CN108289335B - Data transmission method and device and terminal - Google Patents

Data transmission method and device and terminal Download PDF

Info

Publication number
CN108289335B
CN108289335B CN201710018675.2A CN201710018675A CN108289335B CN 108289335 B CN108289335 B CN 108289335B CN 201710018675 A CN201710018675 A CN 201710018675A CN 108289335 B CN108289335 B CN 108289335B
Authority
CN
China
Prior art keywords
uplink data
transmitting
information
resource information
unauthorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710018675.2A
Other languages
Chinese (zh)
Other versions
CN108289335A (en
Inventor
牛丽
吴昱民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201710018675.2A priority Critical patent/CN108289335B/en
Priority to PCT/CN2017/119592 priority patent/WO2018130081A1/en
Publication of CN108289335A publication Critical patent/CN108289335A/en
Application granted granted Critical
Publication of CN108289335B publication Critical patent/CN108289335B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/21Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/542Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0808Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using carrier sensing, e.g. as in CSMA
    • H04W74/0816Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using carrier sensing, e.g. as in CSMA carrier sensing with collision avoidance

Abstract

The invention provides a data transmission method, a data transmission device and a terminal, wherein the method comprises the following steps: acquiring unauthorized uplink available resource information; selecting resource information for transmitting unauthorized uplink data according to the obtained uplink available resource information; and transmitting data on the selected resource information. And selecting and transmitting the resource information of the unauthorized uplink data from the obtained uplink available resource information, and further transmitting the data on the selected resource information. The invention can solve the problem of how the terminal uses the unauthorized uplink resource in the related technology.

Description

Data transmission method and device and terminal
Technical Field
The present invention relates to the field of communications, and in particular, to a data transmission method, apparatus, and terminal.
Background
The long term evolution system (Long Term Evolution, abbreviated as LTE) in the prior art is mainly composed of three devices: a User Equipment (UE), a Core Network (CN), and a base station (eNB), wherein a mobility management entity (Mobility Management Entity, MME) in the Core Network is mainly responsible for signaling transmission, and a Serving Gateway (SGW) is mainly responsible for data transmission. The interface between the UE and the eNB is Uu, and the interface between the eNB and the core network is S1, as shown in fig. 1.
According to the current protocol, the UE is to communicate with the eNB, and first to access the eNB, i.e. initiate a random access procedure. As shown in fig. 2, there are four steps, respectively:
step 1: the UE acquires available preamble sequence codes for random access and time-frequency positions for transmitting the preamble sequences through system information or radio resource control (Radio Resource Control, RRC) signaling, randomly selects the preamble sequences and the time-frequency positions for transmitting the preamble sequences in available resources, and transmits the preamble sequences and the time-frequency positions for transmitting the preamble sequences to the eNB;
step 2: the eNB deduces a routing area wireless network temporary identifier (Routing Area Radio Network Temporary Identifier, RA-RNTI for short) possibly adopted by the UE through a time-frequency position adopted by the random access preamble sequence, decodes the preamble sequence by the RA-RNTI, and replies a random access response to the UE after the eNB successfully decodes the preamble sequence, wherein the response carries information such as uplink authorization and the like;
step 3: the UE transmits uplink data on the uplink authorized resources and carries information such as the identification of the UE;
step 4: and the eNB analyzes the uplink data on the uplink authorized resources, confirms the UE, solves the conflict, and sends a competition resolution identification to the UE.
However, this process requires four steps, the delay is long, and the non-orthogonal technology has been accepted by various companies, so the random access process has also been technically updated and simplified to a 2-step process. The UE may send the data to the eNB without authorization. The flow is as shown in fig. 3, there are two steps, respectively: step 1: the UE selects resources in unauthorized resources and sends uplink data; step 2: and the eNB replies the response or the data after analyzing the response or the data. In addition, there are two schemes, one is that the UE transmits the preamble sequence while transmitting the uplink data; the other is that the UE transmits only uplink data.
Here, the resources for transmitting the unlicensed uplink data adopt a non-orthogonal technology, unlike the conventional physical uplink shared channel (Physical uplink shared channel, abbreviated as PUSCH) resources, in order to prevent collision of two resources, it is necessary to divide the unlicensed uplink resources adopting the non-orthogonal technology and notify the UE, and how to use these resources by the UE is a problem to be solved.
Disclosure of Invention
The embodiment of the invention provides a data transmission method, a data transmission device and a terminal, which at least solve the problem of how to use unauthorized uplink resources by the terminal in the related technology.
According to an embodiment of the present invention, there is provided a data transmission method including: acquiring unauthorized uplink available resource information; selecting resource information for transmitting unauthorized uplink data according to the obtained uplink available resource information; and transmitting the data on the selected resource information.
Optionally, the unlicensed uplink available resource information is obtained through at least one of the following: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
Optionally, the resource information for sending the unlicensed uplink data includes at least one of the following: the method comprises the steps of sending time/frequency/space resources of unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation coding schemes MCS, data transmission modes, transport block sizes TBS, radio network temporary identifiers RNTI, power control parameters, hybrid automatic repeat request HARQ, redundancy versions, fixed occupied resource block RB numbers, maximum occupied RB numbers, preamble resources of a sending preamble sequence and time/frequency/space resources of the sending preamble sequence.
Optionally, selecting the resource information for transmitting the unlicensed uplink data includes: randomly selecting resource information for transmitting unauthorized uplink data; or selecting resource information for transmitting unauthorized uplink data according to the resource for transmitting the preamble.
Optionally, selecting the resource information for transmitting the unlicensed uplink data includes: generating scheduling information according to the channel quality or the service type; and selecting resource information for transmitting unauthorized uplink data according to the scheduling information.
Optionally, the scheduling information includes at least one of: the method comprises the steps of sending the number of Resource Blocks (RBs) occupied by unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation Coding Schemes (MCS), data transmission modes, transmission Block Sizes (TBS), radio Network Temporary Identifiers (RNTI), power control parameters, HARQ, redundancy versions and sending preamble information of a preamble sequence.
Optionally, the resources used by the scheduling information include at least one of: time-frequency domain position, adopted format, code word, sequence, interleaving or mapping format, demodulation reference signal, modulation coding scheme.
Optionally, the usage resource of the scheduling information is acquired by: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
Optionally, before sending the data on the selected resource information, the method further includes: generating a Radio Network Temporary Identifier (RNTI) for scrambling the unauthorized uplink data according to the time-frequency position for transmitting the unauthorized uplink data, and scrambling the unauthorized uplink data according to the generated RNTI; or scrambling unauthorized uplink data according to the routing area radio network temporary identifier RA-RNTI generated by the sending preamble.
According to another embodiment of the present invention, there is provided a data transmission apparatus including: the acquisition module is used for acquiring unauthorized uplink available resource information; the selection module is used for selecting the resource information for sending the unauthorized uplink data according to the obtained uplink available resource information; and the sending module is used for sending the data on the selected resource information.
Optionally, the unlicensed uplink available resource information is obtained through at least one of the following: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
Optionally, the resource information for sending the unlicensed uplink data includes at least one of the following: the method comprises the steps of sending time/frequency/space resources of unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation coding schemes MCS, data transmission modes, transport block sizes TBS, radio network temporary identifiers RNTI, power control parameters, hybrid automatic repeat request HARQ, redundancy versions, fixed occupied resource block RB numbers, maximum occupied RB numbers, preamble resources of a sending preamble sequence and time/frequency/space resources of the sending preamble sequence.
Optionally, the selection module is further configured to randomly select resource information for transmitting unauthorized uplink data; or selecting resource information for transmitting unauthorized uplink data according to the resource for transmitting the preamble.
Optionally, the selection module is further configured to generate scheduling information according to channel quality or service type; and selecting resource information for transmitting unauthorized uplink data according to the scheduling information.
Optionally, the scheduling information includes at least one of: the method comprises the steps of sending the number of Resource Blocks (RBs) occupied by unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation Coding Schemes (MCS), data transmission modes, transmission Block Sizes (TBS), radio Network Temporary Identifiers (RNTI), power control parameters, HARQ, redundancy versions and sending preamble information of a preamble sequence.
Optionally, the resources used by the scheduling information include at least one of: time-frequency domain position, adopted format, code word, sequence, interleaving or mapping format, demodulation reference signal, modulation coding scheme.
Optionally, the usage resource of the scheduling information is acquired by: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
Optionally, the apparatus further includes:
the first scrambling module is used for generating a Radio Network Temporary Identifier (RNTI) for scrambling the unauthorized uplink data according to the time-frequency position of the transmitted unauthorized uplink data, and scrambling the unauthorized uplink data according to the generated RNTI; or the second scrambling module is used for scrambling the unauthorized uplink data according to the routing area radio network temporary identifier RA-RNTI generated by the sending lead code.
According to a further embodiment of the present invention, there is provided a terminal comprising an apparatus according to any of the above embodiments.
According to still another embodiment of the present invention, there is also provided a storage medium. The storage medium is arranged to store program code for performing the steps of: acquiring unauthorized uplink available resource information; selecting resource information for transmitting unauthorized uplink data according to the obtained uplink available resource information; and transmitting the data on the selected resource information.
Optionally, the storage medium is further arranged to store program code for performing the steps of: acquiring the unauthorized uplink available resource information through at least one of the following steps: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
Optionally, the storage medium is further arranged to store program code for performing the steps of: the resource information for transmitting the unlicensed uplink data includes at least one of the following: the method comprises the steps of sending time/frequency/space resources of unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation coding schemes MCS, data transmission modes, transport block sizes TBS, radio network temporary identifiers RNTI, power control parameters, hybrid automatic repeat request HARQ, redundancy versions, fixed occupied resource block RB numbers, maximum occupied RB numbers, preamble resources of a sending preamble sequence and time/frequency/space resources of the sending preamble sequence.
Optionally, the storage medium is further arranged to store program code for performing the steps of: the selecting the resource information for transmitting the unauthorized uplink data includes: randomly selecting resource information for transmitting unauthorized uplink data; or selecting resource information for transmitting unauthorized uplink data according to the resource for transmitting the preamble.
Optionally, the storage medium is further arranged to store program code for performing the steps of: the selecting the resource information for transmitting the unauthorized uplink data includes: generating scheduling information according to the channel quality or the service type; and selecting resource information for transmitting unauthorized uplink data according to the scheduling information.
Optionally, the storage medium is further arranged to store program code for performing the steps of: the scheduling information includes at least one of: the method comprises the steps of sending the number of Resource Blocks (RBs) occupied by unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation Coding Schemes (MCS), data transmission modes, transmission Block Sizes (TBS), radio Network Temporary Identifiers (RNTI), power control parameters, HARQ, redundancy versions and sending preamble information of a preamble sequence.
Optionally, the storage medium is further arranged to store program code for performing the steps of: the resources used by the scheduling information include at least one of: time-frequency domain position, adopted format, code word, sequence, interleaving or mapping format, demodulation reference signal, modulation coding scheme.
Optionally, the storage medium is further arranged to store program code for performing the steps of: the use resources of the scheduling information are obtained by the following modes: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
Optionally, the storage medium is further arranged to store program code for performing the steps of: before transmitting the data on the selected resource, further comprising: generating a Radio Network Temporary Identifier (RNTI) for scrambling the unauthorized uplink data according to the time-frequency position for transmitting the unauthorized uplink data, and scrambling the unauthorized uplink data according to the generated RNTI; or scrambling unauthorized uplink data according to the routing area radio network temporary identifier RA-RNTI generated by the sending preamble.
By the method, unauthorized uplink available resource information is acquired; selecting resource information for transmitting unauthorized uplink data according to the obtained uplink available resource information; and transmitting data on the selected resource information. And selecting and transmitting the resource information of the unauthorized uplink data from the obtained uplink available resource information, and further transmitting the data on the selected resource information. Therefore, the problem of how to use unauthorized uplink resources by the terminal in the related technology can be solved, the base station can conveniently improve the accuracy of decoding uplink data, and the collision probability of the uplink data sent by the user terminal can be reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiments of the invention and together with the description serve to explain the invention and do not constitute a limitation on the invention. In the drawings:
fig. 1 is a schematic diagram of LTE in the related art;
fig. 2 is a random access flow diagram in LTE in the related art;
FIG. 3 is a flow chart of unlicensed uplink transmission in the related art;
fig. 4 is a block diagram of a hardware structure of a mobile terminal of a data transmission method according to an embodiment of the present invention;
Fig. 5 is a flowchart of a data transmission method according to an embodiment of the present invention;
fig. 6 is a flow chart of unlicensed uplink transmission of a transmit preamble in accordance with an embodiment of the present invention;
fig. 7 is a block diagram of a data transmission apparatus according to an embodiment of the present invention;
fig. 8 is a block diagram of a preferred structure of a data transmission apparatus according to an embodiment of the present invention;
fig. 9 is a block diagram of a structure of a terminal according to an embodiment of the present invention.
Detailed Description
The invention will be described in detail hereinafter with reference to the drawings in conjunction with embodiments. It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order.
Example 1
The method embodiment provided in embodiment 4 of the present application may be executed in a mobile terminal, a computer terminal or a similar computing device. Taking the mobile terminal as an example, fig. 4 is a block diagram of a hardware structure of the mobile terminal of a data transmission method according to an embodiment of the present invention. As shown in fig. 4, the mobile terminal 40 may include one or more (only one is shown in the figure) processors 402 (the processors 402 may include, but are not limited to, a processing means such as a microprocessor MCU or a programmable logic device FPGA), a memory 404 for storing data, and a transmission means 406 for communication functions. It will be appreciated by those of ordinary skill in the art that the configuration shown in fig. 4 is merely illustrative and is not intended to limit the configuration of the electronic device described above. For example, the mobile terminal 40 may also include more or fewer components than shown in fig. 4, or have a different configuration than shown in fig. 4.
The memory 404 may be used to store software programs and modules of application software, such as program instructions/modules corresponding to the data transmission method in the embodiment of the present invention, and the processor 402 executes the software programs and modules stored in the memory 404, thereby performing various functional applications and data processing, that is, implementing the method described above. Memory 404 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 404 may further include memory located remotely from the processor 402, which may be connected to the mobile terminal 40 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission means 406 is used to receive or transmit data via a network. The specific examples of the network described above may include a wireless network provided by a communication provider of the mobile terminal 40. In one example, the transmission means 406 comprises a network adapter (Network Interface Controller, NIC) that can be connected to other network devices via a base station to communicate with the internet. In one example, the transmission device 406 may be a Radio Frequency (RF) module for communicating with the internet wirelessly.
In this embodiment, a data transmission method running on the mobile terminal is provided, and fig. 5 is a flowchart of the data transmission method according to an embodiment of the present invention, as shown in fig. 5, where the flowchart includes the following steps:
step S502, obtaining unauthorized uplink available resource information;
step S504, selecting the resource information for transmitting unauthorized uplink data according to the obtained uplink available resource information;
step S506, data is sent on the selected resource information.
Through the steps, the resource information of the unauthorized uplink data is selected to be sent from the obtained uplink available resource information, and then the data is sent on the selected resource information. Therefore, the problem of how to use unauthorized uplink resources by the terminal in the related technology can be solved, the base station can conveniently improve the accuracy of decoding uplink data, and the collision probability of the uplink data sent by the user terminal can be reduced.
Optionally, the unlicensed uplink available resource information is obtained by at least one of: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel (Physical Downlink Control Channel, abbreviated PDCCH) signaling.
Optionally, the resource information for transmitting the unlicensed uplink data includes at least one of: a time/frequency/space Resource for transmitting unauthorized uplink data, a codeword, a sequence, an interleaving or mapping format, a demodulation reference signal, a modulation coding scheme (Modulation and Coding Scheme, abbreviated as MCS), a data transmission mode, a transport Block size (Transport Block Size, abbreviated as TBS), a radio network temporary identifier RNTI, a power control parameter, a hybrid automatic repeat request (Hybrid Automatic Repeat Request, abbreviated as HARQ), a redundancy version, a number of Resource Blocks (RBs) fixedly occupied, a number of RBs maximally occupied, a preamble Resource for transmitting a preamble sequence, and a time/frequency/space Resource for transmitting a preamble sequence.
Alternatively, selecting the resource information for transmitting the unlicensed uplink data may include randomly selecting the resource information for transmitting the unlicensed uplink data. Through the steps, the probability of collision of uplink data sent by different UEs can be reduced. Alternatively, the resource information for selecting to transmit the unlicensed uplink data may select to transmit the resource information for the unlicensed uplink data according to the resource for transmitting the preamble. Through the steps, the base station can monitor and receive the uplink data conveniently.
Optionally, selecting the resource information for transmitting the unlicensed uplink data includes: generating scheduling information according to the channel quality or the service type; and selecting resource information for transmitting unauthorized uplink data according to the scheduling information.
Optionally, the scheduling information includes at least one of: the method comprises the steps of sending the number of Resource Blocks (RBs) occupied by unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation Coding Schemes (MCS), data transmission modes, TBS, radio Network Temporary Identifiers (RNTI), power control parameters, HARQ, redundancy versions and sending preamble information of a preamble sequence.
Optionally, the resources used by the scheduling information include at least one of: time-frequency domain position, adopted format, code word, sequence, interleaving or mapping format, demodulation reference signal, modulation coding scheme.
Optionally, the usage resources of the scheduling information are obtained by: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
Optionally, before sending the data on the selected resource information, the method further includes: generating a Radio Network Temporary Identifier (RNTI) for scrambling the unauthorized uplink data according to the time-frequency position for transmitting the unauthorized uplink data, and scrambling the unauthorized uplink data according to the generated RNTI; or scrambling unauthorized uplink data according to the routing area radio network temporary identifier RA-RNTI generated by the sending preamble. Through the steps, the difficulty and the workload of blind detection of the base station can be reduced.
The embodiments described above may be applied to 4G and 5G communication systems for ease of understanding, and are described in detail below.
In the related art, in order to distinguish an unlicensed uplink resource from a conventional licensed uplink resource, the unlicensed uplink resource occupies a time-frequency resource alone and is dedicated for unlicensed uplink transmission. The unlicensed uplink resources include not only time/frequency/space resources for transmitting unlicensed uplink data, but also preamble resources for transmitting a preamble sequence and time/frequency/space resources for transmitting a preamble sequence. In addition, in order to facilitate the base station to successfully analyze the unlicensed uplink data sent by the UE, the UE needs to know the codeword, sequence, interleaving or mapping format, demodulation reference signal, modulation coding scheme MCS, data transmission mode, TBS, RNTI, power control parameters, HARQ, redundancy version and other information adopted by the uplink data packet, and even the number of RBs occupied by the UE for sending the uplink data packet, including the number of RBs occupied by the UE fixedly, the maximum number of RBs occupied by the UE, and the like.
Alternatively, the base station and the UE may agree on these information. For example, the base station and the UE predefine resources for the UE to transmit unauthorized uplink data, including at least one of the following: the method comprises the steps of sending time/frequency/space resources (pools), code words, sequences, interleaving or mapping formats of unauthorized uplink data, demodulation reference signals, modulation and Coding Schemes (MCS), data transmission modes, TBS, RNTI, power control parameters, HARQ, redundancy versions and other information, fixing the number of occupied RBs, and the maximum number of occupied RBs, and possibly comprising preamble resources for sending a preamble sequence and time/frequency/space resources (pools). And the base station receives and analyzes the unauthorized uplink data sent by the UE on the corresponding resources according to the rule according to the convention.
Also, the base station may inform, configure the UE of these proprietary resources, broadcast via system information, or via proprietary RRC signaling. For example, the base station broadcasts resources of the UE transmitting unauthorized uplink data through system information in the coverage area. Alternatively, the base station may also configure resources for transmitting unlicensed uplink data to the UE through RRC signaling, such as RRCConnectionReconfiguration, RRCConnectionRelease, RRCConnectionSetup, RRCConnectionReestablishment or a newly defined message. The resources for the UE to transmit unlicensed uplink data include at least one of: the method comprises the steps of sending time/frequency/space resources (pools), code words, sequences, interleaving or mapping formats of unauthorized uplink data, demodulation reference signals, modulation and Coding Schemes (MCS), data transmission modes, TBS, RNTI, power control parameters, HARQ, redundancy versions and other information, and fixing the number of occupied RBs, the number of maximum occupied RBs, and possibly including preamble resources for sending preamble sequences, time/frequency/space resources (pools) and the like.
Alternatively, the base station may inform, configure the UE in a manner that may also be via a scheduling instruction (e.g., PDCCH). Or in combination with system information broadcast or proprietary RRC signaling, and scheduling instructions (e.g., PDCCH). The system information broadcast or the special RRC signaling can indicate the time/frequency/space resources of the UE for transmitting the unauthorized uplink data, and the PDCCH can indicate the MCS and other information adopted by the UE aiming at the characteristics of the UE. For example, the system information broadcast or the dedicated RRC signaling indicates the UE to send resources of unauthorized uplink data, including at least one of the following: the time/frequency/space resources (pool) for transmitting the unauthorized uplink data, the number of the RBs occupied by the fixed, the maximum number of the RBs occupied, and the preamble resources for transmitting the preamble sequence, the time/frequency/space resources (pool) and the like may be included.
Moreover, the base station may allocate resources for transmitting unlicensed uplink data to the UE according to characteristics such as channel quality and service type of the UE, including but not limited to: the method comprises the steps of sending time/frequency/space resources, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation coding schemes MCS, data transmission modes, TBS, RNTI, power control parameters, HARQ, redundancy versions and other information of unauthorized uplink data, fixing the number of occupied RBs, and the maximum number of the occupied RBs, and possibly comprising preamble resources for sending preamble sequences, time/frequency/space resources and the like.
Optionally, the UE may also send unlicensed uplink data in a self-scheduling manner. Firstly, a base station transmits available resources of unauthorized uplink data through system information broadcasting, wherein the resources at least comprise one of the following: the time/frequency/space resources (pool) for transmitting the unauthorized uplink data, the number of the RBs occupied by the fixed, the maximum number of the RBs occupied, and the preamble resources for transmitting the preamble sequence, the time/frequency/space resources (pool) and the like may be included.
The UE may select, for itself, resources for transmitting unauthorized uplink data according to characteristics such as channel quality, service type, etc., and at least one of the following may be included: information such as RB number occupied by the transmission unauthorized uplink data, codeword, sequence, interleaving or mapping format, demodulation reference signal, modulation coding scheme MCS, data transmission mode, TBS, RNTI, power control parameters, HARQ, redundancy version, etc., and may further include preamble information for transmitting the preamble sequence, etc. These information may generate an uplink scheduling information, which the UE sends to the base station along with the uplink data.
In order to facilitate the base station to successfully analyze the uplink scheduling information, the uplink scheduling information may be sent to the base station in a predefined form, and the base station and the UE predefine resources of the uplink scheduling information. Or the base station allocates and configures the resources of the uplink scheduling information to the UE. The resources allocated and configured to the UE uplink scheduling information by the base station at least comprise one of the following: including time-frequency domain location, employed format, codeword, sequence, interleaving or mapping format, demodulation reference signal, modulation coding scheme, etc.
Optionally, after the base station informs, allocates and configures the time/frequency/space resource pool for transmitting the unlicensed uplink data to the UE, the UE may select a resource for transmitting the uplink data in the time/frequency/space resource pool. In order to reduce the probability of collision of uplink data sent by different UEs, the UE may randomly select a resource for sending uplink data. For example: the base station informs the UE of the time-frequency resource pool for sending the unauthorized uplink data through the system information or the RRC signaling. When the UE wants to transmit the unlicensed uplink data, the UE randomly selects a time-frequency location in the unlicensed uplink time-frequency resource pool. And the base station detects the uplink data of the UE in the time-frequency resource pool of the unlicensed uplink data.
The first step of the scheme for unlicensed uplink transmission is: the preamble sequence and the uplink data are simultaneously transmitted, and as shown in fig. 6, the transmission of the preamble can be selected and transmitted according to the current protocol specification. In order to facilitate the base station to monitor and receive the uplink data, the resource for transmitting the unauthorized uplink data may have a binding relationship with the resource for transmitting the preamble. For example: the uplink resource of the transmission preamble is a, the distance delta between the resource for transmitting unauthorized uplink data and the uplink resource of the transmission preamble is b=a+delta. Where Δ may be associated with a time-frequency or designed as a random value within a range in order to avoid collision.
Optionally, the UE needs to scramble the RNTI to send the unlicensed uplink data, and in order to reduce the difficulty and workload of blind detection of the base station, the RNTI for scrambling the uplink data may be generated according to the time-frequency location for sending the uplink data. For example, an RNTI is generated based on the selected time-frequency location and used to scramble uplink data. Wherein, the RNTI can be calculated by the following formula: rnti=1+t_id+10×f_id, where t_id is a time domain position selected by the UE to transmit unlicensed uplink data; f_id is the frequency domain position selected by the UE to transmit the unlicensed uplink data. The base station descrambles the unlicensed uplink data sent by the UE according to the corresponding RNTI.
Optionally, the first step of the scheme for unlicensed uplink transmission is: the preamble sequence and the uplink data are simultaneously transmitted as shown in fig. 6. In order to reduce the difficulty and workload of blind detection of the base station, the RNTI of the scrambling unauthorized uplink data can adopt the RNTI of the scrambling preamble sequence. For example, the RA-RNTI of the scrambling preamble sequence is generated from time-frequency resources of the transmitting preamble sequence. And the RA-RNTI may be employed to scramble the RNTI of the unlicensed uplink data transmitted by the UE. And the base station decodes the preamble and then descrambles the unlicensed uplink data transmitted by the UE using the decoded RA-RNTI.
From the description of the above embodiments, it will be clear to a person skilled in the art that the method according to the above embodiments may be implemented by means of software plus the necessary general hardware platform, but of course also by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present invention.
Example 2
The embodiment also provides a data sending device and a terminal, and the device is used for implementing the foregoing embodiments and preferred embodiments, and is not described in detail. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 7 is a block diagram of a data transmission apparatus according to an embodiment of the present invention, as shown in fig. 7, including:
an obtaining module 72, configured to obtain unauthorized uplink available resource information;
a selection module 74, coupled to the acquisition module 72, for selecting, according to the acquired uplink available resource information, resource information for transmitting unauthorized uplink data;
a transmitting module 76, coupled to the selecting module 74, for transmitting data on the selected resources.
Optionally, the unlicensed uplink available resource information is obtained by at least one of: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
Optionally, the resource information for transmitting the unlicensed uplink data includes at least one of: the method comprises the steps of sending time/frequency/space resources of unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation coding schemes MCS, data transmission modes, TBS, radio network temporary identifiers RNTI, power control parameters, hybrid automatic repeat request HARQ, redundancy versions, fixed occupied resource block RB numbers, maximum occupied RB numbers, preamble resources of a sending preamble sequence and time/frequency/space resources of the sending preamble sequence.
Optionally, the selecting module 74 is further configured to randomly select resource information for transmitting unauthorized uplink data; or selecting resource information for transmitting unauthorized uplink data according to the resource for transmitting the preamble.
Optionally, the selecting module 74 is further configured to generate scheduling information according to the channel quality or the service type; and selecting resource information for transmitting the unauthorized uplink data according to the scheduling information.
Optionally, the scheduling information includes at least one of: the method comprises the steps of sending the number of Resource Blocks (RBs) occupied by unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation Coding Schemes (MCS), data transmission modes, TBS, radio Network Temporary Identifiers (RNTI), power control parameters, HARQ, redundancy versions and sending preamble information of a preamble sequence.
Optionally, the resources used by the scheduling information include at least one of: time-frequency domain position, adopted format, code word, sequence, interleaving or mapping format, demodulation reference signal, modulation coding scheme.
Optionally, the usage resources of the scheduling information are obtained by: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
Fig. 8 is a block diagram of a preferred structure of a data transmission apparatus according to an embodiment of the present invention, as shown in fig. 8, which includes, in addition to all the modules shown in fig. 7:
a first scrambling module 82, configured to generate a radio network temporary identifier RNTI for scrambling the unlicensed uplink data according to the time-frequency location for transmitting the unlicensed uplink data, and scramble the unlicensed uplink data according to the generated RNTI; or alternatively, the process may be performed,
a second scrambling module 84, configured to scramble the unlicensed uplink data according to the routing area radio network temporary identifier RA-RNTI generated by the transmission preamble.
Fig. 9 is a block diagram of a terminal according to an embodiment of the present invention, as shown in fig. 9, including the apparatus of any of the above embodiments.
It should be noted that each of the above modules may be implemented by software or hardware, and for the latter, it may be implemented by, but not limited to: the modules are all located in the same processor; alternatively, the above modules may be located in different processors in any combination.
Example 3
The embodiment of the invention also provides a storage medium. Alternatively, in the present embodiment, the above-described storage medium may be configured to store program code for performing the steps of:
S1, acquiring unauthorized uplink available resource information;
s2, selecting resource information for transmitting unauthorized uplink data according to the obtained uplink available resource information;
and S3, transmitting data on the selected resources.
Optionally, the storage medium is further arranged to store program code for performing the steps of:
s1, acquiring unauthorized uplink available resource information through at least one of the following steps: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
Optionally, the storage medium is further arranged to store program code for performing the steps of:
s1, sending resource information of unauthorized uplink data comprises at least one of the following: the method comprises the steps of sending time/frequency/space resources of unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation coding schemes MCS, data transmission modes, TBS, radio network temporary identifiers RNTI, power control parameters, hybrid automatic repeat request HARQ, redundancy versions, fixed occupied resource block RB numbers, maximum occupied RB numbers, preamble resources of a sending preamble sequence and time/frequency/space resources of the sending preamble sequence.
Optionally, the storage medium is further arranged to store program code for performing the steps of: the selecting of the resource information for transmitting the unlicensed uplink data includes:
S1, randomly selecting resource information for transmitting unauthorized uplink data; or alternatively, the process may be performed,
s2, selecting resource information for transmitting unauthorized uplink data according to the resource for transmitting the preamble.
Optionally, the storage medium is further arranged to store program code for performing the steps of: the selecting of the resource information for transmitting the unlicensed uplink data includes:
s1, generating scheduling information according to channel quality or service type;
s2, selecting resource information for transmitting unauthorized uplink data according to the scheduling information.
Optionally, the storage medium is further arranged to store program code for performing the steps of:
s1, the scheduling information comprises at least one of the following: the method comprises the steps of sending the number of Resource Blocks (RBs) occupied by unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation Coding Schemes (MCS), data transmission modes, TBS, radio Network Temporary Identifiers (RNTI), power control parameters, HARQ, redundancy versions and sending preamble information of a preamble sequence.
Optionally, the storage medium is further arranged to store program code for performing the steps of:
s1, resources used by the scheduling information comprise at least one of the following: time-frequency domain position, adopted format, code word, sequence, interleaving or mapping format, demodulation reference signal, modulation coding scheme.
Optionally, the storage medium is further arranged to store program code for performing the steps of:
s1, the use resources of the scheduling information are acquired by the following modes: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
Optionally, the storage medium is further arranged to store program code for performing the steps of: before transmitting the data on the selected resource, further comprising:
s1, generating a Radio Network Temporary Identifier (RNTI) for scrambling unauthorized uplink data according to a time-frequency position for transmitting the unauthorized uplink data, and scrambling the unauthorized uplink data according to the generated RNTI; or alternatively, the process may be performed,
s2, scrambling unauthorized uplink data according to a routing area radio network temporary identifier RA-RNTI generated by the sending lead code.
Alternatively, in the present embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Optionally, in this embodiment, the processor executes according to program code stored in the storage medium: acquiring unauthorized uplink available resource information; selecting resource information for transmitting unauthorized uplink data according to the obtained uplink available resource information; data is sent on the selected resources.
Optionally, in this embodiment, the processor executes according to program code stored in the storage medium: acquiring unauthorized uplink available resource information through at least one of the following steps: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
Optionally, in this embodiment, the processor executes according to program code stored in the storage medium: the resource information for transmitting the unlicensed uplink data includes at least one of: the method comprises the steps of sending time/frequency/space resources of unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation coding schemes MCS, data transmission modes, TBS, radio network temporary identifiers RNTI, power control, hybrid automatic repeat request HARQ, redundancy versions, fixed occupied resource block RB numbers, maximum occupied RB numbers, preamble resources of a sending preamble sequence and time/frequency/space resources of the sending preamble sequence.
Optionally, in this embodiment, the processor executes according to program code stored in the storage medium: the selecting of the resource information for transmitting the unlicensed uplink data includes: randomly selecting resource information for transmitting unauthorized uplink data; or selecting resource information for transmitting unauthorized uplink data according to the resource for transmitting the preamble.
Optionally, in this embodiment, the processor executes according to program code stored in the storage medium: the selecting of the resource information for transmitting the unlicensed uplink data includes: generating scheduling information according to the channel quality or the service type; and selecting resource information for transmitting unauthorized uplink data according to the scheduling information.
Optionally, in this embodiment, the processor executes according to program code stored in the storage medium: the scheduling information includes at least one of: the method comprises the steps of sending the number of Resource Blocks (RBs) occupied by unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation Coding Schemes (MCS), data transmission modes, TBS, radio Network Temporary Identifiers (RNTI), power control parameters, HARQ, redundancy versions and sending preamble information of a preamble sequence.
Optionally, in this embodiment, the processor executes according to program code stored in the storage medium: the resources used by the scheduling information include at least one of: time-frequency domain position, adopted format, code word, sequence, interleaving or mapping format, demodulation reference signal, modulation coding scheme.
Optionally, in this embodiment, the processor executes according to program code stored in the storage medium: the use resources of the scheduling information are obtained by: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
Optionally, in this embodiment, the processor executes according to program code stored in the storage medium: before transmitting the data on the selected resource, further comprising: generating a Radio Network Temporary Identifier (RNTI) for scrambling the unauthorized uplink data according to the time-frequency position for transmitting the unauthorized uplink data, and scrambling the unauthorized uplink data according to the generated RNTI; or scrambling unauthorized uplink data according to the routing area radio network temporary identifier RA-RNTI generated by the sending preamble.
Alternatively, specific examples in this embodiment may refer to examples described in the foregoing embodiments and optional implementations, and this embodiment is not described herein.
It will be appreciated by those skilled in the art that the modules or steps of the invention described above may be implemented in a general purpose computing device, they may be concentrated on a single computing device, or distributed across a network of computing devices, they may alternatively be implemented in program code executable by computing devices, so that they may be stored in a memory device for execution by computing devices, and in some cases, the steps shown or described may be performed in a different order than that shown or described, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps within them may be fabricated into a single integrated circuit module for implementation. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only of the preferred embodiments of the present invention and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (17)

1. A data transmission method, comprising:
acquiring unauthorized uplink available resource information;
according to the obtained uplink available resource information, selecting the resource information for transmitting the unauthorized uplink data comprises at least one of the following steps: the method comprises the steps of sending time/frequency/space resources of unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation Coding Schemes (MCS), data transmission modes, transport Block Sizes (TBS), radio Network Temporary Identifiers (RNTI), power control parameters, hybrid automatic repeat request (HARQ), redundancy versions, the number of fixedly occupied Resource Blocks (RBs), the number of the largest occupied RBs, preamble resources of a sending preamble sequence and time/frequency/space resources of the sending preamble sequence; and transmitting the data on the selected resource information.
2. The method of claim 1, wherein the unlicensed uplink available resource information is obtained by at least one of: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
3. The method of claim 1, wherein selecting the resource information for transmitting the unlicensed uplink data comprises:
randomly selecting resource information for transmitting unauthorized uplink data; or alternatively, the process may be performed,
and selecting resource information for transmitting unauthorized uplink data according to the resource for transmitting the preamble.
4. The method of claim 1, wherein selecting the resource information for transmitting the unlicensed uplink data comprises:
generating scheduling information according to the channel quality or the service type;
and selecting resource information for transmitting unauthorized uplink data according to the scheduling information.
5. The method of claim 4, wherein the scheduling information comprises at least one of: the method comprises the steps of sending the number of Resource Blocks (RBs) occupied by unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation Coding Schemes (MCS), data transmission modes, TBS, radio Network Temporary Identifiers (RNTI), power control parameters, HARQ, redundancy versions and sending preamble information of a preamble sequence.
6. The method of claim 4 or 5, wherein the resources used by the scheduling information include at least one of: time-frequency domain position, adopted format, code word, sequence, interleaving or mapping format, demodulation reference signal, modulation coding scheme.
7. The method of claim 6, wherein the usage resources of the scheduling information are obtained by: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
8. The method according to any one of claims 1 to 7, further comprising, prior to transmitting the data on the selected resource information:
generating a Radio Network Temporary Identifier (RNTI) for scrambling the unauthorized uplink data according to the time-frequency position for transmitting the unauthorized uplink data, and scrambling the unauthorized uplink data according to the generated RNTI; or alternatively, the process may be performed,
and scrambling the unauthorized uplink data according to the routing area radio network temporary identifier RA-RNTI generated by the transmission preamble.
9. A data transmission apparatus, comprising:
the acquisition module is used for acquiring unauthorized uplink available resource information;
the selection module is used for selecting the resource information for sending the unauthorized uplink data according to the obtained uplink available resource information, wherein the resource information comprises at least one of the following components: the method comprises the steps of sending time/frequency/space resources of unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation Coding Schemes (MCS), data transmission modes, transport Block Sizes (TBS), radio Network Temporary Identifiers (RNTI), power control parameters, hybrid automatic repeat request (HARQ), redundancy versions, the number of fixedly occupied Resource Blocks (RBs), the number of the largest occupied RBs, preamble resources of a sending preamble sequence and time/frequency/space resources of the sending preamble sequence;
And the sending module is used for sending the data on the selected resource information.
10. The apparatus of claim 9, wherein the unlicensed uplink available resource information is obtained by at least one of: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
11. The apparatus of claim 9, wherein the selection module is further configured to randomly select resource information for transmitting unauthorized uplink data; or selecting resource information for transmitting unauthorized uplink data according to the resource for transmitting the preamble.
12. The apparatus of claim 9, wherein the selection module is further configured to generate scheduling information based on channel quality or traffic type; and selecting resource information for transmitting unauthorized uplink data according to the scheduling information.
13. The apparatus of claim 12, wherein the scheduling information comprises at least one of: the method comprises the steps of sending the number of Resource Blocks (RBs) occupied by unauthorized uplink data, code words, sequences, interleaving or mapping formats, demodulation reference signals, modulation Coding Schemes (MCS), data transmission modes, TBS, radio Network Temporary Identifiers (RNTI), power control parameters, HARQ, redundancy versions and sending preamble information of a preamble sequence.
14. The apparatus according to claim 12 or 13, wherein the resources used by the scheduling information comprise at least one of: time-frequency domain position, adopted format, code word, sequence, interleaving or mapping format, demodulation reference signal, modulation coding scheme.
15. The apparatus of claim 14, wherein the usage resources of the scheduling information are obtained by: protocol conventions, system information, radio resource control, RRC, signaling, physical downlink control channel, PDCCH, signaling.
16. The device according to any one of claims 9 to 15, wherein,
the first scrambling module is used for generating a Radio Network Temporary Identifier (RNTI) for scrambling the unauthorized uplink data according to the time-frequency position of the transmitted unauthorized uplink data, and scrambling the unauthorized uplink data according to the generated RNTI; or alternatively, the process may be performed,
and the second scrambling module is used for scrambling the unauthorized uplink data according to the routing area radio network temporary identifier RA-RNTI generated by the sending lead code.
17. A terminal comprising the apparatus of any of the preceding claims 9 to 16.
CN201710018675.2A 2017-01-10 2017-01-10 Data transmission method and device and terminal Active CN108289335B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710018675.2A CN108289335B (en) 2017-01-10 2017-01-10 Data transmission method and device and terminal
PCT/CN2017/119592 WO2018130081A1 (en) 2017-01-10 2017-12-28 Data transmission method and device, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710018675.2A CN108289335B (en) 2017-01-10 2017-01-10 Data transmission method and device and terminal

Publications (2)

Publication Number Publication Date
CN108289335A CN108289335A (en) 2018-07-17
CN108289335B true CN108289335B (en) 2023-07-14

Family

ID=62831372

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710018675.2A Active CN108289335B (en) 2017-01-10 2017-01-10 Data transmission method and device and terminal

Country Status (2)

Country Link
CN (1) CN108289335B (en)
WO (1) WO2018130081A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020037616A1 (en) 2018-08-23 2020-02-27 北京小米移动软件有限公司 Hybrid automatic retransmission request feedback method and device, and user equipment and base station
CN110972327B (en) * 2018-09-28 2022-03-11 维沃移动通信有限公司 Signal transmission method and communication equipment based on unauthorized frequency band
US20210345371A1 (en) * 2018-09-30 2021-11-04 Telefonaktiebolaget Lm Ericsson (Publ) Method and Apparatus for Self-Scheduled Uplink Transmission
CN109565838B (en) * 2018-11-01 2023-10-10 北京小米移动软件有限公司 Information transmission method, device, base station and terminal
CN111436155B (en) * 2019-02-21 2021-09-14 维沃移动通信有限公司 Data transmission method and terminal equipment
CN111756473B (en) * 2019-03-29 2023-06-23 中国移动通信有限公司研究院 Information transmission method and terminal
CN112314040B (en) * 2019-05-28 2023-04-11 北京小米移动软件有限公司 Random access method, device, system and storage medium
CN113079570B (en) * 2020-01-03 2023-06-30 大唐移动通信设备有限公司 Transmission method and device
CN115278785A (en) * 2020-04-10 2022-11-01 展讯通信(上海)有限公司 Method for determining sub-band of uplink data transmission, terminal and readable storage medium
CN112753269B (en) * 2020-11-17 2024-03-01 北京小米移动软件有限公司 Method, device, communication equipment and medium for determining uplink transmission resources

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105101439A (en) * 2015-08-28 2015-11-25 宇龙计算机通信科技(深圳)有限公司 Transmission method and terminal
CN105848165A (en) * 2015-01-14 2016-08-10 中兴通讯股份有限公司 Unauthorized resource use methods and system, base station, and user equipment
CN105992373A (en) * 2015-01-30 2016-10-05 中兴通讯股份有限公司 Data transmission method, data transmission device, base station and user equipment
CN105992345A (en) * 2015-01-27 2016-10-05 中兴通讯股份有限公司 Method and device for using unlicensed carrier resource
WO2016179831A1 (en) * 2015-05-14 2016-11-17 Nec Corporation Methods and apparatuses for data transmission and receiving in a wireless communication system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105848165A (en) * 2015-01-14 2016-08-10 中兴通讯股份有限公司 Unauthorized resource use methods and system, base station, and user equipment
CN105992345A (en) * 2015-01-27 2016-10-05 中兴通讯股份有限公司 Method and device for using unlicensed carrier resource
CN105992373A (en) * 2015-01-30 2016-10-05 中兴通讯股份有限公司 Data transmission method, data transmission device, base station and user equipment
WO2016179831A1 (en) * 2015-05-14 2016-11-17 Nec Corporation Methods and apparatuses for data transmission and receiving in a wireless communication system
CN105101439A (en) * 2015-08-28 2015-11-25 宇龙计算机通信科技(深圳)有限公司 Transmission method and terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
R1-060922 "Uplink resource request for uplink scheduling";LG Electronics;《3GPP tsg_ran\WG1_RL1》;20060321;全文 *
自适应TD-LTE公网集群系统竞争Preamble序列配置方案;隋宇等;《重庆邮电大学学报(自然科学版)》;20160615(第03期);全文 *

Also Published As

Publication number Publication date
WO2018130081A1 (en) 2018-07-19
CN108289335A (en) 2018-07-17

Similar Documents

Publication Publication Date Title
CN108289335B (en) Data transmission method and device and terminal
CN111713069B (en) User equipment, base station and method
JP6731002B2 (en) Frequency domain resource configuration method and apparatus
CN107534977B (en) Random access response location indication for coverage enhanced low complexity machine type communication
CN110932833B (en) Information transmission method and device
EP2852236B1 (en) Resource allocation method and device
CN110971347A (en) Communication method and device
US20230318738A1 (en) Method and apparatus for machine type communication of system information
EP3216161B1 (en) Enhanced physical downlink control channel user equipment specific search space subband hopping for machine type communication device
CN112005602A (en) New physical downlink control channel design
US20160227539A1 (en) Frequency Resource And/Or Modulation & Coding Scheme Indicator For Machine Type Communication Device
CN114026939A (en) User equipment, base station and method for Downlink Control Information (DCI) of DCI format
US20160309516A1 (en) Power reduction on random access response reception for coverage enhanced low complexity machine type communication
CN113169815A (en) Channel occupancy time indication for NR-based unlicensed operation
CN110475213B (en) Paging message transmission method and device
CN108633104B (en) Random access method, user equipment, base station and random access system
CN111526595B (en) Channel resource set indication method and device and computer storage medium
CN110741703B (en) Resource allocation method and device and computer storage medium
EP3211949A1 (en) Terminal device, integrated circuit, and communication method
WO2024024968A1 (en) Device and method
WO2024070599A1 (en) Terminal and base station
WO2024024969A1 (en) Device and method
KR20190073566A (en) Sub-frame scheduling method and base station
CN114424491A (en) User equipment, base station and method for uplink transmission priority
CN114424659A (en) User equipment, base station and method for uplink signal cancellation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant