communication is saving resource, reducing interference There is advantageous advantage with efficiency of transmission etc. is lifted.In D2D communication modes, data friendship is directly carried out between user Mutually without by base station, base station only needs control device communication on a macro scale.In consideration of it, D2D technologies are combined with LTE system, The communication load of base station can be greatly reduced, the coverage of cell is expanded and improves the Service Quality of Cell Edge User Amount, so as to improve the total throughout of cell.
It is improper deep with D2D-LTE technical research, to LTE/LTE-A cellular communication systems and the D2D communication technologys Resource allocation methods also emerge in an endless stream.But the resource allocation methods of the D2D communication technologys are to authorize frequency range to carry out at present. However, with widespread deployment of the forth generation GSM in the whole world, LTE spectrum utilization gradually reaches bottleneck, further carried Height authorizes the utilization rate of frequency spectrum to need the technological innovation of essence or thoroughly carry out the upgrading of hardware device, and cost is too big.
Can not be the unauthorized band transmissions the problem of for D2D data in correlation technique, there is presently no efficiently solve Scheme.
The content of the invention
The embodiments of the invention provide a kind of data transmission method, apparatus and system, at least to solve D2D in correlation technique Data can not be the unauthorized band transmissions the problem of.
According to one embodiment of present invention, there is provided a kind of data transmission method, including:Receive one or more source The data transfer request that equipment reports, wherein, the data transfer request is used to set with purpose to base station requests transmission sources equipment Device-to-device D2D data between standby;It is respectively one or more of source devices point according to the data transfer request With the unauthorized resource of frequency range, the allocation result of the unauthorized resource of frequency range is obtained;The allocation result is issued, wherein, it is described Source device and/or the purpose equipment transmit the D2D data according to the allocation result in unauthorized frequency range.
Alternatively, issuing the allocation result includes:The allocation result is issued to one or more of source devices With one or more of source devices corresponding to purpose equipment;Or the allocation result is issued to one or more of Source device.
Alternatively, the allocation result is being issued to one or more of source devices and one or more of sources In the case of purpose equipment corresponding to equipment, the allocation result includes:For the unauthorized resource of frequency range of each source device distribution The Resource Block identification of block and for being controlled to the data transmitted on the unauthorized resource of frequency range block first control letter Breath, wherein, the Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;The allocation result is being issued to institute In the case of stating one or more source device, the allocation result includes:For the unauthorized frequency range money of each source device distribution The Resource Block identification of source block, wherein, the Resource Block identification is used for unauthorized resource of frequency range block described in unique mark.
Alternatively, the time slot of the communication frame in the unauthorized frequency range includes at least one of:Dedicated time slot, it is standby when Gap, shared time slot.
Alternatively, it is that one or more of source devices distribute the unauthorized resource of frequency range according to the data transfer request Including:The second control letter that the transmission being used for the D2D data according to being carried in the data transfer request is controlled Breath is defined as the ratio of the resource of each source device distribution, wherein, the resource includes at least one of:Dedicated time slot provides Source, spare time slot resource, shared time interval resource;According to the ratio of the resource of determination and each data transfer request Second control information of middle carrying is the resource block that each source device is distributed on the dedicated time slot and/or spare time slot.
Alternatively, before the allocation result is issued, methods described also includes:First is carried out to the unauthorized frequency range Clear channel assessment (CCA) CCA is detected;In the case of the first CCA detections successfully, confirm to take the unauthorized frequency range.
According to another embodiment of the invention, there is provided a kind of data transmission method, including:Data are sent to base station to pass Defeated request, wherein, the data transfer request is used to ask the device-to-device D2D numbers between transmission sources equipment and purpose equipment According to;Receive the allocation result for the unauthorized resource of frequency range that the base station issues;According to the allocation result in unauthorized frequency range The D2D data are sent to the purpose equipment.
Alternatively, the allocation result includes:To transmit the resource of the unauthorized resource of frequency range block of the D2D data distributions Block identification and the first control information for being controlled to the data transmitted on the unauthorized resource of frequency range block, wherein, The Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;Or the allocation result includes:For the source The Resource Block identification of the unauthorized resource of frequency range block of equipment distribution, wherein, the Resource Block identification is used for non-described in unique mark Authorize resource of frequency range block.
Alternatively, include in the allocation result:In the case of the Resource Block identification and first control information, root Sending the D2D data in the unauthorized frequency range according to the allocation result includes:Non- corresponding to the Resource Block identification Authorize and the D2D data are sent according to the instruction of first control information in the resource of frequency range.
Alternatively, include in the allocation result:In the case of the Resource Block identification, according to the allocation result in institute State and the D2D data are sent in unauthorized frequency range include:Sent corresponding to the Resource Block identification in the unauthorized resource of frequency range For the 3rd control information being controlled to transmission of the D2D data in the unauthorized frequency range and the D2D data.
Alternatively, the time slot of the communication frame in the unauthorized frequency range includes at least one of:Dedicated time slot, it is standby when Gap, shared time slot;The allocation result includes:To transmit the resource block mark on the dedicated time slot of the D2D data distributions Know and/or to transmit the Resource Block identification on the spare time slot of the D2D data distributions.
Alternatively, sending the D2D data in the unauthorized frequency range according to the allocation result includes:In distribution Second is carried out to the dedicated time slot resource block on dedicated time slot resource block corresponding to Resource Block identification on the dedicated time slot CCA is detected;In the case of the 2nd CCA detections successfully, the D2D data are sent on the dedicated time slot resource block.
Alternatively, it is right on the dedicated time slot resource block corresponding to the Resource Block identification on the dedicated time slot of distribution After the dedicated time slot resource block carries out the 2nd CCA detections, methods described also includes:Detect and lose in the 2nd CCA In the case of losing, to described standby on spare time slot resource block corresponding to the Resource Block identification on the spare time slot of distribution Time interval resource block carries out the 3rd CCA detections of pre-set priority;It is pre- waiting in the case of the 3rd CCA detection failures If the 3rd CCA detections of the pre-set priority are re-started after duration to the spare time slot resource block;Or described In the case of three CCA detections successfully, the source device transmits the D2D data on the spare time slot resource block.
Alternatively, the pre-set priority is higher than the priority that the CCA of base station side is detected, and/or, the pre-set priority For the limit priority of equipment side.
Alternatively, corresponding to the Resource Block identification on the spare time slot of distribution on spare time slot resource block to described After spare time slot resource block carries out the 3rd CCA detections of pre-set priority, methods described also includes:When the source device is in institute When stating the transmission that the D2D data are not completed on spare time slot resource block, the D2D data are completed on the shared time slot Transmission.
According to another embodiment of the invention, there is provided a kind of data transmission method, including:Reception base station issues non- Authorize the allocation result of the resource of frequency range or for being controlled to transmission of the device-to-device D2D data in unauthorized frequency range The 3rd control information;The D2D is received in unauthorized frequency range according to the allocation result or the 3rd control information Data.
Alternatively, the D2D data are received in unauthorized frequency range according to the allocation result includes:In the distribution knot Detected on the unauthorized resource of frequency range block of fruit instruction and receive the D2D data.
Alternatively, the D2D data are received in unauthorized frequency range according to the 3rd control information includes:According to described 3rd control information judges whether to receive the D2D data;In the case where judging to receive the D2D data, described Detected on the unauthorized resource of frequency range block of three control information instruction and receive the D2D data.
According to another embodiment of the invention, there is provided a kind of data transmission device, including:First receiving module, use In receiving the data transfer request that reports of one or more source device, wherein, the data transfer request is used for please to base station Seek the device-to-device D2D data between transmission sources equipment and purpose equipment;Distribute module, for being asked according to the data transfer Ask respectively one or more of source devices to distribute the unauthorized resource of frequency range, obtain the distribution of the unauthorized resource of frequency range As a result;Module is issued, for issuing the allocation result, wherein, the source device and/or the purpose equipment are according to described point The D2D data are transmitted in unauthorized frequency range with result.
Alternatively, the module that issues is used for:The allocation result is issued to one or more of source devices and institute State purpose equipment corresponding to one or more source device;Or the allocation result is issued to one or more of sources Equipment.
Alternatively, it is used to issue the allocation result to one or more of source devices and institute in the module that issues In the case of stating purpose equipment corresponding to one or more source device, the allocation result includes:Distributed for each source device The Resource Block identification of unauthorized resource of frequency range block and for being controlled to the data transmitted on the unauthorized resource of frequency range block First control information of system, wherein, the Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;Under described Hair module is used in the case of issuing the allocation result to one or more of source devices, and the allocation result includes: The Resource Block identification of unauthorized resource of frequency range block is distributed for each source device, wherein, the Resource Block identification is used for unique mark The unauthorized resource of frequency range block.
According to another embodiment of the invention, there is provided a kind of data transmission device, including:First sending module, use In sending data transfer request to base station, wherein, the data transfer request be used to asking transmission sources equipment and purpose equipment it Between device-to-device D2D data;Second receiving module, the distribution of the unauthorized resource of frequency range issued for receiving the base station As a result;Second sending module, for sending the D2D to the purpose equipment in unauthorized frequency range according to the allocation result Data.
Alternatively, the allocation result includes:To transmit the resource of the unauthorized resource of frequency range block of the D2D data distributions Block identification and the first control information for being controlled to the data transmitted on the unauthorized resource of frequency range block, wherein, The Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;Or the allocation result includes:For the source The Resource Block identification of the unauthorized resource of frequency range block of equipment distribution, wherein, the Resource Block identification is used for non-described in unique mark Authorize resource of frequency range block.
Alternatively, second sending module is used for:Include in the allocation result:The Resource Block identification and described In the case of one control information, corresponding to the Resource Block identification in the unauthorized resource of frequency range according to first control information Instruction send the D2D data.
Alternatively, second sending module is used for:Include in the allocation result:The situation of the Resource Block identification Under, it is used for being sent corresponding to the Resource Block identification in the unauthorized resource of frequency range to the D2D data in the unauthorized frequency The 3rd control information and the D2D data that transmission in section is controlled.
According to another embodiment of the invention, there is provided a kind of data transmission device, including:3rd receiving module, use In receive the allocation result of the unauthorized resource of frequency range that base station issues or for device-to-device D2D data in unauthorized frequency The 3rd control information that transmission in section is controlled;4th receiving module, for according to the allocation result or described Three control information receive the D2D data in unauthorized frequency range.
Alternatively, the 4th receiving module is used for:Examined on the unauthorized resource of frequency range block of allocation result instruction Survey and receive the D2D data.
Alternatively, the 4th receiving module is used for:Judge whether to receive the D2D numbers according to the 3rd control information According to;In the case where judging to receive the D2D data, on the unauthorized resource of frequency range block of the 3rd control information instruction Detect and receive the D2D data.
According to another embodiment of the invention, there is provided a kind of data transmission system, including:Base station, source device and mesh Equipment, wherein, the base station, the data transfer request reported for receiving one or more described source device, wherein, institute Data transfer request is stated to be used for the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;According to The data transfer request is respectively that one or more of source devices distribute the unauthorized resource of frequency range, is obtained described unauthorized The allocation result of the resource of frequency range;The allocation result is issued, wherein, the source device and/or the purpose equipment are according to Allocation result transmits the D2D data in unauthorized frequency range;The source device, passed for sending the data to the base station Defeated request;Receive the allocation result for the unauthorized resource of frequency range that the base station issues;According to the allocation result in unauthorized frequency Purpose equipment described in Duan Shangxiang sends the D2D data;The purpose equipment, the unauthorized frequency issued for receiving the base station Duan Ziyuan allocation result or for being controlled to transmission of the D2D data in unauthorized frequency range the 3rd control letter Breath;The D2D data are received in unauthorized frequency range according to the allocation result or the 3rd control information.
Alternatively, the base station is used for:The allocation result is issued to one or more of source devices and described one Purpose equipment corresponding to individual or multiple source devices;Or the allocation result is issued to one or more of source devices.
Alternatively, it is used to issue the allocation result to one or more of source devices and described one in the base station In the case of purpose equipment corresponding to individual or multiple source devices, the allocation result includes:Awarded for the distribution of each source device is non- Weigh the Resource Block identification of resource of frequency range block and for being controlled to the data transmitted on the unauthorized resource of frequency range block First control information, wherein, the Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;Used in the base station In the case of the allocation result to one or more of source devices are issued, the allocation result includes:For each source Equipment distributes the Resource Block identification of unauthorized resource of frequency range block, wherein, the Resource Block identification is used for non-described in unique mark award Weigh resource of frequency range block.
Alternatively, the source device is used for:Include in the allocation result:The Resource Block identification and first control In the case of information, corresponding to the Resource Block identification in the unauthorized resource of frequency range according to the instruction of first control information Send the D2D data.
Alternatively, the source device is used for:Include in the allocation result:In the case of the Resource Block identification, in institute State and sent corresponding to Resource Block identification in the unauthorized resource of frequency range for the biography to the D2D data in the unauthorized frequency range Defeated the 3rd control information being controlled and the D2D data.
Alternatively, the purpose equipment is used for:Detected simultaneously on the unauthorized resource of frequency range block of allocation result instruction Receive the D2D data.
Alternatively, the purpose equipment is used for:Judge whether to receive the D2D data according to the 3rd control information; In the case where judging to receive the D2D data, examined on the unauthorized resource of frequency range block of the 3rd control information instruction Survey and receive the D2D data.
By the present invention, the data transfer request that one or more source device reports is received, wherein, data transfer request For to the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;According to data transfer request point Not Wei one or more source device distribute the unauthorized resource of frequency range, obtain the allocation result of the unauthorized resource of frequency range;Issue point With result, wherein, source device and/or purpose equipment transmit D2D data according to allocation result in unauthorized frequency range, thus may be used See, use the resource of D2D data distribution unauthorized frequency range of the such scheme by base station between source device and purpose equipment, and Issue and the D2D is transmitted in unauthorized frequency range according to the allocation result for the source device and/or the purpose equipment The allocation result of data, it is thereby achieved that transmission of the D2D data in unauthorized frequency range, so as to solve D2D in correlation technique Data can not be the unauthorized band transmissions the problem of.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, forms the part of the application, this hair Bright schematic description and description is used to explain the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is a kind of flow chart of data transmission method according to embodiments of the present invention;
Fig. 2 is the flow chart of another data transmission method according to embodiments of the present invention;
Fig. 3 is the flow chart of another data transmission method according to embodiments of the present invention;
Fig. 4 is a kind of structured flowchart of data transmission device according to embodiments of the present invention;
Fig. 5 is the structured flowchart of another data transmission device according to embodiments of the present invention;
Fig. 6 is the structured flowchart of another data transmission device according to embodiments of the present invention;
Fig. 7 is the schematic diagram for the instruction that control information is transmitted according to the UE of alternative embodiment of the present invention;
Fig. 8 is the schematic diagram that resource allocation is carried out according to the base station of alternative embodiment of the present invention;
Fig. 9 is the schematic diagram according to the DCI format of alternative embodiment of the present invention;
Figure 10 is the flow chart carried out data transmission according to a kind of UE of alternative embodiment of the present invention;
Figure 11 is the flow chart carried out data transmission according to another UE of alternative embodiment of the present invention.
Embodiment
Describe the present invention in detail below with reference to accompanying drawing and in conjunction with the embodiments.It should be noted that do not conflicting In the case of, the feature in embodiment and embodiment in the application can be mutually combined.
It should be noted that term " first " in description and claims of this specification and above-mentioned accompanying drawing, " Two " etc. be for distinguishing similar object, without for describing specific order or precedence.
Embodiment 1
A kind of data transmission method is provided in the present embodiment, and Fig. 1 is that a kind of data according to embodiments of the present invention pass The flow chart of transmission method, as shown in figure 1, the flow comprises the following steps:
Step S102, the data transfer request that one or more source device reports is received, wherein, data transfer request is used In to the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;
Step S104, it is respectively that one or more source device distributes the unauthorized resource of frequency range according to data transfer request, Obtain the allocation result of the unauthorized resource of frequency range;
Step S106, issues allocation result, wherein, source device and/or purpose equipment are according to allocation result in unauthorized frequency D2D data are transmitted in section.
Alternatively, above-mentioned data transmission method can be, but not limited in the scene applied to D2D data transfers.Such as:For The equipment distribution resource of D2D data transfers simultaneously carries out the scene of D2D data transfers.
Alternatively, above-mentioned data transmission method can be, but not limited to be applied to base station, such as:Macro base station, micro-base station, slightly Base station, Home eNodeB etc..
By above-mentioned steps, the data transfer request that one or more source device reports is received, wherein, data transfer please Ask for the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;According to data transfer request Respectively one or more source device distributes the unauthorized resource of frequency range, obtains the allocation result of the unauthorized resource of frequency range;Issue Allocation result, wherein, source device and/or purpose equipment transmit D2D data according to allocation result in unauthorized frequency range, thus may be used See, use the resource of D2D data distribution unauthorized frequency range of the such scheme by base station between source device and purpose equipment, and The allocation result for transmitting D2D data in unauthorized frequency range according to allocation result for source device and/or purpose equipment is issued, because This, realizes transmission of the D2D data in unauthorized frequency range, can not be unauthorized so as to solve D2D data in correlation technique The problem of band transmissions.
Alternatively, the allocation result that base station issues can be sent to source device and purpose equipment simultaneously, can also only send To source device.Such as:Issue purpose corresponding to allocation result to one or more source device and one or more source device Equipment;Or allocation result is issued to one or more source device.
Alternatively, mesh corresponding to allocation result to one or more source device and one or more source device is being issued Equipment in the case of, allocation result can be, but not limited to include:The unauthorized resource of frequency range block distributed for each source device Resource Block identification and the first control information for being controlled to the data transmitted on unauthorized resource of frequency range block, wherein, Resource Block identification is used for the unauthorized resource of frequency range block of unique mark;Issuing feelings of the allocation result to one or more source device Under condition, allocation result can be, but not limited to include:The Resource Block identification of the unauthorized resource of frequency range block distributed for each source device, Wherein, Resource Block identification is used for the unauthorized resource of frequency range block of unique mark.
It is alternatively possible to according to the slot segmentation that different occupation modes is the communication frame in unauthorized frequency range.Such as:It is non- Authorizing the time slot of the communication frame in frequency range includes at least one of:Dedicated time slot, spare time slot, shared time slot.Wherein, it is special Time slot can be the time interval resource used by specified equipment, and dedicated time slot is dedicated for transmitting the data of designated equipment.It is standby Time slot can be pre-assigned to designated equipment, and spare time slot can also transmit other and set in addition to the data of transmission designated equipment Standby data.
Alternatively, can be according in data transfer request in order to complete the transmission of data on dedicated time slot as far as possible The second control information for being used for the transmission to D2D data and being controlled carried, such as:Second control information can be, but not limited to It is the available resource ratio of three kinds of slot allocation apparatus, further according to the ratio of distribution including data volume waiting for transmission and data type Example distribution resource.Such as:The second control that the transmission being used for D2D data according to being carried in data transfer request is controlled Information is defined as the ratio of the resource of each source device distribution, wherein, resource includes at least one of:Dedicated time slot resource, Spare time slot resource, shared time interval resource, according to the carried in the ratio of the resource of determination and each data transfer request Two control information are the resource block that each source device is distributed on dedicated time slot and/or spare time slot.
Alternatively, in order to ensure the availability of resource, before above-mentioned steps S106, can be, but not limited to carry out channel CCA is detected, if detected successfully, unauthorized frequency range is taken.Such as:First clear channel assessment (CCA) is carried out to unauthorized frequency range CCA is detected, and in the case of the first CCA detections successfully, confirms to take unauthorized frequency range.
Another data transmission method is additionally provided in the present embodiment, and Fig. 2 is another kind according to embodiments of the present invention The flow chart of data transmission method, as shown in Fig. 2 the flow comprises the following steps:
Step S202, to base station send data transfer request, wherein, data transfer request be used for ask transmission sources equipment with Device-to-device D2D data between purpose equipment;
Step S204, receive the allocation result for the unauthorized resource of frequency range that base station issues;
Step S206, D2D data are sent to purpose equipment in unauthorized frequency range according to allocation result.
Alternatively, above-mentioned data transmission method can be, but not limited in the scene applied to D2D data transfers.Such as:For The equipment distribution resource of D2D data transfers simultaneously carries out the scene of D2D data transfers.
Alternatively, above-mentioned data transmission method can be, but not limited to the equipment for being applied to transmission D2D data, such as:Transmission The source device of D2D data.
By above-mentioned steps, data transfer request is sent to base station, wherein, data transfer request is used to ask transmission sources to set The standby device-to-device D2D data between purpose equipment;Receive the allocation result for the unauthorized resource of frequency range that base station issues;Root According to allocation result in unauthorized frequency range to purpose equipment send D2D data, it can be seen that, use such scheme according to base station for The allocation result transmission D2D data of the resource of the unauthorized frequency range of D2D data distributions between source device and purpose equipment, because This, realizes transmission of the D2D data in unauthorized frequency range, can not be unauthorized so as to solve D2D data in correlation technique The problem of band transmissions.
Alternatively, allocation result can be, but not limited to include:To transmit the unauthorized resource of frequency range block of D2D data distributions Resource Block identification and the first control information for being controlled to the data transmitted on unauthorized resource of frequency range block, wherein, Resource Block identification is used for the unauthorized resource of frequency range block of unique mark;Or allocation result can be, but not limited to include:For source device The Resource Block identification of the unauthorized resource of frequency range block of distribution, wherein, Resource Block identification is used for the unauthorized resource of frequency range of unique mark Block.
Alternatively, include in allocation result:In the case of Resource Block identification and the first control information, in above-mentioned steps S206 In, D2D data are being sent according to the instruction of the first control information in the unauthorized resource of frequency range corresponding to Resource Block identification.
Alternatively, include in allocation result:In the case of Resource Block identification, in above-mentioned steps S206, in resource block mark The 3rd control for being controlled to transmission of the D2D data in unauthorized frequency range is sent corresponding to knowledge in the unauthorized resource of frequency range Information processed and D2D data.
Alternatively, the time slot of the communication frame in unauthorized frequency range can be, but not limited to include at least one of:When special Gap, spare time slot, shared time slot;Allocation result can be, but not limited to include:To transmit on the dedicated time slot of D2D data distributions Resource Block identification and/or for transmission D2D data distributions spare time slot on Resource Block identification.
Alternatively, in above-mentioned steps S206, the 2nd CCA inspections can be first carried out to unauthorized frequency range before transmitting the data Survey.Such as:To dedicated time slot resource block on dedicated time slot resource block corresponding to Resource Block identification on the dedicated time slot of distribution The 2nd CCA detections are carried out, in the case of the 2nd CCA detections successfully, D2D data are sent on dedicated time slot resource block.
Alternatively, corresponding to the Resource Block identification on the dedicated time slot of distribution on dedicated time slot resource block to dedicated time slot , can be in the resource block on the spare time slot of distribution if the 2nd CCA detection failures after resource block carries out the 2nd CCA detections The 3rd CCA for carrying out pre-set priority on spare time slot resource block to spare time slot resource block corresponding to mark is detected, the 3rd In the case of CCA detection failures, the 3rd of pre-set priority is re-started to spare time slot resource block after preset duration is waited CCA is detected;Or in the case of the 3rd CCA detections successfully, source device transmits D2D data on spare time slot resource block.
Alternatively, pre-set priority can be, but not limited to the priority detected higher than the CCA of base station side, and/or, preset excellent First level can be, but not limited to as the limit priority of equipment side.
Alternatively, dedicated time slot does not complete the D2D equipment of transmission, then when spare time slot carries out data transmission, it is necessary to elder generation CCA detections are performed, CCA detections now are higher than the priority for the CCA that dedicated time slot performs.Spare time slot does not complete transmission D2D equipment, then when shared time slot carries out data transmission, it is necessary to first carry out CCA detections, spare time slot is compared in CCA detections now The CCA of execution priority is high.
Alternatively, corresponding to the Resource Block identification on the spare time slot of distribution on spare time slot resource block to spare time slot After resource block carries out the 3rd CCA detections of pre-set priority, if source device does not complete D2D numbers on spare time slot resource block According to transmission, the transmission of D2D data can be completed on shared time slot.
Another data transmission method is additionally provided in the present embodiment, and Fig. 3 is another according to embodiments of the present invention The flow chart of data transmission method, as shown in figure 3, the flow comprises the following steps:
Step S302, receive the allocation result for the unauthorized resource of frequency range that base station issues or for device-to-device The 3rd control information that transmission of the D2D data in unauthorized frequency range is controlled;
Step S304, D2D data are received in unauthorized frequency range according to allocation result or the 3rd control information.
Alternatively, above-mentioned data transmission method can be, but not limited in the scene applied to D2D data transfers.Such as:For The equipment distribution resource of D2D data transfers simultaneously carries out the scene of D2D data transfers.
Alternatively, above-mentioned data transmission method can be, but not limited to the equipment for being applied to transmission D2D data, such as:Transmission The purpose equipment of D2D data.
By above-mentioned steps, receive the unauthorized resource of frequency range that base station issues allocation result or for equipment to setting The 3rd control information that standby transmission of the D2D data in unauthorized frequency range is controlled;Controlled according to allocation result or the 3rd Information receives D2D data in unauthorized frequency range, it can be seen that, use such scheme according to base station for source device and purpose equipment Between D2D data distributions unauthorized frequency range resource allocation result or receive be used for device-to-device D2D The 3rd control information that transmission of the data in unauthorized frequency range is controlled receives D2D data in unauthorized frequency range, therefore, Transmission of the D2D data in unauthorized frequency range is realized, can not be in unauthorized frequency range so as to solve D2D data in correlation technique The problem of transmission.
Alternatively, in above-mentioned steps S304, if what is received is allocation result, can be indicated in allocation result non- Authorize and detected on resource of frequency range block and receive D2D data.
Alternatively, in above-mentioned steps S304, if what is received is the 3rd control information, can be believed according to the 3rd control Breath judges whether to receive D2D data, in the case where judging to receive D2D data, in the unauthorized of the 3rd control information instruction Detected on resource of frequency range block and receive D2D data.
Embodiment 2
A kind of data transmission device is additionally provided in the present embodiment, and the device is used to realize above-described embodiment and preferred reality Mode is applied, had carried out repeating no more for explanation.As used below, term " module " can realize the soft of predetermined function The combination of part and/or hardware.Although device described by following examples is preferably realized with software, hardware, or The realization of the combination of software and hardware is also what may and be contemplated.
Fig. 4 is a kind of structured flowchart of data transmission device according to embodiments of the present invention, as shown in figure 4, the device bag Include:
First receiving module 42, the data transfer request reported for receiving one or more source device, wherein, data Transmission request is used for the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;
Distribute module 44, coupled to the first receiving module 42, for being respectively one according to data transfer request or more Individual source device distributes the unauthorized resource of frequency range, obtains the allocation result of the unauthorized resource of frequency range;
Module 46 is issued, coupled to distribute module 44, for issuing allocation result, wherein, source device and/or purpose equipment D2D data are transmitted in unauthorized frequency range according to allocation result.
Alternatively, above-mentioned data transmission device can be, but not limited in the scene applied to D2D data transfers.Such as:For The equipment distribution resource of D2D data transfers simultaneously carries out the scene of D2D data transfers.
Alternatively, above-mentioned data transmission device can be, but not limited to be applied to base station, such as:Macro base station, micro-base station, slightly Base station, Home eNodeB etc..
By said apparatus, the first receiving module receives the data transfer request that one or more source device reports, its In, data transfer request is used for the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;Distribution Module is respectively that one or more source device distributes the unauthorized resource of frequency range according to data transfer request, obtains unauthorized frequency range The allocation result of resource;Issue module and issue allocation result, wherein, source device and/or purpose equipment are according to allocation result non- Authorize and D2D data transmitted in frequency range, it can be seen that, use such scheme by base station between source device and purpose equipment The resource of the unauthorized frequency range of D2D data distributions, and issue for source device and/or purpose equipment according to allocation result unauthorized The allocation result of D2D data is transmitted in frequency range, it is thereby achieved that transmission of the D2D data in unauthorized frequency range, so as to solve D2D data can not be the unauthorized band transmissions the problem of in correlation technique.
Alternatively, module 46 is issued to be used for:Allocation result is issued to one or more source device and one or more Purpose equipment corresponding to source device;Or allocation result is issued to one or more source device.
Alternatively, module 46 is being issued for issuing allocation result to one or more source device and one or more In the case of purpose equipment corresponding to source device, allocation result can be, but not limited to include:For non-the awarding of each source device distribution Weigh the Resource Block identification and first for being controlled to the data transmitted on unauthorized resource of frequency range block of resource of frequency range block Control information, wherein, Resource Block identification is used for the unauthorized resource of frequency range block of unique mark.
Alternatively, in the case where issuing module 46 and being used to issue allocation result to one or more source device, distribution As a result can be, but not limited to include:The Resource Block identification of the unauthorized resource of frequency range block distributed for each source device, wherein, resource Block identification is used for the unauthorized resource of frequency range block of unique mark.
Alternatively, the time slot of the communication frame in unauthorized frequency range can be, but not limited to include at least one of:When special Gap, spare time slot, shared time slot.
Alternatively, distribute module is used for:The transmission being used for D2D data according to being carried in data transfer request is controlled Second control information of system is defined as the ratio of the resource of each source device distribution, wherein, resource includes at least one of:Specially With time interval resource, spare time slot resource, shared time interval resource;According to the ratio of the resource of determination and each data transfer request Second control information of middle carrying is the resource block that each source device is distributed on dedicated time slot and/or spare time slot.
Alternatively, the device is additionally operable to:Before allocation result is issued, the first idle channel is carried out to unauthorized frequency range and commented Estimate CCA detections, in the case of the first CCA detections successfully, confirm to take unauthorized frequency range.
Another data transmission device is additionally provided in the present embodiment, and Fig. 5 is another kind according to embodiments of the present invention The structured flowchart of data transmission device, as shown in figure 5, the device includes:
First sending module 52, for sending data transfer request to base station, wherein, data transfer request is used to ask to pass Device-to-device D2D data between defeated source device and purpose equipment;
Second receiving module 54, coupled to the first sending module 52, the unauthorized resource of frequency range issued for receiving base station Allocation result;
Second sending module 56, coupled to the second receiving module 54, for according to allocation result in unauthorized frequency range to Purpose equipment sends D2D data.
Alternatively, above-mentioned data transmission device can be, but not limited in the scene applied to D2D data transfers.Such as:For The equipment distribution resource of D2D data transfers simultaneously carries out the scene of D2D data transfers.
Alternatively, above-mentioned data transmission device can be, but not limited to the equipment for being applied to transmission D2D data, such as:Transmission The source device of D2D data.
By said apparatus, the first sending module sends data transfer request to base station, wherein, data transfer request is used for Ask the device-to-device D2D data between transmission sources equipment and purpose equipment;Second receiving module 54 receives what base station issued The allocation result of the unauthorized resource of frequency range;Second sending module is sent according to allocation result in unauthorized frequency range to purpose equipment D2D data, it can be seen that, use the non-of D2D data distribution of the such scheme according to base station between source device and purpose equipment The allocation result transmission D2D data of the resource of frequency range are authorized, it is thereby achieved that transmission of the D2D data in unauthorized frequency range, from And solve the problems, such as that D2D data can not be in unauthorized band transmissions in correlation technique.
Alternatively, allocation result can be, but not limited to include:To transmit the unauthorized resource of frequency range block of D2D data distributions Resource Block identification and the first control information for being controlled to the data transmitted on unauthorized resource of frequency range block, wherein, Resource Block identification is used for the unauthorized resource of frequency range block of unique mark;Or allocation result can be, but not limited to include:For source device The Resource Block identification of the unauthorized resource of frequency range block of distribution, wherein, Resource Block identification is used for the unauthorized resource of frequency range of unique mark Block.
Alternatively, include in allocation result:In the case of Resource Block identification and the first control information, the second sending module 56 For:D2D data are being sent according to the instruction of the first control information in the unauthorized resource of frequency range corresponding to Resource Block identification.
Alternatively, include in allocation result:In the case of Resource Block identification, the second sending module 56 is used for:In resource block Sent corresponding to mark in the unauthorized resource of frequency range for transmission of the D2D data in unauthorized frequency range is controlled the 3rd Control information and D2D data.
Alternatively, the time slot of the communication frame in unauthorized frequency range can be, but not limited to include at least one of:When special Gap, spare time slot, shared time slot;Allocation result can be, but not limited to include:To transmit on the dedicated time slot of D2D data distributions Resource Block identification and/or for transmission D2D data distributions spare time slot on Resource Block identification.
Alternatively, the second sending module 56 is used for:When special corresponding to the Resource Block identification on the dedicated time slot of distribution The 2nd CCA detections are carried out on gap resource block to dedicated time slot resource block;In the case of the 2nd CCA detections successfully, when special D2D data are sent on gap resource block.
Alternatively, the device is additionally operable to:Dedicated time slot resource corresponding to Resource Block identification on the dedicated time slot of distribution After carrying out the 2nd CCA detections to dedicated time slot resource block on block, in the case of the 2nd CCA detection failures, in the standby of distribution Carry out the of pre-set priority on spare time slot resource block to spare time slot resource block corresponding to the Resource Block identification on time slot Three CCA are detected;In the case of the 3rd CCA detection failures, spare time slot resource block is re-started after preset duration is waited The 3rd CCA detections of pre-set priority;Or in the case of the 3rd CCA detections successfully, source device is in spare time slot resource block Upper transmission D2D data.
Alternatively, pre-set priority can be, but not limited to the priority detected higher than the CCA of base station side, and/or, preset excellent First level can be, but not limited to as the limit priority of equipment side.
Alternatively, dedicated time slot does not complete the D2D equipment of transmission, then when spare time slot carries out data transmission, it is necessary to elder generation CCA detections are performed, CCA detections now are higher than the priority for the CCA that dedicated time slot performs.Spare time slot does not complete transmission D2D equipment, then when shared time slot carries out data transmission, it is necessary to first carry out CCA detections, spare time slot is compared in CCA detections now The CCA of execution priority is high.
Alternatively, the device is additionally operable to:Spare time slot resource corresponding to Resource Block identification on the spare time slot of distribution After the 3rd CCA detections for carrying out pre-set priority on block to spare time slot resource block, when source device is in spare time slot resource block During the transmission of upper unfinished D2D data, the transmission of D2D data is completed on shared time slot.
Another data transmission device is additionally provided in the present embodiment, and Fig. 6 is another according to embodiments of the present invention The structured flowchart of data transmission device, as shown in fig. 6, the device includes:
3rd receiving module 62, the allocation result of the unauthorized resource of frequency range issued for receiving base station or for pair setting The 3rd control information that the standby transmission to equipment D2D data in unauthorized frequency range is controlled;
4th receiving module 64, coupled to the 3rd receiving module 62, for according to allocation result or the 3rd control information D2D data are received in unauthorized frequency range.
Alternatively, above-mentioned data transmission device can be, but not limited in the scene applied to D2D data transfers.Such as:For The equipment distribution resource of D2D data transfers simultaneously carries out the scene of D2D data transfers.
Alternatively, above-mentioned data transmission device can be, but not limited to the equipment for being applied to transmission D2D data, such as:Transmission The purpose equipment of D2D data.
By said apparatus, the 3rd receiving module receives the allocation result or use for the unauthorized resource of frequency range that base station issues In the 3rd control information being controlled to transmission of the device-to-device D2D data in unauthorized frequency range;4th receiving module D2D data are received in unauthorized frequency range according to allocation result or the 3rd control information, it can be seen that, using such scheme root Allocation result or reception according to the resource of the unauthorized frequency range of D2D data distribution of the base station between source device and purpose equipment To for the 3rd control information that is controlled to transmission of the device-to-device D2D data in unauthorized frequency range unauthorized D2D data are received in frequency range, it is thereby achieved that transmission of the D2D data in unauthorized frequency range, so as to solve in correlation technique D2D data can not be the unauthorized band transmissions the problem of.
Alternatively, the 4th receiving module 64 is used for:Detect and connect on the unauthorized resource of frequency range block of allocation result instruction Receive D2D data.
Alternatively, the 4th receiving module 64 is used for:Judged whether to receive D2D data according to the 3rd control information;Judging In the case of going out to receive D2D data, detected on the unauthorized resource of frequency range block of the 3rd control information instruction and receive D2D numbers According to.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, Ke Yitong Cross in the following manner realization, but not limited to this:Above-mentioned module is respectively positioned in same processor;Or above-mentioned module is respectively positioned at more In individual processor.
Embodiment 3
A kind of data transmission system is provided in the present embodiment, and the system includes:Base station, source device and purpose equipment, Wherein,
Base station, the data transfer request reported for receiving one or more source device, wherein, data transfer request is used In to the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;Distinguished according to data transfer request The unauthorized resource of frequency range is distributed for one or more source device, obtains the allocation result of the unauthorized resource of frequency range;Issue distribution As a result, wherein, source device and/or purpose equipment transmit D2D data according to allocation result in unauthorized frequency range;
Source device, for sending data transfer request to base station;Receive the distribution for the unauthorized resource of frequency range that base station issues As a result;D2D data are sent to purpose equipment in unauthorized frequency range according to allocation result;
Purpose equipment, the allocation result of the unauthorized resource of frequency range issued for receiving base station or for D2D data The 3rd control information that transmission in unauthorized frequency range is controlled;Awarded according to allocation result or the 3rd control information non- Weigh and D2D data are received in frequency range.
Alternatively, base station is used for:Allocation result is issued to one or more source device and one or more source device Corresponding purpose equipment;Or allocation result is issued to one or more source device.
Alternatively, it is used to issue allocation result to one or more source device and one or more source device in base station In the case of corresponding purpose equipment, allocation result includes:The resource block of unauthorized resource of frequency range block is distributed for each source device Mark and the first control information for being controlled to the data transmitted on unauthorized resource of frequency range block, wherein, resource block Identify and be used for the unauthorized resource of frequency range block of unique mark;It is used to issue allocation result to one or more source device in base station In the case of, allocation result includes:The Resource Block identification of unauthorized resource of frequency range block is distributed for each source device, wherein, resource block Identify and be used for the unauthorized resource of frequency range block of unique mark.
Alternatively, source device is used for:Include in allocation result:In the case of Resource Block identification and the first control information, D2D data are sent according to the instruction of the first control information in the unauthorized resource of frequency range corresponding to Resource Block identification.
Alternatively, source device is used for:Include in allocation result:It is corresponding in Resource Block identification in the case of Resource Block identification The unauthorized resource of frequency range on send the 3rd control information for being controlled to transmission of the D2D data in unauthorized frequency range With D2D data.
Alternatively, purpose equipment is used for:Detected on the unauthorized resource of frequency range block of allocation result instruction and receive D2D numbers According to.
Alternatively, purpose equipment is used for:Judged whether to receive D2D data according to the 3rd control information;Judging to receive In the case of D2D data, detected on the unauthorized resource of frequency range block of the 3rd control information instruction and receive D2D data.
It is described in detail with reference to alternative embodiment of the present invention.
Frequency spectrum access (License Assisted Access, referred to as LAA) technology is authorized based on auxiliary, the present invention can Select embodiment to provide a kind of resource allocation methods towards D2D communications, the problem of to mitigate LTE base station high load capacity, improve D2D Communicate the resource utilization in unauthorized frequency range.Therefore, this alternative embodiment is conceived to money of the D2D communications in unauthorized frequency range Source distribution method, consider in varied situations (such as:Be successfully accessed first and access failure first) resource utilization, it is real Existing following functions:
1) base station reports situation to carry out pre-allocation of resources according to D2D UE, and when base station detects idle channel, UE can To carry out corresponding data transfer according to the resource allocation result of base station.
2) different D2D UE carry out related data transmission according to the resource allocation result of base station using unauthorized frequency range.UE Progress CCA, which is detected, is successfully then directly connected to corresponding dedicated time slot, if CCA fails, is transferred to spare time slot or shared Slot transmission data.
3) D2D communication frames are divided into dedicated time slot (dedicated slot), spare time slot (spare slot) and are total to Enjoy time slot (shared slot):The information that the communication resource corresponding to dedicated time slot is reported by base station according to UE is allocated;It is standby For time slot by base station according to reporting the UE of transmission demand to be pre-allocated, corresponding UE simply possesses priority access power, might not must Corresponding resource must be linked into, other UE can also be at war with access to the resource;The communication resource of shared time slot then use with The mode that machine competition is kept out of the way accesses, and reduces the possibility clashed between different D2D UE.The above-mentioned method of salary distribution can reduce money Source wastes, and improves resource utilization.
What this alternative embodiment proposed is a kind of resource of the high resource utilization to be communicated for D2D in unauthorized frequency range Distribution method.On the basis of the FBE frame structures that LAA is proposed, according to the characteristic of D2D communications, base station is utilized to carry out macro-control With allocating in advance for resource, by the way that communication frame is divided into dedicated time slot (dedicated slot), spare time slot (spare Slot) and shared time slot (shared slot) method, solve it is a variety of in the case of (UE carry out CCA success and UE carry out CCA The problem of unsuccessfully) how reducing the wasting of resources.Specific slot allocation method can be by D2D UE data volume and type of service Determine.
This alternative embodiment provides two examples:D2D UE are reported and distributing slot resources example and D2D efficient datas Transmit example.
In D2D UE and base station resource allocation example, mainly under LAA scenes, in unauthorized frequency range between D2D UE On communication.
Although D2D communications are carried out in unauthorized frequency range corresponding to this example, but still can be controlled by base station With corresponding resource allocation, the process of control and corresponding resource allocation can authorize frequency range to carry out.
In regular hour window ranges, producing the D2D UE of business transmission demand can transmit to base station reported data Ask, the business classification and the data volume that are carried in the data transfer request that base station reports according to the UE collected carry out pre- point of resource Match somebody with somebody, and to D2D UE corresponding to sending and receiving end to issuing identical random seed.The resource allocation methods provided in this example can be with Comprise the following steps:
Step 11, UE reported datas transmission request:D2D UE pass through dispatch request (Scheduling on PUCCH Request, referred to as SR) notify base station oneself to there is uplink scheduling request to transmit, request base station eNodeB is that its distribution is up Resource.Fig. 7 is the schematic diagram for the instruction that control information is transmitted according to the UE of alternative embodiment of the present invention, as shown in fig. 7, corresponding UE By such as data-source device ID of the control information needed for data transfer, data purpose equipment ID, type of service, data volume, priority Etc. reporting base station.
Step 12, base station carries out the resource allocation of unauthorized frequency range:Base station carries out resource according to D2D UE reported result Distribution.Fig. 8 is the schematic diagram that resource allocation is carried out according to the base station of alternative embodiment of the present invention, as shown in figure 8, in this example The time slot of communication frame in unauthorized frequency range is divided into following three kinds:Dedicated time slot, spare time slot and shared time slot.Base station according to The information that UE is reported determines the proportioning of above-mentioned three kinds of time slots, ensures that D2D communications are as much as possible and is transmitted on dedicated time slot.Its In, the resource on dedicated time slot can be allocated completely by base station, and the minimum particle size of resource allocation can be MRB (Mini Resource Block).Such as:One MRB includes 14 OFDM symbols in time domain, and time domain size is two time slots, i.e., 1ms;12 continuous subcarriers are included on frequency domain, frequency domain size is 180kHz.In view of what is be likely to occur in transmitting procedure The situation of CCA failures, for spare time slot, base station reports order to carry out pre-allocation of resources, but actual transmissions according to D2D UE's During be allocated resource it is possible to being taken by other UE.Resource to sharing time slot, base station is without distribution.
Step 13, the allocation result of base station down distributing resource:Base station can according to agreement 36.212 and 36.213, mainly by PDCCH sends down dispatch information to UE.Fig. 9 is according to the schematic diagram of the DCI format of alternative embodiment of the present invention, such as Fig. 9 institutes Show, each PDCCH can only carry certain format DCI, the i.e. corresponding specific UE of a PDCCH, it is contemplated that mesh Preceding PDCCH still has remaining bit, can extend DCI form, it is carried corresponding base station allocation result.
In the data transfer example based on base station allocation result, under LAA scene, in order to avoid with Wi-Fi signal Or other LAA signals disturb, listem-before-talk (Listen Before Talk, referred to as LBT) side is typically taken Formula, corresponding frame structure are then embodied in, and before actually data are sent, clear channel assessment (CCA) (Clear is had in corresponding frame structure Channel Assessment, referred to as CCA).
The citation form of the frame structure used in this example is the setting (FBE) based on frame, and this example is intended to avoid resource Waste, improve resource utilization, it is main to consider that UE progress accesses CCA successes first and UE carries out access CCA first and failed two kinds In the case of data transmission procedure, Figure 10 is the flow chart carried out data transmission according to a kind of UE of alternative embodiment of the present invention, As shown in Figure 10, the flow includes following process:
D2D communications first have to confirm holding for frequency range by CCA before the progress of unauthorized frequency range, CCA inspections now Survey is completed by base station., will also be by corresponding D2D UE again before D2D data interactions after confirming to the holding of channel in base station Secondary carry out CCA, to ensure the occupancy to channel.CCA end positions should be identical corresponding to same time slot, i.e., valid data transmit Starting point should be identical.
In dedicated time slot, each UE carries out data transmission according to the arbitration result of base station, first has to carry out before being transmitted CCA is detected.Assuming that UE1 and UE2 be present, wherein UE1 is transmitting terminal, and UE2 is receiving terminal, and base station is that UE1 and UE2 distributes identical MRB is numbered.If UE1 carries out CCA failures in dedicated time slot, show that the resource of distribution is taken by other business, then corresponding number It is transmitted according to spare time slot is transferred to, UE2 can utilize identical MRB numberings to be linked among corresponding resource.
In spare time slot, it is contemplated that in the situation for the CCA failures that dedicated time slot is likely to occur, base station is by D2D Preliminary distribution has been carried out to resource to the method for distribution MRB numberings.Although base station has carried out the predistribution of resource in advance, Caused bursty data can also be transmitted by taking the resource of spare time slot in transmitting procedure.In order to ensure as far as possible The D2D UE for failing to complete data interaction in dedicated time slot take resource, and in spare time slot, D2D UE use higher priority CCA is detected, and probability is seized to improve it.By above-mentioned design, the D2D UE that data transfer is not completed in dedicated time slot will more hold Easily access channel carries out corresponding resource transmission.
In shared time slot, the D2D UE for failing to complete data interaction in dedicated time slot and spare time slot will be existing by D2D Access way completes data transfer.Such as UE1 is as transmitting terminal and UE2 is as receiving terminal, before data transfer, UE1 can be to UE2 The control signaling for including ID marks is sent, UE2 can determine whether data source is correct after receiving demodulation, if correctly, Receive follow-up data;If incorrect, UE2 rejects follow-up data.
In addition, the energy that base station detects after n CCA is carried out is less than threshold value, then it is assumed that channel can take, number According to having completed to interact.Base station can select to withdraw channel, carry out the data transfer of next round.
The difference of resource mode is distributed according to base station, this example additionally provides another unauthorized frequency range towards D2D data Interactive method.Figure 11 is the flow chart carried out data transmission according to another UE of alternative embodiment of the present invention, such as Figure 11 institutes Show, the flow comprises the following steps:
Step S1102, D2D UE report transmission to ask.D2D UE pass through SR (Scheduling on PUCCH Request, SR) notify base station oneself to there is uplink scheduling request to transmit, request eNodeB distributes ascending resource for it.Then, Corresponding UE is on the ascending resource that base station is distributed by the control information of data transfer such as data-source device ID, data purpose equipment ID, type of service, data volume, priority etc. report base station.(method is with the Step 1 in 2.2.1)
Step S1104, base station according to reported result, be only assigned to D2D UE be used for transmit subframe, specific resource divides Voluntarily determined by D2D UE with situation.Base station allocation result issues.
Step S1106, detection, in the case where detecting channel idle, perform step S1108 newly to whether idle.
Step S1108, D2D UE sends corresponding control information among D2D control domains, includes the MRB moneys of data transfer The information such as source, transport-type, reference signal (Reference Signal).It is possible in view of D2D UE in the resource of distribution There is the situation of CCA failures, it is also necessary to provide the candidate resource for data transfer in control domain, guarantee to complete accordingly Data transfer.
Step S1110, D2D UE completes corresponding data transfer according to the control information in control domain.Transmitting every time Before, D2D UE will carry out CCA detections, to ensure to hold channel.To ensure that the occupancy on same time slot is different simultaneously The end position that the D2D UE of frequency range carry out CCA is identical, i.e. the original position of valid data transmission is consistent.
In summary, the data transmission method in the embodiment of the present invention and alternative embodiment, apparatus and system are by communication frame Data transmission period be divided into dedicated time slot, spare time slot and shared time slot, resource point is fixed by base station in dedicated time slot Match somebody with somebody, for having reported UE data transfer, resource utilization is high, is not in collision.Secondly, the design of spare time slot can solve Certainly under CCA failure scenarios, the problem of how corresponding data quickly accesses other available resources, because corresponding CCA is unsuccessfully counted According to the CCA that set of UE it is shorter, therefore higher channel use priority can be obtained, ensure that the complete of corresponding data business Transmission.There can be other D2D of bursty data when the data transfer retransmitted after standby resources are not by CCA failures takes UE contention access uses, and avoids the waste of resource, improves resource utilization.
The above embodiments are merely illustrative of the technical solutions of the present invention rather than is limited, the ordinary skill of this area Technical scheme can be modified by personnel or equivalent substitution, without departing from the spirit and scope of the present invention, this The protection domain of invention should be to be defined described in claim.
Embodiment 4
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but a lot In the case of the former be more preferably embodiment.Based on such understanding, technical scheme is substantially in other words to existing The part that technology contributes can be embodied in the form of software product, and the computer software product is stored in a storage In medium (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, calculate Machine, server, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention additionally provide a kind of storage medium.Alternatively, in the present embodiment, above-mentioned storage medium can The program code for performing following steps to be arranged to storage to be used for:
S11, receive the data transfer request that one or more source device reports, wherein, data transfer request be used for Device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;
S12, it is respectively that one or more source device distributes the unauthorized resource of frequency range according to data transfer request, obtains non- Authorize the allocation result of the resource of frequency range;
S13, allocation result is issued, wherein, source device and/or purpose equipment upload according to allocation result in unauthorized frequency range Defeated D2D data.
Alternatively, storage medium is also configured to the program generation that storage is used to perform the method and step of above-described embodiment record Code:
S21, data transfer request is sent to base station, wherein, data transfer request is used to ask transmission sources equipment and purpose Device-to-device D2D data between equipment;
S22, receive the allocation result for the unauthorized resource of frequency range that base station issues;
S23, D2D data are sent to purpose equipment in unauthorized frequency range according to allocation result.
Alternatively, in the present embodiment, above-mentioned storage medium can include but is not limited to:USB flash disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. is various can be with the medium of store program codes.
Alternatively, in the present embodiment, processor performs above-mentioned implementation according to the program code stored in storage medium The method and step that example is recorded.
Alternatively, the specific example in the present embodiment may be referred to described in above-described embodiment and optional embodiment Example, the present embodiment will not be repeated here.
Obviously, those skilled in the art should be understood that above-mentioned each module of the invention or each step can be with general Computing device realize that they can be concentrated on single computing device, or be distributed in multiple computing devices and formed Network on, alternatively, they can be realized with the program code that computing device can perform, it is thus possible to they are stored Performed in the storage device by computing device, and in some cases, can be with different from shown in order execution herein The step of going out or describing, they are either fabricated to each integrated circuit modules respectively or by multiple modules in them or Step is fabricated to single integrated circuit module to realize.So, the present invention is not restricted to any specific hardware and software combination.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should be included in the scope of the protection.

Claims (35)

  1. A kind of 1. data transmission method, it is characterised in that including:
    The data transfer request that one or more source device reports is received, wherein, the data transfer request is used for base station Ask the device-to-device D2D data between transmission sources equipment and purpose equipment;
    It is respectively that one or more of source devices distribute the unauthorized resource of frequency range according to the data transfer request, obtains institute State the allocation result of the unauthorized resource of frequency range;
    The allocation result is issued, wherein, the source device and/or the purpose equipment are according to the allocation result unauthorized The D2D data are transmitted in frequency range.
  2. 2. according to the method for claim 1, it is characterised in that issuing the allocation result includes:
    Issue mesh corresponding to the allocation result to one or more of source devices and one or more of source devices Equipment;Or
    The allocation result is issued to one or more of source devices.
  3. 3. according to the method for claim 2, it is characterised in that
    Issuing corresponding to the allocation result to one or more of source devices and one or more of source devices In the case of purpose equipment, the allocation result includes:The resource block mark of unauthorized resource of frequency range block is distributed for each source device Knowledge and the first control information for being controlled to the data transmitted on the unauthorized resource of frequency range block, wherein, it is described Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;
    In the case where issuing the allocation result to one or more of source devices, the allocation result includes:To be every Individual source device distributes the Resource Block identification of unauthorized resource of frequency range block, wherein, the Resource Block identification is used for described in unique mark Unauthorized resource of frequency range block.
  4. 4. according to the method for claim 1, it is characterised in that the time slot of the communication frame in the unauthorized frequency range include with It is at least one lower:Dedicated time slot, spare time slot, shared time slot.
  5. 5. according to the method for claim 4, it is characterised in that according to the data transfer request to be one or more Individual source device, which distributes the unauthorized resource of frequency range, to be included:
    According to the second control information for being used for the transmission to the D2D data and being controlled carried in the data transfer request It is defined as the ratio of the resource of each source device distribution, wherein, the resource includes at least one of:Dedicated time slot resource, Spare time slot resource, shared time interval resource;
    According to second control information carried in the ratio of the resource of determination and each data transfer request The resource block distributed for each source device on the dedicated time slot and/or spare time slot.
  6. 6. method according to any one of claim 1 to 5, it is characterised in that before the allocation result is issued, institute Stating method also includes:
    First clear channel assessment (CCA) CCA detections are carried out to the unauthorized frequency range;
    In the case of the first CCA detections successfully, confirm to take the unauthorized frequency range.
  7. A kind of 7. data transmission method, it is characterised in that including:
    Data transfer request is sent to base station, wherein, the data transfer request is used to ask transmission sources equipment and purpose equipment Between device-to-device D2D data;
    Receive the allocation result for the unauthorized resource of frequency range that the base station issues;
    The D2D data are sent to the purpose equipment in unauthorized frequency range according to the allocation result.
  8. 8. according to the method for claim 7, it is characterised in that
    The allocation result includes:To transmit the Resource Block identification and use of the unauthorized resource of frequency range block of the D2D data distributions In the first control information that the data to being transmitted on the unauthorized resource of frequency range block are controlled, wherein, the resource block Identify and be used for unauthorized resource of frequency range block described in unique mark;Or
    The allocation result includes:The Resource Block identification of the unauthorized resource of frequency range block distributed for the source device, wherein, it is described Resource Block identification is used for unauthorized resource of frequency range block described in unique mark.
  9. 9. according to the method for claim 8, it is characterised in that include in the allocation result:The Resource Block identification and In the case of first control information, the D2D packets are sent in the unauthorized frequency range according to the allocation result Include:
    Corresponding to the Resource Block identification in the unauthorized resource of frequency range according to the instruction of first control information send described in D2D data.
  10. 10. according to the method for claim 8, it is characterised in that include in the allocation result:The Resource Block identification In the case of, sending the D2D data in the unauthorized frequency range according to the allocation result includes:
    It is used for being sent corresponding to the Resource Block identification in the unauthorized resource of frequency range to the D2D data in the unauthorized frequency The 3rd control information and the D2D data that transmission in section is controlled.
  11. 11. according to the method for claim 7, it is characterised in that
    The time slot of communication frame in the unauthorized frequency range includes at least one of:Dedicated time slot, spare time slot, it is shared when Gap;
    The allocation result includes:To transmit the Resource Block identification on the dedicated time slot of the D2D data distributions and/or being Transmit the Resource Block identification on the spare time slot of the D2D data distributions.
  12. 12. according to the method for claim 11, it is characterised in that according to the allocation result in the unauthorized frequency range Sending the D2D data includes:
    The dedicated time slot is provided on dedicated time slot resource block corresponding to Resource Block identification on the dedicated time slot of distribution Source block carries out the 2nd CCA detections;
    In the case of the 2nd CCA detections successfully, the D2D data are sent on the dedicated time slot resource block.
  13. 13. according to the method for claim 12, it is characterised in that the Resource Block identification on the dedicated time slot of distribution After the 2nd CCA detections are carried out to the dedicated time slot resource block on the corresponding dedicated time slot resource block, the side Method also includes:
    It is standby corresponding to the Resource Block identification on the spare time slot of distribution in the case of the 2nd CCA detection failures Detected with the 3rd CCA for carrying out pre-set priority on time slot resource block to the spare time slot resource block;
    In the case of the 3rd CCA detection failures, the spare time slot resource block is entered again after preset duration is waited The 3rd CCA detections of the row pre-set priority;Or in the case of the 3rd CCA detections successfully, the source device exists The D2D data are transmitted on the spare time slot resource block.
  14. 14. according to the method for claim 13, it is characterised in that the pre-set priority detects higher than the CCA of base station side Priority, and/or, the pre-set priority be equipment side limit priority.
  15. 15. according to the method for claim 13, it is characterised in that the Resource Block identification on the spare time slot of distribution After the 3rd CCA detections for carrying out pre-set priority on corresponding spare time slot resource block to the spare time slot resource block, institute Stating method also includes:
    When the source device is not completing the transmission of the D2D data on the spare time slot resource block, when described shared The transmission of the D2D data is completed in gap.
  16. A kind of 16. data transmission method, it is characterised in that including:
    Receive the allocation result of the unauthorized resource of frequency range that base station issues or for device-to-device D2D data unauthorized The 3rd control information that transmission in frequency range is controlled;
    The D2D data are received in unauthorized frequency range according to the allocation result or the 3rd control information.
  17. 17. according to the method for claim 16, it is characterised in that received according to the allocation result in unauthorized frequency range The D2D data include:
    Detected on the unauthorized resource of frequency range block of allocation result instruction and receive the D2D data.
  18. 18. according to the method for claim 16, it is characterised in that according to the 3rd control information in unauthorized frequency range Receiving the D2D data includes:
    Judge whether to receive the D2D data according to the 3rd control information;
    In the case where judging to receive the D2D data, in the unauthorized resource of frequency range block of the 3rd control information instruction It is upper to detect and receive the D2D data.
  19. A kind of 19. data transmission device, it is characterised in that including:
    First receiving module, the data transfer request reported for receiving one or more source device, wherein, the data pass It is defeated to ask for the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;
    Distribute module, for being respectively that one or more of source devices distribute unauthorized frequency according to the data transfer request Duan Ziyuan, obtain the allocation result of the unauthorized resource of frequency range;
    Module is issued, for issuing the allocation result, wherein, the source device and/or the purpose equipment are according to described point The D2D data are transmitted in unauthorized frequency range with result.
  20. 20. device according to claim 19, it is characterised in that the module that issues is used for:
    Issue mesh corresponding to the allocation result to one or more of source devices and one or more of source devices Equipment;Or
    The allocation result is issued to one or more of source devices.
  21. 21. device according to claim 20, it is characterised in that
    It is described issue module be used for issue the allocation result to one or more of source devices and it is one or In the case of purpose equipment corresponding to multiple source devices, the allocation result includes:Unauthorized frequency range is distributed for each source device The Resource Block identification of resource block and for being controlled to the data transmitted on the unauthorized resource of frequency range block first control Information processed, wherein, the Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;
    It is described issue module be used for issue the allocation result to one or more of source devices in the case of, described point Include with result:The Resource Block identification of unauthorized resource of frequency range block is distributed for each source device, wherein, the Resource Block identification is used In unauthorized resource of frequency range block described in unique mark.
  22. A kind of 22. data transmission device, it is characterised in that including:
    First sending module, for sending data transfer request to base station, wherein, the data transfer request is used to ask to transmit Device-to-device D2D data between source device and purpose equipment;
    Second receiving module, the allocation result of the unauthorized resource of frequency range issued for receiving the base station;
    Second sending module, for sending the D2D to the purpose equipment in unauthorized frequency range according to the allocation result Data.
  23. 23. device according to claim 22, it is characterised in that
    The allocation result includes:To transmit the Resource Block identification and use of the unauthorized resource of frequency range block of the D2D data distributions In the first control information that the data to being transmitted on the unauthorized resource of frequency range block are controlled, wherein, the resource block Identify and be used for unauthorized resource of frequency range block described in unique mark;Or
    The allocation result includes:The Resource Block identification of the unauthorized resource of frequency range block distributed for the source device, wherein, it is described Resource Block identification is used for unauthorized resource of frequency range block described in unique mark.
  24. 24. device according to claim 23, it is characterised in that second sending module is used for:
    Include in the allocation result:In the case of the Resource Block identification and first control information, in the resource block The D2D data are sent according to the instruction of first control information in the unauthorized resource of frequency range corresponding to mark.
  25. 25. device according to claim 23, it is characterised in that second sending module is used for:
    Include in the allocation result:In the case of the Resource Block identification, in unauthorized frequency corresponding to the Resource Block identification Sent on Duan Ziyuan for the 3rd control information that is controlled to transmission of the D2D data in the unauthorized frequency range and The D2D data.
  26. A kind of 26. data transmission device, it is characterised in that including:
    3rd receiving module, the allocation result of the unauthorized resource of frequency range issued for receiving base station or for equipment to setting The 3rd control information that standby transmission of the D2D data in unauthorized frequency range is controlled;
    4th receiving module, for receiving institute in unauthorized frequency range according to the allocation result or the 3rd control information State D2D data.
  27. 27. device according to claim 26, it is characterised in that the 4th receiving module is used for:
    Detected on the unauthorized resource of frequency range block of allocation result instruction and receive the D2D data.
  28. 28. device according to claim 26, it is characterised in that the 4th receiving module is used for:
    Judge whether to receive the D2D data according to the 3rd control information;
    In the case where judging to receive the D2D data, in the unauthorized resource of frequency range block of the 3rd control information instruction It is upper to detect and receive the D2D data.
  29. A kind of 29. data transmission system, it is characterised in that including:Base station, source device and purpose equipment, wherein,
    The base station, the data transfer request reported for receiving one or more described source device, wherein, the data pass It is defeated to ask for the device-to-device D2D data between base station requests transmission sources equipment and purpose equipment;According to the data Transmission request is respectively that one or more of source devices distribute the unauthorized resource of frequency range, obtains the unauthorized resource of frequency range Allocation result;The allocation result is issued, wherein, the source device and/or the purpose equipment are according to the allocation result The D2D data are transmitted in unauthorized frequency range;
    The source device, for sending the data transfer request to the base station;Receive the unauthorized frequency that the base station issues Duan Ziyuan allocation result;The D2D data are sent to the purpose equipment in unauthorized frequency range according to the allocation result;
    The purpose equipment, the allocation result of the unauthorized resource of frequency range issued for receiving the base station or for described The 3rd control information that transmission of the D2D data in unauthorized frequency range is controlled;According to the allocation result or described Three control information receive the D2D data in unauthorized frequency range.
  30. 30. system according to claim 29, it is characterised in that the base station is used for:
    Issue mesh corresponding to the allocation result to one or more of source devices and one or more of source devices Equipment;Or
    The allocation result is issued to one or more of source devices.
  31. 31. system according to claim 30, it is characterised in that
    It is used to issue the allocation result in the base station to one or more of source devices and one or more of In the case of purpose equipment corresponding to source device, the allocation result includes:The unauthorized resource of frequency range is distributed for each source device The Resource Block identification of block and for being controlled to the data transmitted on the unauthorized resource of frequency range block first control letter Breath, wherein, the Resource Block identification is used for unauthorized resource of frequency range block described in unique mark;
    In the case of being used to issue the allocation result to one or more of source devices in the base station, the distribution knot Fruit includes:The Resource Block identification of unauthorized resource of frequency range block is distributed for each source device, wherein, the Resource Block identification is used for only The one mark unauthorized resource of frequency range block.
  32. 32. system according to claim 31, it is characterised in that the source device is used for:
    Include in the allocation result:In the case of the Resource Block identification and first control information, in the resource block The D2D data are sent according to the instruction of first control information in the unauthorized resource of frequency range corresponding to mark.
  33. 33. system according to claim 31, it is characterised in that the source device is used for:
    Include in the allocation result:In the case of the Resource Block identification, in unauthorized frequency corresponding to the Resource Block identification Sent on Duan Ziyuan for the 3rd control information that is controlled to transmission of the D2D data in the unauthorized frequency range and The D2D data.
  34. 34. system according to claim 29, it is characterised in that the purpose equipment is used for:
    Detected on the unauthorized resource of frequency range block of allocation result instruction and receive the D2D data.
  35. 35. system according to claim 30, it is characterised in that the purpose equipment is used for:
    Judge whether to receive the D2D data according to the 3rd control information;
    In the case where judging to receive the D2D data, in the unauthorized resource of frequency range block of the 3rd control information instruction It is upper to detect and receive the D2D data.
CN201610482725.8A 2016-06-27 2016-06-27 Data transmission method, device and system Active CN107548070B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610482725.8A CN107548070B (en) 2016-06-27 2016-06-27 Data transmission method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610482725.8A CN107548070B (en) 2016-06-27 2016-06-27 Data transmission method, device and system

Publications (2)

Publication Number Publication Date
CN107548070A true CN107548070A (en) 2018-01-05
CN107548070B CN107548070B (en) 2023-10-27

Family

ID=60961366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610482725.8A Active CN107548070B (en) 2016-06-27 2016-06-27 Data transmission method, device and system

Country Status (1)

Country Link
CN (1) CN107548070B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109496400A (en) * 2018-10-16 2019-03-19 北京小米移动软件有限公司 Method, apparatus, base station and the terminal of retransmission information
CN110831225A (en) * 2018-08-08 2020-02-21 华为技术有限公司 Method and device for transmitting signals
CN110891314A (en) * 2018-09-11 2020-03-17 华为技术有限公司 Communication method, resource allocation method and device
CN111405678A (en) * 2020-02-19 2020-07-10 重庆邮电大学 CSMA-CA method based on virtual carrier sensing and priority scheduling

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102083138A (en) * 2011-01-14 2011-06-01 北京邮电大学 Method for simultaneously multiplexing multiple cellular user resources by D2D (Device-to-Device) user pair
CN103582077A (en) * 2012-08-07 2014-02-12 华为技术有限公司 Inter-cell D2D communication method, UE and base station
CN104918207A (en) * 2015-05-08 2015-09-16 上海交通大学 Multi-D2D communication resource allocation method in heterogeneous network based on frequency spectrum resource allocation
CN105101430A (en) * 2014-05-08 2015-11-25 中兴通讯股份有限公司 Configuration, distribution method, and apparatus of D2D resource
WO2016078396A1 (en) * 2014-11-21 2016-05-26 中兴通讯股份有限公司 Method and device for occupying unlicensed carrier

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102083138A (en) * 2011-01-14 2011-06-01 北京邮电大学 Method for simultaneously multiplexing multiple cellular user resources by D2D (Device-to-Device) user pair
CN103582077A (en) * 2012-08-07 2014-02-12 华为技术有限公司 Inter-cell D2D communication method, UE and base station
CN105101430A (en) * 2014-05-08 2015-11-25 中兴通讯股份有限公司 Configuration, distribution method, and apparatus of D2D resource
WO2016078396A1 (en) * 2014-11-21 2016-05-26 中兴通讯股份有限公司 Method and device for occupying unlicensed carrier
CN104918207A (en) * 2015-05-08 2015-09-16 上海交通大学 Multi-D2D communication resource allocation method in heterogeneous network based on frequency spectrum resource allocation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SAMSUNG: "R1-135222 "Evaluation results of resource allocation scheme for D2D communication"", 《3GPP TSG_RAN\WG1_RL1》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110831225A (en) * 2018-08-08 2020-02-21 华为技术有限公司 Method and device for transmitting signals
CN110891314A (en) * 2018-09-11 2020-03-17 华为技术有限公司 Communication method, resource allocation method and device
CN109496400A (en) * 2018-10-16 2019-03-19 北京小米移动软件有限公司 Method, apparatus, base station and the terminal of retransmission information
CN109496400B (en) * 2018-10-16 2021-10-08 北京小米移动软件有限公司 Method, device, base station and terminal for retransmitting information
US11832221B2 (en) 2018-10-16 2023-11-28 Beijing Xiaomi Mobile Software Co., Ltd. Information retransmission method and apparatus, base station, and terminal
CN111405678A (en) * 2020-02-19 2020-07-10 重庆邮电大学 CSMA-CA method based on virtual carrier sensing and priority scheduling
CN111405678B (en) * 2020-02-19 2023-02-17 重庆邮电大学 CSMA-CA method based on virtual carrier sensing and priority scheduling

Also Published As

Publication number Publication date
CN107548070B (en) 2023-10-27

Similar Documents

Publication Publication Date Title
CN107079455B (en) Method and apparatus for communication using unlicensed band in mobile communication system
US11129138B2 (en) Resource selection method and corresponding equipment
US20190132856A1 (en) Method and apparatus for scheduling uplink data in mobile communication system
CN106686691B (en) A kind of random access response RAR transmission method and relevant device
CN104869526B (en) A kind of communication of device-to-device and its resource allocation methods, equipment
US10917916B2 (en) Method and device for transmitting PRACH signals in unauthorized spectrum
CN106453182A (en) Preamble transmission method and apparatus
CN105532044B (en) The sending, receiving method and device of data frame
CN107872860A (en) A kind of uplink signal transmission method, device and system
CN104540230A (en) Uplink scheduling method and uplink scheduling device
CN107041000A (en) The transmission method and device of ascending control information
CN107251631A (en) Obtain the distributed control method of fair Radio Resource access
US11871380B2 (en) Resource selection method and corresponding equipment
CN106470492A (en) Resource occupying method, device and user equipment
CN106470502A (en) A kind of scheduling of resource of the unauthorized frequency range of LTE, using method and device
CN107548070A (en) Data transmission method, apparatus and system
CN106455087A (en) Competitive resource determining method and device
US11395284B2 (en) Method and apparatus of indicating alternative resource at collision of configured grants
CN106488384A (en) A kind of method and device sending packet
CN106454710A (en) Resource allocation method and resource allocation device based on D2D (Device-to-Device) communication, base station and terminal
CN107950070A (en) Method and apparatus for sending data in a wireless communication system
CN107734548A (en) The channel sending method and device of V2X communications
CN107682930A (en) A kind of resource selection method and device
CN108605314A (en) A kind of uplink data transmission method and relevant device
CN105828450A (en) Competition access method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant